![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/ca9b0de3-205f-47ca-a620-5fbddb680695.png)
I’m curious, what about Bluetooth makes it insecure? Is it that vendors create insecure implementations, like Android, or is it a human issue like connecting to things by default? I recall the Bluetooth spec being unbelievably complex and verbose, which obviously increases risk and makes it harder to audit, but it doesn’t get many updates, and I don’t recall seeing many issues with the spec itself. I mean it’s not like it’s fixing a CVE every quarter like with netty packages.
This is pretty cool! Wondering about a couple of these features though: locking setup after a forced reset and locking stolen devices which are offline for extended periods. Do these features activate when I determine the phone is stolen? Or do they happen automatically? This might make used phone sales a major PITA if the seller doesn’t properly reset it first.