Skip to content

Reversing and Attacking Google Nearby #2448

Answered by Xlythe
maciejkrolik asked this question in Q&A
Discussion options

You must be logged in to vote

The attacks in the paper relied on clients ignoring the authentication tokens provided by Nearby Connections and blindly connecting to devices. To avoid man-in-the-middle attacks, it's important that both sides have an opportunity to verify the token (or to treat all data as unencrypted until the token is confirmed, if you accept first).

It's been a while since I read the paper, so I'll take some time to do a refresher to make sure I didn't miss anything.

Replies: 2 comments

Comment options

You must be logged in to vote
0 replies
Answer selected by bourdakos1
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants
Converted from issue

This discussion was converted from issue #2198 on April 16, 2024 19:39.