home.social

#whisperpair — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #whisperpair, aggregated by home.social.

  1. The paper on the security analysis of Google Fast Pair has been accepted at IEEE S&P (Oakland) 2026. It presents the first in-the-wild security analysis of Fast Pair and uncovers systemic ecosystem-wide failures.

    #whisperpair #google #fastpair #bluetooth

    whisperpair.eu/

  2. Массовая слежка по Bluetooth

    Радиосигнал Bluetooth принимается только на близком расстоянии. Однако он не такой безопасный, как принято считать. На самом деле многие Bluetooth-устройства делают человека уязвимым для слежки. Недавно открытые уязвимости позволяют злоумышленнику выполнить скрытное сопряжение, а затем отслеживать местоположение устройства через интернет, а также использовать его как удалённый микрофон для дистанционного прослушивания. Более того, даже обычное пассивное сканирование окружающей среды — сбор «цифровых крошек» на протяжении недель — раскрывает массу приватных деталей о соседях.

    habr.com/ru/companies/globalsi

    #Bluetooth #утечка_информации #Bluehood #уязвимость #WhisperPair #Google_Fast_Pair #Find_Hub #слежка #BLE

  3. Ars Technica: Many Bluetooth devices with Google Fast Pair vulnerable to “WhisperPair” hack. “A team of security researchers from Belgium’s KU Leuven University has revealed a vulnerability dubbed WhisperPair that allows an attacker to hijack Fast Pair-enabled devices to spy on the owner.”

    https://rbfirehose.com/2026/01/19/ars-technica-many-bluetooth-devices-with-google-fast-pair-vulnerable-to-whisperpair-hack/
  4. Ars Technica: Many Bluetooth devices with Google Fast Pair vulnerable to “WhisperPair” hack. “A team of security researchers from Belgium’s KU Leuven University has revealed a vulnerability dubbed WhisperPair that allows an attacker to hijack Fast Pair-enabled devices to spy on the owner.”

    https://rbfirehose.com/2026/01/19/ars-technica-many-bluetooth-devices-with-google-fast-pair-vulnerable-to-whisperpair-hack/
  5. Ars Technica: Many Bluetooth devices with Google Fast Pair vulnerable to “WhisperPair” hack. “A team of security researchers from Belgium’s KU Leuven University has revealed a vulnerability dubbed WhisperPair that allows an attacker to hijack Fast Pair-enabled devices to spy on the owner.”

    https://rbfirehose.com/2026/01/19/ars-technica-many-bluetooth-devices-with-google-fast-pair-vulnerable-to-whisperpair-hack/
  6. Ars Technica: Many Bluetooth devices with Google Fast Pair vulnerable to “WhisperPair” hack. “A team of security researchers from Belgium’s KU Leuven University has revealed a vulnerability dubbed WhisperPair that allows an attacker to hijack Fast Pair-enabled devices to spy on the owner.”

    https://rbfirehose.com/2026/01/19/ars-technica-many-bluetooth-devices-with-google-fast-pair-vulnerable-to-whisperpair-hack/
  7. Decine di produttori hanno implementato male Google Fast Pair.

    La vulnerabilità WhisperPair consente il controllo remoto degli auricolari entro 15 metri.

    Colpiti Sony, Xiaomi, Nothing e lo stesso Google.

    🔒📱

    #cybersecurity #fastpair #whisperpair

    youtube.com/watch?v=-j45ShJINtc

  8. WhisperPair : une faille de Fast Pair permet de détourner des casques et écouteurs, même sur iPhone dlvr.it/TQNn2l #WhisperPair #FastPair

  9. Yesterday on Belgian Radio Joe FM, Prof. Preneel explained how COSIC can hijack Bluetooth devices via Google’s Fast Pair! 🎧
    Watch the full demo: youtube.com/watch?v=-j45ShJINtc
    #COSIC #KULeuven #WhisperPair #Google #FastPair #Bluetooth

  10. Critical flaw lets hackers track, eavesdrop via Bluetooth audio devices:
    Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking
    Flaws in how 17 models of #headphones and #speakers use #Google’s one-tap #FastPair #Bluetooth protocol have left devices open to eavesdroppers and stalkers.
    wired.com/story/google-fast-pa
    archive.ph/pWKtT

    #WhisperPair Affects: #Sony, #Jabra, #JBL, #Marshall, #Xiaomi, #Nothing, #OnePlus, #Soundcore, #Logitech, and Google itself.

  11. Lilbits: WhisperPair can hijack your Google Fast Pair audio devices, Raspberry Pi’s new AI Hat+ 2 is here (but you probably don’t need it), and more

    Google’s Fast Pair service makes it easy to quickly connect Bluetooth headphones, speakers, mice, and keyboards in just a few simple steps. But a recently discovered vulnerability makes it possible for someone to use Fast Pair to hijack your devices.

    A group of security researchers in Belgium describe how an attack they call WhisperPair could let someone listen to audio from your earbuds or […]

    #ai #dimensity8500 #dimensity9500s #ecs #ecsLiva #ecsLivaZ4 #ecsLivaZ4f #ecsLivaZ6Plus #fastPair #google #lilbits #mediatek #mishaalRahman #raspberryPi #raspberryPiAiHatPlus2 #vulnerability #whisperpair Read more: liliputing.com/lilbits-whisper
  12. Tonight at 19h on Belgian TV (#VTM NIEUWS), COSIC’s research shows how attackers can silently take over #Bluetooth earbuds - listening in or tracking users.
    Watch a teaser from the 13h news (from 28:00): vtmgo.be/vtmgo/afspelen/39abc2
    #cosic #kuleuven #WhisperPair #google #fastpair