i wanted to see if a developer or someone more knowledgeable than me could verify if this is possible. It would be considered a Trojan Horse attack.
Basically when I pair my car's Bluetooth to my iPhone it starts downloading contacts automatically. I don't have to approve of this aside from pairing my phone.
Is it possible that someone could create a device (we will use a Bluetooth speaker for this example), that a victim connects to via Bluetooth, but the Bluetooth connection also mines the data on their phone sending it to the attacker's device/server via wifi or other connection to be collected.
Basically when I pair my car's Bluetooth to my iPhone it starts downloading contacts automatically. I don't have to approve of this aside from pairing my phone.
Is it possible that someone could create a device (we will use a Bluetooth speaker for this example), that a victim connects to via Bluetooth, but the Bluetooth connection also mines the data on their phone sending it to the attacker's device/server via wifi or other connection to be collected.