Event JSON
{
"id": "44d392a8733dc9aa737b82f074699121348858e8a08c3b6bf10183a9b1789ec4",
"pubkey": "6b40efd81060cdf652224c3c39c959f52c774f6e86bd9dd95df0fb62b9dad5f5",
"created_at": 1694250493,
"kind": 1,
"tags": [
[
"t",
"Bluetooth"
],
[
"t",
"bluetooth"
],
[
"t",
"DoS"
],
[
"t",
"dos"
],
[
"t",
"attack"
],
[
"t",
"attack"
],
[
"t",
"iOS"
],
[
"t",
"ios"
],
[
"t",
"Airplane"
],
[
"t",
"airplane"
],
[
"t",
"FlipperZero"
],
[
"t",
"flipperzero"
],
[
"t",
"cybersecurity"
],
[
"t",
"cybersecurity"
],
[
"t",
"flipperzero"
],
[
"t",
"flipperzero"
],
[
"t",
"hacking"
],
[
"t",
"hacking"
],
[
"t",
"infosec"
],
[
"t",
"infosec"
],
[
"r",
"mobile-hacker.com/2023/09/07/spo…"
]
],
"content": "Now you can do a #Bluetooth #DoS #attack to #iOS devices even in #Airplane mode while on lock-screen using Flipper with the App Apple BLE Spam.\n\nIt is possible due to the latest dev build of Unleashed #FlipperZero firmware version 812 that can spoof these pop-ups.\n\nBlog: mobile-hacker.com/2023/09/07/spo… #cybersecurity #flipperzero #hacking #infosec",
"sig": "f23b655dde08cf8ca50f946ea3d037fa9eeaf3b2fb6df532f8153d165f426081037f770bfdf775a1b7c1ad06b15a5d5c1755bcd52e8b9194358a94705eb9874a"
}