Most have heard about the not recent hack of Equifax. Now we are being told of multiple BlueTooth vulnerabilities that have been discovered. Page 6 & 7 (http://go.armis.com/hubfs/BlueBorne%20Technical%20White%20Paper.pdf) of this PDF has an explanation that I sort of understand. Here's a YouTube (https://www.youtube.com/watch?v=LLNtZKpL0P8) vid that may be easier to understand but is much more terrifying. :o
While not as well known as some universal laws, my new one is:
The more convenient a technology is, the less secure it is.
[rolleyes2]