Classification
This dossier summarizes the cheat definition, the affected OSI layer, and the evidence attached to the record.
Exploiting hardware vulnerabilities in mobile devices such as Bluetooth or related interfaces.
This dossier summarizes the cheat definition, the affected OSI layer, and the evidence attached to the record.
Exploiting hardware vulnerabilities in mobile devices such as Bluetooth or related interfaces.
Layers 1-2 (Physical / Data Link)
Exploiting hardware vulnerabilities in mobile devices such as Bluetooth or related interfaces.
Peer-reviewed and academic literature connected to this cheat, with DOI or URL references attached where available.
John Paul Dunning
IEEE Security & Privacy March/April 2010
Target: Mobile device security threats via Bluetooth that could affect gaming (surveillance, malware, unauthorized access)
Aim: Dunning, J. P. (2010). Taming the blue beast: A survey of Bluetooth-based threats. IEEE Security & Privacy, 8(2), 20-27.
Recommendation: (Dunning, 2010)
No external DOI or URL link is attached yet.
Reviewed white papers and adjacent technical reports approved for this dossier.
Reviewed non-academic sources such as news, forums, archives, or enforcement materials.
Named incidents, documented examples, or sanctions associated with this cheat category.