Good thing, then, that devising something like this, although possible, is nontrivial.
“But building a system that only opens for the right person or people is a difficult task.”
Singh agreed, noting theres beena lot of research and demonstrationsin the past on relay attacks against Bluetooth authentication.
dowell / Getty Images
d3sign / Getty Images