1. 5
  1.  

  2. 2

    I can’t help but feel this is written to sound a lot worse than it is, from what I can tell the user has to go into their bluetooth settings and tap the attacking device to connect initially. Obviously something being able to “upgrade” it’s access and slurp contacts from the phone isn’t great, but it does require user interaction at first so it’s not quite “walk down the street and be bluejacked” territory.