I'll take my time for this, but wanna share some (meaningless) curiosities/spec violations I saw on some test devices (kept addresses visible) ...
![](https://pbs.twimg.com/media/ELhpzXaWsAI8ftc.png)
I assume this is true for most devices with IO capabilities "NoInputNoOutput", as it seems to be the only way to make iOS initiate pairing automatically.
![](https://pbs.twimg.com/media/ELhqWJvXkAAN_bc.png)
![](https://pbs.twimg.com/media/ELhq1iEW4AIFQfa.png)
![](https://pbs.twimg.com/media/ELhrRDjXsAASi49.png)
![](https://pbs.twimg.com/media/ELhrtaWWwAAl1pv.png)
Because I have hard times cloning such weird devices, with a firmware backed by @NordicTweets softdevice, which enforces specs in many cases.
I tested none of those devices for security issues, not even a tiny bit of fuzzing. But products not even able to follow specs, occur a bit fishy security wise.
Just thinking loud 😉
Stay safe