When creating mobile identity applications, there are a number of technologies available that can be used for securely handling the data transmission process between the holder’s device and the verifying device. Despite industry confidence in the use of Bluetooth for this process, doubts remain in some quarters about the security of the technology. This white paper examines the threats and the mitigating actions that can be taken to reduce any risks presented by Bluetooth technology and render it safe for use in the verification of mobile identities.

See the attachment to read more. 

This white paper is credited to HID