You cannot connect to the bluetooth MAC addresses. I think you assumed something here...
That exactly how BLE devices work.
They run kismet. Kismet is only for linux. They don't have special hardware BLE sniffers like Ubertooth or nRF24 based one to sniff on established connections. So they have a list of BLE adresses retirned by linux HCI. This list contains addresses of devices you could connect to. If you see address in that list - you could connect to it.
Say, you use bluetoothctl (basic linux BT utility, you have it out of the box on any popular linux distribution).
you do
[bluetooth]# scan on
[bluetooth]# menu scan
[bluetooth]# clear
[bluetooth]# transport le
[bluetooth]# back
then you get list of BLE devices around. Same what kismet will show.
[NEW] Device <BTADDR>
Then you coudl do with <BTADDR> in form of 00:11:22:33:44:55
[bluetooth]# pair <BTADDR>
[bluetooth]# menu gatt
[bluetooth]# list-attributes <BTADDR>
You will get a list of attributes BLE device expose and some additional info like device class, name and so on.
somehting like that:
Device <BTADDR> (public)
Name: <somename>
Alias: <somealias>
Paired: yes
Trusted: yes
Blocked: no
Connected: yes
LegacyPairing: no
UUID: Generic Access Profile (00001800-0000-1000-8000-00805f9b34fb)
UUID: Generic Attribute Profile (00001801-0000-1000-8000-00805f9b34fb)
UUID: Device Information (0000180a-0000-1000-8000-00805f9b34fb)
UUID: Battery Service (0000180f-0000-1000-8000-00805f9b34fb)
UUID: Human Interface Device (00001812-0000-1000-8000-00805f9b34fb)
UUID: Vendor specific (3dda0001-957f-7d4a-34a6-74696673696d)
Then you could read and even write some attributes. Every attribute have UUID, most UUIDs are predefined and you could find how to read and interpret them.
And so on.
It gives you the general message that you cannot connect to the device.
You can't connect to regular Bluetooth device if it is already connected or paired. BLE devices are different. In the list they show you could be only devices that ready for connection. Because to find BLE devices that already connected you need special hardware they clearly don't have.
Why don't you try it in a crowded place to confirm it instead of just theorizing?
I did. And it's exactly how BLE work.
"Why can't a doctor understand bluetooth like a 10-year-old kid?" Perhaps because they don't have the experience in this field.
Well, they somehow installed and get kismet working. It is a sophisticated tool, mostly for hackers, and they have enough expirience to use it. But somehow they don't have a clue what BLE is, what they see in kismet and how to connect and get info from BLE devices.
You can't do that properly with phone. Nor iPhone, nor android have corresponding BT tools to do that. But you could properly do it with linux PC.
I just dumped you evidence with my BLE mini-keyboard. For obvious reasons I hide only BT address, name and alias.
I don't have any other BLE devices around.
You could also easily find linux BLE howto's and check it by yourself. Basically you don't need to install and tune kismet, you could use bluetoothctl of hcitool+gatttool
If you see BLE address in scan results you could connect to it.
I could not imagine anything more real than exact instructions of how you yourself without any third-party could check everything displayed and find out much more than that clowns in your video,
You just want others to believe your words without any proof.
On the contrary, I insist on checking absolutely everything I say.
In internet realm any text, audio and video could be fake. So, I do not account any of that as a proof at all. In the best case it could be just a hint to take a closer look. Instead I constantly trying to provide description about how any person could check my statements by himself. Because it is the only guaranteed way any person could find the truth - check everything by himself.
I don't think giving a fish is a correct way to feed somebody. I'll better teach somebody how to catch a fish.
What exactly stops you from booting linux on your notebook, reading some basic howtos and typing few simple commands in a console? You don't have notebook/PC? Or you can't use keyboard? You afraid of console commands?
And meanwhile, you have to know that I would have a huge problem finding any test subject jabbed with mRNA not-a-vaccine here. It was not allowed in Russia, here we had vector not-a-vaccine with completely different side-effects and nearly zero casualities. And none of those poor fools who take it get any unknown BT addresses. So, if you want truth - dig it by yourself. I already provided all necessary info on how you could do it with minimum efforts. If you don't want any truth - continue to poison yourself with videos made either by some swindlers, either by idiots. You choose.
That exactly how BLE devices work.
They run kismet. Kismet is only for linux. They don't have special hardware BLE sniffers like Ubertooth or nRF24 based one to sniff on established connections. So they have a list of BLE adresses retirned by linux HCI. This list contains addresses of devices you could connect to. If you see address in that list - you could connect to it.
Say, you use bluetoothctl (basic linux BT utility, you have it out of the box on any popular linux distribution).
you do
then you get list of BLE devices around. Same what kismet will show.
Then you coudl do with <BTADDR> in form of 00:11:22:33:44:55
You will get a list of attributes BLE device expose and some additional info like device class, name and so on.
somehting like that:
Then you could read and even write some attributes. Every attribute have UUID, most UUIDs are predefined and you could find how to read and interpret them.
And so on.
You can't connect to regular Bluetooth device if it is already connected or paired. BLE devices are different. In the list they show you could be only devices that ready for connection. Because to find BLE devices that already connected you need special hardware they clearly don't have.
I did. And it's exactly how BLE work.
Well, they somehow installed and get kismet working. It is a sophisticated tool, mostly for hackers, and they have enough expirience to use it. But somehow they don't have a clue what BLE is, what they see in kismet and how to connect and get info from BLE devices.
It's impossible.
Why don't you prove that with a test?
I understand that you write a lot, but can't you just prove that as the documentary proves that?
You have a phone and bluetooth, right? Where is your evidence?
You can't do that properly with phone. Nor iPhone, nor android have corresponding BT tools to do that. But you could properly do it with linux PC.
I just dumped you evidence with my BLE mini-keyboard. For obvious reasons I hide only BT address, name and alias. I don't have any other BLE devices around.
You could also easily find linux BLE howto's and check it by yourself. Basically you don't need to install and tune kismet, you could use bluetoothctl of hcitool+gatttool
If you see BLE address in scan results you could connect to it.
So no real evidence, just more text?
I provided a documentary, another person's test, another documentary.
You just want others to believe your words without any proof. You and I are not the same.
What exactly do you mean under "real evidence"?
I could not imagine anything more real than exact instructions of how you yourself without any third-party could check everything displayed and find out much more than that clowns in your video,
On the contrary, I insist on checking absolutely everything I say.
In internet realm any text, audio and video could be fake. So, I do not account any of that as a proof at all. In the best case it could be just a hint to take a closer look. Instead I constantly trying to provide description about how any person could check my statements by himself. Because it is the only guaranteed way any person could find the truth - check everything by himself.
I don't think giving a fish is a correct way to feed somebody. I'll better teach somebody how to catch a fish.
What exactly stops you from booting linux on your notebook, reading some basic howtos and typing few simple commands in a console? You don't have notebook/PC? Or you can't use keyboard? You afraid of console commands?
And meanwhile, you have to know that I would have a huge problem finding any test subject jabbed with mRNA not-a-vaccine here. It was not allowed in Russia, here we had vector not-a-vaccine with completely different side-effects and nearly zero casualities. And none of those poor fools who take it get any unknown BT addresses. So, if you want truth - dig it by yourself. I already provided all necessary info on how you could do it with minimum efforts. If you don't want any truth - continue to poison yourself with videos made either by some swindlers, either by idiots. You choose.