Do you have a stalker ex who wants to make your life miserable? Then I have bad news. A critical flaw in Google's Fast Pair protocol can allow nefarious actors to track your movements and eavesdrop on your conversations. Security researchers at Belgium’s KU Leuven University have the details.
The team found seventeen audio devices sold by ten different companies that are vulnerable to an attack. Hundreds of millions of people are vulnerable, even those who've never owned a Google device. In their tests, the team connected to vulnerable devices within Bluetooth range, then controlled audio, eavesdropped on a conversation, played music, and tracked the victim using Find Hub.
The researchers discovered the flaw in August and notified Google, which alerted all manufacturers. Fixes are available from the OEM. But here's the thing: These are devices. The patch must be installed in the firmware. That requires downloading an installer app to a phone or laptop, then using the app to update the device's firmware. Given the total number of digital clocks blinking "12:00," this flaw will be with us for years to come.
The following devices are listed as vulnerable on the Whisper Pair site:
| Sony | WH-1000XM6 | Patch installer |
| Sony | WH-1000XM5 | Patch installer |
| Sony | WH-CH720N | Patch installer |
| Sony | WF-1000XM5 | Patch installer |
| Sony | WH-1000XM4 | Patch installer |
| Pixel Buds Pro 2 | Update instructions | |
| OnePlus | Nord Buds 3 Pro | Update instructions |
| NOTHING | Nothing Ear (a) | Patch installer |
| Harman | JBL TUNE BEAM | Patch installer |
| Xiaomi | Redmi Buds 5 Pro | Update instructions |
| Marshall | MOTIF II A.N.C. | Update instructions |
| Anker | soundcore Liberty 4 NC | Windows | Phone app |
| Jabra | Elite 8 Active | Patch installer |