Figure 1. BtleJuice vulnerable device selection to the proxy.
All published articles are preserved here permanently: