By using BLESA, the attacker successfully impersonates the ring, injects spoofed data to the phone, and the companion application of the ring running on the phone accepts and displays the spoofed data
| Founded year: | Not set |
| Funding rounds: | Not set |
| Total funding amount: | Not set |