Articles Stealing Bluetooth Link Keys by admin • June 15, 2006 • 0 Comments Features: This document describes that there are 2 items required to attack a bluetooth pair The ability to spoof a BD_ADDR and possession of a secret key also known as a Link Key This document discusses the possibilities of obtaining such keys.