Bluetooth bugs open the door for attackers to impersonate devices