{"height":"190","url":"https://vul.hatenadiary.com/entry/2017/09/13/000000_2","author_name":"tanigawa","author_url":"https://blog.hatena.ne.jp/tanigawa/","image_url":null,"provider_name":"Hatena Blog","width":"100%","title":"\u65b0\u305f\u306b\u767a\u898b\u3055\u308c\u305fBluetooth\u306e\u8106\u5f31\u6027\u306f\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u309210\u79d2\u3067\u4e57\u3063\u53d6\u3089\u308c\u308b","blog_url":"https://vul.hatenadiary.com/","categories":["\u6280\u8853: Bluetooth"],"type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fvul.hatenadiary.com%2Fentry%2F2017%2F09%2F13%2F000000_2\" title=\"\u65b0\u305f\u306b\u767a\u898b\u3055\u308c\u305fBluetooth\u306e\u8106\u5f31\u6027\u306f\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u309210\u79d2\u3067\u4e57\u3063\u53d6\u3089\u308c\u308b - TT \u8106\u5f31\u6027 Blog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_url":"https://hatena.blog","version":"1.0","published":"2017-09-13 00:00:00","description":"\u3010\u30cb\u30e5\u30fc\u30b9\u3011 \u25c6\u65b0\u305f\u306b\u767a\u898b\u3055\u308c\u305fBluetooth\u306e\u8106\u5f31\u6027\u306f\u30b9\u30de\u30fc\u30c8\u30d5\u30a9\u30f3\u309210\u79d2\u3067\u4e57\u3063\u53d6\u3089\u308c\u308b (TechCrunch, 2017/09/13) http://jp.techcrunch.com/2017/09/13/20170912new-bluetooth-vulnerability-can-hack-a-phone-in-ten-seconds/","blog_title":"TT \u8106\u5f31\u6027 Blog"}