blog.nordicsemi.com/getconnected/privacy-and-bluetooth-mesh

Preview meta tags from the blog.nordicsemi.com website.

Linked Hostnames

10

Thumbnail

Search Engine Appearance

Google

https://blog.nordicsemi.com/getconnected/privacy-and-bluetooth-mesh

Privacy and Bluetooth Mesh

By encrypting destination addresses and obfuscating the source addresses, Bluetooth mesh is different. By capturing the data transmission of a Bluetooth mesh network, all you learn is that there is a network.



Bing

Privacy and Bluetooth Mesh

https://blog.nordicsemi.com/getconnected/privacy-and-bluetooth-mesh

By encrypting destination addresses and obfuscating the source addresses, Bluetooth mesh is different. By capturing the data transmission of a Bluetooth mesh network, all you learn is that there is a network.



DuckDuckGo

https://blog.nordicsemi.com/getconnected/privacy-and-bluetooth-mesh

Privacy and Bluetooth Mesh

By encrypting destination addresses and obfuscating the source addresses, Bluetooth mesh is different. By capturing the data transmission of a Bluetooth mesh network, all you learn is that there is a network.

  • General Meta Tags

    8
    • title
      Privacy and Bluetooth Mesh
    • charset
      utf-8
    • description
      By encrypting destination addresses and obfuscating the source addresses, Bluetooth mesh is different. By capturing the data transmission of a Bluetooth mesh network, all you learn is that there is a network.
    • viewport
      width=device-width, initial-scale=1
    • google-site-verification
      QBsAcD79clYmYqjWt3tsA1pq07orFp11k6V8JRNHAbY
  • Open Graph Meta Tags

    8
    • og:description
      By encrypting destination addresses and obfuscating the source addresses, Bluetooth mesh is different. By capturing the data transmission of a Bluetooth mesh network, all you learn is that there is a network.
    • og:title
      Privacy and Bluetooth Mesh
    • og:image
      https://blog.nordicsemi.com/hubfs/privacy-for-bluetooth-mesh.jpg
    • og:image:width
      860
    • og:image:height
      565
  • Twitter Meta Tags

    7
    • twitter:description
      By encrypting destination addresses and obfuscating the source addresses, Bluetooth mesh is different. By capturing the data transmission of a Bluetooth mesh network, all you learn is that there is a network.
    • twitter:title
      Privacy and Bluetooth Mesh
    • twitter:image
      https://blog.nordicsemi.com/hubfs/privacy-for-bluetooth-mesh.jpg
    • twitter:image:alt
      privacy-for-bluetooth-mesh
    • twitter:card
      summary_large_image
  • Link Tags

    8
    • alternate
      https://blog.nordicsemi.com/getconnected/rss.xml
    • amphtml
      https://blog.nordicsemi.com/getconnected/privacy-and-bluetooth-mesh?hs_amp=true
    • canonical
      https://blog.nordicsemi.com/getconnected/privacy-and-bluetooth-mesh
    • shortcut icon
      https://blog.nordicsemi.com/hubfs/Nordic-favicon.png
    • stylesheet

Links

19