again, its diminishing the security features of the different forms of communication. one (likely) requires connecting to a secondary powered device, likely with a 10 key minimum password length of various characters or a series of login prompts. the other is a protocol which connects either by pairing or a 4 digit pin... just because security exploits exists for all connections doesnt mean all communication standards have equivalent security risk.
again, its diminishing the security features of the different forms of communication. one (likely) requires connecting to a secondary powered device, likely with a 10 key minimum password length of various characters or a series of login prompts. the other is a protocol which connects either by pairing or a 4 digit pin... just because security exploits exists for all connections doesnt mean all communication standards have equivalent security risk.