This document summarizes a talk on Bluetooth hacking. It discusses extending the range of Bluetooth devices, bypassing security through implementation bugs, and issues with the Bluetooth protocol and specifications. Topics covered include cracking the PIN and link key, key management weaknesses, tracking non-discoverable devices, and exploiting random number generators. Methods for remotely controlling devices, owning internal networks, reconstructing link keys, and forcing pairing reattempts are also outlined.