http://news4hackers.com/2019/03/22/which-of-the-following-bluetooth-hacking-techniques-does-an-attacker-use-to-send-messages-to-users-without-the-recipients-consent-similar-to-email-spamming/