2

I have a peripheral that I'd like to protect against access by unwanted centrals. I haven't found a method that allows me to analyze a central before the central can subscribe.

Is there a method that does this?

johnnietheblack
  • 13,050
  • 28
  • 95
  • 133

0 Answers0