An attacker who uses Bluetooth to copy e-mails, contact list… Questions An аttаcker whо uses Bluetооth to copy e-mаils, contact lists, or other files on a device is __________. Show Answer Hide Answer Skip back to main navigation