I personally am not too clear. Some useful explanations are that one of the two methods is a safe connection and the other is an insecure connection. For example: Bluetooth headsets are unsafe devices, and of course there are others. There is also a saying that unsafe methods can be used for pairing without using a key. In fact, it may be better for the subject to pass the test on available equipment.
I have never actually used these two methods. I can only understand the difference from the method names as mentioned above. Insecure is unsafe and unstable. The purpose of the two methods should be the same, both are monitoring. Bluetooth service socket connection. It can also be understood from the general situation that safe and stable methods often bring more performance losses.
I personally am not too clear. Some useful explanations are that one of the two methods is a safe connection and the other is an insecure connection.
For example: Bluetooth headsets are unsafe devices, and of course there are others.
There is also a saying that unsafe methods can be used for pairing without using a key. In fact, it may be better for the subject to pass the test on available equipment.
I have never actually used these two methods. I can only understand the difference from the method names as mentioned above. Insecure is unsafe and unstable. The purpose of the two methods should be the same, both are monitoring. Bluetooth service socket connection. It can also be understood from the general situation that safe and stable methods often bring more performance losses.