It's true that there has been some Bluetooth phones



that have been hacked into. Most devices that are



hacked into are normally those that don't have any



type of security at all.





According to Bluetooth specialists, in order to hack



into a Bluetooth device, the hacker must:



1. Force two paired devices to break their



connection.



2. Steal the packets that are used to



resend the pin.



3. Decode the pin.





Of course, the hacker must also be within range of



the device, and using very expensive developer type



equipment. Most specialists recommend that you



have a longer pin, with 8 digits being recommended.





Fundamentals of security



The "pairing process" is one of the most basic levels



of security for Bluetooth devices. Pairing, is



two or more Bluetooth devices that recognize each



other by the profiles they share - in most cases



they both must enter the same pin.





The core specifications for Bluetooth use an



encryption algorithm, which is completely and entirely



secure. Once the devices pair with each other,



they too become entirely secure.





Until they have successfully paired, the Bluetooth



devices won't communicate with each other. Due to



this pairing process and the fact that it is short



range - Bluetooth technology is considered to be



secure.





As the news has indicated, experienced hackers



have developed ways to get around this level of



basic security. There are ways to get around this



threat, as you can install software to prevent



hackers from getting in.





With Bluetooth becoming more and more popular, it's



really no wonder that security is always in



question. As Bluetooth gets bigger and better,



security will always be something that no one



really takes lightly.





If you've been concerned about Bluetooth security



in the past, rest assured that newer devices will



offer bigger and better security. Preventing



hackers from getting in is something every owner



is concerned about - and the manufacturer's are

No comments:

Post a Comment