It's true that there has been some Bluetooth phones
that have been hacked into. Most devices that are
hacked into are normally those that don't have any
type of security at all.
According to Bluetooth specialists, in order to hack
into a Bluetooth device, the hacker must:
1. Force two paired devices to break their
connection.
2. Steal the packets that are used to
resend the pin.
3. Decode the pin.
Of course, the hacker must also be within range of
the device, and using very expensive developer type
equipment. Most specialists recommend that you
have a longer pin, with 8 digits being recommended.
Fundamentals of security
The "pairing process" is one of the most basic levels
of security for Bluetooth devices. Pairing, is
two or more Bluetooth devices that recognize each
other by the profiles they share - in most cases
they both must enter the same pin.
The core specifications for Bluetooth use an
encryption algorithm, which is completely and entirely
secure. Once the devices pair with each other,
they too become entirely secure.
Until they have successfully paired, the Bluetooth
devices won't communicate with each other. Due to
this pairing process and the fact that it is short
range - Bluetooth technology is considered to be
secure.
As the news has indicated, experienced hackers
have developed ways to get around this level of
basic security. There are ways to get around this
threat, as you can install software to prevent
hackers from getting in.
With Bluetooth becoming more and more popular, it's
really no wonder that security is always in
question. As Bluetooth gets bigger and better,
security will always be something that no one
really takes lightly.
If you've been concerned about Bluetooth security
in the past, rest assured that newer devices will
offer bigger and better security. Preventing
hackers from getting in is something every owner
is concerned about - and the manufacturer's are
No comments:
Post a Comment