Bluetooth is a telecommunication standard for short range wireless communication between cell phones, tablets, computers, and other mobile electronics. The weak transceivers create a personal area network, which extends only a short distance beyond its user. Most Bluetooth devices operate at 2.45 GHz and are "class 2" rated, meaning a wireless range of 30 feet. Data can be exchanged at a rate of 1 megabit per second. Class 1 Bluetooth is less common, but has an increased range of up to 300 feet.[1]
In general, Bluetooth is used for voice communication (typically through a headset, although now through automobile sound systems),[2] local music broadcast (to speakers or a headset), device control (through a keyboard, mouse, gamepad, or other device), and communication on the Internet through a networked and Bluetooth-enabled device.
Bluetooth is named for the 10th century Viking king Harald Blåtand, who's last name roughly translates as "Harald Bluetooth."[3]He reigned from A.D. 940 to 985, and is known for having united Denmark and Norway and to have brought Christianity to Scandinavia[4]
As a wirelesss technology, security is always a concern for Bluetooth communication. The connections are typically encrypted, and the devices use frequency-hopping spread spectrum technology to jump from one frequency to another making the connection more difficult to listen in on.[5] However, there are some security concerns with Bluetooth technology. It has been found a number of different times to be vulnerable to penetration for various nefarious purposes. An early vulnerability allowed for "bluejacking," which was a method by which unauthorized messages could be sent to users. However, a more modern and concerning set of vulnerabilities is "blueborne," which enables attackers to infiltrate vulnerable devices without the user's knowledge or consent. This attack method was developed by Armis as a proof-of-concept, which has not been released in detail for the security of everyone who uses Bluetooth 5.[6] Mobile device manufacturers quickly got to work finding a way to patch the vulnerability.[7]
The underlying concern with Bluetooth is that to offer the functionality it does, it needs system access on its host device greater than that of even the user.[7] If exploited, it offers a great deal of access into the device's system, and much harm could be done, or information stolen.
Categories: [Technology] [Computers]