Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Last revision Both sides next revision | ||
en:philosophy:bluetooth [2022/11/18 15:28] throgh |
en:philosophy:bluetooth [2022/11/18 15:29] throgh [About Security Risks] |
||
---|---|---|---|
Line 17: | Line 17: | ||
**The only way to avoid getting scanned is to keep the bluetooth service turned off or remove it in a whole when possible.** | **The only way to avoid getting scanned is to keep the bluetooth service turned off or remove it in a whole when possible.** | ||
- | While many experts recommend the additional tips like identifying the pairing devices to make sure that these are the devices that the users want to connect, regular users can’t realize if the traffic between both devices is being sniffed or spied onto. To be mentioned also attacks called [[https:// | + | While many experts recommend the additional tips like identifying the pairing devices to make sure that these are the devices that the users want to connect, regular users can’t realize if the traffic between both devices is being sniffed or spied onto. To be mentioned also attacks called [[https:// |
===== Attack Types ===== | ===== Attack Types ===== |