Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
en:philosophy:bluetooth [2022/11/16 12:35] throgh created |
en:philosophy:bluetooth [2022/11/29 12:54] (current) throgh [Bluetooth and its problems] |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | Stub for more information | + | ====== Bluetooth and its problems ====== |
+ | |||
+ | Within Hyperbola bluetooth is not included since the release of Milky Way v0.4. As technology standard | ||
+ | |||
+ | ===== About Security Risks ===== | ||
+ | |||
+ | There are a variety of attack types which can be launched against bluetooth devices. | ||
+ | |||
+ | Possible attackers can steal the data shared between connected devices. This data can therefore be exploited for mobile spying purposes or for example to steal the authentication data from a bluetooth authenticating device or hardware. This kind of attack is called [[https:// | ||
+ | |||
+ | Other types of attacks can terminate generic the battery (//and therefore also the lifespan of a battery//), disable the device itself or introduce | ||
+ | |||
+ | <note important> | ||
+ | |||
+ | One of the popular tools that the attackers use to find the unsecure traffic or devices to attack is [[https:// | ||
+ | |||
+ | **The only way to avoid getting scanned is to keep the bluetooth service turned off or remove it in a whole when possible.** | ||
+ | |||
+ | While many experts recommend the additional tips like identifying the pairing devices to make sure that these are the devices that the users want to connect, regular users can’t realize if the traffic between both devices is being sniffed or spied onto. To be mentioned also attacks called [[https:// | ||
+ | |||
+ | ===== Attack Types ===== | ||
+ | |||
+ | To be more concrete | ||
+ | |||
+ | **BlueSmacking: | ||
+ | |||
+ | **Bluebugging: | ||
+ | |||
+ | **BlueJacking: | ||
+ | |||
+ | **BlueSnarfing: | ||
+ | |||
+ | **Bluesniping: | ||
+ | |||
+ | **KNOB:** The //**K**ey **N**egotiation **o**f **B**luetooth// | ||
+ | |||
+ | ===== Preventing Security Risks ===== | ||
+ | |||
+ | To prevent all the possible scenarios and security-risks mentioned the further decision for the Hyperbola-project was and is to completely remove all components, including all possible services and applications with also to disable the corresponding interfaces while building the packages. Hyperbola won't receive further support for bluetooth for now or in the upcoming future: Vulnerabilities are periodically discovered and solid security measures were incorporated only in latest versions of the protocol while ignoring older devices and implementations, |