Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
en:philosophy:bluetooth [2022/11/17 18:58] throgh [Bluetooth Attack Types] |
en:philosophy:bluetooth [2022/11/29 12:54] (current) throgh [Bluetooth and its problems] |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Bluetooth and its problems ====== | ====== Bluetooth and its problems ====== | ||
- | Within Hyperbola | + | Within Hyperbola |
- | ===== About Bluetooth | + | ===== About Security Risks ===== |
There are a variety of attack types which can be launched against bluetooth devices. | There are a variety of attack types which can be launched against bluetooth devices. | ||
- | Attackers | + | Possible attackers |
- | Other types of attacks can terminate | + | Other types of attacks can terminate |
- | <note important> | + | <note important> |
- | One of the most popular tools that the hackers | + | One of the popular tools that the attackers |
- | The only way for potential victims | + | **The only way to avoid getting scanned is to keep the bluetooth service turned off or remove it in a whole when possible.** |
- | While many experts recommend the additional tips like identifying the pairing devices to make sure that these are the devices that the users want to connect, regular users can’t realize if the traffic between both devices is being sniffed | + | While many experts recommend the additional tips like identifying the pairing devices to make sure that these are the devices that the users want to connect, regular users can’t realize if the traffic between both devices is being sniffed |
- | + | ||
- | The second important security measure if the user must enable the bluetooth service is to make sure that the connectivity takes place in a solitary environment, | + | |
===== Attack Types ===== | ===== Attack Types ===== | ||
- | ===== Preventing | + | To be more concrete of the characteristics of each attack and to understand the real danger that users are exposed to, we are including now a listing of possible attack-types and their individual overall description. |
+ | |||
+ | **BlueSmacking: | ||
+ | |||
+ | **Bluebugging: | ||
+ | |||
+ | **BlueJacking: | ||
+ | |||
+ | **BlueSnarfing: | ||
+ | |||
+ | **Bluesniping: | ||
+ | |||
+ | **KNOB:** The //**K**ey **N**egotiation **o**f **B**luetooth// | ||
+ | |||
+ | ===== Preventing Security Risks ===== | ||
- | To prevent all the possible scenarios and security-risks mentioned the further decision for the Hyperbola-project was and is to completely remove all components, including all possible services and applications with also to disable the corresponding interfaces while building the packages. Hyperbola won't receive further support for Bluetooth | + | To prevent all the possible scenarios and security-risks mentioned the further decision for the Hyperbola-project was and is to completely remove all components, including all possible services and applications with also to disable the corresponding interfaces while building the packages. Hyperbola won't receive further support for bluetooth |