Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:philosophy:bluetooth [2022/11/18 15:28]
throgh
en:philosophy:bluetooth [2022/11/29 12:54] (current)
throgh [Bluetooth and its problems]
Line 1: Line 1:
 ====== Bluetooth and its problems ====== ====== Bluetooth and its problems ======
  
-Within Hyperbola bluetooth is not included since the release of Milky Way v0.4. As technology standard for short-range wireless connection there are too many risks for stability and security, besides that there are no real community-driven implementations for GNU/Linux available and the support for our own HyperbolaBSD is also not given on a solid base.+Within Hyperbola bluetooth is not included since the release of Milky Way v0.4. As technology standard for short-range wireless connection there are too many risks for stability and security, besides that there are no real community-driven implementations for GNU/Linux available and the support for our own **HyperbolaBSD** is also not given on a solid base.
  
 ===== About Security Risks ===== ===== About Security Risks =====
Line 17: Line 17:
 **The only way to avoid getting scanned is to keep the bluetooth service turned off or remove it in a whole when possible.** **The only way to avoid getting scanned is to keep the bluetooth service turned off or remove it in a whole when possible.**
  
-While many experts recommend the additional tips like identifying the pairing devices to make sure that these are the devices that the users want to connect, regular users can’t realize if the traffic between both devices is being sniffed or spied onto. To be mentioned also attacks called [[https://en.wikipedia.org/wiki/Bluesnarfing#Bluesniping|Bluesniping]], which are launched with special hardware and are not common at all. As to point out that attackers need a relatively close distance to proceed their actions.+While many experts recommend the additional tips like identifying the pairing devices to make sure that these are the devices that the users want to connect, regular users can’t realize if the traffic between both devices is being sniffed or spied onto. To be mentioned also attacks called [[https://en.wikipedia.org/wiki/Bluesnarfing#Bluesniping|Bluesniping]], which are launched with special hardware and are not common at all. As to point out again that attackers need a relatively close distance to proceed their actions.
  
 ===== Attack Types ===== ===== Attack Types =====