Major Flaw with Blue Tooth phones
http://www.wired.com/news/privacy/0,1848,64463,00.ht ... »
The actual artical has pictures of the BT Rifle that is refferenced, its pretty weird looking.
But here it is:
Serious flaws discovered in Bluetooth technology used in mobile phones can let an attacker remotely download contact information from victims' address books, read their calendar appointments or peruse text messages on their phones to conduct corporate espionage.
An attacker could even plant phony text messages in a phone's memory, or turn the phone sitting in a victim's pocket or on a restaurant table top into a listening device to pick up private conversations in the phone's vicinity. Most types of attacks could be conducted without leaving a trace.
Security p...
(continues)
So I guess you don't use MS Windows products because they are always having security issues, and I guess you will not use broadband because it's always on and OMG people can intercept your cell phone conversations so I guess you better quit talking on your phone too? Does anyone now days take responsibility for their own lives? Do you want to run & hide because the sky is falling chicken little? As the song says... "Get over it!"
WynneFox said:
Geeze, I don't know what the heck I was thinking letting the public know who may wish to be careful of such things. I'm so silly, forgive me for this.
You monsters, you see what you've done! đŋ
oh, and as for being able to make phone calls through the BT in someone elses phone, I just see a new generation of short ranged phone cloning starting đ I wonder if you can grab ESNs and other things from the phone that IDs it.
My question is this. The article you posted (great job by the way) mentioned that the guys who discovered this are further developing the software into a phone app.. Now it's one thing if your everday hacker develops it. But to continue to further develop this so that it can go on a phone instead of a laptop. This is promoting rather than stifling the problem. I'm sure that even with the tightest lockdown, someone in the general pub...
(continues)
Anyone Read the report going around a while back that the FBI was found listening to conversations that were happening in Cars installed with OnStar with out the people int he cars ever knowing?
Btw, good jab.
disturbed1 said:
My question is this. The article you posted (great job by the way) mentioned that the guys who discovered this are further developing the software into a phone app.. Now it's one thing if your everday hacker develops it. But to continue to further develop this so that it can go on a phone instead of a laptop. This is promoting rather than stifling the problem. I'm sure that even with the tightest lockdown, someone in the general public can/will get this, then anyone can use someone else's BT phone to make a free call....well free to them anyway.
Okay, I take issue with this, as no matter how hard anyone tries, it is impossible to put the genie BACK into the bottle once it's out. If...
(continues)
I say exploit and explore all the possible ways to make a system crash, it just makes the end product more bulletproof. Bluetooth is fairly new and not terribly well understood (as are most WiFi type applications) and the sooner people get it through their heads that wireless = NOT TERRIBLY SECURE and take appropriate measures the better...
No kidding, I tried running a 802.11 network in my apartment so I can use my laptop around my place up until I found my neighbor was using his own to get into mine and stealing my bandwidth as well as had access to my various folders and actually went through them according to the log. Everything is wired for me now.
Dyingunman said:
yes đ
ugh.... can you belevie this guy?!
THIS INSN'T SLASHDOT PEOPLE! đŋ
Dyingunman said:
Like I said a few days back, I got a buddy who can tap into wireless routers, from across the street of your house, on something that looks no more suspicious than a PDA. and he does things much worse than looking at your files.... đ¤Ŗ
thats not saying much, I can use my neighbors wireless router if the WEP is disabled just by looking at my available networks and choosing his....big deal
I'd like to see your friend break my 256bit encryption on my network, Im thinking I'd notice a guy standing within 150 feet of my house for an hour or two with a PDA in his hand đ
chris_lt1 said:Dyingunman said:
Like I said a few days back, I got a buddy who can tap into wireless routers, from across the street of your house, on something that looks no more suspicious than a PDA. and he does things much worse than looking at your files.... đ¤Ŗ
thats not saying much, I can use my neighbors wireless router if the WEP is disabled just by looking at my available networks and choosing his....big deal
I'd like to see your friend break my 256bit encryption on my network, Im thinking I'd notice a guy standing within 150 feet of my house for an hour or two with a PDA in his hand đ
Yeah, but would you notice an anonymous looking vehicle parked ...
(continues)
Aleq said:...chris_lt1 said:Dyingunman said:
Like I said a few days back, I got a buddy who can tap into wireless routers, from across the street of your house, on something that looks no more suspicious than a PDA. and he does things much worse than looking at your files.... đ¤Ŗ
thats not saying much, I can use my neighbors wireless router if the WEP is disabled just by looking at my available networks and choosing his....big deal
I'd like to see your friend break my 256bit encryption on my network, Im thinking I'd notice a guy standing within 150 feet of my house for an hour or two with a PDA in his hand đ
Yeah, but would you notice an an
(continues)
as for my phone, Digital service is much more secure then the analog service ever was and the probably that someone has the decrypting codes or the money for the computer to apply them is almost nill.
The problem I see here with the BT is that it circumvents these precautions and lets an attacker in. If there was extra security that I can run on it, then great! its once again a viable choice. For now it isn't. Though they do report (now that I actually read the article, I will...
(continues)
bottom line
ALL DIGITAL ELECTRONICS ARE HACKABLE(so to speak)!
as for the mouse I use at work, it is wireless, but not bluetooth. says on the box 900mhz. Its old đ