Blue Tooth Phones vunerable to hacking

Discussion in 'Current Events' started by Stelliform, Nov 17, 2003.

  1. Stelliform macrumors 68000

    Stelliform

    Joined:
    Oct 21, 2002
    #1
    Interesting read. Basically any savvy passerby can hack a blue tooth phone and extract pictures and addresses.

    Link here
     
  2. Counterfit macrumors G3

    Counterfit

    Joined:
    Aug 20, 2003
    Location:
    sitting on your shoulder
  3. Java macrumors regular

    Joined:
    Jan 13, 2003
    Location:
    Marin County (where else?)
    #3
    I find that funny that people can easily hack my cell phone over my Macintosh.:p
     
  4. patrick0brien macrumors 68040

    patrick0brien

    Joined:
    Oct 24, 2002
    Location:
    The West Loop
    #4
    -All

    It's similar to things that can happen in Windows with many of the common ports being open by default - in this case, all a person needs to do is turn off discoverability.

    Which is a good idea anyway if you like battery time.
     
  5. wdlove macrumors P6

    wdlove

    Joined:
    Oct 20, 2002
    #5
    So this is a time for my wife to be happy that she doesn't have a bluetooth available phone. Just more of an example that any technology can be hacked by a talented person.
     
  6. patrick0brien macrumors 68040

    patrick0brien

    Joined:
    Oct 24, 2002
    Location:
    The West Loop
    #6
    -wdlove

    Well, I wouldn't really call it hacking as this is just using the technology for what it was designed for - too bad it's left in it's "Hi there" state.

    I guess I was doing something like this to people a few months ago with my 12PB.

    I'd set if for discoverability, then let someone us it. I'd take a picture of them with my Nokia 3650, then beam it to them.

    Imagine their surprise when suddenly faced with a pic of themselves.

    But then, BT is designed specifically to do that.
     

Share This Page