The concept of connection is always interesting to me. There is a company (Kinsa) that has a connected thermometer. Basically what happens is you take your temperature in your ear, and then answer a question about what or if you are experiencing nay symptoins. IT then notifies you of any illnesses reported near you. A quick way to tell if you are in the early stages of illness going around. That, the concept, got me thinking about the connection. There are a growing number of devices in the connection space. But, space is still immature. What do I mean by Immature>? Well, the connected device doesn’t throw temper tantrums. They don’t scream, yell, and stomp their feet.
They do, however, allow their protocols to be detected. Bluetooth is a great wireless protocol, but it is leaky. It can be hijacked fairly quickly. It is called Bluejacking. If Bluetooth is on and functioning on your phone, your phone can be attacked. Wifi is a little easier to protect, but people don’t always use integrated security when setting up a WiFi network. That is the immaturity of the connections today. One of the future states will be the one to one connection. Today there isn’t a lot of value in one to one Bluetooth. But in the future, you will be able to have one connection at a time for your Bluetooth device, and it will notify you on your phone or laptop if that connection is asked to change.
Basically, what would be created is two-factor authentication for Bluetooth devices. Today, Bluetooth connections are called “pairings” and have a unique ID between the two devices. That can be spoofed or bluejacked. In the future, there will be the ability to add a secondary passcode or second verification of the device and the connection. You can do it today, but it isn’t very mature and causes delays. The problem with security is if the security takes twice as long, people start looking for ways around the security. This could be as simple as your iris scan or thumb print. Even as simple as prompting the facial ID function of your cell phone. It reduces the risk of using multiple Bluetooth devices!
-
Question of
It is important to keep trying right?
-
Yes
-
No
-
-
Question of
Never give up, right?
-
Yes
-
No
-
It seems whenever a new technology is invented, some people find ways of hijacking it for their own selfish reasons.
We will never enjoy technology to its fullest when there are people who are busy finding ways of getting into our phones.
Sometimes you have to see things the way they are,
Q: It is important to keep trying right?
Yes (7 votes) – 100%
Q: Never give up, right?
Yes (6 votes) – 86%
No (1 votes) – 14%
Thanks to Carol DM for the idea of posting positive polls!!!
My DVD I am told is blue tooth oriented. What it is I really do not know (lol)
simply it is a connection, like phones, wifi or anything else. A way for two devices to talk to each other.
Very interesting post. I currently use Bluetooth very rarely. However, it is good to have as much information as possible about this. I never know when I’ll use them.
that is actually a very good way to avoid the issues. Make sure you bluetooth is off!!!!
I really don’t know what bluetooth is but I think these inventions are magnificent.
it is the connection protocol phones use for cars and headsets.
At one time we used a Null modem to connect computers or crossover cables.
Many devices are now on the Internet and it is becoming more difficult to protect them…
i remember null modems and network crossover cables. You are right it is much harder to protect systems now.
I’ve never heard of Bluejacking, my friend….and frankly I don’t even know what all the fuss is about … don’t chop unless I understand
it is a problem in some parts of the world today.
I think it’s more of a problem for me, my friend
i hope not, not knowing about something is simply an opportunity to learn!
I agree and thank you for your support, my friend
of course, we are a community are we not?
I hadn’t heard of Bluejacking before. It will be interesting to see what transpires in the field of security in the future.
it requires sadly, less effort than people realize.
Interesting info Doc. I like the idea of using our thumbprint on our phones.
i think that is one way to reduce the risk of devices going forward.
Interesting information. It’s the first time I read about Bluejacking.
it sadly happens more often than people realize.
It seems that technology has gone too far as for us to be dependent on it.
i wouldn’t say too far. I would say there are many possibilities that we didn’t have before.