Security Features Of Bluetooth. Therefore the Bluetooth specification calls for the built-in security to discourage eavesdropping and attempts to falsify the origin of messages which is called spoofing. When unknown gadgets try to connect to a users gadget the user is able to decide whether to allow or deny access. Like BlueSmacking this attack is more of an annoyance than anything else. There are three security modes to a device.
Here are just a few of the new features according to SecurityIntelligence. Bluetooth Security Mode 3. Pairing creating trusted relationships between devices Key Generation Key Exchange Identity Information Exchange Bonding Storing the keys created during pairing for later connections. Different security features can be built into Bluetooth-enabled devices with most having the ability to exchange data with trusted devices without having to ask for permission. Passive eavesdropping is the process by which a third device listens in to the data being exchanged between the two paired devices. For the low energy feature of Bluetooth introduced in Version 40 and updated in 41 and 42 Security Mode 1 Level 4 is the strongest mode because it requires authenticated low energy Secure Connections pairing with Elliptic Curve Diffie-Hellman ECDH based encryptionecurity Mode S.
Bluetooth signals can be easily intercepted as can any other type of wireless signals.
In general Bluetooth configuration is set at Security Level 1 ie. So your BlueJacking attacker would probably be in the same room as you. Bluetooth Security Mode 3. For the low energy feature of Bluetooth introduced in Version 40 and updated in 41 and 42 Security Mode 1 Level 4 is the strongest mode because it requires authenticated low energy Secure Connections pairing with Elliptic Curve Diffie-Hellman ECDH based encryptionecurity Mode S. Passive eavesdropping is the process by which a third device listens in to the data being exchanged between the two paired devices. Or perhaps an attacker could leave a BlueJacking device on the street and target your phone while you walk past it.