Author |
Bluetooth Security Vulnerabilities Discovered |
Jools Joined: May 21, 2003 Posts: > 500 PM |
I've just been forwarded this and wondered what people here thought:
http://www.bluestumbler.org/
It starts with:
"There are serious flaws in the authentication and/or data transfer mechanisms on some bluetooth enabled devices. Specifically, two vulnerabilities have been found:
Firstly, confidential data can be obtained, anonymously, and without the owner's knowledge or consent, from some bluetooth enabled mobile phones. This data includes, at least, the entire phonebook and calendar.
Secondly, it has been found that the complete memory contents of some mobile phones can be accessed by a previously trusted ("paired") device that has since been removed from the trusted list. This data includes not only the phonebook and calendar, but media files such as pictures and text messages. In essence, the entire device can be "backed up" to an attacker's own system."
Read on at http://www.bluestumbler.org/
Its plain text so should be ok for WAP viewers.
|
|
masseur Joined: Jan 03, 2003 Posts: > 500 From: Sydney, London PM |
Sounds pretty much like the situation with WiFi too. Even with the latest proposals to WiFi security many serious flaws have been found.
|
Scally_cadet Joined: Oct 02, 2003 Posts: 361 PM |
Has anyone tried this?
This message was posted from a Nokia |
all8 Joined: Feb 28, 2002 Posts: 372 From: Malaysia PM |
Nothing new, read this garbage thread written by "Wings_Talons"
http://www.esato.com/board/viewtopic.php?topic=4795&forum=20&start=0
and the original artiticle written in 2000-5-25,
http://www.niksula.cs.hut.fi/~jiitv/bluesec.html |
Jools Joined: May 21, 2003 Posts: > 500 PM |
Now the BBC have got hold of this story...
http://news.bbc.co.uk/1/hi/technology/3276315.stm |
ESTOR Joined: Apr 20, 2002 Posts: > 500 From: Singapore PM |
Quote:
|
On 2003-11-12 10:51:29, masseur wrote:
Sounds pretty much like the situation with WiFi too. Even with the latest proposals to WiFi security many serious flaws have been found.
|
|
Similar in nature but much more serious in terms of ease of breaching the security barrier with BT. |
|