Bluejacking Seminar abstract and report.

Introduction to Bluejacking

Bluejacking sends unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.

Bluejacking does not include the exchange of pictures (vCards do not contain photographs), nor does it involve other non-TEXT objects.

The senders will usually remain anonymous because no personal information is sent along with the message.

Bluejacking technique.

Bluejacking sends unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth uses frequency ranges between 2.4 and 2.485 GHz with data rates up to 1 Mbit/s over short distances (about 10 meters), but it can also be used at longer distances if higher frequencies are used; this technology is therefore often referred to as “RFID” for radio frequency identification applications like pet collars or luggage tags.

Bluejacking does not include the exchange of pictures.

Bluejacking is not a form of social media and does not include the exchange of pictures (vCards do not contain pictures), nor does it involve other non-TEXT objects. Bluejacking is a networking tool that allows you to connect with others through your mobile phone. You can use bluejacking as a business card or as an introduction when meeting someone new at work or school. You may even use it in casual situations like waiting for the bus or sitting on the couch watching TV!

The senders will usually remain anonymous

Bluejacking is a form of cyberbullying. It’s not illegal, but it can be used to send out spam or viruses. You’ll never see the sender’s real name or address, so you have no way to verify that they’re who they say they are. If you don’t know who sent your bluejacking message, contact them directly and ask for proof that they’re actually who they claim to be.

Takeaway:

Bluejacking is a form of cyberbullying that’s been around for some time now. It’s illegal in many states, and it can be used to spread viruses or malware. If you’ve ever seen someone bluejack with their phone, you probably think it’s only harmless fun. But if you’re unfamiliar with the term “bluejacking,” here are some things to keep in mind:

  • Bluejacking is a form of cyberbullying
  • Your phone number could be added to anyone else’s contact list by accident—and then they could spam texts/emails anytime they want!
  • People also use bluejacking as an alternative method of spamming people via text messages (which are hard to block on your own).

Conclusion

Bluejacking is a common problem because most people do not know how to stop it. If you are still experiencing issues with bluejacking, try turning your phone off before heading out to avoid these unwanted messages.