Bluejacking Seminar abstract and report.

Introduction to Bluejacking

Bluejacking sends unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard, which typically contains a message in the name field (i.e., for blue dating or blue chat) to another Bluetooth-enabled device via the OBEX protocol.

Bluejacking does not include the exchange of pictures (vCards do not contain photographs) or other non-TEXT objects.

The senders will usually remain anonymous because no personal information is sent along with the message.

Bluejacking technique.

Bluejacking sends unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for blue dating or blue chat) to another Bluetooth-enabled device via the OBEX protocol. Bluetooth uses frequency ranges between 2.4 and 2.485 GHz with data rates up to 1 Mbit/s over short distances (about 10 meters), but it can also be used at longer distances if higher frequencies are used; this technology is therefore often referred to as “RFID” for radio frequency identification applications like pet collars or luggage tags.

Here’s how bluejacking typically works:

  1. Bluetooth: Bluetooth is a wireless communication technology that allows devices near communicate. It’s commonly used for wireless headsets, file transfers, and connecting peripherals like keyboards and mice.
  2. Sending Unsolicited Messages: Bluejackers exploit a feature of Bluetooth that allows devices to discover and connect without requiring authentication. They send unsolicited messages or digital business cards (vCards) to other Bluetooth-enabled devices within range.
  3. Limited Impact: Bluejacking is generally considered more of a nuisance than a serious security threat. The messages sent are typically harmless and don’t contain malicious content or malware. They might just be text messages saying something like “Hello!” or “You’ve been bluejacked!”
  4. Privacy Concerns: While bluejacking might not pose a significant security risk, it raises privacy concerns. It demonstrates an attacker’s ability to send messages to your device without your consent, highlighting potential vulnerabilities in Bluetooth implementations.
  5. Prevention: To prevent bluejacking, users can turn off Bluetooth when not in use or set their devices to “non-discoverable” mode, which prevents them from being visible to other devices. Some devices also allow users to configure settings only to accept connections from trusted devices.

Bluejacking does not include the exchange of pictures.

Bluejacking is not a form of social media and does not include the exchange of pictures (vCards do not contain pictures) or other non-TEXT objects. Bluejacking is a networking tool that allows you to connect with others through your mobile phone. You can use bluejacking as a business card or as an introduction when meeting someone new at work or school. You may even use it casually, like waiting for the bus or sitting on the couch watching TV!

The senders will usually remain anonymous.

Bluejacking is a form of cyberbullying. It’s not illegal, but it can be used to send out spam or viruses. You’ll never see the sender’s real name or address, so you cannot verify that they’re who they say they are. If you don’t know who sent your bluejacking message, contact them directly and ask for proof that they’re who they claim to be.

Takeaway:

Bluejacking is a form of cyberbullying that’s been around for some time now. It’s illegal in many states, and it can be used to spread viruses or malware. If you’ve ever seen someone bluejack with their phone, you probably think it’s only harmless fun. But if you’re unfamiliar with the term “bluejacking,” here are some things to keep in mind:

  • Bluejacking is a form of cyberbullying
  • Your phone number could be accidentally added to anyone else’s contact list, and then they could spam texts or emails anytime they want!
  • People also use bluejacking as an alternative method of spamming people via text messages (which are hard to block on your own).

Conclusion

Bluejacking is a common problem because most people do not know how to stop it. If you are still experiencing issues with bluejacking, try turning your phone off before heading out to avoid these unwanted messages.