Bluetooth is a telecommunication standard for short range wireless communication between cell phones, tablets, computers, and other mobile electronics. The weak transceivers create a personal area network, which extends only a short distance beyond its user. Most Bluetooth devices operate at 2.45 GHz and are "class 2" rated, meaning a wireless range of 30 feet. Data can be exchanged at a rate of 1 megabit per second. Class 1 Bluetooth is less common, but has an increased range of up to 300 feet.
In general, Bluetooth is used for voice communication (typically through a headset, although now through automobile sound systems), local music broadcast (to speakers or a headset), device control (through a keyboard, mouse, gamepad, or other device), and communication on the Internet through a networked and Bluetooth-enabled device.
Bluetooth is named for the 10th century Viking king Harald Blåtand, who's last name roughly translates as "Harald Bluetooth."He reigned from A.D. 940 to 985, and is known for having united Denmark and Norway and to have brought Christianity to Scandinavia
As a wirelesss technology, security is always a concern for Bluetooth communication. The connections are typically encrypted, and the devices use frequency-hopping spread spectrum technology to jump from one frequency to another making the connection more difficult to listen in on. However, there are some security concerns with Bluetooth technology. It has been found a number of different times to be vulnerable to penetration for various nefarious purposes. An early vulnerability allowed for "bluejacking," which was a method by which unauthorized messages could be sent to users. However, a more modern and concerning set of vulnerabilities is "blueborne," which enables attackers to infiltrate vulnerable devices without the user's knowledge or consent. This attack method was developed by Armis as a proof-of-concept, which has not been released in detail for the security of everyone who uses Bluetooth 5. Mobile device manufacturers quickly got to work finding a way to patch the vulnerability.
The underlying concern with Bluetooth is that to offer the functionality it does, it needs system access on its host device greater than that of even the user. If exploited, it offers a great deal of access into the device's system, and much harm could be done, or information stolen.
- Bluetooth overview, searchmobilecomputing.com
- Bluetooth, Phonescoop.com
- http://www.informit.com/articles/article.aspx?p=27656&seqNum=4 Retrieved 10/24/2017