You are on page 1of 19

Presentation on

Bluetooth
Introduction-Bluejacking
Features

Content
s

How it is done
Usage of bluejacking
Advantages & disadvantages
Software tools
Prevention
Misconceptions
Future aspects
Conclusion

Bluetooth
Bluetooth is a wireless technology that provides short range
communications that is proposed to replace the cables
connecting portable & fixed devices along with maintaining
high levels of security.
Main features of Bluetooth
Robustness
Low power
Low cost

Advantages
Duplex mode
Handles data & voice
It is free
Easy to transfer data
Independent of network &
phone number.

Disadvantages

Doorway to various techniques like bluejacking, bluesnarfing


etc.

Bluejacking
Bluejacking makes use of Bluetooth technology to send
unsoliciated messages to bluethooth enabled devices.
Receiver does not get to know who has send the to it
Receives the message along with the name and model of the
senders phone.
This is known as bluejacking.

Features
Does not involve removal or alteration of any data from the
device.
Sends only a text message but it has now became possible
to send images & sounds
Bluejacking exploits a Bluetooth devices ability to discover
other nearby Bluetooth devices.

How it is done
Using mobiles
The various steps involved in this are as follows:
1. Choose "New contact"
2. Then in the first line choose your desired message.
3. Then press done.
4. Then go to the contact.
5. Then press options.
6. Then scroll down to send.
7. Then choose "Via Bluetooth"
8. Then the phone will be searching for enabled Devices.
9. Then press "Select"

Using PCs/laptops:
1.Go to contacts in your Address Book program.
2.Create a new contact
3.Enter the message into one of the 'name' fields
4.Save the new contact
5.Go to the address book
6.Right-click on the message/contact
7.Go to action
8.Go to Send to Bluetooth
9.Click on other
10.Select a device from the list and double click on it.

Usage of Bluejacking
It can be used in malls for advertisement
purposes
Used at railway stations to give
information about general rules, train
timings etc.
Used at cafe, restaurants and various
stores to provide various information
regarding them.

Software tools
By downloading few software tools on PC or Bluetooth configured
devices, you can directly search for the Bluetooth enabled devices and
send unsolicited messages to them.
Few software tools are:
i.
ii.
iii.
iv.
v.

Bluespam
Meeting point
Freejack
Easy-jacking
Proximity mail

Prevention
There is no software available to prevent bluejacking, but some
solutions that help in getting rid of it are :
i.

Phone owners who receive a bluejack message should refuse to add


the contacts to their address book.

ii. Devices could be set in non-discoverable or invisible modes.


iii. Turn off your Bluetooth device at certain public areas.

Misconceptions
Bluejacking doesnt give the sender any personal data.
Both sender and receiver can have complete control on to
the devices.
It is actually harmless.
No malfunctioning can take place.

Future aspects
Extensively used for getting necessary information.
People may stop using Bluetooth and only bluejackers
will be playing with eachother.
Develop software for location tracking.
Device cannot be hacked.

Conclusion
In future this technology becomes the key for advertising
and to interact with world.
It can also be used to get the location messages on the
phone when you are some where out.
Bluejacks are location specific.
The data indicate that bluejacking is an activity
thatprimarily occurs in public spaces, outside of the home.

Any Queries ?

Presentation by
Bhavvishyya
Charwitha
Sravani

You might also like