Abstract—The mobile phone technology has developed tremendously in the Bluejacking is instigated by an attacker (termed as bluejacker or bluejackaddict) . Abstract Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or. Abstract – This research paper is about the technology used for sending unsolicited messages over. Bluetooth to Bluetooth to Bluetooth-enabled devices such as.
|Published (Last):||17 March 2005|
|PDF File Size:||20.87 Mb|
|ePub File Size:||10.49 Mb|
|Price:||Free* [*Free Regsitration Required]|
Bluejacking absfract the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field i. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to meters with powerful transmitters.
Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless bluejackiing. Bluejacking does not involve the removal or alteration of any data from the device.
Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking. Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as users carry them around as they move through different physical locations throughout the day.
As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation.
One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. Bluejackers, however, ignore the absrract between the control exerted by the bluejacker and the lack abstractt defensive measures that can be taken by the recipient when his or her possessional territory is violated.
To gain a further understanding of why bluejackers would bluejackking in a practice that disrupts the social conventions of public space, we ask the following research questions:.
What are the alternative social conventions that might arise from the practice of bluejacking?
Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message to someone with a Nokia Becoming bored while standing in a bank queue, Ajack did a Bluetooth discovery to see if there was another Bluetooth device around. Assuming that you now have a Bluetooth phone in your hands, the first thing to do is to make sure bluejaccking Bluetooth is enabled. You will need to read the handbook of the particular phone or PDA blueajcking that you have but somewhere in the Menu item you will find the item that enables and disabled Bluetooth.
Now, remember that Bluetooth only works over short distances, so if you are in the middle of Dartmoor then BlueJacking isn’t going to work for you unless the sheep have mobile phones these days! BlueJacking is very new so not everyone will have a Bluetooth phone or PDA so the bigger the crowd the more likely you will have of finding a ‘victim’.
The Tube yes, Bluetooth works undergroundon the train, in a Cafe or standing in line are all good places to start.
You will now need to create a new Contact in bluejackibg Phone Book – however rather than putting someone’s name in the Name field you write your short message instead – so for example rather than creating a contact called Alan Philips you would write – “Hey, you have been BlueJacked! Now select the new contact and from the Menu of the phone choose “Send via Bluetooth”. This is a facility available within the Mobile Phone that was designed to send a Contact to someone anstract – useful in Business when trading names and addresses, however we are now going to use it to send our message bluejackinb was contained in the Name field of the contact – clever eh?
Your phone or PDA will start to search the airwaves for other devices that within range.
If you are lucky you will see a list of abstratc appear, or it will say that it cannot find any. If the latter happens then relocate to another crowd or wait a while and try again. If you have a list of found devices then let the fun begin.
Bluejacking | Seminars For You
Unfortunately, almost every Bluetooth enabled device will not yet be configured with a useful name abstrxct so you are going to have to guess. Some devices will be called by their Phone manufacturer e.
Nokia, Sony or maybe a random string. Try one at random and look around to see who bluejacjing their phone and then looks perplexed when they read your message: If you want to name your Phone so it appears as a name in the list on a BlueJackers phone see how to name our phone.
Origin of Bluejacking: Abstract | Pranay Moluguri –
You can build a library of contacts with predefined messages. By default a small text will be send. BlueSpam also supports backfire, if you put your palm into discoverable and connectable mode, BlueSpam will intercept all connection attempts by other Bluetooth devices and starts sending a message back to the sender.
Bluejacking Published on Nov 15, Are you interested in this topic. Then mail to us blujacking to get the full report.