Bluejacking is used for sending unauthorized messages to another Bluetooth device. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers and other devices.
Bluetooth has a very small range so only when a person is within 10 (highly location dependent) meters distance of a bluejacker and his Bluetooth enabled in his device, does bluejacking happen. Bluejacking involves sending unsolicited business cards, messages, or pictures. The bluejacker discovers the recipient’s phone via doing a scan of Bluetooth devices. He would then select any device, craft a message as is allowed within the body of the phone’s contact interface. He stays near the receiver to monitor his reactions.
The messages are anonymous to the recipient as only the mobile name and model number of the bluejacker’s phone are displayed in the message. The only exception to the 10 meters distance is the involvement of a laptop, which can be done within a 100-meter range of the recipient. Although there is an infringement of territory of the recipient, bluejacking is not illegal, as it does not access the resources of the recipient device and does not steal anything either.
Steps To Bluejack A Device
- Bluejacker opens his contacts and creates a new contact.
- He does not save a name and number rather he saves the message in place of the contact and does not need to save a number (It is optional if he wants to send a business card, he can save the number).
- He would scan for nearby Bluetooth devices.
- He would then share the contact with the Bluetooth device connected.
- The message will reach the recipient and he will have no clue as to who had sent the message.
Codes of Ethics While Bluejacking
- Bluejackers would never ‘hack’ a device. It an offense under the computer misuse act 1990, due to unauthorized access to computers.
- Only copyright-free images must be sent. The pictures must not be insulting or otherwise inappropriate.
- If a condition arises that no interest is shown by the recipient after 2 messages the bluejacker should stop messaging.
- Message sending limit is only 10 pictures ‘at the most’ (in case the receiver is interested in the messages.)
- All activities must stop if they are causing distress to the receiver.
- If a bluejacker is caught in the act, he must fully cooperate and be honest about his activities.
- Low cost.
- Easy to use.
- It can also penetrate through walls.
- It creates an Adhoc connection immediately without any wires.
- It is used for voice and data transfer.
- It can be hacked and hence, less secure.
- It has a slow data transfer rate: 3 Mbps.
- It has a small range: 10 meters.
Whether you're preparing for your first job interview or aiming to upskill in this ever-evolving tech landscape, GeeksforGeeks Courses
are your key to success. We provide top-quality content at affordable prices, all geared towards accelerating your growth in a time-bound manner. Join the millions we've already empowered, and we're here to do the same for you. Don't miss out - check it out now!