Bluejacking is used for sending unauthorized messages to another Bluetooth device. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers and other devices.
Bluetooth has a very small range so only when a person is within 10 (highly location dependent) meters distance of a bluejacker and his Bluetooth enabled in his device, does bluejacking happen. Bluejacking involves sending unsolicited business cards, messages, or pictures. The bluejacker discovers the recipient’s phone via doing a scan of Bluetooth devices. He would then select any device, craft a message as is allowed within the body of the phone’s contact interface. He stays near the receiver to monitor his reactions.
The messages are anonymous to the recipient as only the mobile name and model number of the bluejacker’s phone are displayed in the message. The only exception to the 10 meters distance is the involvement of a laptop, which can be done within a 100-meter range of the recipient. Although there is an infringement of territory of the recipient, bluejacking is not illegal, as it does not access the resources of the recipient device and does not steal anything either.
Steps To Bluejack A Device
- Bluejacker opens his contacts and creates a new contact.
- He does not save a name and number rather he saves the message in place of the contact and does not need to save a number (It is optional if he wants to send a business card, he can save the number).
- He would scan for nearby Bluetooth devices.
- He would then share the contact with the Bluetooth device connected.
- The message will reach the recipient and he will have no clue as to who had sent the message.
Codes of Ethics While Bluejacking
- Bluejackers would never ‘hack’ a device. It an offense under the computer misuse act 1990, due to unauthorized access to computers.
- Only copyright-free images must be sent. The pictures must not be insulting or otherwise inappropriate.
- If a condition arises that no interest is shown by the recipient after 2 messages the bluejacker should stop messaging.
- Message sending limit is only 10 pictures ‘at the most’ (in case the receiver is interested in the messages.)
- All activities must stop if they are causing distress to the receiver.
- If a bluejacker is caught in the act, he must fully cooperate and be honest about his activities.
- Low cost.
- Easy to use.
- It can also penetrate through walls.
- It creates an Adhoc connection immediately without any wires.
- It is used for voice and data transfer.
- It can be hacked and hence, less secure.
- It has a slow data transfer rate: 3 Mbps.
- It has a small range: 10 meters.
- Top 5 Recommended Books To Learn Hadoop
- 7 Most In-Demand Technical Skills By Companies After COVID-19
- Top 5 Image Loading Libraries in Android
- Requirement to Study Abroad - Admission Pathways
- Top 10 Programming Languages to Learn in 2020 - Demand, Jobs, Career Growth
- Best Way to Learn NodeJS - A Complete Roadmap
- Same Site Scripting
- How to Become a Cyber Security Consultant?
- How to Become a Software Architect?
- Top Programming Languages for Internet of Things
- How to Keep Your Skills Updated As a Software Developer?
- Difference between Adware and Ransomware
- Difference between Worms and Ransomware
- Difference between Trojan Horse and Ransomware
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.