• You can now add Bluetooth to the list of privacy threats to be wo

    From TechnologyDaily@1337:1/100 to All on Fri Jun 10 13:00:04 2022
    You can now add Bluetooth to the list of privacy threats to be worried about

    Date:
    Fri, 10 Jun 2022 11:53:44 +0000

    Description:
    You can be tracked through the Bluetooth chip in your phone with gear costing as little as $150.

    FULL STORY ======================================================================

    Security experts have found a way to track people using the Bluetooth chips integrated into their mobile devices, and laptops, but its a lot harder than it sounds (and not quite effective, yet).

    Researchers at the University of California, San Diego, have discovered that each individual Bluetooth chip has a tiny imperfection, created during the manufacturing process. In a sense, despite the fact that theyre being
    produced at scale, and have measures in place to prevent identification, all of these chips are somewhat unique.

    That uniqueness, the researchers have found, can be tracked.

    Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022 . Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/10.99. Fingerprinting the devices

    However, to track the chip, the potential attacker would first need to identify the device, or capture its unique fingerprint, in order to identify that tiny imperfection. After that, they need a radio receiver capable of recording raw radio signals. Apparently, this can be done with off-the-shelf gear costing no more than $150.

    Furthermore, they would need to be relatively close to the victim to be able to snoop on the Bluetooths transmissions. To make things even more
    complicated - not all chips have the same capacity, and range.

    "They will know when the target device is near the receiver when it captures one or more packets that matches the target's physical layer fingerprint,"
    the researchers say. Read more

    What is Bluetooth?


    Hackers can steal your Tesla via Bluetooth


    Bluetooth security holes open door to device impersonation attacks

    "The more frequently the BLE device transmits, the more likely the attacker
    is to receive a transmission if a user passes by. Also, the more accurate the fingerprinting technique is, the better the attacker can differentiate the target from other nearby devices."

    While the concept might work when theres only a handful of devices around, it gets a bit more tricky in crowded environments. Testing the flaw on 162 devices, the researchers were able to identify 40% of Bluetooth chips, while testing on 647 mobile devices, the percentage went up to almost half (47%).

    "By evaluating the practicality of this attack in the field, particularly in busy settings such as coffee shops, we found that certain devices have unique fingerprints, and therefore are particularly vulnerable to tracking attacks. Others have common fingerprints they will often be misidentified," the researchers concluded. Looking for a new device? These are the best business smartphones for work around

    Via: The Register



    ======================================================================
    Link to news story: https://www.techradar.com/news/you-can-now-add-bluetooth-to-the-list-of-privac y-threats-to-be-worried-about/


    --- Mystic BBS v1.12 A47 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)