[ad_1]
A new scientific study has advised users of computers and phones running on iOS and Microsoft systems as well as fitness handsets to disable the Bluetooth feature on their devices when they are not being used.
According to the Daily Mail, a team of researchers has discovered a flaw in Bluetooth connectivity that tracks the places frequented by many users of these systems, especially Android systems that do not apply the warning.
Devices that suffer from this imbalance include Apple products such as the iPad, Apple watches and iPhone phones, as well as Microsoft products, that it's laptops, Fitbit tablets or watches.
"The majority of users currently use the Bluetooth feature in one way or another, which makes them very likely to track their movements," said Johannes Becker, research team member. from Boston University.
According to research paper published by security researchers at Boston University, attempts at electronic piracy are aimed at exploiting the way many people use their phones, such as the phone and the wristwatch.
The document explains that, generally, when a device is connected to an external Bluetooth device, one of the ends, the main device, plays the role of main communication device, while the other party plays a third role.
The third-party device sends a signal, similar to an IP address, containing data about the connection. By design, this connection is supposed to be a randomly generated rename address, designed to protect user identities, but using detection software, a publicly available program that badyzes Bluetooth connections, Researchers reported being able to recognize devices even after changing addresses randomly.
The document adds that traceability is a success, even though "most computer operating systems and smartphones implement the random change of default addresses to prevent long-term negative tracking".
Researchers say that Android devices can not be tracked because there is a difference in the way devices connect to a partner via Bluetooth.
"Although this flaw is not very critical compared to some of the other weaknesses of computer systems, authentication is an addition to the security system because of the risk of communication over media and properties," said David Lee. , Principal Investigator at Boston University. Multi. "
"There are many ways to track people, with or without Bluetooth, but it's always good to become familiar with the type of signals they send, especially at a time when the Internet and Bluetooth are so diverse," he says. said Baker.
[ad_2]
Source link