Heimdalr
(?)Community Member
- Report Post
- Posted: Wed, 06 Feb 2013 13:38:33 +0000
N3bu
This doesn't help when people think using a computer like a hacker is like the movie 'hackers' thanks to hollywood.
I'm sorry. I don't know if that was directed at me but I want to clear this up anyway.
The most important security feature of Low Power Bluetooth and NFC is the extremely limited range. Bluetooth proper had about a 15m range and even that was exploited thoroughly. I used my cheap Nokia to push anonymous messages through a contact card transfer vulnerability. If I could trick them into a pair, I'd control every aspect of their phone, though I only ever really managed that as a prank on friends. Combine the two and you'd have a scheme set up.
People encourage you to secure WiFi access points for a reason. An attacker on the same access point as you has full access to the stream of information between you and the target, to swap and intercept data as they please. You don't even have to take my word for it. Install Network Spoofer on any rooted Android device and you'll be swapping all the pictures on your network's devices with trollface in five taps. dSploit, if it's not exactly your network. A child could use these tools, no exaggeration.
So with the extended range of a cell tower-strength WiFi hub and the vulnerabilities of having unknown people on your network, my concerns are valid.