BlueCast or BlueSnarfed?

BlueCast or BlueSnarfed?
This morning I was browsing some of the more popular recent links and came across a nice study in contrasts.

The first was this short YouTube presentation on the hottest and newest of hot, new technologies — Bluecasting: The proximity broadcasting system! The core of the system is a snazzy-looking, web-enabled, bluetooth broadcasting unit designed to be installed where “consumers might be likely to experience ‘dwell time’“. ‘Dwell time’ — all these years I’ve been oblivious to that it even existed when, by all reports, I’ve been actually experiencing it for many years at the various train stations, airports, sporting facilities and retail strips I’ve encountered. To think I never even knew.

Once installed the BlueCasting system automatically locates any discoverable, bluetooth-enabled device within range (approx 100m) and then goes about offering it a selection of location-specific content, including but not limited to:

  • Images,
  • Audio,
  • Video,
  • Interactive Content
  • Games &
  • Retail offers

BlueCast or BlueSnarfed?
As a potential content creator for and consumer of this service, I thought ‘Hooray for bluetooth!‘ and as the presentation faded to black, I flipped my phone to ‘discoverable’ — just in case I might stumble across one of these happy, magical lands.

Moments later, as is YouTube’s way, I was offered another video on a related subject — ‘Real Hustle Bluesnarfing‘. A relatively convincing demonstration followed where a PocketPC user in a busy london station was able to easily locate discoverable Bluetooth devices with a known security flaw, and then take complete control of them in seconds.

Apart from the obvious privacy concerns of divulging your contacts, emails and SMS content to a malicious stranger, the real sting came when the scammer was able to make silent calls via the attacked phone to his own 1800 number — charged at £1.50/min. That could get very nasty very quickly.

At the end the experts shook their heads gravely and sternly advised “Never leave Bluetooth on when you’re not using it!”

‘Bad Bluetooth!,.. Bad!’ I thought and immediately switched mine back to non-discoverable.


Category: programming Time: 2006-10-19 Views: 1

Related post

  • Bluesnarfer in Backtrack 5 2012-07-13

    I'm new to backtrack and I am learning to hack Bluetooth . As you know I must use Bluesnarfer. But when I use it I get this error: Can someone help me to solve this, I searched the Internet but I didn't find anything to solve it. [email protected]:~# bluesnarf

  • Older Cell / Smart phones were susceptible to bluesnarfing / bluetooth attacks, Why specifically are smartphones secure from this attack now? 2014-12-02

    Older cell / smart phones were susceptible to bluesnarfing / Bluetooth attacks, Nokia phones in particular. But now in days, modern smart phone and cell phones that use Bluetooth technology for pairing, which made phones vulnerable to various types o

  • Are there Bluetooth attacks on Smartphones that will not notify the user of the attack? 2012-07-27

    Are there Bluetooth attacks on Smartphones that will not notify the user of the attack? Specifically forcing a reset or opening an application. --------------Solutions------------- It amazes me that you did not search for keywords like bluetooth hack

  • Bluetooth penetration testing 2014-07-08

    I need to do some testing on boxed devices, incidentally having Bluetooth interface. I am quite sure that there are problems in the implementation, at least there must be given how the architecture has been developed. My question is: where can I find

  • Listening and recording FM radio of phone on laptop 2015-01-25

    I have android(Gingerbread) phone that I connect to laptop running Windows 7 Professional. If I start FM radio on the phone can I Listen to the songs through laptop speakers? Record the songs being played? --------------Solutions------------- Sure --

  • Is sending passwords through cellphone text messages secure? 2015-03-12

    Both the sender and the receiver deleted the text after it was sent, but is it still possible that it exists somewhere and that someone can get to it? --------------Solutions------------- It is absolutely not secure. Text messages function essentiall

  • Broken System due to upgrading libc6 2015-05-07

    I am using Kali, and I tried to upgrade libc6, because it comes with a lower version than I need. After downloading the latest package from the debian repo (, And installing it using dpkg --auto-de

  • Bluensnarf installation 2016-02-22

    I am trying to install Bluesnarf on my Ubuntu machine and i am encountering the following error when i run make command. [email protected]:/opt/bluesnarfer# make make: No targets specified and no makefile found. Stop. Can someone tell me what is

iOS development

Android development

Python development

JAVA development

Development language

PHP development

Ruby development


Front-end development


development tools

Open Platform

Javascript development

.NET development

cloud computing


Copyright (C), All Rights Reserved.

processed in 0.319 (s). 13 q(s)