Bitten by Bluetooth


New Scientist reports that devices using the wireless Bluetooth protocol may be highly succeptible to hacking. Security experts created a Linux program called "Red Fang" to demonstrate just how easy it is.

NEXT: Ending End-to-End?

Editor's Note: We invite comments and request that they be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of or Reason Foundation. We reserve the right to delete any comment for any reason at any time. Report abuses.

  1. The wireless revolution’s biggest hurdle, regardless of protocol, is going to be security. The one area that concerns me the most is hospitals’ drooling over such technology. While the advantages are clear, throwing patient data into the air can have some interesting consequences.

    I do hope that encryption mechanisms eventually solidify the security of wireless data transfer, but until then I hope those implementing those types of solutions do so carefully. In the meantime, it is good to see people and groups such as Red Fang expose the flaws that exist.

  2. Sorry! This section of is unavailable at the current time – every effort is being made to get it back up and running as quickly as possible.

    I wonder, did they get hacked?

  3. The probably got slashdotted.

Please to post comments

Comments are closed.