Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Mobile

    Pulling for Bluetooth

    By
    Jason Brooks
    -
    March 1, 2004
    Share
    Facebook
    Twitter
    Linkedin

      To say that the Bluetooth personal area network protocol has underachieved on cellular handsets in the United States is an understatement. But there are reasons for this lackluster performance. Bluetooth has holes in its implementation and in its marketing, and the sooner its cavities are filled, the sooner it can realize its sizable potential.

      Earlier this month, news emerged from the United Kingdom that certain wireless handsets imbued with Bluetooth technology are leaving their users vulnerable to a type of attack called “bluesnarfing.”

      The bluesnarf attack takes advantage of gaps in the way that certain Nokia and Ericsson phones implement Bluetooths security model, enabling malicious parties to lift data stored on the phones without detection. One Nokia model, the 7650, can even be cracked to enable unauthorized users to connect to the Internet across a compromised Bluetooth link.

      Fortunately, most mobile phone users in the United States dont have to worry about being bluesnarfed; they havent a clue what Bluetooth is and would have trouble finding a Bluetooth-enabled phone even if they wanted one.

      Bluetooths vulnerabilities and its scarcity in U.S. cell phones are due to the same cause: Bluetooth is a relatively complicated protocol that accomplishes a fairly unglamorous task. The Bluetooth security model is complex. It lets users set devices to be discoverable to other Bluetooth units; it provides for device pairings with PIN authentication; and it manages ongoing trust relationships between devices.

      Mobile phones have rather limited user-interface possibilities, particularly as they relentlessly continue to shrink in size. Because of this, implementing Bluetooth security well on handsets requires quite a bit of cleverness. Youd think that Bluetooth has been around long enough for the likes of Nokia and Ericsson to have solved this puzzle, but it seems that there is plenty of work to be done.

      While the potential for security vulnerabilities is certainly worrisome, its not the biggest barrier to wider Bluetooth-enabled handset adoption in this country. A larger obstacle is that wireless carriers in the United States havent been able to figure out a flashy way to market Bluetooth, so theyve largely ignored it.

      In the United States, cellular carriers provide us with more than just wireless service. Theyre also the main source of our handsets. If carriers dont advertise or sell Bluetooth-enabled devices, then the technology isnt going anywhere in this country. At Cingulars Web site, I managed to find three Bluetooth phones on a page that described phones for customers with disabilities. Verizon and Sprint dont sell any Bluetooth-enabled phones. Meanwhile, it seems as though soon well be unable to buy any phone that doesnt sport a tiny low-resolution camera or a little suite of Java games.

      In contrast, Bluetooth has been making great strides in handheld devices and computers—its easy to find a Palm or Pocket PC with a very good Bluetooth implementation. Apple has enthusiastically embraced Bluetooth in its hardware and software, and Intel is planning to include a Bluetooth radio in the next generation of its Centrino chip set.

      Computer makers understand the importance of connectivity better than the cellular phone companies do. Bluetooth-enabled phones offer a significant benefit, connecting mobile computers to the Internet over increasingly fast wireless data links.

      The bottom line: Bluetooth is a communications protocol that has problems with, well, communication. Its devices need to offer a better security interface to users, and its supporters among handset manufacturers need to do a better job convincing their carrier partners that the technology adds the kind of value for which customers are willing to pay.

      Just over a year ago, at the Bluetooth Developers Conference, the Bluetooth special interest group launched a Five-Minute-Ready ease-of-use initiative that was intended to get users up and running with their new Bluetooth devices. However, if the group cant manage to lean on its partners to tighten security and encourage carrier acceptance, the chorus of “Bluetooth is dead” naysayers will sound sadly prophetic.

      Senior Analyst Jason Brooks can be reached at [email protected].

      Jason Brooks
      As Editor in Chief of eWEEK Labs, Jason Brooks manages the Labs team and is responsible for eWEEK's print edition. Brooks joined eWEEK in 1999, and has covered wireless networking, office productivity suites, mobile devices, Windows, virtualization, and desktops and notebooks. Jason's coverage is currently focused on Linux and Unix operating systems, open-source software and licensing, cloud computing and Software as a Service. Follow Jason on Twitter at jasonbrooks, or reach him by email at [email protected]

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×