Can I be tracked by my cell phone’s bluetooth?

Can I be tracked by my cell phone’s bluetooth?

Bluetooth is a device that seems to work like magic, isn’t it? After all, transferring files or listening to music without using cables is something that seems very difficult to understand. that Resources, according to researchers at the University of California, also allows our cell phones to be tracked by other people. curious to know that Is it possible to be tracked by cell phone’s bluetooth? see now.

Read more: Find out which apps use the most of your battery

What do scientists say on this subject?

According to the researchers, an error results in a unique fingerprint in Bluetooth communication. This is because all chips, during the manufacturing process, develop a small imperfection, which makes each of them unique. Thus, it is possible to identify them through this sign, regardless of where they originated in the scale.

Fortunately, it’s not like the owners of the devices can be tracked all the time, at least not remotely. It needs to be close to the target, which makes “tracking” meaningless, doesn’t it? However, this range may depend on the type of chip, hardware and Bluetooth communication capability of each device used.

Also, a certain level of expertise is required with technology, as it is not such a simple process. The researchers themselves make it clear that, while not a costly task, it is something that depends more on luck than the attacker’s technical knowledge.

How to track bluetooth?

If you are still curious and want to take this test, know that the task can be quite complicated. For the process to be performed, it is necessary to isolate the signal from the target device, which will allow you to find this fingerprint. Then a receiver must be in some place where the cell phone is used. It’s easy if paired with a friend, but nearly impossible to juggle with a random person.

READ  The Last Faith, "Platformer Bloodborne", arrives in 2022

In fact, the more a Bluetooth device transmits, the more likely it is that an attacker will pick up a transmission when a user or target passes by.

About the author: Raven Weber

Musicaholic. Unapologetic alcohol maven. Social media expert. Award-winning coffee evangelist. Typical thinker.

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *