蓝牙文件交换完全安全的? [英] Is Bluetooth File Exchange Completely Secure?

查看:100
本文介绍了蓝牙文件交换完全安全的?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

什么是当我通过蓝牙传输文件,我可能会面临一些可能的攻击?此外,可通过蓝牙Android手机之间传输文件加密?

What are some possible attacks that I could face when I transfer a file via bluetooth? Also, are files transferred between Android phones via bluetooth encrypted?

推荐答案

2常见的攻击 - 被动窃听和人在这中间攻击
如果您使用的是蓝牙2.1及以上和两个器件都2.1+那么被动窃听,甚至用精密五金件极其困难和不可能的。
对于所使用的PIN旧设备,PIN的PIN密钥的选择和长度是非常重要的,一个大的16字符的字母数字引脚可被用来制造更难以被动窃听和监听。

2 common attacks are - Passive eavesdropping and man-in-the middle attack If you are using the Bluetooth 2.1 and above and both devices are 2.1+ then passive eavesdropping is extremely difficult and unlikely even with sophisticated hardware. For older devices which used the PIN, the selection of PIN and length of PIN key is important, a large 16 character alpha-numeric pin can be used to make it more difficult to passively eavesdrop and listen in.

在中间的人是一个复杂的攻击,其中一个设备处于中间,表现得象要连接的设备,而是中继数据。
与蓝牙和正常使用情形是困难的,因为它要求攻击者在紧挨和欺骗地址等
随着蓝牙2.1及以上有配对的几个模型,并且除了刚刚工程模型,其中设备本身对无需任何用户的干预,其他车型(用户确认,密码code项等),一切以提供安全保障中间人攻击还,

Man in the middle is a sophisticated attack where a device is in the middle and acting like the device you want to connect to , but instead relaying data. With Bluetooth and normal usage scenarios it is difficult because it requires the attacker to be in close vicinity and spoof address etc. With Bluetooth 2.1 and above there are few models of pairing , and except for the just-works model where devices pair itself without any user interventions , the other models (user confirmation, pass-code entry etc) all provide security to the man in the middle attack also,

因此​​,要总结目前蓝牙2.1是最安全的成功的无线技术之一。

So to summarize currently Bluetooth 2.1 is one of the most secure successful wireless technologies.

要回答这个问题的第二部分, - 答案是肯定的,
蓝牙2.1+授权认证之后的所有个人资料的通信进行加密。

To answer the second part of the Question, - The answer is Yes, Bluetooth 2.1+ mandates authentication followed by encryption on all profile communications.

这篇关于蓝牙文件交换完全安全的?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆