Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Bluejacking
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Usage== Bluejacking is usually not very harmful, except that bluejacked people generally don't know what has happened, and so may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking has been used in [[guerrilla marketing]] campaigns to promote [[advergame]]s. The actual message itself doesn't deploy any [[malware]] to the software; rather, it is crafted to elicit a response from the user or add a new contact and can be seen as more of a [[Practical joke|prank]] than an attack. These messages can evoke either annoyance or amusement in the recipient. Users typically possess the ability to reject such messages, and this tactic is frequently employed in confined environments such as planes, trains, and buses.<ref>{{Citation |title=Introduction and overview |date=2007-01-22 |work=Educational Leadership |pages=1β5 |url=http://dx.doi.org/10.1017/cbo9781139168564.001 |access-date=2024-02-16 |publisher=Cambridge University Press|doi=10.1017/cbo9781139168564.001 |isbn=978-0-521-68512-2 |url-access=subscription }}</ref> However, some forms of [[Denial-of-service attack|DoS]] Disruptions are still possible, even in modern devices, by sending unsolicited pairing requests in rapid succession; this becomes disruptive because most systems display a full screen notification for every connection request, interrupting every other activity, especially on less powerful devices. Bluejacking is also confused with [[Bluesnarfing]], which is the way in which mobile phones are illegally hacked via Bluetooth.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)