The innovation of Bluetooth provides numerous benefits on society and economics. In contrast to cell phones, which have to transmit a signal to an antenna that might be many miles away, Bluetooth only needs to reach the device within the small given proximity. Bluetooth usually has a range of about 30 feet. This is due to the use of low-power radio waves, Bluetooth gives out one thousand times less radiation than a cell phone. Bluetooth is not only safer with regard to radiation but it increases  the fundamentals of safety, such as in the car. Bluetooth has given drivers the options of listening to a phone’s music from car speakers, Creating and/or listening to text messages aloud, it can combine a phone with a car’s navigation system for simpler use, and overall avoid major distractions ending in a fatal results. In many more cases bluetooth prevailed to be the dominant option. However the negative effects of radiation are still present, and long term use could cause several life threatening effects. While it’s true that levels of radiation given off by bluetooth headsets and devices is below what the regulatory agencies consider “safe”, there are many who question whether it is actually safe. The radiation that Bluetooth gives out is called microwave radiation and according the people at emfblues.com, The long term effects of microwave radiation exposure includes cancer, leukemia, brain tumors, alzheimer’s, autism, ADD, miscarriages, birth defects, autoimmune illnesses,multiple sclerosis, hair loss, and even suicide. 2d) The innovation of Bluetooth is used so two seperate devices can link together and share information with each other. A bluetooth device must run an inquiry to try and discover the other. Once the device sends out the inquiry request, any device listening for the request will respond with its address, and possibly other information. When two Bluetooth devices establish a communications channel, they both create an initialization key, an Initialization key occurs when two devices haven’t communicated yet. A passkey is inputted and the initialization key is created, and then the link key is calculated using that. After, the link key is used for verification. On of the primary security faults is the passkey. If a hacker is able to find out a user’s passkey, he can then calculate what the initialization key, and from that, work out what the link key is and get ahold of the connection between devices. Another hacking technique is referred to as bluebugging, and it involves accessing a phone’s commands which enables a hacker to make phone calls, add or delete contact info, or listen in on the phone owner’s conversations. Both of which are hard to accomplish due to bluetooths short range connection of about 30 feet, but are both possible.

Categories: Articles

x

Hi!
I'm Garrett!

Would you like to get a custom essay? How about receiving a customized one?

Check it out