Feeds

Porn, Dubai and Bluetooth phone hacking...

A scam that is long in the tooth

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

The latest Bluetooth scare is that if you go to the United Arab Emirates, someone might hack your phone, implant porn on it, and you'd end up in jail.

Here's the origin of this story: an article by reporter Lana Mahdi, saying: "People who use mobile phones, particularly with bluetooth technology, to send pornographic images or indecent SMS messages will henceforth have to face imprisonment, a police source has warned."

The warning is pretty clear: sending immodest messages, whether over the cellphone SMS network, or between users over Bluetooth, is illegal. In other words, don't send people rude messages.

Almost certainly, this has arisen because of Bluejaq pranks, where people attempt to set up a conversation, and give their phone a rude name. The trick is amusing, because usually the recipient has no idea who sent the suggestive message. Pick the wrong recipient, however, and they could get excited... technically, you could be discovered.

But the idea that your Bluetooth phone might have a porn message secretly embedded in it, as a way to getting you banged up in prison, seems to be the most long-winded extrapolation of a set of ignorant assumptions into an implausible set of possible conclusions.

The article quotes "technology experts" saying that Bluetooth phones are vulnerable to hacking. It then goes on to refer to what is clearly Bluesnarfing - a trick requiring an obsolete Nokia phone, and a special-purpose hacker PC which is of no value whatever to anybody except the security expert who gained credibility by inventing it.

The story seems to have been picked up by blue2girl at www.blueserker.com and from there, inflated into "Use Bluetooth to get peeps busted in the UAE".

There is a sensible thing to worry about if you use a phone in the UAE or any other fundamentalist theocracy: if your phone has a camera, you may (perhaps inadvertently) take pictures of things you should not. Usually, that's someone else's wife or daughter when not fully covered (all but the eyes).

If we wanted to get you banged up in prison, we'd borrow your phone while you were in the loo: point it at a nude site like www.domai.com and then return it secretly to where you left it, and then summon the theo-fuzz.

Think about it: if someone transmitted a rude pic to your phone, they'd have to have the same rude pic on theirs...

Copyright © Newswireless.net

Related stories

Mobile Trojan kills smart phones
Text me and I'll reply with a virus
Bluetooth is attack vector for mobile phones

Secure remote control for conventional and virtual desktops

More from The Register

next story
Brits: Google, can you scrape 60k pages from web, pleeease
Hey, c'mon Choc Factory, it's our 'right to be forgotten'
Of COURSE Stephen Elop's to blame for Nokia woes, says author
'Google did have some unique propositions for Nokia'
FCC, Google cast eye over millimetre wireless
The smaller the wave, the bigger 5G's chances of success
It's even GRIMMER up North after MEGA SKY BROADBAND OUTAGE
By 'eck! Eccles cake production thrown into jeopardy
Mobile coverage on trains really is pants
You thought it was just *insert your provider here*, but now we have numbers
Don't mess with Texas ('cos it's getting Google Fiber and you're not)
A bit late, but company says 1Gbps Austin network almost ready to compete with AT&T
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.