many people think bluetooth sticks in your ear. Please read this
Bluetooth is an industrial
specification for wireless personal area networks (PANs). Bluetooth
provides a way to connect and exchange information between devices
such as mobile phones, laptops, personal computers, printers,
digital cameras, and video game consoles over a secure, globally
unlicensed short-range radio frequency. The Bluetooth specifications
are developed and licensed by the Bluetooth Special Interest Group.
is an industrial specification for wireless personal area networks (PANs).
Bluetooth provides a way to connect and exchange information between
devices such as mobile phones, laptops, personal computers,
printers, digital cameras, and video game consoles over a secure,
globally unlicensed short-range radio frequency. The Bluetooth
specifications are developed and licensed by the Bluetooth Special
Bluetooth exists in many
products, such as phones, printers, modems and headsets. The
technology is useful when transferring information between two or
more devices that are near each other in low-bandwidth situations.
Bluetooth is commonly used to transfer sound data with phones (i.e.
with a Bluetooth headset) or byte data with hand-held computers
Bluetooth simplifies the
discovery and setup of services between devices. Bluetooth devices
advertise all of the services they provide. This makes using
services easier because there is no longer a need to setup network
addresses or permissions as in many other networks.
Bluetooth is a standard and
communications protocol primarily designed for low power
consumption, with a short range (power-class-dependent: 1 meter, 10
meters, 100 meters)
In order to use Bluetooth, a
device must be compatible with certain Bluetooth profiles. These
define the possible applications and uses of the technology.
Pairs of devices may establish
a trusted relationship by learning (by user input) a shared secret
known as a passkey. A device that wants to communicate only with a
trusted device can cryptographically authenticate the identity of
the other device. Trusted devices may also encrypt the data that
they exchange over the airwaves so that no one can listen in. The
encryption can, however, be turned off, and passkeys are stored on
the device file system, not on the Bluetooth chip itself. Since the
Bluetooth address is permanent, a pairing is preserved, even if the
Bluetooth name is changed. Pairs can be deleted at any time by
either device. Devices generally require pairing or prompt the owner
before they allow a remote device to use any or most of their
services. Some devices, such as mobile phones, usually accept OBEX
business cards and notes without any pairing or prompts.
Bluejacking allows phone users
to send business cards anonymously using Bluetooth wireless
technology. Bluejacking does NOT involve the removal or alteration
of any data from the device. These business cards often have a
clever or flirtatious message rather than the typical name and phone
number. Bluejackers often look for the receiving phone to ping or
the user to react. They then send another, more personal message to
that device. Once again, in order to carry out a bluejacking, the
sending and receiving devices must be within range of each other,
which is typically 10 meters for most mobile devices. Devices that
are set in non-discoverable mode are not susceptible to bluejacking.
However, the Linux application Redfang claims to find
non-discoverable Bluetooth devices.
For more information
regarding Manufactures please visit
Bluetooth has taken a jump in technology : A2DP Audio
streaming. Play tunes from your phone or bluetooth enabled device
with no wires in perfect stereo. Seeing is believing.