Share on facebook
Share on twitter
Share on linkedin
Share on reddit

The first phone I had which could actually transfer files wirelessly to another phone was a Nokia 6080. My 6080 uses infrared technology to transfer files, Infrared required both phones to be in contact while the transfer was in progress.

This felt cool to me until Bluetooth showed up. The technology dint requires contact from both devices, it was faster and could transfer multiple files at a time. This technology has only got better and found itself into more devices we never could have imagined. Bluetooth is part of the wireless protocols driving a technological revolution, especially in mobile devices. The most notable of those changes has been the replacement of 3.5mm audio jack.


Bluetooth is a wireless technology standard for exchanging data between fixed and mobile devices over short distances. Both WiFi and Bluetooth enable wireless transfer on the same 2.4GHz frequency. WIFi connects all devices together via the router while Bluetooth enables direct connection between devices over a shorter distance and weaker power.

A Bluetooth device is capable of to connect up to 8 other devices at a time, its able to allocate any 72 sub frequencies to these devices within the 2.4Ghz range. Bluetooth devices can successfully do this without interring because every device has a unique hardware address. If your device picks up a signal from another device on the same frequency, as far is it isn’t from the address which it’s communicating with it will ignore it. A network of Bluetooth devices is called “Piconet”

When you want to connect two Bluetooth devices together, a conversation begins between the devices. This conversation will include hardware data, frequency and the decision of on who controls who. The piconet will stay active as far as these stay in the same range.


There isn’t much security treat of using Bluetooth today. The only known threat is called bluejacking which is a vulnerability which allows an individual to send anonymous messages to Bluetooth-enabled devices within a certain radius. Don’t worry, bluejacking will not allow device hacking or data theft that makes the technology fairly safe.


As with any wireless technology, however, there is always some security risk involved. Hackers have devised a variety of malicious attacks that use Bluetooth networking. For example, “bluesnarfing” refers to a hacker gaining authorized access to information on a device through Bluetooth; “bluebugging” is when an attacker takes over your mobile phone and all its functions.  


Although these devices all emit some form of radioactive waves, those waves are not enough to harm you over time. As a matter of fact, the waves emitted from Bluetooth devices are much lower than those emitted by your phone. If you scared if Bluetooth radiations, you should consider giving up your phone.

Share on facebook
Share on twitter
Share on linkedin
Share on reddit

Also read

Notify of
Inline Feedbacks
View all comments

Smartphone Specifications