1 00:00:02,730 --> 00:00:05,910 Wi-Fi is not the only wireless technology. 2 00:00:05,910 --> 00:00:07,980 Wireless has a long history behind it. 3 00:00:09,620 --> 00:00:16,500 The first develop technology was the analog network known as CD EPD this cordless data transmission 4 00:00:16,500 --> 00:00:20,320 method is practically discarded today. 5 00:00:20,480 --> 00:00:28,470 The successor of CPD to press is on the other hand still employed in a variety of applications. 6 00:00:28,520 --> 00:00:32,560 It is now mostly used in mobile web browsing services. 7 00:00:32,570 --> 00:00:40,840 The technology is still so used by the protocol and other wireless technology that is extremely popular 8 00:00:40,840 --> 00:00:47,010 today is Bluetooth but even given this notoriety it is virtually unsecured. 9 00:00:48,900 --> 00:00:55,700 All laptops and smart phones today have a built in Bluetooth connectivity this technology is freely 10 00:00:55,700 --> 00:01:02,160 available and the technologies that make possible the interception of data sent over this channel are 11 00:01:02,190 --> 00:01:03,320 equally available. 12 00:01:05,130 --> 00:01:09,790 The slide above shows pictures of three such tools to secure your transmissions. 13 00:01:09,810 --> 00:01:14,450 You can only force the encryption of exchange data. 14 00:01:14,580 --> 00:01:20,190 Other than that the natural security is provided by the short maximum range of Bluetooth or a distance 15 00:01:20,190 --> 00:01:23,520 of 10 meters. 16 00:01:23,520 --> 00:01:28,380 We assumed that in the 10 meter radius there are no attackers who'd want to capture the data exchange 17 00:01:28,380 --> 00:01:31,330 between the smartphone and the laptop. 18 00:01:31,510 --> 00:01:34,210 For example during the synchronization of an address book 19 00:01:37,020 --> 00:01:40,690 RFID is another wireless technology is spread over the world. 20 00:01:42,520 --> 00:01:46,100 It can be encountered mostly in supermarkets and other shops. 21 00:01:46,120 --> 00:01:54,870 The standard is used to tag products reading tags discloses the information contained in RFID is practically 22 00:01:54,870 --> 00:01:57,780 unsecured. 23 00:01:57,820 --> 00:02:03,360 The only protection involved assumes that a person who scans an RFID code is authorized to do it. 24 00:02:05,890 --> 00:02:07,930 This doesn't always have to be the case. 25 00:02:08,780 --> 00:02:15,900 Mentioned that if a thief of an RFID reader takes it to walk around a supermarket car park coming closer 26 00:02:15,900 --> 00:02:23,360 to the cars he's able to view the bought items that are inside RFID is wide popularity does not ensure 27 00:02:23,360 --> 00:02:24,250 it is safe. 28 00:02:26,350 --> 00:02:30,820 You should remember that there are risks and threats connected to this technology that might be exploited 29 00:02:30,820 --> 00:02:38,580 by attackers The same is true of near-field communication NFC. 30 00:02:38,640 --> 00:02:41,980 It's usually used in an active passive communication mode. 31 00:02:42,830 --> 00:02:48,400 This means that a near-field communication plan doesn't have the power source of its own NFC. 32 00:02:48,410 --> 00:02:52,310 Clients include for example the increasingly popular proximity cards.