this post was submitted on 12 Aug 2024
703 points (99.2% liked)
Memes
45560 readers
836 users here now
Rules:
- Be civil and nice.
- Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Yeah. Why not?
Because it drains your battery like you poked a hole in it?
Did you get your battery saving advice from 15 years ago?
It shouldn't be draining like that, at least...
Even if you turn it off the radio is still powered on and scanning in the background (wifi too), unless you specifically disable that as well. The battery drain is negligible
I never really thought about it because I use Bluetooth about once month at best. Still, leaving it on when I don't need it seems silly. But maybe it only does when you don't need it again a few minutes later.
it can be a security issue leaving it on. also can drain battery as its occasionally pinging for nearby devices.
So is literally any communication standard on your phone...just turn off wifi, nfc, cellular network and Bluetooth then you'll be safe
the protocols on how Bluetooth is handled is far different than the ones how wifi is handled, same as NFC and cellular. to equate all their security as "the same" is very dismissive, especially comparing to wifi and cellular which typically arent direct device to device connections.
nfc dodges its problems because its for the most part off until you open an app that uses it, so its already doing what a user should be doing for security reasons.
Nah, my sentiment is more like if man can make it man can break it...imei cloning, arp poisoning, relay attack...anything broadcast willy nilly everywhere is as much of a security risk if you are concerned about bluetooth exploits...
again, its diminishing the security features of the different forms of communication. one (likely) requires connecting to a secondary powered device, likely with a 10 key minimum password length of various characters or a series of login prompts. the other is a protocol which connects either by pairing or a 4 digit pin... just because security exploits exists for all connections doesnt mean all communication standards have equivalent security risk.