Changes

no edit summary
Line 1: Line 1:  +
==Disclaimer==
 +
 +
[[File:Alert.png|left|link=]] <br> If you are not using Bluetooth, '''please consider turning it off''' or '''change Bluetooth PIN''' to remove potential risks.
 +
 +
If you are using Bluetooth we strongly recommend '''using AES encryption''' for enhanced security.
 +
 +
 
==Solution description==
 
==Solution description==
 
GPS trackers provide valuable data for business efficiency and secure vehicles against thefts. At the same time, the tracking devices can be stolen with a purpose to sell them, sabotaged by reconfiguring with fault parameters, or hacked to steal sensitive data. To prevent unauthorized access to the trackers, it is necessary to have additional security measures for logging in through all possible devices. When a login fails, the user is denied access and trackers remain safe.
 
GPS trackers provide valuable data for business efficiency and secure vehicles against thefts. At the same time, the tracking devices can be stolen with a purpose to sell them, sabotaged by reconfiguring with fault parameters, or hacked to steal sensitive data. To prevent unauthorized access to the trackers, it is necessary to have additional security measures for logging in through all possible devices. When a login fails, the user is denied access and trackers remain safe.
Line 114: Line 121:     
All preparation describe in the [https://wiki.teltonika-gps.com/wikibase/images/4/4e/FMBXX_TLSDTLS_encryption_configuration_v0.3.pdf TLS/DTLS prepare guide] in the device you need activate this
 
All preparation describe in the [https://wiki.teltonika-gps.com/wikibase/images/4/4e/FMBXX_TLSDTLS_encryption_configuration_v0.3.pdf TLS/DTLS prepare guide] in the device you need activate this
  −
==Disclaimer==
  −
  −
[[File:Alert.png|left|link=]] <br> If you are not using Bluetooth, '''please consider turning it off''' or '''change Bluetooth PIN''' to remove potential risks.
  −
  −
If you are using Bluetooth we strongly recommend '''using AES encryption''' for enhanced security.
         
[[Category: Usage scenarios]]
 
[[Category: Usage scenarios]]
 
[[Category: Use cases]]
 
[[Category: Use cases]]

Navigation menu