Why "hard to bypass" would be a sufficient thing? It depends on the technology used to connect the two phones. Bypassing this process can range from "easy" to "quite complicated", but it remains possible. Once the security is compromised, the entire network loses its core value since a single interaction is enough to establish a permanent connection.
[dead]