lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: rgerhards at hq.adiscon.com (Rainer Gerhards)
Subject: Israeli boffins crack GSM code

It was in the media over here in Germany some days ago. It seems to be a
fundamental flaw in the GSM design. AFIK, the attacker pretends to be a
GSM base station and can receive the call via a cell handover. Using
this technology, it would also possible to call "in the name of" (with
the caller id of) any victim that comes close enough to the fake base
station. It was said that the GSM providers do not really care because
a) it would be to hard to set up the equipment and b) it would probably
to expensive for the operators to fix this ;)
 
None of this is first-hand knowledge, but it may be helpful...
 
Rainer

	-----Original Message-----
	From: Richard Spiers [mailto:dksaarth@...x.za.net] 
	Sent: Tuesday, September 09, 2003 3:10 PM
	To: full-disclosure@...ts.netsys.com
	Subject: [Full-Disclosure] Israeli boffins crack GSM code
	
	
	Hi guys, anybody got more information on this? Any thoughts?
	 
	http://www.theregister.co.uk/content/55/32653.html

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030909/d94ae5f2/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ