lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <533431D5.8000506@niksula.hut.fi> Date: Thu, 27 Mar 2014 15:12:37 +0100 From: † <god12@...sula.hut.fi> To: fulldisclosure@...lists.org Subject: Re: [FD] Android IMSI-Catcher Detector (AIMSICD) Interesting effort indeed. Your README in https://github.com/SecUpwN/Android-IMSI-Catcher-Detector states that "In addition they can all crack the A5.1-3 encryption on the fly!" - could you provide any references to back this claim? To the best of my knowledge there is no "on-the-fly" cracking for A5/3 yet. I'd be happy to learn otherwise :) thanks, Max. _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/