Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm guessing its more the latter (send an error an then use the result to deduce the key) That being the case, then someone duplicating the Raspberry Pi micro cell site could passively attack any phone that came within range.

Makes you wonder if the FBI snooping cell tower already does this :-)

Makes me wish I had the burner phone concession at DefCon.



Yep, that appears to be the case:

http://www.theregister.co.uk/2013/07/22/mobile_gsm_sim_card_...

An attack similar in spirit to this breaks RADIUS.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: