I'm guessing its more the latter (send an error an then use the result to deduce the key) That being the case, then someone duplicating the Raspberry Pi micro cell site could passively attack any phone that came within range.
Makes you wonder if the FBI snooping cell tower already does this :-)
Makes me wish I had the burner phone concession at DefCon.
Makes you wonder if the FBI snooping cell tower already does this :-)
Makes me wish I had the burner phone concession at DefCon.