Re: GSM cellphones cloned
Why don't you guys write up the technical details of your hack and post them to the list? Pac Bell, et all can't give you much legal trouble for practicing your constitutional right to free speech. Congrats and keep up the good work!
On Tue, 14 Apr 1998, Dianne Evans wrote:
Why don't you guys write up the technical details of your hack and post them to the list? Pac Bell, et all can't give you much legal trouble for practicing your constitutional right to free speech. Congrats and keep up the good work!
A technical description of the attack is at http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html An academic paper will follow. -- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?"
Lucky Green wrote:
A technical description of the attack is at http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html
Does the attack work if the SIM is protected by an unknown PIN code?
On Tue, 21 Apr 1998, Yupin Mungdee wrote:
Lucky Green wrote:
A technical description of the attack is at http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html
Does the attack work if the SIM is protected by an unknown PIN code?
A software-only attack with the SIM in a reader will of course not work if the SIM is pin protected. A hardware attack on the SIM might work. As would an over-the-air attack, since the user has to unlock the SIM to use the phone. -- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?"
participants (3)
-
Dianne Evans
-
Lucky Green
-
Yupin Mungdee