Mobile phones used as trackers

David Miller dm0 at avana.net
Tue Jan 6 08:10:03 PST 1998



Loren J. Rittle wrote:

> If you assume your attacker is capable of (4), (5) and similar tricks
> and you have something to hide, then I suppose turning your SU off and
> on is a wise course of action.

Another attack that was recently described to me by someone in the industry
is to setup a three-way conversation, which basically is a cellular phone
tap.  The conversation could be split within the cell network to a silent
party more interested in your communications than your location.

--David Miller







More information about the cypherpunks-legacy mailing list