Total surveillance: hacking GSM networks over the air
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
3 articles
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
Recently engineers who have been working to improve legacy cellular technologies, were stricken with a thought: “Why would one need a SIM card, if it’s nothing more than a protected data
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards