[145581] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: GSM eavesdropping

daemon@ATHENA.MIT.EDU (Adrian Hayter)
Mon Aug 2 12:00:56 2010

From: Adrian Hayter <adrianhayter@gmail.com>
In-Reply-To: <9438EAC2-9830-43CF-9AF7-5501EB779A9A@old-ones.com>
Date: Mon, 2 Aug 2010 16:55:04 +0100
Cc: cryptography@metzdowd.com
To: Bill Squier <groo@old-ones.com>

In a related story, hacker Chris Paget created his own cell-phone base =
station that turned off encryption on all devices connecting to it. The =
station then routes the calls through VoIP.

http://www.wired.com/threatlevel/2010/07/intercepting-cell-phone-calls/

-Adrian

On 2 Aug 2010, at 16:02, Bill Squier wrote:

> "...In his presentation at the Black Hat Conference, German GSM expert =
Karsten Nohl presented a tool he calls Kraken, which he claims can crack =
the A5/1 encryption used for cell phone calls within seconds."
>=20
> =
http://www.h-online.com/security/news/item/Quickly-decrypting-cell-phone-c=
alls-1048850.html
>=20
> -wps
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to =
majordomo@metzdowd.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post