Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment TFA is incomplete/incorrect. (Score 0) 299

Does anyone have a link to the Chaos Computer Club presentation?

A5/1 and A5/3 are Authentication Algorithms and not ENCRYPTION/Decryption. The Ciphering Encryption Algorithm for GSM/GPRS is either gea1, gea2 and gea3.

In the United States, a certain 3 letter network operator specifically forces the newer authentication algorithms to be disabled

Comment Re:Flying the false flag (Score 1, Interesting) 586

I must respectfully disagree with a number of your points.

possession of kiddie porn is just another thought crime and prosecuting it is complete hypocrisy.

The act of possession means it is no longer a thought crime. It is a crime in the United States to even view an image of Child Pornography.

The politicians like it because it is 1000x easier to prosecute someone for having a copy of kiddie porn than it is to catch and prosecute the people manufacturing it.

There are ways to catch the manufacturer, but what other freedoms will be lost in the balance. Shall we have to provide ID to buy a Camera?

Comment Re:Another failure to evaluate relevant concerns (Score 2, Informative) 501

A couple of points need to be clarified in your comment.

  • HSPA is still referred to as 3G. Specifically, it refers to the R6 version of the 3GPP standards.
  • HSPA+ is a technology being rolled out now (I believe Bell Mobility in Canada). There are devices that will be commercial very shortly that support 21Mbps in the forward link (down link).
  • AT&T has made the specific decision to not migrate to HSPA+ (R7) and will not offer more than 7.2 Mbps

Comment Re:what it means (Score 3, Informative) 141

1. In GSM/UMTS, The encryption keys are stored on the SIM/USIM and never transmitted over the air. There are two parameters passed to the MS/UE which calculates and returns a value to the network. If the two values don't match, the authentication process fails.

2.) Again, There is the issue of knowing the keys. The IMSI/TMSI/PTMSI is not enough information to successfully intercept a call. I can setup an entirely fake network for Mobile to Mobile calls, and if both mobiles are on my network, I can turn off authentication and ciphering and have complete access to the call.

3.) Private Keys are stored on the SIM/USIM

Don't get me wrong, A number of security issues still remain with Wireless Networks, but they do have a few security measures.

Comment Re:what it means (Score 4, Informative) 141

I am going to speak in regards to GSM and UMTS networks as I know the protocol

There are security messages in Wireless Networks. There is Authentication and Ciphering in GSM/GPRS/EDGE/WCDMA/HSPA/HSPA+. In addition, there is integrity protection of signalling messages in WCDMA/HSPA,HSPA+ networks. There are a few messages which can not be ciphered/integrity protected for obvious reasons such as the initial Location Update Request/Attach Request. Yes, certain authentication algorithms have been compromised GSM A5/2. It has been superceeded by A5/3.

It is true that malware has made it onto cellular devices (Blackberry in UAE and Symbian come to mind). It is almost impossible for someone to remotely access the phone without such software existing on the device for voice frames.

Yes, the redirecting of packets/frames is a legal requirement in many jurisdictions. It usually has to be accompanied with a warrant from a relevant law enforcement agency otherwise the specific phone company employee faces criminal charges. The usual redirection is done in the MSC or SGSN and I have never seen a case where it was done at the basestation.

Comment The test seems to be bogus (Score 5, Informative) 108

Disclaimer: I work for a Data Card Manufacturer

Without the actual procedure for the tests, it is difficult to say if PCWorld'ss are any good. I am not familiar with the software used as no major industry provider uses it. The standard tool in the industry is Windcatcher

It really depends on the way the test is run. The problem actually relates to the TcpWindowSize as it should be increased to at least 128Kb for HSPA based networks and for CDMA as well.

Another major issue is that Data Cards don't inherently support streaming. Streaming is often used as a secondary PDP context and this will have a major negative effect. Were they in a handover region or not? On HSPA, every other cell is an interferer so throughput should be measured with a Single Carrier in the active set. It is still possible to be in a handover zone while in a parked car.

Did they use the carrier supplied good coverage locations? Randomly may not cross the panaroma of RSSI.

As well, the latest modem from Novatel Wireless is the USB760. I also believe the latest Sierra Wireless card is the compass something or other. Did they use a Y Cable? Did they use an external antenna? What model of PC did they use as TRP/TIS makes a huge difference in low coverage areas?

Without more data, I would still say there isn't sufficient evidence to form any conclusions from their article.

Comment Re:Get ready for Jitterbug handsets (Score 1) 234

Working in the industry, I can tell you phones have a really really short design period. Typically the design starts around 9 months before commercial availability.

If the Iphone had fizzled, all Smart phone projects would have been killed.

We actually have caught up to Japan for the most part. There are other technologies at play depending on the region in the east (CDMA, WiBro, WiMAX), but WiMax is dying

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...