[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: GSM cellphones cloned
On Tue, 21 Apr 1998, Yupin Mungdee wrote:
> Lucky Green wrote:
> >A technical description of the attack is at
> >http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html
>
> Does the attack work if the SIM is protected by an unknown PIN code?
A software-only attack with the SIM in a reader will of course not work if
the SIM is pin protected. A hardware attack on the SIM might work. As
would an over-the-air attack, since the user has to unlock the SIM to use
the phone.
-- Lucky Green <[email protected]> PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"