[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: GSM cellphones cloned



On Tue, 21 Apr 1998, Yupin Mungdee wrote:

> Lucky Green wrote:
> >A technical description of the attack is at
> >http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html
> 
> Does the attack work if the SIM is protected by an unknown PIN code?

A software-only attack with the SIM in a reader will of course not work if
the SIM is pin protected. A hardware attack on the SIM might work. As
would an over-the-air attack, since the user has to unlock the SIM to use
the phone.

-- Lucky Green <[email protected]> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"