Skip to main content

Questions tagged [cellular]

Cellular wireless systems, e.g., GSM, UMTS, LTE, 5G

1 vote
0 answers
104 views

Caller hijacking in Croatia [closed]

I got this issue today and I'm completely confused. Here is the story: I'm from Germany and on vacation in Croatia (all inside the EU with EU Roaming) with my German cellphone and German sim card. I ...
m4rc0's user avatar
  • 11
0 votes
1 answer
2k views

Can an employer track phone activity without a company SIM and without MDM?

Been looking for a phone upgrade and my dad has an iPhone (iPhone 13) given to him by his work, which he doesn’t use anymore. He offered to let me use it on the condition that the company can’t see ...
StaticSnow's user avatar
1 vote
0 answers
87 views

Swatting police/fire from someone else's cellphone... possible? [closed]

Scenario- calls for 911 service are being made from the cell phone belonging to a young adult. These calls show as outgoing calls on the cell call log (and texts). These have been occurring for over a ...
Brent's user avatar
  • 11
3 votes
0 answers
476 views

Cell tower to cell phone encrypted communication

I have done some search here but I can't understand how phones and antennas share the keys used for encryption and decryption. As far as I understand, mobile phones today use LTE i.e 4G (sometimes ...
Mah Neh's user avatar
  • 35
1 vote
2 answers
312 views

Is an attacker living close by able to identify my name and spoof my phone number by intercepting SMS messages?

As I read here and there, it seems like SMS isn't encrypted. Let's say I live in an appartment building. If someone uses a cellular modem to intercept my SMS messages, can they determine my name from ...
user123's user avatar
  • 111
0 votes
1 answer
124 views

VOIP call encryption

Regarding voice over IP, I'm trying to understand how vulnerable it is to someone intercepting one or both sides of the audio. Logically, it seems like there are 3 "legs" to each ...
whitelightning's user avatar
0 votes
2 answers
591 views

Implementing geo-location factor for authentication

I recently had an idea about this: Why is the geo-location not used as authentication to ensure ownership of an account/login in addition to a password? This would work over GPS which is quite precise ...
birdd's user avatar
  • 41
1 vote
0 answers
101 views

How would a cellular phone call be connected if there are two phones with the same number? [closed]

In the 2004 movie "Primer", the a character goes back in time, and there are two copies of him, both with a cell phone. The character receives a phone call initially, and then receives the ...
TechnoSam's user avatar
  • 119
0 votes
1 answer
181 views

If I create a ServerSocket on Android without specifying an IP to bind to, is it safe to assume this port is unreachable via the cellular network?

I'm using ServerSocket to create a listening port on Android, so that other clients in my local network can connect to it while the phone is providing a personal hotspot. I probably can't specify the ...
Johannes Bittner's user avatar
2 votes
1 answer
7k views

How do "track a phone location by IMEI" websites and apps work

There are some websites and apps promising (I have not tested their claims, just accidentially saw such a service on some website about phones and apps for them) to show phone location on a map given ...
KOLANICH's user avatar
  • 900
1 vote
1 answer
230 views

Can you impersonate someone on a cell phone network if you can get them to enter a magic code?

I just got weird warning on a social network about a scam that is supposedly making the rounds. However the claims were quite outlandish and I'm skeptical if it's even technically possible. If the ...
Vilx-'s user avatar
  • 1,050
1 vote
1 answer
567 views

Is there a thing as a small bag which BOTH blocks signals AND sound for securing a mobile phone on the go? [closed]

I've been hunting for this for a long time. I've been able to find "Faraday" bags that (allegedly) block signals to/from the surveillance unit (phone), but they never mention anything about ...
L. H.'s user avatar
  • 11
0 votes
2 answers
223 views

What makes this cellphone (and the weird instructions) so privacy-friendly?

I stumbled upon this weird product in a webstore primarily selling Cannabis-related products (not the actual herbs): https://smoketower.com/nyheter/Anonym-3310-mobiltelefon I've manually translated ...
M. U.'s user avatar
  • 1
1 vote
1 answer
593 views

How is security handled between mobile carriers when using roaming

When using 4g or other cellular networks, while roaming, mobile carriers transfer data between each other, something I've seen refered to as "ITS: Internation Transit Service" how does that ...
Jim Wolff's user avatar
  • 131
1 vote
2 answers
692 views

Why are IMSI and IMEI still used?

While I understand their function, both IMSI and IMEI makes tracking and surveillance possible by virtue of being persistent idenfitiers for SIM and handset, respectively. Why aren't these replaced ...
Eivind Arvesen's user avatar

15 30 50 per page