Skip to main content

Questions tagged [gsm]

a standard developed by the European Telecommunications Standards Institute for the second generation of digital cellular networks, used by mobile phones. It is the default global standard for mobile communications.

1 vote
0 answers
54 views

How to verify authentication tag during chunked AES-GSM-128 decryption

Due to there are large encrypted files we are dealing with, we can't afford to keep entire file in memory during a decryption process. I've implemented the algorithm of chunked decryption of AES GSM ...
Lesha Pipiev's user avatar
0 votes
1 answer
112 views

Do 5G cellular kits than are connected to SBC, support encryption when the signal goes via them to the wifi?

I have seen around some 5G cellular kits that can be connected to SBC (Single Board Computers) in order to make a WIFI hotspot. From the one side, they provide 5G cellular connection and from the ...
user958473's user avatar
2 votes
0 answers
161 views

Are phone calls via WiFi VOIP encrypted by A5/1, A5/2, and A5/3?

I have enabled a function in my mobile phone, that uses my home Wi-Fi network to make calls when the cellular signal does not exist. As far as I know, the cellphone provider charges me as though I ...
user958473's user avatar
3 votes
0 answers
476 views

Cell tower to cell phone encrypted communication

I have done some search here but I can't understand how phones and antennas share the keys used for encryption and decryption. As far as I understand, mobile phones today use LTE i.e 4G (sometimes ...
Mah Neh's user avatar
  • 35
0 votes
1 answer
209 views

How is the stream cipher key shared on GSM?

I read that phones encrypt communication (GSM as implemented in 2G,3G..) - particularly voice as SMS are unencrypted - using a stream cipher. Symmetric Stream ciphers use the flip-flop machinery to ...
Mah Neh's user avatar
  • 35
2 votes
1 answer
637 views

Reporting dual sim phone stolen [closed]

A burglar took my phone so I reported it to the police and phone company to blacklist it. They only asked for the first IMEI even though the phone has two IMEI since it can accomodate two SIMs. The ...
Bruno Martinez's user avatar
0 votes
1 answer
161 views

Can a wifi Access Point be reconfigured to receive other radio signals?

Say we have a remote transmitter that is not connected to a wifi router (neither wirelessly nor by cable), but which transmits information using electromagnetic waves. Examples include walkie-talkies, ...
RLR's user avatar
  • 1
1 vote
1 answer
170 views

Security assessment of a legacy SSL/TLS implementation on an IoT device

I am doing a security assessment on the communication security of a legacy IoT device. The objective is to assess and find security gaps in the current design/implementation. The mode of assessment is ...
Akhilesh Gupta's user avatar
2 votes
1 answer
4k views

Is inputting credit card numbers over a mobile phone secure?

I'm in the UK. In order to top up a pay-as-you-go SIM card, I had to first ring the mobile network to associate my bank card with the SIM before asking them to credit £10 to it (future top-ups don't ...
Hashim Aziz's user avatar
4 votes
3 answers
647 views

2-step authorization (using SMS) is less secure than having 2-factor disabled at all!

I've been thinking about this subject, and found paradoxical fact. Having a service that has 2-step authorization using SMS might become more harmful and open vulnerability hole (read SMS can be ...
T.Todua's user avatar
  • 2,727
1 vote
1 answer
313 views

GSM encryption/decryption algorithms

I have seen around the internet devices like this: https://www.cryptophone.de/ and software that reinforce the security on cellphones. My question is simple, since the cellphones use A5/1, A5/2, A5/3 ...
user958473's user avatar
0 votes
1 answer
115 views

A SIM module-based security system and radio signal interruptions

I would like to setup a simple alarm system using something like a Raspberry Pi or Arduino, some sensors, and a SIM module to send me an alarm when an intrusion is detected. If I were dealing with an ...
user942937's user avatar
2 votes
1 answer
2k views

What is more safe: 3g/4g or public wifi?

The scenario is: John is out of home and, using his smartphone, he need to send some messages from Whatsapp, use Facebook's app and do some bank operations. Since I have read this and this topics, I'...
Mycroft's user avatar
  • 768
1 vote
1 answer
38k views

Getting called from hidden caller ID, what are the dangers if I answer?

My girlfriend has been getting calls on her iPhone from a hidden caller ID for several days in a row now. She has not answered any of them because we figured it can't be anything good if it's hidden. ...
Chooba's user avatar
  • 13
1 vote
0 answers
898 views

What are the dangers of using 3g/4g in smartphones?

Since we should always avoid public networks, is there some sort of attack that intercept my online activity or steal passwords when I'm using 3g/4g? If exists, how I can protect myself from this type ...
Mycroft's user avatar
  • 768

15 30 50 per page
1
2 3 4 5
7