Questions tagged [gsm]
a standard developed by the European Telecommunications Standards Institute for the second generation of digital cellular networks, used by mobile phones. It is the default global standard for mobile communications.
101
questions
1
vote
0
answers
54
views
How to verify authentication tag during chunked AES-GSM-128 decryption
Due to there are large encrypted files we are dealing with, we can't afford to keep entire file in memory during a decryption process.
I've implemented the algorithm of chunked decryption of AES GSM ...
0
votes
1
answer
112
views
Do 5G cellular kits than are connected to SBC, support encryption when the signal goes via them to the wifi?
I have seen around some 5G cellular kits that can be connected to SBC (Single Board Computers) in order to make a WIFI hotspot. From the one side, they provide 5G cellular connection and from the ...
2
votes
0
answers
161
views
Are phone calls via WiFi VOIP encrypted by A5/1, A5/2, and A5/3?
I have enabled a function in my mobile phone, that uses my home Wi-Fi network to make calls when the cellular signal does not exist. As far as I know, the cellphone provider charges me as though I ...
3
votes
0
answers
476
views
Cell tower to cell phone encrypted communication
I have done some search here but I can't understand how phones and antennas share the keys used for encryption and decryption.
As far as I understand, mobile phones today use LTE i.e 4G (sometimes ...
0
votes
1
answer
209
views
How is the stream cipher key shared on GSM?
I read that phones encrypt communication (GSM as implemented in 2G,3G..) - particularly voice as SMS are unencrypted - using a stream cipher.
Symmetric Stream ciphers use the flip-flop machinery to ...
2
votes
1
answer
637
views
Reporting dual sim phone stolen [closed]
A burglar took my phone so I reported it to the police and phone company to blacklist it. They only asked for the first IMEI even though the phone has two IMEI since it can accomodate two SIMs. The ...
0
votes
1
answer
161
views
Can a wifi Access Point be reconfigured to receive other radio signals?
Say we have a remote transmitter that is not connected to a wifi router (neither wirelessly nor by cable), but which transmits information using electromagnetic waves. Examples include walkie-talkies, ...
1
vote
1
answer
170
views
Security assessment of a legacy SSL/TLS implementation on an IoT device
I am doing a security assessment on the communication security of a legacy IoT device. The objective is to assess and find security gaps in the current design/implementation.
The mode of assessment is ...
2
votes
1
answer
4k
views
Is inputting credit card numbers over a mobile phone secure?
I'm in the UK. In order to top up a pay-as-you-go SIM card, I had to first ring the mobile network to associate my bank card with the SIM before asking them to credit £10 to it (future top-ups don't ...
4
votes
3
answers
647
views
2-step authorization (using SMS) is less secure than having 2-factor disabled at all!
I've been thinking about this subject, and found paradoxical fact.
Having a service that has 2-step authorization using SMS might become more harmful and open vulnerability hole (read SMS can be ...
1
vote
1
answer
313
views
GSM encryption/decryption algorithms
I have seen around the internet devices like this: https://www.cryptophone.de/ and software that reinforce the security on cellphones. My question is simple, since the cellphones use A5/1, A5/2, A5/3 ...
0
votes
1
answer
115
views
A SIM module-based security system and radio signal interruptions
I would like to setup a simple alarm system using something like a Raspberry Pi or Arduino, some sensors, and a SIM module to send me an alarm when an intrusion is detected.
If I were dealing with an ...
2
votes
1
answer
2k
views
What is more safe: 3g/4g or public wifi?
The scenario is: John is out of home and, using his smartphone, he need to send some messages from Whatsapp, use Facebook's app and do some bank operations.
Since I have read this and this topics, I'...
1
vote
1
answer
38k
views
Getting called from hidden caller ID, what are the dangers if I answer?
My girlfriend has been getting calls on her iPhone from a hidden caller ID for several days in a row now. She has not answered any of them because we figured it can't be anything good if it's hidden.
...
1
vote
0
answers
898
views
What are the dangers of using 3g/4g in smartphones?
Since we should always avoid public networks, is there some sort of attack that intercept my online activity or steal passwords when I'm using 3g/4g? If exists, how I can protect myself from this type ...