Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] liberationtech Digest, Vol 172, Issue 4

John Ohno john.ohno at gmail.com
Mon Sep 16 12:55:12 PDT 2013


> Yep, I'm aware of those baseband attacks. To carry them out you need
> access to a Node-B (telecoms equipment mobile phones connect to), real or
> simulated, and advertise to the device to attach to it.

Travis Goodspeed's packet-in-packet attack could probably handle this, and
doesn't require a radio. I'd be suspicious of any claim that you need
hardware to exploit a known vulnerability -- even if it's a physical layer
vulnerability.
-- 
--
John Ohno
http://firstchurchofspacejesus.blogspot.com/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20130916/f79a7be8/attachment.html>


More information about the liberationtech mailing list