{"id":111291,"date":"2009-12-29T11:55:10","date_gmt":"2009-12-29T16:55:10","guid":{"rendered":"http:\/\/kempton.wordpress.com\/?p=8612"},"modified":"2009-12-29T11:55:10","modified_gmt":"2009-12-29T16:55:10","slug":"gsm-mobile-phone-security-cracked-says-german-hacker","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/111291","title":{"rendered":"GSM Mobile phone security cracked, says German hacker"},"content":{"rendered":"<div class='snap_preview'><\/p>\n<p>UK Guardian is <a title=\"http:\/\/www.guardian.co.uk\/technology\/2009\/dec\/29\/gsm-mobile-algorithm-cracked-nohl\" href=\"http:\/\/www.guardian.co.uk\/technology\/2009\/dec\/29\/gsm-mobile-algorithm-cracked-nohl\" >reporting<\/a> (emphasis added),<\/p>\n<blockquote>\n<p><strong> A German computer scientist has cracked the codes used to encrypt calls made from more than 80% of the world&#8217;s mobile phones.<\/strong><\/p>\n<p><strong>Karsten Nohl [K: Nohl&#8217;s <a title=\"http:\/\/www.cs.virginia.edu\/~kn5f\/\" href=\"http:\/\/www.cs.virginia.edu\/~kn5f\/\" >U of Virginia page<\/a>] and his team of 24 hackers began working on the security algorithm for GSM (Global System for Mobiles) in August.<\/strong><\/p>\n<p>[&#8230;] Nohl claims that armed with the code, which has been published online, and a laptop with two network cards, <strong>an eavesdropper could be recording phone calls within 15 minutes.<\/strong><\/p>\n<p>&#8220;This shows that existing GSM security is inadequate,&#8221; Nohl told the Chaos Communication Congress, an international annual meeting of hackers taking place in Berlin this week.<\/p>\n<p><strong>Nohl insisted that he had deciphered the code to force the global telecommunications industry to upgrade its security.<\/strong><\/p>\n<p>Nohl told the Guardian that important negotiations involving politicians or business leaders could easily be intercepted and they should invest in further encryption software to protect their privacy. <strong>&#8220;If there is anything secret going on using GSM, this should be of concern.&#8221;<\/strong><\/p>\n<\/blockquote>\n<p>More report in <a title=\"http:\/\/www.nytimes.com\/2009\/12\/29\/technology\/29hack.html\" href=\"http:\/\/www.nytimes.com\/2009\/12\/29\/technology\/29hack.html\" >NYT<\/a> and <a title=\"http:\/\/www.theregister.co.uk\/2009\/12\/28\/gsm_eavesdropping_breakthrough\/\" href=\"http:\/\/www.theregister.co.uk\/2009\/12\/28\/gsm_eavesdropping_breakthrough\/\" >The Register<\/a>.<\/p>\n<p>Anyone who cares about our communication security based on <a title=\"http:\/\/en.wikipedia.org\/wiki\/Cryptography\" href=\"http:\/\/en.wikipedia.org\/wiki\/Cryptography\" ><strong>Cryptography<\/strong><\/a> should know that <strong>the only way to keep our communication secure is to conduct open and active research in the field<\/strong> where weakness and problems are dealt with in a prompt and appropriate manner. <strong><a title=\"http:\/\/en.wikipedia.org\/wiki\/Security_through_obscurity\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security_through_obscurity\" >Security through obscurity<\/a><\/strong> is NOT an option, and if I were less diplomatic, I would say it is plain stupid to rely our treasured security on\u00a0<a title=\"http:\/\/en.wikipedia.org\/wiki\/Security_through_obscurity\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security_through_obscurity\" ><strong>obscurity<\/strong><\/a>.<\/p>\n<p>Posted in Cryptography, Math, Telecom, World  <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gocomments\/kempton.wordpress.com\/8612\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/comments\/kempton.wordpress.com\/8612\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/godelicious\/kempton.wordpress.com\/8612\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/delicious\/kempton.wordpress.com\/8612\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/gostumble\/kempton.wordpress.com\/8612\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/stumble\/kempton.wordpress.com\/8612\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/godigg\/kempton.wordpress.com\/8612\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/digg\/kempton.wordpress.com\/8612\/\" \/><\/a> <a rel=\"nofollow\" href=\"http:\/\/feeds.wordpress.com\/1.0\/goreddit\/kempton.wordpress.com\/8612\/\"><img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/feeds.wordpress.com\/1.0\/reddit\/kempton.wordpress.com\/8612\/\" \/><\/a> <img decoding=\"async\" alt=\"\" border=\"0\" src=\"http:\/\/stats.wordpress.com\/b.gif?host=kempton.wordpress.com&#038;blog=364107&#038;post=8612&#038;subd=kempton&#038;ref=&#038;feed=1\" \/><\/div>\n","protected":false},"excerpt":{"rendered":"<p>UK Guardian is reporting (emphasis added), A German computer scientist has cracked the codes used to encrypt calls made from more than 80% of the world&#8217;s mobile phones. Karsten Nohl [K: Nohl&#8217;s U of Virginia page] and his team of 24 hackers began working on the security algorithm for GSM (Global System for Mobiles) in [&hellip;]<\/p>\n","protected":false},"author":841,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,14],"tags":[],"class_list":["post-111291","post","type-post","status-publish","format-standard","hentry","category-news","category-telecom"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/111291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/841"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=111291"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/111291\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=111291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=111291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=111291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}