{"id":115060,"date":"2009-12-30T10:26:01","date_gmt":"2009-12-30T15:26:01","guid":{"rendered":"8988 at http:\/\/www.precentral.net"},"modified":"2009-12-30T10:26:01","modified_gmt":"2009-12-30T15:26:01","slug":"gsm-call-encryption-code-cracked-posted","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/115060","title":{"rendered":"GSM call encryption code cracked, posted"},"content":{"rendered":"<p class=\"rtecenter\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"242\" alt=\"Hamburglar\" class=\"lightbox2\" src=\"http:\/\/www.precentral.net\/sites\/precentral.net\/files\/articleimages\/Derek%20Kessler\/2009\/12\/hamburglar.jpg\" \/><\/p>\n<p>If there&rsquo;s one thing that we seem to take for granted with our smartphones, it&rsquo;s the fact that the only people that get to listen to our conversations are the fuzz and their wiretaps. But that all has the potential to change, at least if you&rsquo;re on GSM, as the <a href=\"http:\/\/www.nytimes.com\/2009\/12\/29\/technology\/29hack.html\">New York Times<\/a> has noted that industrious German computer engineer Karsten Nohl has deciphered the encryption algorithm used by the 3.5 billion GSM phones in the world. Nohl essentially force fed random strings of numbers to crack open the 21-year-old 64-bit A5\/1 encryption algorithm. And he&rsquo;s published the code online for torrenting fun.<\/p>\n<p>So what does this mean? Two things. One: Having the code alone is not enough to eavesdrop on a specific conversation. Cracking into the algorithm only exposes the streaming torrents of digital data, one still has to be able to pick out the desired call. Of course, there may very well be software to accomplish that task as well. Two: Carriers need to update their encryption algorithms stat. Simply changing to a different 64-bit algorithm won&rsquo;t stop a similar cracking attempt, as it would be just as vulnerable as the current code. The GSM Association has had a 128-bit A5\/3 algorithm available since 2007, but carriers have been slow to implement the more secure code. We hope that&rsquo;s going to start changing really quickly.<\/p>\n<p>[via: <a href=\"http:\/\/www.engadget.com\/2009\/12\/29\/gsm-call-encryption-code-cracked-published-for-the-whole-world\/\">Engadget<\/a>]<\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/Precentralnet?a=aNAFQkL8vFk:xDFcoqjsKYM:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Precentralnet?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Precentralnet?a=aNAFQkL8vFk:xDFcoqjsKYM:7Q72WNTAKBA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Precentralnet?d=7Q72WNTAKBA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Precentralnet?a=aNAFQkL8vFk:xDFcoqjsKYM:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Precentralnet?i=aNAFQkL8vFk:xDFcoqjsKYM:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Precentralnet?a=aNAFQkL8vFk:xDFcoqjsKYM:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Precentralnet?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/Precentralnet\/~4\/aNAFQkL8vFk\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If there&rsquo;s one thing that we seem to take for granted with our smartphones, it&rsquo;s the fact that the only people that get to listen to our conversations are the fuzz and their wiretaps. But that all has the potential to change, at least if you&rsquo;re on GSM, as the New York Times has noted [&hellip;]<\/p>\n","protected":false},"author":666,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-115060","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/115060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/666"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=115060"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/115060\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=115060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=115060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=115060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}