{"id":184821,"date":"2010-01-15T14:54:13","date_gmt":"2010-01-15T19:54:13","guid":{"rendered":"http:\/\/www.mobilecrunch.com\/?p=24979"},"modified":"2010-01-15T14:54:13","modified_gmt":"2010-01-15T19:54:13","slug":"3g-gsm-crypto-hacked","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/184821","title":{"rendered":"3G GSM crypto hacked"},"content":{"rendered":"<p><a href=\"http:\/\/www.mobilecrunch.com\/wp-content\/uploads\/2010\/01\/lastfm_haxor.gif\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.mobilecrunch.com\/wp-content\/uploads\/2010\/01\/lastfm_haxor.gif\" alt=\"lastfm_haxor\" title=\"lastfm_haxor\" width=\"140\" height=\"186\" class=\"alignright size-full wp-image-24980\" \/><\/a>Bloops. Researchers have figured out how to crack 128-but UMTS 3G technology, thereby putting almost all modern phones in danger. <a HREf=\"http:\/\/eprint.iacr.org\/2010\/013\">The paper, found here<\/a> basically describes a 2-hour process and is more a proof-of-concept than anything else. However, it could be used to listen to conversations after the fact.<br \/>\n<span id=\"more-24979\"><\/span><br \/>\nAs you&#8217;ll recall, <a HREF=\"http:\/\/www.crunchgear.com\/2009\/12\/29\/g-s-m-encryption-hacked\/\">old-fashioned G.S.M.<\/a> was hacked a few weeks ago and with 3G down for the count there&#8217;s not much left to hide behind except good old security by obscurity. That said, I suggest we all learn Navaho like in <i>Windtalkers<\/i>.<\/p>\n<p><a HREF=\"http:\/\/gizmodo.com\/5448936\/3g-transmissions-cracked-run-for-the-hills\">via Giz<\/a><\/p>\n<p><strong><em>Crunch Network<\/em><\/strong>:  <a href=\"http:\/\/www.crunchgear.com\">CrunchGear<\/a><em> <\/em>drool over the sexiest new gadgets and hardware.<\/p>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/5ZcaWVq-TObhXIXELiA9ESBWOb8\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/5ZcaWVq-TObhXIXELiA9ESBWOb8\/0\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/5ZcaWVq-TObhXIXELiA9ESBWOb8\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/5ZcaWVq-TObhXIXELiA9ESBWOb8\/1\/di\" border=\"0\" ismap=\"true\"><\/img><\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?a=r_f7PgfNvV0:a4NTPnGxiGg:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?i=r_f7PgfNvV0:a4NTPnGxiGg:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?a=r_f7PgfNvV0:a4NTPnGxiGg:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?i=r_f7PgfNvV0:a4NTPnGxiGg:F7zBnMyn0Lo\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?a=r_f7PgfNvV0:a4NTPnGxiGg:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Mobilecrunch?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Bloops. Researchers have figured out how to crack 128-but UMTS 3G technology, thereby putting almost all modern phones in danger. The paper, found here basically describes a 2-hour process and is more a proof-of-concept than anything else. However, it could be used to listen to conversations after the fact. As you&#8217;ll recall, old-fashioned G.S.M. was [&hellip;]<\/p>\n","protected":false},"author":701,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-184821","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/184821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/701"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=184821"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/184821\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=184821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=184821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=184821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}