Use this tag for questions involving the use of fourth generation (4G) broadband cellular network technology.
Questions tagged [4g]
11 questions
38
votes
3 answers
Does Lawful Interception of 4G / the proposed 5G provide a back door for hackers as well?
A common saying among people in the field of cryptography and security is that when providing a back door to law enforcement, you also provide a back door for hackers.
I was trying to examine the implementation of Lawful Interception from 4G and the…
finks
- 467
- 4
- 4
10
votes
1 answer
Cellular encryption algorithms currently in use globally
I have been doing research on the available encryption algorithms used by commercial mobile providers worldwide, and would like to know if the following list is complete:
Algorithms for voice encryption:
A5/1: the "original" unweakened GSM…
Nasrus
- 1,250
- 12
- 13
3
votes
3 answers
Is possible to eavesdrop on mobile data from cellphones/dongles?
It is possible to to crack WiFi either WPA2/PSK or WPA. But is it possible to somehow eavedrop/observe the signal from dongles or internet that is there on the phones ? Sort of a packet capture but for cellular internet. And if capture of that…
ng.newbie
- 265
- 2
- 6
2
votes
1 answer
What are the threat models that using a VPN for mobile data can mitigate?
Some VPN providers offer to encrypt mobile data. This goes beyond the typical Wifi hotspot mitigation paradigm.
So what exactly are the benefits of VPN over mobile data? What threat models can this mitigate? Does this depend on the protocol? (I…
Scribe
- 23
- 2
1
vote
1 answer
4G Pocket WiFi - IMSI Catcher?
Nearly all mobile phones are vulnerable to IMSI catcher attack's fake mobile networks. They can access storage, inject rootkits/backdoors, turn the microphone on view internet traffic even with a VPN in use. Conduct MITM attacks.
They all have bad…
Alister
- 77
- 3
- 14
1
vote
0 answers
Device location in LTE/GSM packets?
I'd like to know if any of the LTE or GSM packets have the GPS coordinates of a given device or any information about its geolocation. I mean, there must be a way to locate devices (maybe triangulation from 3 base stations) so I wonder if this…
Natiya
- 111
- 2
1
vote
0 answers
General mobile broadband security questions
I'm thinking about whether or not to get a mobile(3G/4G) broadband router, but I need to know a few things about them.
How secure are they?
If an attacker were to put up a femtocell/rogue cell tower close by, what kind of attacks are possible?
How…
newb54
- 11
- 2
0
votes
2 answers
If I am trying to clean install a MacOS with internet recovery, is it safer to use mobile network than WIFI network?
I just clean installed my MacOS Catalina on my MacBook due to virus on my PC that I worried got on my MacBook via usb file transfer.
I did an internet recovery to reinstall MacOS Catalina with my home WiFi network, with password protected. However,…
Ecotistician
- 147
- 6
0
votes
1 answer
Will ISP see my router MAC address? connection by 4g USB modem
Question is similar to Will my USB modem send my MAC address to my ISP? but not exacly.
I have router dwr-116 and usb 4G modem which is connected to this router.
Will ISP see dwr-116 mac address? or will ISP see only 4g modem IMEI ?
I think that ISP…
ared20
- 1
0
votes
1 answer
Can a cellular base station be accessed from within the 4g network it provides?
Cellular base stations can be accessed directly via the internet for maintenance purposes, they have control ports such as ports 5700, 5701, 5702.
What I'm wondering is if I connect my device to the 4g network a cellular base station provides can…
0
votes
2 answers
IMSI catcher vs MiTM attack
On reading about IMSI catchers, it is almost always mentioned together with MITM attacks, i.e. as if IMSI catchers are same as MITM.
But from my understanding, IMSI catchers and MITM are not the same thing:
IMSI catcher - as its name hints - only…
ransh
- 515
- 6
- 11