Questions tagged [cellular]

Cellular wireless systems, e.g., GSM, UMTS, LTE, 5G

Cellular wireless systems, e.g., GSM, UMTS, LTE, 5G -> wireless systems face many of the same information security challenges that wireline systems face.

In addition to that, they face challenges that are unique to wireless, or that are more severe or challenging for wireless than wireline systems. For example, because of mobility, the point of attachment to the network changes from time to time. This makes authentication more challenging. Another example is the broadcast nature of the wireless medium, making communications privacy more of a challenge than in wireline systems.

Use this tag especially where the challenges are of this nature.

54 questions
203
votes
7 answers

How do mobile carriers know video resolution over HTTPS connections?

Verizon is modifying their "unlimited" data plans. Customers in the USA can stream video at 480p -or- pay to unlock higher resolutions (both 720p and +1080p). They are not the only mobile carrier to implement rules like this. If I am on a site that…
raithyn
  • 1,833
  • 2
  • 7
  • 10
68
votes
5 answers

Is a 'dumbphone' mobile more secure for basic phone calls than a smartphone?

By dumbphone I mean: no internet connection, very limited features, etc. By more secure I mean: secure from malicious and direct hacking. I don't mean as in protected from government tapping/snooping; I don't mean from authorities who could be…
infinite-etcetera
  • 760
  • 1
  • 5
  • 10
38
votes
3 answers

Does Lawful Interception of 4G / the proposed 5G provide a back door for hackers as well?

A common saying among people in the field of cryptography and security is that when providing a back door to law enforcement, you also provide a back door for hackers. I was trying to examine the implementation of Lawful Interception from 4G and the…
finks
  • 467
  • 4
  • 4
34
votes
4 answers

Why is GSM still used?

GSMs vulnerabilities have been known a long time now. UMTS was supposed to fix those problems. Why is GSM still used?
kutschkem
  • 666
  • 5
  • 11
10
votes
2 answers

How does mobile free internet bypass works? (UBT / FBT)

I have encountered a mobile application named "HTTP Injector" which lets you get free internet access (UBT / FBT). The process to get it work and receive free internet seems to be as follows: Guidance videos on YouTube show that an end user needs…
timorzainf
  • 101
  • 1
  • 1
  • 3
7
votes
2 answers

How SS7 attack first enter into SS7 network?

I've read the following article about SS7 attack: https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf I have some questions about this kind of attack: Is SS7 attack can be done through regular home ISDN connection ? (not requiring to…
ransh
  • 515
  • 6
  • 11
6
votes
2 answers

Did I stumble upon a cell hidden network or is my device being attacked?

Sorry for the somewhat vague title, it is hard to explain without the pictures as the network I connected to is Chinese (I believe). Note the cell signal in the top left corner and the name of the network carrier it is connected to. I have AT&T as…
nikobradshaw
  • 63
  • 1
  • 5
6
votes
2 answers

Methods to detect calls being routed through Stingray devices?

Are there any methods for a non-jail broken Apple iPhone to detect rogue cellular towers? Such as the "Stingray" device that mimics cellular towers. From the Apple iPhone user's endpoint side, is there any way to detect you are being routed through…
Kamic
  • 693
  • 2
  • 5
  • 20
5
votes
1 answer

Do SS7-based attacks affect landlines?

I am aware of the risks of SS7 for mobile users. Attackers can get location information, send spoofed texts, cause DoS and intercept phone calls/texts. Do those risks still apply for landlines? There is no roaming support, so I would assume call…
André Borie
  • 12,706
  • 3
  • 39
  • 76
4
votes
1 answer

How do criminals change IMEI numbers

I read that mobile network providers can block IMEI numbers from most networks but I also read that criminals can change these IMEI numbers in order to regain access to a network. How is this done and what can I do to protect myself from it?
Joe
  • 41
  • 1
4
votes
2 answers

Security of WWAN cards in laptops

I'm thinking about buying a WWAN card for my laptop (like this one here), as it is more convenient to use than USB tethering. However, I'm concerned about the security risk that comes with such a card as it is connected via PCIe. What if there is a…
jnsp
  • 385
  • 1
  • 9
4
votes
1 answer

Why does cellular communication protocols use A5 or KASUMI and not AES or 3DES or RSA

Why does cellular communication protocols use A5 or KASUMI and not AES or 3DES or RSA? I have read that A5 is not that secure, is this the case? Are A5 or KASUMI used anywhere else? Why only in cellular?
stng
  • 41
  • 2
4
votes
1 answer

How serious is the Borgaonkar/Hirschi attack on 3/4g cellular security

At Blackhat yesterday Ravishankar Borgaonkar and Lucca Hirschi revealed an attack on the security protocols underlying current 3/4g networks. Parts of the tech press are have indicated this could lead to a new generation of Stingray like devices…
3
votes
1 answer

What is the risk of having an old, Internet capable phone not used for Interned compromised? (not smartphone)

I'm talking about a class of old mobile phones that are not smartphones but are still (theoretically) Internet-capable, at least via 3G. Examples of such phones include Series 40 Nokia phones or the Samsung phone featured in Spectre (OK that one at…
gaazkam
  • 5,607
  • 11
  • 24
  • 37
3
votes
0 answers

Can SS7 attacks intercept SMS sent to a Google Voice number?

Hackers are able to steal 2FA SMS messages by exploiting SS7. As far as my understanding goes, this means gaining access to the SS7 system and then broadcasting a message akin to "This number is roaming on my network, send me all their SMS…
1
2 3 4