From: David Miller <dm0@avana.net>
To: cypherpunks@Algebra.COM
Message Hash: 1cbfea6f0c5708ac856c3970283a9e8bfa840e1838ad0c3064e086d31cf38ce6
Message ID: <34B27F22.7C07@avana.net>
Reply To: <199801012054.PAA25297@users.invweb.net>
UTC Datetime: 1998-01-06 16:10:03 UTC
Raw Date: Wed, 7 Jan 1998 00:10:03 +0800
From: David Miller <dm0@avana.net>
Date: Wed, 7 Jan 1998 00:10:03 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Mobile phones used as trackers
In-Reply-To: <199801012054.PAA25297@users.invweb.net>
Message-ID: <34B27F22.7C07@avana.net>
MIME-Version: 1.0
Content-Type: text/plain
Loren J. Rittle wrote:
> If you assume your attacker is capable of (4), (5) and similar tricks
> and you have something to hide, then I suppose turning your SU off and
> on is a wise course of action.
Another attack that was recently described to me by someone in the industry
is to setup a three-way conversation, which basically is a cellular phone
tap. The conversation could be split within the cell network to a silent
party more interested in your communications than your location.
--David Miller
Return to January 1998
Return to ““William H. Geiger III” <whgiii@invweb.net>”