1998-01-06 - Re: Mobile phones used as trackers

Header Data

From: David Miller <dm0@avana.net>
To: cypherpunks@Algebra.COM
Message Hash: 1cbfea6f0c5708ac856c3970283a9e8bfa840e1838ad0c3064e086d31cf38ce6
Message ID: <34B27F22.7C07@avana.net>
Reply To: <199801012054.PAA25297@users.invweb.net>
UTC Datetime: 1998-01-06 16:10:03 UTC
Raw Date: Wed, 7 Jan 1998 00:10:03 +0800

Raw message

From: David Miller <dm0@avana.net>
Date: Wed, 7 Jan 1998 00:10:03 +0800
To: cypherpunks@Algebra.COM
Subject: Re: Mobile phones used as trackers
In-Reply-To: <199801012054.PAA25297@users.invweb.net>
Message-ID: <34B27F22.7C07@avana.net>
MIME-Version: 1.0
Content-Type: text/plain



Loren J. Rittle wrote:

> If you assume your attacker is capable of (4), (5) and similar tricks
> and you have something to hide, then I suppose turning your SU off and
> on is a wise course of action.

Another attack that was recently described to me by someone in the industry
is to setup a three-way conversation, which basically is a cellular phone
tap.  The conversation could be split within the cell network to a silent
party more interested in your communications than your location.

--David Miller






Thread