1998-04-21 - Re: GSM cellphones cloned

Header Data

From: Lucky Green <shamrock@cypherpunks.to>
To: Yupin Mungdee <snickers@mejl.com>
Message Hash: 27f2c5bace4a30f87de5e8203008749e58f40d43c97c482d0f9e382e4bf13080
Message ID: <Pine.BSF.3.96.980422000948.25419B-100000@pakastelohi.cypherpunks.to>
Reply To: <199804211806.LAA05732@rigel.infonex.com>
UTC Datetime: 1998-04-21 22:14:30 UTC
Raw Date: Tue, 21 Apr 1998 15:14:30 -0700 (PDT)

Raw message

From: Lucky Green <shamrock@cypherpunks.to>
Date: Tue, 21 Apr 1998 15:14:30 -0700 (PDT)
To: Yupin Mungdee <snickers@mejl.com>
Subject: Re: GSM cellphones cloned
In-Reply-To: <199804211806.LAA05732@rigel.infonex.com>
Message-ID: <Pine.BSF.3.96.980422000948.25419B-100000@pakastelohi.cypherpunks.to>
MIME-Version: 1.0
Content-Type: text/plain


On Tue, 21 Apr 1998, Yupin Mungdee wrote:

> Lucky Green wrote:
> >A technical description of the attack is at
> >http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html
> 
> Does the attack work if the SIM is protected by an unknown PIN code?

A software-only attack with the SIM in a reader will of course not work if
the SIM is pin protected. A hardware attack on the SIM might work. As
would an over-the-air attack, since the user has to unlock the SIM to use
the phone.

-- Lucky Green <shamrock@cypherpunks.to> PGP v5 encrypted email preferred.
   "Tonga? Where the hell is Tonga? They have Cypherpunks there?"






Thread