I personally think interference has a positive side
Now, computer scientists have shown that even business phones can change due to software changes. The team led by the Institute of Software Technology and Theoretical Computer Science exchanged software on mobile phones and took advantage of their weaknesses in the GSM radio standard. Computer scientists presented their research results at a security seminar and will develop an electronic device that can suppress cell phone signals.
In some cases, jammers are needed to interfere with other calls, such as B. B. in a movie theater, classroom or meeting room. Telephone calls are prohibited in these places. The prison will install jammers to prevent prisoners from contacting the outside world. However, this jammer is not suitable for personal use, Jammer price is expensive and has low energy consumption. Because they prevent emergency calls, they also pose security risks.
Run optimized open source software on the backup phone. Therefore, they fool the radio antenna mast like a portable jammer and dip the frequency into a small part of the interference signal. Wrong calls may prevent text messages and calls from being sent to recipients in the area: fake identities and answer questions with strange names. In the worst case, you can even block text messages. Because the radio station will send hundreds of square kilometers of status information before being called. This process is called paging. The lead author of the study said: "You can send a call to all phones in the area." It contains an identification number that can be used by any phone to check whether it is on the device. "
However, the replacement phone will answer these questions and accept them, make calls and text messages faster than other phones. At the transmission tower, it seems that the actual receiver has been notified. But he didn't learn anything. In the best case, only the phone will be lost and no calls will be made. In the worst case, even text messages may be intercepted and read due to broken encryption and lack of authentication. So far, computer scientists have tested the GSM standard only more than 20 years ago, but have used many modern smartphones when necessary. In addition, the researchers said, this gap threatens the communication between machines and the future Internet of Things. New UMTS or LTE networks may also be vulnerable. Golde said: "Many GSM protocols are duplicated, and there are paging mechanisms in the third and fourth generation mobile standards." Similar attacks can be here. "But so far, there is a lack of correct hardware, especially software.
The computers used in their research are the same as those in Berlin before, as long as 11 mobile phones can weaken the Berlin network. The scientist said: "You can reply to all paging requests and block moving areas." This affects the entire community. However, more calls are needed during peak hours to meet the demands of more disruptive providers. Attackers can cover an area of 200 square kilometers on average in Berlin.
Mobile phone jammer is difficult to find. Researchers say that the only way to prevent such attacks is to change the GSM standard. These will be difficult to implement. They complain that the industry refuses to add new standards to existing networks. As more authentication and traffic can resolve this vulnerability, it will also be expensive. Since attacks not only target network operators and organizations, but also individual users, they may cause further financial losses when security breaches occur.
PeopleSTAR (0 hodnocení)