- cross-posted to:
- t_mobile@lemmy.ml
- cross-posted to:
- t_mobile@lemmy.ml
Haven’t we always known this? It’s the same concept as a Stingray device, which is used to spy on people because their devices connect to it automatically, assuming it’s a normal cell tower. People don’t know what tower they’re connected to, so if you connect to a “fake” or exploited tower, you’ve basically handed over the keys. This is essentially the same thing, but on a 5g network, which is presumably made up of even more nodes/towers.
Stingrays generally use 2G, as the security on earlier standards was pretty lax/broken. I thought that tower spoofing wasn’t possible on 4G/5G?
Always assume that even if not publicly available, some agency has knowledge of how to spy on you.
4G had a lot of the same issues as 3G, but 5G was a complete redesign (including security). It was supposed to have been way harder to break than previous generations.
I’d like to dig up some technical information on this. It has a lot of claims of what hackers can do but how do they do it at a technical level? Is using VPN helpful? Stuff like that.
yawn. HTTPS solves this.
Joke’s on them. I still use a flip phone, lol.
Hackers just released data on 3 billion people. Feels like there’s no point.
Ive installed so much crap voluntarily, I don’t think I have any private data left. Why would they even bother?
“Flaw”. Sure. Okay.