TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

GSM encryption broken

89 pointsby tfincannonover 15 years ago

11 comments

tptacekover 15 years ago
It's nice to see people still follow the old security PR playbook:<p><a href="http://chargen.matasano.com/chargen/2009/4/1/how-to-hidehhhandle-security-vulnerabilities-in-your-product.html" rel="nofollow">http://chargen.matasano.com/chargen/2009/4/1/how-to-hidehhha...</a><p>The "modern" game Microsoft plays is boring. It acknowledges and thanks researchers, often accepts worst-case assessments of impact, and fast-tracks fixes. What they don't understand is that our stories need an antagonist, someone we can name and pillory. Thanks, Claire Cranton at GSM.com, for giving us one.
评论 #1019322 未加载
jrockwayover 15 years ago
<i>“What he is doing would be illegal in Britain and the United States.”</i><p>Hmm, guess which two countries he is not doing this in. I am not sure how this is relevant, except to say, "oh fuck." (If you can't attack the argument, attack the person who's arguing.)<p><i>To do this while supposedly being concerned about privacy is beyond me.</i><p>Now I know for sure that I need to encrypt my calls in another way. Before this announcement, I figured it was handled for me; I didn't assume that criminals had already broken the crypto and had kept the information secret. Now I am sure they have, and that my non-encrypted calls are obviously being monitored. (I exaggerate a bit, but it's clear how this disclosure enhances my privacy.)<p>Not sure why the GSM folks are taking this so seriously. Computers are fast. 64-bit encryption has been unsafe for nearly a decade. Everyone knows that this was going to happen eventually.<p>Edit: after reading the slides, I am really amazed by this. I remember when I was a kid and I used to listen in on cordless phones and baby monitors with my radio scanner. It was really, really interesting. The thought of sitting on the train and listening to both sides of people's cell-phone calls appeals to me in a way that I can't quite explain.
评论 #1019347 未加载
wrsover 15 years ago
If GSM was not already broken, how do all of these products work?<p><a href="http://www.google.com/search?q=gsm+passive+intercept" rel="nofollow">http://www.google.com/search?q=gsm+passive+intercept</a><p>The point of the presentation is not that GSM has been broken; it's to make it so blatantly, obviously, publicly broken that the public (i.e., corporate IT departments) will have to pay attention.
评论 #1019355 未加载
jeremywover 15 years ago
To clarify a few points (I had them confused):<p>- If you have an iPhone 3G signal (for example), you're using UMTS (not GSM), which has longer encryption keys (128-bit) and an enhanced protocol. Brute-forcing this keyspace (as in the CCC paper) is unlikely, though they mention the cipher (KASUMI) is "academically broken".<p>- Neither system has end-to-end privacy. Data is encrypted to your operator's equipment. All other hacks apply.<p>NYT: <i>In 2007, the GSM developed a 128-bit successor to the A5/1, called the A5/3 encryption algorithm, but most network operators have not yet invested to make the security upgrade.</i><p>As far as I can determine, this is wrong. Europe has UMTS broadly deployed and the US came late to this party.<p>For more: <a href="http://www.google.com/search?q=umts+encryption" rel="nofollow">http://www.google.com/search?q=umts+encryption</a>
atamyratover 15 years ago
For more technical info, here's the link to presentation at CCC <a href="http://lists.lists.reflextor.com/pipermail/a51/attachments/20091228/3267f143/attachment-0001.pdf" rel="nofollow">http://lists.lists.reflextor.com/pipermail/a51/attachments/2...</a>
评论 #1019154 未加载
Dilpilover 15 years ago
Links to a registration prompt. If anyone is really interested in reading this, google the URL.
评论 #1019131 未加载
cnvogelover 15 years ago
The summary of the talk given on the 26'th Chaos Communication Congress can be found on the 26c3 wiki, it includes a link to the slides:<p><a href="http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html" rel="nofollow">http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.h...</a><p>Video recordings can be found on:<p><a href="http://events.ccc.de/congress/2009/wiki/Streaming#Unofficial" rel="nofollow">http://events.ccc.de/congress/2009/wiki/Streaming#Unofficial</a><p>(the ones on 26c3.ipv6only.org are good, but, as the name suggests, accessible via IPv6 only)
Dmatigover 15 years ago
I'm not sure of the specific relevence to this article, since it was a good while ago i listened the details mostly escape my memory, but you can grab a good background on why GSM is insecure listening here: <a href="http://twit.tv/sn213" rel="nofollow">http://twit.tv/sn213</a>
teejaover 15 years ago
Here goes another wave of plastic &#38; silicon hitting the world's dumpgrounds.<p>If we made less hardware and more software, the world would thank us for it.
3pt14159over 15 years ago
How is this news? I've known for months that a 100+ petabyte server and a massive rainbow table can crack the encryption of GSM phones.
评论 #1019678 未加载
wendroidover 15 years ago
I sent this to press@gsm.com, the email address of Claire Cranton, quoted in the article :<p>Dear Ms. Cranton,<p><a href="http://www.nytimes.com/2009/12/29/technology/29hack.html?_r=1" rel="nofollow">http://www.nytimes.com/2009/12/29/technology/29hack.html?_r=...</a><p>“This is theoretically possible but practically unlikely,” said Claire Cranton, a GSM spokeswoman, noting that no one else had broken the code since its adoption. “What he is doing would be illegal in Britain and the United States. To do this while supposedly being concerned about privacy is beyond me.”<p>A set of incredible admissions.<p>* This is theoretically possible but practically unlikely<p>GSM 64bit encryption is broken. Not theoretically but actually. The likelihood of it happening to someone now depends on the value of the calls.<p>* no one else had broken the code since its adoption.<p>And now they have, that's the point<p>* would be illegal in Britain and the United States<p>I don't think criminals are deterred by such niceties and they are hardly likely to reveal their source while extorting money from me or making insider trades<p>* To do this while supposedly being concerned about privacy is beyond me<p>Knowing that my handset can be eavesdropped by people outside of the law is the ultimate privacy concern. That you don't understand this is beyond me.<p>&#62; The association noted that hackers intent on illegal eavesdropping would need a radio receiver system and signal processing software to process raw radio data, much of which is copyrighted.<p>Again, copyright infringement would be very low on the list of criminal organisations.<p>Your response beggars belief, except it is perfectly reasonable viewed through the lens of PR.<p>Yours sincerely<p><i></i><i></i><i></i><i></i>
评论 #1019286 未加载
评论 #1019224 未加载
评论 #1019269 未加载
评论 #1019465 未加载