TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Breaking LTE on Layer Two

148 pointsby pedro84almost 7 years ago

6 comments

ge0rgalmost 7 years ago
The attack is a combination of multiple &quot;vulnerabilities&quot;:<p>1. the data link layer is not protected, so an attacker can perform a relay attack (forward the encrypted radio packets between the phone and the actual cell tower).<p>2. from watching the encrypted traffic patterns, it is possible to guess which websites the user is surfing by comparing the traffic fingerprints.<p>3. the packets are not integrity-protected, so it&#x27;s possible to change bits of data, if you can guess which packet you have and how it&#x27;s constructed. This is used to manipulate DNS requests to redirect traffic.<p>I&#x27;m not sure about the significance of #1 and #2. A passive attacker <i>might</i> be able to obtain the same information simply by monitoring the physical layer traffic patterns emitted by the phone. Additionally, mobile operators are typically monitoring their frequencies for abuse, so an active attack might not stay under the radar for long.<p>Regarding #3, this is a complicated way to achieve what you can do with a fake WiFi hotspot, and gives you control over unencrypted communications, which hopefully is only a very small subset of todays traffic thanks to omnipresent HTTPS.
评论 #17424972 未加载
评论 #17424985 未加载
Rjevskialmost 7 years ago
This is nothing compared to the disasters that are mobile “core” networks. Those are where the real problem is (allows real time location tracking, call&#x2F;text&#x2F;data spoofing &amp; interception, denial of service, etc) and the telcos don’t give a shit.
评论 #17427135 未加载
exabrialalmost 7 years ago
I really like the trend of offering a human-readable explanation of attacks, complete with illustrations. It&#x27;s so much easier to present the danger to upper management if they can do some self-research.
cryptonectoralmost 7 years ago
Integrity protection is critical. We&#x27;ve known this for many many years now. There is no excuse.
jacquesmalmost 7 years ago
Nice technical work but given the pre-requisites nothing to lose sleep over (yet). As a rule: if you are on a mobile network consider your activities to be public.
评论 #17425183 未加载
monocasaalmost 7 years ago
One more reason to push DNSSEC?
评论 #17429523 未加载
评论 #17428243 未加载