Um, yeah, I don’t have $20k to drop on an Ettus USRP X310 and two daughterboards. I would have liked to have played with it but that is too rich for me.
Does anyone know the encryption schema of LTE? Does the key change with each message or is it for a longer period of time? I'm wondering how feasible it is for an attacker to capture and then break the encryption (obviously if we're talking 2048-bit that wont be happening anytime soon)
The FBI got caught doing something kind of similar in a pretty hilarious way (the full story is nuts) using a device called a "stingray" - <a href="https://www.aclu.org/news/privacy-technology/surreal-stingray-secrecy-uncovering-the-fbis-surveillance-tech-secrecy-agreements" rel="nofollow">https://www.aclu.org/news/privacy-technology/surreal-stingra...</a><p>Although in this case, they were disguising themselves as a cell tower and intercepting traffic that way.
Eavesdropping tool with eavesdropping name with a little disclaimer about not being responsible for illegal use<p>Yeah this is the kind of repository that you clone immediately<p>Clone, dont just Fork