Instead of this sensationalized neowin article, link to the actual guts of this <a href="https://har2009.org/program/attachments/119_GSM.A51.Cracking.Nohl.pdf" rel="nofollow">https://har2009.org/program/attachments/119_GSM.A51.Cracking...</a>
Karsten works with Chris Paget at H4RDW4RE, a consulting firm they started to focus on hardware security. While all the high-end pentest firms will do hardware, only a couple have a practice focus in hardware; they compete with Nate Lawson's Root Labs and after that there's pretty much just Paul Kocher's Cryptography Research. These guys are going to have a blast.<p>A direct link to the presentation:<p><a href="http://www.scribd.com/doc/18668509/HAR2009-Cracking-A5-GSM-Encryption" rel="nofollow">http://www.scribd.com/doc/18668509/HAR2009-Cracking-A5-GSM-E...</a><p>The long and the short of it, they're going to take the academic result that you can precompute A5 and use a GPU cluster to build a rainbow table cracking implementation.<p>This result is a couple steps away from apocolyptic, but not all the way there:<p>* They haven't subverted GSM base stations (this is going to turn out to be doable, though). They can't pick a phone at random.<p>* They aren't publishing the GNU Radio code to sniff GSM. There are several free GSM projects, but putting the pieces together still requires talent, unlike wifi cracking.<p>* Regardless of whether these attacks are ever used in the wild, this will probably have a big effect on financial security, where GSM is used as a safe out-of-band authentication mechanism.
Something I don't understand is why these sorts of hacks are always "preannounced" in advance of some conference or another. Inevitably, legal action is taken to shut down the presentation and keep the details from becoming public.<p>If you're going to announce a hack, announce the hack. If you're not, don't. Why go through the same song-and-dance every time?