Yes, from what i could read, we could use it to prevent the frequency hopping efect (or decode the stream and also change the frequency remote) and track the conversation even after hoping. A5/2 trick is old, that by forcing a 3G phone to move to GSM.Solution: Put on your phone do not authorize DUAL MODE, just fix it on 3G. I think what the article try to focus is on this "new" man in the middle attach, that with a normal PC you could take the key in 1 second.Which is maybe similar as the IMSI catchers or creating a fake cell. Nowadays i am working to implement this on any android device with a special python script and custom rom :)Android is open source. Regards. > Date: Thu, 27 Dec 2012 04:43:32 +0100 > From: [email protected] > To: [email protected] > CC: [email protected] > Subject: Re: [A51] New A5/1 attack patented > > > Elad Barkan and Eli Biham (them again) filed a patent which was made > > public 2 months ago. It appears to be a new attack against A5/1: > > > > http://www.google.com/patents/US8295477 > > I've just did a quick scan through it and didn't really see what's > "new" about it ... > > The abstract seems to describe the very well known A5/2 attack and > it's optimization. They also describe in the invention the classic > downgrade attacks (sinceit all A5/x share the same Kc, you attack A5/2 > or A5/1 using an imsi catcher and reuse the found Kc to decrypt > intercepted A5/3 data for eg). > > Can you pin point exactly what "new" about it ? > > AFAICT it's just the exact stuff they published 10 years ago ... > > Cheers, > > Sylvain > _______________________________________________ > A51 mailing list > [email protected] > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
_______________________________________________ A51 mailing list [email protected] http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
