>From the statement: a hacking group claimed to be building an attack on A5/1 by constructing a large look-up table1[sic] of approximately 2 Terabytes – this is equivalent to the amount of data contained in a 20 kilometre high pile of books.
Or a 2 inch stack of hard-drives... 10 years ago that my have been bordering on absurd, today it's a quick trip to Staples. Also from the statement: The complex knowledge required to develop such software is subject to intellectual property rights, making it difficult to turn into a commercial product. I am sure that we all feel better that this requires "complex knowledge", somehow the fact that an attacker would not be able to create a viable business model as a result of intellectual property rights seems less than helpful. Ben Juha-Matti Laurio wrote: > GSM Association has posted their statement at > http://www.gsm.org/newsroom/press-releases/2009/4490.htm > > Juha-Matti > _______________________________________________ > Fun and Misc security discussion for OT posts. > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec > Note: funsec is a public and open mailing list. > -- Benjamin D. April _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
