> Yep, I'm aware of those baseband attacks. To carry them out you need > access to a Node-B (telecoms equipment mobile phones connect to), real or > simulated, and advertise to the device to attach to it.
Travis Goodspeed's packet-in-packet attack could probably handle this, and doesn't require a radio. I'd be suspicious of any claim that you need hardware to exploit a known vulnerability -- even if it's a physical layer vulnerability. -- -- John Ohno http://firstchurchofspacejesus.blogspot.com/
-- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at [email protected].
