this post was submitted on 08 Aug 2024
161 points (97.1% liked)
Technology
59219 readers
2791 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Haven’t we always known this? It’s the same concept as a Stingray device, which is used to spy on people because their devices connect to it automatically, assuming it’s a normal cell tower. People don’t know what tower they’re connected to, so if you connect to a “fake” or exploited tower, you’ve basically handed over the keys. This is essentially the same thing, but on a 5g network, which is presumably made up of even more nodes/towers.
Stingrays generally use 2G, as the security on earlier standards was pretty lax/broken. I thought that tower spoofing wasn't possible on 4G/5G?
4G had a lot of the same issues as 3G, but 5G was a complete redesign (including security). It was supposed to have been way harder to break than previous generations.