Actually a pretty gruesome vulnerability: The attack is on the SIM card’s embedded processor, so it is handset agnostic, and the attack reveals the IMSI and Ki, allowing a clone SIM to be generated remotely…
Game over man, game over!
Actually a pretty gruesome vulnerability: The attack is on the SIM card’s embedded processor, so it is handset agnostic, and the attack reveals the IMSI and Ki, allowing a clone SIM to be generated remotely…
Game over man, game over!