Traffic Analysis of the LTE Mobile Standard

Interesting research in using traffic analysis to learn things about encrypted traffic. It’s hard to know how critical these vulnerabilities are. They’re very hard to close without wasting a huge amount of bandwidth. The active attacks are more interesting. EDITED TO ADD (7/3): More information. I have been thinking about this, and now believe the attacks are more serious than… Continue reading Traffic Analysis of the LTE Mobile Standard

Pentagon-Funded Project Will ‘Solve’ Cellphone Identity Verification Within Two Years

Long-time Slashdot reader Zorro quotes Nextgov:
The Defense Department is funding a project that officials say could revolutionize the way companies, federal agencies and the military itself verify that people are who they say they are and it could be… Continue reading Pentagon-Funded Project Will ‘Solve’ Cellphone Identity Verification Within Two Years

Accessing Cell Phone Location Information

The New York Times is reporting about a company called Securus Technologies that gives police the ability to track cell phone locations without a warrant: The service can find the whereabouts of almost any cellphone in the country within seconds. It does this by going through a system typically used by marketers and other companies to get location data from… Continue reading Accessing Cell Phone Location Information