SIM CARDS will not be affected by the use of mobile phone signal jammers
Recently, we had a question about our QA wiki service about vulnerable DES encrypted SIM cards and the means of protection. News about this feat has been webcast and Google is providing hundreds of thousands of hits for "750 Million Vulnerable SIM Cards". In this article, Jammer-Store will try to clarify the operation of this feat and is it really dangerous
In fact, this vulnerability is not as dangerous as the media is trying to describe it. We must also explain that there is no virus capable of hacking SIM cards, simply because viruses can reproduce and spread more. If the DES vulnerability is successfully exploited, the compromised SIM card will not be able to infect others. So, basically, it's a remote attack method on your smartphone.
Such a remote attack model can succeed if the targeted SIM card meets the following specifications:
Read or send SMS, making calls is possible only if a victim SIM card supports the Java card. It is a special programming language that allows you to create standard programs for SIM cards. The cost of a Java-enabled SIM card is slightly higher than that of standard cards, so many operators do not use them.
So, now we have reached the point where I will try to provide you with a suitable solution to this problem, if you think that can affect you. First, we must say that malicious OTA messages can be blocked at the network level, using some kind of firewall, able to block messages with specific features, when they try to go through the SMS center . If the operators implement them, the malicious messages will not reach the victim's phone. But not just any operator will, for example, Verizon has already shown interest in the personal data of its users.
The second way is to update the SIM card with these OTA messages. Your operator can update your 3DES DES encryption algorithm and block the ability to install third-party Java applets. In addition, you can replace your SIM card with a better protected card, which does not have such a feat. Another solution is to use a cell phone jammer, if you suspect that your phone is compromised.
Fortunately, Karsten Nohl, who discovered this feat, is a so-called "white pirate". He did not publish the information on the exploit and passed it on to the GSM associa.tion, which informed all the main operators. We therefore hope that the mobile operators have taken steps to secure our private data, otherwise it will be our priority
In fact, this vulnerability is not as dangerous as the media is trying to describe it. We must also explain that there is no virus capable of hacking SIM cards, simply because viruses can reproduce and spread more. If the DES vulnerability is successfully exploited, the compromised SIM card will not be able to infect others. So, basically, it's a remote attack method on your smartphone.
Such a remote attack model can succeed if the targeted SIM card meets the following specifications:
Read or send SMS, making calls is possible only if a victim SIM card supports the Java card. It is a special programming language that allows you to create standard programs for SIM cards. The cost of a Java-enabled SIM card is slightly higher than that of standard cards, so many operators do not use them.
So, now we have reached the point where I will try to provide you with a suitable solution to this problem, if you think that can affect you. First, we must say that malicious OTA messages can be blocked at the network level, using some kind of firewall, able to block messages with specific features, when they try to go through the SMS center . If the operators implement them, the malicious messages will not reach the victim's phone. But not just any operator will, for example, Verizon has already shown interest in the personal data of its users.
The second way is to update the SIM card with these OTA messages. Your operator can update your 3DES DES encryption algorithm and block the ability to install third-party Java applets. In addition, you can replace your SIM card with a better protected card, which does not have such a feat. Another solution is to use a cell phone jammer, if you suspect that your phone is compromised.
Fortunately, Karsten Nohl, who discovered this feat, is a so-called "white pirate". He did not publish the information on the exploit and passed it on to the GSM associa.tion, which informed all the main operators. We therefore hope that the mobile operators have taken steps to secure our private data, otherwise it will be our priority
Does Duct Tape Block Cell Phone Data Create A Quiet Atmosphere
Cell Phone Excel Blocks Formulas Are High Tech
Esp8266 Wifi Jammer Setup To Improve Management
What Happens I Block Calls On My Cell Phone Block Operators
Big Block Cell Phone Called Is Not Affected By The Phone
There Are More cell phone jammer In The Examination Room
Place a cell phone jammer in the office area
Create a quiet and comfortable life by mobile phone blocker
Maximum power handheld jammers are selling like hot cakes
The best shield uav anti-jamming equipment
The latest development of drone jamming gun
The most popular military signal jammer goes on sale in 2019
The latest ultra 16 band signal jammer to be sold
Need use cell phone jammers in public places
Mass use of signal jamming devices in prisons across the United States
RF blocker is suitable for school