top | item 47156267

(no title)

bryancoxwell | 4 days ago

I’m arguing that just because a baseband processor is involved that doesn’t mean IMSI tracking is a vulnerability of the baseband processor itself. IMSI provisioning and randomization cannot be done without cooperation with the network operator and has nothing to do with the baseband processor itself.

discuss

order

No comments yet.