<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: GSM is insecure</title>
	<atom:link href="http://www.epanorama.net/blog/2011/01/03/gsm-is-insecure/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2011/01/03/gsm-is-insecure/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 21 Apr 2026 11:40:07 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: David</title>
		<link>https://www.epanorama.net/blog/2011/01/03/gsm-is-insecure/comment-page-1/#comment-1809089</link>
		<dc:creator><![CDATA[David]]></dc:creator>
		<pubDate>Tue, 25 Jul 2023 12:40:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=3986#comment-1809089</guid>
		<description><![CDATA[Thanks for your post. I’ve been thinking about writing a very comparable post over the last couple of weeks, I’ll probably keep it short and sweet and link to this instead if thats cool. Thanks.	&lt;a href=&quot;https://www.newport-sg.com/view-showflat&quot; rel=&quot;nofollow&quot;&gt;newport showflat&lt;/a&gt;]]></description>
		<content:encoded><![CDATA[<p>Thanks for your post. I’ve been thinking about writing a very comparable post over the last couple of weeks, I’ll probably keep it short and sweet and link to this instead if thats cool. Thanks.	<a href="https://www.newport-sg.com/view-showflat" rel="nofollow">newport showflat</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: David</title>
		<link>https://www.epanorama.net/blog/2011/01/03/gsm-is-insecure/comment-page-1/#comment-1809077</link>
		<dc:creator><![CDATA[David]]></dc:creator>
		<pubDate>Tue, 25 Jul 2023 10:31:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=3986#comment-1809077</guid>
		<description><![CDATA[Your site is truly cool and this is an extraordinary moving article.	&lt;a href=&quot;https://www.the-blossoms.com.sg/view-showflat&quot; rel=&quot;nofollow&quot;&gt;Blossoms showflat&lt;/a&gt;]]></description>
		<content:encoded><![CDATA[<p>Your site is truly cool and this is an extraordinary moving article.	<a href="https://www.the-blossoms.com.sg/view-showflat" rel="nofollow">Blossoms showflat</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/01/03/gsm-is-insecure/comment-page-1/#comment-656405</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 06 Jul 2014 14:05:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=3986#comment-656405</guid>
		<description><![CDATA[A GSM Base Station With Software Defined Radio
http://hackaday.com/2014/07/05/a-gsm-base-station-with-software-defined-radio/

It’s a GSM base station made with a BeagleBone Black and a not too expensive software defined radio board.

the total cost of the hardware somewhere around $750.

The software side of the build is mostly handled by OpenBTS, the open source project for the software part of a cell station.]]></description>
		<content:encoded><![CDATA[<p>A GSM Base Station With Software Defined Radio<br />
<a href="http://hackaday.com/2014/07/05/a-gsm-base-station-with-software-defined-radio/" rel="nofollow">http://hackaday.com/2014/07/05/a-gsm-base-station-with-software-defined-radio/</a></p>
<p>It’s a GSM base station made with a BeagleBone Black and a not too expensive software defined radio board.</p>
<p>the total cost of the hardware somewhere around $750.</p>
<p>The software side of the build is mostly handled by OpenBTS, the open source project for the software part of a cell station.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/01/03/gsm-is-insecure/comment-page-1/#comment-35467</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 18 Jan 2014 20:16:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=3986#comment-35467</guid>
		<description><![CDATA[Norwegian professor emeritus of Jan Arild Audestad reveals that the GSM network in the birth of it the original intention was to use 128-bit encryption.

The British authorities pressured to use the 48-bit encryption.

As a compromise the GSM network resulted in using 64-bit encryption, in which the last ten bits are zeros. In practice, therefore, the encryption of 54-bit.

64-bit A5/1 encryption was broken by 2009, when the German Karsten Nohl hacker partners announced this on and put the necessary codes for online distribution. 128-bit A5/3-versio was introduced in 2007 and it is still considered safe.

One comment says that some networks in certain countries used even weaker the A5 / 0 option “no encryption”.

Sources:
http://www.tietoviikko.fi/kaikki_uutiset/gsmverkon+kehittajat+paljastavat+brittien+tiedustelupalvelu+painosti+kayttamaan+heikompaa+salausta+jo+1980luvulla/a959220
http://www.nrk.no/norge/presset-til-a-svekke-mobilsikkerhet-1.11460787]]></description>
		<content:encoded><![CDATA[<p>Norwegian professor emeritus of Jan Arild Audestad reveals that the GSM network in the birth of it the original intention was to use 128-bit encryption.</p>
<p>The British authorities pressured to use the 48-bit encryption.</p>
<p>As a compromise the GSM network resulted in using 64-bit encryption, in which the last ten bits are zeros. In practice, therefore, the encryption of 54-bit.</p>
<p>64-bit A5/1 encryption was broken by 2009, when the German Karsten Nohl hacker partners announced this on and put the necessary codes for online distribution. 128-bit A5/3-versio was introduced in 2007 and it is still considered safe.</p>
<p>One comment says that some networks in certain countries used even weaker the A5 / 0 option “no encryption”.</p>
<p>Sources:<br />
<a href="http://www.tietoviikko.fi/kaikki_uutiset/gsmverkon+kehittajat+paljastavat+brittien+tiedustelupalvelu+painosti+kayttamaan+heikompaa+salausta+jo+1980luvulla/a959220" rel="nofollow">http://www.tietoviikko.fi/kaikki_uutiset/gsmverkon+kehittajat+paljastavat+brittien+tiedustelupalvelu+painosti+kayttamaan+heikompaa+salausta+jo+1980luvulla/a959220</a><br />
<a href="http://www.nrk.no/norge/presset-til-a-svekke-mobilsikkerhet-1.11460787" rel="nofollow">http://www.nrk.no/norge/presset-til-a-svekke-mobilsikkerhet-1.11460787</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2011/01/03/gsm-is-insecure/comment-page-1/#comment-14427</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Dec 2011 09:17:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=3986#comment-14427</guid>
		<description><![CDATA[Researchers Demo New GSM Attacks at Chaos Communications Congress
http://mobile.slashdot.org/story/11/12/29/178215/researchers-demo-new-gsm-attacks-at-chaos-communications-congress

&quot;A new attack on the GSM mobile communications protocol has been demonstrated by Karsten Nohl and Luca Melette of Security Research Labs, based off their previously published attacks around vulnerabilities in the GSM A5/1 encryption protocol. This new attack, which Nohl indicates already in use by criminals, allows an attacker to simulate a GSM mobile and use it to make calls and send text messages. Nohl also discussed protective measures users should take against these attacks, and others in use by intelligence communities around the world.&quot;]]></description>
		<content:encoded><![CDATA[<p>Researchers Demo New GSM Attacks at Chaos Communications Congress<br />
<a href="http://mobile.slashdot.org/story/11/12/29/178215/researchers-demo-new-gsm-attacks-at-chaos-communications-congress" rel="nofollow">http://mobile.slashdot.org/story/11/12/29/178215/researchers-demo-new-gsm-attacks-at-chaos-communications-congress</a></p>
<p>&#8220;A new attack on the GSM mobile communications protocol has been demonstrated by Karsten Nohl and Luca Melette of Security Research Labs, based off their previously published attacks around vulnerabilities in the GSM A5/1 encryption protocol. This new attack, which Nohl indicates already in use by criminals, allows an attacker to simulate a GSM mobile and use it to make calls and send text messages. Nohl also discussed protective measures users should take against these attacks, and others in use by intelligence communities around the world.&#8221;</p>
]]></content:encoded>
	</item>
</channel>
</rss>
