{"id":163,"date":"2008-02-24T15:52:42","date_gmt":"2008-02-24T23:52:42","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/02\/24\/security-researchers-crack-wireless-gsm-encryption\/"},"modified":"2008-02-24T15:52:42","modified_gmt":"2008-02-24T23:52:42","slug":"security-researchers-crack-wireless-gsm-encryption","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/24\/security-researchers-crack-wireless-gsm-encryption\/","title":{"rendered":"Security Researchers Crack Wireless GSM Encryption"},"content":{"rendered":"<p>Security researchers have announced the development of a ultra-fast method of cracking wireless GSM encryption in 30 minutes or less.\u00a0 The 64-bit encryption algorithm was cracked in theory over 10 years ago, but the development of new technology has exploited the vulnerability on a timescale that poses a serious threat.\u00a0 GSM is used by many mobile companies worldwide, including T-Mobile and AT&amp;T in the United States.\u00a0 With a GSM wireless frequency receiver and the proper resources, hackers will be able to eavesdrop on phone conversations and text messages at will.\u00a0 Fortunately, the technology is currently not cheap.\u00a0 The developers are charging $1,000 for a solution that cracks GSM in 30 minutes, and $100,000 for a solution that cracks it in 30 seconds.\u00a0 Still, the potential for privacy invasion in the future is tremendously daunting.<\/p>\n<p>Who else is ready to switch to Verizon or Sprint?<\/p>\n<p>Source:\u00a0 http:\/\/www.informationweek.com\/story\/showArticle.jhtml?articleID=206800800&amp;cid=RSSfeed_IWK_All<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have announced the development of a ultra-fast method of cracking wireless GSM encryption in 30 minutes or less.\u00a0 The 64-bit encryption algorithm was cracked in theory over 10 years ago, but the development of new technology has exploited &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/24\/security-researchers-crack-wireless-gsm-encryption\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,9],"tags":[108,107,105,14,106],"class_list":["post-163","post","type-post","status-publish","format-standard","hentry","category-current-events","category-privacy","tag-crack","tag-gsm","tag-tap","tag-wireless","tag-wiretap"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}