|
Titre | Together, your 4G smartphone and Facebook can reveal where you are |
|
||
Description | The 4G / LTE protocol is considered more secure than 3G and a fortiori that the 2G (which was not difficult), but it is not however free from defects that threaten users' privacy. Researchers at the University of Berlin and the University of Helsinki and released this week (.pdf) what they claim to be the first practical attack against publicly disclosed fourth generation networks. Their method reported by The Register is based on a fault of the protocol to reveal the geographic location of an individual in an average area of about 2 square kilometers, also operating applications that can generate notifications at the request of third parties. In this case, they chose to achieve their demonstration attacks via Facebook Messenger and WhatsApp, but the mechanism must be reproducible with Snapchat, Skype, Twitter and many other messaging applications. In practice, GUTI can remain the same for several days. Or, the notification message headers that contain the GUTI are not encrypted. The researchers realized that they learn to know the GUTI a target by collecting the messages transmitted from the base stations 4G / LTE (which requires having all the same an idea of where it is located), and send discreet notifications to victims to follow them to track their movements. The method depends on the applications used by the target. For example if they use Facebook, send a message using a lambda account. It will not trigger notification shown explicitly by the application, but the message will still be sent to the smartphone to land in the tab "Other messages" that nobody ever looks at (or almost). |
|
|
||
Adresse (URL) : | www.numerama.com | |
|
||
Date | 2015-10-28 | |
|
||
Hits | 0 | |
|
||
Catégorie | Accueil > Technologie | |
|
||
ID | 7084 | |
Un problème ? |
Autres sites conseillés :
Soyez le premier à donner votre avis sur ce site !
Il n'y a aucun flux RSS pour ce site