Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What facilities are present in GSM handsets to counter theft and cloning?

0
Posted

What facilities are present in GSM handsets to counter theft and cloning?

0

GSM mobile phones use a Subscriber Identity Module (SIM) rather than coding the phone number into the actual phone. This means that the phone’s number will change depending on the card. Both the mobile and SIM are validated before a call is set up. Therefore if the mobile is reported stolen it may not work even with a valid card; and if a SIM is reported stolen it won’t work in another handset. GSM is usually encrypted on the air-interface. Robin Fairburns writes: The security applies to the air path between the mobile and the base station … and it’s not as strong as they would like you to believe — someone with the sorts of resources that GCHQ has can crack it in some modest number of minutes. If you think about it for a moment or two, you’ll realise that the only way you could have an encrypted path right the way to the receiving telephone would be if that had decryption capability. On the whole, I would prefer a mobile that let me call anyone to one that was “in principle” totall

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123