You are viewing a single comment's thread from:

RE: Introduction to Mobile Networks - Security in 2G (GSM) Networks

Hi @alexdory. It's complicated when you look at the procedure as a whole but the principles are reasonably straightforward.
3G authentication is an evolution rather than a revolution. Working on that in my next post.
4G re-uses 3G authentication so that's the good news ! ;-)
Thanks for reading!

Coin Marketplace

STEEM 0.16
TRX 0.17
JST 0.028
BTC 69021.03
ETH 2474.01
USDT 1.00
SBD 2.42