Hacker News new | past | comments | ask | show | jobs | submit login

2G doesn't have mutual authentication, thereby Man-in-the-Middle attacks are trivial. From 3G on, attackers cannot simply fake the real network.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: