You are viewing a single comment's thread from:

RE: Introduction to Mobile Networks - Security in 2G (GSM) Networks

Hi @alexdory. It's complicated when you look at the procedure as a whole but the principles are reasonably straightforward.
3G authentication is an evolution rather than a revolution. Working on that in my next post.
4G re-uses 3G authentication so that's the good news ! ;-)
Thanks for reading!

Coin Marketplace

STEEM 0.06
TRX 0.28
JST 0.048
BTC 71260.16
ETH 2070.74
USDT 1.00
SBD 0.51