So, imagine you are on the way to present at a security conference and some 'inspectors' come over to talk with you. They know your name, purpose for being there, what you are speaking on, etc. Then they take your phone,SIM card, and software radio, in what appears to be an effort to prevent you from demonstrating a flaw in GSM that allows anyone to capture and decrypt cell phone conversations.
Well, it happened and this blog tells the story. Note the details...the laptop wasn't taken, or the FPGA the decryption process much quicker.
Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)