serious threat models
Travis H.
solinym at gmail.com
Sat Feb 4 01:27:58 EST 2006
On 2/3/06, Jaap-Henk Hoepman <jhh at cs.ru.nl> wrote:
> could this be
> done using phone conference facilities?
Good guess!
http://www.schneier.com/blog/archives/2006/02/phone_tapping_i.html
``The code tapped into the conference call system. It "conference
called" phone calls to 14 prepaid mobile phones where the calls were
recorded.''
I bet you can find a manual for one of these switches online somewhere,
should you be suitably motivated.
--
"Whosoever is delighted in solitude is either a wild beast or a god." -><-
http://www.lightconsulting.com/~travis/
GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list