Mobile phones used as trackers
David Miller
dm0 at avana.net
Tue Jan 6 08:10:03 PST 1998
Loren J. Rittle wrote:
> If you assume your attacker is capable of (4), (5) and similar tricks
> and you have something to hide, then I suppose turning your SU off and
> on is a wise course of action.
Another attack that was recently described to me by someone in the industry
is to setup a three-way conversation, which basically is a cellular phone
tap. The conversation could be split within the cell network to a silent
party more interested in your communications than your location.
--David Miller
More information about the Testlist
mailing list