←back to thread

256 points transpute | 1 comments | | HN request time: 0.208s | source
1. tonygiorgio ◴[] No.41914840[source]
Fun stuff, glad to see open source stuff like this still being used. Did downlink eavesdropping in the network security lab at college about 10 years ago. One of my projects was measuring how much cell activity dropped during spring break, another was to do timing attacks on known phone numbers at known locations to see if I can pull temporary IDs (not temporary enough IMO) and do repeat calls to see if they’re still in the area.

Makes me want to play with this again.