a51

Latest

  • Samsung Galaxy A51 review: Wait for a price drop

    by 
    Chris Velazco
    Chris Velazco
    05.15.2020

    Samsung got me. That’s not to say the Galaxy A51 is a bad phone. The rest of the phone's design is fairly standard. That’s despite Samsung’s typical -- and almost stylized -- image processing, too. It's a $400 arrow aimed at Samsung's heart and runs just as well as Apple’s most expensive smartphones.

  • Meganet's Dominator I snoops on four GSM convos at once, fits in your overnight bag

    by 
    Chris Ziegler
    Chris Ziegler
    05.10.2010

    "Dominator I" sounds more like a monster truck than a collection of small boxes that collectively erase 20 years of relatively secure wireless phone service, doesn't it? Alas, what you're looking at here is a convenient, plug-and-play solution for exploiting the hard work the world's hacking community has put into cracking the A5/1 encryption used on GSM networks in Europe and the US over the past few years. The system consists of two nondescript white boxes, two directional antennas that you'll point in the direction of your victim, and a laptop that you can use to get a glimpse at all of the phones currently connected to your nearest cell site and record up to four active calls simultaneously -- and if you're more of the text messaging type, Dominator I's got you covered there, too, with full access to SMS. The company claims that the system was "declassified only last week" and is completely undetectable both by the operator and the end user, putting it in this rare nexus of "awesome" and "completely terrifying." It can't do the 128-bit A5/3 used in UMTS, but now that it's been cracked in a somewhat practical way, we're sure the Dominator II can't be far behind. Follow the break for Meganet's video of the system in action.

  • GSM call encryption code cracked, published for the whole world to see

    by 
    Vlad Savov
    Vlad Savov
    12.29.2009

    Did you know that the vast majority of calls carried out on the 3.5 billion GSM connections in the world today are protected by a 21-year old 64-bit encryption algorithm? You should now, given that the A5/1 privacy algorithm, devised in 1988, has been deciphered by German computer engineer Karsten Nohl and published as a torrent for fellow code cracking enthusiasts and less benevolent forces to exploit. Worryingly, Karsten and his crew of merry men obtained the binary codes by simple brute force -- they fed enough random strings of numbers in to effectively guess the password. The GSM Association -- which has had a 128-bit A5/3 key available since 2007, but found little takeup from operators -- has responded by having a whinge about Mr. Nohl's intentions and stating that operators could just modify the existing code to re-secure their networks. Right, only a modified 64-bit code is just as vulnerable to cracking as the one that just got cracked. It's important to note that simply having the code is not in itself enough to eavesdrop on a call, as the cracker would be faced with just a vast stream of digital communications -- but Karsten comes back to reassure us that intercepting software is already available in customizable open source varieties. So don't be like Tiger, keep your truly private conversations off the airwaves, at least for a while.