Hacker News new | past | comments | ask | show | jobs | submit login

>>>> So you're conveniently ignoring GSM?

Nope, just saying this isn't possible under CDMA technology.

>>>> Or claiming that the information released by the manufacturer, or the limited information released under subpoena is all just "bullshit"?

For me, it's pretty hard to believe considering how secure CDMA is. Might be different for GSM. It makes for a good sales pitch though for Stingray, doesn't it??

>>> Because it's entirely impossible that a carrier has given keys to the manufacturer "for authorized legal purposes only"?

I said this is possible if the carrier has given them authorization. Considering my experience working at Verizon, they don't give out stuff like that willy nilly. Maybe times have changed, but it's hard for me to believe Verizon is giving state and local police forces the ability to do what they're claiming in the article.

>>> 3.3 is pretty much irrelevant if you consider that even as a simple statement of purpose, the Stingray -at least- has to relay the raw traffic.

Which on a CDMA network is encrypted. Not sure if that's the case on GSM, but all they're getting is encrypted traffic. They make it seem like they're sitting in a coffee shop just intercepting raw, unencrypted data, which is false on a CDMA network.




It is very possible to get the traffic for CDMA devices and those devices grab GSM and CDMA alike. The issues are dealing with the newer tech.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: