Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
kristoffer
on Dec 30, 2014
|
parent
|
context
|
favorite
| on:
Reverse engineering a Qualcomm baseband processor ...
No. You are linking to lawful interception documents. That is not handled in the phone or base station but in the core network. You can not use it to track or listen to shut off devices.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: