ResponseMediaNZ:
elpenguino:
So you are talking about a news article from 2013.. I would put money on the fact that they were using the technology I mentioned.
Also would be vendor agnostic - because as you say it's being intercepted between the handset and cell site
Unsure what your point is about this being related to Huawei 5G equipment
The main issue is mobile encryption has changed *significantly* from A3/5 SIM (2) to Milenage uSIM (3/4g) over the years where they changed the crypto significantly to the point that the over the air methods don't really apply. And anyone doing anything sensitive would just encrypt the conversation over the top with apps like Signal/Whatsapp etc.
And the merkel hacking was all based on the NSA capturing the data over the air using high gain antennas and then decrypting it offline afterwards. The funny thing is when you have the disposal of the entire US Government behind you and have a single targeted asset.
Vs Huawei *intentionally* building sniffing hardware into each and every base station they build and crossing their fingers that no one ever opens it up and has a look inside.
There is far FAR "easier" attack vectors that spies on either side would use (like a spy staff member* or the local government putting pressure on the telco**) any day before doing something as completely foolish that would mean the certain end of Huawei EVER being able to sell equipment into first world countries EVER again.
*I say easier with a pinch of salt as a rogue member of staff would have a difficult time not being caught unless it was a team of people.
** Similarly if the government put pressure on the Telco. Thankfully we don't live in a dictatorship and if the NZ Government tried anything like that the Telco's would kick up a major stink in public. All Lawful Intercept (LI) have laws around what happens and the actual interception is performed by the Telco and then pumped to the agency via private circuits.

