|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
06-17-2013, 17:15 | #1 (permalink) |
Junior Member Join Date: Jun 2013
Posts: 2
Member: 1961673 Status: Offline Sonork: Unispirited Thanks Meter: 2 | Remote Cloning/Shadowing of SIM Recently came across mind boggling concept of remote cloning or Shadowing of Sim. Now a days hackers places a call on target number from any of the telemarketing numbers. If the call is picked up, your SIM parameters are cloned to their system. After this your entire communication runs parallel on their system. They can read you, listen to you like sitting next to you. The case is even worse if you are connected to Internet, a configuration file would be placed in your handset and your handset starts obeying their commands like a slave. It is real difficult to trace them back since the numbers (you received a call from) would be of some other country (VOIP gateway). There is no need to put a formal request for interception of mobile communication with authorities, so without creating any such record, logs and traceback they are accomplishing the required. I do not know how readers would react to this but thats a fact. Can any wise guy can suggest any firewall/detection/prevention mechanism to overcome this issue? You would do a great favor to community. Thanks |
The Following 2 Users Say Thank You to Unispirited For This Useful Post: |
07-09-2013, 14:33 | #2 (permalink) | |
Freak Poster Join Date: Jan 2005
Posts: 328
Member: 111423 Status: Offline Sonork: 100.1618414 Thanks Meter: 22 | Quote:
with all respect friend you are watching much television .... unless you got serious profs !!! if you have i would get to know for sure but i doubt ... Let see if you can at least prove something about that you say ... | |
07-16-2013, 20:13 | #3 (permalink) | |
Junior Member Join Date: Jun 2013
Posts: 2
Member: 1961673 Status: Offline Sonork: Unispirited Thanks Meter: 2 | Quote:
I did not share the info for a subsequent validation, if u want to believe its OK if not Its still OK. As far as proof is concerned I have myself got victimized and has lost an important court case resulting this. I have paid a price, u will also believe this when you do the same. Wishing you all the best! | |
07-22-2013, 02:25 | #4 (permalink) | |
Freak Poster Join Date: Oct 2005
Posts: 103
Member: 192663 Status: Offline Thanks Meter: 31 | Quote:
Here is the proof. AOL.co.uk -Video - Security Flaw Found in Cell Phone SIM Cards | |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|