Connect with us
2g off android 2g off android

Security

Android users can now disable 2G for security

Published

on

2G networks, like 3G networks, have become obsolete after the arrival first of 4G and later of 5G. However, as things have not been done as well as they should have been, we rely on them for mobile calls (operators without VoLTE) or to connect older IoT devices. For this reason, they have even considered switching off 3G before 2G, thus leaving more room for the development of 4G and 5G.

It is not a new concept, since we have been hearing about it for a long time, but everything was blown up about three years ago when the United States Department of Homeland Security (DHS) detected in Washington the presence of Stingrays, also known as “IMSI catcher”. These devices that connect to the mobile network act as fake repeaters and spy on the information that passes through them.

This includes access to calls, text messages or images sent without encryption. Basically, they force the use of older, outdated and less secure 2G technology to easily intercept communications. In fact, work has been done so that this no longer a problem with 5G since these mobiles will have a Subscription Permanent Identifier (SUPI). This will use the encryption key of the network operator and will allow the mobile to know if an antenna is legitimate.

Is the solution to disable 2G?

The EFF (Electronic Frontier Foundation) speaks of victory after learning that Android will allow you to disable 2G connections on your terminals. This is something that Google introduced at the end of last year and that we had not had much news about. They point out that it is a fantastic option to protect the privacy of users and the EFF applauds that the Internet giant has implemented it on mobile phones with its operating system. Now, the ball is in Apple’s court, which must also do so for the safety of its users.

To give us an idea, 2G is a technology created in 1991, so he is over 30 years old. That makes it have many problems because, in its design and conception, the circumstances and requirements were not the same as now. First of all, it has a very weak encryption between the repeater and the mobile, which allows the interception of the traffic. Second, it does not authenticate with the 2G tower in any way, allowing anyone to impersonate it.

Android users can now disable 2G for security

To protect ourselves, the EFF invites us to deactivate 2G. To do this, we will go to Settings > Network and Internet > SIM cards > Allow 2G. By default, the option for our mobile to use 2G networks is activated. His thing would be to disable it, although this possibility would only be present in more modern mobiles such as the Pixel.

The big problem could be loss of coverage or problems making calls. If we live in areas dependent on 2G right now or if our operator does not allow us to make calls with the 4G network, it is possible that the remedy is worse than the disease. However, it will always be good to know that we have this possibility.

Click to comment

Leave a Reply

Your email address will not be published.

Phones

Possibly hundreds of millions of smartphones are at risk. A vulnerability has been discovered that manufacturers are in no hurry to fix

Published

on

Possibly hundreds of millions of smartphones are at risk A

Google, as part of its Project Zero project, has published information about a new vulnerability CVE-2022-33917 that affects millions of smartphones.

Possibly hundreds of millions of smartphones are at risk.  A vulnerability has been discovered that manufacturers are in no hurry to fix

The fact is that we are talking about a vulnerability in Mali GPUs, which are used in a huge number of single-chip systems. Google does not specify, but the Arm website has information that the vulnerability affects solutions based on the Valhall architecture. And this means that we are talking about a huge number of graphics cores that have been and are being used in SoCs in recent years, including the latest Mali-Gx10. That is, we are not talking about millions of vulnerable smartphones, but rather hundreds of millions of devices based on SoC MediaTek, Exynos and Tensor.

Arm itself patched the vulnerability some time ago, but the problem is that many vendors still haven’t implemented those patches. This applies to many devices from Samsung, Xiaomi, Oppo and even Google itself.

If exploited, the vulnerability is intended to allow an attacker to read and write physical pages after they are returned to the system, potentially gaining wide access to user data.

Continue Reading

Gaming

Elon Musk invited a famous hacker of iPhone and PlayStation consoles to Twitter

Published

on

Elon Musk invited a famous hacker of iPhone and PlayStation

Elon Musk hired a hacker who created the world’s first iPhone jailbreak in 2007 and bypassed Sony consoles in 2010. We are talking about George Hotz (George Hotz), known under the nickname Geohot. He also founded the startup Comma.ai, where an autopilot system for cars is being developed.

Elon Musk invited a famous hacker of iPhone and PlayStation consoles to Twitter

In 2015, Hotz began building his own autopilot and offered Musk a license. Instead, the businessman invited a specialist to Tesla, but Hotz refused.

A November 16 Hotz wrote on Twitter, which supports Musk’s decisions about the “hardcore mode of operation.” He also stated that he was ready for an internship at Twitter with a minimum pay that is equal to the cost of living in San Francisco. Musk answered and invited the developer to Twitter.

Elon Musk invited a famous hacker of iPhone and PlayStation consoles to Twitter

George Hotz

First, the specialist will improve the advanced search in the social network so that users no longer set filters manually.

Earlier it was reported that Musk took up the “fire servers.”

Continue Reading

Security

Hackers hacked one of Nvidia’s Twitter accounts to “advertise” Dogecoin

Published

on

Hackers hacked one of Nvidias Twitter accounts to advertise Dogecoin

The official Nvidia Taiwan Twitter account has been hacked.

Hackers hacked one of Nvidia's Twitter accounts to

This account has been inactive since 2019, but today unexpectedly posted posts related to the Dogecoin cryptocurrency. Given the recent purchase of Twitter by Elon Musk and his love for this cryptocurrency, the situation looks quite funny.

Be that as it may, the attackers published a record about a certain Dogeathon 2022 event and added a link to the record. Of course, the link was used for phishing.

The account is currently suspended. Nvidia itself has not yet commented on the situation.

Continue Reading

Most Popular