Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I've got some questions on that first claim. Where's this done? I was under the opinion that you'd need system support for that to work --- the GSM radio's not directly plugged into the mic. I'd expect an android hacker to have found it there, if it's being injected in from the carriers.

For secure locations, you have to surrender just about every electronic device you have, because they could be used to transport data outside the secure location. The same rule applies to USB sticks, hard drives, PDAs, ipods, etc.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: