Jenny

8%
Flag icon
in the 1990s, cell phones were designed to automatically trust cell towers without any authentication systems. This was because authentication was hard, and it was hard to deploy fake cell phone towers. Fast-forward a half decade, and stingray fake cell towers became an FBI secret surveillance tool. Fast-forward another half decade, and setting up a fake cell phone tower became so easy that hackers demonstrate it onstage at conferences.
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
Rate this book
Clear rating
Open Preview