How to attack mobile networks with an iPhone (according to Apple)

This is merely a historical archive of years 2008-2021, before the migration to mailman3.

A maintained and still updated list archive can be found at https://lists.osmocom.org/hyperkitty/list/OpenBSC@lists.osmocom.org/.

Dieter Spaar spaar at mirider.augusta.de
Wed Jul 29 20:25:52 UTC 2009


Hello David,

On Wed, 29 Jul 2009 11:02:15 -0700, "David A. Burgess" <dburgess at jcis.net> wrote:
> 
> So you can jailbreak an iPhone and get direct access to L3 to run a  
> DOS?  That would be very interesting if it were true, but I suspect  
> it's just horseshit put in there to deceive the court, which isn't  
> hard to do in technology cases.

I don't think its that easy (if it would be, why not modify the TSM30
instead which should be much easier). I just found it very interesting
that Apple uses it as an argument. Of course such arguments are also bad
for opening the phone GSM stack to a larger group of people (if this ever
happens) or developing an open source GSM phone stack which could be
used for anything else than research.

Best regards,
  Dieter
-- 
Dieter Spaar, Germany                           spaar at mirider.augusta.de




More information about the OpenBSC mailing list