AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
The Backdoor and Other Vulnerabilities Work
There's room for more research and minimum. There is at this point a lot that we don't know because there's going to be a broader presentation, like you said, at black hat where some more information about the process of how this was discovered will be kind of revealed. If you're on T one, which is the one with the back door, if you've got to buy some new radios, not much you're going to be able to do since this is baked into the design. But she did a really good interview with ETSI basically being like, is this a backdoor or not? So I recommend people go read that as well. We unfortunately just didn't have time