Login
Hide
Panel
Reply: Fri Jul 22 2016 02:16:29 GMT-0400 (EDT)
Reply To: Against the Law: Countering Lawful Abuses of Digital Surveillance
Ariel 1 Contributor
July 22, 20161 Version
Not Featured in any Journals
Cite

Bibtex

@article{ReplyFriJul22016, title={Reply: Fri Jul 22 2016 02:16:29 GMT-0400 (EDT)}, author={Ariel }, year={2016}, note={version: 57a22cbd5a4037b8e01adb31}, publisher={PubPub}, }

APA

Ariel . (2016). Reply: Fri Jul 22 2016 02:16:29 GMT-0400 (EDT). PubPub, [https://www.pubpub.org/pub/5791ba3d09c4422c00ccd825] version: 57a22cbd5a4037b8e01adb31

MLA

Ariel . "Reply: Fri Jul 22 2016 02:16:29 GMT-0400 (EDT)". PubPub, (2016). [https://www.pubpub.org/pub/5791ba3d09c4422c00ccd825] version: 57a22cbd5a4037b8e01adb31

Chicago

Ariel . "Reply: Fri Jul 22 2016 02:16:29 GMT-0400 (EDT)". PubPub, (2016). [https://www.pubpub.org/pub/5791ba3d09c4422c00ccd825] version: 57a22cbd5a4037b8e01adb31
LoginFollow
0 Followers
It will be hardened phone at the end of the day competing with other hardened phones that try hard to provide solutions to all types of eavesdropping as well. as it requires physical hacking connections inside the phone, porting this to any phone vendor is not realistic. also, what about other threats like SS7 snd MITM attacks based...
Contents
Discussions
Contents
Discussions
Show Threads