Talk:SIM cloning

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Opinionated?[edit]

This article seems to present somebody's opinion about GSM security and is quite a POV. RasterBlaster 05:29, 24 September 2006 (UTC)[reply]


the figures of gsm user (80 million) is not accurate. It should be more than that, in china alone, i thinks its more than hundred million user

comments about SIM cloning[edit]

If some one has a SIM PIN (CHV1) and a phisical access to SIM card, then SIM may be dublicated with probability 60-80%! Word "probability" used because a crack program mast make 1..65535 try of "RUN GSM ALGORITHM" SIM card command. Typically card breaked after such rape :) Any data file may be read and their content copy on clone SIM. There is no different for SIM card whose device send a APDU comman - legal GSM phone or hacker smart card reader.

What is Ki?[edit]

What exactly is "Ki" or "KI"? The article seems to lack a definition of this acronym. -Stian 00:35, 13 August 2007 (UTC)[reply]

  • Ki = the subscriber authorization key (which is the encryption key of the mobile station) 130.22.190.5 20:24, 24 September 2007 (UTC)[reply]

External Links[edit]

Why would we ahve a link to "how to clone" isnt it y'know, sorta illegal?

      That's not necessarily true of all countries.  —Preceding unsigned comment added by 58.37.217.234 (talk) 11:05, 9 September 2008 (UTC)[reply] 

Information itself is very rarely illegal, and wikipedia is a repository of all information. Knowing how to do this stuff certainly helps criminals (who are hardly going to be looking for it on wikipedia) but it is also of benefit to researchers, security implementers and other such people. —Preceding unsigned comment added by 90.203.180.236 (talk) 22:07, 16 January 2009 (UTC)[reply]

SIM Card's PIN(CHV1)?[edit]

Could Some one put up a articala about this "SIM Card's PIN(CHV1)." Yourdeadin 05:36, 3 September 2007 (UTC)Yourdeadin[reply]

KASUMI[edit]

KASUMI is not mandatory as per the 3GPP specification. It's a patented, royalty-free algorithm that the 3GPP developed based on Mitsubishi's MISTY encryption system. Operators are free to use it, but they can also use their own scheme. The only thing that is standardised is the key exchange procedure when a user books into a network, so roaming will work. —Preceding unsigned comment added by 84.226.39.52 (talk) 08:23, 14 September 2007 (UTC)[reply]


Trivial?[edit]

"For the final step, the hacker must also clone a SIM (Subscriber Identity Module) card, which Becker said is technically trivial." http://www.thestandard.com/news/2009/05/21/investigators-replicate-nokia-1100-online-banking-hack

Whom should I believe?

66.192.121.51 (talk) 19:26, 18 August 2009 (UTC)[reply]