Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But A5/2 and 1 shared the same key generation, leading to an attack replaying the recorded, encrypted stream.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: