'Long-standing vulns' in 5G protocols open the door for attacks on smartphone users _theregister.com
| posted by BlueTeam6 in : research | 3 comments |
0

'Long-standing vulns' in 5G protocols open the door for attacks on smartphone users

Comments

You must log in or register to comment.

Astonishing

Paragraph So the absolute latest and greatest mobile phone network technology, the one that (along with IPv6) was going to allow absolutely ubiquitous embedded systems in anything that moves (and a lot of things that don't move, or don't move after they've been bolted / screwed / nailed / welded into place),.. that technology... has well-known, long-standing weaknesses in the protocols and architecture? You could knock me down with a feather. It's almost as if the designers, architects and research engineers were subconsciously making sure there'd be a need for designers, architects and engineers to develop 6G at some point. Or something.

BlueTeam6 wrote
1

"It's almost as if the designers, architects and research engineers were subconsciously making sure there'd be a need for designers, architects and engineers"

Actually, from long observation, I think it's just another case of Dunning Kruger - they haven't a clue that they haven't a clue. The entirety of IT is not yet an engineering discipline. It seems that software development in particular is mostly conducted without any discipline at all.

Antoine wrote
1

It seems that software development in particular is mostly conducted without any discipline at all.

Indeed. Hanlon's Razor also comes to mind: "Never attribute to malice that which is adequately explained by stupidity."

Admittedly, "never" is a bit strong, because malice should never be completely off the table; but in a world where "I messed with it for a few minutes on jsfiddle" is considered to be both development and testing, stupidity should never be off the table either.

Brendan wrote
1