To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Phone cloning is the copying of identity from one cellular device to another.

YouTube Encyclopedic

  • 1/3
    Views:
    3 536
    4 660
    2 769
  • Can someone clone your phone with the IMEI number?
  • MOBILE PHONE CLONING TRICKS
  • MOBILE PHONE CLONING TRICKS

Transcription

AMPS cloning

Analogue mobile telephones were notorious for their lack of security.[1] Casual listeners easily heard conversations as plain narrowband FM; eavesdroppers with specialized equipment readily intercepted handset Electronic Serial Numbers (ESN) and Mobile Directory Numbers (MDN or CTN, the Cellular Telephone Number) over the air. The intercepted ESN/MDN pairs would be cloned onto another handset and used in other regions for making calls. Due to widespread fraud, some carriers required a PIN before making calls or used a system of radio fingerprinting to detect the clones.

CDMA cloning

A selection of mobile phones that can be cloned

Code-Division Multiple Access (CDMA) mobile telephone cloning involves gaining access to the device's embedded file system /nvm/num directory via specialized software or placing a modified EEPROM into the target mobile telephone, allowing the Electronic Serial  Number (ESN) and/or Mobile Equipment Identifier (MEID) of the mobile phone to be changed. To obtain the MEID of your phone, simply open your phone's dialler and type *#06# to get its MEID number.[2] The ESN or MEID is typically transmitted to the cellular company's Mobile Telephone Switching Office (MTSO) in order to authenticate a device onto the mobile network. Modifying these, as well as the phone's Preferred Roaming List (PRL) and the mobile identification number, or MIN, can pave the way for fraudulent calls, as the target telephone is now a clone of the telephone from which the original ESN and MIN data were obtained.

GSM cloning

GSM cloning occurs by copying cracking a secret key from the victim SIM card,[3] typically not requiring any internal data from the handset (the phone itself). GSM handsets do not have ESN or MIN, only an International Mobile Equipment Identity (IMEI) number. There are various methods used to obtain the IMEI. The most common method is to eavesdrop on a cellular network.

Older GSM SIM cards can be cloned by performing a cryptographic attack against the COMP128 authentication algorithm used by these older SIM cards.[4] By connecting the SIM card to a computer, the authentication procedure can be repeated many times in order to slowly leak information about the secret key. If this procedure is repeated enough times, it is possible to derive the Ki key.[5][6] Later GSM SIMs have various mitigations built in, either by limiting the amount of authentications performed in a power on session, or by the manufacturer choosing resistant Ki keys. However if it is known that a resistant key was used, it is possible to speed up the attack by eliminating weak Ki keys from the pool of possible keys.

Effectiveness and legislation

Phone cloning is outlawed in the United States by the Wireless Telephone Protection Act of 1998, which prohibits "knowingly using, producing, trafficking in, having control or custody of, or possessing hardware or software knowing that it has been configured to insert or modify telecommunication identifying information associated with or contained in a telecommunications instrument so that such instrument may be used to obtain telecommunications service without authorization."[7]

The effectiveness of phone cloning is limited. Every mobile phone contains a radio fingerprint in its transmission signal which remains unique to that mobile despite changes to the phone's ESN, IMEI, or MIN. Thus, cellular companies are often able to catch cloned phones when there are discrepancies between the fingerprint and the ESN, IMEI, or MIN.[citation needed]

See also

References

  1. ^ "GSM Cloning".
  2. ^ Bader, Daniel (March 21, 2017). "How to make sure your phone works on a prepaid alternative carrier". iMore. Retrieved October 24, 2017.
  3. ^ Gor, Mosam (2016-05-20). "What is Cell Phone Cloning - Everything You Need to Know". MovZio. Retrieved 2019-04-05.
  4. ^ Preuβ Mattsson, John (Jun 29, 2021). "The evolution of cryptography in mobile networks and how to secure them in the future". Ericsson. Archived from the original on 21 December 2022. Retrieved 26 July 2023.
  5. ^ Cycle, Janus (2023-01-13). "The Truth About SIM Card Cloning". YouTube. Retrieved 2023-07-23.
  6. ^ Brumley, Billy (18 Nov 2004). "A3/A8 & COMP128" (PDF). Archived (PDF) from the original on 6 June 2023. Retrieved 26 Jul 2023.
  7. ^ "S.493 - 105th Congress (1997-1998): Wireless Telephone Protection Act". 24 April 1998.
This page was last edited on 27 January 2024, at 21:49
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.