Beijing's Mentougou Longquan Town street where there are special large one-stop full-service health rgdg

Services [Microchip: fw488888], Wando-style, one-stop massage, spas, red, babes dirty tea you know

5G limelight recently, frequently become a hot topic of discussion. Such as, 5G package released so that people call "can not afford." Operators are busy 5G Partner Conference held a variety of names, one after another constantly depicting beautiful scenes. 5G mobile phone has become the focus, to bring the power of the consumer replacement. 5G on the whole industry chain manufacturers, large and small around the corner, trying to "show off the muscles." But in the heady 5G, but came discordant voices - it was found 11 vulnerabilities! What exactly these vulnerabilities? They are a stumbling block 5G triumph on the road, or insignificant pits it?

X factor appears! 5G of the 11 vulnerabilities were exposed

Once, many people in the industry have a tremendous confidence in the security features of 5G. Like before, vice president of Huawei Yangchao Bin expressed, "5G necessarily more secure than the entire network 4G network." The reason is that the introduction of 5G user permanent identifier and hidden from the user identifier, can encrypt user identity information, to better resist network attacks, to ensure personal privacy. This means that, once on the 4G network long-standing security issue, available in 5G network improvement and optimization.

But 5G security "myth", has been broken in recent days. C114 It is reported that security researchers at Purdue University and the University of Iowa found that 11 5G vulnerabilities. These vulnerabilities allow hackers easy access to the attacker's location, calls, text messages and web browsing history, you can also 5G network speed 4G attacker dropped even lower. More there is a huge risk that these vulnerabilities do not need to master the skill level is too strong. Hackers only need to have some knowledge of 4G and 5G network, and master the basic software radio technology, they can easily exploit these vulnerabilities to attack.

Guess you like

Origin www.cnblogs.com/gfgfe45/p/12152029.html