Security Architectures in the EU

Tag: TC LI

  • “Obstacles to surveillance”: How authorities insecure 5G telephony

    “Obstacles to surveillance”: How authorities insecure 5G telephony

    In the fifth generation of mobile communications, encrypted and anonymous connections are technically feasible. Police and secret services, however, provide new interception possibilities Following the auction of frequencies, mobile operators are building the new 5G network. This fifth generation of…

  • Surveillance of 5G: Governments plan to change laws

    Surveillance of 5G: Governments plan to change laws

    5G telephony makes communication more secure. Connections, subscriber and device identifiers are partly encrypted, also conventional IMSI catchers become useless. Providers could therefore be forced to install new surveillance technology. With Multi-Access Edge Computing (MEC), the fifth mobile phone generation…