Welcome To Perfectjammer Here you can get the latest information about jammers. Hope our information some help to you

Black Friday Promotion Mobile Black Friday Promotion

SIM CARDS will not be affected by the use of mobile phone signal jammers

Perfectjammer 2019-12-04

Recently, we had a question about our QA wiki service about vulnerable DES encrypted SIM cards and the means of protection. News about this feat has been webcast and Google is providing hundreds of thousands of hits for "750 Million Vulnerable SIM Cards". In this article, Jammer-Store will try to clarify the operation of this feat and is it really dangerous

In fact, this vulnerability is not as dangerous as the media is trying to describe it. We must also explain that there is no virus capable of hacking SIM cards, simply because viruses can reproduce and spread more. If the DES vulnerability is successfully exploited, the compromised SIM card will not be able to infect others. So, basically, it's a remote attack method on your smartphone.

Such a remote attack model can succeed if the targeted SIM card meets the following specifications:

Read or send SMS, making calls is possible only if a victim SIM card supports the Java card. It is a special programming language that allows you to create standard programs for SIM cards. The cost of a Java-enabled SIM card is slightly higher than that of standard cards, so many operators do not use them.

So, now we have reached the point where I will try to provide you with a suitable solution to this problem, if you think that can affect you. First, we must say that malicious OTA messages can be blocked at the network level, using some kind of firewall, able to block messages with specific features, when they try to go through the SMS center . If the operators implement them, the malicious messages will not reach the victim's phone. But not just any operator will, for example, Verizon has already shown interest in the personal data of its users.

The second way is to update the SIM card with these OTA messages. Your operator can update your 3DES DES encryption algorithm and block the ability to install third-party Java applets. In addition, you can replace your SIM card with a better protected card, which does not have such a feat. Another solution is to use a cell phone jammer, if you suspect that your phone is compromised.

Fortunately, Karsten Nohl, who discovered this feat, is a so-called "white pirate". He did not publish the information on the exploit and passed it on to the GSM associa.tion, which informed all the main operators. We therefore hope that the mobile operators have taken steps to secure our private data, otherwise it will be our priority