• BertramDitore@lemmy.world
    link
    fedilink
    English
    arrow-up
    26
    ·
    9 months ago

    Haven’t we always known this? It’s the same concept as a Stingray device, which is used to spy on people because their devices connect to it automatically, assuming it’s a normal cell tower. People don’t know what tower they’re connected to, so if you connect to a “fake” or exploited tower, you’ve basically handed over the keys. This is essentially the same thing, but on a 5g network, which is presumably made up of even more nodes/towers.

  • polumrak@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    9 months ago

    Ive installed so much crap voluntarily, I don’t think I have any private data left. Why would they even bother?