Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 27 |
Nodes: | 6 (0 / 6) |
Uptime: | 38:05:04 |
Calls: | 631 |
Calls today: | 2 |
Files: | 1,187 |
D/L today: |
22 files (29,767K bytes) |
Messages: | 173,683 |
I came across this which sounds alarming.
"Any O2 customer can be trivially located by an attacker with even a
basic understanding of mobile networking.
There is also no way to prevent this attack as an O2 customer. Disabling
4G Calling does not prevent these headers from being revealed, and if
your device is ever unreachable these internal headers will still reveal
the last cell you were connected to and how long ago this was."
Is it true?
https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/
Richmond <dnomhcir@gmx.com> wrote:
I came across this which sounds alarming.
"Any O2 customer can be trivially located by an attacker with even a
basic understanding of mobile networking.
There is also no way to prevent this attack as an O2
customer. Disabling 4G Calling does not prevent these headers from
being revealed, and if your device is ever unreachable these internal
headers will still reveal the last cell you were connected to and how
long ago this was."
Is it true?
https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/
I can't verify that but it sounds entirely plausible. It's very
serious.
Also it seems likely that it works for any O2 customer, even if they
aren't using VoLTE / don't have a 4G phone. The attacker needs to use
VoLTE, but the recipient doesn't - any 2/3/4/5G mobile will do.
Theo