Cybersecurity researchers have found a contemporary set of safety points within the Terrestrial Trunked Radio (TETRA) communications protocol, together with in its proprietary end-to-end encryption (E2EE) mechanism that exposes the system to replay and brute-force assaults, and even decrypt encrypted visitors.
Particulars of the vulnerabilities – dubbed 2TETRA:2BURST – have been offered on the Black Hat USA
Main Menu
Subscribe to Updates
Get the latest creative news from FooBar about art, design and business.