EFF @EFF
Then, the base station asks the phone to send its encryption capabilities. If the base station is a CSS, it can ignore the response or set it to have no encryption. The CSS releases the phone back to the real network and moves on to try and capture another phone’s IMSI. (4/5) https://t.co/Ipj1xbm4In — PolitiTweet.org