----------------------------------------------------------------------
Message-ID: <6a99628c-e11b-6110-3364-832501c83815@billhorne.com>
Date: 9 Aug 2020 13:17:46 -0400
From: "Bill Horne" <malaQssimRilatMion@gmail.com>
Subject: T-Mobile takes issue with recently disseminated 5G
'disinformation'
by Adrian Diaconescu
Just four short months after officially completing its long-in-the-works
Sprint takeover, T-Mobile claims to have surpassed AT&T in subscriber
numbers, setting its sights on Verizon next on the road to total US
wireless industry domination.
https://www.phonearena.com/news/t-mobile-statement-5g-rollout-disinformation-tower-companies_id126475
--
Bill Horne
(Remove QRM from my email address to email me directly)
------------------------------
Message-ID: <20200810175930.GA632@telecom.csail.mit.edu>
Date: Mon, 10 Aug 2020 17:59:30 +0000
From: Moderator <telecomdigestsubmissions@remove-this.telecom-digest.org>
Subject: Verizon is going all out in its efforts to close the 5G
coverage gap to T-Mobile
by Adrian Diaconescu
While Verizon is in no immediate danger of following AT&T's suit to be
overtaken by T-Mobile in terms of wireless subscribers, the nation's
number one carrier can certainly not afford to rest on its laurels as
far as network infrastructure is concerned.
https://www.phonearena.com/news/verizon-spectrum-acquisitions-t-mobile-5g-coverage-advantage_id126510
--
Bill Horne
Telecom Digest Moderator
------------------------------
Message-ID: <EAD5106E-0371-443E-B642-8AEB551BFE2E@roscom.com>
Date: 9 Aug 2020 14:57:23 -0400
From: "Monty Solomon" <monty@roscom.com>
Subject: Snapdragon chip flaws put >1 billion Android phones at risk
of data theft
Snapdragon chip flaws put >1 billion Android phones at risk of data
theft
There's no word on when Google and phone makers will incorporate fix
from Qualcomm.
A billion or more Android devices are vulnerable to hacks that can
turn them into spying tools by exploiting more than 400
vulnerabilities in Qualcomm's Snapdragon chip, researchers reported
this week.
The vulnerabilities can be exploited when a target downloads a video
or other content that's rendered by the chip. Targets can also be
attacked by installing malicious apps that require no permissions at
all.
>From there, attackers can monitor locations and listen to nearby
audio in real time and exfiltrate photos and videos. Exploits also
make it possible to render the phone completely unresponsive.
Infections can be hidden from the operating system in a way that makes
disinfecting difficult.
...
https://arstechnica.com/information-technology/2020/08/snapdragon-chip-flaws-put-1-billion-android-phones-at-risk-of-data-theft/
------------------------------
*********************************************
End of telecom Digest Tue, 11 Aug 2020