Talk:SIM cloning

Opinionated?
This article seems to present somebody's opinion about GSM security and is quite a POV. RasterBlaster 05:29, 24 September 2006 (UTC)

the figures of gsm user (80 million) is not accurate. It should be more than that, in china alone, i thinks its more than hundred million user

comments about SIM cloning
If some one has a SIM PIN (CHV1) and a phisical access to SIM card, then SIM may be dublicated with probability 60-80%! Word "probability" used because a crack program mast make 1..65535 try of "RUN GSM ALGORITHM" SIM card command. Typically card breaked after such rape :) Any data file may be read and their content copy on clone SIM. There is no different for SIM card whose device send a APDU comman - legal GSM phone or hacker smart card reader.

What is Ki?
What exactly is "Ki" or "KI"? The article seems to lack a definition of this acronym. -Stian 00:35, 13 August 2007 (UTC)
 * Ki = the subscriber authorization key (which is the encryption key of the mobile station) 130.22.190.5 20:24, 24 September 2007 (UTC)

SIM Card's PIN(CHV1)?
Could Some one put up a articala about this "SIM Card's PIN(CHV1)." Yourdeadin 05:36, 3 September 2007 (UTC)Yourdeadin

KASUMI
KASUMI is not mandatory as per the 3GPP specification. It's a patented, royalty-free algorithm that the 3GPP developed based on Mitsubishi's MISTY encryption system. Operators are free to use it, but they can also use their own scheme. The only thing that is standardised is the key exchange procedure when a user books into a network, so roaming will work. —Preceding unsigned comment added by 84.226.39.52 (talk) 08:23, 14 September 2007 (UTC)

Trivial?
"For the final step, the hacker must also clone a SIM (Subscriber Identity Module) card, which Becker said is technically trivial." http://www.thestandard.com/news/2009/05/21/investigators-replicate-nokia-1100-online-banking-hack

Whom should I believe?

66.192.121.51 (talk) 19:26, 18 August 2009 (UTC)