Joke Collection Website - Blessing messages - Is it useful for mobile phones to prevent base station interception?

Is it useful for mobile phones to prevent base station interception?

Is it useful for mobile phones to prevent base station interception? Explain as follows.

The anti-counterfeiting base station function can minimize the access of mobile phones to GSM pseudo base stations, and reduce the reception of spam messages, imsi and number interception. 5C has anti-counterfeiting base station function, which is turned on by default, and there is no special switch. Huawei first had anti-counterfeiting base stations. I believe that as long as you have used children's shoes with mobile phones, most people have received short messages from scammers, right? If you don't understand, there are two reasons First, your ability to identify cheaters' news is weaker than that of ordinary people. Second, your mobile phone is very capable! Speaking of scam messages, the content is endless, ranging from "wife looking for you", "leader looking for you to go to the office", "public security court leaflet", "triad kidnapping" and even your unborn son will come to greet you. Of course, this kind of fraud routine is very low, and it existed more than ten years ago. With the vigorous publicity of the government and the media, it is estimated that only primary school students can be cheated. However, the Tao is one foot high and the devil is ten feet high. Now the routine of scammers is getting deeper and deeper, and they can even build their own "base stations". The "base station" is the signal tower built by the operator, and our mobile phones transmit and receive signals through the base station. The scammer will run a special program in the computer, which can perfectly simulate the official numbers of operators such as 100 10, 10000, 10086 to send short messages, even simulate the so-called "wanted notice" issued by judicial organs such as the public security law, and even directly simulate your parents, relatives and family members. In all kinds of telecom fraud cases, the "pseudo base station" routine is the most advanced. As the name implies, "pseudo base station" is a disguised operator base station. To build the simplest pseudo base station, you only need an antenna, a notebook and a set of software programs.