Joke Collection Website - Public benefit messages - Preventive measures of pseudo base station

Preventive measures of pseudo base station

Pay attention to the sudden disappearance of cell phone signal.

Experts and industry insiders remind the majority of mobile phone users that when the mobile phone signal suddenly disappears, perhaps it is when the pseudo base station sends a group message to invade, users should pay attention to the short messages that come from time to time and don't fall into the trap of fraudulent short messages.

Install interception software

CCTV's Focus Interview reported that mobile phone security experts pointed out that due to technological progress, fraudulent short messages often forge official numbers such as banks, airlines and operators to send "warm reminders" and "safety tips", which makes people hard to prevent. While strengthening security vigilance, mobile phone users also need to use mobile phone security software to identify fraudulent short messages sent by pseudo base stations through technical means.

Guangdong Mobile even developed the industry's first "mobile phone security pioneer" application software, which has the function of preventing illegal SMS messages from pseudo base stations. For spam messages sent by pseudo base stations, "Mobile Phone Security Pioneer" can effectively intercept and kindly remind users, help users identify illegal message content and avoid users being victimized.

Change to a safer mobile phone.

When inquiring about the victims of pseudo base stations, it can be found that most users are China Mobile and China Unicom, while China Mobile and China Unicom are local branches that cooperate with the public security to rectify pseudo base stations. However, China Telecom and its users have not found any relevant cases on Baidu, which makes people feel suspicious. The reason is that the pseudo base station cannot be connected to the CDMA network of telecom.

According to industry analysis, the reason why China telecom users are not harassed by pseudo base stations is mainly related to the principle of CDMA technology. According to reports, the technical principle of the pseudo base station is to use the mobile signaling monitoring system to monitor various signaling processes in the process of mobile communication and obtain the current location information of mobile phone users. When the user's location information is consistent with the specific area selected by the service, a service customization short message is sent to the user. In order to obtain accurate and comprehensive user information, the signaling detection system needs to monitor the related signaling links in the mobile communication network.

However, CDMA network uses military spread spectrum technology to create a kaleidoscope of code address changes. Its signal address is a 42-bit PN pseudo-random code with 4.4 trillion possible permutations, which changes immediately after each call.

Therefore, guessing a code among so many codes is like looking for a needle in a haystack. If you don't know the code used by the user, the pseudo base station can't get the current location information of the mobile phone user and can't connect to the CDMA user.

Moreover, due to its inherent security characteristics, CDMA network can resist general attacks without additional encryption processing. If additional encryption is used, eavesdroppers can't eavesdrop even if they get the code used by users.

Obviously CDMA is more secure and confidential. In order to prevent the harassment of pseudo base stations, experts suggest that users can choose a more secure CDMA network. Moreover, the Prism Gate incident in the United States also reminds people that information security is very important, and ordinary users should also have this awareness. Choosing a safer network and mobile phone will avoid unnecessary trouble.