The talk discusses the security shortcomings of integrating IT protocols into mobile networks, focusing on IMS and RCS technologies. The vulnerabilities include intercepting calls and SMS, impersonation, user tracking, fraud, and DoS attacks. The middle part of the mobile network, including IMS, has not been fully analyzed for security. The recent deployment of RCS technology by Google and mobile operators has not yet solved the security issues. The talk suggests possible mitigation measures.
- Mobile networks have undergone security improvements but have also become more complex with the integration of IT technologies.
- IMS and RCS technologies have vulnerabilities in intercepting calls and SMS, impersonation, user tracking, fraud, and DoS attacks.
- The middle part of the mobile network, including IMS, has not been fully analyzed for security.
- The recent deployment of RCS technology has not yet solved the security issues.
- Possible mitigation measures should be implemented to address the vulnerabilities.
The talk mentions that the recent deployment of RCS technology by Google and mobile operators was supposed to fix some of the issues of previous technologies. However, the technology has already been found to have vulnerabilities, such as intercepting calls and SMS, impersonation, and user tracking. The talk emphasizes the need to address these vulnerabilities before it's too late.