X-Git-Url: https://gitweb.stoutner.com/?p=PrivacyCell.git;a=blobdiff_plain;f=app%2Fsrc%2Fmain%2Fassets%2Fen%2Fexplanations%2Fstingrays.html;h=abd11dce2ed3aec99d98b7fe95e755cb643567b9;hp=f5ca37ef2938a2acf41b0085fd68a5b7f0db56d4;hb=1b722c3d327fa2d571abee745a115a1f54ab2a27;hpb=20a6dc6adf6f00afe244596b87c96361d040989f diff --git a/app/src/main/assets/en/explanations/stingrays.html b/app/src/main/assets/en/explanations/stingrays.html index f5ca37e..abd11dc 100644 --- a/app/src/main/assets/en/explanations/stingrays.html +++ b/app/src/main/assets/en/explanations/stingrays.html @@ -29,8 +29,9 @@

IMSI catchers, also known as stingrays, are fake cell phone towers that intercept your traffic and spy on you. Each generation of cell phone protocols has attempted to mitigate stingrays, but each has generally failed. - With 5G, more of the traffic is encrypted in such a way that it prevents stingray spying. However, 5G networks can run in a blended 4G/5G mode, - where the control channel is 4G and the data channel is 5G. This is known as 5G NR NSA (5G New Radio Non-Standalone) mode. + With 5G, more of the traffic is encrypted in such a way that it prevents stingray spying. + However, 5G networks can run in a blended 4G/5G mode, where the control channel is 4G and the data channel is 5G. + This is known as 5G NR NSA (5G New Radio Non-Standalone) mode. When connected to such a blended network, a cell phone is not protected against modern stingray attacks.