Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

Details of the vulnerabilities uncovered have been provided to handset manufacturers. “We’ve notified all the phone vendors and manufacturers, and there’s a lot of work being done on this now,” he said. “I can’t name names, but I will say that we’re working with one large tablet and smart-phone manufacturer.”

Modifications to the hardware or software of a mobile device can muddy the signals that an eavesdropper can pick up. Many wireless credit-card readers already include such countermeasures, said Jun.

In the case of smart phones and tablets, software upgrades that split operations using cryptographic keys into multiple parts that are then combined could protect existing devices without changes to hardware, said Jun. However, such tactics come at a cost. “They do require some kind of performance hit,” said Jun, because they ask a chip to do more work. That also means more power consumption, which could deter some developers, who are loath to waste precious battery life.

7 comments. Share your thoughts »

Credit: Technology Review

Tagged: Computing, Communications, cryptography, smart phones, antenna

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me