|
2010-05-04
, 16:43
|
Posts: 328 |
Thanked: 101 times |
Joined on Dec 2009
|
#12
|
It does sound like a reasonable proposal but -
I've worked with smart (credit) cards before, and it's entirely possible that there are challenge/response situations where secret keys are used, within the SIM card, to generate data to authenticate with the network.
I would be very surprised if you could just dump the data off the card and use it in the way you propose.
It's still agood idea and worth investigating, but don't be too disappointed if it won't work.
With that said, I'd be interested to read more about the mulit-sim cards mentioned by the other poster above.
Also, does anyone know if the multi-SIM phones require multiple radios?
|
2010-05-05
, 08:23
|
Posts: 42 |
Thanked: 20 times |
Joined on Feb 2010
@ Perth, WA
|
#13
|
|
2010-05-18
, 14:59
|
Posts: 71 |
Thanked: 5 times |
Joined on May 2010
|
#14
|
|
2010-05-18
, 15:02
|
|
Posts: 232 |
Thanked: 102 times |
Joined on Nov 2009
@ Warren, MI, USA
|
#15
|
|
2010-05-18
, 15:14
|
Posts: 692 |
Thanked: 264 times |
Joined on Dec 2009
|
#16
|
|
2010-05-21
, 11:55
|
|
Administrator |
Posts: 1,036 |
Thanked: 2,019 times |
Joined on Sep 2009
@ Germany
|
#18
|
|
2010-05-21
, 21:47
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#19
|
|
2010-05-21
, 22:25
|
|
Posts: 19 |
Thanked: 6 times |
Joined on May 2010
@ UK-PAX
|
#20
|
One possible avenue for faking in alternative SIMs would be SAP -- AFAIK the N900 doesn't support SAP, but its existence makes it reasonable that the closed cellular code could permit SIM access other than through the physical socket...
Of course, that doesn't simply allow virtualizing a SIM; the ultimate goal here would require breaking the challenge/response authentication system to extract the SIM's internal key. AIUI, this is the same issue as SIM cloning, which is generally possible in reasonable time on really old SIMs, but not on recent ones (due to now-fixed weaknesses).
I've worked with smart (credit) cards before, and it's entirely possible that there are challenge/response situations where secret keys are used, within the SIM card, to generate data to authenticate with the network.
I would be very surprised if you could just dump the data off the card and use it in the way you propose.
It's still agood idea and worth investigating, but don't be too disappointed if it won't work.
With that said, I'd be interested to read more about the mulit-sim cards mentioned by the other poster above.
Also, does anyone know if the multi-SIM phones require multiple radios?