5G SA Roaming Without OAuth 2.0 Equals Insecurity By Design.
Josue Martins Blog
by Josue Martins
2w ago
Insecurity By Design Or Insecurity By Ignorance ..read more
Visit website
Por que o 3GPP não usou o RFC 8705 para tokens OAuth2 do NRF no 5G Core?
Josue Martins Blog
by Josue Martins
4M ago
Autenticação TLS mútua do cliente OAuth 2.0 e tokens de acesso vinculados a certificados no 5G Core ..read more
Visit website
Top 5 Pitfalls In 5G Security
Josue Martins Blog
by Josue Martins
4M ago
2023 5G Core security wrap up ..read more
Visit website
Top 10 Limitations of Telecom Signalling Firewall
Josue Martins Blog
by Josue Martins
1y ago
Security is a process and not a product ..read more
Visit website
Using Mutual TLS To Enforce Zero Trust In The 5G Core.
Josue Martins Blog
by Josue Martins
1y ago
Mutual TLS one of the zero trust pillars in 5G Core SA ..read more
Visit website
Hackers Are Tracking Your Every Move
Josue Martins Blog
by Josue Martins
1y ago
Multiple Methods That Cybercriminals Can Use To Extract Your Location ..read more
Visit website
How Exposed Will The User Plane Function(UPF) be?
Josue Martins Blog
by Josue Martins
1y ago
Threat modeling around UPF Interfaces ..read more
Visit website
5G Core Network Functions That Should Never be Deployed In A Public Cloud
Josue Martins Blog
by Josue Martins
1y ago
Keep this network function in a private cloud Recently, the adoption of 5G Core deployment in public clouds(such as AWS, Azure, and Google Cloud) has been a hot topic of discussion. However, there are some items that are rarely discussed regarding deploying critical network functions in public clouds and one of these items are: which network functions should not be deployed in public clouds? Before a technical deep dive, a brief introduction to the 5G Core network and public and private clouds is needed. What is a 5G Core? The 5G Core(Fifth Generation Of Mobile Core Network ..read more
Visit website
Why Didn’t 3GPP use RFC 8705 For NRF’s 0auth2 Tokens In 5G Core?
Josue Martins Blog
by Josue Martins
1y ago
OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens in 5G Core! While reading the 3GPP TS33.501, I realised that one item in 5G security can get a third implementation option and I would like to highlight it. It will be assumed that the reader has knowledge of PKI, mutual TLS, 0auth2 and 5G Core procedures. This item is regarding the 0auth2 token or authorization token signature verification/validation from the NRF(Network Repository function) that works as an authorization server in the 5G Core network. What is the role of 0auth2 tokens in 5G Core? Th ..read more
Visit website
How Mobile Operators should Thousands of Dollars because of SMS Malware.
Josue Martins Blog
by Josue Martins
2y ago
How Mobile Operators Lost Thousands Of Dollars Because Of SMS Malware. SMS Malware Analysis — Write Up By Josue Martins This write-up is about an android malware that affected multiple mobile operators and subscribers, it is commonly found on pirate sites where subscribers download songs, games, and other content. I have presented my finds on this SMS Malware at the GSMA Fraud and Security Group meeting in Paris 2019, This malware affected operators in Africa, Europe, and the Middle East, and the victims of this malware were often left with huge bills on their telephone number ..read more
Visit website

Follow Josue Martins Blog on FeedSpot

Continue with Google
Continue with Apple
OR