O2’s 4G Calling Fiasco: Your Location’s Been Leaked, But No Worries, It’s Fixed!

O2’s 4G Calling had a security hiccup, accidentally turning into a mobile network’s version of a nosy neighbor. Users’ location data was leaking like a sieve, giving anyone with basic tech skills the ability to pinpoint their whereabouts. The company has since fixed the issue, but it was a bit of a “whoopsie” moment!

Pro Dashboard

Hot Take:

Oh O2, you had one job—to keep our secrets safe while we babble away on our shiny new 4G Calling service. But instead, you gave away our location like a GPS-obsessed stalker. Kudos to Daniel Williams for discovering this privacy slip-up. At least now we know that when it comes to privacy, “O2” might actually stand for “Oops, too easy!”

Key Points:

  • A vulnerability in O2’s 4G Calling service leaked user location information.
  • VoLTE technology enables voice calls over 4G/LTE networks at higher speeds.
  • Information leaked included IMSI, IMEI numbers, and location data.
  • Attackers could pinpoint users’ locations within a 100-square-meter area in urban centers.
  • O2 has since implemented a fix, ensuring users no longer need to worry about this vulnerability.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?