Only for learning purposes we have been understanding the GSM traffic. When we say GSM, we refer to 2G. Learning terms as: SDR hardware, Dragon OS (a complete Linux Ubuntu distribution filled and configured with a full set of hacking software for SDR) Grgsm_scanner, grgsm_capture, grgsm_decode, gsm_evil, wireshark, decode sms, decode voice, imsi catcher, etc. 2G is weak in terms of security. Interesting below are two articles, in which it seems that by the time of GSM conception, it was intentionally baked into the algorithm to provide a backdoor for law enforcement agencies to access sensitive data transmissions. How many times have we heard the switch off 2G? This is delayed continuously due to the still big amount of old connected devices, and some lack of frequencies. Recommendations: in your phone settings configure always to high connexion available 4G/5G, and avoid 2G networks. When buying IOT devices, gsm routers, etc, make sure they have right network technologies....