Remix.run Logo
NoiseBert69 4 days ago

They can use standardized lawful interception interfaces to get all this data.

No big need to dig down deep into the radio and protocol layer.