Haven’t we always known this? It’s the same concept as a Stingray device, which is used to spy on people because their devices connect to it automatically, assuming it’s a normal cell tower. People don’t know what tower they’re connected to, so if you connect to a “fake” or exploited tower, you’ve basically handed over the keys. This is essentially the same thing, but on a 5g network, which is presumably made up of even more nodes/towers.
4G had a lot of the same issues as 3G, but 5G was a complete redesign (including security).
It was supposed to have been way harder to break than previous generations.
I’d like to dig up some technical information on this. It has a lot of claims of what hackers can do but how do they do it at a technical level? Is using VPN helpful? Stuff like that.
Higher peak data rate, lower latency, more network capacity are basically the main improvements for phone users. Partially because the whole radio protocol (among other things) was redesigned to reduce overhead and also because of the new mmWave bands which have enormous bandwidth.