You're not as private with 5G, apparently. Location tracking, DoS, and fake notifications can be done because of flaws in the system. The paging system tries to reduce energy consumption, and, as always, when you try to go cheaper, security suffers.
Why are we so ready to accept, that technologies like 5G are good for us, when plainly the equation is not balanced - the supplier wins out, and others suffer. We need to be far more cognisant, and keep drilling below the surface to really understand the implications, not simply roll over and accept it as progress - because plainly many times it is not.
A bit more on security issues inherent with 5G ...
(Not terribly informative, but ...)
Thinking through what I am reading here, the biggest take away I get is that for most of what is talked about, the attacked has to be in the same site at the victim. Furthermore, with 5G, you may need to be in the same beam. While vulnerabilities certainly may exist, these are geo fenced to a small area. I also see a lot of shifting from the vulnerabilities in the network to the vulnerabilities the network enables, which is unfair. If wireless networks are responsible for the poor practices of the deployers of IoT and other systems, then the Internet at large is also at fault, as well as being the problem with viruses, ransomware, IP piracy, and every other evil thing done on a network connection.
On the plus side, it heartens me somewhat that researchers are looking at these kinds of things. It means that they are trying to keep the industry honest, and that they have run out of the really easy things. (Of course not true, but we can hope for the day!)
Absorb this latest batch of vulnerabilities around LTE used within 5 G networks and more to come - it has the attention of researchers:
When you look at the list, many of them are DOS, which I can do with an RF source pointed at the antenna, unless the details are more interesting. It was a 2 year process to clean out the spectrum for LTE in the US from bad cable TV connections, wireless microphones, and the occasional bad fluorescent light. Spoofing is very interesting, but I wonder how far it gets and what one can do with it, over what geography. I spent 20 years in wireless data, and know the protocols and call flows listed. My professional guess is that while they may have found flaws, the difficulty and limitations would make them not very risky. overall. I could be wrong, not knowing the details here, but as a general rule, I am vastly more concerned with the data the carriers have themselves than with what others might be working to find.