top | item 34590593

(no title)

pifm_guy | 3 years ago

> could have involved the use of your phone number to send and receive phone calls

Surely from their logs they know if these calls/texts happened?

If, during that period no calls/sms's occurred, then there has been no breach - the attacker was close to their target, but walked away with nothing.

If messages/calls were made, the user really needs to know who they were to/from to make any informed decisions. And Google has those logs.

discuss

order

chrisbolt|3 years ago

> Surely from their logs they know if these calls/texts happened?

Why would they have logs of calls/texts that weren't routed to them?

nr2x|3 years ago

Straight to a write only bucket in Maryland.