top | item 45875375

(no title)

welder | 3 months ago

No, I'm talking about anyone with SS7 access basically has root on the whole network and can query for locations of any phone number anonymously... no audit trail, no access control.

https://youtu.be/xfWyU5iXJ3I?t=860

https://youtu.be/wVyu7NB7W6Y

discuss

order

defraudbah|3 months ago

right, that's how police and criminals do it, I am aware how it works, what I wonder is how do you fix it, replace the protocol? encrypt it?

Hikikomori|3 months ago

Why when we have bandaids like ss7 firewalls.