- cross-posted to:
- sysadmin@lemmy.world
- cross-posted to:
- sysadmin@lemmy.world
SS7 is vulnerable to attack. However, the types off attacks on the video don’t affect Signal as it requires a pin. (Make sure you set your pin to something strong and secure)
It’s 30 minutes. Anyone have a quick summary?
Mobile networks are awful and are very easy to spy on.
But the video is worth every minute.
I did watch it in the end after your recommendation, and it was interesting. Thanks!
deleted by creator
I don’t particularly like Linus, but he was bearable in this video. As someone who assumed this was a SIM swap, I was genuinely as confused as he was playing it up when he was able to place calls but not receive them. That was really interesting.
Linus is great. Sure he has his flaws but of all the flawed people he doesnt have horrible ones.
Birds of a shit-feather flock together.
I have seen Linus straight up lie about things and distort benchmarks to make it seem like companies they get money from make better products than they do. Fuck that guy.
SS7 protocol for 2G and 3G is vulnerable to man in the middle attack, easy to spy on people with. They use a walled garden approach al the primary defence mechanism and you can gain access through in for the low low price of couple of thousands of USD.
Couple of exploits are intercepting or monitoring calls and texts and triangulating position by checking what cell towers are in range.
I remember the analog days where a few keystrokes on an Ericson phone were all you needed to start listening to private conversations on the cell tower you were connected to.
My rule of thumb that grimaces in the thumbnail mean the video is playing on emotions instead of facts (i.e. is crap) has another match.