Feddit.dk
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month ago

Hacking the Call Records of Millions of Americans

evanconnelly.github.io

external-link
message-square
6
link
fedilink
35
external-link

Hacking the Call Records of Millions of Americans

evanconnelly.github.io

Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 month ago
message-square
6
link
fedilink
Imagine if anyone could punch in a phone number from the largest U.S. cell carrier and instantly retrieve a list of its recent incoming calls—complete with timestamps—without compromising the device, guessing a password, or alerting the user. Now imagine that number belongs to a journalist, a police officer, a politician, or someone fleeing an abuser. This capability wasn’t a hypothetical. I recently identified a security vulnerability in the Verizon Call Filter iOS app which made it possible for an attacker to leak call history logs of Verizon Wireless customers.
alert-triangle
You must log in or register to comment.
  • ㅤㅤㅤㅤㅤㅤㅤㅤ@friendica.world
    link
    fedilink
    arrow-up
    5
    ·
    1 month ago

    @kid
    Proof remain, no system is safe.
    One has never finished educating or improving to defend his castle and must always stay on edge and mostly adapt.

    • lacaio da inquisição@lemmy.eco.br
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 month ago

      Maybe they didn’t invest that much on security, as the article pointed out for not having a system that would uniquely identify only the number linked to the account.

      • ㅤㅤㅤㅤㅤㅤㅤㅤ@friendica.world
        link
        fedilink
        arrow-up
        1
        ·
        1 month ago

        @obbeel
        Major point of weakness is the human aspect.
        Not any system, it’s how you handle it as not 1 can be trusted.
        No not even GNU Linux, you trust the gpg key or hash with shasum.
        Look, even the dev of my distro state, it remain your decision to trust> an intern could be corrupt, something has been done wrong or is compromised on users end as well, that key may be tampered.
        In social engineering we learned to not give any thing anything unless in a protected sense of that era called protection. And I hope you did just that .

        • ㅤㅤㅤㅤㅤㅤㅤㅤ@friendica.world
          link
          fedilink
          arrow-up
          1
          ·
          1 month ago

          @obbeel
          parrotsec.org/docs/configurati…

  • ㅤㅤㅤㅤㅤㅤㅤㅤ@friendica.world
    link
    fedilink
    arrow-up
    4
    ·
    1 month ago

    @kid
    wasn’t this called before Phreaking?
    But with modern methods as set api in Py script to OSINT.

  • Onno (VK6FLAB)@lemmy.radio
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 month ago

    Oops

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 7 users / day
  • 539 users / week
  • 1.36K users / month
  • 4.83K users / 6 months
  • 10 local subscribers
  • 7.2K subscribers
  • 2.78K Posts
  • 5.26K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.11
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org