ohai.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A cozy, fast and secure Mastodon server where everyone is welcome. Run by the folks at ohai.is.

Administered by:

Server stats:

1.8K
active users

#ss7

1 post1 participant0 posts today
Replied in thread

@licho @osman provide evidence the code @signalapp released is actually being deployed.

Not to mention pushing a #Shitcoin-#Scam (#MobileCoin) disqualifies #Signal per very design!
youtube.com/watch?v=tJoO2uWrX1M

  • Given the collection of #PII like #PhoneNumbers, the ability to restrict functionality based off those and the fact that #Signal is subject to #CloudAct make it inherently not trustworthy.

And don't even get me started on the fact.it's not sustainable to run it as a #VCmoneyBurningParty!

Same as identifying users: They already got a #PhoneNumber which in many juristictions one can't even obtain without #ID legally, thus making it super easy to i.e. find and locate a user. Even tze cheapest LEAs can force their local M(V)NOs to #SS7 a specific number...

  • All these are unnecessary risks, that could've been avoided, but explicitly don't even get remediated retroactively!

Again: Signal has a #Honeypot stench, and you better learn proper #E2EE, #SelfCustody and #TechLiteracy because corporations can't pull the 5th [Amendment] on your behalf!

#DHS Says #China, #Russia, #Iran, and Israel Are #Spying on People in #US with #SS7
The Department of #HomelandSecurity knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.
In the newly released document, #SenatorWyden’s says #DoD confirmed it believes that all US #telecom are vulnerable to SS7 and Diameter #surveillance, and that DoD has not reviewed 3rd-party audits carried out by US carriers
404media.co/dhs-says-china-rus

404 Media · DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7The Department of Homeland Security knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.

On Mobile Phone Security
kicksecure.com/wiki/Mobile_Pho
#SS7 and #baseband #vulnerabilities

What about #mobian hardening on a #MechaComet with a cellular hat? Then there's only carrier protocol weaknesses...

If ISPs use microwave relays (the hated 'air' - remember Max Headroom) and NSA access points, is domestic broadband really secure either? But the cable or fiber doesn't have 'carrier' vulns.
kicksecure.com/wiki/Router_and

#kicksecure #whonix #docs #security-misc

Kicksecure · Mobile Devices Privacy and SecurityMobile devices security and data harvesting. Mobile security best practices and preventative measures against security breaches, data leaks, SIM Swapping Attacks, and more.

"The Department of Homeland Security (DHS) believes that China, Russia, Iran, and Israel are the “primary” countries exploiting security holes in telecommunications networks to spy on people inside the United States, which can include tracking their physical movements and intercepting calls and texts, according to information released by Senator Ron Wyden.

The news provides more context around use of SS7, the exploited network and protocol, against phones in the country. In May, 404 Media reported that an official inside DHS’s Cybersecurity Insurance and Security Agency (CISA) broke with his department’s official narrative and publicly warned about multiple SS7 attacks on U.S. persons in recent years. Now, the newly disclosed information provides more specifics on where at least some SS7 attacks are originating from."

404media.co/dhs-says-china-rus

404 Media · DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7The Department of Homeland Security knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.

"#China #Russia #Iran & #Israel are spying on Americans using telecom weaknesses.
-DHS

All US carriers vulnerable to some extent.

We know this thanks to Sen
Wyden's tireless work to expose #SS7 & #Diameter vulnerabilities.

Global NET for routing calls:

Requests are trusted by default. Whatever operator they come from!

Since requests can let you do things like intercept calls, texts & track phones locations..."
-J Scott-Railton

#Telecommunications #Surveillance

404media.co/dhs-says-china-rus

#InfoSec #Privacy #SS7 #Veritasium
Exposing The Flaw In Our #Phone System

A massive thank you to #AlexandreDeOliveira and #KarstenNohl making this demo possible.

00:00 I hacked Linus!
00:59 How #SteveJobs and #SteveWozniak hacked the telephone network
02:22 Early history of the telephone
07:08 The kidnapping of #SheikhaLatifa
08:41 How Signalling System No. 7 works
11:03 Why SS7 is vulnerable to hacking
12:15 How hackers gain access to phones
16:17 How I was able to spy on Linus’ phone
18:09 How hackers can intercept text messages
21:04 How your location can be tracked via SS7
29:03 How to protect your phone from hacking
https://www.youtube.com/watch?v=wVyu7NB7W6Y

Teleselskaberne og digitaliseringsministeren vil bekæmpe #smishing - #svindel via SMS - ved at AI skal gennemtravle alle vores SMS'er som et andet spamfilter i stedet for at arbejde på at få styr på den globale adgang til #SS7 protokollen, der giver adgang til #spoofing. De vil fange ræven, når den er kommet ind i hønsegården før den spiser hønsene. Det er sikkert billigere og hurtigere, men også dumt. #dkpol 1/2