- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
00:00 I hacked Linus!
00:59 How Steve Jobs and Steve Wozniak hacked the telephone network
02:22 Early history of the telephone
07:08 The kidnapping of Sheikha Latifa
08:41 How Signalling System No. 7 works
11:03 Why SS7 is vulnerable to hacking
12:15 How hackers gain access to phones
16:17 How I was able to spy on Linus’ phone
18:09 How hackers can intercept text messages
21:04 How your location can be tracked via SS7
29:03 How to protect your phone from hacking
2FA is great. It’s the best tool there is against impersonation and account takeovers.
But it’s only great PROVIDED
yes i agree! apps like aegis shows its possible to do it in a reasonable way.