SS7 is vulnerable to attack. However, the types off attacks on the video don’t affect Signal as it requires a pin. (Make sure you set your pin to something strong and secure)

You are viewing a single thread.
View all comments
30 points

It’s 30 minutes. Anyone have a quick summary?

permalink
report
reply
53 points

Mobile networks are awful and are very easy to spy on.

But the video is worth every minute.

permalink
report
parent
reply
8 points

I did watch it in the end after your recommendation, and it was interesting. Thanks!

permalink
report
parent
reply
-8 points
Deleted by creator
permalink
report
parent
reply
11 points

I don’t particularly like Linus, but he was bearable in this video. As someone who assumed this was a SIM swap, I was genuinely as confused as he was playing it up when he was able to place calls but not receive them. That was really interesting.

permalink
report
parent
reply
28 points

when I read comments like these it makes me realize that maybe all the money flowing to OpenAI isn’t folly and there really are people out there trying to tl;dr their own lives

permalink
report
parent
reply
18 points

If that guy is like me i prefer to digest text rather than video.

permalink
report
parent
reply
5 points

What feels alien to me is the idea that experiencing a creative work is itself a means to an end.

I prefer to digest text too, but still would choose to taste a meal than read a typed up printout of the flavors it contains.

permalink
report
parent
reply
6 points

Can’t do text skimming in a video.

permalink
report
parent
reply
4 points
*

I don’t trust LLMs to do tldrs for me and it certainly doesn’t provide a rich nuance or spark discussions like asking a human would do.

(I say that with 7 comments in the thread lol but you get my point I’m sure)

permalink
report
parent
reply
21 points

SS7 protocol for 2G and 3G is vulnerable to man in the middle attack, easy to spy on people with. They use a walled garden approach al the primary defence mechanism and you can gain access through in for the low low price of couple of thousands of USD.

Couple of exploits are intercepting or monitoring calls and texts and triangulating position by checking what cell towers are in range.

permalink
report
parent
reply
8 points

I remember the analog days where a few keystrokes on an Ericson phone were all you needed to start listening to private conversations on the cell tower you were connected to.

permalink
report
parent
reply
-3 points

My rule of thumb that grimaces in the thumbnail mean the video is playing on emotions instead of facts (i.e. is crap) has another match.

permalink
report
parent
reply

Privacy

!privacy@lemmy.ml

Create post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

Community stats

  • 4.8K

    Monthly active users

  • 1.6K

    Posts

  • 23K

    Comments