Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

How does SMS interception actually work in practice? Wouldn't this require physical access to the phone/SIM, or are there any known remote exploits?


view as:

How about "teenager calls phone company, gets number reassigned"? That's the level of assurance we're dealing with in SMS.

I was able to go into a mobile phone store and ask for a new sim for phone number x and get it without any identification. All I was asked was to sign my name and pay some small amount of money.

Legal | privacy