#ss7

2025-06-09

@paul_ipv6 @briankrebs verisign owned a big chunk of ss7 into the aughts. they divested most of their business units and their #SS7 assets were sold off. i think ss7 might be #twilio and #carlyleGroup's problem to solve, which scares me a little cuz twilio is right in the eye of the hurricane of agentic ai fraud swarms that is forming 😬

it's been parted put to carriers ATT/Verizon/Lumen maintain their own ss7 infra. it's still roaming hubs out there, isn't it?

~/phranck :antifa:phranck@nerdculture.de
2025-05-16

It's almost 11 years ago since #SS7 vulnarebility has been exposed to the public on the 31. Chaos Communication Congress by Karsten Nohl and his team from @srlabs. And still, this cell phone protocol is the de facto standard without being made safer. Everyone should be aware of this!

#MobileNetwork #CellPhone #Security

youtube.com/watch?v=wVyu7NB7W6

B-TR3Eax11
2025-05-04

@Privacymatters Worth mentioning that "Global Titles" provide access to the network and the problems with Signalling Standard 7 -an antique but still used protocol that predates cellular networks- have been known for decades.

2025-04-25

@lauren

And here we are today, with not millions of dollars, one can setup an NVO and send SMS Spam because SS7 is not secure.

The original thinking was that if they had physical security of the wires, there would be logical security.

But, as the networks evolved, the old thinking did not.

#SS7

Kevin Karhan :verified:kkarhan@infosec.space
2025-03-25

@licho @osman provide evidence the code @signalapp released is actually being deployed.

Not to mention pushing a #Shitcoin-#Scam (#MobileCoin) disqualifies #Signal per very design!
youtube.com/watch?v=tJoO2uWrX1M

  • Given the collection of #PII like #PhoneNumbers, the ability to restrict functionality based off those and the fact that #Signal is subject to #CloudAct make it inherently not trustworthy.

And don't even get me started on the fact.it's not sustainable to run it as a #VCmoneyBurningParty!

Same as identifying users: They already got a #PhoneNumber which in many juristictions one can't even obtain without #ID legally, thus making it super easy to i.e. find and locate a user. Even tze cheapest LEAs can force their local M(V)NOs to #SS7 a specific number...

  • All these are unnecessary risks, that could've been avoided, but explicitly don't even get remediated retroactively!

Again: Signal has a #Honeypot stench, and you better learn proper #E2EE, #SelfCustody and #TechLiteracy because corporations can't pull the 5th [Amendment] on your behalf!

2025-03-25

@mattblaze

I doubt Hegseth can spell Metadata when sober.

#SS7 #Metadata

2025-03-21

"[...] to provide privacy protection, networks on both ends of the roaming interface must implement the SEPP function. Getting all roaming partners to implement SEPP may be extremely challenging; of the 351 network operators reported to have launched 5G services, only 41 have launched 5G cloud-native architectures according to the Global Mobile Suppliers Association (GSA) as of April 2023. The remaining 310 operators are still using the Non-standalone Architecture (NSA) for 5G, which lets mobile operators bypass the SEPP feature in 5G roaming while still providing the improved speed and reduced latency benefits of the 5G radio access network.

According to interviews with telecommunications security vendors at the Mobile World Congress (MWC) conference in March 2023, only a handful of operators have deployed SEPP, let alone are actually using it. The effect is that many operators are not integrating the security and privacy benefits of the 5G standards when they are deploying 5G networks."

#privacy #surveillance #3G #4G #5G #SS7 #SignalingProtocol

utoronto.scholaris.ca/server/a

2025-02-23

@semicolon
I think therefore Initial Address Message.

#ss7 #telephony #iam

OTPSMS247otpsms247
2025-02-13

"Giải Mã" SS7: Kiến Trúc, Ứng Dụng & Những Điều Cần Biết

👉 Chi tiết: youtube.com/watch?v=u1EJxM46bgA

"Giải Mã" SS7: Kiến Trúc, Ứng Dụng & Những Điều Cần Biết

👉 Chi tiết: https://www.youtube.com/watch?v=u1EJxM46bgA

#ss7
OTPSMS247otpsms247
2025-02-12

SS7 Là Gì? Hé Lộ Giao Thức Quyền Lực Của Viễn Thông & Những Nguy Cơ Bảo Mật

👉 Chi tiết: otpsms247.com/signaling-system

2025-01-26
Benjamin Carr, Ph.D. 👨🏻‍💻🧬BenjaminHCCarr@hachyderm.io
2025-01-14

#DHS Says #China, #Russia, #Iran, and Israel Are #Spying on People in #US with #SS7
The Department of #HomelandSecurity knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.
In the newly released document, #SenatorWyden’s says #DoD confirmed it believes that all US #telecom are vulnerable to SS7 and Diameter #surveillance, and that DoD has not reviewed 3rd-party audits carried out by US carriers
404media.co/dhs-says-china-rus

2025-01-10

@kim_harding

I would not call it secret.

Do not text sensitive information.

#SS7

Einstein^Diogenes@UniverseLinkazuresaipan@defcon.social
2025-01-06

On Mobile Phone Security
kicksecure.com/wiki/Mobile_Pho
#SS7 and #baseband #vulnerabilities

What about #mobian hardening on a #MechaComet with a cellular hat? Then there's only carrier protocol weaknesses...

If ISPs use microwave relays (the hated 'air' - remember Max Headroom) and NSA access points, is domestic broadband really secure either? But the cable or fiber doesn't have 'carrier' vulns.
kicksecure.com/wiki/Router_and

#kicksecure #whonix #docs #security-misc

Miguel Afonso Caetanoremixtures@tldr.nettime.org
2024-12-18

"The Department of Homeland Security (DHS) believes that China, Russia, Iran, and Israel are the “primary” countries exploiting security holes in telecommunications networks to spy on people inside the United States, which can include tracking their physical movements and intercepting calls and texts, according to information released by Senator Ron Wyden.

The news provides more context around use of SS7, the exploited network and protocol, against phones in the country. In May, 404 Media reported that an official inside DHS’s Cybersecurity Insurance and Security Agency (CISA) broke with his department’s official narrative and publicly warned about multiple SS7 attacks on U.S. persons in recent years. Now, the newly disclosed information provides more specifics on where at least some SS7 attacks are originating from."

404media.co/dhs-says-china-rus

#USA #CyberSecurity #DHS #SS7 #MobilePhones #Surveillance

Etienne / Tektek@todon.eu
2024-12-18

DHS Says China, Russia, Iran, and Israel Are Spying on People in US with SS7 404media.co/dhs-says-china-rus #ss7 #surveillance

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst