DECEMBER 27, 2020
There have been alot of talk about hackers who daily hack wifi and cell phones. Many people were unsure that these sort of things were occurring and the evil amongst us have the motto, "deny everything." Most of these hackers are paid by either police or the feds to do what it is they are doing. Then there are those who is racist and hack wifi and cell phones merely for the thrill. There was an explosion which occurred in Nashville, TN., within the past couple of days which was a battle bvetween the NSA and the FBI. But of course you know a scapegoat was apprehended. This was a distraction of whats going on around us daily. Every so often when people start thinking about whose responsible for their demise over the internet, once government agents get a whiff of it, horrible events take place. They don't want you thinking for yourselves nor questioning whose behind all the Covid conspiracies. Not long ago, Montu, aka Muhammad Eury, who lives in West Cleveland, Ohio, did a small lecture on hackers. I have tooken some of the information and articulated it in a way where ordinary people can understand it. And so...
n 2017, hackers and security researchers highlighted long-standing vulnerabilities in Signaling System 7 (SS7, or Common Channel Signalling System 7 in the US), a series of protocols first built in 1975 to help connect phone carriers around the world. While the problem isn’t new, a 2016 60 Minutes report brought wider attention to the fact that the flaw can allow a hacker to track user location, dodge encryption, and even record private conversations. All while the intrusion looks like ordinary carrier to carrier chatter among a sea of other, “privileged peering relationships. Telecom carriers and lobbyists have routinely downplayed the flaw and their multi-year failure to do much about it. In 2018, the CBC noted how Canadian wireless providers Bell and Rogers weren’t even willing to talk about the flaw after the news outlet published an investigation showing how (using only a mobile phone number) it was possible to intercept the calls and movements of Quebec NDP MP Matthew Dubé. Now there’s yet another wake up call: a new report from the Guardian indicates that Rayzone, an Israeli corporate spy agency that provides its government clients with “geolocation tools,” has been exploiting the flaw for some time to provide clients access to user location information and, potentially, the contents of communications. Apparently, the company first leased an access point in the network of Sure Guernsey, a mobile operator in the Channel Islands. From there, it appears to have exploited the SS7 flaw to track users in numerous additional countries:
Posted By: george patel
Sunday, December 27th 2020 at 2:17AM
You can also
click
here to view all posts by this author...