This is dark. How did I miss this all these years.
You could just get a telephone number 'network service API' type phone number, which would give you access to all the numbers which are on the network!?...
So when I call your phone, we connect Via this OTHER phone number which acts as an API or a conduit which allows for telephone number address routing and engineers network servicing.
It would seem telephones are just like modems and the usual network management type routing, calls are turned to data packs and this 'global title' handles them all.
It would seem ALL calls and texts are routed through these 'global titles' aka phone numbers.
And ANYONE can lease these NOT just law enforcement.
So why get a warrant when you can legally do it through an engineering or market research shell company?..
This kind of thing is obviously open for abuse, why would you lease what is essentially access to everything on a telephone network?
And to people who are not being vetted either, then sandbag on solutions.
Maybe the money was too good?
If you steal yourself enough money to get a lease you can steal a lot more, and they won't stop you as long as you pay well 😅
Anyway Again SHATTERING the idea of ANY kind of privacy whatsoever.
Direct communication is possible in many ways.
What is secure is I suppose only a matter of time, something that is impenetrable today can be weak tomorrow.
Things that are being abused by design are an issue of true self sovereignty and and enforceable democratic governance.
#An0myl0u5_Net #DePol
https://www.theguardian.com/technology/2025/apr/22/ofcom-bans-technical-loophole-used-by-criminals-to-intercept-mobile-calls-and-texts
Login to reply
Replies (2)
I've always wanted to learn about how phones connect the call since that scandel in the 90s with the IBM trash being stolen with all the phone numbers in the garbage. I forgot the whole situation I remember it had to do with inactive phone numbers. I always wanted to know why the old network of phones stopped working when they came out with 3g
Someone hacked GSM recently, very very long and complicated process to get to the point of readable packets.
GSM is long gone, not used now. Otherwise he wouldn't have done it.
Apparently it has never been done before.
But i wonder now what Protocols used for 4g 5g etc, it doesn't even matter, why go to all the effort when you can just lease a 'global title' 🤔 hackers wet dream, and they seem to know this and be very reluctant to shut the loop hole.
The criminals pay too well obviously. 😅