It is a vulnerability. Are you arguing it cannot possibly be used for MITM attack or that a possible MITM vector isn’t a vulnerability?https://twitter.com/AlecMuffett/status/830383698025578496 …
…but Google, Facebook, etc., created this game and are leading at it. Agree surveillance by telecoms is also very problematic.
-
-
Not arguing they didn’t or defending telecoms. Just stating that Facebook, Google, etc. have surveillance-based businesses.
-
The mobile phone network infrastructure is built (currently) on knowing the location of the device in relation the...
-
Tweet unavailable
-
Not necessairly. You’d be surprised by the amount of signalling data (not even user) generated by a mobile device...
-
Tweet unavailable
-
Oh God for what? Timing in networks?
@aral - 10 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.