00:00​ I hacked Linus!
00:59​ How Steve Jobs and Steve Wozniak hacked the telephone network
02:22​ Early history of the telephone
07:08​ The kidnapping of Sheikha Latifa
08:41​ How Signalling System No. 7 works
11:03​ Why SS7 is vulnerable to hacking
12:15​ How hackers gain access to phones
16:17​ How I was able to spy on Linus’ phone
18:09​ How hackers can intercept text messages
21:04​ How your location can be tracked via SS7
29:03​ How to protect your phone from hacking

    • @[email protected]
      link
      fedilink
      English
      43 hours ago

      2FA is great. It’s the best tool there is against impersonation and account takeovers.

      But it’s only great PROVIDED

      1. It’s a real, proper second factor like a hardware token or - less great but okay - a “secure” cellphone app. When it’s a totally insecure factor like SMS, 1FA is preferable.
      2. It’s not such a PITA that you hate using it.
      3. When it’s a proprietary app from one of the big data sonsabitches, it’s also an app to spy on you and your activities.