toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

277
active users

#ss7

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://social.heise.de/@heiseonline" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>heiseonline</span></a></span> allein die Masse von <a href="https://infosec.space/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> Angriffen macht dies IMHO zur <a href="https://infosec.space/tags/Govware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Govware</span></a> die verboten gehört.</p><ul><li>Vorallem weil dies bestenfalls für doe Verfolgung von <a href="https://infosec.space/tags/OpferloseDelikte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpferloseDelikte</span></a>|n wie <a href="https://infosec.space/tags/Drogenbesitz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Drogenbesitz</span></a> missbraucht wird!</li></ul>
The New Oil<p>A <a href="https://mastodon.thenewoil.org/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> vendor was caught exploiting a new <a href="https://mastodon.thenewoil.org/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> attack to track people’s phone locations</p><p><a href="https://techcrunch.com/2025/07/18/a-surveillance-vendor-was-caught-exploiting-a-new-ss7-attack-to-track-peoples-phone-locations/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/07/18/a-su</span><span class="invisible">rveillance-vendor-was-caught-exploiting-a-new-ss7-attack-to-track-peoples-phone-locations/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Ian Brown 👨🏻‍💻<p><a href="https://eupolicy.social/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> ‘“had reminded partners of contractual obligations to ensure <a href="https://eupolicy.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> &amp; <a href="https://eupolicy.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> when delivering <a href="https://eupolicy.social/tags/SMS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMS</span></a> messages…” But we didn’t receive similar confirmations of enhanced due diligence from other companies — including, perhaps surprisingly, <a href="https://eupolicy.social/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a>.”’ <a href="https://eupolicy.social/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> <a href="https://medium.com/@lighthousereports/using-leaked-data-to-examine-vulnerabilities-in-sms-routing-and-ss7-signalling-8e30298491d9" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@lighthousereports/</span><span class="invisible">using-leaked-data-to-examine-vulnerabilities-in-sms-routing-and-ss7-signalling-8e30298491d9</span></a></p>
Dagger ☀️<p>Oh, das <a href="https://chaos.social/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> hat es wieder einmal erwischt. Es gibt spannende Details:</p><p>The Good, the Bad, and the Encoding: An SS7 Bypass Attack <a href="https://www.enea.com/insights/the-good-the-bad-and-the-encoding-an-ss7-bypass-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">enea.com/insights/the-good-the</span><span class="invisible">-bad-and-the-encoding-an-ss7-bypass-attack/</span></a></p>
Ian Brown 👨🏻‍💻<p>OH: "thankfully most networks re now turning off <a href="https://eupolicy.social/tags/3G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>3G</span></a> / <a href="https://eupolicy.social/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a>. Though in parallel, paving the way for better and easier <a href="https://eupolicy.social/tags/metadata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>metadata</span></a> collection by ISPs and <a href="https://eupolicy.social/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatsApp</span></a> types.</p><p>"The first WhatsApp server that the device talks to is subject to the country’s secret services data collection powers" 💯</p>
SpaceLifeForm<p><span class="h-card" translate="no"><a href="https://mastodon.social/@zackwhittaker" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>zackwhittaker</span></a></span> </p><p>How is this 'new'?</p><p>Btw, I tried to read the article on mobile, which failed, so I have to assume it works.</p><p><a href="https://infosec.exchange/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a></p>
nemo™ 🇺🇦<p>SS7 attacks remain a top threat to 📱 security—allowing hackers to intercept calls, read SMS, bypass 2FA, &amp; track users worldwide through telecom flaws 🚨. Mobile users must switch to app-based 2FA &amp; encrypted messaging! Learn more from SOCRadar: <a href="https://socradar.io/why-ss7-attacks-are-the-biggest-threat-to-mobile-security-exploiting-global-telecom-networks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">socradar.io/why-ss7-attacks-ar</span><span class="invisible">e-the-biggest-threat-to-mobile-security-exploiting-global-telecom-networks/</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileSecurity</span></a> <a href="https://mas.to/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a></p>
nemo™ 🇺🇦<p>Ethical hackers play a key role in fighting <a href="https://mas.to/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> abuse by actively testing networks for flaws, helping telcos patch vulnerabilities before attackers can strike 🔒🤝🌐. SRLabs calls for vetted access &amp; better rules to secure global communications. Read more: <a href="https://www.srlabs.de/blog-post/ethical-hackers-can-help-reduce-ss7-abuse" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">srlabs.de/blog-post/ethical-ha</span><span class="invisible">ckers-can-help-reduce-ss7-abuse</span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a></p>
nemo™ 🇺🇦<p>🔒 SS7 protocol vulnerabilities remain a major threat in telecom, allowing attackers to intercept calls, track locations, and commit fraud. SimplerHacking's repo breaks down the risks, attack methods, and defenses for <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> pros. 🚨🔍 Details ➡️ <a href="https://github.com/simplerhacking/SS7-Vulnerability-Research-and-Tutorial" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/simplerhacking/SS7-</span><span class="invisible">Vulnerability-Research-and-Tutorial</span></a> <a href="https://mas.to/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mas.to/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a></p>
Emory<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@paul_ipv6" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>paul_ipv6</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> verisign owned a big chunk of ss7 into the aughts. they divested most of their business units and their <a href="https://soc.kvet.ch/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> assets were sold off. i think ss7 might be <a href="https://soc.kvet.ch/tags/twilio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>twilio</span></a> and <a href="https://soc.kvet.ch/tags/carlyleGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>carlyleGroup</span></a>'s problem to solve, which scares me a little cuz twilio is right in the eye of the hurricane of agentic ai fraud swarms that is forming 😬</p><p>it's been parted put to carriers ATT/Verizon/Lumen maintain their own ss7 infra. it's still roaming hubs out there, isn't it?</p>
B-TR3E<p><span class="h-card" translate="no"><a href="https://mastodon.social/@Privacymatters" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Privacymatters</span></a></span> Worth mentioning that "Global Titles" provide access to the <a href="https://mastodon.social/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> network and the problems with Signalling Standard 7 -an antique but still used protocol that predates cellular networks- have been known for decades.</p>
SpaceLifeForm<p><span class="h-card" translate="no"><a href="https://mastodon.laurenweinstein.org/@lauren" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lauren</span></a></span> </p><p>And here we are today, with not millions of dollars, one can setup an NVO and send SMS Spam because SS7 is not secure.</p><p>The original thinking was that if they had physical security of the wires, there would be logical security.</p><p>But, as the networks evolved, the old thinking did not.</p><p><a href="https://infosec.exchange/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a></p>
teledyn 𓂀<p>Scary bedtime stories for adults.<br><a href="https://mstdn.ca/tags/ss7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ss7</span></a> <a href="https://mstdn.ca/tags/2fa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>2fa</span></a> <a href="https://mstdn.ca/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a></p><p><a href="https://youtube.com/watch?v=wVyu7NB7W6Y&amp;si=zibgYyMpK7XwCp83" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtube.com/watch?v=wVyu7NB7W6</span><span class="invisible">Y&amp;si=zibgYyMpK7XwCp83</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://kolektiva.social/@licho" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>licho</span></a></span> <span class="h-card" translate="no"><a href="https://hachyderm.io/@osman" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>osman</span></a></span> provide evidence the code <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>signalapp</span></a></span> released is actually being deployed.</p><ul><li>Whereas <span class="h-card" translate="no"><a href="https://monocles.social/@monocles" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>monocles</span></a></span> has <a href="https://infosec.space/tags/ReproducibleBuilds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReproducibleBuilds</span></a> to the point that <span class="h-card" translate="no"><a href="https://floss.social/@fdroidorg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fdroidorg</span></a></span> literally pulls their <code>git</code> and builds it from source.</li></ul><p>Not to mention pushing a <a href="https://infosec.space/tags/Shitcoin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shitcoin</span></a>-<a href="https://infosec.space/tags/Scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scam</span></a> (<a href="https://infosec.space/tags/MobileCoin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileCoin</span></a>) disqualifies <a href="https://infosec.space/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a> per very design!<br><a href="https://www.youtube.com/watch?v=tJoO2uWrX1M" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=tJoO2uWrX1M</span><span class="invisible"></span></a></p><ul><li>Given the collection of <a href="https://infosec.space/tags/PII" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PII</span></a> like <a href="https://infosec.space/tags/PhoneNumbers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhoneNumbers</span></a>, the ability to restrict functionality based off those and the fact that <a href="https://infosec.space/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a> is subject to <a href="https://infosec.space/tags/CloudAct" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudAct</span></a> make it inherently not trustworthy.</li></ul><p>And don't even get me started on the fact.it's not sustainable to run it as a <a href="https://infosec.space/tags/VCmoneyBurningParty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VCmoneyBurningParty</span></a>!</p><ul><li>As soon as Signal becomes a problem, it will be taken offline, and due to the fact that it is <a href="https://infosec.space/tags/centralized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>centralized</span></a>, <a href="https://infosec.space/tags/proprietary" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proprietary</span></a>, <a href="https://infosec.space/tags/SingleVendor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SingleVendor</span></a> &amp; <a href="https://infosec.space/tags/SingleProvider" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SingleProvider</span></a> that's trivial for authorities.</li></ul><p>Same as identifying users: They already got a <a href="https://infosec.space/tags/PhoneNumber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PhoneNumber</span></a> which in many juristictions one can't even obtain without <a href="https://infosec.space/tags/ID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ID</span></a> legally, thus making it super easy to i.e. find and locate a user. Even tze cheapest LEAs can force their local M(V)NOs to <a href="https://infosec.space/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> a specific number...</p><ul><li>All these are <em>unnecessary risks</em>, that could've been avoided, but explicitly don't even get remediated retroactively!</li></ul><p>Again: Signal has a <a href="https://infosec.space/tags/Honeypot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Honeypot</span></a> stench, and you better learn proper <a href="https://infosec.space/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a>, <a href="https://infosec.space/tags/SelfCustody" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfCustody</span></a> and <a href="https://infosec.space/tags/TechLiteracy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechLiteracy</span></a> because <a href="https://web.archive.org/web/20210606070919/twitter.com/thegrugq/status/1085614812581715968" rel="nofollow noopener" target="_blank"><em>corporations can't pull the 5th [Amendment] on your behalf</em>!</a></p>
SpaceLifeForm<p><span class="h-card" translate="no"><a href="https://federate.social/@mattblaze" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mattblaze</span></a></span> </p><p>I doubt Hegseth can spell Metadata when sober.</p><p><a href="https://infosec.exchange/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> <a href="https://infosec.exchange/tags/Metadata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metadata</span></a></p>
adingbatponder<p><span class="h-card" translate="no"><a href="https://mostr.pub/users/756240d3be0d553b0cd174b3499cffa37fbe8394ee06b9ab50652e314c265fc2" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>756240d3be0d553b0cd174b3499cffa37fbe8394ee06b9ab50652e314c265fc2</span></a></span> Thanks but is this <a href="https://fosstodon.org/tags/SMS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMS</span></a> related <a href="https://fosstodon.org/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> attack special to Pixel in any way?<br><a href="https://www.techtarget.com/whatis/definition/SS7-attack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techtarget.com/whatis/definiti</span><span class="invisible">on/SS7-attack</span></a><br>Do u have further info? <br>Do you have further info on M2M? Is pixel particularly affected? <br><a href="https://www.researchgate.net/publication/335487284_Attacks_Against_GSMA's_M2M_Remote_Provisioning_Short_Paper" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">researchgate.net/publication/3</span><span class="invisible">35487284_Attacks_Against_GSMA's_M2M_Remote_Provisioning_Short_Paper</span></a></p>
756240d3be0d553b0cd174b3499cffa37fbe8394ee06b9ab50652e314c265fc2Be aware. The Google Pixel also has the <a class="mention hashtag" href="https://mostr.pub/tags/SS7" rel="nofollow noopener" target="_blank"><span>#</span>SS7</a> and <a class="mention hashtag" href="https://mostr.pub/tags/M2M" rel="nofollow noopener" target="_blank"><span>#</span>M2M</a>-RSP problem!
SpaceLifeForm<p>Remember that SS7 is not secure</p><p><a href="https://www.techdirt.com/2025/01/23/phone-metadata-suddenly-not-so-harmless-when-its-the-fbis-data-being-harvested/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techdirt.com/2025/01/23/phone-</span><span class="invisible">metadata-suddenly-not-so-harmless-when-its-the-fbis-data-being-harvested/</span></a></p><p><a href="https://infosec.exchange/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a> <a href="https://infosec.exchange/tags/Metadata" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metadata</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p><a href="https://hachyderm.io/tags/DHS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DHS</span></a> Says <a href="https://hachyderm.io/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a>, <a href="https://hachyderm.io/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>, <a href="https://hachyderm.io/tags/Iran" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Iran</span></a>, and Israel Are <a href="https://hachyderm.io/tags/Spying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spying</span></a> on People in <a href="https://hachyderm.io/tags/US" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>US</span></a> with <a href="https://hachyderm.io/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a><br>The Department of <a href="https://hachyderm.io/tags/HomelandSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HomelandSecurity</span></a> knows which countries SS7 attacks are primarily originating from. Others include countries in Europe, Africa, and the Middle East.<br>In the newly released document, <a href="https://hachyderm.io/tags/SenatorWyden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SenatorWyden</span></a>’s says <a href="https://hachyderm.io/tags/DoD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoD</span></a> confirmed it believes that all US <a href="https://hachyderm.io/tags/telecom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telecom</span></a> are vulnerable to SS7 and Diameter <a href="https://hachyderm.io/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a>, and that DoD has not reviewed 3rd-party audits carried out by US carriers <br><a href="https://www.404media.co/dhs-says-china-russia-iran-and-israel-are-spying-on-people-in-us-with-ss7/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">404media.co/dhs-says-china-rus</span><span class="invisible">sia-iran-and-israel-are-spying-on-people-in-us-with-ss7/</span></a></p>
SpaceLifeForm<p><span class="h-card" translate="no"><a href="https://mastodon.scot/@kim_harding" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kim_harding</span></a></span> </p><p>I would not call it secret.</p><p>Do not text sensitive information.</p><p><a href="https://infosec.exchange/tags/SS7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SS7</span></a></p>