Slayer

joined 1 year ago
[–] Slayer@infosec.pub 15 points 1 month ago

They all quit, so I think they have a plan.

[–] Slayer@infosec.pub 9 points 2 months ago (1 children)
[–] Slayer@infosec.pub 9 points 2 months ago

Bro fucking russian troll, stfu

[–] Slayer@infosec.pub 12 points 3 months ago (1 children)

Yeah, better use Telegram /s

[–] Slayer@infosec.pub 6 points 3 months ago* (last edited 3 months ago) (1 children)

Still your corrupt politicians are rather taking people's homes in a town i forgot the name of (with police going there daily so people sell their homes) and clearing forests to mine coal... fucking stupid corrupt politicians.

[–] Slayer@infosec.pub 67 points 5 months ago* (last edited 5 months ago) (1 children)
[–] Slayer@infosec.pub 7 points 8 months ago

Now, attackers breach a user's mobile account with stolen, brute-forced, or leaked credentials and initiate porting the victim's number to another device on their own.

They can do this by generating a QR code through the hijacked mobile account that can be used to activate a new eSIM. They then scan it with their device, essentially hijacking the number.

Simultaneously, the legitimate owner has their eSIM/SIM deactivated.

[–] Slayer@infosec.pub 1 points 8 months ago (1 children)

Nevermind there are In-App-purchases

[–] Slayer@infosec.pub 0 points 8 months ago (3 children)
view more: next ›