Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Weak, yes. But trivial? The article does not convince me of that.

> In this context, the telephone network itself may no longer be the weakest link in the chain. The diligent attacker only needs to look for the cloud operator with an unplugged security hole and use their system as a stepping stone to read any SMS they want, when they want.

This is the most practical attack described in the article. Attack vectors like this will occasionally open up, but I would not call it trivial.



I agree. That quote basically describes any technical attack on a service. You could write any article stating XYZ tech is insecure if you're sounding the alarm based on "future unknown vulnerabilities".




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: