[VoiceOps] SS7

Kidd Filby kiddfilby at gmail.com
Thu Apr 21 11:52:46 EDT 2016


There is no VOICE traversing the SS7 network, so you cannot possibly record
a conversation by having access to the SS7 network only.

On Thu, Apr 21, 2016 at 9:36 AM, Matthew Yaklin <myaklin at firstlight.net>
wrote:

>
> In other words the hacker has to have working SS7 trunks or access to
> someone who does? That is how I understood it.
>
> Not exactly a remote hack from mom's basement sort of thing.
>
> Matt
>
> ________________________________________
> From: VoiceOps <voiceops-bounces at voiceops.org> on behalf of Peter Rad. <
> peter at 4isps.com>
> Sent: Thursday, April 21, 2016 11:25 AM
> To: voiceops at voiceops.org
> Subject: [VoiceOps] SS7
>
> FYI...
>
>   U.S. carriers mum on 60 Minutes report on vulnerability in SS7 -
>
> http://www.fiercewireless.com/story/us-carriers-mum-60-minutes-report-vulnerability-ss7/2016-04-19
>
> Regards,
>
> Peter Radizeski
> RAD-INFO, Inc.
> 813.963.5884
> http://rad-info.net
> * Need bandwidth or colocation? call me
> _______________________________________________
> VoiceOps mailing list
> VoiceOps at voiceops.org
> https://puck.nether.net/mailman/listinfo/voiceops
> _______________________________________________
> VoiceOps mailing list
> VoiceOps at voiceops.org
> https://puck.nether.net/mailman/listinfo/voiceops
>



-- 
Kidd Filby
661.557.5640 (C)
http://www.linkedin.com/in/kiddfilby
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/voiceops/attachments/20160421/609a3a26/attachment.html>


More information about the VoiceOps mailing list