[HN Gopher] Simjacker vulnerability exploited by surveillance co...
       ___________________________________________________________________
        
       Simjacker vulnerability exploited by surveillance companies
        
       Author : agazso
       Score  : 46 points
       Date   : 2021-01-01 17:44 UTC (5 hours ago)
        
 (HTM) web link (simjacker.com)
 (TXT) w3m dump (simjacker.com)
        
       | pluc wrote:
       | This is from September 2019. They haven't really bothered with
       | updating the topic since then:
       | https://www.adaptivemobile.com/search/3a08888ea06c35015d1248...
        
         | xfitm3 wrote:
         | Dead link?
        
           | pluc wrote:
           | Yeah it's just a search for "simjacker" on their site, which
           | encodes it in a string instead of common sense.
        
             | surgecoach wrote:
             | Found More info on the site here :
             | https://www.adaptivemobile.com/blog/simjacker-frequently-
             | ask...
        
       | willvarfar wrote:
       | So which company, working for which government, and how to stop
       | it? The article is just a talk-to-our-salesman piece?
        
         | prophesi wrote:
         | Yep, it's all fluff. They were supposed to reveal more
         | information on the matter in a conference back in October. But
         | we still only have a "technical" paper with nice looking graphs
         | and an unnamed boogie-man.
        
         | plufsim wrote:
         | This product/company, for example:
         | https://rayzone.com/geomatrix-geolocation-system/
        
         | sloshnmosh wrote:
         | Most likely: NSO Group
        
           | plufsim wrote:
           | Less likely, NSO's expertise is in development of exploits
           | for browsers and apps (ex: WhatsApp), not ss7 exploits
        
       | client4 wrote:
       | I'm for cool research, but I am also tired of the trend where
       | security companies come up with a flashy name, logo, url, etc.
       | for every exploit/vuln.
        
         | lima wrote:
         | Why?
        
           | generalizations wrote:
           | It reeks of marketing, which is antithetical to the hacker
           | spirit?
        
             | notretarded wrote:
             | Good.. Instantly recognisable name for e-peen augmentation,
             | enters lexicon of general public easily, media outlets can
             | spam it easier, vendors hand forced to fix promptly.
             | 
             | This is hardly a bad thing.
        
         | cghendrix wrote:
         | Yeah the little SIM card face cringed me out
        
       ___________________________________________________________________
       (page generated 2021-01-01 23:01 UTC)