ModerateImprovement@sh.itjust.works to Technology@lemmy.worldEnglish · 2 years agoCrooks Steal Phone, SMS Records for Nearly All AT&T Customers.krebsonsecurity.comexternal-linkmessage-square31linkfedilinkarrow-up1149arrow-down11
arrow-up1148arrow-down1external-linkCrooks Steal Phone, SMS Records for Nearly All AT&T Customers.krebsonsecurity.comModerateImprovement@sh.itjust.works to Technology@lemmy.worldEnglish · 2 years agomessage-square31linkfedilink
minus-squareEntropywins@lemmy.worldlinkfedilinkEnglisharrow-up6·2 years agoYou can absolutely capture data in transmission
minus-squareJJROKCZ@lemmy.worldlinkfedilinkEnglisharrow-up5·2 years agoYes but that’s far less impactful of a breach than “we’ve actively surveilled and recorded all movements and actions of our customers for decade, stored it all haphazardly, and now someone else got it without paying for it like we normally arrange”
minus-squareaStonedSanta@lemm.eelinkfedilinkEnglisharrow-up4arrow-down1·2 years agoYes but if the connection is encrypted E2E you can’t reliably afaik
You can absolutely capture data in transmission
Yes but that’s far less impactful of a breach than “we’ve actively surveilled and recorded all movements and actions of our customers for decade, stored it all haphazardly, and now someone else got it without paying for it like we normally arrange”
Yes but if the connection is encrypted E2E you can’t reliably afaik