Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)S
Posts
3
Comments
30
Joined
3 yr. ago

  • Now, attackers breach a user's mobile account with stolen, brute-forced, or leaked credentials and initiate porting the victim's number to another device on their own.

    They can do this by generating a QR code through the hijacked mobile account that can be used to activate a new eSIM. They then scan it with their device, essentially hijacking the number.

    Simultaneously, the legitimate owner has their eSIM/SIM deactivated.

  • I think most people didn't even watch the video, I shouldn't have used the video title.

  • Probably interaction with the post.

  • It's an interesting video and there is some truth to it about the deep state, but not what Trump, etc. says.

  • Nevermind there are In-App-purchases

  • It is

  • They spoof local numbers