Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. ICYMI, from Reuters:

ICYMI, from Reuters:

Scheduled Pinned Locked Moved Uncategorized
18 Posts 11 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • briankrebs@infosec.exchangeB This user is from outside of this forum
    briankrebs@infosec.exchangeB This user is from outside of this forum
    briankrebs@infosec.exchange
    wrote last edited by
    #1

    ICYMI, from Reuters:

    "Democratic Senator Maria Cantwell on Tuesday said Verizon and AT&T are blocking release of key documents about an alleged massive Chinese spying operation that infiltrated U.S. telecommunications networks known as Salt Typhoon and wants their CEOs to appear before Congress to answer questions."

    "Cantwell asked both companies to turn over security assessments conducted by Alphabet cybersecurity unit Mandiant. She said Mandiant refused to provide the requested network security assessments, apparently at the direction of AT&T and Verizon."

    "In some cases, hackers are alleged to have intercepted conversations, including between prominent U.S. politicians and government officials. Several lawmakers have described them as the worst telecom hacks in U.S. history."

    "Cantwell said Salt Typhoon allowed the Chinese government to "geolocate millions of individuals" and "record phone calls at will," and that the incident targeted almost every American."

    reuters.com

    favicon

    (www.reuters.com)

    mattblaze@federate.socialM emory@soc.kvet.chE H 3 Replies Last reply
    2
    0
    • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

      ICYMI, from Reuters:

      "Democratic Senator Maria Cantwell on Tuesday said Verizon and AT&T are blocking release of key documents about an alleged massive Chinese spying operation that infiltrated U.S. telecommunications networks known as Salt Typhoon and wants their CEOs to appear before Congress to answer questions."

      "Cantwell asked both companies to turn over security assessments conducted by Alphabet cybersecurity unit Mandiant. She said Mandiant refused to provide the requested network security assessments, apparently at the direction of AT&T and Verizon."

      "In some cases, hackers are alleged to have intercepted conversations, including between prominent U.S. politicians and government officials. Several lawmakers have described them as the worst telecom hacks in U.S. history."

      "Cantwell said Salt Typhoon allowed the Chinese government to "geolocate millions of individuals" and "record phone calls at will," and that the incident targeted almost every American."

      reuters.com

      favicon

      (www.reuters.com)

      mattblaze@federate.socialM This user is from outside of this forum
      mattblaze@federate.socialM This user is from outside of this forum
      mattblaze@federate.social
      wrote last edited by
      #2

      @briankrebs One again, I'd be remiss in not mentioning that there's a straight line between the CALEA telecom wiretap capability mandates and Salt Typhoon.

      ai6yr@m.ai6yr.orgA mattblaze@federate.socialM badtux@mastodon.socialB wcbdata@vis.socialW 4 Replies Last reply
      0
      • mattblaze@federate.socialM mattblaze@federate.social

        @briankrebs One again, I'd be remiss in not mentioning that there's a straight line between the CALEA telecom wiretap capability mandates and Salt Typhoon.

        ai6yr@m.ai6yr.orgA This user is from outside of this forum
        ai6yr@m.ai6yr.orgA This user is from outside of this forum
        ai6yr@m.ai6yr.org
        wrote last edited by
        #3

        @mattblaze @briankrebs Meanwhile, stored deep inside a server inside China, this message:

        CALL LOG: "Dad? It's me. I'm in the driveway. Can you open the garage? I can't find my remote control."

        CALL LOG: "Can't you park the car and look for the remote?"

        CALL LOG: "But, it's easier to call you so you can open the garage!"

        ron_olafsson@mastodon.socialR 1 Reply Last reply
        0
        • mattblaze@federate.socialM mattblaze@federate.social

          @briankrebs One again, I'd be remiss in not mentioning that there's a straight line between the CALEA telecom wiretap capability mandates and Salt Typhoon.

          mattblaze@federate.socialM This user is from outside of this forum
          mattblaze@federate.socialM This user is from outside of this forum
          mattblaze@federate.social
          wrote last edited by
          #4

          @briankrebs As I testified last year: https://oversight.house.gov/wp-content/uploads/2025/04/Blaze-Written-Testimony.pdf

          1 Reply Last reply
          0
          • mattblaze@federate.socialM mattblaze@federate.social

            @briankrebs One again, I'd be remiss in not mentioning that there's a straight line between the CALEA telecom wiretap capability mandates and Salt Typhoon.

            badtux@mastodon.socialB This user is from outside of this forum
            badtux@mastodon.socialB This user is from outside of this forum
            badtux@mastodon.social
            wrote last edited by
            #5

            @mattblaze @briankrebs This. If the FBI can do it, the Chinese can also.

            1 Reply Last reply
            0
            • mattblaze@federate.socialM mattblaze@federate.social

              @briankrebs One again, I'd be remiss in not mentioning that there's a straight line between the CALEA telecom wiretap capability mandates and Salt Typhoon.

              wcbdata@vis.socialW This user is from outside of this forum
              wcbdata@vis.socialW This user is from outside of this forum
              wcbdata@vis.social
              wrote last edited by
              #6

              @briankrebs @mattblaze Every back door is your adversary's back door.

              1 Reply Last reply
              0
              • ai6yr@m.ai6yr.orgA ai6yr@m.ai6yr.org

                @mattblaze @briankrebs Meanwhile, stored deep inside a server inside China, this message:

                CALL LOG: "Dad? It's me. I'm in the driveway. Can you open the garage? I can't find my remote control."

                CALL LOG: "Can't you park the car and look for the remote?"

                CALL LOG: "But, it's easier to call you so you can open the garage!"

                ron_olafsson@mastodon.socialR This user is from outside of this forum
                ron_olafsson@mastodon.socialR This user is from outside of this forum
                ron_olafsson@mastodon.social
                wrote last edited by
                #7

                @mattblaze @briankrebs @ai6yr So now they know
                - your phone number,
                - your dad's phone number,
                - your voice,
                - your dad's voice,
                - your phone or phone OS,
                - the location you're calling from,
                - the approximate location of your dad's house,
                - that you live with your dad or are visiting him,
                - that your dad has a house with a driveway,
                - and that there is a garage there.
                This is metadata that, when combined with other metadata, can paint an alarmingly accurate picture of you.

                mousey@mastodon.seattlematrix.orgM cellomomoncars@mastodon.socialC 2 Replies Last reply
                0
                • ron_olafsson@mastodon.socialR ron_olafsson@mastodon.social

                  @mattblaze @briankrebs @ai6yr So now they know
                  - your phone number,
                  - your dad's phone number,
                  - your voice,
                  - your dad's voice,
                  - your phone or phone OS,
                  - the location you're calling from,
                  - the approximate location of your dad's house,
                  - that you live with your dad or are visiting him,
                  - that your dad has a house with a driveway,
                  - and that there is a garage there.
                  This is metadata that, when combined with other metadata, can paint an alarmingly accurate picture of you.

                  mousey@mastodon.seattlematrix.orgM This user is from outside of this forum
                  mousey@mastodon.seattlematrix.orgM This user is from outside of this forum
                  mousey@mastodon.seattlematrix.org
                  wrote last edited by
                  #8

                  @ron_olafsson @mattblaze @briankrebs @ai6yr
                  ...multiplied by millions of people, in every corner of the country. All the data extrapolation waiting there,
                  - population densities
                  - family size averages
                  - local and regional events
                  - almost any financial transaction

                  There's too much value to count it all.

                  Because local-first data principles aren't the law, we have this bullshit closed cellular network (apt name, btw), that's totally exploitable like this. Might as well pee with the door open.

                  ron_olafsson@mastodon.socialR vatvslpr@c.imV 2 Replies Last reply
                  0
                  • mousey@mastodon.seattlematrix.orgM mousey@mastodon.seattlematrix.org

                    @ron_olafsson @mattblaze @briankrebs @ai6yr
                    ...multiplied by millions of people, in every corner of the country. All the data extrapolation waiting there,
                    - population densities
                    - family size averages
                    - local and regional events
                    - almost any financial transaction

                    There's too much value to count it all.

                    Because local-first data principles aren't the law, we have this bullshit closed cellular network (apt name, btw), that's totally exploitable like this. Might as well pee with the door open.

                    ron_olafsson@mastodon.socialR This user is from outside of this forum
                    ron_olafsson@mastodon.socialR This user is from outside of this forum
                    ron_olafsson@mastodon.social
                    wrote last edited by
                    #9

                    @mattblaze @briankrebs @ai6yr @mousey Calls made via messenger apps such as Signal are end-to-end encrypted, offering greater privacy from mobile providers and potential eavesdroppers.

                    ai6yr@m.ai6yr.orgA mousey@mastodon.seattlematrix.orgM 2 Replies Last reply
                    0
                    • ron_olafsson@mastodon.socialR ron_olafsson@mastodon.social

                      @mattblaze @briankrebs @ai6yr So now they know
                      - your phone number,
                      - your dad's phone number,
                      - your voice,
                      - your dad's voice,
                      - your phone or phone OS,
                      - the location you're calling from,
                      - the approximate location of your dad's house,
                      - that you live with your dad or are visiting him,
                      - that your dad has a house with a driveway,
                      - and that there is a garage there.
                      This is metadata that, when combined with other metadata, can paint an alarmingly accurate picture of you.

                      cellomomoncars@mastodon.socialC This user is from outside of this forum
                      cellomomoncars@mastodon.socialC This user is from outside of this forum
                      cellomomoncars@mastodon.social
                      wrote last edited by
                      #10

                      @ron_olafsson @mattblaze @briankrebs @ai6yr

                      I am nobody, and still my voicemail recording doesn't have my voice on it. And I don't pickup on unknown numbers, if it's important they will leave a voicemail.

                      Signal FTW

                      1 Reply Last reply
                      0
                      • ron_olafsson@mastodon.socialR ron_olafsson@mastodon.social

                        @mattblaze @briankrebs @ai6yr @mousey Calls made via messenger apps such as Signal are end-to-end encrypted, offering greater privacy from mobile providers and potential eavesdroppers.

                        ai6yr@m.ai6yr.orgA This user is from outside of this forum
                        ai6yr@m.ai6yr.orgA This user is from outside of this forum
                        ai6yr@m.ai6yr.org
                        wrote last edited by
                        #11

                        @ron_olafsson @mattblaze @briankrebs @mousey That said (having not analyzed it), how much relationship / traffic analysis can you do on Signal?

                        i.e. if you drunk buddy Pete keeps on texting you hot tips about things going down overseas, can you look at addressing/trace network traffic, even if you can't read the messages? i.e. he keeps on texting your OTHER friend, Marc about him needing to find a girlfriend in his new job running the overseas branch of your franchise, but he's got to learn Spanish first? And suddenly they're exchanging traffic at 2am on Signal?"

                        ron_olafsson@mastodon.socialR 1 Reply Last reply
                        0
                        • ron_olafsson@mastodon.socialR ron_olafsson@mastodon.social

                          @mattblaze @briankrebs @ai6yr @mousey Calls made via messenger apps such as Signal are end-to-end encrypted, offering greater privacy from mobile providers and potential eavesdroppers.

                          mousey@mastodon.seattlematrix.orgM This user is from outside of this forum
                          mousey@mastodon.seattlematrix.orgM This user is from outside of this forum
                          mousey@mastodon.seattlematrix.org
                          wrote last edited by
                          #12

                          @ron_olafsson @mattblaze @briankrebs @ai6yr

                          Still metadata to be reaped. Is your keyboard autocompleting your words while you type into Signal?

                          Every (read: both, it's a duopoly) mobile OS, on most phones, is a house built on sand.

                          Every carrier is Security without Privacy.

                          Every stupid backdoor, like the CALEA law, is another camera in your toilet.

                          ai6yr@m.ai6yr.orgA ron_olafsson@mastodon.socialR 2 Replies Last reply
                          0
                          • mousey@mastodon.seattlematrix.orgM mousey@mastodon.seattlematrix.org

                            @ron_olafsson @mattblaze @briankrebs @ai6yr

                            Still metadata to be reaped. Is your keyboard autocompleting your words while you type into Signal?

                            Every (read: both, it's a duopoly) mobile OS, on most phones, is a house built on sand.

                            Every carrier is Security without Privacy.

                            Every stupid backdoor, like the CALEA law, is another camera in your toilet.

                            ai6yr@m.ai6yr.orgA This user is from outside of this forum
                            ai6yr@m.ai6yr.orgA This user is from outside of this forum
                            ai6yr@m.ai6yr.org
                            wrote last edited by
                            #13

                            @mousey @ron_olafsson @mattblaze @briankrebs "I'm totally secure! Look at this cool app, Grammarly AI Keyboard! Now I never make typos!" 🤪

                            1 Reply Last reply
                            0
                            • ai6yr@m.ai6yr.orgA ai6yr@m.ai6yr.org

                              @ron_olafsson @mattblaze @briankrebs @mousey That said (having not analyzed it), how much relationship / traffic analysis can you do on Signal?

                              i.e. if you drunk buddy Pete keeps on texting you hot tips about things going down overseas, can you look at addressing/trace network traffic, even if you can't read the messages? i.e. he keeps on texting your OTHER friend, Marc about him needing to find a girlfriend in his new job running the overseas branch of your franchise, but he's got to learn Spanish first? And suddenly they're exchanging traffic at 2am on Signal?"

                              ron_olafsson@mastodon.socialR This user is from outside of this forum
                              ron_olafsson@mastodon.socialR This user is from outside of this forum
                              ron_olafsson@mastodon.social
                              wrote last edited by
                              #14

                              @mattblaze @briankrebs @mousey @ai6yr Fair point: Signal also collects metadata to a small extent (when messages are sent allows conclusions to be drawn about lifestyle habits). Even more problematic is that Google can also evaluate this metadata, as Signal messages are delivered via Google Play Service FCM (at least on Android). A better option for Android is the more privacy-friendly Signal client Molly, which supports UnifiedPush and thus completely bypasses Google.

                              1 Reply Last reply
                              0
                              • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                                ICYMI, from Reuters:

                                "Democratic Senator Maria Cantwell on Tuesday said Verizon and AT&T are blocking release of key documents about an alleged massive Chinese spying operation that infiltrated U.S. telecommunications networks known as Salt Typhoon and wants their CEOs to appear before Congress to answer questions."

                                "Cantwell asked both companies to turn over security assessments conducted by Alphabet cybersecurity unit Mandiant. She said Mandiant refused to provide the requested network security assessments, apparently at the direction of AT&T and Verizon."

                                "In some cases, hackers are alleged to have intercepted conversations, including between prominent U.S. politicians and government officials. Several lawmakers have described them as the worst telecom hacks in U.S. history."

                                "Cantwell said Salt Typhoon allowed the Chinese government to "geolocate millions of individuals" and "record phone calls at will," and that the incident targeted almost every American."

                                reuters.com

                                favicon

                                (www.reuters.com)

                                emory@soc.kvet.chE This user is from outside of this forum
                                emory@soc.kvet.chE This user is from outside of this forum
                                emory@soc.kvet.ch
                                wrote last edited by
                                #15

                                @briankrebs this is exactly why out of 9 business entities i have participated in forming 0 of them are anything more than a side hustle.

                                i cannot afford to go all-in without an extremely generous investor.

                                #entrepreneur #healthcare

                                1 Reply Last reply
                                0
                                • R relay@relay.an.exchange shared this topic
                                • mousey@mastodon.seattlematrix.orgM mousey@mastodon.seattlematrix.org

                                  @ron_olafsson @mattblaze @briankrebs @ai6yr

                                  Still metadata to be reaped. Is your keyboard autocompleting your words while you type into Signal?

                                  Every (read: both, it's a duopoly) mobile OS, on most phones, is a house built on sand.

                                  Every carrier is Security without Privacy.

                                  Every stupid backdoor, like the CALEA law, is another camera in your toilet.

                                  ron_olafsson@mastodon.socialR This user is from outside of this forum
                                  ron_olafsson@mastodon.socialR This user is from outside of this forum
                                  ron_olafsson@mastodon.social
                                  wrote last edited by
                                  #16

                                  @mattblaze @briankrebs @ai6yr @mousey There are ways to regain control of your own data. For Android, @GrapheneOS is recommended, for example. For a private keyboard, you can find several options on F-Droid, such as FlorisBoard, which does not send any data to the internet. You can check this (and restrict all other apps as you wish) with @rdns. Once everything is configured, it works great. But sure, there's no 100%.

                                  1 Reply Last reply
                                  0
                                  • mousey@mastodon.seattlematrix.orgM mousey@mastodon.seattlematrix.org

                                    @ron_olafsson @mattblaze @briankrebs @ai6yr
                                    ...multiplied by millions of people, in every corner of the country. All the data extrapolation waiting there,
                                    - population densities
                                    - family size averages
                                    - local and regional events
                                    - almost any financial transaction

                                    There's too much value to count it all.

                                    Because local-first data principles aren't the law, we have this bullshit closed cellular network (apt name, btw), that's totally exploitable like this. Might as well pee with the door open.

                                    vatvslpr@c.imV This user is from outside of this forum
                                    vatvslpr@c.imV This user is from outside of this forum
                                    vatvslpr@c.im
                                    wrote last edited by
                                    #17

                                    @mousey @ron_olafsson @mattblaze @briankrebs @ai6yr
                                    You can get information on things like population density and average family size from census.gov; it's out there for the taking by anyone who wants to know. Similarly, you can find out about local and regional events by looking at public advertisements. I'm not saying the breach isn't catastrophic, but a lot of the information you're talking about is already public knowledge.

                                    1 Reply Last reply
                                    0
                                    • briankrebs@infosec.exchangeB briankrebs@infosec.exchange

                                      ICYMI, from Reuters:

                                      "Democratic Senator Maria Cantwell on Tuesday said Verizon and AT&T are blocking release of key documents about an alleged massive Chinese spying operation that infiltrated U.S. telecommunications networks known as Salt Typhoon and wants their CEOs to appear before Congress to answer questions."

                                      "Cantwell asked both companies to turn over security assessments conducted by Alphabet cybersecurity unit Mandiant. She said Mandiant refused to provide the requested network security assessments, apparently at the direction of AT&T and Verizon."

                                      "In some cases, hackers are alleged to have intercepted conversations, including between prominent U.S. politicians and government officials. Several lawmakers have described them as the worst telecom hacks in U.S. history."

                                      "Cantwell said Salt Typhoon allowed the Chinese government to "geolocate millions of individuals" and "record phone calls at will," and that the incident targeted almost every American."

                                      reuters.com

                                      favicon

                                      (www.reuters.com)

                                      H This user is from outside of this forum
                                      H This user is from outside of this forum
                                      hiddenpineapple@infosec.exchange
                                      wrote last edited by
                                      #18

                                      @briankrebs I feel like it happens enough, with great percision, this effect should have a name.

                                      1. Telecommunications breach occurs
                                      2. Someone mentions Signal
                                      3. Nuanced hypotheticals are exchanged
                                      4. Argument over metadata takes place
                                      5. There's a Molly vs. Signal comparison
                                      5b. Something about Matrix
                                      6. GrapheneOS
                                      7. Someone knows too much about keyboards

                                      It feels like a Godwin's law type event where it's just a matter of when, not if.

                                      1 Reply Last reply
                                      1
                                      0
                                      • R relay@relay.infosec.exchange shared this topic
                                        R relay@relay.mycrowd.ca shared this topic
                                      Reply
                                      • Reply as topic
                                      Log in to reply
                                      • Oldest to Newest
                                      • Newest to Oldest
                                      • Most Votes


                                      • Login

                                      • Login or register to search.
                                      • First post
                                        Last post
                                      0
                                      • Categories
                                      • Recent
                                      • Tags
                                      • Popular
                                      • World
                                      • Users
                                      • Groups