Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It should be easy to MITM victims of powned phones unless they pay extremely close care to ping times or RTT in general.

All I have to do is pown someone's phone and use an app on my phone to make my phone look like its their phone, regardless of where they actually are. I can't imagine the facial recognition would be that good.

Its a simple extension of physically stealing phones or cloning like people did in the 80s/90s on analog AMPS. cloning is interesting to think about, steal their amazon auth info, remotely brick their phone for good luck, walk in with a burner phone claiming to be their new phone, its all good.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: