SCARY Mobile Hack will Change how we Use Phones

preview_player
Показать описание
When Derek from Veritasium hacked Linus' mobile phone, it wasn't a SIM swap or a phishing attack. He exploited an SS7 vulnerability that most people don't know exists. In this video, Josh explains what this is and how this affects YOU and your mobile phone.

Resources mentioned:

🔹🔹🔹What You Should Watch Next🔹🔹🔹

We've got a lot of great privacy- and security-related content here on the All Things Secured YouTube channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next:

🔹🔹🔹Help Support All Things Secured (Recommended Services)🔹🔹🔹
If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support!

*********************
Video Timestamps
*********************
0:00 - Veritasium hacked Linus Tech Tips
0:40 - Types of SIM attacks
1:13 - SS7 Attack Explained
2:25 - What this means for YOUR mobile phone
4:08 - What you can do
*********************

What is the SS7 attack and how does it impact your mobile security? In this video, we uncover the dirty truth about your mobile phone that may change the way you use it going forward.

#privacytips #mobilesecurity #mobileprivacy
Рекомендации по теме
Комментарии
Автор

If you watched to the end, which privacy camp do you self-select into? Leave a comment to let me know. Thanks for watching!

AllThingsSecured
Автор

Josh I’m heartbroken, my family and I have been subjected to this type of attack since October 2019. We have gone to the Metropolitan (London) Police dozens of times, have spent tens of thousands of pounds on countermeasures and new devices and have written to politicians and government department heads. No one has believed us. Heartbroken 💔

Ashley_London
Автор

Do VOIP numbers like Google Voice get affected too?

ImPipkinrick
Автор

TL;DR nothing to do for now. Most banks I use have text 2nd factor as the only option.

DavidDLee
Автор

Email - created first in 1971 and still used today has a lot of security isuses - these old technologie are great, but needs a total rewrite from ground up to be secure for today's world.

synthwave
Автор

Everyone MUST also remember, the weakest MFA/2FA option that is *active* for auth is the maximum strength of your login security.

xileets
Автор

I seem to recall a U.S. Supreme Court case from a few decades ago where they referred to cell phones as basically radios. Which, of course, they are--they just use a different part of the electromagnetic spectrum and are more sophisticated than the walkie-talkies some of us had as kids. I'm not going to change anything I'm doing, but I'm glad to know about this vulnerability. I'm also glad I'm not someone who is a juicy target (or, at least I wasn't until I left this comment). Thanks for the great explanation and context!

WilliamBillWilson
Автор

So can this be used silently on someone without them knowing or is there a way to check/know of you are a victim of this attack?
I guess what im asking is how do I know this hasnt already happened to me and someone out there isnt already intercepting and collecting all my data?

kiriup
Автор

Josh, I’d like use one of the alternative MFA schemes but none of them is as ubiquitous as using a text or email for receiving an authication code. Have to use multiple solutions is as big a pain as trying to keep up with password management, if not bigger. IMHO anyway.

rpm
Автор

When you sign up for some counter service, you must give you a phone number away and you don’t have other kind of meanings

palles
Автор

I never do any business on a phone, as in no banking, I have a flip phone so no malware attacks and where possible (banks) I do give only Google Voice. MAny banks do not want VOIP numbers and restrict, so I tell them this is all I have and they either hand up nad then call back on my registered number, or send emails or ask security questions. NO Sim swaps for me are even possible.

aperson
Автор

What using FaceTime Audio over standard mobile and iMessage over sms?

TheJDSmith
Автор

4g and 5g are more secure? Doing the test, the video doesn't mention what Linus is using...

CRK
Автор

Josh. Your link to fb2 key doesn't work. Please update it.

timeisnow
Автор

hey josh! thanks for the real captions! i appreciate it!

Jensen-James-Productions
Автор

Efani the sim company eliminates this but its like 999$ usd per year for this service. oh you mentioned it I commented at the start

kemarchristie
Автор

Because US telcos are 10years behind, if your telco is communicating with you in-band then you need to explain why you’re leaving them.

a
Автор

Not specific to this video however if you are using virtual card services such as privacy or clutch can you start using these services while having a credit freeze already in place?

JSATI
Автор

I watched the entireveritasium video, but I'm not clear if a data-only cellular plan (where you don't have a phone number) would be subject to the attack. I want to say "no" as this is exploiting an authorization/tracking mechanism for the phone number, but I'm not sure if it's actually looking for the exact phone number or the SIM the phone is authorized on.

polymatrix
Автор

is google voice encrypted? since it is a voip, is it more secure than the cellular sms?

concernedrn