Hi, > Yeah, the telephone system really was not built with general access in mind, > but instead thinking that only a limited number of employees would have > access. Things like the originating phone number are entirely unauthenticated > (like email). So, for example, if you have telecom access, you can make your > calls look like they are coming from any number. I know this. Here is my short video about caller ID spoofing: http://videolectures.net/single_kovacic_varnost_voip/
Anyway, caller ID spoofing was not the problem here, but expenses. And in one case, call was on a list of outgoing calls (on victims' telephone), while user strongly claims he did not made this call. Regards, Matej -- PGP Fingerprint: D241 F62F 8FB7 8E1B 1944 5D71 0A53 196C D360 BBE2 PGP Key: http://keyserver.ubuntu.com/pks/lookup?op=get&search=0x0A53196CD360BBE2 _______________________________________________ List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev To unsubscribe, email: [email protected]
