Hi,

> Yeah, the telephone system really was not built with general access in mind,
> but instead thinking that only a limited number of employees would have
> access.  Things like the originating phone number are entirely unauthenticated
> (like email).  So, for example, if you have telecom access, you can make your
> calls look like they are coming from any number.
I know this. Here is my short video about caller ID spoofing:
http://videolectures.net/single_kovacic_varnost_voip/

Anyway, caller ID spoofing was not the problem here, but expenses. And
in one case, call was on a list of outgoing calls (on victims'
telephone), while user strongly claims he did not made this call.

Regards,

Matej
-- 
PGP Fingerprint: D241 F62F 8FB7 8E1B 1944  5D71 0A53 196C D360 BBE2
PGP Key:
http://keyserver.ubuntu.com/pks/lookup?op=get&search=0x0A53196CD360BBE2
_______________________________________________
List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev
To unsubscribe, email:  [email protected]

Reply via email to