Until our cell network cryptographically validates a caller all incoming and outgoing messages are suspect, unless the underlying application performs authentication. But actual risk is low, unless you are a high value target.
— Dean Norris (@geekynerdyone) January 21, 2020
from Twitter https://twitter.com/geekynerdyone
January 21, 2020 at 02:35AM
via IFTTT
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.