4 pointsby lschueller3 hours ago1 comment
  • lashull3 hours ago
    > "The reality is that there are a number of known surveillance vendors and bad actors in this space, but given the opaque nature of telecommunications signalling protocols, those vendors are able to operate without revealing exactly who they really are"

    This pretty much summarizes the core problem of the whole mobile security field. You can only secure as far, as the next closed ecosystem is away. Which is not very far. Caused by the ongoing push & pull between the key players.