Comment by detrites

3 years ago

The scammer in the third world country folks may be at threat of this breach being exploited by does not have that ability.

But they do have the internet, and further no meatspace means scams can be automated/scaled.

Honestly, this seems very bad.

Reidentifyig anonymized location traces has been common for many years in the gray data market world. If you have multi-year traces, it’s not too hard. You just need some sparse location data for the target and then if the sparse data matches the trace at 4-5 times you can be pretty sure it’s the same person.

For example, if you ever use public wifi, and you hit a web page with real-time bid ads on it, your ip address and tracking cookie will be reported. The IP can be geolocated, and presto, you have one time/location datapoint. Credit card transaction data can also be bought, and a cc transaction often gives you a location and a time.

I read an article today about someone who was called by his daughter to transfer money. It turned out to be an AI deepfake.

The criminal networks are pretty sophisticated.

  • >The criminal networks are pretty sophisticated.

    I’ve had to relay this on to people I train: It’s their job. It’s a business and it’s unreasonable for you to be better at aspects of it than they are.

    I think the slide is titled “Someone is going to be the goose, hopefully not you”.

    • The attacker has the advantage of knowing when and how the attack will occur.

      In nature, the predator has the fangs and claws.

    • It seems like the old Bell system with its monopoly rents was a feature then. Scams like this were impossible economically since even the cheapest long distance phone call rates were high enough to discourage scam call centres.

  • I’d imagine the play here would be to search known people of prominence/public figures/clergy/politicians/etc and then review the logs for signs of I’ll doing. Most likely infidelity. Then blackmail ensues.