Comment by DangerousPie
6 hours ago
They also demonstrated how this could be used to silently find out someone’s phone number and then hijack a TFA validation call from an app like WhatsApp to take over their account with no user interaction.
6 hours ago
They also demonstrated how this could be used to silently find out someone’s phone number and then hijack a TFA validation call from an app like WhatsApp to take over their account with no user interaction.
This attack was not silent, it was noisy. They specifically pointed that out in their talk.