Comment by fn-mote

4 days ago

Note that this is 1-click.

0-click example: receive an MMS with a malformed image that exploits a bug in decoding

"0-click example: receive an MMS with a malformed image that exploits a bug in decoding ..."

Consider a SMS firewall that:

- flattens text to ascii-256

- recompresses, noises and slightly resizes images and video

... and only then passes the message onto your real (SIM card) phone number.

This, of course, requires that you host your phone number somewhere like Twilio which has other added benefits like additional protection from SIM-jacking and being invulnerable to theft or loss of your handset, etc.

Recommended.

  • If this firewall is available as a commercial product, eventually it be infected, so there won't be any need to hack any client devices. Since this is clearly a niche product, the device manufacturer won't be able to identify and fix bugs as effectively as companies like Apple do. This follows ROSKOMNADZOR recommendations: to install a middleware device that decrypts, stores, modifies, blocks and redirects all traffic depending on rules submitted from external party.

    • This isn’t a product.

      This is a solution you build and run for yourself.