Exposing The Flaw In Our Phone System

Поділитися
Вставка
  • Опубліковано 10 лис 2024

КОМЕНТАРІ • 13 тис.

  • @veritasium
    @veritasium  Місяць тому +2771

    Become a better thinker. Start your free 30-day trial with Brilliant and get 20% off an annual premium subscription brilliant.org/veritasium

    • @a-manthegeneral
      @a-manthegeneral Місяць тому +36

      Bro got the comment from the past

    • @BaronyDuvet84
      @BaronyDuvet84 Місяць тому +12

      Noted.

    • @HFIAPY
      @HFIAPY Місяць тому +8

      No 💵

    • @SocialistNerd
      @SocialistNerd Місяць тому +5

      wait how did you commentn

    • @capichow
      @capichow Місяць тому +1

      @@HFIAPYid call people with my voice when young in the 80s😂😂😂

  • @LinusTechTips
    @LinusTechTips Місяць тому +47240

    With friends like this, who needs enemies :D
    Thanks for including us and getting the word out about this threat. Mind-blowing stuff. - LS

    • @treborsenaj9169
      @treborsenaj9169 Місяць тому +719

      Your wife was cold blooded with the "I'm with Cindy" shutdown

    • @john_michael_white
      @john_michael_white Місяць тому +248

      I'm very disappointed in Derek for working with you, I can see I'm not the only one. Shame on you.

    • @ArthurMetalHead
      @ArthurMetalHead Місяць тому +79

      Linus tech man

    • @sharp7171
      @sharp7171 Місяць тому +160

      Luke Sebastian really taking his time to comment on this video warms my heart. ❤

    • @Stavroization
      @Stavroization Місяць тому +1133

      ​@@john_michael_white Lol what is this nonsense

  • @hacksmith
    @hacksmith Місяць тому +33152

    Definitely the strangest way to end up in a collab! I can't believe this is a thing -- thanks for.... not hacking me instead! 😂

    • @Izukachan
      @Izukachan Місяць тому +256

      Awesome cameo!

    • @mcrenn5350
      @mcrenn5350 Місяць тому +267

      You can just hack em back ;) 🔪

    • @-DeathNinja
      @-DeathNinja Місяць тому +141

      Downgrade back to sticks and stones, it's the only way

    • @mango3520
      @mango3520 Місяць тому +112

      How could they hack the literal smith of hacking?

    • @paddington1670
      @paddington1670 Місяць тому +18

      oh dang you guys still make videos?

  • @poomplanichaya
    @poomplanichaya Місяць тому +18472

    I wish this video was uploaded on Linus’s channel with title “I upload this video without Linus permission”

    • @plutotheplanet5341
      @plutotheplanet5341 Місяць тому +946

      I think that might have actually been illegal. Maybe just upload it and attach a recording at the end where Linus says he approves it and is held at gunpo... never mind

    • @MohakSumaria
      @MohakSumaria Місяць тому +543

      And give away all the ad revenue?

    • @Daft_Ideas
      @Daft_Ideas Місяць тому +175

      Pretty sure spoofing an IMSI is illegal anyway. But most courts would factor in "intent".

    • @MaxiMonkU2B
      @MaxiMonkU2B Місяць тому +8

      You'd have to be truly dumb to do that. You'd be messing seriously with the platform that pays you....

    • @John-lw7bz
      @John-lw7bz Місяць тому +35

      someone get this guy a youtube channel manager position

  • @mtvkriar91
    @mtvkriar91 Місяць тому +323

    We need more eye-opener videos like this one. Hacking vulnerabilities are all around us, right in front of us. Thanks Veritasium.

    • @0xphk
      @0xphk 29 днів тому +5

      There are already loads of it available, either on other YT channels, or directly at the CCC media archive as almost every talk was recorded and shared over the last 10-15years. Lots of content if one is interested in some deep rabbit holes. For big tech channels, it's rather uncommon to address things like this.

  • @yasahiroitou1307
    @yasahiroitou1307 Місяць тому +14424

    Veritasium : Hey Linus, wanna collab?
    Linus : NO
    Veritasium : We'll see about that

  • @jack.smith2958
    @jack.smith2958 Місяць тому +36484

    "Nothing to hide, nothing to fear" is one of the worst arguments for mass surveillance. I absolutely hate it.

    • @karatekid7640
      @karatekid7640 Місяць тому +1305

      I do remember this quote, wasn't it Google founder Larry Page who said this while question were being raised on Google mass public data collection?

    • @Hakushakuke
      @Hakushakuke Місяць тому

      Having your thoughts continuously being observed is equivalent to being raped.

    • @ralfbaechle
      @ralfbaechle Місяць тому +1382

      This argument is so simple that many people have independently discovered it by themselves. It's also as flawed as simple.

    • @GeorgeWashingtonLaserMusket
      @GeorgeWashingtonLaserMusket Місяць тому +912

      I've got a lot to hide, my lawful activity is 99.95 percent the other 0.05% is a rounding error.

    • @KaiK-s9j
      @KaiK-s9j Місяць тому +501

      Fr, I bet the people who say it have the most to hide

  • @sparrowcide
    @sparrowcide Місяць тому +727

    I always thought SMS two factor was safe and wondered why people called it unsafe. This video really opened my eyes.

    • @alexus267
      @alexus267 Місяць тому +45

      There's always an option to bribe a network employee to reissue one's sim card, too.

    • @James_Knott
      @James_Knott Місяць тому

      SMS is not safe, so neither is anything carried over it. Cell phone companies have been warning to stop using SMS.

    • @EarlCo
      @EarlCo Місяць тому +15

      JPMorgan Chase 👀

    • @thetdy1
      @thetdy1 Місяць тому +3

      @@EarlCo for real i might send them this video lol

    • @monkeydog8681
      @monkeydog8681 Місяць тому

      I finally found out why my premium windows account was changed from two-factor verification to a secured app verification.

  • @FidelisG
    @FidelisG 21 день тому +35

    4:52 mind blown, TIL that that was the reason behind the specific dial tones for each number. Amazing.

  • @immortal5383
    @immortal5383 Місяць тому +8699

    "Nothing to hide, nothing to fear" Assumes that the intruders are always on your side, when the intruder could be an evil organization or a government with opposite views.

    • @debrascott8775
      @debrascott8775 Місяць тому +320

      Or just someone who wants to sell you something...this is the world we live in.

    • @datboib3432
      @datboib3432 Місяць тому

      @@debrascott8775I’d rather take the person trying to sell me something over an evil organization or government

    • @5Andysalive
      @5Andysalive Місяць тому +230

      the big problem that what to hide and to fear depends on the local rules and laws. The judgement of what to hide or fear can just change! Someone can retroactively CHANGE the rules and suddenly something legal you did in the past that is on record, gets you into trouble.
      . A new political side taking over, or something like the McCarthy era in the US.... suddenly having talked to the wrong people in the past (legally) can END your career.

    • @Neptas
      @Neptas Місяць тому +120

      Even if the observer is a good friend or family member, or a 100% true neutral party, you still shouldn't accept that. Private life exists for a reason.

    • @zaxtonhong3958
      @zaxtonhong3958 Місяць тому +38

      Not really. It assumes that breaching your privacy is not useful to the intruder.
      If you live under a government that punishes you for having opposing views, then you have something to hide.

  • @minhhoang6438
    @minhhoang6438 Місяць тому +5861

    Veritasium: Shown a big fat security concern
    Me: So what can I do?
    Veritasium: There's not much you can do.
    💀

    • @seekyunbounded9273
      @seekyunbounded9273 Місяць тому +220

      faraday cage baby, only pull phone out when you rly need to call, or take the sim card out instead if its easy to access. You can also try to change your number often, whoever could track you would have to find what your new numbers is every time.
      Thats at least my understanding, i am just a dog on a internet.

    • @marenjones6665
      @marenjones6665 Місяць тому +18

      Yeah, it sucks.

    • @sksg4
      @sksg4 Місяць тому +88

      they just need your number to forward sms auth to their. then can access your bank app. disconect your phone would not do much

    • @FarooqAhmad-ss3vn
      @FarooqAhmad-ss3vn Місяць тому +212

      Get two numbers. Use one for authentication other for regular calls. Don't ever tell anyone you have 2nd number or use it for anything else other than auth.

    • @DJ_kefo
      @DJ_kefo Місяць тому

      ​@@FarooqAhmad-ss3vnThat is just as horrible as using oAuth with google on everything else you have

  • @woomba7
    @woomba7 Місяць тому +3538

    As someone in cybersecurity, just one more thing I get to reference to get people to stop using SMS and phone as their 2nd factor in authentication. Sim swapping is one thing. This is another level

    • @owenwesterhout
      @owenwesterhout Місяць тому +153

      What would you suggest?

    • @__Hanasei__Levinus__
      @__Hanasei__Levinus__ Місяць тому +18

      Commenting for potential outtakes later, ty op

    • @astacc
      @astacc Місяць тому

      @@owenwesterhout pretty much anything else like mentioned in the video.. good authenticator app with TOTP, hardware token with FIDO2

    • @woomba7
      @woomba7 Місяць тому

      @@owenwesterhout Exactly what V suggested at the end. Hardware tokens (FIDO2) or one time passcodes via an authentication app like Microsoft Authenticator or Google Authenticator. Unfortunately, many banks don't give anything but SMS as an option

    • @FuturisticFolk306
      @FuturisticFolk306 Місяць тому +459

      The only problem is most financial institutions only support SMS for authentication.

  • @hwertz10
    @hwertz10 Місяць тому +48

    As an FYI, since it's not mentioned by name in the video, the replacement for SS7 (and "voice circuits" for voice) is Diameter for the authentication and IMS (IP Multimedia System) for call setup.
    Diameter is a play on words, RADIUS was developed in the early 1990s for authentication and Diameter is an updated and modernized version of RADIUS. IMS does the actual call setup and carrying the calls. (SIP -- Session Initiation Protocol -- is often used by VOIP type services and IP-PBXes etc., and is used in IMS as well.) Some hoohah at the 4G and 5G MAC layer gives the IMS traffic priority to make sure voice calls don't get all choppy even if the site's congested enough for data speeds to totally tank.
    If anything spicy is found in these specs it'll probably be in IMS. But as opposed to SS7 (which was designed by Bell etc. for use among chums) Diameter and IMS were designed with security in mind.

    • @jorgealbertogarridogallard3622
      @jorgealbertogarridogallard3622 Місяць тому +7

      Also, the replacement depends a lot on national interconnection rules. My country has just approved SIP as a signaling method between network operators. They can still use SS7 and, for international signaling with 'less developed' countries, older systems.
      Now, IMS is still blocked for some cellphones in some networks, for some reasons that I haven't find yet.
      Anyways, we'll still have SS7 for a while.
      And for privacy, use other authentication method than SMS.

    • @MindfulRise6IX
      @MindfulRise6IX 26 днів тому

      Also Samsung uses their own IMS implementation for 4G Volte which is a pain in the ass for modders to develop custom roms for Samsung devices with native 4G Volte support

    • @jorgealbertogarridogallard3622
      @jorgealbertogarridogallard3622 25 днів тому

      @@MindfulRise6IX that's nothing compared to being blocked in the network by the MNO, by IMEI. You really can't bypass that without committing and actual prison time deserving crime

    • @Freyja-f7m
      @Freyja-f7m 13 днів тому

      ​@@jorgealbertogarridogallard3622 True, but hackers don't care if they are stalking you it's already a prison time crime.

  • @mhales73
    @mhales73 Місяць тому +1759

    As a manager in telecom.... this is outstanding stuff. As in a perfect primer for anyone working in the cell industry.

    • @SToXC_.
      @SToXC_. Місяць тому +2

      telekom? tim?

    • @Ryanthusar
      @Ryanthusar Місяць тому

      @@SToXC_. - Telecom doesnt necessary mean a company, telecom is also short for telecommunications, just as telco is.

    • @TheNameIsFreddy
      @TheNameIsFreddy Місяць тому +23

      You don't need to be a fkn manager to find it amazing

    • @Nekudza
      @Nekudza Місяць тому +5

      Guys from POST are actually selling really cool soystem that helps to monitor and block most of the SS7 attacks

    • @chrisross1703
      @chrisross1703 Місяць тому +7

      A few years ago in a meeting with telcos I heard that they want to remove SS7, but they also have a problem with many engineers to understand SS7 retiring.

  • @MattyClivingthedream
    @MattyClivingthedream Місяць тому +849

    Australia has shut down the 2G network and is about to close the 3G network. One of the reasons given was to do with security, and it was never fully explained what the security issues were.
    This video has helped a lot and makes me more supportive of the change.

    • @BillAnt
      @BillAnt Місяць тому +31

      No wonder, Australia is like a Nazi state, no drugs, no guns, no SS7. lol

    • @germanguy1219
      @germanguy1219 Місяць тому

      @@BillAntyou dont know what a nazi is

    • @ruealexandriasullivan3084
      @ruealexandriasullivan3084 Місяць тому +109

      ​@@BillAntmate, someone doesn't live in Aussie 🤣

    • @olgalisinska4837
      @olgalisinska4837 Місяць тому +84

      @@BillAntno drugs? HA HA HA HA HA.

    • @BurnerAccount777
      @BurnerAccount777 Місяць тому +51

      @@BillAnt no drugs is absolutely criminal, pretty sure aussies are in the running for biggest noses and strongest lungs

  • @classicalmechanic8914
    @classicalmechanic8914 Місяць тому +4283

    Pope:"Hello? Who's calling?"
    Steve Jobs: "It's Henry Kissinger. I want to confess war crimes."

    • @ninadgadre3934
      @ninadgadre3934 Місяць тому +420

      Pope: “I’m sorry i don’t have 584 hours to listen to you right now.”

    • @davideverling753
      @davideverling753 Місяць тому +162

      Pope: “Eh no worries I was a Hitlerjugend, say 3 hail Marys”

    • @shazzadhasan4885
      @shazzadhasan4885 Місяць тому +14

      🤣🤣🤣🤣

    • @UziMusic
      @UziMusic Місяць тому

      @@davideverling753 HAHA surprised this hasn't been auto deleted..

    • @zweispurmopped
      @zweispurmopped Місяць тому +56

      "His eminence currently isn't available on the phone. He is taking a walk with his dogma."

  • @KenSilverman1
    @KenSilverman1 Місяць тому +173

    Finally Veritasium did a nice video about this. I hope they interview me. I corresponded with Steve Wozniak via Tap underground magazine and created the first digital Red box similar to a blue box except it makes free phone calls from payphones at the time using 2,200 Hertz and 1700 Hertz time together over short pulses 5 pulses emulating that of the quarter going into the phone for long-distance phone calls. These frequencies were made public in the June 1963 Bell technical journal. I used the university EE laboratory to program ROM chips with the two frequencies using the fast Fourier transform to create the waveform. Steve Wozniak built an analog version that wasn't stable and would often signal the FBI to get on the line immediately. Mine did not do that. So I actually built the very first digital one back in 1986. I did receive a visit from the FBI that year but on a totally different matter lol. Now the way the blue box works is first you have to have a disconnect tone of 2600 hz popularized in Pink Floyd The Wall "Mr Floyd calling Mrs Floyd, are we reaching". And the phone on the other end has to be in the mechanical switching system which pretty much doesn't exist today.

    • @bonobo3748
      @bonobo3748 Місяць тому +8

      So you can help cut back on my phone bill?

    • @guestguest9603
      @guestguest9603 Місяць тому

      ​@@bonobo3748 😂😂😂

    • @Deneteus
      @Deneteus Місяць тому +1

      In the old days certain people had the FBI on speed dial.

  • @panther105
    @panther105 Місяць тому +116

    Back in the two tin cans on a string days (1970s - 80s), you could dial up a number with a recorded message, start the message and hang up, then call back and get a busy signal as the recording tape was still playing. If someone else called the number and got the same busy signal, you could cross talk to each other over the busy signal. You could talk as long as you liked. The more people, up to 9, I think, the quieter the busy signal became. We later found out that our local phone company used any number ending in 99 as technician's test number which generated the same busy signal. The beauty of this game was you could call from any location in the world and because it was a busy signal you wouldn't get charged for the call. It was also possible to listen in and hear feint voices trying to connect but you were on a different 99 number. If you were on XXX-1299 but someone else was on XXX-1599, you could talk loud enough to tell them which exact number you were on and they could redial and connect to you "directly" Fun times....

    • @UserName_no1
      @UserName_no1 29 днів тому +8

      Seventies technology did have some rather peculiar quirk's. One night I snuck into the family car, the kind with the ignition in the steering wheel column with a lock and found that I could press in the emergency flasher button while stepping on the brake and turn the ignition and unlock it and put it in the on position and turn on the radio. Turn the flashers off, let my foot off the brake (thus turning off the tail lights) and run pop's battery down. All without the key. Go figure. Mind you I discovered this convoluted process while my "states" were altered.

    • @DusanPavlicek78
      @DusanPavlicek78 26 днів тому +1

      That's quite fascinating. Thanks for sharing 😊

    • @Google_Does_Evil_Now
      @Google_Does_Evil_Now 22 дні тому

      ​@@UserName_no1how did you turn the ignition barrel without a key?

    • @UserName_no1
      @UserName_no1 22 дні тому

      @@Google_Does_Evil_Now You mean the cylinder? I may have simultaneously giggled the steering wheel itself, I don't recall. I just remember being able to engage the radio without having the key, because in those days there was no key faub or push button ignition. If I remember correctly it was a 70s model Mercury Monterey, but I could be wrong. 😏

    • @doggSMK
      @doggSMK 12 днів тому +4

      Dude, this happened to me when I was a kid. I was on the phone with a friend, idk what happened, but two grannies joined the call. We trash talked and hung up, and when we picked up the phones again we could still hear the grannies 😂

  • @matt-tq2dp
    @matt-tq2dp Місяць тому +10506

    *tech enthusiasts:* "my whole house is smart"
    *tech workers:* "the only technology I have is a printer and I keep a gun next to it so that I can shoot it if it makes a noise I don't recognize"

    • @Jarb2104
      @Jarb2104 Місяць тому +654

      Or the famous, "tap wire please give me a recipe for chocolate cookies".

    • @mixswist
      @mixswist Місяць тому +881

      I wouldn't left a gun next to it, what if it decided to pickup a gun before you do?

    • @butwhytho6522
      @butwhytho6522 Місяць тому +344

      Jokes on you, printers never do anything

    • @Supremax67
      @Supremax67 Місяць тому +194

      None of the above. Printer is actually from Skynet and you just gave it a gun.

    • @P-39_Airacobra
      @P-39_Airacobra Місяць тому +25

      true, but also reposted many times

  • @LoveinDC
    @LoveinDC Місяць тому +1103

    “It’s not that I have something to hide. I have nothing I want you to see.” - Anon (2018)

    • @SaintSaint
      @SaintSaint Місяць тому +20

      Wow. I need to use that quote. It's better that it's just attributed to an Anon in 2018. We have search and seizure laws(4th amendment) for a reason.

    • @sofia.eris.bauhaus
      @sofia.eris.bauhaus Місяць тому +71

      i like the Snowden quote: "saying 'i don't care about privacy because i have nothing to hide' is like saying 'i don't care about free speech because i have nothing to say'" (paraphrased)

    • @flowerofash4439
      @flowerofash4439 Місяць тому +9

      i have nothing to hide from a trustworthy people, however the gov is kinda... a little bit... sus

    • @AkimFur
      @AkimFur Місяць тому +10

      @@SaintSaint it's not from anon, it's from the movie Anon, from 2018 lol

    • @katlis
      @katlis Місяць тому +2

      @@flowerofash4439 Saying "the gov" being sus is quite broad. Which country? The US? If so, which political party? Do both parties finally agree on something (covert mass surveillance of citizens)?

  • @aivarasurbanavicius9563
    @aivarasurbanavicius9563 Місяць тому +15

    I been following your channel for several years now. Hands down this is the best science related channel on youtube. The topics are well presented even for a person with no knowledge on the topic. Derek I hope you understand how much of an impact you are making. I feel like I do learn more everytime I watch your videos. You are a gem.

  • @HauntSlider
    @HauntSlider Місяць тому +498

    Having been one of those "people" back in the early 80's and taking advantage of loopholes in the system (got out before SS7).
    Still have my original blue box, my red box, my black box and an original Captain Crunch whistle somewhere in my attic.
    Awesome video. So glad that LTT participated in this. Subscribing to you now.

    • @AwesomeBlackDude
      @AwesomeBlackDude Місяць тому

      Do you still know the names of the most popular modem apps that was used for logging in bulletin board services?

    • @AwesomeBlackDude
      @AwesomeBlackDude Місяць тому

      Not AOL, CompuServe, and Prodigy, but 56k modem softwares for BBS, like Exepc.

    • @douglasgoodall3612
      @douglasgoodall3612 Місяць тому +1

      @@AwesomeBlackDude xmodem, move-it

    • @StingrayOfficial
      @StingrayOfficial Місяць тому +7

      Phreak!

    • @stevesteve8098
      @stevesteve8098 Місяць тому

      I was unfortunate enough to work in education back in the 90's we taught electronics to retards & ex cons
      We had a contract with Plessy, evey month the reps of our company used to bring shedloadds of "trash" and internal datasheets for plessy chips...
      for the retards to desolder to practice the soldering skills..
      We then supplied their work force with said excons.
      at that time plessy made all the signalling equipment for British telicom, and that scrap was the inertial routing tone control boards for the systems.
      After the US phreaking fiasco.. they split they trunk signalling & public signalling into two separate chipsets..
      our training company decided the unused tubes of chips & datasheets were not really useful & binned tehm .. into the back of my car.

  • @JonValtandtheEvilRobots
    @JonValtandtheEvilRobots Місяць тому +184

    As a cybersecurity dude who originally got started through “phreaking,” I really appreciate the way you’re giving all the background on blue boxes, etc. 🥰🥰🥰

    • @ericdodson3630
      @ericdodson3630 Місяць тому +5

      I was born in 1980 and didn't really get into computers until 1990 (but I did take apart my NES at 5 cause i was curious what was inside), I'm a little sad I was too young for phreaking. I wish I could have been part of the Home Brew Computer Club scene that would have been just an amazing experience being in the primordial ooze of the computer revolution

    • @philotomybaar
      @philotomybaar Місяць тому +1

      I was hoping he’d also cover the chinger. Fun times!😂

    • @Salah.Ad-Din
      @Salah.Ad-Din Місяць тому +2

      𝓹𝓱𝓻𝓮𝓪𝓴𝔂

    • @legendofman12
      @legendofman12 Місяць тому

      U aint sh

    • @Dwigt_Rortugal
      @Dwigt_Rortugal Місяць тому

      I'm glad they implicitly mentioned John Draper (Cap'n Crunch)

  • @GrebnevNikita
    @GrebnevNikita Місяць тому +4078

    Veritasium uses your phone to find you and then sends Vsauce the location.
    "Hey Vsauce, Michael here, your home security is pretty good. Or is it?"
    Lockpicking Lawyer walks into the frame. "Click on one, nothing on two...".
    After a few seconds, the door opens. "Now... How many holes do you have?"

    • @lck0ut348
      @lck0ut348 Місяць тому +403

      "Three is binding, four is loose, nice click out of five ... let me do it again to prove it's not a fluke ..."

    • @jnzooger
      @jnzooger Місяць тому +483

      And then electroBOOM comes in and checks your gfci.

    • @nanya6148
      @nanya6148 Місяць тому +180

      *lockpicking lawyer's hands walk into frame

    • @skuzzyj
      @skuzzyj Місяць тому +133

      The next morning you review your surveillance archive and see the shadowy outline of a McNally decapitating a mannequin with a t-square in the basement

    • @rehenaziasmen4603
      @rehenaziasmen4603 Місяць тому +118

      This thread is terrifying

  • @janbobis
    @janbobis Місяць тому +317

    12:33 "you need something like a SIM card" then flashes a MicroSD card LOL

    • @mmdts
      @mmdts Місяць тому +13

      how do you even notice this?! amazing....

    • @proton3748
      @proton3748 Місяць тому +2

      I thought it was a sim card lmao

    • @haneycr
      @haneycr Місяць тому +12

      That's a Micro SIM card which performs the same function as a standard SIM card.

    • @GermanCacha
      @GermanCacha Місяць тому +21

      ​@@haneycr Is a Micro SD

    • @jaames
      @jaames Місяць тому +20

      @@haneycr I have the same exact transcent micro sd card. same colors. it's not a sim card lol

  • @gbraadnl
    @gbraadnl Місяць тому +134

    Karsten Nohl is the real hero in this story. have been following him and his work for years. glad to see this gets attention.

    • @Hukkinen
      @Hukkinen Місяць тому +1

      Yeah, I'm big fan of CCC and their annual conference. I watched their 2014 presentation and it was awesome.

    • @eey8909
      @eey8909 Місяць тому

      He looks like Mr.Robot But older 😅

  • @RobertKirkpatrick84
    @RobertKirkpatrick84 Місяць тому +301

    When I was a kid, I had a really old radio that belong to my grandparents. It let you switch between am, fm, UHF, etc. if I turned the switch between two types of radio and then fiddled with the dial I started hearing people cell phone calls. A mechanical man's voice would read out a number then I would hear the ringing and then the phone conversation. It was seriously weird. I was 8 years old and figured out how to listen to people's cell phone calls. I'm sure there were people all over listening to them and recording them all the time.

    • @dan_in_sd
      @dan_in_sd Місяць тому +46

      I had a VCR that did this. If you went to channel 83 and 84, and fiddle with fine tuning you could hear all kinds of AMPS Cellular calls in the neighborhood. (AMPS= 1st gen cellular systems)

    • @Basedgwad
      @Basedgwad Місяць тому +5

      menace

    • @ericdodson3630
      @ericdodson3630 Місяць тому +20

      the good ol' days of unencrypted analog communication. I am 44 and remember hearing stories about Party Lines that the telco's used to provide, it was just an open circuit going to multiple houses, and if someone picked up the phone they could hear your conversation and only 1 call could be made at a time. It was ridiculously cheap compared to a private connection to the switch board.

    • @ericwhittaker3570
      @ericwhittaker3570 Місяць тому +2

      Same. Mine was with a Ham radio. I could pick up wireless home phones too. Sort of voyeuristic for a 14 year old, looking back now... ha ha!

    • @GodOfDoubt
      @GodOfDoubt Місяць тому

      Similar , one of our random tv channel vs our neighbor's Atari and vcd player. I had free xxx channel for years 😅

  • @TheBooker66
    @TheBooker66 Місяць тому +235

    This is actually insane. I didn't realise regular old cell networks were so highly compromised. I knew they were much worse than any form of communication which uses E2EE, but this is on a whole other level.

    • @rightwingsafetysquad9872
      @rightwingsafetysquad9872 Місяць тому +9

      It doesn't even matter if you're using E2EE if it's compromised early enough.

    • @samholdsworth420
      @samholdsworth420 Місяць тому

      Sim jacking is old news 😂

    • @XGD5layer
      @XGD5layer Місяць тому +1

      ​@@rightwingsafetysquad9872 yes, if an end is compromised, then it doesn't matter

    • @bororobo3805
      @bororobo3805 Місяць тому +8

      Even SMS on 2G is insecure. You can use an IMSI catcher to grab SMS and even USSD sessions

    • @thethan3
      @thethan3 Місяць тому

      What is insane is actually the fact that until someone put this right in your face no one pays attention.
      Tech workers have been saying these things for decades, and regular people discount it as you are just being paranoid if you can't show it happening right in front of you.
      Also, its illegal (a felony for each count) to do these things, but the actual enforcement is only retroactive. You would think that people would pay attention to experts, but that is and has no longer been the case for years. This is one part of why most of the global society of 1st-world countries are failing.
      This has been an open secret in the IT and telecom industry for decades, right along the ME/Securezone (firmware-based backdoor access to all network connected computers).
      There are also many other aspects which were not covered, but equally mind-bending for an average person; and the risks are very real. For example, what would happen if your close contacts, which you don't see every day suddenly just stop talking to you. Messages you leave aren't returned, or are delayed without any indicator. Where your voicemails show up after the fact backdated. How would you know someone had called, or sent something, and it follows you across providers. Would your interpersonal relationships dwindle and die on the vine? Would you become isolated? Would it surprise you to know anyone with a radio can do the same things, passively? (a length of wire, an inductor and switch is all it really takes).
      Today, there is no amount of action short of violence where people will believe this is a problem with the underlying systems today. The system works fine for them; they'll just think its you being flaky and cut you out of their lives just like what happens with ghosting, only this denial of service will be from some third-parties forcing you to become a pariah without your knowledge by interfering with the connection between you and society.
      All it takes is isolation, lack of agency, and increasing cognitive dissonance applied across large enough portions of a persons life to induce a mental break, be it violent psychosis, or disassociation, there's a lot of literature if one looks for it that backs this, and the objective truth violates assumptions we naturally make about the capabilities, and free-will of others. We are malleable social creatures. Distorted reflected appraisal was perfected back in the 70s.
      When you torture someone (and these components are torture). When the torture is unending everyone eventually breaks, I would not be surprised if China was doing this to people broadly in the US. Active shooters clinically display very similar characteristics to violent PoWs returning from the Korean Conflict (at least what was described in the case studies done by Lifton/Meerloo under Mao's torture).
      Couple that with other forms of equally remote harassment, such as paying off a mail carrier to mark your address as vacant (so all mail goes to the dead letter department), Denial of Service to submit any query to a company or business, or interfere in job seeking activities.
      What would happen if you were summoned to jury duty and don't show up because you never got the summons, or worse did receit it but confirmed on their their website saying you were excused (when you weren't)? What about filing your taxes and they were never delivered. Opening support tickets (the only way to contact a company) only to have them closed 30 days later (with no record of them being opened, and no response). What about arbitrary discontinuation of food benefits after you are unemployed, no job prospects (no one calls back), rising costs (inflation), all regardless of the effort you make to correct the issues because interaction has been shimmed to allow unlawful transparent interference and torture.
      What would you be willing to do when you are desperate, have no food, no shelter, no future, and no ability to change it... and every other person sees this and just says, it works for me you must be doing something wrong.
      Many of our societal systems now operate on presumptions that can be by design made false, and the people that notice these things, the experts in systems that call it out; but aren't listened to, are instead made into pariah's, labelled paranoid, or just crazy. That's the world we have today, and why society is unraveling.
      Complacency is when true evil does its most destructive work. What was described here was known back in 2000. They have had all this time fix things, no action was taken and that is because these outcomes are by design.

  • @NorbiPeti
    @NorbiPeti Місяць тому +8

    4:42 I once created a DTMF tone for my grandparents' landline number in Audacity and then played it on my smartphone next to the phone and it actually dialed them, that was fun.

  • @swaggamesph3342
    @swaggamesph3342 Місяць тому +217

    I'm glad someone created a video about this. I've been telling my colleagues about this and some of them seems like they don't believe me or did not understand.
    Big companies and banks should update their 2SV system since most of them will try to verify either by sms(otp) OR by email. It should be both sms(otp) AND email. This will make logging in to your own account hard BUT more secure (compared to previous system).

    • @J.C...
      @J.C... Місяць тому +6

      You don't look up much on here, do you? They've been putting SS7 attack vids on here for 8 years at this point. This isn't new. At all.
      Seriously. There's a vid from EIGHT YEARS AGO showing ppl use SS7 attacks to hack cell phones.

    • @SidewaysCytlan
      @SidewaysCytlan Місяць тому +9

      I much prefer TOTP or similar tokens that are generated on my device. The inconvenience is less and the security is arguably better (though we should be careful about underestimating the stupidity of users).

    • @VariantAEC
      @VariantAEC Місяць тому +3

      People wonder why my phone is basically always in airplane mode and why I never rely on VOIP internet features.
      Meanwhile, I can read the storage of computers up to about a mile away without additional tools or even any need for the target device to be connected to anything that could provide power to it... So, there are worse things on the way, it's only a matter of time.

    • @SakuraiEvsa
      @SakuraiEvsa Місяць тому +2

      sometimes its not the companies that not upgrading. its the customer.
      its the usual problem of accessibility vs security. multiple option so the customer can tailor their own are the best option imo.
      but yeah some company (mostly bank for me) are the slowest to over such option.

    • @high-captain-BaLrog
      @high-captain-BaLrog Місяць тому

      @@J.C... iCLoud and other remote storage hacks are just as common as they were a decade ago, people don't bother being pro-active or educated.

  • @ChristianHDD
    @ChristianHDD Місяць тому +91

    I’m convinced there is no such thing as privacy anymore. I’m sure there is SO much more that we don’t know.

    • @jamielondon6436
      @jamielondon6436 Місяць тому

      Could you at least put on some clothes before posting this? Jeez, nobody wants to see that! :-p
      ;-)

    • @Dwigt_Rortugal
      @Dwigt_Rortugal Місяць тому +1

      I wish it weren't so. I'm teaching my kids that there's almost no privacy now, but when they grow up, assume there won't be any whatsoever. "Don't get a Gmail account. Here's why..." I wish our politicians knew something useful about anything more complex than a Casio calculator. Even a TI graphing calculator would be an improvement.

    • @storyofbo
      @storyofbo Місяць тому +5

      Assuming you (as most people do) want to participate in society, then yeah there's nothing you can do

  • @Xathonn
    @Xathonn Місяць тому +2

    The beginning with talk about operators and stuff reminded me of my favorite story of those times.
    There was an undertaker who had a rival undertaker in the town, their rival was married to a phone operator, whenever someone called for an undertaker she would redirect them to her husband. The first undertaker got fed up with this and invented a machine to automatically connect calls, putting the operator out of a job.

  • @Whiskey_Wisdom
    @Whiskey_Wisdom Місяць тому +1126

    "Nothing to hide, nothing to fear" insinuates that only criminals desire privacy.

    • @Yj-Fj
      @Yj-Fj Місяць тому +25

      ding 🛎️! Ding 🛎️!! DING 🛎️!!!

    • @lachlanchester8142
      @lachlanchester8142 Місяць тому

      Well what other data do you need to hide? Sounds like you’re hiding something sus

    • @user-nj1qc7uc9c
      @user-nj1qc7uc9c Місяць тому

      @@lachlanchester8142 oh you have nothing to hide?
      you don't want to hide your your passwords, banking information, where you live, etc?
      everyone has things to hide, criminals just have additional things to hide

    • @yourlocalit1701
      @yourlocalit1701 Місяць тому

      ​@@lachlanchester8142sounds like a dumb idiot, it just helps criminals get access to your stuff

    • @lilwyvern4
      @lilwyvern4 Місяць тому +47

      Everyone has something to hide. No matter how pure you think you are, everyone has a shadow, something they think, like, or do that would utterly ruin them if it became public knowledge. I frankly wouldn't believe you if you told me otherwise.

  • @devnol
    @devnol Місяць тому +462

    Derek: does a high production value, animated, musiced and scripted documentary on the phone system
    Also Derek: (12:32) You need a sim card _shows microSD_

    • @SDRIFTERAbdlmounaim
      @SDRIFTERAbdlmounaim Місяць тому +9

      nobody's buying anymore of those anymore sadly, it comes inside many phones in the usa.

    • @devnol
      @devnol Місяць тому

      @@SDRIFTERAbdlmounaim Oh right lmao everyone uses esim there. (Wait isn't veritasium australian?) Regardless I have a literal handful of old sims around the house I actually find it funny how they couldn't find one in time for the shoot.

    • @LuxFerre4242
      @LuxFerre4242 Місяць тому +76

      ​@@SDRIFTERAbdlmounaimThat's a very USA centric issue. SIM cards are still standard everywhere else.

    • @vinstonsalim9025
      @vinstonsalim9025 Місяць тому +8

      AHAHAHA the most underrated comment

    • @andrewlalis
      @andrewlalis Місяць тому

      ​@@LuxFerre4242 in the EU they use eSIM now too for new phones

  • @d7mtg
    @d7mtg Місяць тому +336

    I like how he’s holding an SD card at 12:27 instead of a SIM card

    • @skaramicke
      @skaramicke Місяць тому +30

      I came here to write this.

    • @ThomasBethellB
      @ThomasBethellB Місяць тому +19

      @@skaramicke i came here to look for someone who had 😅

    • @trif55
      @trif55 Місяць тому +3

      also me

    • @anthonyhoffmann
      @anthonyhoffmann Місяць тому +6

      @@ThomasBethellB I waited 10 hours to look for someone who looked for someone who had 😁

    • @stever7596
      @stever7596 Місяць тому +7

      I can't believe you don't understand the concept of a prop. If this is your takeaway, you're missing the bigger picture.

  • @Pedro_MVS_Lima
    @Pedro_MVS_Lima Місяць тому +11

    Your videos and the questions you ask are pretty much always excellent. This one is particularly special to me as it relates to most people's daily lives and because I do have a thing about electronic communications since the late 70s, thank you for reminding me how the POTS analog signaling worked and explaining how I could have called the Pope for free.
    I may be wrong, but I don't foresee SS7 will be phased out in 20 years time. It's been around for over 40 years now and it works reasonably well, its flaws and issues are seemingly not significantly affecting telcos operation or customer's communication reliability and privacy. I do foresee that it will get better protected, a parallel of this inertial process would be the IPV4 protocol.
    And at this point I've no idea why I still haven't subscribed to one of the more important and valuable channels in UA-cam, I'm taking care of that right away.
    Thank you for everything, Derek!

    • @Winter-n7l
      @Winter-n7l 2 дні тому

      I highly recommend proton mail for high level encrypted services, from email, VPN to a crypto wallet they have in beta. And all from a non-profit started by CERN researchers as a hobby project with everything physically based in Switzerland, free for the base package too. If the Swiss hid naz! gold for their banks for so long I think their privacy laws will provide decent cover for encrypted and non-logged email and other services like drive and docs.

  • @ChrisBigBad
    @ChrisBigBad Місяць тому +60

    Ooooh! I do remember Karsten Nohl from the Chaos Computer Congress where he decrypted a cellphone call live on stage. In a later talk he said, the security in SS7 is "you don't know my address (GT), so you cannot hack me" - except the hackers DO know the addresses, so they DO hack you.

  • @vossti
    @vossti Місяць тому +47

    Brilliant video. i'm in the telco industry and i just like to point out one added layer of security as to how the network gets this IMSI.. upon first access to the network yes you use your IMSI but subsequent access and interaction with the network uses TIMSI (Temp IMSI) which changes.. and there are other authentication algos present in the Home Location Register that would make an attack of this kind not be widespread or easy to execute.. also would like to point out that the team there were able to exploit this since their system ( i think its a form of signaling transfer point- (stp) already had gained access to the network signaling and was intergrated to the nodes involved in the MAP signalling involved here.. Otherwise yes this was still a very informative video to the general public.. and i do remember watching their video from 2014 while i was still new in this field and yep they are right ATI (anytime requests) have been largely dropped in most major networks for security reasons..

    • @jeremylindemann5117
      @jeremylindemann5117 Місяць тому

      What's the point of having a unique identifier if you have multiple identities?
      Are these TIMSI numbers single use and still associated with a SIM or are they recycled within a global pool, which would make them completely non-unique?
      This sounds like a security nightmare and a system for launching multiple attacks using one TIMSI after another.

    • @rejophilipjose7763
      @rejophilipjose7763 Місяць тому

      Thanks for the info man

    • @vossti
      @vossti Місяць тому +2

      @jeremylindemann5117 yes theres an algorithm in the HLR that generates TMSIs based on your IMSI and you present this TMSI to the network periodicaly during a process called periodic location update. and if this TMSI does not match what the HLR gave you the last time then you wont be able to make any network interaction.
      Also note that the TMSI changes anytime you move to another serving cell since you will do another fresh location update.
      My point is this study shows that yes ss7 is not a nuclear bunker but ALOT has to be in place for someone to make this kind of attack and like he said it would need an inside connection to the telco itself to begin with..which govts actually do have..

    • @TheKarlitotube
      @TheKarlitotube Місяць тому +1

      actually, TMSI are on the air interface (BSSMAP). Here they get directly access to the SS7 network, and there is no IMSI. Update Location, SRI, SRI for SM or PRN at MAP level deals only with IMSI

    • @vossti
      @vossti Місяць тому +1

      @@TheKarlitotube you mean no TMSI. Yep. you are actually right.. thanks for pointing that out...i was just trying to mention that its not as easily penetrable as the guys here are painting it to be. happy to see someone in the field who knows his stuff! 😉

  • @leadcloud
    @leadcloud Місяць тому +10

    Combine this threat with LLM voice spoofing, and youve got near-perfect social engineering potential

  • @TimothyMershon
    @TimothyMershon Місяць тому +2339

    Veritasium: I hacked my friend. But first let me give you a complete history of the telephone.
    Me eating breakfast: Ok, cool. 👍

    • @-danR
      @-danR Місяць тому +36

      I needed less on the history of the telephone and more elaboration on places where Derek summarily simply papered over cracks, eg. the exploit against the boat captain.

    • @djraptorx
      @djraptorx Місяць тому +2

      I watched this while squeezing spinach at work 🙃

    • @sitrilko
      @sitrilko Місяць тому +12

      I think it was a good move, since it established quite well why things work the way they do now.

    • @syberphish
      @syberphish Місяць тому +2

      @@djraptorx Hey! You leave that poor spinach alone! Who told you you could touch a spinach that way? You oughtta be ashamed of yourself.

    • @mementomori29231
      @mementomori29231 Місяць тому +6

      I enjoyed learning about it. If you don't care about history then don't watch, get lost and be less educated. The impatience of the want it now society is insane.

  • @spiner956
    @spiner956 Місяць тому +408

    SO THAT PARTICULAR DIAL TONE IS ACTUALLY PART OF THE CALLING PROCESS??
    Man, you never stop learning something new everyday.

    • @idontwantahandlethough
      @idontwantahandlethough Місяць тому +59

      if you think about it, it's the same reason that early internet went "beep boop bop SHEEEEEPEPPPEEE" when you were connecting. Those beeps and boops _also_ meant somethings :D

    • @zyeborm
      @zyeborm Місяць тому +15

      Heh back in the day I once needed to call home from a pay phone but had no coins.
      If you hit the hook just right you could emulate the rotary dial process and place a call.
      Worked better when the exchanges had the mechanical relays, the timing wasn't as tight, but you could still get it later on.
      The coins then just unlocked the DTMF tones on the keypad.

    • @mikmorpheus
      @mikmorpheus Місяць тому +1

      There are even movies from the 90s that include this 😂 I think it's called hacker 🤔 they use alu foil to create a tone and than use the telephone to hack the system without monitor 😂

    • @lakonoki9189
      @lakonoki9189 Місяць тому

      Papa Linus got Hacked again..😢

    • @BillAnt
      @BillAnt Місяць тому

      @@zyeborm - Well prior to payphones going out of fashion, you could use a RED Box to simulate coins being dropped via inband signalling. SS7 took that out of the equation in modern phone systems.

  • @drop6597
    @drop6597 Місяць тому +1859

    linus' wife being like 'that's nice dear im busy' was the most relatable thing ever. HAHAHA.

    • @117chris9
      @117chris9 Місяць тому +87

      hmm I got red flags but that's Might just be me

    • @antonio97b
      @antonio97b Місяць тому +374

      @@117chris9 It would be a red flag on the other end if you expected your SO to always bow to you.
      People have lives. Yes, wives can be busy without their husbands. Quit being weird.

    • @carlosalloatti5899
      @carlosalloatti5899 Місяць тому +50

      @@antonio97b Also, people have manners.

    • @NikKrystalo
      @NikKrystalo Місяць тому +44

      relatable (un-married and 17)

    • @luketurner314
      @luketurner314 Місяць тому +39

      I read it as Linus made himself sound like an artificial voice and she fell for it thinking it was some kind of spam call with a faked voice

  • @olindblo
    @olindblo 28 днів тому +5

    21:46 this is actually how they caught a hitman in Finland back in 2020.

  • @mitchellct01
    @mitchellct01 Місяць тому +92

    I appreciate that your advert plug was left to the end and not interrupting the main video context. You are one of the only channels where I actually sit through the ad.

    • @winterwierdo
      @winterwierdo Місяць тому

      I also sit though then just for the view metrics for him.

  • @istiakakib7056
    @istiakakib7056 Місяць тому +4715

    When you sleep first during a sleepover

    • @CrownVirtual
      @CrownVirtual Місяць тому +37

      that’s pretty mild

    • @budgreenjeans
      @budgreenjeans Місяць тому +40

      Sounds like Someone has been to band camp

    • @CrownVirtual
      @CrownVirtual Місяць тому +5

      @@budgreenjeans ???

    • @spindoctor6385
      @spindoctor6385 Місяць тому

      In my day you would just wake up with a penis drawn on your forehead.

    • @Chitose_
      @Chitose_ Місяць тому +41

      now it's veritasium tech tips

  • @BLASTIC0
    @BLASTIC0 18 днів тому +3

    Great video! My father helped Woz with the schematics for the blue box…. What a bunch of phreaks! I gotta check to see if he still has anything left over from working on it.

  • @nydydn
    @nydydn Місяць тому +583

    Me with 2 sim cards in my phone, from different countries, so that attackers have multiple chances of success, just in case one of the networks is a bit more secure.
    I'm now realizing that pagers are the only way to protect yourself... Ooh... Wait.

    • @Daft_Ideas
      @Daft_Ideas Місяць тому +100

      *boom*

    • @iRelevant.47.system.boycott
      @iRelevant.47.system.boycott Місяць тому +26

      Make sure you get one with regular non lithium batteries ...

    • @turanamo
      @turanamo Місяць тому

      @@iRelevant.47.system.boycott it had nothing to do with batteries. LiOn cannot cause such destructive explosions.

    • @zozzinator
      @zozzinator Місяць тому

      The world is evil now, Israel will try to destroy anything in its way to control the world. There's not much we can trust around them

    • @dalegawne5286
      @dalegawne5286 Місяць тому +38

      maybe go really old school and use walkie talkies surely they cant hack them

  • @TheReaverOfDarkness
    @TheReaverOfDarkness Місяць тому +303

    We keep just trusting that digital systems are secure, often when they don't even have a single security layer. But when someone breaches that security, the companies running it tell us to manage our end user security better! Hold companies accountable! They can fix this and they should!

    • @xantiom
      @xantiom Місяць тому +21

      This is something that was known for more than two decades. Only some European telcos made some upgrades.

    • @justSomeUserOnYT
      @justSomeUserOnYT Місяць тому

      ​@@xantiom Yeah it's a well known vulnerability in these situations. Networks do decent amount of blocking of bad actors, but if someone really wanted to route your calls, listen in, intercept your SMS, locate you, they can. It's pretty crappy.
      It's why OTT/VoIP are significantly better alternatives.
      It's why Apple should have been genuine implementing RCS instead of using the Universal Profile which is not encrypted. Furthermore, Apple should just work with Google to expand iMessage.
      It sucks. Cellular networks are very old technology, often very outdated.

    • @ponyslavestation4669
      @ponyslavestation4669 Місяць тому +1

      ​@@xantiomYea even heard of this some time ago on JRE.

    • @bradhaines3142
      @bradhaines3142 Місяць тому +5

      ive never trusted it but im not given any choice in how things are done either

    • @pacmonster066
      @pacmonster066 Місяць тому +12

      I mean if you watched the video you'll find it was the analog system that was the least secure. Playing a specific tone into your phone could connect you to whoever for free.
      SS7 was initially very secure, but got less secure over time as greed and laziness came into it. And now 4G and 5G are digital systems that don't have this vulnerability at all, it just requires larger adoption.
      There is a constant battle between security and people looking to break that security. You can't just make a generalized statement that "digital = bad".

  • @abielreh
    @abielreh Місяць тому +2506

    Veritasium going on his villain arc

    • @-TAPnRACK-
      @-TAPnRACK- Місяць тому +11

      Dang what an original comment

    • @chu121su12
      @chu121su12 Місяць тому +14

      Still the element of truth

    • @DV-tx6ol
      @DV-tx6ol Місяць тому +28

      ​@@-TAPnRACK- dang, what an original comment stating what an original comment.

    • @Peekobo0_
      @Peekobo0_ Місяць тому +16

      @@DV-tx6ol Dang, what an original comment stating what an original comment stating what an original comment.

    • @captain_fisher_price
      @captain_fisher_price Місяць тому +10

      @@Peekobo0_ Dang, what an original comment stating what an original comment stating what an original comment stating what an original comment.

  • @3dgar7eandro
    @3dgar7eandro 10 днів тому +1

    @veritasium I give up there is literally no bad video of yours... How could you be so amazingly accurate and continues!

  • @notme222
    @notme222 Місяць тому +112

    As a teen in the early 90s, I was so fascinated with those early Phone Phreaking techniques. Some of which still worked. Even did a school project on it.

    • @codefeenix
      @codefeenix Місяць тому +1

      What still worked for you?

    • @Xero5273
      @Xero5273 Місяць тому

      ​@@codefeenix "I wanna know too... for a friend"

    • @EricGranata
      @EricGranata Місяць тому +1

      @@codefeenixnot OP but probably close in age. I was too late for Blue Box but was able to cobble together a beige box (lineman’s handset) and mess around.

    • @notme222
      @notme222 Місяць тому +1

      @@codefeenix It was a long time ago. Like @EricGranata I remember the Beige Box with the extra row of keys.
      Although not as exciting, my most practical use was tapping the hook switch on a school phone to simulate the old rotary clicks. It enabled me to make outgoing calls from a phone they didn't think it was possible to dial from.

    • @J.C...
      @J.C... Місяць тому +3

      @@notme222 I can't believe this is the first comment, other than mine, where someone mentions Phreaking.

  • @99fulgur
    @99fulgur Місяць тому +1753

    This crossover is crazy

    • @JScott-lg4jb
      @JScott-lg4jb Місяць тому +41

      It’s like one of those things that makes sense but you’d never ever think it would happen.

    • @bedro_0
      @bedro_0 Місяць тому +4

      THAT IS WHAT I SAID

    • @Tryh4rd3rr
      @Tryh4rd3rr Місяць тому +5

      I would’ve never expected this.

    • @ssserotonin1373
      @ssserotonin1373 Місяць тому +7

      UA-cam used to glitch and show the wrong channel for the video lmao I thought it was happening again

    • @Lunatic5306
      @Lunatic5306 Місяць тому +9

      IM 12 aNd eVerYtHinG is cRaZy aNd wiLD aNd hAvE nO oTHeR oPinION 🤡

  • @DiegoSusa
    @DiegoSusa Місяць тому +26

    Thank you soon much ! This video explains all the basics of my first jobs going from analog phone lines all the way up to SS7

  • @CoolJosh3k
    @CoolJosh3k Місяць тому +3

    For the few companies that allow an app instead, many still allow an attacker to request an SMS even when your chosen default is an app.

  • @MuharremGorkem
    @MuharremGorkem Місяць тому +141

    A minor correction to what your SS7 introduction animation might suggest. SS7 does NOT include a control line between the subscriber phone device (which still can use DTMF) and the exchange to which it is connected to. SS7 is primarily used between different exchanges for call routing in case caller and callee are connected to different exchanges. In this sense, it is not a subscriber signalling protocol, but a call routing one among exchanges. ISDN, on the otherhand, as a subscriber line signalling protocol suit, uses digitial channels for call signalling between the subscriber device and the exchange to initiate and terminates calls. Note that GSM also uses ISDN for subscriber signalling. This time instead of physical cables to carry digital ISDN call signalling data, GSM radio interface does the job.

    • @ExtantFrodo2
      @ExtantFrodo2 Місяць тому +1

      Are there any ways to defend ourselves?

    • @TechProFury
      @TechProFury Місяць тому +1

      ​@ExtantFrodo2 this is unlikely to ever be used on you.

    • @Gandalfthegoldenbird
      @Gandalfthegoldenbird Місяць тому +8

      @@ExtantFrodo2unless you are a public figure, well known or go around insulting hackers online you should be fine. This is an extreme example of hacking people use on wealthy folk for the most part.

    • @MikkoRantalainen
      @MikkoRantalainen Місяць тому

      @@ExtantFrodo2 Don't trust GSM (or any other public phone standard) to connect phonecalls or text messages correctly and never ever trust the caller id for phonecalls nor text messages.
      How do we communicate over untrusted network called the Internet? With encryption on top of the untrusted data transmission channel. When you use something with end-to-end encryption, you'll be safe. Something like Signal or Whatsapp (assuming you can trust FISA secret court order has not been forced Whatsapp to install backdoor to your phone) would be safe.
      This is why some countries are actively trying to ban encryption from their citizens. That would prevent them from controlling/monitoring your communication channel over phone at will.

    • @harbirsingh7266
      @harbirsingh7266 Місяць тому +5

      @@ExtantFrodo2 best you can do is to not use SMS 2-factor authentication on any of your accounts to minimize the damage. Use an authenticator like the ones from Google or Microsoft.

  • @cameodamaneo
    @cameodamaneo Місяць тому +434

    Linus: "I can't believe that YOU of all people were able to do this!"
    Veritasium: "I know right? It's scary that literally ANYONE is able to do this"
    Also Veritasium: "So anyway, the first thing I did was hire a security expert at the top of his field"

    • @bartlx
      @bartlx Місяць тому +113

      A security expert that has a running subscription costing a few $K's / month to use a rogue SS7 node.

    • @nydydn
      @nydydn Місяць тому +56

      The security expert is literally anyone not too dumb, and who can afford to spend half a year studying this without working a job and 5 to 10k to spend on access and devices.

    • @SeanHoulihane
      @SeanHoulihane Місяць тому +13

      Why do the leg work when you need to spend a few $$ for the intercept anyway. Unless the hack is zero cost, there is no reason not to subcontract running the scripts.

    • @abnorc8798
      @abnorc8798 Місяць тому +43

      It is fortunate that this isn't extremely easy to do, but several thousand dollars per month is not ridiculously expensive. There are very many people who can afford that.

    • @dead-claudia
      @dead-claudia Місяць тому

      @@abnorc8798yep that's well within the range of what criminal hackers can afford.

  • @egg-roll8968
    @egg-roll8968 Місяць тому +1

    At the 20:00 mark they are referring to triangulation (surprised they didn't say that), While yes it's 2D those signals can also relay rough 3D data via tower position, strength, and probability. In Highschool during a law class field trip to a local court house some of us sat in a B&E trial where they used such triangulation data from a phone provider to prove the suspect was not just in the area but also was not using the public transit system at the time, all of which was done in early-mid 2000's when while cellphones had GPS, most did not have them on by default. In todays world this can now happen with Wi-Fi simply turned on pinging local routers (which Google likely has a location base for), in fact this is how Google Maps works for features like Timeline and how Maps Traffic works too, though the latter mostly uses gps and data.
    Movies like WarGames (shown here, the payphone booth scene, great old movie free on Prime Video btw, or was), The Core (made reference to the Blue Box using a cellphone), and Enemy of the State (SIM swapping/cloning etc), weirdly showed things that are/were potentially able to effect us in day to day lives, even though it doesn't seem like it would or feel like they are real, but it could and they are. Also yes I know every spy movie has this too along with others like National Treasure, but those 3 came to mind immediately due to similarities on the subject. So yes take your privacy seriously folks.

  • @prathamjohari8301
    @prathamjohari8301 Місяць тому +2465

    you can tell when this was recorded based on linus' hair colour

    • @oakleyves
      @oakleyves Місяць тому +585

      some say this is the new carbon dating

    • @evildude109
      @evildude109 Місяць тому +273

      It was the day he left for the UA-cam creator summit thing that he discussed last night on the wan show, and he was on the wan show in person last week, so this video was produced in under six days.

    • @TropicSpoon
      @TropicSpoon Місяць тому +92

      ​@@oakleyves linus-hair dating

    • @donc-m4900
      @donc-m4900 Місяць тому +45

      So this is recent or 7 years ago? 😆

    • @WayStedYou
      @WayStedYou Місяць тому +37

      Or the fact Linus tells you during the video

  • @SapphireSpire
    @SapphireSpire Місяць тому +1273

    People are asking why this hasn't been fixed. I imagine it's because government intelligence agencies, and international policing organizations like Interpol, consider it a feature, not a bug.

    • @meneldal
      @meneldal Місяць тому +162

      Governments don’t need this to control people in their own countries, they can just have the telco do their bidding. It's only useful for tracking people where you don't have control on the telcos. Hell back in the day government would put recorders inside the routing centers so they could listen on the line and people would try to hear the click the machine did when it started recording.

    • @Atexih
      @Atexih Місяць тому +75

      Nah. It's more like consumers like roaming that works almost everywhere and that means that you need to be compatible with the lowest common denominator. Your telco in a western country can't force some random other country to update their systems, but they still want to have roaming and calls between eachother.

    • @ms3862
      @ms3862 Місяць тому +79

      @@meneldalyep well said. Your government does not need ss7. Your telco already collects all your calls, location and messages and the government just asks for it and they hand it over. In fact in many countries it's now required by law for your telco to monitor you so in the event the government wants the data it's there and available

    • @tboneforreal
      @tboneforreal Місяць тому +35

      It's money, plain and simple. Like they said in the video, no one wants to be first and spend the money and then all the other companies jump in and get the benefits for either a much lower cost or free. Are government intelligence agencies probably exploiting this? Very likely, but they would exploit any future system that replaces SS7 as well. You have to remember that governments have to approve these technologies before they get implemented and so they have the specs for months or years to analyze for vulnerabilities for their own use.

    • @RyanEglitis
      @RyanEglitis Місяць тому +23

      To be fair, the phone companies have only had 45+ years to fix it, they're not machines

  • @RichHeart89
    @RichHeart89 Місяць тому +196

    "Nothing to hide, nothing to fear" is only valid when you expect the one going through your data and your life to be someone you trust and whose values you share. Which will probably almost never be the case.

    • @bluegamer4210
      @bluegamer4210 Місяць тому +2

      The other side of the argument however is far worse, the absolute privacy has always yielded the worst types of illegal content and actions. The problem is the system that we exists under and values that many people hold as a result of the media that is being feed to them.

    • @Fielith
      @Fielith Місяць тому

      How do you have same pfp as my other acc

    • @RichHeart89
      @RichHeart89 Місяць тому +1

      @@Fielith This pic is one of the default options google let’s you choose from without uploading your own

    • @One.Zero.One101
      @One.Zero.One101 Місяць тому

      "Nothing to hide nothing to fear" is mostly used by naive people living comfortably in first-world countries. In my country you can gain the ire of the police with a simple Facebook post. Yes that's how petty they are and many people have been arrested; from teachers to teenagers criticizing the government.

    • @Muskar2
      @Muskar2 Місяць тому +1

      Why wear clothes at all if we got nothing to hide? Why not have all walls made of glass, stream all your microphones and cameras live 24/7/365 without the ability to turn it off?

  • @CoreenMontagna
    @CoreenMontagna Місяць тому +15

    30:12 sounds like if your abuser has enough money to purchase the services of such hackers, you should be concerned.

    • @johnba291972
      @johnba291972 Місяць тому +1

      You don't think just having an abuser is reason to be concerned?

    • @CoreenMontagna
      @CoreenMontagna Місяць тому

      @@johnba291972 obviously it is, I was assuming someone who has already left their abuser, and is trying to avoid being found

    • @kirby145x
      @kirby145x Місяць тому +1

      There's hundreds of ways you can find someone if you want to. Only way to not be found is to go off grid completely

    • @Winter-n7l
      @Winter-n7l 2 дні тому

      If a abuser has $30 and ur name they can find you with a legal service, so no need for the SS7 thing. Be concerned, and if in the US, exercise ur 2nd amendment rights. One of the only justifications for that right to exist is a case like DV or abuse.

  • @randomtuberhandle
    @randomtuberhandle Місяць тому +745

    Im amazed that this has been publicly known and proven for over 10 years yet has remained relatively unknown by most people until now. Well done Veratasium and Linus Tech Tips. Excuse me now while I smash my cell phone into pieces and then flush it down the toilet.

    • @Blackwing2345635
      @Blackwing2345635 Місяць тому +40

      Some services/apps with 2FA will warn you, that sms/call is not secure and you'd better use a 2FA app or key (secure card, usb key, etc.). In enterprise ditching sms/call 2FA is more common, though.
      What amazes ME, is that we have a lot of good and easy ways to secure stuff, but on the consumer end of business almost none of them are used.

    • @xx133
      @xx133 Місяць тому

      State actors benefit from the status quo, and corps don’t want to spend money to upgrade

    • @123payattention
      @123payattention Місяць тому

      If anything the next phone you get should ONLY be for phone calls and text messages. Use the old or another device for everything else. Any device you use for any serious stuff, banking, buying things, etc etc should be on a secure device where not much else takes place on.
      I've even broken up devices I do Google searches on because they can be legally linked back to you if tied into a Google account that is interconnected with something that has your real name.
      Learn about metadata if you want to know how to take simple steps to protecting yourself

    • @MaxPower-11
      @MaxPower-11 Місяць тому +19

      As shown in the video, there was a 60 Minutes segment about SS7’s vulnerabilities 10 years ago so it’s not _that_ unknown.

    • @123payattention
      @123payattention Місяць тому +4

      @@randomtuberhandle Jesus. My comment talking about limiting what you do on your phone got deleted....

  • @thisismossop
    @thisismossop Місяць тому +13

    I worked in 2nd/3rd line support for a large, well known, MVNO in the UK in the early 2000's. We had access to the parent networks HLR for Mobile Number Porting (Prior to MNP2 in the UK) and could make these changes in IMSI association at will. I even remember my SS7 training. I knew people at the parent networks NOC, and what they earned at the time. I can understand why so many Voicemail PIN's got reset back in the day (See UK Phone Hacking in early 2000's). Interesting point, the company that wrote our HLR interface was based in Israel.

  • @SteakandChains
    @SteakandChains Місяць тому +15

    Great video! This was my whole world when I was in the military and for a contractor when I got out. The reason why it doesn’t always work is because of network registration. Your victim’s phone needs to be far enough away on a neighbor node for the routing to your phone to work. I miss that life.

  • @MarcoLopesPT
    @MarcoLopesPT Місяць тому

    AMAZING video! That's why i just LOVE this channel... I remember the old days of the analogue phone system and the blue box hack! What i didn't knew was that the current phone infrastructure had so many vulnerabilities, rendering 2FA authentication using SMS completely useless (not to mention call diverting or location tracking...)

  • @DataIsBeautifulOfficial
    @DataIsBeautifulOfficial Місяць тому +2134

    Please tell me you changed all his contacts to 'Mom'

    • @_drago
      @_drago Місяць тому +32

      LMFAO

    • @fastlanenigeria
      @fastlanenigeria Місяць тому +59

      This is an insane prank 😂

    • @WumbologyPHD
      @WumbologyPHD Місяць тому +17

      Brb about to go back up my contacts

    • @ILoveTinfoilHats
      @ILoveTinfoilHats Місяць тому +77

      It's not that kind of hacking but still funny

    • @zperk13
      @zperk13 Місяць тому +20

      that's... not how that wo- well i guess if you knew his mom's phone number you cou- idk if it can spoof though....

  • @onn116
    @onn116 Місяць тому +54

    It's really cool how you show clips from Mr.Robot. Shows just how faithful and realistic the series is. You can even find a breakdown of the exact attack the clips are from.

    • @Stiruz
      @Stiruz Місяць тому +6

      Such an incredible show in every sense

    • @PrograError
      @PrograError Місяць тому +5

      Too bad certain parts of the show were actually stolen.
      They stole code someone wrote and re-present it as their own production's, at least from what I heard (it was apparently for a certain conference as a demo, and was presented nearly 1:1)

    • @avarise5607
      @avarise5607 Місяць тому +4

      ​@@PrograErroryea, they stole a puzzle, which contained phone number of creator, and proceeded to leak it to thousands of ppl

    • @MrAwesomeZ
      @MrAwesomeZ Місяць тому +3

      @@avarise5607 it wasn't his personal phone number just a number he setup for that puzzle. and the puzzle was stolen by the social media team for mr robot and had nothing to do with the creation, writing or production of the show

  • @anything.with.motors
    @anything.with.motors Місяць тому +257

    😂😂 i love how his wife was like oh major hacking sceme
    Sorry im busy bye

    • @joelfarm8497
      @joelfarm8497 Місяць тому +9

      The world will be crumbling into utter destruction and the babes will be fixing their faces.

    • @ishanpatel6583
      @ishanpatel6583 Місяць тому +17

      Linus getting hacked is a routine thing for her, so no reaction

    • @karolbielen2090
      @karolbielen2090 Місяць тому

      @@joelfarm8497 "I refuse to die without makeup!" XD

  • @javiervillacis8597
    @javiervillacis8597 Місяць тому +4

    15:56 and then women ask why men don't like to open up...

  • @rdyer8764
    @rdyer8764 Місяць тому +65

    When I was working for AT&T we called the older technique for connecting calls "In-Band" signaling, and when the SS7 network was added that was to do "Out-of-Band" signaling. There was even a commonly available publication that was for sale in most larger magazine stores called "2600" where these folks would share common techniques to hack the phone network.
    Also, If I remember correctly, the rotary dial phones delivered one more pulse than the number dialed. i.e. the number one created 2 pulses, the number two created 3 pulses, etc.

    • @EricGranata
      @EricGranata Місяць тому +11

      2600 is still published. They’ve got a radio show and podcast too. Good times.

    • @rdyer8764
      @rdyer8764 Місяць тому +3

      @@EricGranata Cool! I had no idea. Then again I've been out of telephony since 1998.

    • @gamblit
      @gamblit Місяць тому +13

      It was number = pulses, not 1 extra pulse.
      People would sometimes have little padlocks on the rotary phones, to prevent people using them. I was able to complete calls simply by using the hook switch very fast to introduce the pulses. To dial a 7 you would simply tap the hook switch 7 times really fast.

    • @Steve-Kratz
      @Steve-Kratz Місяць тому +7

      The pulses are the same as the number (0 being 10). You could actually dial a phone by using the hang-up button on a phone to tape the numbers really fast, pause, go to the next number.

    • @profpuffofficial2
      @profpuffofficial2 Місяць тому

      2600 OG memberd have a very active facebook group

  • @brekmister
    @brekmister Місяць тому +87

    In the USA, There is a huge push in the Telecom industry (at least the smaller telcos) to start moving all services from SS7 to SIP based trunks. This includes 911 services.
    The biggest reason for doing so is because SS7 runs over TDM based connections (T1, SONET/SDH) the equipment that drives these are built by companies that were big in the 80's, 90's and early 2000's but no longer exist. There is no support for this equipment anymore and even modern solutions are dwindling too. (This includes Cisco, their solutions are coming to the end of the line)
    For those newer to the workforce, a lot of these telco systems in production managed remotely is older than them by a long shot. Thats myself included.

    • @PrograError
      @PrograError Місяць тому +1

      I imagine there's still fossils that runs on diskettes... just like the military still have stuff that runs on XP... or even 98...

    • @bobbobby1846
      @bobbobby1846 Місяць тому +1

      ​@@PrograErrordos

    • @omarjimenezromero3463
      @omarjimenezromero3463 Місяць тому +2

      like cobol being used by banks, and you can easily put a script there to rob money, the only thing that stop the majority of hackers is basically a surveillance system that looks for cobol logs that are "strange" XD

    • @brekmister
      @brekmister Місяць тому +3

      @@PrograError First version of DOS timeframe for the D4 Channel Banks. Hand soldered chips :)
      There are DACS that require a VT terminal (or a serial terminal from your laptop) some of the later DACS do have Telnet over 10 half duplex on IPv4. There is also a DACS I know that the modem card was basically rusted on so the only way to get into it is via a Dial-up modem.
      One of the systems I manage includes software that was designed for DOS. On floppy's. Last version of Windows that the software works on is Windows XP.

    • @madmax2069
      @madmax2069 Місяць тому

      When I hear the word trunk I think of something like P25 trunking

  • @kron7536
    @kron7536 Місяць тому +475

    Fun fact: the dial up system was created by a dude that was upset because the phone operator that took care of his phone was the wife of a rival bussiness owner and she kept redirecting his calls to her husband's company.
    Dude got so mad he made her job obsolete

    • @marcelogomes4485
      @marcelogomes4485 Місяць тому

      I saw this yesterday on 9GAG

    • @iresineherb7
      @iresineherb7 Місяць тому +9

      what the name of the dude or the story?

    • @MatterLivesWhite
      @MatterLivesWhite Місяць тому +8

      Damn bro I watch YT shorts too!

    • @sterlingodeaghaidh5086
      @sterlingodeaghaidh5086 Місяць тому

      @@iresineherb7 Almon B. Strowger
      There were many patents and inventions for automatic telephone exchanges in the 1880's when this took place.
      Almon was a funeral director in Kansas City, Mossuri when he noticed that his business was taking a dip in customers after his competitor's wife took up a job as a telephone exchange operator. At this time his funeral service was only one of two in the entire city so having your business more than halved is noticeable. She essentially used her position to route calls meant to go to him to her husband's business instead. This caused him to invent one of the first automatic exchanges in the nation, installing it first in La Porte, Indiana. He is widely credited with the two tone system that Veritassium mentions but I am doubtful that its as black and white as its laid out to be.
      Generally inventions like this are rather grey with multiple people creating different versions at the same time and patenting them, the telephone is another example with multiple people patenting their version of the "Voiced Telegraph".

    • @ArawnOfAnnwn
      @ArawnOfAnnwn Місяць тому +28

      Gonna need something easily verifiable before I trust this story.

  • @doggSMK
    @doggSMK 12 днів тому +1

    The towers get your phones IMEI, your SIM card number (the 15 digit one), your device make, model, modem, supported networks, how good is the reception. To top it off, your device is constantly connected to ATLEAST TWO towers (so you can be located quite easily), comunicating thru the one with better reception (coverage). I forgot something, but not sure what.
    PS: Also phones connect to the nearest tower even without SIM card, because you have emergency service. So there you go, phones with non-removable batteries are 100% trackable.

  • @Blue-cq2hl
    @Blue-cq2hl Місяць тому +267

    I really hate the idea that if you have nothing to hide you have nothing to worry about from a privacy standpoint alone, let alone when it comes to bad actors at all.

    • @Unknown_Genius
      @Unknown_Genius Місяць тому +10

      Yup.
      The worst part is that technically mass surveilance would bring a huge boost in general security and could prevent a lot of bad actors from.. well, bad acting - if there wouldn't be the issue that abusing it is easy as well.

    • @DavidKen878
      @DavidKen878 Місяць тому +3

      Oh please, the only reason you're whining about privacy is because you consider it to be a right.

    • @markfish8539
      @markfish8539 Місяць тому +7

      Generally, i believe its ppl who have malicious intentions and ppl who can’t think or are lazy in imagining evil who subscribe to the this idea.

    • @iRelevant.47.system.boycott
      @iRelevant.47.system.boycott Місяць тому +23

      Getting ads about something you have recently talked about was considered a conspiracy theory not to long ago ...

    • @lschmidt2405
      @lschmidt2405 Місяць тому +9

      ​@@DavidKen878Just because many people are nosy & love being entertained by other people's activities doesn't make it a right for them either.

  • @desiv1170
    @desiv1170 Місяць тому +178

    I love Woz, but to be fair, he and Jobs didn't create the blue box. They did build and sell them, but the tech was known already in the phreaking community.

    • @dpc4548
      @dpc4548 Місяць тому +45

      They built their whole company on this philosophy.

    • @something-from-elsewhere
      @something-from-elsewhere Місяць тому +1

      ​@@dpc4548 I mean that's kinda every modern tech corp tbeh -w-'
      Well and the whole _Microsoft EEE intensifies_

    • @jonnyeh
      @jonnyeh Місяць тому +7

      Apple didn't invent the PC, mp3 player, or smartphone either, so what?

    • @petesmitt
      @petesmitt Місяць тому +6

      @@jonnyeh Apple did invent the smartphone as we know it and use today..

    • @jm036
      @jm036 Місяць тому

      ​@@something-from-elsewhere dude I can smell the transgenderism from the way you write. Disgusting!

  • @RaphaelChan888
    @RaphaelChan888 Місяць тому +40

    It would have been a great demonstration and proof of concept for Derek to actually upload this video on LTT's channel while he was in there...

    • @awaitingconfirmation8406
      @awaitingconfirmation8406 Місяць тому +1

      The LTT channel wasn't hacked.
      They are using much greater security methods now which most likely aren't reliant on SMS or anything related to it. They are probably using physical encryption keys and authentication apps.
      But even those are not entirely secure because of browser session attacks like the one that caused their last hack lol

    • @romangiertych5198
      @romangiertych5198 Місяць тому

      He was not in there, he told Linus the code, who typed it in.

  • @Morya58
    @Morya58 9 днів тому

    29:53 This is the best formation of the thought to combat the nothing to hide and nothing to fear nonsense argument about privacy.

  • @portobellomushroom5764
    @portobellomushroom5764 Місяць тому +135

    The hacksmith calling Linus Tech Tips and having Veritasium pick up the phone is the weirdest crossover of the year

  • @meowmerere
    @meowmerere Місяць тому +81

    I think it would be funny if he uploads a random science video on Linus' channel, and nobody will know why unless they watch this video 🤣

  • @matta2738
    @matta2738 Місяць тому +650

    Linus wasn't hacked. He didn't go running through the house in his underwear

  • @OMGK3LOLI
    @OMGK3LOLI 27 днів тому

    Amazing video and really eye opening!
    Having a CS background makes me really feeling bad that my parents were always right and I was underestimating things. Having the concept of “communication codes” that can be used only under cases of uncertainty seems to be the only solution so far.

  • @ZoosheeStudio
    @ZoosheeStudio Місяць тому +546

    The amount of fake numbers that call me everyday, tells me everything I need to know about phone security.

    • @afjer
      @afjer Місяць тому +59

      Also the number of people who call me "back" because a scammer spoofed my number.

    • @J.C...
      @J.C... Місяць тому +12

      @@ZoosheeStudio I hope not because that has zero to do with it 🤣🤣🤣🤣

    • @abc123number1america
      @abc123number1america Місяць тому +15

      @@afjerhad this happen, very uncomfortable feeling first time some called me cussing me out

    • @tomaszzalewski4541
      @tomaszzalewski4541 Місяць тому +9

      the funniest call I got said that I'm apparently an owner of a metric ton of a swiss Gold. All I need to do to get it is pay for shipping....

    • @jimpad5608
      @jimpad5608 Місяць тому

      It has been possible to completely block all spam using SS7 and VoIP for many decades since it is just some additional software. BUT Telco don't want to spend the small amount of money it would cost and the Telco and governments simply do not care how annoying it is to users.

  • @TheDarkbluerock
    @TheDarkbluerock Місяць тому +541

    Ok, Jobs and Woz prank calling the Vatican is actually funny :D

    • @SebastianHackeado
      @SebastianHackeado Місяць тому +14

      Is not a real story, is exaggerated to make them look cool.

    • @xantiom
      @xantiom Місяць тому +40

      ​@@SebastianHackeadothere were lots of cool stories from that era, especially with Capt. Crunch.
      I don't know if Woz calling the Vatican was exaggerated, but it really it isn't implausible. We are talking about a time where phreakers were social engineering military bases pretending to be generals just to troll their secretaries.

    • @SebastianHackeado
      @SebastianHackeado Місяць тому

      @@xantiom Calling the Vatican is certainly true, them waking up people to talk with the pope is a lie, Jobs is telling the truth with his body language. He was always good at inflating and overvaluing stuff. But he is not a good liar.

    • @playerzking
      @playerzking Місяць тому +1

      the story is the physical manifestation of code injection

    • @123payattention
      @123payattention Місяць тому +20

      ​@@xantiomit's not even remotely outlandish. Cyber security was non existent back then

  • @MichielKeij
    @MichielKeij Місяць тому +30

    On the 19:43 mark you leave the totp code with a timestamp on screen. Linus should reset his MFA to prevent someone from brute forcing his totp hash as the number of possibilities have been drastically reduced.

  • @RocketKitten1
    @RocketKitten1 Місяць тому +104

    We used to do this in the 90's in payphone booths. We dialed the "number information" and when they picked up, we whistle, this somehow tricked the system to disconnect and we got a dial tone. After that you could call who ever you wanted for free. EDIT: Sorry, I missed when he explained the whistle part.

    • @Alfred-Neuman
      @Alfred-Neuman Місяць тому +2

      When I was a kid in the mid 90s, I met an other kid that knew a trick to make any payphone to ring. We would dial a special number and the number written on the payphone then after hanging up 2 times the phone would start ringing. We would have fun pranking random people at the shopping mall saying someone wanted to talk to them. Some time later I realized this trick was also working on normal phones and some time later, again, I had the idea to write a visual basic program that would use the dialup modem to do this trick. I could set timers on this program and make the phone ring multiple times in the middle of the night just to annoy my mother when I was angry at her. She never understood that nobody was really calling her... lol

    • @aliosmansahin1729
      @aliosmansahin1729 Місяць тому

      This was in the TV show called "Person of Interest" so, I assume this method was very famous in USA in that era. Am I right?

    • @Alfred-Neuman
      @Alfred-Neuman Місяць тому

      ​@@aliosmansahin1729 It seems like it was well known but on the underground level. I remember reading an article about the 2600 hz Captain Crunch whistle in an old Hacking zine. I can't remember the name of the zine tho. I was getting these zines on some file servers on IRC channels about Warez and Hacking. Even before the internet there was BBS servers with zines like this. This trick with the Captain Crunch whistle was used especially to access BBS servers over long distance without having to pay expensive fees for the phone line. (If you didn't know, these BBS servers were pretty much like the ancestor of the internet, people would have to dial different phone numbers and use a modem to connect to other computers.)

    • @RocketKitten1
      @RocketKitten1 Місяць тому +2

      @@aliosmansahin1729 I wouldn't know, it worked in Sweden at least, but I suppose it was the same in the U.S. I remember when they finally changed the system, the operator just laughed and told us "that trick doesn't work anymore".

  • @DarshanAS
    @DarshanAS Місяць тому +678

    30:07 Saying "I dont care about privacy because I don't have anything to hide", is same as saying "I dont care about free-speech because I have nothing to say” ☠️

    • @jaculaa01
      @jaculaa01 Місяць тому +30

      it is completely different. having nothing to hide is seen as something good, whereas having nothing to say is seen as something bad. even though the statement "I'm not worried because I have nothing to hide" is stupid, so is your analogy imo.

    • @thedeathcake
      @thedeathcake Місяць тому +54

      ​@@jaculaa01everyone has something to hide. It's such an idealised thing to say. Every human wants to have at least some sense of privacy.

    • @iCore7Gaming
      @iCore7Gaming Місяць тому +5

      That analogy is awful. Also there is no such thing as free speech. You cannot say absolutely anything without consequences, the USA even has laws against this.

    • @EdgarRoock
      @EdgarRoock Місяць тому +7

      I believe that's a quote by Edward Snowden. My guess is he wants to say that even if you personally don't need that level of privacy, there are other people out there who do. So this universal right must be protected for them.

    • @jaculaa01
      @jaculaa01 Місяць тому

      @@thedeathcake I know it, but who asked? that wasn't the point of my comment, but sure buddy.

  • @bamflyer
    @bamflyer 5 днів тому

    This is awesome, I love how much we learn before even tackling the topic

  • @hazemsy2797
    @hazemsy2797 Місяць тому +143

    Can we talk about the poor princess Latifa. No matter how rich and powerful someone is, freedom is always more important.

    • @RichardBaran
      @RichardBaran Місяць тому +22

      Right! Was kinda of glossed over for how big of a story that is.

    • @chriscraig6410
      @chriscraig6410 Місяць тому +22

      Didn't seem too glossed over to me, and the abduction itself wasn't the key point of this video

    • @phoenixmistertwo8815
      @phoenixmistertwo8815 Місяць тому +1

      Soon she may be a queen.

    • @Pepesmall
      @Pepesmall Місяць тому

      ​@@phoenixmistertwo8815lmfao

    • @hazemsy2797
      @hazemsy2797 Місяць тому

      @@phoenixmistertwo8815 Not possible. First, Hamdan bin Mohammed bin Rashid Al Maktoum is the crown prince, so he will be the next ruler. Second, it’s a misogynistic society. Third, Islam doesn't see women as capable of ruling a country. (Sahih al-Bukhari 7099)

  • @jimpad5608
    @jimpad5608 Місяць тому +23

    SS7 discussions bring back ancient memories for me. I learned SS7 engineering in the 1970s. At that time the major use was to connect local Telco offices to the AT&T transcontinental network which used SS7 as their control channel. At that time the AT&T master control center in the New York area could easily directly control every local and transcontinental switching system to manage network congestion. That is why SS7 still has such terrible commands that would never be designed in these days. SS7 really needs to be completely redesigned but no one wants the cost or hassle.

    • @SimpMcSimpy
      @SimpMcSimpy Місяць тому +1

      It's no longer used in modern networks, only legacy ones. Within few years most 3G network will be offline anyhow.

    • @jimpad5608
      @jimpad5608 Місяць тому +2

      @@SimpMcSimpy - SS7 is used in both land based switching centers and cellular switching centers. Since the global networks contain systems from the 1970s to the mid 201x, SS7 will be around for a long time . If your 5G phone was only going to connect to other 5G phones, you might be correct, but in the real world old telecom technology stays around for a long time. If the old stuff works, the telecom companies will just keep using it.

    • @James_Knott
      @James_Knott Місяць тому

      @@jimpad5608 It's used only up to 3G cell phones and the phone network, in general, is moving to VoIP, with SIP in place of SS7.

  • @kentslocum
    @kentslocum Місяць тому +333

    We need to force banks to stop using SMS for two-factor authentication.

    • @petesmitt
      @petesmitt Місяць тому

      Good luck with that; banks love it because it's automated technology that costs them nothing..

    • @HarishBabuM
      @HarishBabuM Місяць тому +4

      Is there any alternative?

    • @veselindimov307
      @veselindimov307 Місяць тому

      ​@@HarishBabuMYes - P.O. Box mail. Old-fashioned, but waaaay more trusted

    • @grigorispavloudis383
      @grigorispavloudis383 Місяць тому

      ​@@HarishBabuMAuthenticator apps

    • @jc84com
      @jc84com Місяць тому

      ​@@HarishBabuM bitcoin

  • @mrgcav
    @mrgcav 21 день тому

    Not one of your usual topics but very interesting. I knew all about the Captain Crunch /Woz Phone phreaking story and the Blue box but nobody ever explained how it worked like you did. Very interesting

  • @MysticMusic07
    @MysticMusic07 Місяць тому +48

    Nothing is perfect every things have flaws but these sort of flaws chills me to the bone.

  • @kylemcdonnell86
    @kylemcdonnell86 Місяць тому +360

    The scariest part of this video is the Pope waking up in the middle of the night to take a call from Henry Kissinger... 😬

    • @tittentei7331
      @tittentei7331 Місяць тому +13

      Lol. I wrote the same. But deleted it. Then i saw your comment🤣 So true. Scariest parts.

    • @danielculver2209
      @danielculver2209 Місяць тому +2

      makes just as much sense from an honest perspective too though 🤔

    • @FromNothingComesNothing
      @FromNothingComesNothing Місяць тому +10

      Imagine a random teenager started a war because he pranked a state/religious leader pretending to be a secretary of state

    • @huaweiallc13
      @huaweiallc13 Місяць тому

      good luck trying on HUAWEIs own HUAWEIs HarmonyOS NEXT oprathingsystem

    • @Dong_Harvey
      @Dong_Harvey Місяць тому +3

      ​@@FromNothingComesNothingImagine a Secretary of State starting a war as a prank against his political enemies

  • @DanaWeick
    @DanaWeick Місяць тому

    Many decades ago, before cell phones were a thing, airports often had phone setup so you could call the rental car companies, it was a phone without a dial and you would push a button to dial the number of the selected rental car company.
    The rotary dial phone making and breaking the connection can also be done manually by you tapping the cradle button where the phone is hung up.
    So to call any number from that airport phone, you only had to pick up the phone and manually tap out the numbers you wanted to call.
    Once touch tone was introduced you could do the same more easily with a touch tone generator held up to the mouthpiece.

  • @4trahasis
    @4trahasis Місяць тому +96

    Steve Jobs & Wozniak did NOT create the Blue Box. Craft one? Sure.
    The history, if memory serves correctly, was that John Draper discovered that a whistle from Cap'n Crunch cereal, when blown into a phone receiver, gave one operator privileges, which allowed for routing calls around the world, for example.
    The tone was 2600hz, and was subsequently how '2600: The Hacker Quarterly' got its name.
    Think I recall a tale also of a community of blind people worldwide who discovered this tone independently, and began whistling it themselves.

    • @EricGranata
      @EricGranata Місяць тому +11

      The tone itself was discovered (at least outside the telcos) by Joybubbles who could whistle it.
      Also, for anybody interested, there’s a widely available article by Esquire magazine on John Cap’n Crunch Draper. Dude is a legend.

    • @4trahasis
      @4trahasis Місяць тому +1

      @@EricGranata thank you for the details, Joybubbles is a name I do not recall.

    • @benbohannon
      @benbohannon Місяць тому +7

      I would love a whistle to get admin rights to Azure.

    • @petesmitt
      @petesmitt Місяць тому +4

      @@4trahasis Joe Engressia was his birth name; he was a blind kid.

    • @boltinabottle6307
      @boltinabottle6307 Місяць тому +2

      @@benbohannon It only works if it's perfectly Intune. Now I'll see myself out.

  • @tupcho33
    @tupcho33 Місяць тому +60

    As a person who works in telecom and specifically roaming - i am thankful for you sharing this and in the same time, you sharing this has increased our volume for this specific exploit almost twice

    • @tj86xj
      @tj86xj Місяць тому +1

      Yikes

    • @Dornacgove
      @Dornacgove Місяць тому +1

      As you work in the field, would disabling roaming with my carrier mitigate that specific attack?

    • @tupcho33
      @tupcho33 Місяць тому +2

      @@Dornacgove not quite, the issue comes from the GT that you are being assigned temporary, in my case (roaming) in other cases, there is a different route from network cell to network cell that can be exploited for same country. But even if you do disable roaming, i don't think believe (based on what this disable is ) it will change much as you need to have set rules and assignments to carry a call.

    • @iulian.danila
      @iulian.danila Місяць тому +1

      ​@@tupcho33 with all due respect, the explanation is a nonsense. There are tons of them in this video comments, though. It is advisable to read a bit about how the addressing works in legacy networks, and what a "GT" is. To have a better picture, an analogy could be the GT is like a public ip of a server. Now imagine how easily you can hack the server by knowing its true ip. This video contains tons of oversimpifications and nothing on SIM authentication. To trick a network that its user is roaming you need first to hack the network itself, get data that it is stored in encrypted format, decrypt it, then get data that is stored on the SIM and corelate the two.

    • @tupcho33
      @tupcho33 Місяць тому

      @@iulian.danila I don't want to get in any arguments especially in youtube comments. My recommendation is to read about MTFSM in ORACLE. There is no need to hack the network

  • @theencore398
    @theencore398 Місяць тому +143

    Sometimes i feel so privileged to live in time where such high quality storytelling art is free to access

    • @oldwiseowl4506
      @oldwiseowl4506 Місяць тому +19

      You paid with your personal data that being collect by Google to distribute their ads.

    • @TurboWorld
      @TurboWorld Місяць тому

      @@oldwiseowl4506 well foey with your truths old wise owl, i love you. Story telling art + bad ass comments of truth like this above, priceless.@theencore398

    • @theencore398
      @theencore398 Місяць тому

      @@oldwiseowl4506 my humble privacy minding self is on revanced brother, I ain't even giving them crash and bug report analytics, forget about ads. personalised advertisement have been turned off down to the every last goodgle setting I could get my hands on and then some more. So yeah, goodluck serving me ads and digging my data.

    • @aaaaaa-hh8cq
      @aaaaaa-hh8cq Місяць тому +1

      veritasium is awesome. the best science channel on the whole platform, period.
      the sad thing is, sometimes he makes very informative and interesting videos about different science subjects, but because the video isn't click baity, or because it doesn't immediately please the audience, it gets very low views which generates less revenue. what concerns me is that he'll stop making those videos because of their lower revenue.. derek please don't do that . science is priceless, sometimes we'll have to make sacrifices to enjoy and spread it.

    • @MatvaNabor
      @MatvaNabor Місяць тому

      @@aaaaaa-hh8cq What are you talking about, this video has over 3 million views...

  • @AnkushKun
    @AnkushKun 15 днів тому

    love the old tech aesthetic, pls do more videos related to old tech 🥺

  • @triberium_
    @triberium_ Місяць тому +382

    People who say "nothing to hide, nothing to fear" lack the fundamental knowledge of privacy and why it is a sacred concept

    • @imdeadserious6102
      @imdeadserious6102 Місяць тому +23

      It's been proven, knowledge of surveillance has an effect on your mind. That alone should be a big enough reason to absolutely detest it. People who thinks it makes them safer from the other bad actors? Absolutely not, and this video shows why. Any surveillance is able to be used against you by anyone who wishes badly enough to use it.

    • @Wegetsignal
      @Wegetsignal Місяць тому +1

      Need to have eyes on enemies and terrorists, foreign and domestic both.

    • @Sashazur
      @Sashazur Місяць тому +5

      I don’t even think this issue entirely falls into that category. This vulnerability doesn’t just allow a government to track you and intercept your phone, it also allows criminals to do that. Even the most sanctimonious perfect person who always is entirely innocent and thinks everyone else should be too, still wouldn’t want someone hacking into their bank account.

    • @Tuxfanturnip
      @Tuxfanturnip Місяць тому +6

      @@Wegetsignal whose enemies?

    • @TheOne-xu5oy
      @TheOne-xu5oy Місяць тому +2

      These people usually don’t believe in other peoples privacy either. I’ve had people scream at me because I set up my phone to screen calls.

  • @messyg-tar2251
    @messyg-tar2251 Місяць тому +200

    Pretty funny how the day you released this, australia started running ads that theyre shutting down the 3G network

    • @jsergiuiulian
      @jsergiuiulian Місяць тому +2

      2g will probably stay though

    • @Nickexp
      @Nickexp Місяць тому +8

      This has been in the works for a while, the ads have been running for months (maybe longer)

    • @kieransmith4477
      @kieransmith4477 Місяць тому +6

      One of the carriers in New Zealand is also shutting down the 3g network in 2025 it is somewhat annoying as a lot of phones are not enabled for 4g calling.

    • @flagmichael
      @flagmichael Місяць тому +3

      @@jsergiuiulian 2G is almost entirely gone already. T-Mobile is the last major carrier in the US to support it at all, and this month marked the end of them keeping it going. Some service may remain but it is being left to die on the vine.

    • @Dwigt_Rortugal
      @Dwigt_Rortugal Місяць тому

      It's mostly defunct here in The States, as far as I'm aware. My 2016 Subaru keeps trying to phone home via 3G and drains its battery if left at the airport without disconnecting said battery.