Remix.run Logo
DangerousPie 3 hours ago

They also demonstrated how this could be used to silently find out someone’s phone number and then hijack a TFA validation call from an app like WhatsApp to take over their account with no user interaction.

Fnoord 2 hours ago | parent [-]

This attack was not silent, it was noisy. They specifically pointed that out in their talk.