| ▲ | DangerousPie 3 hours ago | |
They also demonstrated how this could be used to silently find out someone’s phone number and then hijack a TFA validation call from an app like WhatsApp to take over their account with no user interaction. | ||
| ▲ | Fnoord 2 hours ago | parent [-] | |
This attack was not silent, it was noisy. They specifically pointed that out in their talk. | ||