Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'll investigate this, but I'm kind of surprised this use case would be even allowed? How does this wind up being different than a SIM cloning attack?


I don’t understand your question. One is an authorized user and one isn’t? That is the opposite of an attack.


Okay, let me explain it a different way. Much like TCR is in principle supposed to be about blocking phone spam, wouldn't it just be a matter of time before cell providers start cracking down on cloned SIMs with the intention of preventing criminal activity? Whether you cloned the SIM for legitimate use or not.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: