Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
scient
on June 12, 2017
|
parent
|
context
|
favorite
| on:
Hackers Are Hijacking Phone Numbers and Breaking i...
They also (most likely) include many other, even network packet level checks in addition to primary and secondary authentication. Its not as simple as it looks to the honest end user.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: