Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Interesting to note that Phreaking is still very much alive and kicking.

Most of the hackers I know gave up on Phreaking once hacking became popular in their circles. To me, there will always be something more fascinating about the telephone infrastructure.



I think of phreaking as a byproduct of an era where signal controls were integrated in bearer traffic.

It feels magical to know that the same transport that delivers the sound of your voice was susceptible to tampering and rerouting by other sounds.

This is something other than phreaking, imo. It's straight forward service fraud and hacking. Bearer and Signal have been divorced. The attacker has to get privileged access to a network that is generally not accessible to the public. Phreaking was neat because literally anyone could do it if they knew about the methods.

Knowing the methods used here isn't enough. You need to get on the trusted SS7 network and have a roaming/interconnect agreement to start doing really interesting things.


This was a fun read for me for much of the same reason. Alliance teleconferencing 0-700-456-1000 may not be there anymore, but there are still some old numbers that work. Here's a loop: 513-241-1018 - you gotta find the other end :)


>Interesting to note that Phreaking is still very much alive and kicking.

Any sites you'd suggest?



>That should give you a good head start. . .

I read all this as a kid... :)


Phil Lapsley's book "Exploding The Phone" [0] gives a well written overview for anyone interested.

[0] http://explodingthephone.com/ (AudioBook also available)


Does it count as phreaking if you own the infrastructure?


Does it count as hacking if you own the network? I think it still does, the outcome is different but the methods are similar.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: