I think of phreaking as a byproduct of an era where signal controls were integrated in bearer traffic.
It feels magical to know that the same transport that delivers the sound of your voice was susceptible to tampering and rerouting by other sounds.
This is something other than phreaking, imo. It's straight forward service fraud and hacking. Bearer and Signal have been divorced. The attacker has to get privileged access to a network that is generally not accessible to the public. Phreaking was neat because literally anyone could do it if they knew about the methods.
Knowing the methods used here isn't enough. You need to get on the trusted SS7 network and have a roaming/interconnect agreement to start doing really interesting things.
It feels magical to know that the same transport that delivers the sound of your voice was susceptible to tampering and rerouting by other sounds.
This is something other than phreaking, imo. It's straight forward service fraud and hacking. Bearer and Signal have been divorced. The attacker has to get privileged access to a network that is generally not accessible to the public. Phreaking was neat because literally anyone could do it if they knew about the methods.
Knowing the methods used here isn't enough. You need to get on the trusted SS7 network and have a roaming/interconnect agreement to start doing really interesting things.