logoalt Hacker News

aussieguy1234last Thursday at 3:56 AM1 replyview on HN

Phone verification is a common method used here.

If somehow, the victims phone provider can be compromised or coerced into cooperating, the government actor can intercept the text message Signal and others use for verification and set up the victims account on a new device.

It's very easily done if the victim is located in an authoritarian county like Russia or Iran, they can simply force the local phone provider to co-operate.


Replies

inor0gulast Thursday at 9:36 AM

[dead]