What are the chances this will lead to online data privacy reform and corporate accountability for PII for all? or just…some?

  • General_Effort@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    ·
    5 hours ago

    It’s kinda funny how times change.

    In Germany, it even used to be that your phone number, along with your name and address, was published in the phone book, by law. If you wanted to be delisted, you had to provide a valid reason, such as being stalked. Just because was not good enough. At every street corner was a phone booth with the phone book of your town with your name and address. At post offices, you could find phone books from other towns. (The phone system was run by the postal service, which was a government agency.)

    Phone books were a bit of a plot point in Terminator. The terminator gets the list of Connors from the phone book and kills them in that order.

  • AwesomeLowlander@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    6
    ·
    9 hours ago

    Federal political sources downplayed the seriousness of the issue, believing the issue was not related to a data leak or breach.

    Sources noted the private contact information for politicians was often already widely available and known by stakeholders and members of the public they had interacted with. Some pointed out that politicians often kept the same contact details for years, from when they were more junior politicians who freely distributed their numbers on public documents like press releases or community announcements.

  • LOGIC💣@lemmy.world
    link
    fedilink
    English
    arrow-up
    33
    arrow-down
    7
    ·
    13 hours ago

    It’s really the phone companies’ fault for stagnating instead of innovating.

    There is no reason at this point for most people to have phone numbers at all. We have the technology today to throw the whole concept out the window.

    Replace it with something where a stranger couldn’t guess how to contact a random person. Replace it with something where third parties can’t easily share your contact info.

    You could even have both technologies at the same time to help transition. And we do, as users, but we still need phone numbers because our carriers don’t give us multiple options directly.

    Phone numbers are based on requirements for a system that’s almost 150 years old now. Back when the numbers really meant locations and before people realized how easy it could be exploited to steal old people’s retirement money.

    • nyan@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      10
      ·
      7 hours ago

      Phone numbers are the equivalent of IP addresses. It’s just that the accompanying DNS solutions are pretty badly broken and the firewall options are all iffy.

      • LOGIC💣@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        7
        ·
        6 hours ago

        I intentionally was vague because there are many possible existing ways to accomplish each thing I said, and it is up to the phone company to innovate.

        The simplest way to keep people from guessing phone numbers is to make them very long and sparse. If an autodialer had to dial 1000 invalid numbers before finding a valid number, it would make the endeavor that much harder. This is just a convenient example because the cryptography equivalent is harder to explain, but you could make contact info so hard to guess that it would be basically impossible.

        Probably the easiest way to explain how to keep people from passing contact info is to imagine a two step process like facebook has. If I pass your facebook username to someone else, they don’t automatically become your friend. The cryptographic equivalent would involve a chain of trust, but again, harder to explain.

          • Natanael@infosec.pub
            link
            fedilink
            English
            arrow-up
            1
            ·
            3 minutes ago

            Literally just use existing standards (STIR/STUN) with some filtering by source network, etc

        • AwesomeLowlander@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 hours ago

          Still not seeing how it would work. You’re dropping random bits of the system and saying it would work but it’s too complicated for you to explain, so there’s really nothing to discuss.

    • gian @lemmy.grys.it
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      12 hours ago

      As today if I give you a phone number you have no idea who is the owner if you don’t look up on some service.
      It will not change if instead of the phone number we use the IMEI or a UUID, somewhere you need to have a link between the owner and the something, if nothing else in your phone and at the phone company.

    • Echo Dot@feddit.uk
      link
      fedilink
      English
      arrow-up
      17
      ·
      13 hours ago

      You still have to have some kind of unique identifier. What do you propose phone numbers are replaced with because I can’t think of anything that isn’t basically just the same but with a different flavour or actually is actively worse.

      • GasMaskedLunatic@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        3
        ·
        edit-2
        12 hours ago

        Your device and account credentials are unique enough to identify you on the carrier-level, SIM/eSIM as well. Ultimately, every time you share your contact info, it should be a unique code (QR would be convenient enough) generated by your cell provider. If it’s ever leaked, you just notify your carrier to burn it, and give the contact a new unique code. No two people should be given the same contact, and all of the contacts are simply correlated to your device by the carrier. Additionally, when sharing contacts via QR, they could be modified on the device-level to include e2e encryption keys, thus further securing the transmitted information, not at the trust-me-bro carrier level, but at the user-verifiable device level. If the carrier gets hacked, reset the identifiers, associate the new one in your text app to keep conversations going, and move on like nothing happened. You’ll still be better off than if your phone number was leaked. It’s not perfect, but it’d be a hell of a lot more secure than what we have now.

        In other words: What if a billion dollar company made Signal, but with cell towers, and not as good?

        • CameronDev@programming.dev
          link
          fedilink
          English
          arrow-up
          15
          ·
          11 hours ago

          QR would be convenient enough

          My friend, that is not convenient. Phone numbers need to be memorable, and need to be transmittable offline without relying on technology. Old people use phones…

          • GasMaskedLunatic@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            3
            ·
            11 hours ago

            Phone numbers need to be memorable. A disposable unique contact does not. You can print a QR code, easily save it to a device, transmit it via nearly anything with a connectible screen. Of course you would want to launch it with alongside phone numbers, not in place of it, but this is what should be the next ‘innovation’ in cellular communication.
            That said, it does pose the problem of contacting someone with a phone that isn’t your own, perhaps from jail. I’m sure they would never suggest putting an emergency contact chip in your hand for your own health and safety. No government would ever suggest something so silly. /s

            • Echo Dot@feddit.uk
              link
              fedilink
              English
              arrow-up
              4
              ·
              6 hours ago

              If I want to contact a business though I know I need to dial 555-123-4568, and I know that because there was a little jingle at the end of the advert. But if they just flash up a QR code then do I just have to wait until the ad is on TV again? There’s a reason they don’t really put QR codes on TV but they do on YouTube where you can pause it, and queue up the video whenever you wanted.

              It’s not an awful idea but it needs a bit of refinement. That needs to be some kind of way to associate a human readable identifier to the contact.

              We use QR codes all of the time for websites but eventually that still boils down to a URL in plain text.

              • GasMaskedLunatic@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                25 minutes ago

                The solution is simple then. Allow businesses to maintain a phone number for people who watch ads on TV. Not like businesses getting spam calls is that big an issue. Though I’m certain they’d be very enthusiastic to have the unique contact QR feature available for tracking in web ads.

              • LOGIC💣@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                5 hours ago

                Businesses are a separate use case. Phone companies already handle separate use cases, where they use very short memorable numbers for specific purposes. They just need something similar, whether it’s keeping phone numbers, or using something slightly different. Probably some sort of simple alias.

                It’s the phone companies that need to innovate, and the solution isn’t very hard.

                • Echo Dot@feddit.uk
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  edit-2
                  3 hours ago

                  You say the solution isn’t very hard but what you are suggesting is basically just obfuscating phone numbers. Surely the actual solution is to just make spam calling illegal.

                  Oh and just cut Indias data connection, because those guys are never going to fix their scam call centre problem because the government and police are corrupt.

        • vacuumflower@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          2
          ·
          10 hours ago

          In Tox you have a code on the end of the Tox address. One can do similar, but have different codes for different levels of acceptance. Default - ignore. Some other code - add to the list of callers without notification. Some other - with notification. Some other - for SMS, but not calls, or the other way around. And so on.

          The problem with things being memorable exists, yes. Computers can make calls, meaning that there’s no solution. A good secret required to call someone can’t be memorable.

          • vacuumflower@lemmy.sdf.org
            link
            fedilink
            English
            arrow-up
            4
            ·
            edit-2
            10 hours ago

            For those who ran their own mail servers it already did, via the +something notation.

            Unfortunately the industry and the Internet in general went the other way.

            EDIT: Oh, you mean temporary address. Easy. You have tracker nodes and receipt nodes. You publish on all tracker nodes you know your receipt node (by temporary address) every time you generate a temporary address. So those mailing you find it on trackers and post there. On that receipt node your temporary address is associated with some secret, allowing you to retrieve your incoming mail. The easiest way is that the temporary address is a pubkey and to confirm ownership you just need to sign a request for mail, or maybe it’ll be encrypted with it and no good for anyone else. Or both.

      • chonglibloodsport@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        10 hours ago

        Sure you can have a unique identifier. That’s not the issue. The issue is that anyone can contact you via your phone number! This is not a problem with chat apps where people need permission to add you to their contact list. Why not have a system like that?

        Same goes for credit cards. They should need to ask for permission to charge your credit card. Merely knowing your credit card info should not be enough.

        • Echo Dot@feddit.uk
          link
          fedilink
          English
          arrow-up
          3
          ·
          6 hours ago

          But then you just get spammed with requests for connection. Just like spam email, the call coming through wouldn’t be the point anymore it would be the connection request.

  • BigMacHole@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    39
    ·
    16 hours ago

    This is HORRIBLE! That RICH people’s Information was Leaked! This needs to be PUNISHED BY DEATH so they Learn to ONLY leak POOR People’s information!

      • JoshCodes@programming.dev
        link
        fedilink
        English
        arrow-up
        4
        ·
        10 hours ago

        Yeah so targeting individuals or specific organisations is pretty hard. It sounds dumb but how do you get someone’s phone number if they don’t give it to you? Its hard unless you’re determined tbh which most people aren’t.

        Most hackers setup watering hole style attacks, or use phishing which is roughly the same concept. Basically they cast a wide net and see what they can grab, like the browser credentials of Debra from accounting who knows everything about compound interest and nothing about opening an .exe file in an email. There are some big game hunting groups, and the LinkedIn breach made some waves (see the fappening), but your run of the mill discord-as-a-c2 style hacker isn’t going after rich people.

        Someone “hacking a phone” likely put a kitchen scale iPhone app on the app store, which when first opened asks for permissions for microphone, camera, text messages, contacts and file storage, and sends all that information to Argentina for a week or so until their app gets banned.

        Also, the most likely person to hack your phone seems to be someone in your household, abusive parent or spouse sorta thing. Most common devices to get hacked are laptops, usually windows. Its just kinda hard to hack a phone. Unless you know a lot about compressed image formats and the iPhone messages app apparently because NSO made like 5 zero days in a row out of that.

  • dumbass@aussie.zone
    link
    fedilink
    English
    arrow-up
    24
    ·
    15 hours ago

    Albo: I keep getting texts from random numbers, all saying the same thing… It just says, Cunt.

    • Agent641@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      9
      ·
      15 hours ago

      Must be a nice change to get “Cunt” messages from random numbers instead of getting “Cunt” messages from his colleagues.