In this episode of the Security, Cryptography, Whatever podcast, the authors of a recent paper discuss the privacy and security issues they found with the protocol used to verify caller ID information on the public switched telephone network in an attempt to prevent fraudulent telephone calls.
securitycryptographywhatever.c…
#teleph ony #cryptographicProtocol
securitycryptographywhatever.c…
#teleph ony #cryptographicProtocol
STIR/SHAKEN with Paul Grubbs and Josh Brown
Josh Brown and Paul Grubbs join us to describe how those damned spam calls work, and how STIR/SHAKEN is supposed to try to stop them, but have other privacy ...securitycryptographywhatever.com