Hezbollah pager explosions kill several people in Lebanon
(reuters.com)1065 points by logicchains 3 days ago
1065 points by logicchains 3 days ago
I never said they were two-way. I said you have the metadata of the sender and the receiver.
The page data contains the receiver/pager address, but remember this is RF. Triangulating source of transmission on a frequency you are actively monitoring is table stakes for nation states.
Once you flag receiver addresses there are techniques to work out who that party is, especially for a nation state sophisticated enough to intercept the supply chain in the first place. Correlating transaction data to people is tedious but doable. Even with receiver addresses only though you can work out how the network works and what cells there are and that's a ton of useful intelligence already.
Also if the "code" being used was in any way breached it could be used to trick receivers into self-identifying.
Israel just skipped all of that effort with "ring ring, boom" though.
I'm getting tired of everybody saying "supply chain, supply chain":
first, you have no information.
second, it's so non-specific, it's less informative than "they inserted exploding batteries into the supply chain" vs "a container that was unloaded was not actually from the source" which I would say isn't even supply chain, like if I leave a box of dog poop at your door, I haven't tampered with your "supply chain"
maybe this hack started with hearing that they were going to upgrade devices. maybe it this hack started with convincing them to upgrade. maybe Turkey did it. maybe ISIS did it, they hate hezbollah.
it doesn't make you sound more informed to say "supply chain", it makes you sound less.
>second, it's so non-specific, it's less informative than "they inserted exploding batteries into the supply chain" vs "a container that was unloaded was not actually from the source" which I would say isn't even supply chain, like if I leave a box of dog poop at your door, I haven't tampered with your "supply chain"
Almost all of the global commerce happens by contained carried by ship or plane. That someone can take a container full of electronics, tamper with them, and sell them without even the manufacturer noticing has very serious implications. Your phone and your laptop were also inside of a container, and were also handled by dozens of middleman companies. have you ever opened them and check every component? Can you assert you are not carrying a timed bomb in your pocket?
[flagged]