Comment by lxgr

Comment by lxgr 3 days ago

0 replies

> if the pager network was compromised, thus burns the compromised network

I wouldn't necessarily call this type of attack a network compromise. All it takes is knowing the target phone numbers and sending a specific message, which is a paging network working exactly as designed. Phone detonated bombs have been a thing for a long time too.

Calling it a hardware supply chain attack seems more accurate.