Become a better thinker. Start your free 30-day trial with Brilliant and get 20% off an annual premium subscription https://brilliant.org/veritasium
@MIXMASTERRONEDEE Says:
ANDROID CRAP 💩
@JustinHoMi Says:
This was the most vague video ever. They literally said nothing.
@casanova419 Says:
And this is with 5G that got more tower up than 4G. Wait until 6G or 7G comes around. Remember their is no suck thing as privacy when it comes to cell phones or Computers. The more you connect your devices to the internet the more they will know about you.
@pickachu3739 Says:
I finally understand that one episode of Detective Conan :o
@mydogsbutler Says:
What's most troubling isn't that this can be accomplished by virtually anyone. Imagine what national spy agencies like the NSA are doing especially to nations outside of their own where there are no restrictions on the level of spying.
@mshthn Says:
As always, awesome video. What I don't quite like is that it kind of suggests that Jobs and Wozniak created the blue box.
They got interested in it after the 1971 October issue of the Esquire magazine featured it and the phone phreak culture. That's when Woz told Jobs he knew a guy who knew more about it and soon they sat down for a talk somewhere. That guy later became known widely as Captain Crunch.
At least that's how I know the story, I hope I'm not completely wrong.
@georgedominey6077 Says:
Do you think you could hack Justin Trudeau‘s phone and get some dirt on that pos. Or he’s already been blackmailed for what they did find on his phone
@PhilipIngram Says:
You should do one on TDOS. Much less costly to cripple nearly any business (that relies on phone business) by simply having MORE lines to flood theirs. The SS7 methods requires the first two steps you mentioned which for most implies a cost and knowledge to contract on the fringe and not get caught once the gig is up.
Curious how many folks have FB pixel tracking them right now? Most are unaware how it can be used to track everyone who logs into FB and then keeps that identifying cookie everywhere else they visit, telling the FB pixel script everywhere you browse. They do this by offering the pixel analytics service for free to any business.
Do you browse while logged into any service? If so, that service could do that same, in offering some free business service that requires installing a script on their website, if you land on these sites while logged into that service, that service knows what cookies to look for and now knows where you've been and presumably what you've done there. Food for thought.
@Dcode-It Says:
1000 missed calls from hacker :D
@vornamenachname3373 Says:
@3:20 + Anyone else noticed that the receiver contact on the rotary phone produced the same pulse, and that you could actually dial by hitting it the x number of times at the right speed 😄 (too bad little kids don't stay home alone anymore. ..😉)
@ColinLeman Says:
This was only posted a month ago... idk what it means really.. but im from Australia 🇦🇺 this month they stopped 3g services with optus, top 3 biggest provider atleast idk about other companies
@walterwadlow9438 Says:
Thanks! Great video! ❤❤❤
@Mehak-f9s Says:
its looks like Pegsis attack happened in Indian politicians
@wakeUPdummies Says:
Weit und breit in der Nähe von Berlin. There are too many hackers there.
@tylerdts6376 Says:
why are you holding a Sd card but not the Sims
@SHADoff6939 Says:
25:02 Ukraine government building lmao. Interested how author found it n decided to put in the video
@socratesoliveira1176 Says:
Basically, if you are doing anything that might be sensitive to a government, use a burn phone number. Even Saul from breaking bad knew that, but world leaders dont.
@rul1175 Says:
Linus' wife: "I dont care what you have to say..... I'm going back to cindy."
@DJ_Betoz Says:
Steve Jobs was the OG prank caller
@MrLince-hr4of Says:
watzap is not save at all ! you sux !👎30min. of adverdisments 👎 shame on you corrupt bought puppet👎
@TheSxW Says:
why they even had phones on that boat to begin with...
@vallurirajesh Says:
If the origin of call or SMS is local, the “hack” they showed doesn’t work. Even otherwise if users call an international number which obviously includes the full country code, the hack doesn’t work either.
A little sensationalist story.
@alexduffy8723 Says:
Linus: "I would like to discuss the payment." "Check it out they were able to control my phone."
Yvonne: "Oh oh I'm with Cindy, You're not on speaker. Oh ok bye."
🧐
@jeffdingle9677 Says:
"Nothing to hide, nothing to Fear" but your government doesn't need to know that you have nothing to hide.
@Threeheadedbeastmode Says:
I used to call a person collect on a payphone and I in order for them to accept it , They had to press a button. All I did was grab the neighboring payphone, flip it upside down put the speaker side phone on the voice side of the phone. I was using and push that corresponding number on the keypad . The phone that I was using the keypad was disabled but not the neighboring phone and it forced them to accept it. That was about 40 years ago.
@boringjuice Says:
A lot of credit is given to Jobs and Wozniak for the blue box and using tones, but it wasn't them who figured out the opportunity, they only participated in the already understood phenomenon
@GREGGRCO Says:
3:46 hahahahahahahaha..... yeah kids today never heard of AM radio either.
@LokiDWolf Says:
The nothing to hide, nothing to fear response to things like this is a person that is not being realistic. But instead, thinking in the bubble for which they live in. For example, ask that person if cameras can be setup in their bedroom. But, they can't see the footage. They would say no. It's the same thing with things like this. It's not that one has to be doing something wrong. It's a person has a right to their privacy. It's not just crimes that should be looked at.
@GudangDistribusi-m1l Says:
thank you brother
@ncedwards1234 Says:
KILLER BEAN SCHIZO POST
More than a meme
@alvinrock7190 Says:
In Pakistan, We use 4G cellular networks so I think ss7 will no longer work. it's very old
@SM-sk1sm Says:
First,thing they did was the apple out of their garage .Then when I pointed out that was a pc...Now its a made up blue box that surfaces years after his death. That , just prevents the company from knowing if it was long distance. It doesnt tell you any number. Give me a break. Lisa ,came out in 1983 ,,,Jobs had a fishing rip to see the Amiga in 1982, So he copied the Amiga, The mac came out in 1986. I talked to Steve on a lot of this. This , is click bait for the lie about apple /mac which is a pc with closed source linux now.
@Dazza_Doo Says:
Is this why I get spam texts with no way to block them?
Or when you get mass texts from Politicans?
I even received text spam while I was in China on no roaming package.
I suspect Governments are tracking their Subjects this way.
@thneed1 Says:
Pegasus (NSO group) was how the Saudis killed the Wall Street reporter, so......yeah be afraid, anyone who critiques abuses of power by state actors or autocrats is in danger.
@محمدعادل-ف1ج8ز Says:
well that aint a sim card in your hands 🌚 12:31
@tady_en Says:
wild that using a phone while driving was normal and ok back then
@ameyapai72 Says:
@veritasium how do we save ourselves from this hacking so that they don't read our SMS?
@Biggerbadwolf Says:
When you invent a better mousetrap, you breed a cleverer mouse!
@ohmy_912 Says:
Oh dang, i used a sim card that comes as a bundling when i first bought it. Crazy thing is that, someone else has use the numbers before. I can even login to their IG acc using the numbers.
@siRrk1337 Says:
superb video, mediocre segway haha :D im happy for everyone you get to do what you do
@Yagizdoyran Says:
Turkish streamers jahrein and killayda were attacked by people exploiting SS7. They were live on kick and these people called 112(911 of Turkiye) on their own phone and they even call them from 112 and tell them to stop pranking 112. There was a major data leak last year in Turkiye. Now people can just buy all your data (id number phone number medical records) and blackmail you. If you are a popular person, there’s a chance that these scammers will make you join political parties, change your medical records and say this person had brain tumour in 2010, call emergency services and say help my dad is making b0mb in the basement etc.
@lun4rkid Says:
Time for something new
@Adivasivlokgar Says:
As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against these criminals and terrorists on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators. Keep up the good work Dale valskov
@bvikaskumar9111 Says:
Big thanks Dale valskov for helping me out. God bless you brotha… I’ve tried following these steps from the device and location where the account was always logged into and I got a page that says we don't recognize your device. The tutorial video was very helpful tho but Big Ups
@Dishagajare1829 Says:
NO WAY THIS WORKED!!!!!!!!! THANK YOU Dale valskov I WAS ABOUT TO CRY, I SEARCHED TH ENTIRE INTERNET FOR SOLUTIONS BUT YOUR VIDEO WAS THE ONLY ONE THAT HELPED ME, THANK YOUUUUUUUUUUUUUUUUUUUUUUUUU
@MuneshMunesh-z5c Says:
ThankQ so much, you're great. I tried every Dale valskov said and it's working perfectly, flawless and i really like the way you present yourself with much confidence... Once again thank you soooo much. With lots of love and care, from Massachusetts, North-East, Boston
@gamingdragon10m Says:
That feeling when your partner cheated and you don't have the courage to leave him or her so you just dealt with the pain and live everyday asking questions about your worth. This pain is different from the cheating one-- living and seeing him everyday anticipating when will he or she do it again. Your videos are incredibly well done. No critique, thanks for doing this Dale valskov
@abhay.shukla7533 Says:
While the video's demonstration is eye-catching, the ease with which the system is exploited suggests manipulation or pre-prompting of the Dale valskov . Techniques like custom instructions, hardcoded responses, limited scope, and clever editing could create an illusion of vulnerability, but may not reflect real-world LLM security. It's crucial to approach such claims critically and consider the broader context before drawing any conclusions.
@banshaiborlangkshiar4787 Says:
Awesome work, Dale valskov ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!
LATEST COMMENTS