evilcultist@sh.itjust.works to Privacy@lemmy.mlEnglish · 6 days agoSalt Typhoon also compromised the private portals, or backdoors, that telephone companies provide to law enforcement to request court-ordered monitoring of phone numbers pursuant to investigations.theconversation.comexternal-linkmessage-square15fedilinkarrow-up194arrow-down13
arrow-up191arrow-down1external-linkSalt Typhoon also compromised the private portals, or backdoors, that telephone companies provide to law enforcement to request court-ordered monitoring of phone numbers pursuant to investigations.theconversation.comevilcultist@sh.itjust.works to Privacy@lemmy.mlEnglish · 6 days agomessage-square15fedilink
minus-squaregranolabar@kbin.melroy.orglinkfedilinkarrow-up2·5 days agohttps://theconversation.com/what-is-salt-typhoon-a-security-expert-explains-the-chinese-hackers-and-their-attack-on-us-telecommunications-networks-244473 which part
https://theconversation.com/what-is-salt-typhoon-a-security-expert-explains-the-chinese-hackers-and-their-attack-on-us-telecommunications-networks-244473
which part