Exposing the Flaw in Our Phone System: A Wake-up Call

Thanks to platforms like Veritasium, we are now more aware of the significant vulnerabilities in our phone systems. As with many legacy infrastructures, fixing the issue requires not just technical upgrades but also regulatory action and financial commitment from the stakeholders responsible.

Our global phone system, something we take for granted in the 21st century, seems like a perfectly secure method of communication. However, hidden behind this facade lies a set of flaws that many aren’t aware of. These vulnerabilities expose billions of people to threats that range from identity theft to financial fraud. This is a subject that's often under-discussed, but a recent Veritasium video provides a compelling and eye-opening explanation of the problem.

The Structure: What’s Really Happening Behind the Scenes?

Our phone system operates through an interconnected network known as the Public Switched Telephone Network (PSTN). In the era when phones were primarily used for simple voice communication, this network served its purpose well. However, as we transitioned into the digital age, this system did not evolve at the pace required to maintain high standards of security.

Every time you make a call, send a text, or engage in a financial transaction using a mobile network, that communication passes through a complicated maze of cellular towers, signal exchanges, and third-party operators. Unfortunately, much of this infrastructure relies on a protocol developed in the 1970s called Signaling System No. 7 (SS7).

SS7, while revolutionary at its time, was never designed to handle today’s sophisticated cyber threats. The core issue is that SS7 operates with implicit trust between networks. In other words, once a device is authenticated on the network, it's treated as legitimate by all parties—whether it is or not. This lack of robust authentication opens the door to a variety of security vulnerabilities.

What Is SS7 and Why Does It Matter?

SS7 is the protocol that enables different telecom networks to communicate with each other. It facilitates call routing, text messaging, and many of the back-end processes that make modern communication possible. SS7, however, was not designed with security as its top priority.

The main flaw lies in how trust is handled between telecom operators globally. Once an entity gains access to the SS7 network (which isn’t as difficult as you might think), they can exploit that trust to intercept calls, read SMS messages, and even reroute two-factor authentication codes. Hackers have been known to use this loophole to gain access to people’s banking accounts or even hijack mobile numbers.

In 2017, a vulnerability in the SS7 protocol was exploited to steal money from bank accounts by intercepting two-factor authentication codes sent via SMS. And this is just one of many examples of how this aging protocol continues to be exploited today.

The Veritasium Revelation

The Veritasium video digs deep into how this flaw exposes us to constant threats, showcasing how attackers can exploit SS7 vulnerabilities to breach personal privacy. The video makes a compelling case that many of the major telecom companies and governments are aware of these vulnerabilities but have been slow to act.

One of the most startling revelations in the video is that these attacks can happen remotely. Attackers don’t need to be anywhere near your phone to hack into it. They can be thousands of miles away and still intercept your communications as long as they have access to SS7. Even worse, there is little that individuals can do to protect themselves because this vulnerability exists at the infrastructure level.

Why Haven’t We Fixed It Yet?

If SS7 has such glaring flaws, why hasn’t it been fixed? There are a few reasons for this:

  1. Legacy Systems: The phone system is deeply integrated into every part of our global infrastructure. Replacing it would require a complete overhaul that would be both time-consuming and incredibly expensive.
  2. Cost: Telecom companies aren’t incentivized to address the issue. They would have to invest heavily in replacing the SS7 protocol with a more secure alternative, and until the damage is severe enough or regulation forces action, there’s little motivation for them to make these changes.
  3. Awareness: While the security community has raised alarms, the general public is mostly unaware of these vulnerabilities. That lack of widespread concern has resulted in minimal pressure on telecom operators to prioritize fixing the issue.

How Does This Affect You?

While most of us aren’t likely to be directly targeted by these kinds of attacks, the reality is that anyone using a mobile phone is potentially vulnerable. High-profile targets, such as CEOs, politicians, and journalists, are often the prime focus of SS7 attacks, but the problem extends to anyone who uses two-factor authentication for online accounts, especially through SMS.

The SS7 vulnerability means that attackers could hijack your phone number, intercept your communications, and gain access to your email, bank accounts, or social media profiles. Worse yet, the victim may not even realize it until significant damage is done.

The Future: What Needs to Be Done?

The SS7 issue is not unsolvable, but it will require global cooperation and serious investment from telecom companies. One potential solution is the adoption of more secure alternatives like Diameter, which is designed to replace SS7 and secure inter-network communications. However, it’s not widely implemented yet and requires extensive infrastructure changes.

In the meantime, here’s what you can do to protect yourself:

  • Use app-based two-factor authentication instead of SMS-based options.
  • Encrypt your communications wherever possible by using secure messaging apps like Signal or WhatsApp.
  • Be mindful of where and when you’re sharing sensitive information via your phone.

The flaws in our phone system are a stark reminder that even our most trusted technologies can have serious weaknesses. As more attention is drawn to these issues, both by concerned consumers and influential voices like Veritasium, we can hope for faster adoption of better solutions. But until then, it’s essential to take steps to protect yourself and be aware of the risks lurking behind what appears to be a seamless communication experience.

Final Thoughts: Awareness is Key

Thanks to platforms like Veritasium, we are now more aware of the significant vulnerabilities in our phone systems. As with many legacy infrastructures, fixing the issue requires not just technical upgrades but also regulatory action and financial commitment from the stakeholders responsible. Until those are achieved, the onus falls on us to remain vigilant and take steps to secure our communications.

Get the latest episodes directly in your inbox