<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Ss7 on k4i.com</title>
    <link>https://k4i.com/tags/ss7/</link>
    <description>Recent content in Ss7 on k4i.com</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 27 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://k4i.com/tags/ss7/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>SS7 and Diameter Vulnerabilities Enable State Surveillance</title>
      <link>https://k4i.com/ss7-and-diameter-vulnerabilities-enable-state-surveillance/</link>
      <pubDate>Mon, 27 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://k4i.com/ss7-and-diameter-vulnerabilities-enable-state-surveillance/</guid>
      <description>&lt;p&gt;Citizen Lab researchers have documented two separate spying campaigns exploiting well-known vulnerabilities in the SS7 and Diameter protocols that underpin 2G, 3G, 4G, and 5G telecommunications networks. The campaigns use these weaknesses to track individuals&amp;rsquo; locations across cellular networks without authorization.&lt;/p&gt;&#xA;&lt;p&gt;The relevant fact is that these vulnerabilities are not new. They have been known for years. They are also not theoretical—they are being actively exploited by state actors against civilian populations. The gap between known vulnerability and deployed mitigation is not a policy failure or a technical oversight. It is structural. Telecommunications infrastructure was built on assumptions of trust that no longer apply. Patching those assumptions backwards is harder than building new infrastructure from scratch.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
