Hacker News new | past | comments | ask | show | jobs | submit login

The telephone network was designed with total trust for “network operators” who essentially have “root” to do anything.

This worked OK when the only operators were the various national phone monopolies (Cap’n Crunch notwithstanding), but today that level of access is much easier to get and abuse, and is difficult to trace.

There are efforts to bolt-on security to the telephone network but it’s really hard.

I think it’s more likely that (over the next handful of decades) the phone network fades into obscurity as more voice calls are connected over data links which offer much improved security models.




> Cap’n Crunch notwithstanding

I assume you mean Captain Crunch, not the breakfast cereal... :-)


He probably does mean the cereal, since it had the whistle that gave Captain Crunch (AKA John Draper) his name.




Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: