Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
xad6
on March 14, 2022
|
parent
|
context
|
favorite
| on:
Ask HN: How can scam callers fake a mobile phone n...
Similar to the original SMTP implementation, it was designed in an era where folks often assumed that only "trusted parties" had access to the network backbone (whether that network is circuit-switched or packet-switched).
Consider applying for YC's Summer 2026 batch! Applications are open till May 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: