<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 18:15:50 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/ss7/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[什么是 SS7，据称中国正用它来窥探特朗普的手机？]]></title><description><![CDATA[几十年来，电信行业已经知道其移动基础设施中有一个主要漏洞，那为什么没有拯救它？ 纽约时报说，特朗普经常使用个人的 iPhone 和朋友、密友通信，而不是另外两部国安局推荐的保密 iPhone。英国“泰晤士报”采访的匿名白宫官员称，特朗普一再被警告，他在这些设备上拨打电话并不安全，“中国间谍经常在窃听。”]]></description><link>http://direct.ecency.com/security/@iyouport/ss7</link><guid isPermaLink="true">http://direct.ecency.com/security/@iyouport/ss7</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[iyouport]]></dc:creator><pubDate>Wed, 07 Nov 2018 08:16:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/rz7B1G1Wqnyeh3MxHAFsX2S9dniRw14LSbhTDstRccNoNvxA4NJ4Hba6w1D4JgSi99z4u8he6hLdqJ3LUt3PRNSsKifrjTqyEj72eouwNscXoQbxDo4Hm8pEr3kLdUr6LRFiqj89Gh9e1FMC9Ag4bcTSDg2B8DxEJ9hafJVdsnUpKWmPgrzoC5GnhVdhkeDbXaaY12sKEeSs1uNX9ubKzzTQuhenEXuRHtC2nJUcRrXxDpgj3sgz8BR?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[SS7 routing-protocol breach of US cellular carrier exposed customer data]]></title><description><![CDATA[SS7 routing-protocol breach of US cellular carrier exposed customer data. 40-year-old SS7 is being actively used to track user locations and communications.]]></description><link>http://direct.ecency.com/ss7/@stealthgrid/ss7-routing-protocol-breach-of-us-cellular-carrier-exposed-customer-data</link><guid isPermaLink="true">http://direct.ecency.com/ss7/@stealthgrid/ss7-routing-protocol-breach-of-us-cellular-carrier-exposed-customer-data</guid><category><![CDATA[ss7]]></category><dc:creator><![CDATA[stealthgrid]]></dc:creator><pubDate>Tue, 05 Jun 2018 15:38:36 GMT</pubDate></item><item><title><![CDATA[About cheetah in funny way]]></title><description><![CDATA[Cheetah is a very good animal . But steemit cheetah is a robot. He or she upvote me first because i am use copy pest methode. He or she always say me this post is similar to that website . He or she always]]></description><link>http://direct.ecency.com/cheetah/@debabratajena/about-cheetah-in-funny-way</link><guid isPermaLink="true">http://direct.ecency.com/cheetah/@debabratajena/about-cheetah-in-funny-way</guid><category><![CDATA[cheetah]]></category><dc:creator><![CDATA[debabratajena]]></dc:creator><pubDate>Tue, 28 Nov 2017 18:41:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdkkegBhtyDXmgRGWQxAPv3Evc7Eqs3ifKZVUjowuWTE7JtEpYhsgspGpa5UmU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The sql injection//d virus]]></title><description><![CDATA[SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution]]></description><link>http://direct.ecency.com/dvirus/@debabratajena/the-sql-injection-d-virus</link><guid isPermaLink="true">http://direct.ecency.com/dvirus/@debabratajena/the-sql-injection-d-virus</guid><category><![CDATA[dvirus]]></category><dc:creator><![CDATA[debabratajena]]></dc:creator><pubDate>Tue, 28 Nov 2017 18:12:12 GMT</pubDate></item><item><title><![CDATA[Ss7 hacks]]></title><description><![CDATA[WhatHomeattackcsattacktyAn SS7 attack is an exploit that takes advantage of a weakness in the design of SS7 (Signalling System 7) to enable data theft, eavesdropping, text]]></description><link>http://direct.ecency.com/tecnology/@debabratajena/26xtvk-ss7-hacks</link><guid isPermaLink="true">http://direct.ecency.com/tecnology/@debabratajena/26xtvk-ss7-hacks</guid><category><![CDATA[tecnology]]></category><dc:creator><![CDATA[debabratajena]]></dc:creator><pubDate>Tue, 14 Nov 2017 16:57:18 GMT</pubDate></item><item><title><![CDATA[Ss7 hacks]]></title><description><![CDATA[WhatHomeattackcsattacktyAn SS7 attack is an exploit that takes advantage of a weakness in the design of SS7 (Signalling System 7) to enable data theft, eavesdropping, text]]></description><link>http://direct.ecency.com/tecnology/@debabratajena/62mw7p-ss7-hacks</link><guid isPermaLink="true">http://direct.ecency.com/tecnology/@debabratajena/62mw7p-ss7-hacks</guid><category><![CDATA[tecnology]]></category><dc:creator><![CDATA[debabratajena]]></dc:creator><pubDate>Sun, 12 Nov 2017 18:06:33 GMT</pubDate></item><item><title><![CDATA[Ss7 hacks]]></title><description><![CDATA[WhatHomeattackcsattacktyAn SS7 attack is an exploit that takes advantage of a weakness in the design of SS7 (Signalling System 7) to enable data theft, eavesdropping, text]]></description><link>http://direct.ecency.com/tecnology/@debabratajena/ss7-hacks</link><guid isPermaLink="true">http://direct.ecency.com/tecnology/@debabratajena/ss7-hacks</guid><category><![CDATA[tecnology]]></category><dc:creator><![CDATA[debabratajena]]></dc:creator><pubDate>Sun, 12 Nov 2017 06:54:12 GMT</pubDate></item><item><title><![CDATA[Switching System 7 (SS7) Security flaws]]></title><description><![CDATA[A serious flaw in the Global Cellular System © 2016 - by John T. Draper Over the last 15 years, I have been traveling back and forth regularly to Germany to give talks at various conferences. Many of the]]></description><link>http://direct.ecency.com/hacking/@jdcrunchman/switching-system-7-ss7-security-flaws</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@jdcrunchman/switching-system-7-ss7-security-flaws</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[jdcrunchman]]></dc:creator><pubDate>Tue, 03 Jan 2017 09:17:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e2geMSKey5pRvRwKQvbuMihadJ7f1GMhPeE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cap'n Crunch, the famous phone phreak introduction]]></title><description><![CDATA[Hi Everyone, I’m really looking forward to meeting a ton of really interesting people. Many of you older folks may remember me as Cap’n Crunch, made famous from a toy whistle found in the Cap’n Crunch]]></description><link>http://direct.ecency.com/hacking/@jdcrunchman/cap-n-crunch-the-famous-phone-phreak-introduction</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@jdcrunchman/cap-n-crunch-the-famous-phone-phreak-introduction</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[jdcrunchman]]></dc:creator><pubDate>Tue, 03 Jan 2017 03:59:12 GMT</pubDate></item><item><title><![CDATA[Phone Security – HackJam 2016-09-06]]></title><description><![CDATA[Tonight we had the visit of Karsten Nohl from teh German company: Security Research Labs. He presented his work, some of his latest research on a few security issues with mobile communications. Karsten]]></description><link>http://direct.ecency.com/security/@xingewen/phone-security-hackjam-2016-09-06</link><guid isPermaLink="true">http://direct.ecency.com/security/@xingewen/phone-security-hackjam-2016-09-06</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[xingewen]]></dc:creator><pubDate>Thu, 08 Sep 2016 16:05:30 GMT</pubDate></item></channel></rss>