this post was submitted on 05 Dec 2025
79 points (97.6% liked)
Technology
77090 readers
1703 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You realize that the spam is not coming from the actual line owning the number, right? They can spoof the number, so they could make it look like it came from any number. If they put some effort into researching you, they could make the spam look like it came from your mom.
Amusingly I got a spam call last week that came up on caller ID as "Obama 2012".
A few years ago I got a spam call from my own number. Who would fall for that?!
I actually got a spam call from myself once. They spoofed my own number. Got a bunch of followup calls, voicemails, and texts for a month or so after that.
Yes. We need authentication and authorization at both levels.
Lol, we can't even get ISPs to not pass traffic from their networks with source IPs they don't even fucking own. Getting telcos (more often than not the same people) to spend money on a new technology is going to be difficult when they refuse to update a goddamned router config.