Hacker News new | past | comments | ask | show | jobs | submit login

>where they did not control the claimed number.

That's the thing though, a lot of times they don't control the spoofed number, but there's a legitimate use case for spoofing it. Authorization to spoof is not the same as having control of a number.




Whoever does own the number should be granting permission to that specific organization then.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: