Cell phone networks are ridiculously porous and weak. Build your threat model accordingly. nostr:note10rltzw2v553n3cwk9du8uudwlm6pg6epe89xupyzjxm6nzrl7fns48x5lf