Oddbean new post about | logout
 Cell phone networks are ridiculously    porous and weak. Build your threat model accordingly. nostr:note10rltzw2v553n3cwk9du8uudwlm6pg6epe89xupyzjxm6nzrl7fns48x5lf