Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Bolivia launches early-morning crackdown on roadblocks outside La Paz | Protests News

    May 17, 2026

    US data centers use enough electricity to power upwards of 16 million homes annually – the statistics on why opposition groups are pushing for People Over Profit

    May 17, 2026

    Why is Dropout changing so much? CEO Sam Reich explains

    May 16, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Millions of people imperiled through sign-in links sent by SMS
    Millions of people imperiled through sign-in links sent by SMS
    Tech Reviews

    Millions of people imperiled through sign-in links sent by SMS

    gvfx00@gmail.comBy gvfx00@gmail.comJanuary 22, 2026No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    “We argue that these attacks are straightforward to test, verify, and execute at scale,” the researchers, from the universities of New Mexico, Arizona, Louisiana, and the firm Circle, wrote. “The threat model can be realized using consumer-grade hardware and only basic to intermediate Web security knowledge.”

    SMS messages are sent unencrypted. In past years, researchers have unearthed public databases of previously sent texts that contained authentication links and private details, including people’s names and addresses. One such discovery, from 2019, included millions of stored sent and received text messages over the years between a single business and its customers. It included usernames and passwords, university finance applications, and marketing messages with discount codes and job alerts.

    Despite the known insecurity, the practice continues to flourish. For ethical reasons, the researchers behind the study had no way to capture its true scale, because it would require bypassing access controls, however weak they were. As a lens offering only a limited view into the process, the researchers viewed public SMS gateways. These are typically ad-based websites that let people use a temporary number to receive texts without revealing their phone number. Examples of such gateways are here and here.

    With such a limited view of SMS-sent authentication messages, the researchers were unable to measure the true scope of the practice and the security and privacy risks it posed. Still, their findings were notable.

    The researchers collected 322,949 unique SMS-delivered URLs extracted from over 33 million texts, sent to more than 30,000 phone numbers. The researchers found numerous evidence of security and privacy threats to the people receiving them. Of those, the researchers said, messages originating from 701 endpoints sent on behalf of the 177 services exposed “critical personally identifiable information.” The root cause of the exposure was weak authentication based on tokenized links for verification. Anyone with the link could then obtain users’ personal information—including social security numbers, dates of birth, bank account numbers, and credit scores—from these services.

    Table of Contents

    Toggle
      • Related posts:
    • Why Signal’s post-quantum makeover is an amazing engineering achievement
    • Norton VPN enters the AI agent space with 'first truly AI native' VPN for agents
    • Apple Debuts the $599 iPhone 17E With MagSafe – and It Comes in Pink

    Related posts:

    Oura Ring users are getting a revamped, AI-powered app – and Samsung Galaxy Ring users are going to ...

    I Hate How Much I Love This Hydration-Tracking Water Bottle

    Today's NYT Connections: Sports Edition Hints, Answers for Feb. 23 #518

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe ALGS Championship’s underdog winner, Oblivion, just made esports history
    Next Article Vibe Coding a Bridge-Ball Game with Emergent in Minutes
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    US data centers use enough electricity to power upwards of 16 million homes annually – the statistics on why opposition groups are pushing for People Over Profit

    May 17, 2026
    Tech Reviews

    Analogue 3D’s Latest Update Lets You Save Whenever You Want

    May 16, 2026
    Tech Reviews

    Livestream FA Cup Final Soccer: Watch Chelsea vs. Man City for Free

    May 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025156 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202590 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202581 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025156 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202590 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202581 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.