frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

MrBeast Failed to Disclose Ads and Improperly Collected Children's Data

https://bbbprograms.org/media/newsroom/decisions/mrbeast-feastables
105•Improvement•51m ago•33 comments

The War on Roommates: Why Is Sharing a House Illegal?

https://marginalrevolution.com/marginalrevolution/2025/08/the-war-on-roommates-why-is-sharing-a-h...
62•surprisetalk•43m ago•53 comments

Go has added Valgrind support

https://go-review.googlesource.com/c/go/+/674077
233•cirelli94•5h ago•56 comments

Abundant Intelligence

https://blog.samaltman.com/abundant-intelligence
18•j4mie•49m ago•9 comments

Getting More Strategic

https://cate.blog/2025/09/23/getting-more-strategic/
39•gpi•1h ago•4 comments

Structured Outputs in LLMs

https://parthsareen.com/blog.html#sampling.md
79•SamLeBarbare•3h ago•40 comments

Nine Things I Learned in Ninety Years

http://edwardpackard.com/wp-content/uploads/2025/09/Nine-Things-I-Learned-in-Ninety-Years.pdf
589•coderintherye•11h ago•239 comments

Agents turn simple keyword search into compelling search experiences

https://softwaredoug.com/blog/2025/09/22/reasoning-agents-need-bad-search
3•softwaredoug•18m ago•0 comments

Zoxide: A Better CD Command

https://github.com/ajeetdsouza/zoxide
218•gasull•9h ago•125 comments

Processing Strings 109x Faster Than Nvidia on H100

https://ashvardanian.com/posts/stringwars-on-gpus/
91•ashvardanian•3d ago•13 comments

Zinc (YC W14) Is Hiring a Senior Back End Engineer (NYC)

https://app.dover.com/apply/Zinc/4d32fdb9-c3e6-4f84-a4a2-12c80018fe8f/?rs=76643084
1•FriedPickles•2h ago

Altoids by the Fistful

https://www.scottsmitelli.com/articles/altoids-by-the-fistful/
149•todsacerdoti•8h ago•61 comments

How are developers using AI? Inside our 2025 DORA report

https://blog.google/technology/developers/dora-report-2025/
4•meetpateltech•32m ago•1 comments

AI won't use as much electricity as we are told

https://johnquigginblog.substack.com/p/ai-wont-use-as-much-electricity-as
5•hirpslop•1h ago•1 comments

Show HN: Run Qwen3-Next-80B on 8GB GPU at 1tok/2s throughput

https://github.com/Mega4alik/ollm
36•anuarsh•3d ago•2 comments

Qwen3-Omni: Native Omni AI model for text, image and video

https://github.com/QwenLM/Qwen3-Omni
525•meetpateltech•20h ago•133 comments

Cache of Devices Capable of Crashing Cell Network Is Found Near U.N

https://www.nytimes.com/2025/09/23/us/politics/secret-service-sim-cards-servers-un.html
124•adriand•3h ago•70 comments

The YAML Document from Hell

https://ruudvanasseldonk.com/2023/01/11/the-yaml-document-from-hell
107•agvxov•5h ago•69 comments

Compiling a Functional Language to LLVM (2023)

https://danieljharvey.github.io/posts/2023-02-08-llvm-compiler-part-1.html
37•PaulHoule•2d ago•0 comments

I built a dual RTX 3090 rig for local AI in 2025 (and lessons learned)

https://www.llamabuilds.ai/build/portable-25l-nvlinked-dual-3090-llm-rig
99•tensorlibb•4d ago•83 comments

Fall Foliage Map 2025

https://www.explorefall.com/fall-foliage-map
207•rappatic•14h ago•25 comments

Delete FROM users WHERE location = 'Iran';

https://gist.github.com/avestura/ce2aa6e55dad783b1aba946161d5fef4
737•avestura•9h ago•564 comments

Forking Styled Components

https://github.com/sanity-io/styled-components-last-resort/blob/main/README.md
15•coloneltcb•3d ago•5 comments

Indoor surfaces act as sponges for harmful chemicals

https://news.uci.edu/2025/09/22/indoor-surfaces-act-as-massive-sponges-for-harmful-chemicals-uc-i...
63•XzetaU8•5h ago•51 comments

Hyb Error: A Hybrid Metric Combining Absolute and Relative Errors

https://arxiv.org/abs/2403.07492
10•ncruces•4h ago•2 comments

Secret Service takes down network that could have crippled New York cell service

https://www.theguardian.com/us-news/2025/sep/23/secret-service-new-york-network
28•tomek_zemla•36m ago•6 comments

OrangePi 5 Ultra Review: An ARM64 SBC Powerhouse

https://boilingsteam.com/orange-pi-5-ultra-review/
11•ekianjo•40m ago•1 comments

Gamebooks and graph theory (2019)

https://notes.atomutek.org/gamebooks-and-graph-theory.html
58•guardienaveugle•10h ago•6 comments

Awash in revisionist histories about Apple's web efforts, a look at the evidence

https://infrequently.org/2025/09/cupertinos-comforting-myths/
31•freetonik•6h ago•10 comments

Obscure feature and obscure feature and obscure feature = compiler bug

https://antithesis.com/blog/2025/compiler_bug/
4•jonstewart•2d ago•1 comments
Open in hackernews

Cache of Devices Capable of Crashing Cell Network Is Found Near U.N

https://www.nytimes.com/2025/09/23/us/politics/secret-service-sim-cards-servers-un.html
123•adriand•3h ago

Comments

belter•2h ago
https://archive.is/wNpfX
easyat•2h ago
What a bizarre story. They say it's an anonymous network. What does that mean when multiple locations with racks of tens of thousands of SIM cards and the supporting equipment are found around NYC area? In order to manage this hardware and the operations around this equipment it would take boots on the ground, at least occasionally, for repairs and maintenance.

No mention of arrests or surveillance of any site to try and apprehend anyone related.

aesh2Xa1•2h ago
The details are skimpy. In a CNN article we can see photos and mention that these were housed in apartment units and perhaps other rentals.

https://www.cnn.com/2025/09/23/us/swatting-investigation-ser...

EDIT:

While the headline on NYT highlights an attack on the towers for disruption, the CNN piece gives more weight to two other uses: (1) criminal communication network and (2) swatting.

I think those two make sense. The SIMs would probably hold US numbers and would appear authentic for accessing the US operators' networks.

jacquesm•1h ago
(2) is the thing that brought attention of LE on these, and likely was a very dumb move by one of the users of this system. If just (1) they could have kept it going for much longer, (2) is what brought it down.
trebligdivad•2h ago
Yeh very weird; I mean if it was just spammers then you wouldn't bothered putting it in somewhere expensive like NY would you?
dvdkon•2h ago
With that many devices, you'd need to have them in some place with very dense cell service.
Retr0id•2h ago
I don't see why you'd actually need any SIMs in the first place if you wanted to DoS a cell tower. My guess is that it's basically just a device farm for either sending spam or receiving activation codes for spam accounts elsewhere. By putting them in a populated area, the increase in traffic is less noticeable.
jacquesm•2h ago
It makes it much harder to nail down exactly where the farm is. You can't just go break down all the doors in a large high-rise and the reflections of the radio signals in the urban canyon will further hamper your ability to pin-point the devices. But you might be able to correlate power consumption or heat signature with activity.
bflesch•1h ago
Could be as simple as faking app downloads for the NYC area to raise the appstore ranking
Loudergood•1h ago
100,000 sims connecting to a cell network in Vermont will crash things. In midtown Manhattan that's a blip.
jacquesm•1h ago
That much capacity could easily overwhelm things that scale poorly. 911 service for instance.
theturtle•2h ago
ICE is probably all "we want our stuff back!!!"
comrade1234•2h ago
I'm curious how this would work without being traced. Someone is paying rent on the apartments. For the simcards, I think they are all able to call 911 even if they don't have credit/dataplan. They're also able to connect to a tower and take up slots. So probably the only way to financially trace the simcards is the initial purchase.
instagib•2h ago
Can also text 911 now which would overburden the texting protocol network so no one else’s texts will go through.

It’s a cell tower jammer and terrorism multiplier. Can’t call or text. It will probably disturb internet service as well. Include a few radio jammers for local police and a few satellite antennas you could create an opportunity then a panic to cover your tracks getting out.

iberator•59m ago
Its relatively hard to jam modern BTS with LTE and 5G. It's part of the design. PTP with fancy modulation helps :p
jacquesm•1h ago
SIM cards don't 'call 911', you can call 911 even if there is no SIM card at all, all you need is a working radio.
foobarian•57m ago
I wonder if all the cards in the photo are active at once, or only activated on some rotation. The latter would certainly make them a lot harder to detect
jacquesm•2h ago
So that's the tip. Makes you really wonder about the iceberg, this raises many more questions than it answers.

The UK has criminalized possessing or using SIM farms or related gear in response to these popping up with some regularity. But the operators are pretty clever and know how to hide. I've been thinking about how easy it would be to detect these when you're a telco and I think the signature is unique enough that it should be possible to detect which SIMs are part of a farm, even if you don't know the exact location of the farm.

Chance-Device•2h ago
Since you seem to know about the subject, how are these not immediately found and shut down? It seems like the messages they send could be traced to the sims physical location, and having a massive cluster of thousands of sims just sitting in an apartment also seems like an obvious giveaway. And there’s all the traceability required to rent the locations and buy the equipment. It seems like bothering with this is just asking to get caught.
jacquesm•1h ago
Well, they did get caught. But for that to happen immediately would require a detection method that can point out the presence of a farm with only a few samples. SIMs don't know their 'physical location' and triangulation of signals in these bands in the urban environment is non trivial.

Whoever did this likely isn't all that happy that their carefully created infra was used to harass officials, which most likely is the single reason this operation got uncovered in the first place. If it would have just been used for low level crime who knows how long they could have continued to do this.

Note that these are not unique to NYC or even to the United States, they've been found in other countries as well, the UK has now criminalized possession or operation of these (but the fines are so low that I don't think it will make much difference).

huflungdung•1h ago
“Triangulation is non trivial”

Uh. No it isn’t. SNR between 5 or so masts gives you the exact location of any cell device. This is how $oldemployer used to track them

lozaning•14m ago
What you're describing is trilateration , not triangulation
tbrownaw•1h ago
> SIMs don't know their 'physical location' and triangulation of signals in these bands in the urban environment is non trivial.

IIRC modern cell towers use cool tricks to send stuff for a particular phone to only where that phone is so they can send more total data. Can this not be turned into a precomputed map by taking a test phone everywhere and seeing what settings the tower picks to talk to it?

jacquesm•1h ago
Sure, so now you are at the front door of a quad of four 300 apartment highrises. What is your next move?
iberator•1h ago
With 5g and beamforming and mimo and decent bts software(Ericsson or Hua) you can pinpoint the given phone very accurately (within 20m in urban settings) - without any triangulation, as you know the cell tower sector :) Guess what: you can also measure the azimuth within 0.1 degree, so you could have SOME data at where to look.

FYI: That was available back in 2022 as standard. Now it could be even better. :P

jacquesm•42m ago
I've already narrowed it down to four buildings for you, so we can consider that all of those methods worked. What is your next move?

I'm not saying it can't be done, clearly it can be done otherwise this article wouldn't exist. But it is not quite as easy as pointing a magic wand (aka an antenna) at a highrise and saying '14th floor, apartment on the North-West corner', though that would obviously make for good cinema.

pavel_lishin•30m ago
> I've already narrowed it down to four buildings for you, so we can consider that all of those methods worked. What is your next move?

Subpoena the power, water & gas company, and look at apartments that have unusual power usage, coupled with almost zero water & gas usage. Especially look at apartments that don't have a spike in power usage in the morning & evening that corresponds to people having a regular commute.

I'm not sure how much power this equipment draws at idle - I'm assuming it's more idle at night, no need to send scammy SMS messages at 3am Eastern - but I'd wager you could track that.

Granted, it's not fast, but depending on how quickly the companies bend over backward for such a request & how good your interns are at using Excel, you might be able to get this done before sundown.

delfinom•58m ago
A portable spectrum analyzer. A high concentration of phones like this would light up the spectrum when used with a directional wand.

Portable spectrum analyzers are regularly used to identify interference in urban environments. Even a damaged cable coax line on the street can interfere with cellular signals.

mschuster91•19m ago
> Since you seem to know about the subject, how are these not immediately found and shut down?

Because - depending on cell tower coverage and the antennas installed on it - the degree of precision is far too low to be useful. In rural installations and the worst case, aka a tower with a dipole antenna on a mountaintop, at 900 MHz the coverage will be around 35 km. Segmented antennas just limit the section of the circle where the endpoints are. In suburban areas, coverage is usually 10-20 km, and urban areas it's 5km and less.

Now you know which cell and cell section the user is in... but to actually pinpoint the user? That takes some more work. First, you need a few more towers that the user can reach for triangulation - the more the better - but if the operator of such a setup is even remotely clever and the hardware/firmware supports it, they will have locked the devices to only connect to a single tower (you can see a map at [1] that shows the IDs). If the operator didn't do that but the site is too remote to achieve triangulation, you might need to drive around in a van and use an IMSI catcher, aka a phone tower emulator, and hope that eventually the site's devices register at it. That, however, is a lot of awful work, and is often not legal for police authorities, only for secret services.

Now you might ask yourself, what about 911, how can they locate callers precisely? The thing is... it depends. Landlines and VoIP lines are usually mapped to a specific address (which is why VoIP providers give you an explicit warning that, if you do not keep that record up to date, 911 calls will be misrouted!), so that's trivial. Mobile phone callers however, until a few years ago the degree of precision was exactly what I just described - it completely depended on celltower coverage, with the only caveat that a phone will connect to another operator if it shows a stronger signal for 911 calls. Only then, Android introduced Emergency Location Service [2] and Apple introduced Hybridized Emergency Location [3] - these work with the sensors on the phone, most notably GPS/GLONASS/Beidou, but also SSIDs of nearby WiFi APs and specific Bluetooth beacons. Downside of that is, of course, the 911 dispatch needs an integration with Apple and Google's services, users can disable it for privacy reasons, and older phones won't have anything - so in these cases, 911 dispatchers are straight out of luck and again reduced to the above range of precision.

[1] https://opencellid.org/

[2] https://www.android.com/safety/emergency-help/emergency-loca...

[3] https://www.apple.com/newsroom/2018/06/apple-ios-12-securely...

SanjayMehta•1h ago
There was at least one SIM farm which was installed in a delivery type van and driven around. This was to avoid being detected as a stationary device.
jacquesm•1h ago
Clever! Also far more risky because it would require near constant attention.
pavel_lishin•30m ago
Plus, you can leave an apartment unattended - a van being driven has a big weak link in the chain that has to push the gas and brake pedals.
mschuster91•16m ago
An unattended apartment can raise red flags. A van however, in most jurisdictions even if you end up in a police checkpoint, they may not force you to reveal what is in your van.
tbrownaw•2h ago
> Officials said the anonymous communications network, which included more than 100,000 SIM cards and 300 servers, could interfere with emergency response services and could be used to conduct encrypted communication. One official said the network was capable of sending 30 million text messages per minute, anonymously. The official said the agency had never before seen such an extensive operation.

> Investigators found the SIM cards and servers in August at several locations within a 35-mile radius of the United Nations headquarters. The discovery followed a monthslong investigation into what the agency described as anonymous “telephonic threats” made to three high-level U.S. government officials this spring — one official in the Secret Service and two who work at the White House, one of the officials said.

So 100k SIM cards scattered around the middle of New York City.

Probably an egress point for scammers and bot farms, and the speculation about local disruptions isn't grounded in anything other than scale?

chedabob•2h ago
Yeah there was this the other day, although I'd expect the hardware for this is much smaller than is shown in the photos in the OP: https://news.ycombinator.com/item?id=45294766
cootsnuck•13m ago
Nah it's that size. You need an individual modem for each SIM card because you need a unique IMEI. It's possible each of those SIMs are eUICCs as well which means basically that each card is like a "wallet" with multiple profiles.

I've used hardware a decent amount larger than what's pictured in the OP for work. But what I was using wasn't just for SMS. So I needed more sophisticated modems. What they're using looks like a bunch of 64 port modem banks exclusively for SMS.

(Oh wait if you mean the devices for what's in the article you linked, then yea, those I'm sure are much smaller and quite different.)

bflesch•1h ago
Maybe some sort of darknet service for anonymous sms / calls which was used for stuff that really raised alarms such as calling/messaging these officials
perihelions•2h ago
Is there a less clickbait-y source? There's no tangible link to the United Nations described in the article; that seems to be a gratuitous flourish.

> "several locations within a 35-mile radius of the United Nations headquarters"

That's the entirety of New York City!

edit to add: This very weird part was actually lifted from the USSS press release,

> "These devices were concentrated within 35 miles of the global meeting of the United Nations General Assembly now underway in New York City."

https://www.secretservice.gov/newsroom/releases/2025/09/us-s... ("U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area")

tbrownaw•1h ago
It reminds me of those "how to promote yourself" things about say turning "did routine performance optimizations on the website" into "saved the company $ZZZ million" and such.
wildzzz•1h ago
That quote comes directly from the Secret service press release lol
kentm•2m ago
News organizations should not uncritically repeat press releases like these. It is an ethical failure to do so.
lyu07282•1h ago
The guardian too just parroting the press release. Even ChatGPT would literally do a better job to add technical context and critical analysis of that nonsense story.
puttycat•51m ago
What is nonsense about this story?
agwa•40m ago
A "35-mile radius of the United Nations headquarters" includes literally all of New York City and then some, making the supposed connection to the UN meeting extremely tenuous.

This looks exactly like a "SIM farm" operation, which rents out access to real mobile numbers, usually for the purpose of spamming or fraud. Yet there's no mention of this possibility.

lyu07282•36m ago
Thank you, exactly this^

There are stories of these SIM farms all the time, here is an example with very similar gear: https://www.vice.com/en/article/video-ukraine-busts-alleged-...

These stories are always sensationalized when their primary purpose by enlarge is probably just spam.

pyuser583•1h ago
Sorry to be nitpicky, but the US Secret Service really, really prefers the acronym "USSS" over "SS."
jacquesm•1h ago
I can see an uphill battle in their future.
pyuser583•1h ago
They are, colloquially speaking, a "three letter agency." I think they should compromise with "USS".
perihelions•10m ago
(I've removed the distraction).
JdeBP•1h ago
It does seem like the sort of PR-rewrite for a press release that results in distances measured in football fields.

Looking at a map, a 35 mile as-the-crow-flies (and as the cell network signal flies) radius of the U.N. Secretariat building almost gets one to Lake Hopatcong, New Jersey, in one direction and past Stamford, Connecticut, in another.

AlanYx•1h ago
It's worth highlighting that that link suggests this may be linked to foreign states rather than just garden-variety organized crime ("...early analysis indicates cellular communications between nation-state threat actors...").
agwa•54m ago
That probably just means that some foreign states were among the customers of these SIM farms.
kylecazar•32m ago
I read they were in Armonk, Greenwich, Jersey and Queens. A perimeter around Manhattan.

The article:

https://www.cnn.com/2025/09/23/us/swatting-investigation-ser...

formerly_proven•20m ago
"Concentrated within this 10000 km² area" sounds not nearly as impressive. Granted, "concentrated within 35 miles" sounds already rather dilute when talking about mobile phones.
wildzzz•1h ago
Oh lol, this is a scam site. Yes, there are potential other uses for a sim box but mostly they are used for VoIP purposes. It's honestly so hard reading quotes from the US government these days. Cartels, drugs, guns. They make it sound like they interrupted the staging of an assault on the UN when the article actually says that the locations were within 35 miles of the UN headquarters in NYC. This is a significant distance as it covers beyond the 5 boroughs, it's the "tri state area". Like 20M people live in that circle. I highly doubt this is for anything other than VoIP scams.
kotaKat•1h ago
Yup. This is literally just a cellular grey route site for some shitty VoIP provider, just like the SIM box SMS scams go marching on in other countries. Some operator is shitting their pants right now, probably.

The SIM cards come from cheap MVNOs that have dealer arrangements for cheap or free first month activations, then they just set up a handful of SIM boxes and a residential Internet connection back to the mothership (like they did at the captured house with the white Verizon 5G Home router just casually sitting on the floor next to the units).

Similarly, I’ve had some friends on US MVNOs themselves that have access to “free” international calling, yet every time they call (the same) international number the receiving party gets a wildly different caller ID from a wildly different country each time (Poland, Moldova, etc). Also dodgy SIM boxes!

jimmySixDOF•50m ago
Agreed. These days setups imho aren't vanilla origination and termination VoIP scratch card traffic it's more likely a distributed bot farm obfuscation as a service provider. I have seen commercially available sim bank gateways that can separate the sim from the antenna in order to change towers and simulate movement. The use of eSim adapters make it superscaleable now in terms of abstracting the numbers from the sims. Whatever the application a press release tie in to UN is a little odd.
pavel_lishin•33m ago
Like XKCD said, every map is basically a population map: https://xkcd.com/1138/
gnatman•1h ago
“Cache of Devices Capable of Sending Millions of Spam Political Texts”
mmastrac•1h ago
Hopefully this is a wakeup call for anyone thinking that phone number validation is sufficient to prevent botting and fraud.
tbrownaw•42m ago
There's no such thing as (completely) "prevent", just substantially reduce by making it more expensive.
xrd•1h ago
Are there ways to prevent this kind of thing using GrapheneOS or FLX1s?

Lots of interesting discussions about cell phone networks lately.

Fake cell phone towers ICE is using to track people:

https://www.forbes.com/sites/the-wiretap/2025/09/09/how-ice-...

GrapheneOS (de-googled android) and FLX1s (pure Linux phone):

https://news.ycombinator.com/item?id=45312326

My question is: are any of these alternatives helpful against these novel attacks? If you are on a phone using a network vanilla provider like tmobile or otherwise, is there any way to prevent your phone from trying to connect to a fake network?

If I controlled the entire cell phone stack, like I would with FLX1s, then could I have something like the ssh initial connection signature:

  The authenticity of host '100.64.0.46 (100.64.0.46)' can't be established.
  ED25519 key fingerprint is SHA256:yE4jh7gROroduLqbIFcInlUXrpDy8JIpJPc+XvtIpWs.
  This key is not known by any other names.
  Are you sure you want to continue connecting (yes/no/[fingerprint])?
Once I accept that sshd endpoint, I know my ssh client will protect me if the sshd changes and I'm experiencing a MITM.

It would be a bit of a pain to accept a new cell tower when I'm in a new city, but I could imagine syncing a whitelisted trusted set of cell phone towers (ha, when I think of that the whole idea of "trusted" is laughable). But, at least I would have more insight into when I am getting surveilled. And, I could say "not today ICE!" or "tmobile, idk, please give me my HN fix, I don't even care if you know I'm aware my government is tracking me as I pay the service fee!" I bet a whitelist hosted on github would be faster to update than tmobile installing new cell phone towers so privacy enthusiasts could enable their own safety.

bparsons•46m ago
The photos in the NY Post article make it look like they raided cell phone shops in normal retail locations. It looked more like an engagement/click fraud operation.
pavel_lishin•38m ago
> The discovery followed a monthslong investigation into what the agency described as anonymous “telephonic threats” made to three high-level U.S. government officials this spring — one official in the Secret Service and two who work at the White House, one of the officials said.

> The agency did not provide details about the threats made to the three officials, but Mr. McCool described some as “fraudulent calls.”

> Investigators have been going through the data on SIM cards that were part of the network, including calls, texts and browser history. Mr. McCool said they expected to find that other senior government officials had also been targeted in the operation.

The article goes out of its way to imply a link between this farm and the threats, but doesn't actually explicitly make that link.

The CNN article covering the same story does the same thing: https://www.cnn.com/2025/09/23/us/swatting-investigation-ser...

The Secret Service statement, however, does make that claim explicitly in the first sentence: https://www.secretservice.gov/newsroom/releases/2025/09/us-s...

t1234s•33m ago
Do those devices have any legitimate use at all?
Maxious•6m ago
They have lots of illegitimate use that isn't about crashing the cell network like sending out spam https://www.cyberdaily.au/security/9949-sydney-man-arrested-... or allowing people to use in-network free call allowance to instead make voip international calls
MangoToupe•32m ago
Why are these networks accessible without signing keys in 2025?
JdeBP•11m ago
Looking at the original press release (https://www.secretservice.gov/newsroom/releases/2025/09/us-s...) and the attached high-resolution photographs, there are things that probably leap out at a Hacker News readership:

The Bad Guys are neat with their cable ties, and number their gateway boxes.

The Bad Guys went with simple heavy-duty metal garage shelving rather than real racking, seemingly vastly overengineered for the weight of the equipment, as that sort of shelving can hold up to a Mg per shelf UDL. The "WallOfSimBoxes" kit does not sport any rack mounting brackets.

The Bad Guys don't use redundant power supplies, or battery backup.

lo_zamoyski•10m ago
I wonder what kinds of techniques, if any, these virtual cell phones employ to evade being discovered. You would suspect that they could be discovered through triangulation.

Two possibilities:

1. Most if not all of these virtual cell phones are connecting from the same location.

2. Some of these virtual cell phones are connecting from the same location, with the remainder in reserve.

In the case of (1), you have both a fixed location and a high saturation that is unlikely.

In the case of (2), you could imagine using certain numbers at certain times to simulate the work day or hours during which people are more likely to be at home. Randomization or round robin could produce unlikely patterns, but without them, these virtual phones would be underutilized, save for some kind of cyberattack that would compromise their location.

Or the truth simply may be that they aren't doing anything, because no one is watching.