A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned. This might be the reason that my GPRS Bluetooth Internet does not work anymore. Their network appears to be riddled with holes and bad design. Apparently the only reason I had Internet dial-up access was because they expect the phones to be the point that authorizes access to the network, as opposed to some method that isn't inherently flawed. I can still find ways to get traffic through their current firewalls, although any way a full net connection could be established would require methods that would make it way more inefficient then it was when it worked normally. Right now, imaps and DNS look ups work for instance. That's both a UDP and TCP way to funnel a tunnel right there... Or you could just pay $19 a month for less then 19.2k worth of dropped TCP connections and spotty connectivity you'll use about once every three months. Lets hear it for major telecommunication providers with ass backwards security. Phbttt.. |