O2 VoLTE: locating any customer with a phone call

Privacy is dead: For multiple months, any O2 customer has had their location exposed to call initiators without their knowledge.

@q wow. That's really bad
@q holy fucking bingle 🦋
@q WTF they don’t clean up internal message headers as they are sent to end user devices? I used to be paranoid about those things…
@q ohhh god this is insane
@q IMHO this might be one to report to NCSC: https://www.gov.uk/guidance/where-to-report-a-cyber-incident
Where to Report a Cyber Incident

Find out where to report a cyber incident in the UK, Isle of Man or Channel Islands.

GOV.UK
@q Or actually...paging @lproven This is the ideal type of major security incident that completely taking the piss out of it on the Register would be ideal for.

@penguin42 @q

*Astronaut levels gun at other astronaut*

"Always was."

I made 1 "999" call from my mobile, 30Y ago, and they knew who I was, where I was standing, the street corner, everything, when they answered.

This is why burner phones are a thing.

I think this kind of thing is universal, TBH.

@lproven @q It's fine that 999 knows this, not that a random other O2 user can find it out for any other O2 customer.

@penguin42 @q Oh, agreed!

I'm not saying it's good. I'm just saying I'm not surprised.

We live in a world where senior directors can't tell fancy autocorrect from "artificial intelligence" and will pay billions for it. That they probably fired the one person who understood this and screwed it up? Figures.

@lproven @q Yeh, I mean it might just be a case of an accidental debug left on, or fallout from the Virgin/O2 merger.

@lproven @penguin42 @q Huh, I wish they'd done that the night I broke my jaw. I found out in the ambulance I'd rather grind bone and babble than shut up, but I would still have liked not to have to describe my location on the phone.

(Maybe they asked as a double-check?)

@penguin42 I’ve given it to my friends at CERT-Bund given it also seems to affect Germany
@q damn, NCIS style "hacking" being real isn't a good thing
@q
😬 I wonder if that also applies to O2 Germany...
@q “This effectively means that every O2 device that is making a phone call on IMS (4G Calling / WiFi Calling) is receiving information that can be used to trivially geolocate the recipient of the call.”
https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/
O2 VoLTE: locating any customer with a phone call

Privacy is dead: For multiple months, any O2 customer has had their location exposed to call initiators without their knowledge.

@mardor that’s not good news at all.
@q holy bananas that's bad
the obvious follow up question is how many other telcos left those headers in...
@q Almost comically bad security if it weren't so dire
@PursuitOfElysia @q sometimes I feel that everything related to mobile networking is comically bad security (if you even can call it "security") on a very fundamental level.
Like, the entire system is kept together by "just trust me bro" and obscurity and high barrier of entry.
@q Any way to check for this on other devices/carriers without root?
@q does this mean A O2 customer can pinpoint users on other networks as well?
@HcInfosec @q Not necessarily. Best of my understanding, the article states that O2 customer can pinpoint the location of another O2 customer. It says nothing about other carriers.
Even assuming that another carrier is also careless with its data, it may not transfer between two carriers.
It seems that the whole debacle is an internal oopsie.
O2 VoLTE: locating any customer with a phone call

Privacy is dead: For multiple months, any O2 customer has had their location exposed to call initiators without their knowledge.

@q @kimvsparrentak iets om achteraan te gaan wellicht?