• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About pdxusa

  • Rank

Contact Methods

  • Website URL

Profile Information

  • Location
    Phoenix, AZ

Recent Profile Visitors

23,212 profile views
  1. meatphone meatphone meatphone meatphone

  2. pdxusa meatphone hockey semetex infowars

  3. The other way you can look at this is we know what switches are used and who/what has the capability so it can be addressed or resolved. We actually invite anyone who can successfully spoof our system-its not going to be as easy as a PRI, requiring a level of spoofing that violates federal law. (This doesn't apply to the test number where we have stated this does not go to a human or any system that such spoofing would be determental and can not be prosecuted under carrier billing fraud / wire fraud act because we gave you authorization to spoof the test number so you don't need to worry anout it when testing) Our goal is to work with carriers that have these "public" flaws to resolve one at a time. There's a list of SS-7's that seem to be a problem, that list is small. I really would appreciate knowing the times of failed legitimate calls so we can get resolution. We get thousands of tests a day so the exact times are necessary along with your timezone. What we're doing is in concept going to propel other carriers to "FIX" the flawed network. If you do nothing and just sit there, so will everybody else. There must be some incentive for all carriers to fix their problems. It's like offering lower cellphone rates, the others will follow and we hope that happens before they are required by FCC-which will eventually happen, very soon if we can help it. We're not just doing nothing, we have several more smaller carriers working with their upstream to resolve incompatibilities and other faults we discovered in testing. Some of you say, you never stop it but we say it can be reduced. As of now, no public spoof company can spoof us (examples: Spoofcard, Telespoof, Callcondom, PIPHONETOOL and some others I can't remember off the top of my head.) We will not guarantee against spoofing and not going to even advertise about preventing it but we will work silently to block it. Several TIER 1 carriers are working with us right now to close the gaps on some of these problems, this will filter down the line. Several systems are being implemented RIGHT NOW that aid in resolving validation problems because the LIDB is not enough. Something is definately being done and only a matter of time.
  4. I don't see spoofing here, just an ANI fail which is fine with us. Show us some real spoofing please. thanks.
  5. Okay, now you have my attention... We certainly don't want to be blocking legitimate phone calls for our customers so I will get this to a system engineer first thing tomorrow morning. Could you please provide me the times of those failed calls?
  6. More calls please......Quit talking and start dialing
  7. That's what we want, give us more logs, routes, etc. We want to know every switch you are able to spoof with. now show me some proof and post a test number like grey did. Either way we're not thinking of a new business model, it's a matter of time before the root billing DB works properly and validation will be effective. Meanwhile, show me some proof....i've only seen one number that worked. Yes, i'm challenging you and still no output! now keep those calls coming!!
  8. yes, by someone with higher access than you! i'm talking to all of you....is there just one guy here that can do it? only one? Come out testers!!
  9. It was rumored the most skilled hackers in the world are here in BIN REV... We put up a challenge for you...what's wrong ?
  10. Our test number is below for those interested in experimenting. Please feel free to contact us with legitimate tests that were blocked, as, we want to make sure only known spoofing companies can't get through. Test number 209-751-0540 Call types http://www.pdxusa.net/forum/viewtopic.php?f=9&t=49 Thanks
  11. Yes grey, we're definately looking at other verification options, esp the ones you suggested in addition to LIDB and other proprietary database dipping techniques that we plan on implementing very shortly. We will be changing our "slogan" to not reflect false security on our permanent website before going public so no worries there. We have some new engineers experimenting in so many ways that the more we learn, the further out in completion we are. (we're pushed into 2008 now researching more friendly alternate techniques of call control) Our initial plan w/ proprietary validation never got off the ground because the TIER 1 carriers could not write the call to root DB in time for us to dip it for verification so we're forced to try other, not so traditional or unfamiliar techniques as a bandaid approach. Your idea is probably the best i've heard in a while.
  12. When VOIP clears out some of their security holes, we'll allow them by on a per carrier basis. Again, we are good start to helping fight Idnetity theft but by no means a solution. Something is better than nothing but one thing is certain, others will follow suit eventually and this will also encourage other carriers to join our efforts in fighting Identity theft, even if it's just as simple as the 2 digit CCV code in comparison. If we are really not effective then you would not be concerned so i have reason to believe otherwise. Also, this is just the beginning because the root billing database validation system that doesn't work (at all) will eventually be resolved and converted into a national telco standard and federalized. So far our technology has stopped known spoofing companies. They will need to violate a series of federal law in order to spoof our network, which VERY possible but they risk criminal prosecution if discovered. I will regularly test with spoofing cards to see who's in violation and report such activity to the FBI immediately. You can take it to the bank that if we report a law violation to the federal government, it will take serious priority. We are truly trying to make a difference in the community and so should you.
  13. We do track every visit and every link clicked for statistical purposes. Is that wrong ?
  14. That 305 # wasn't traditional spoofing. If you try to call us from spoofcard, callcondom or telespoof, your spoof will fail. Feel free to test with those above spoofing companies and see for yourself. What we are doing is better than nothing at all which is what everybody seems to be doing....nothing at all. Can't say i'm impressed with the bigger "V" company who grosses 90+ billion a year, yet does nothing to protect consumers from fraud. PDXUSA You have a very closed mind. In 1994 Caller ID spoofing was possible through PRI lines, however no body talked about it until things like spoofcard.com blew it up and it became an 'issue'. The truth is it has always been an issue by the small number of people who had the limited knowledge on how to do it. Your service GUARANTEES that the correct number is going to be sent to your subscribers. That Guarantee is violated, when *ANYONE* can spoof to your customers. Not to mention the fact that ANYONE can spoof to your customers USING publicly available 'spoof cards' by spoofing to DIDs such as the 305-890-1199 that POINT to your customer's phone numbers, or in this case your test number. You can't even demonstrate with a TEST number that the correct number will be sent to your subscribers. Anyone can take a S*** in a box and mark it Guaranteed, it doesn't make it reliable. The fact that there is a known security threat, you are lying to your customers about it and pretending that only certain people can spoof(when in fact anyone on this board who has a spoof card and the number to the DID can bypass your security and call your customer's 'verified') BTW, the DID was not hard to create, and was not created by an 'AT&T official', it was created by a phone phreak who frequents this board. You can pretend like your service does something, but in actuality that perception is the same perception the telcos had about Caller ID, it's only a matter of time before someone learns how to do it on their own and defeat your system.
  15. Again, I ask is there any public spoofing companies (PUBLIC, NOT TOP OFFICIALS @ AT&T) able to spoof our network? Answer carefully, we are heavely associated with the federal government and I personally had a career in the federal government before working at PDXUSA. We have tested Call Condom (AKA PIPHONETOOL), Telespoof, Spoofcard and a few other no name spoofing companies in which none could successfully spoof ANI to our system. Please point me in the direction of anyone offering this service to public and I'll start the legal process. Those spoof companies are barely below the legal limit of spoofing just ANI/CID. Both us and the federal government are waiting for them to cross the line of the law on legal spoofing. Until then our technology stands aside from the rest. Thanks I-Ball.