中国的电话实名对电诈虚拟号没有任何作用,因为电话网协议有“漏洞”,容许任意修改电话号码,不改现有的电话网络协议,三大运营商也没啥办法吧。
AI Overview
Telephone protocols do allow a caller to modify (or "spoof") their calling number, and this is the basis for legitimate business uses as well as fraudulent scams
.
How It Works
- VoIP (Voice over Internet Protocol): The primary way this is achieved is through VoIP services, which are widely used by call centers and businesses. In VoIP, the caller's phone system (like a PBX) can be programmed to send any desired phone number and name as the Caller ID information. Unlike traditional landlines, where the number is tied to the physical wire, VoIP is much more flexible, and the carrier historically had no built-in mechanism to verify the number belonged to the caller.
- Legitimate Uses: Businesses use this feature for practical reasons. For example, a doctor might use their personal mobile phone to call a patient but set the caller ID to display the main hospital number so that the patient calls the general office back instead of the doctor's private line.
- Illegitimate Uses (Spoofing): Scammers exploit this flexibility to deceive recipients. Common tactics include "neighbor spoofing" (displaying a number with the same area code and prefix as the person being called to make it look local) or impersonating a trusted entity like a bank or government agency.
Regulation and Countermeasures
Due to the prevalence of scam calls, regulatory bodies like the CRTC in Canada and the FCC in the US have mandated the implementation of a new caller ID authentication system called
STIR/SHAKEN. This system is designed to verify that the caller is authorized to use the number being displayed, helping carriers identify and block spoofed calls.
Despite these efforts, caller ID is not a reliable form of authentication and should not be trusted implicitly. Authorities advise verifying the identity of unexpected callers through independent means (e.g., hanging up and calling the organization back on a number you know to be genuine).