Can this logic with regard to checking Reverse DNS records be flawed?

For my web app, I hardcode a reverse DNS detection for common web crawlers. And for detecting them I use their Reverse DNS, which I always check whether it includes i.e. google.com. My questions would be:

Can this be a possible security f… Continue reading Can this logic with regard to checking Reverse DNS records be flawed?

How can you spoof you caller id but not using a voip (your carrier instead)?

My research:
I found this security stackexchange post but it didn’t answer my question.
I know that you can do similar things using astresik with voip provider.
I came up on o blog that explain that sim card is computer ect.. link
But can … Continue reading How can you spoof you caller id but not using a voip (your carrier instead)?

When GPS is spoofed in a smartphone, does this affect whatever is being monitored?

When GPS is spoofed in a smartphone, does this affect whatever is being monitored? Suppose I spoof the GPS on my smartphone, such as lazy Pokemon GO players do to play from their couch. Will this spoof be transmitted to a surveillance agen… Continue reading When GPS is spoofed in a smartphone, does this affect whatever is being monitored?