Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Phone support is a good example. You may have 20 support reps that have unique numbers, but when they call out to you, the number that shows up is the support dispatch number.

Support dispatch may be subcontracted out to an entirely different company (that may change over the months/years), so you'd still need to ability to spoof numbers you technically don't own.

I agree there needs to be more controls and regulations in place though. The status quo is unsustainable.



Thank you for explaining me :)




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: