RCS allows hackers to impersonate subscribers by spoofing their IP address

RCS allows hackers to impersonate subscribers by spoofing their IP address