They are analog modems on a telephone line. There is no encryption at all, because they still need to be compatible with fax machines from the 1970s.
There was also an exploit where someone sent a manipulated image via fax, which would exploit an old bug in a jpg library that is used in the software stack, so you can run your own code.
They are analog modems on a telephone line. There is no encryption at all, because they still need to be compatible with fax machines from the 1970s.
There was also an exploit where someone sent a manipulated image via fax, which would exploit an old bug in a jpg library that is used in the software stack, so you can run your own code.