7 Tips To Avoid SIM Swap Attacks! What is SIM Swapping?
Ғылым және технология
SIM Swapping requires a savvy social engineer but also availability of personally identifying information. Learn how you can protect yourself from SIM swaps with these 7 tips!
#CyberSecurityAwarenessMonth
Special thanks to Crashplan for sponsoring this episode! Sign up for your own 1 month free trial at: www.anrdoezrs.net/click-918520...
Important links:
30 day security challenge: snubsie.com/30-day-security-c...
-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤
FOLLOW THE SOCIALS THINGS:
Support ➜ / shannonmorse
Buy Me a Coffee ➜ www.buymeacoffee.com/snubs
Twitter ➜ / snubs
Instagram ➜ / snubs
KZread ➜ kzread.info?s...
Website ➜ www.shannonrmorse.com
Amazon Associates ➜ amzn.to/2pHgf8T
My Amazon Influencer Page ➜ www.amazon.com/shop/shannonmorse
Other shows I work on ➜ kzread.info?sub_confi... and kzread.info?s...
Mail ➜ please email for mailing address
Email ➜ shannon@shannonrmorse.com
❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤
-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Пікірлер: 231
If a scammer phones up a Telco and says "I have had my phone stolen and I want to swap my phone SIM", the Telco support staff should call the number of the "stolen phone" to see who answers it. If the phone has not been stolen then the true owner of the phone will now be speaking to the Telco support staff member. Problem solved.
@ShannonMorse
3 жыл бұрын
If only telcos would do this before swapping the sims!
@aikafuwa7177
Жыл бұрын
That does not work for the paid bribed insider.
@Living_Dead_Girrl
Жыл бұрын
Plus due to the rampant data breaches, etc, nobody answers numbers they don't know anymore because they're usually scammers or robocallers. I'd say save the number for customer support in your contacts, but there's no knowing what number the actual dept or employee will call from. Then there's the fact that we sleep and do other activities where we have phone set to silent or can't be near our phone. That'd be a full time job just trying to catch that one call. Assuming they always use the "my phone was stolen" social engineering excuse, cell companies should require a police report first. Phones aren't cheap. For starters, best thing you can do use a service that limits it's SIM cards & doesn't do eSIM without getting their physical SIM first. Some service providers only sell their SIMs at one store chain, and that store won't sell them online. No matter what, you use this provider, someone's gotta go in person to buy the SIM where they'll be caught on surveillance cameras. It's a deterrent. There's also less data out their tying your identity to a pay as you go provider. They don't require SSNs or PID to activate a brand new SIM, and they do contact the prior service provider before they port that existing number. I recall it taking upwards of 3 hours dealing with CS when I switched to a pay as you go provider. I believe somebody tried to SIM swap me 2 days ago, because I got a text from customer service asking to rate their service or contact them if I need anything else. The text was legit, not phishing. So I immediately tried to login to my acct, but it kept giving an error that my acct was "invalid." Their site has become a nightmare, so it took a very long time to finally locate "forgot password" (it's not on login menu), which required me to 2FA from SMS several times to get there, and then again to select reset option. From there, they emailed a link to reset that expires in 10 min (wouldn't work with any DNS or browser ad/tracking blockers enabled), and yes, if your email's been hacked, this is extremely problematic, but they do continuously require SMS code authentication & I use an email proxy so no one can use that email address to login to the email itself. The site was buggy as hell, but I was finally able to change my password, pin, etc - and since I had to know my SIMs SN to activate, I saved it, and carrier showed my number's still on the same SIM. So, hacker waisted their time, and now my acct's on lockdown. In my case, I use a proxy email address that can't be used to login to the actual email acct. This "hidden" feature is avail free with free some email services, it's just not an advertised feature so you have to dig and it can't be an annoying process to set up. It's worth it given it helped me avoid a doomsday scenario when my extremely old email was compromised in multiple data breaches and there were tons of login attempts presumably to reset other acct passwords. I was able to keep the email without having to manually change email login on dozens of accts by creating a proxy email and swapping it to be primary, and then blocked logins from the compromised email address. For all important accts now, I use proxies for login and compartmentalize which email addresses I use for different security levels (i.e. banking, social media, cloud, personal, retailers, etc).
@gotdamnsoup2727
Жыл бұрын
@@ShannonMorse Message in a bottle..., Ive been social enginered, in sweden (didnt know they had customer support in swedish) I got hit by roaming mantis, cosmicstrand, both UEFI / lojax full control and a variant of xhelper. They have access over my gmail, and I cant do anything. Ive even tried installing linux with n external USB, but they have UEFI access so didnt succeed. Im alone here, so if someone see this. Please help me! they have control over my number with simcard jacking introduced after getting full access on one phone. Everything since rented out my appartment and they didnt pay rent so i cut internet, then I can see in the loggs (afterwards) tried to get free internet from me. That open the backdoor on my huw awei router and now my asus laptop, zenfone 9 , my girlfriends mac and her iphone. They have supershell access to this computer, and i dont even no if this comment will end up and your place shannon . But IF it do, please help me! i have lost everything and have nothing, i cant even pay my re nt. All accounts down. Im just a teacher and have been sick for 3 weeks now trying to solve this. But its not possible. If you help me I will be one of your paying subscriber forever. I worked with IT a long time ago (2011) I have done everything I know, but cant stop it. They just gaind more access, now having it all. THese 3 weeks of h ell making all my devices rooted with different malwares. DNS rerout, cookie poison, server cookie poison, everything. My m 4li is 1 a t u r ld o t1 with the last numbrs being the numbr equalent to letters. please somebody, help.
@gotdamnsoup2727
Жыл бұрын
Message in a bottle..., Ive been social enginered, in sweden (didnt know they had customer support in swedish) I got hit by roaming mantis, cosmicstrand, both UEFI / lojax full control and a variant of xhelper. They have access over my gmail, and I cant do anything. Ive even tried installing linux with n external USB, but they have UEFI access so didnt succeed. Im alone here, so if someone see this. Please help me! they have control over my number with simcard jacking introduced after getting full access on one phone. Everything since rented out my appartment and they didnt pay rent so i cut internet, then I can see in the loggs (afterwards) tried to get free internet from me. That open the backdoor on my huw awei router and now my asus laptop, zenfone 9 , my girlfriends mac and her iphone. They have supershell access to this computer, and i dont even no if this comment will end up and your place shannon . But IF it do, please help me! i have lost everything and have nothing, i cant even pay my re nt. All accounts down. Im just a teacher and have been sick for 3 weeks now trying to solve this. But its not possible. If you help me I will be one of your paying subscriber forever. I worked with IT a long time ago (2011) I have done everything I know, but cant stop it. They just gaind more access, now having it all. THese 3 weeks of h ell making all my devices rooted with different malwares. DNS rerout, cookie poison, server cookie poison, everything. My m 4li is 1 a t u r ld o t1 with the last numbrs being the numbr equalent to letters. please somebody, help.
In Malaysia, SIM card replacement requires walk-in to nearest mobile center, inserting the national ID to a validator device, scanning a thumbprint to validate ID ownership before proceeding to print the SIM card. New SIM Card registration requires a national ID or Passport for foreigner. Liability falls on the registrant if the number is used for criminal activities. You can keep same phone number even if you switch carriers
@SU-II
Жыл бұрын
@Faye Cushnie Seems like you are also still stuck in the 70s
Every time I think of security, I think of this: You are the weakest link. Humans should not be trusted with security of any kind because we are fallible and easily corruptible. SIM swap should not be allowed over the phone or email, only in person, face to face, complete a form and it must be signed by the customer, the agent and a higher up at the company. Companies should take responsibility for their failures in security. It astounds me on the lack of foresight when they hire people to work in an environment where they have access to personal information of people, yet they have ZERO security clearance.
@ShannonMorse
4 жыл бұрын
Yes!!! This!!! I completely agree with you.
@JohanlastZa
4 жыл бұрын
@@ShannonMorse With the increase in SIM swap fraud, people should also move away from OTP authentication and rather let them send the code request to a secure email. Another thing would be to use supplied security certificates on transactional devices which should remove the SIM swap problem.
@jamesedwards3923
4 жыл бұрын
More and more use prepaid phones. Your idea only works if you have a contract. Or if you can go into a store. Even then you have to have an 'account' most of the human race does not. I had a phone years ago. All I had to do was turn it on. I had a number.
@JohanlastZa
4 жыл бұрын
@@jamesedwards3923 Where I am from, if you do not use the number for 3 months, it is gone. Secondly, all numbers in use must be on the "RICA" system. All numbers are connected to a SIM, a person and that person's address. Unfortuantely only one bank here requires physical presence when activating cellphone banking with a working and registered SIM and phone and during setup the client's phone setup, a form is signed and finger prints taken. A really secure setup. If client's phone or SIM changes, these steps will need to be repeated. Prepaid and contract are all registered.
@jamesedwards3923
4 жыл бұрын
@@JohanlastZa Wow, you are way more secure than most of us.
I feel like this is similar to why we need to stop using SSNs as a national ID number
@Nylspider
3 жыл бұрын
Exactly SSN's aren't even secure
@Minecraft101ToonLink
2 жыл бұрын
Even a credit card’s card number by itself is more secure than a SSN because it has more digits.
@camaroman101
2 жыл бұрын
considering fingerprint scanners are in every phone, I feel like that would be much more secure
Just stumbled upon your channel since I've started to strengthen my security seriously. Great content. Thank you
Good list of tips! Ever since seeing the Threatwire video I’ve been worrying about this. Thanks for making this video!
Thank you for making this video. Much appreciated.
I would love to transition to not having a cell phone at all, and I would love to hear from you or others about ways to transact with banks and businesses and the world without owning a cell phone.
great vid thanks for explaining !
This is truly valuable content ~ thanks for what you do!
Excellent video. Well researched, thank you !
Wow that is a lot if information. I will have to watch a few times and take notes! Thank you.
Your video is the best I've seen on this subject. Thank you💓🙏
This is good advice. I'm leaving my browser open on this video and I'll watch it again but I plan on implementing much if not all of this. Thanks!
Excellent advice, thanks
Awesome video 🔥
Thank you for the help 🙏
Shannon, Thank You
Thank you Shannon for this much needed information. I am currently going through some troubles with every phone I get. For some reason I feel like I'm not doing something right from the time I turn the phone on until I break it or buy a new one. It's very frustrating. I just wanted to thank you for the work your doing and information you have made available.
@ShannonMorse
3 жыл бұрын
Absolutely! Happy to help!
@hunterthejokethegamerandst5567
2 жыл бұрын
@@ShannonMorse does encrypting your phone help?
Sharp lady and great advice. Not technical myself, I notice you have great color for your nails, they are short enough to indicate you work for a living. Best
@ShannonMorse
3 жыл бұрын
You can solder with long nails, FYI.
Thank you, please continue these videos!
@ShannonMorse
3 жыл бұрын
You got it!
Hey Shannon, I hope you do more videos like this even after this mini series is over! Threatwire isn’t often enough for me to get my Shannon-Tech fix. It’s been hard on me since Tekthing ended. 😉Seriously though, you’re one of my favorites and I love all your content. A++
@ShannonMorse
4 жыл бұрын
Thank you!! I'd love to do more security and privacy videos!
@jedimindtrickonyou3692
4 жыл бұрын
Yes, please! Your 30 day challenge you did a year or two ago sparked my interest in the subject. I view everything differently now and am in a much better position after implementing as much of the suggestions as possible. Thank you for that! 🙏🏻
Thank you so much for this.
Came here from Roberto and I really needed to know about this. Thanks for these tips!
Opened my eyes!
Thanks for the Tips! Roberto sent me and I'm glad I listened
@dilshanmaduranga6669
3 жыл бұрын
Me too
@nagamachiku8699
3 жыл бұрын
@@dilshanmaduranga6669 Me three...
I have a Google number that is tied to my phone so it’s time to get another Google number! Thank you for the info! I came here from Roberto’s channel.
Hi from 2021! I have been planning, dreaming, learning about starting a KZread channel but I'm a really private person and I have been so worried about safety. This video is really helpful, I took notes and I'm going to follow your advice. Thank you!
a little late to the watching this video! lol! I work in fraud for a big communication company and the biggest thing a person can do to protect them self is protect your phone number and your email. You give real good advice!!
@KRIS47GAMER
4 ай бұрын
I’m sure it’s happened to me mate
Thank you for this!!!
@ShannonMorse
11 ай бұрын
No problem 😊
Great tips. Now I’m nervous about someone stealing my phone number. 🤪
@ShannonMorse
4 жыл бұрын
You're likely fine as long as you use some of these tips and good internet hygiene!
@garynagle3093
4 жыл бұрын
Shannon Morse, I need to investigate the google phone tip for sure, and my replacing my mother’s maiden name with my favorite song phrase
@Kas_Styles
4 жыл бұрын
@@garynagle3093 you commenting that you should change it to your favorite song lyric is now info that someone could use. Another tip: never talk about what your Security answer is or what its about.
Roberto Blake suggested your channel. Thanks for this information.
Thanks!
Thank you for tips. Sadly I still need this information broken down simplifer as I am not tech savvy. Can you recommend a book or something - thanks!
Thanks! good stuff
@ShannonMorse
2 жыл бұрын
thank you!
Here's my tip after getting SIM swapped weeks after I switched to a new carrier: Request upgraded security on your account. That means that the carrier will disable you from accessing your account on their website to make any account changes. Your 8 digit PIN code won't work. The only way you can make changes to your account is to go in to a corporate location and show them your ID or provide an alpha numeric password that you set up when requesting the security upgrade.
Looks great
Thanks for this Ma'am :). Btw i really love your cute anime stuff at the back hehe.
@ShannonMorse
3 жыл бұрын
Thanks!
Very helpful
Very informative information indeed. Thanks for sharing. I will share this to my friends
You are a cute letting us know about this threats. I was hacked so many times. Last time I couldn't use my Facebook or WhatsApp sending OR receiving photos, videos or voice message. Thanks for your help. I am appreciating it.
Roberto Blake sent me here, this video was fantastic thank you!!!
Secret Questions are an excellent old fashioned tool for authentication. They are easy to change and easy to store in alternate locations. In an encrypted state of course.
@camaroman101
2 жыл бұрын
also only you would know some of them. Unfortunately people seem to be phasing them out.
@jamesedwards3923
2 жыл бұрын
@@camaroman101 Unfortunately.
AT&T wont make those changes without seeing your state DL. But the carrier should then be liable for not verifying the true identity of the customer!!! More law suits coming now doubt.
@jamesedwards3923
4 жыл бұрын
The problem is you may not always to be able to get to your provider. Life is problematic.
@jamesedwards3923
4 жыл бұрын
If you can find it in their: Public Bills. Contract. Customer Service Call. Etc. You have a law suite.
@jenjen3366
3 жыл бұрын
Oh yes much more lawsuits cali. NM. TX. Yep
Thank u..very helpful..
@ShannonMorse
2 жыл бұрын
Happy to help
At over seventy years of age it becomes difficult to jump over these high mental fences. When asked to choose three out of eight security question, I only knew one. ( this is the first one of your videos I have seen).
Thank you!!! If you stopped using SMS 2FA, wouldn't that completely eliminate the ability to SIM swap???
🤔many many thanks to you ...
Miss mamas came thru with all this Information ℹ️! Great video Totally explains why I don’t get half of the text messages I used too. Lol 😂 silly rabbit 🐰
My hacker also listens to my sim calls live distorts the line & drops it just to be annoying is this still a sim swap attack or is he using some sort of Tower near where i live to intercept the line?
Hi, Shannon. I have a question. Do I need each ubit key for one application or can I put multiple applications into 1 ubit key?
Is it advisable to use your channel email account to buy any video editing app or audio for your channel?
I dont how but in Turkey, Banks uses one time code and if sim card change new one they stop one time code until you call customer services or going to atm.
You can also ask a family member to get you a sim. This way, the phone number/plan you are using is under their name and not yours!
Hello - what is the liability for selling a SIM card not in use by your phone account anymore?
OMG .. I wonder how many people have changed there secret answer to " a scrub is a guy who can't get no love from me"
Its not clear to me that put a pin or passcode in the SIM card would avoid cloning the phone number. Because that PIN is for my physical SIM card, inside my phone. Does it sync to any SIM card created for that specific phone number?
Important question. To open up a new phone number for 2Auth they need my official name, which means that it will go to the white pages, and even if I never give my new number to anyone, a hacker could still find it on the white pages. Do you have a solution for that? Please help!
Hi, just a thought here, how about having another phone or with a dual sim phone have another sim purely for all finances, ie banks, crypto exchanges ect ect and not used for anything else, ie phone calls messages ect. And furthermore, on this phone have a sim pin/passcode?
This information is great. Too bad that the way I found this video is because I was SIM swapped and over $11,000 was stolen from me. But going for are, I will use some of these tips.
Google Voice, sounds good but who can trust Google?
You need to make longer videos. I like your videos, but I like longer ones.
A very comprehensive critique of sim swap security! Thank you!
In Australia, you only need DOB, address and phone number to sim port. Once a telco has had the request to port your number, they must do it by law, even if the authorised account holder tells them not to. The only way to protect yourself is to move house or change your phone number, or lie about your DOB, which apparently is an offence under the act.
Will a Yubi Key still work if your hacker is a mind reader i am not joking & can the Yubi key be cloned?
Domestic violence survivors are often victims. I have experienced every device I obtain hacked for many years and now sim swapped. Perpetrators work together and make it impossible for their victims to use technology without being hacked & cyberstalked. Sim swappers have turned off my phones. They also seem to enjoy having their victims use the victim phone while they watch and perpetrate all kinds of destructive acts against their victims. I tried only accessing my telecom account at their stores. Telecom employees copied my IDs many times. My service and accounts became even worse; with my identity seemingly stolen. How can a domestic violence and stalking survivor of extremely intelligent, high tech perpetrators possibly move forward??? 😓😓😓
I bought a ybi key over a year ago. Still don’t know how to use it
What about a private mail server with Google Authenticator?
Does the USB hardware key have a password as well to use it, for example if someone did steal it from you they would they still not be able to use the hardware usb key due to needing a password or is it just plug it in and it just does what it needs to do? Great video thank you so much.
@jedimindtrickonyou3692
4 жыл бұрын
I have a yubikey and you can enable a password for some of the key's features. You can actually store the same type of 2fa time based TOTP codes that authy uses on the yubikey and use yubico authenticator to view the codes. For that you can protect it with a password. For Fido U2F, which is the method you would use to register the key with your Google, Facebook, Twitter, etc account. For that, I don't think you can protect the yubikey with an additional password. But keep in mind it's a second factor, so they would need your login username + password + physical posession of your yubikey to gain access to your accounts and if they could get all 3 of those things from you, then they could probably steal that additional password too. If you're gonna buy a yubikey, you should ALWAYS buy two and register both of them with all the same accounts so that if you were to lose possession of one of them, you would still be able to access everything.
@jamesedwards3923
4 жыл бұрын
Look up the FIDO standard. Answers all your questions.
Thank You for All that you are doing for World Peace and for our Planet... Peace.. Shalom.. Salam.. Namaste .. 🙏🏻 😊 🌈 ✌🌷 ☮️ ❤️ 💐 🕊
Hi, Can you make a video about SIM LOCK, this feature available in Android and iPhone. How is the sim lock work? Would it prevent SIM SWAP? AND further more about Esim. Would Esim prevent sim swap since it's not a physical sim card? Thanks
If I get a new SIM Card and Phone Number, will that stop 'Spam Calls' ?
I have Google Voice configured on an OBi200 VOIP phone connected to my wifi.
@bana2s
4 жыл бұрын
For extra coolness, it’s connected to a red auto-dial phone. My family has a hotline to my cellphone.
@blomegoog
4 жыл бұрын
and how do you get SMS thru your OBI cordless I wonder
So how do they get your social medias info?
should I buy a second sim? or a thrid
Even if the scammers get the SIM card working on anew phone and they now have access to your apps, messages, emails, etc. how can they drain your bank accounts if they don’t know the usernames and passwords?
@ShannonMorse
4 ай бұрын
If you have account resets or password resets tied to your phone number, that can be used to bypass the original password. Because they would receive your text messages.
@solice8844
4 ай бұрын
@@ShannonMorse okay, now I get it. Thanks.
How about SimJacker where they just send you a hidden text message and take over your phone at the baseband level?
Ha-ha, so somewhere there in "advanced OmeriGa" one can call mobile provider and ask to switch SIM based on statement that the caller is a real owner of a "stolen" phone, even without presenting himself alive to the provider service center to prove the identity of a subject?
What about enable a PIN on the Sim?
About crashplan, what about privacy? Security?
@jamesedwards3923
4 жыл бұрын
Encrypt the files before you upload them. Problem more or less solved. VeraCrypt. PeaZip 7zip KeePass Password Safe
@jamesedwards3923
4 жыл бұрын
Which is why manual backups of data to the cloud is my preference. Whether you use a zero knowledge backup provider like spider oak. Or some other cloud service. If you encrypt the data with layers of encryption and multi factor efforts. The data should be reasonably secure. Encrypting a file in a simple encrypted file and then encrypting that file in another file. Is the easiest common sense approach. So even if an inside man compromises a cloud service and extract your encrypted file. They would have to attack all the layers of encryption. For example PeaZip allows for keyfile encryption. Typically most people do not use keyfiles for a zip file or a .7zip file. Which means a typical hacker will normally not account for that vector. Depending on the software applications. You can use key files or hardware keys. This is why you must actually sit and ponder how you are going to secure your data.
if someone called up and gave the wrong birthday or mothers middle/ maiden name or something that could not be remembered wrong and the company doesn't or can't report that to authorities they are partially/ unintentionally allowing ID theifs to incentivise their efforts. Collecting statistics like that might at least give some insight on how rampant ID theft is in different areas
warning: i tried setting up a pin on my unlocked iphone6. I turned on sim lock and it asked to enter a pin code. Entered my new code twice and said that it could not lock the sim. I then tried to disable sim lock and it asked for a PUK code. I have no memory of ever locking the sim on this phone and had never heard of it before this video so its highly unlikely the sim was locked already. I had to call tmobile for a PUK code. what a pain!
@Flippeh
3 жыл бұрын
The carrier has a default code. Google tells me that tmobile's default is 1234
How can we know or confirm that our sim is cloned by someone or not?
Roberto Blake sent me here
Great explanation and very useful tips; especially number 7. However, it seems like SIM swapping is not something hackers could get away with for a long time as I should almost immediately notice that my phone is no longer working. Or is there another more subtle way of getting away with this?
@uniquechannelnames
3 жыл бұрын
Its more like they can start attacking so fast oncce they have the number they hope you take at least 15-30 mins to recover. That way they can exploit your email's SMS recovery or bank SMS recovery and by then theyre into all the important accounts of yours. If they lose the phone number after that its not a big deal because they already got the access and have changed passwords etc... Especially if you have crypto coins somehow linked thru emails that get compromised. It can be devastating. It isnt meant to be a long con. It's more like "swap it, now exploit as much as possible as fast as possible"
0:07 😮😮😮
Also, stop putting one's life online. This makes social engineering easier because a person would not have to speak to that person to get what they want
@ShannonMorse
3 жыл бұрын
agree
How to Avoid Getting hacked?
Mam i have a question please respond if you see this. I just activated a sim against my identity. Please respond to my query i will explain more.
Better: Park that phone and get a life. (I.e., stay off social media.) And use a laptop/desktop when you want or need to be online - those are 10,000x better than a phone.
@ShannonMorse
3 ай бұрын
Even BETTER... Throw away ALL of your technology and go live in a forest!!! 😁
But I don't get it. Wouldn't the persons phone they just called customer service to sim swap and activate their phone cause the persons phone that was swapped service to shut down? Thus, disabling the victims phone would suggest they wouldn't try to use any 2FA push and making any intercepts unlikely.
@ShannonMorse
3 ай бұрын
When I switch my sim or esim to a new phone, my old phone never shuts down. The ONLY thing that happens is the little icon at the top changes from showing me 5g to showing me wifi only. If someone doesn't notice that they'd have no clue their phone number was swapped.
@BOOSTEDDUDE
3 ай бұрын
Oh wow, That's hard to believe. Thanks the info@@ShannonMorse
@ShannonMorse
3 ай бұрын
Why is it hard to believe? I review phones and swap my sims in between them at least once a month. I've also don't over 2500 videos about sec/priv (my OG channel is called Hak5). I think I know what I'm talking about.
What to do after you got scammed, I lost over $1000.
Im here, but the damage has already been done. Heart broken
@ShannonMorse
2 жыл бұрын
Oh no!
@BorisBidjanSaberi11
2 жыл бұрын
What happened?? It happened to me and I got some accounts back and am trying to protect everything
I think Authy requires you to use a phone number--which defeats the purpose of true 2FA.
@ShannonMorse
3 жыл бұрын
It does, but luckily there are tons of alternatives (my favorite being hardware keys, of course.). I get why they do it - it makes Authy more user-friendly because you can put it on multiple devices or reinstall it if you lose your device... but yes, that does still open up your Authy account to potential vulnerabilities in security. You CAN turn off "Multi-device" in the settings and you CAN add PIN and fingerprint protection to the app so even if someone sim swapped you, they'd still be locked out without your PIN. That's what I'd do if I switched phones a lot and used Authy.
I had a pass code and they still have my chip away
Just happened to me… 2021
Using Google voice for authentication is a great tip!
How does sim pin prevent sim swab ?
@uniquechannelnames
3 жыл бұрын
Ostensibly, if you have a PIN set up and someone calls to change your sim to another card, they will have to give the correct PIN. BUT do not put any faith in pins, because carrier agents have the power to go around PINs, if the criminal can give enough of your personal information to convince the agent, then theyll void the PIN and swap the sim over. Best course of action is to simply give no power to someone who gains your phone number. No reocvery sms, no sms 2FA, nothing for any important accounts.
@uniquechannelnames
3 жыл бұрын
Oh a SIM PIN. I thought you meant a PIN on your phone company account.
Mam please tell me that a person from Orlando Florida is asking me to buy a new sim on my name and insert In a phone so that he could give me an iPhone as GIVEAWAY ? Help me mam
❤❤😊sorry about that but that all factual. The companies allowing this sort of behaviour is sad. When I see my folks getting a new phone only to notice it hacked. I can't even tell them. These companies are disgusting protected behaviour ❤