<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A Defensive Computing Checklist in The Lounge</title>
    <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/649757#M12500</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/3757"&gt;@Luddite&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;As far as banks/PayPal goes 2FA is OFF unless Authy is accepted ...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;But Authy is owned by Twilio. A media/communications company which makes a lot of money through "platform evangelism" - basically a data broker interested in selling their datamine to the highest bidders.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Feb 2021 21:02:57 GMT</pubDate>
    <dc:creator>Korth</dc:creator>
    <dc:date>2021-02-02T21:02:57Z</dc:date>
    <item>
      <title>A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647153#M12407</link>
      <description>&lt;P&gt;I came across this helpful information that I think everyone should read through. We are all involved in some kind of online activities every day and staying safe is very important than you think.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Link:&amp;nbsp;&lt;A href="https://defensivecomputingchecklist.com/" target="_blank"&gt;Defensive Computing Checklist&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Here are some key areas that needs attention as some of us sees it occur on Public Mobile every now and then.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;PASSWORDS&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Never re-use passwords&lt;/STRONG&gt;. We all need dozens or hundreds of passwords, yet we can remember just a few. Nonetheless, this is a very important rule. Companies are hacked all the time, leaking passwords that bad guys then try at other systems/websites. This article,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.csoonline.com/article/3448558/credential-stuffing-explained-how-to-prevent-detect-and-defend-against-it.html" target="_blank"&gt;Credential stuffing explained: How to prevent, detect and defend against it&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Lucian Constantin Oct 2019) notes that the automated use of stolen usernames and passwords to access accounts is low risk, high reward for cybercriminals.&lt;/LI&gt;&lt;LI&gt;Almost every computer nerd recommends password management software. I disagree. Techies that say this are thinking inside the box and over valuing the need for randomness in passwords. They also underestimate the hassle of new software for non techies.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Try using a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;formula&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to generate your passwords. A simple formula is to start every password with the same string of characters. Then, you can chose very simple passwords to append to the constant beginning. For example, a baseball fan might start every password with "BaseballRules!" Then, if "jungle" was their password for Amazon.com, the actual password is "BaseballRules!jungle" And, all you would have to remember would be that your Amazon password is "jungle". Pretty easy. Amazon. Jungle. And, the miserable password "book" for Barnes and Noble, becomes a good password ("BaseballRules!book") when run through the formula. Perhaps the worst password is the word password. But, as Leo Notenboom&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://askleo.com/the-state-of-passwords-in-2019/" target="_blank"&gt;points out&lt;/A&gt;, "1234 password 1234" is a pretty good password. It's also easy to remember. There's a formula: start and end every password with "1234". I expanded on the use of formulas in my Aug. 2019 blog&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.michaelhorowitz.com/BestPasswordAdvice.php" target="_blank"&gt;The world's BEST password advice&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;You can check if any of your passwords have leaked in a data breach at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://haveibeenpwned.com/Passwords" target="_blank"&gt;haveibeenpwned.com/Passwords&lt;/A&gt;. Of course, someone else may have been using the same password. The best passwords have never leaked and a formula (above) should produce globally unique passwords fairly easily.&lt;/LI&gt;&lt;LI&gt;Storing passwords: Using a formula lets you write down just the easy/right part of the password and still be secure. If someone saw your password list and read that "book" was your Barnes and Noble password, it would be useless without the formula. Passwords written on paper can not be hacked; just be sure to xerox the list every now and then in case you lose it.&lt;/LI&gt;&lt;LI&gt;Traveling passwords: Paper passwords work everywhere, no matter the device, the Operating System or the software being used. I use a password manager and its useless on a Chromebook running in Guest mode which is where I do my sensitive transactions.&lt;/LI&gt;&lt;LI&gt;All that said, no single approach is appropriate for everyone.&lt;/LI&gt;&lt;LI&gt;Some passwords are much more important than others. Which, of your many passwords, would be the worst for bad guys to obtain? Keep those passwords off your computers. Store them on multiple pieces of paper in multiple places. Or, store them on a USB flash drive which is rarely connected to a computer.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;STRONG&gt;SIM SWAP&lt;/STRONG&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;A SIM swap is Identity Theft in which bad guys steal your mobile phone number and get it assigned to one of their phones. They do this because a phone number is often used to prove identity, with forgotten passwords. Other terms for this are SIM Hijacking and a port-out scam.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;First signs: A few people have noted that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://medium.com/coinmonks/the-most-expensive-lesson-of-my-life-details-of-sim-port-hack-35de11517124" target="_blank"&gt;the first sign of trouble&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;was no cell reception on their phone. For one person, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.vice.com/en_us/article/neax4q/someone-hacked-my-t-mobile-account-and-t-mobile-wont-talk-about-it" target="_blank"&gt;first hint of trouble&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;was a text message from T-Mobile about a call to them that he did not make.&lt;/LI&gt;&lt;LI&gt;Defense: A phone number from TextNow is a safer way to use a phone number for 2FA. For more see the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://defensivecomputingchecklist.com/#hidephonenum" target="_blank"&gt;Phone Number Hiding&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;topic. This is my idea, I have not seen anyone else suggest it.&lt;/LI&gt;&lt;LI&gt;Defense: Have the customer service number(s) for your cell company saved on your phone. Also save other information that could prove your identity to the cell company such as the credit card used to pay the bill, the date the account was opened, etc. And, save everything you need to logon to their website.&lt;/LI&gt;&lt;LI&gt;Defense: To defend against SIM swaps, you can create a security code with your cellphone provider. This code needs to be provided over the phone, or in person at a store, before account changes are made. T-Mobile sometimes calls it an Account PIN, sometimes they call it a Port Validation feature (see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.t-mobile.com/customers/secure" target="_blank"&gt;Protect against phone number port-out scams&lt;/A&gt;). Verizon calls it both an Account PIN and a Billing Password. AT&amp;amp;T calls it a Security Passcode.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.wired.com/story/sim-swap-attack-defend-phone/" target="_blank"&gt;How to Protect Yourself Against a SIM Swap Attack&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by Brian Barrett in Wired (Aug. 2018) has details on how to setup the extra PIN code for each cellphone company.&lt;/LI&gt;&lt;LI&gt;Defense:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.tomsguide.com/us/att-port-out-scam-warning,news-26707.html" target="_blank"&gt;How to Stop Your Mobile Number from Being Hijacked&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by Paul Wagenseil (March 2018). Most victims seem to use T-Mobile. AT&amp;amp;T has two defenses: both a passcode and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.att.com/esupport/article.html?_escaped_fragment_=/wireless/KM1051397#!/wireless/KM1051397" target="_blank"&gt;Extra Security&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to enforce the use of the passcode.&lt;/LI&gt;&lt;LI&gt;T-Mobile Defense:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.vice.com/en_us/article/ywa3dv/t-mobile-has-a-secret-setting-to-protect-your-account-from-hackers-that-it-refuses-to-talk-about" target="_blank"&gt;T-Mobile Has a Secret Setting to Protect Your Account From Hackers That It Refuses to Talk About&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by Lorenzo Franceschi-Bicchierai for Vice (Sept 2019). A feature called NOPORT requires customers to physically come to a store and present a photo ID in order to request their number to be ported out to a different carrier or a new SIM card. This is separate and distinct from their Port Validation.&lt;/LI&gt;&lt;LI&gt;Verizon Defense: Call *611 and ask for a Port Freeze on your account (from&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.cnet.com/how-to/sim-swap-fraud-how-to-protect-your-phone-number-from-being-stolen/" target="_blank"&gt;here&lt;/A&gt;. Their website offers Two Factor Authentication which they also call Enhanced authentication. But it is only SMS. And even when its off, it is on (personal experience). I tried to turn it on (Jan 2020) and it broke the Verizon wireless website.&lt;/LI&gt;&lt;LI&gt;Poor defense: The PIN code defense is far from perfect. Brian Krebs&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://krebsonsecurity.com/2018/11/busting-sim-swappers-and-sim-swap-myths/" target="_blank"&gt;wrote&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Nov. 2018) that there is no defense against malicious employees of the cellphone company. He also wrote about&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://krebsonsecurity.com/2018/08/hanging-up-on-mobile-in-the-name-of-security/" target="_blank"&gt;lazy employees&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;who ignore the system. Matthew Miller had his T-Mobile phone number&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.zdnet.com/article/how-i-survived-a-sim-swap-attack-and-how-my-carrier-failed-me/" target="_blank"&gt;stolen from him twice&lt;/A&gt;, despite having a PIN code on file. He writes that T-Mobile has two PIN codes, one for when you call into customer service, and another port validation PIN (6 -15 digits). After reading his story, you might want to avoid T-Mobile entirely. Then too, the TrickBot malware is known to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.secureworks.com/blog/trickbot-modifications-target-us-mobile-users" target="_blank"&gt;modify the signon page&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for cellphone companies to steal these pin codes. (Secureworks Aug. 2019)&lt;/LI&gt;&lt;LI&gt;Defense: If you use either AT&amp;amp;T or T-Mobile, and your PIN(s) were set prior to August 2018, change the PIN(s). In August 2018 were learned that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.vice.com/en_us/article/a3qpk5/t-mobile-hack-data-breach-api-customer-data" target="_blank"&gt;T-Mobile was hacked&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and bad guys stole their customer billing information. In the same month, we learned that both AT&amp;amp;T and T-Mobile&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.engadget.com/2018/08/25/t-mobile-att-pin-vulnerability/" target="_blank"&gt;had their customer PINS exposed&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to the world.&lt;/LI&gt;&lt;LI&gt;Defense: Use a land line for two factor authentication rather than a cellphone number, if possible. Rather than a text, the company calls you and speaks the temporary code. Apple supports this. A similar option,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.vice.com/en_us/article/zm8a9y/how-to-protect-yourself-from-sim-swapping-hacks" target="_blank"&gt;championed by Lorenzo Franceschi-Bicchierai&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(July 2018) is a Google Voice phone number.&lt;/LI&gt;&lt;LI&gt;Defense: In Nov. 2018, Joseph Cox of Vice, suggested dedicating an iPod Touch to using Signal for secure phone calls. It's Wi-Fi only, and you can add a VPN for still more security. See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.vice.com/en_us/article/439dk9/how-to-use-ipod-touch-secure-device-instead-of-phone" target="_blank"&gt;How to Use an iPod Touch as a Secure Device Instead of a Phone&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;Immediately Afterwards: check that you still have access to your most important accounts. Email, bank, credit cards, etc.&lt;/LI&gt;&lt;LI&gt;Afterwards: The US Federal Trade Commission runs identitytheft.gov&amp;nbsp;where you can both report the identity theft and learn how to recover from it.&lt;/LI&gt;&lt;LI&gt;Defending email from password resets: ProtonMail can block all password resets. In the web interface, click Settings and there is an option to "Allow password reset". Tutanota does not allow two factor authorization with text messages, they only support the stronger options: Time Based Onetime Passwords (TOTP) and physical keys like Yubikey. In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://defensivecomputingchecklist.com/#email2" target="_blank"&gt;Email&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section, I discuss using multiple email addresses. This avoids having too many eggs in any one basket, should an email account get hacked. Consider that email may well be important enough to pay for, if for no other reason than to get tech support when things go bad. I suggest ProtonMail, Mailbox.org or Tutanota.&lt;/LI&gt;&lt;LI&gt;Background: Much of the world has&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.wired.com/story/sim-swap-fix-carriers-banks/" target="_blank"&gt;fixed this problem&lt;/A&gt;, but the US remains vulnerable.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://krebsonsecurity.com/2019/03/why-phone-numbers-stink-as-identity-proof/" target="_blank"&gt;Why Phone Numbers Stink As Identity Proof&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by Brian Krebs (March 2019).&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.zdnet.com/article/wave-of-sim-swapping-attacks-hit-us-cryptocurrency-users/" target="_blank"&gt;Wave of SIM swapping attacks hit US cryptocurrency users&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by Catalin Cimpanu for ZDNet (June 2019).&lt;/LI&gt;&lt;LI&gt;Lawsuits:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.vice.com/en_us/article/3kxy7w/atandt-faces-new-dollar18-million-lawsuit-over-sim-hijacking-attack" target="_blank"&gt;AT&amp;amp;T Faces New $1.8 Million Lawsuit Over Sim Hijacking Attack&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by Karl Bode (Oct 2019). This is just the latest in a series of lawsuits attempting to hold cellphone carriers accountable. A subscriber had both his identity and life savings stolen via SIM swap. A different subscriber sued AT&amp;amp;T last year for $220 million. T-Mobile was also sued last year.&lt;/LI&gt;&lt;LI&gt;Things are bad:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://krebsonsecurity.com/2020/01/senators-prod-fcc-to-act-on-sim-swapping/" target="_blank"&gt;Lawmakers Prod FCC to Act on SIM Swapping&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Brian Krebs Jan 2020). The Republican FCC protects the cell companies, not consumers. Some Democrats in Congress are mad. Other countries protect consumers.&lt;/LI&gt;&lt;LI&gt;Things are bad: A study by researchers at Princeton University:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.issms2fasecure.com/" target="_blank"&gt;An Empirical Study of Wireless Carrier Authentication for SIM Swaps&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Jan 2020). Quoting: "We examined the authentication procedures used by five prepaid wireless carriers when a customer attempts to change their SIM card, or SIM swap. We found that all five carriers use insecure authentication challenges that can easily be subverted by attackers." See also a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://twitter.com/random_walker/status/1215689116253290501" target="_blank"&gt;Twitter thread&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by Arvind Narayanan.&lt;/LI&gt;&lt;LI&gt;Things will only get worse:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.vice.com/en_us/article/5dmbjx/how-hackers-are-breaking-into-att-tmobile-sprint-to-sim-swap-yeh" target="_blank"&gt;Hackers Are Breaking Directly Into Telecom Companies to Take Over Customer Phone Numbers&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by Joseph Cox (Jan 2020). Bad guys are using RDP to directly access the internal systems of T-Mobile, AT&amp;amp;T and Sprint to do their own SIM swaps. Bribing employees is so last year.&lt;/LI&gt;&lt;LI&gt;One guys story:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.zdnet.com/article/sim-swap-horror-story-ive-lost-decades-of-data-and-google-wont-lift-a-finger/" target="_blank"&gt;SIM swap horror story: I've lost decades of data and Google won't lift a finger&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;By Matthew Miller of ZDNet (June 2019). This should convince people to take defensive steps. After getting control of his phone number, bad guys used it change the password on his Google and Twitter accounts and used his bank account to buy $25,000 of Bitcoin.&lt;/LI&gt;&lt;LI&gt;Another guys story:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.wired.com/story/jack-dorsey-twitter-hacked/" target="_blank"&gt;How Twitter CEO Jack Dorsey's Account Was Hacked&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Wired Aug. 2019) A SIM swap gave the bad guys access to his phone number. Then, they sent texts to his Twitter account, which appeared as Tweets, without needing to know his Twitter password.&lt;/LI&gt;&lt;LI&gt;Big picture. As a rule, adding two factor authentication (2FA) makes an account more secure. But, in mid-2019 a couple techies wrote about being victimized by SIM swaps (articles are linked above), which, in turn, made it possible for bad guys to change many of their passwords. In these cases, the use of 2FA made them vulnerable. For more on the pros/cons of 2FA see the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://defensivecomputingchecklist.com/#twofactor" target="_blank"&gt;Two Factor Authentication&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section.&lt;/LI&gt;&lt;LI&gt;What to expect: In June 2019, I tried to add Extra Security to an AT&amp;amp;T mobile phone number. The web page explaining exactly what this does was broken, so I don't know what it really does. Also, the system is poorly designed. When I first signed in to the AT&amp;amp;T website it sent a text with a one-time code to the phone. Had I been a victim of SIM swapping, this would have locked me out of the website. Dealing with AT&amp;amp;T is hard, you need to keep track of a userid (for which there are two definitions) a password, an Access ID (beats me), an email address, a security passcode and two security questions. When I got in to the website, it forced me to pick two new security questions even though I had already set this up long ago. Why? It didn't say. To add the mythical Extra Security: click on your first name is the top menu bar (on the right), then Profile, then Sign-in Info. Perhaps chose a particular phone number. Then, click on Manage Extra Security in the Wireless passcode section. Then turn on the checkbox for Add Extra Security to my account. Then enter your passcode. Whew.&lt;/LI&gt;&lt;LI&gt;What to expect: In July 2019, I changed the passcode on an AT&amp;amp;T mobile phone number. The process starts by logging in to &lt;A href="http://www.att.com/wireless/" target="_blank"&gt;www.att.com/wireless/&lt;/A&gt; which includes entering a code sent to the phone via a text message. Then, click on the account holder's first name in the upper right corner -&amp;gt; Profile -&amp;gt; Big box for SignIn Info -&amp;gt; click on the "Get a new passcode" link -&amp;gt; enter the last 4 digits of the social security number and the zip code -&amp;gt; then get a text message with another temporary code -&amp;gt; enter this code -&amp;gt; then, finally enter the new passcode. What is a valid passcode? They don't say. Must it be numeric? How long can it be? None of your business. At the end, you get another text message that the code was changed.&lt;/LI&gt;&lt;LI&gt;Defense:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://medium.com/mycrypto/what-to-do-when-sim-swapping-happens-to-you-1367f296ef4d" target="_blank"&gt;The SIM Swapping Bible: What To Do When SIM-Swapping Happens To You&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by CipherBlade and MyCrypto (June 2019). Overwhelming article.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI-SPOILER&gt;</description>
      <pubDate>Wed, 27 Jan 2021 01:28:25 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647153#M12407</guid>
      <dc:creator>NDesai</dc:creator>
      <dc:date>2021-01-27T01:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647256#M12412</link>
      <description>&lt;P&gt;Awesome article, sir, excellent work!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Though a lot of specific examples given for T-Mobile, AT&amp;amp;T, Verizon ... and none for Public Mobile?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2021 11:09:11 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647256#M12412</guid>
      <dc:creator>Korth</dc:creator>
      <dc:date>2021-01-27T11:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647278#M12413</link>
      <description>&lt;P&gt;This is the one that I've been wondering about:&lt;/P&gt;&lt;P&gt;Things will only get worse:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.vice.com/en_us/article/5dmbjx/how-hackers-are-breaking-into-att-tmobile-sprint-to-sim-swap-yeh" target="_blank" rel="nofollow noopener noreferrer"&gt;Hackers Are Breaking Directly Into Telecom Companies to Take Over Customer Phone Numbers&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;by Joseph Cox (Jan 2020). Bad guys are using RDP to directly access the internal systems of T-Mobile, AT&amp;amp;T and Sprint to do their own SIM swaps. Bribing employees is so last year.&lt;/P&gt;&lt;P&gt;-----------&lt;/P&gt;&lt;P&gt;Aside from data breaches...&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2021 14:32:37 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647278#M12413</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-01-27T14:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647843#M12425</link>
      <description>&lt;P&gt;it makes me a little discouraged when I see a moderators name with ?_NBA at the end of it. lol are you kidding me?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 01:05:43 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647843#M12425</guid>
      <dc:creator>gpixel</dc:creator>
      <dc:date>2021-01-29T01:05:43Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647864#M12429</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/131265"&gt;@gpixel&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;it makes me a little discouraged when I see a moderators name with ?_NBA at the end of it. lol are you kidding me?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Huh? I haven't seen this. Where did you see this?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 03:07:50 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647864#M12429</guid>
      <dc:creator>Korth</dc:creator>
      <dc:date>2021-01-29T03:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647880#M12430</link>
      <description>&lt;P&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/10616"&gt;@Korth&lt;/a&gt;&amp;nbsp;I saw it this afternoon. I should of took a screenshot.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 03:56:24 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/647880#M12430</guid>
      <dc:creator>gpixel</dc:creator>
      <dc:date>2021-01-29T03:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/648652#M12474</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/131265"&gt;@gpixel&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/10616"&gt;@Korth&lt;/a&gt;&amp;nbsp;I saw it this afternoon. I should of took a screenshot.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/172764"&gt;@natan_NBA&lt;/a&gt;&amp;nbsp;Are you a NBA fan?&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":basketball:"&gt;🏀&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Jan 2021 00:59:39 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/648652#M12474</guid>
      <dc:creator>NDesai</dc:creator>
      <dc:date>2021-01-31T00:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/649336#M12490</link>
      <description>&lt;P&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/5106"&gt;@NDesai&lt;/a&gt;&amp;nbsp; Lots of food for thought; thanks. Really like the long password with unique endings, especially combined with password manager so I don't have to type it all.&lt;/P&gt;&lt;P&gt;As far as banks/PayPal goes 2FA is OFF unless Authy is accepted; plus we have bank only passwords stored nowhere electronically.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2021 19:42:48 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/649336#M12490</guid>
      <dc:creator>Luddite</dc:creator>
      <dc:date>2021-02-01T19:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/649450#M12492</link>
      <description>&lt;P&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/3757"&gt;@Luddite&lt;/a&gt;&amp;nbsp;that's right! gotta do it old school... no tech.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 00:32:04 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/649450#M12492</guid>
      <dc:creator>gpixel</dc:creator>
      <dc:date>2021-02-02T00:32:04Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/649595#M12497</link>
      <description>&lt;P&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/131265"&gt;@gpixel&lt;/a&gt;&amp;nbsp;sometimes the old way are the best ways, if it aint broke then why fix it right?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 15:49:59 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/649595#M12497</guid>
      <dc:creator>stevenanto</dc:creator>
      <dc:date>2021-02-02T15:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: A Defensive Computing Checklist</title>
      <link>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/649757#M12500</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://productioncommunity.publicmobile.ca/t5/user/viewprofilepage/user-id/3757"&gt;@Luddite&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;As far as banks/PayPal goes 2FA is OFF unless Authy is accepted ...&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;But Authy is owned by Twilio. A media/communications company which makes a lot of money through "platform evangelism" - basically a data broker interested in selling their datamine to the highest bidders.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 21:02:57 GMT</pubDate>
      <guid>https://productioncommunity.publicmobile.ca/t5/The-Lounge/A-Defensive-Computing-Checklist/m-p/649757#M12500</guid>
      <dc:creator>Korth</dc:creator>
      <dc:date>2021-02-02T21:02:57Z</dc:date>
    </item>
  </channel>
</rss>

