• shortwavesurfer
    link
    fedilink
    English
    arrow-up
    25
    ·
    5 months ago

    And this is why smart people don’t use text message to factor authentication, if at all possible. App based OTP is much safer

      • shortwavesurfer
        link
        fedilink
        English
        arrow-up
        4
        ·
        5 months ago

        Exactly. I don’t have a physical key because I would want one that has open source hardware and software.

        • /home/pineapplelover@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          5 months ago

          I believe Solokey is a brand that makes open source hardware keys.

          Edit: they might only be fido 2 level 1 and not level 2 like yubikey

          Edit 2: apparently there’s also openkey and nitrokey so those are some more options for you.

          • shortwavesurfer
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 months ago

            Thanks, I will check them out, though, that only being level 1 could be a problem.

    • PlantObserver@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      5 months ago

      I wish the companies that decide to only allow SMS 2FA (or none at all) will fucking realize this sooner rather than later

    • PipedLinkBot@feddit.rocksB
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      5 months ago

      Here is an alternative Piped link(s):

      a video

      Piped is a privacy-respecting open-source alternative frontend to YouTube.

      I’m open-source; check me out at GitHub.

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    3
    ·
    5 months ago

    This is the best summary I could come up with:


    The US may have uncovered the nation’s largest “SIM swap” scheme yet, charging a Chicago man and co-conspirators with allegedly stealing $400 million in cryptocurrency by targeting over 50 victims in more than a dozen states, including one company.

    Once the swap occurs, the bad actor can defeat multi-factor authentication protections and access online accounts to steal data or money.

    Powell’s accused crew allegedly used identification card printers to forge documents, then posed as victims visiting Apple, AT&T, Verizon, and T-Mobile retail stores in Minnesota, Illinois, Indiana, Utah, Nebraska, Colorado, Florida, Maryland, Massachusetts, Texas, New Mexico, Tennessee, Virginia, and the District of Columbia.

    When Powell’s alleged scheme began in 2021, the FBI issued a warning, noting that criminals were increasingly using SIM-swap attacks, fueling total losses that year of $68 million.

    Since then, US law enforcement has made several arrests, but none of the uncovered schemes come close to the alleged losses from the thefts Powell’s crew are being accused of.

    In October, the Department of Justice sentenced a hacker, Jordan Dave Persad, to 30 months for stealing nearly $1 million from “dozens of victims.”


    The original article contains 846 words, the summary contains 185 words. Saved 78%. I’m a bot and I’m open source!

  • CaptainBasculin@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    5 months ago

    I’ve seen the sole examples of the sim swap attack happening in US. Has it ever happened in other countries?