Feds Warn SMS Authentication Is Unsafe After ‘Worst Hack in Our Nation’s History’


in reply to someguy

Absolutely. They were so arrogant they never thought it would happen to us. After all, we are in charge of our own networks so why would we expect the enemy to be at the gates? Let's make those gates out of cardboard so it's easier to spy on everyone.

Of course then you have things like CALEA mandating a back door, you have cheap telecom companies that will happily buy cheap lowest bidder Chinese hardware and install it "everywhere* without concern for security (after all, it's not their data being stolen) and now the enemy isn't just at the gates but inside the walls.

A decade ago, making sure the feds could read everyone's mail was the national security priority. Suddenly when the Chinese can read everyone's mail, good security is the national security priority.

It's too bad there was no way to predict this in advance. Oh wait...

in reply to frostysauce

en.m.wikipedia.org/wiki/SMS_sp…

So, it's not that the message itself is insecure, but the inability to verify the sender makes phishing attacks possible or similar things. I get a text from a random number saying "click this link to pay your bill!" And I don't have any way to trust its legit.

SIM swaps make it so people can take over your phone number temporarily and then generate 2fa requests to gain access to accounts. Doing the swap usually involves bribing someone or gaining access to a providers database by other means, but its been done a lot.

There are ways to prevent this, but the most straight forward is using a MFA app. Barring that 2FA via email is the next best thing.

in reply to frostysauce

I'm not a security expert so my ability to explain is limited, but no, emails have long used encryption protocols like SSL to prevent such problems. However, your email provider may scan and read your emails. That's not much different than a text message service reading those messages, but you can choose your provider. From what I can tell proton.me is the way to go for resolving that issue - they provide encryption which prevents their own machines and employees from being able to read your messages and other data. Otherwise, your email is basically as secure as your passwords are.
in reply to return2ozma

I wish Signal stopped using it. I know you can set a Signal PIN but a lot of the non-techy friends I speak to on Signal probably wouldn't think to, or look through the settings (not that you need to be "techy" to set it, but you know the kind of learned helplessness most people have about tech). At least a prompt for all users to set an account PIN so their account can't just be stolen by anyone with their SIM card.
in reply to Scolding7300

RCS doesn't really do a whole lot of anything. It's a step up from SMS/MMS, but not by much.

All the features people think they mean when they're talking about RCS are proprietary Google extensions that only work if you go through Google's servers. They're basically exactly the same as Apple putting iMessage on top; Apple just brags about it while Google tries to trick you into thinking incompatibility is someone else's fault for not giving them control.

in reply to AA5B

That's precisely what E2EE is supposed to prevent. If the phone company gets hacked, attackers can see all the traffic going through all of their towers, so if everything is encrypted before getting to the towers, they can't see the contents. IIRC, metadata like phone numbers can be read though, so they can see who you're talking to, but they can't see what you're saying.

The phone manufacturer, however, can see everything before it's encrypted and after it's decrypted.

in reply to sunbeam60

I.e. this article from October: techradar.com/pro/chinese-hack…

In an all too predictable turn of events, Salt Typhoon, an infamous Chinese state actor, has reportedly hijacked government systems to breach several American broadband providers and gain access to the interception portals required by US law.
in reply to capital

Yeah, I don't get it. I go out of my way to provide sources even before being asked.

What's really frustrating is when others users criticize me for providing evidence that could be used to counter my claim. I'm not trying to win arguments, I'm trying to show my work so others can correct me if I missed something. I'm here to learn and educate, in that order, yet so many only seem interested in engaging in discussion that jives w/ their existing opinions. That was a problem on Reddit too, but at least someone would chime in w/ sources much of the time.

in reply to sugar_in_your_tea

@sugar_in_your_tea I'm entering a conversation without reading the other posts, so I apologise. I just want to say that I deeply admire your approach. It is mine as well. I will begin a discussion with a view that I hold, but if someone is able to prove me wrong, I will admit it and thank him. And if my sources should be used to prove his point, then either I didn't read well enough or it's simply a line of thought that I hadn't considered. But I love civil discussions without wasting time on personal attacks and whatnot, and it seems you're the same way.

Technology reshared this.

in reply to return2ozma

Oh it turns out we needed NSA to do its actual fucking job after all rather than holding onto exploits for the surveillance state.

Now — for the second time — we have an adversarial administration eager to weaponize government departments while Americans are vulnerable. Why? Because America is the good guys and would never abuse its extrajudicial powers (say, by detaining, rendering and torturing Americans with names similar to those of POIs.)

We could have had twenty-four years of robust communications security developments if NSA didnt sell the public out like Judas.

This entry was edited (11 months ago)
Unknown parent

lemmy - Link to source

Routhinator

The problem for me is that most Canadian Banks give you the choice of SMS or their shitty adware filled bank app that relies on Google Play Services and wont implement TOTP so I can use a true MFA app. And Im done with being forced to accept user policies I don't agree with to do shit, and most of all done with Google Play Services on my device 😑
in reply to dogma11

They're fantastic. :)

The only negative stories I've heard are from people who really push the boundaries, like people day trading and whatnot. If you're a regular user looking for a bank alternative, you should be good.

Just know their branches don't really have any banking services, so you can't go there to withdraw or deposit cash, get a cashier's check, etc. I keep an account w/ a local institution and transfer money as needed for banking services.

in reply to Routhinator

My bank prides itself being the first in the country to support yubikeys for 2fa. I was so happy until i learned it's just for logging in, transactions are still confirmed by SMS or their app. And security experts all say it's better this way, using a regular 2fa solution would be insecure because you wouldn't know what you're confirming.

There really is no hope.

in reply to oldfart

It's definitely possible to have a hardware token which allows confirming the transfer details - manua.ls/nationwide/card-reade…
in reply to perviouslyiner

I'm not defending that madness, but that device doesn't show who is the recipient. The argument was that this is protection against phishing sites pretending to be a bank, proxying your connection but sending it to a different recipient.

Makes one wonder how much the user has to fuck up to end in such a scenario, and of it's really worth transmitting everyone's financial data in almost plain text over the air for this

in reply to brie

it's hard to infiltrate telecom systems like S7


Telecom systems can be (and are) infiltrated though, which is what the FBI is warning about.

SS7 is very insecure. See this video, too: youtube.com/watch?v=wVyu7NB7W6…

This entry was edited (11 months ago)
in reply to return2ozma

I hate forced 2FA that you can't disable anyway. I don't want to waste time waiting for an insecure text, I don't want to input an unencrypted code you sent to my email, I don't want to click your damn notification that runs through Play Services, and no I'm not enrolling in passwordless auth. I don't need to be babied into securing my accounts. Any account I do actively and willingly secure is already using TOTP. Let me put in my username and password, then kindly fuck off.
in reply to Charlatan

in reply to sugar_in_your_tea

This entry was edited (11 months ago)
in reply to brie

Nah what we need is good privacy-focussed companies getting into the public IAM space.

You know how you can sign into stuff with your Google or Facebook account? And get a 2FA push to your phone?

Like that. Except by a company with a shred of ethics and morality. Like Proton.

I do also think that we all should have a cryptographically secure federally issued identity for official uses such as signing documents or signing into financial accounts and other things that must use your official identity, and not an online pseudonym. Like SSN but on a smartcard. Basically CAC or ECA but for general civilian use.

This entry was edited (11 months ago)
in reply to return2ozma

in reply to trxxruraxvr

They accept contributions, and I'm sure raising an issue with details would be fine as well if you don't feel comfortable making changes directly.
in reply to brie

A company's purpose is to be profitable, ethics side is largely irrelevant.


Maybe so, but companies such as Proton's biggest asset is their reputation...a reputation of being privacy-focussed. Without that they are nothing, and they know that. As a result, they try to live up to that reputation as well as possible.

Being as it was started by Sir Tim Berners-Lee (among some of CERN's other founding fathers of the web) is just icing on the cake.

This entry was edited (11 months ago)
in reply to HotChickenFeet

Yes, you can have multiple devices with the same seed for the pseudorandom number generator. You can turn any computer into a hardware authenticator. In practice, it depends on the bank or your employer. Google reduced phishing success rate to zero after switching to ubikey.

As for perception, you really nailed it. It's more important than actual difficulty of gaining access to your accounts. Remember that most articles are written by low skill blue teamers who manipulate your perception into thinking it's really easy while they don't possess the skills to do it. Always call them out in a manner like "you claim it's easy, have you done it?". They will always say no.