Skip to main content

in reply to return2ozma

Didn't this happen quite awhile ago? I don't see anything new in this article
in reply to Imgonnatrythis

The novelty is the fact that it's ongoing. They haven't mitigated the hack. The threat actors are still inside the networks, which is why the government is telling people to switch to E2EE apps.
in reply to return2ozma

New Clipper Chip mandatory in new phones for "security" 😉
in reply to Agent641

Security against foreign hackers, of course

(But with the additional purpose of securing the #LandOfTheFree against those pesky #Terrorists, of course. Who's a terrorist? Why of couse that's anyone who dares to ~~criticize the government~~ ahem I mean... make threats against the United States of America 🇺🇸🦅)

in reply to return2ozma

@technology
10 years ago, the Feds wanted backdoors to all of phones so they could read all of our text messages. Now, the Feds want everyone not to use software that has backdoors so the Chinese cannot read our phones. The Feds don't want competition.
in reply to someguy

The backdoors they use are there for freedom and justice, the backdoors the "others" use are tools of evil and security risks!
in reply to Godnroc

The backdoors they use are there for freedom and justice, the backdoors the "others" use are tools of evil and security risks!


did you forget to add "/s" or do you really believe what you wrote?

in reply to someguy

Absolutely. They were so arrogant they never thought it would happen to us. After all, we are in charge of our own networks so why would we expect the enemy to be at the gates? Let's make those gates out of cardboard so it's easier to spy on everyone.

Of course then you have things like CALEA mandating a back door, you have cheap telecom companies that will happily buy cheap lowest bidder Chinese hardware and install it "everywhere* without concern for security (after all, it's not their data being stolen) and now the enemy isn't just at the gates but inside the walls.

A decade ago, making sure the feds could read everyone's mail was the national security priority. Suddenly when the Chinese can read everyone's mail, good security is the national security priority.

It's too bad there was no way to predict this in advance. Oh wait...

in reply to return2ozma

Been saying that for years. It's about damn time.
in reply to shortwavesurfer

SMS spoofing and SIM swapping have been around for ages. It was never secure and that's always been known. The number of companies that rely on it despite sending me a zillion other fucking useless emails is too damn high! Email, or better yet, an authenticator app, are far more secure. Not perfect, but better.
in reply to Screen_Shatter

One big reason I'm hesitant to keep my money in banks is because banks think the best form of two-factor authentication is text message based 2FA and I'm like that's barely any 2FA at all.
in reply to shortwavesurfer

My banks are like that too. Of course I can't speak to anyone who might influence that decision. Steam has better security than almost any other account I have. I appreciate them for that but it also seems ludicrous to me that my video games are more secure than my bank accounts.
in reply to Screen_Shatter

I keep my money in Monero. That way, it's me who has to be targeted instead of an institution. And if I fuck up and lose it, it's my own damn fault.
in reply to shortwavesurfer

I have some crypto, some stocks, etc. For many things I still need standard banking though. Crypto just isn't there yet. Maybe someday... But having money distributed is still smart either way, so I have many baskets for my eggs.
in reply to Screen_Shatter

I keep a little bit in the bank, like enough to pay my bills and such, but any extra I put into Monero.
in reply to frostysauce

en.m.wikipedia.org/wiki/SMS_sp…

So, it's not that the message itself is insecure, but the inability to verify the sender makes phishing attacks possible or similar things. I get a text from a random number saying "click this link to pay your bill!" And I don't have any way to trust its legit.

SIM swaps make it so people can take over your phone number temporarily and then generate 2fa requests to gain access to accounts. Doing the swap usually involves bribing someone or gaining access to a providers database by other means, but its been done a lot.

There are ways to prevent this, but the most straight forward is using a MFA app. Barring that 2FA via email is the next best thing.

in reply to Screen_Shatter

Forgive my ignorance, aren't emails sent in plain text that can be read by any of the networks they are passed between? I've always been taught email is the least secure of any communication.
in reply to frostysauce

I'm not a security expert so my ability to explain is limited, but no, emails have long used encryption protocols like SSL to prevent such problems. However, your email provider may scan and read your emails. That's not much different than a text message service reading those messages, but you can choose your provider. From what I can tell proton.me is the way to go for resolving that issue - they provide encryption which prevents their own machines and employees from being able to read your messages and other data. Otherwise, your email is basically as secure as your passwords are.
in reply to frostysauce

No prob, this stuff is difficult to keep up with. I'm still always learning and hoping I'm doing it right
in reply to return2ozma

I wish Signal stopped using it. I know you can set a Signal PIN but a lot of the non-techy friends I speak to on Signal probably wouldn't think to, or look through the settings (not that you need to be "techy" to set it, but you know the kind of learned helplessness most people have about tech). At least a prompt for all users to set an account PIN so their account can't just be stolen by anyone with their SIM card.
in reply to Zorsith

They abandoned letting you use the Signal app to send and recieve SMS. You still need to get a code via SMS to activate your Signal account. I believe this is what they are referring to.
in reply to ChillPill

Yep, I was referring to that. You can stick someone else's SIM in your phone and log into their signal account if they've not set a Signal PIN. You don't see message history but new messages to that person will go to you.
in reply to communism

Another thing is that even if you set a PIN, you'd still have to log into your account relatively regularly so that if you lose access to your number, you wouldn't lose an account. It's logical, given that numbers are reused... But that means that if you want to register without effectively tying your account to your ID (KYC when buying numbers is mandatory in a lot of the world, remember!), you'd have to pay for another phone bill (expensive given that the number's practically doing nothing!) or use a one-time rental... Which guess what, puts your account at constant risk!
in reply to return2ozma

Thank god, give me my HMAC hash please.

Nothing more terrifying than losing your phone number these days because of all the accounts tied to it via 2FA.

This entry was edited (2 weeks ago)
in reply to return2ozma

Ive been slowly hearing about this over the last week or so, and I couldnt tell if it was real news or just over exaggerated.

And everyone has been on an on about iphone to android RCS, but no word on if anything is being done to fix the vulnerability.

in reply to Altima NEO

What vulnerability? I thought RCS is encrypted on transit
This entry was edited (2 weeks ago)
in reply to Scolding7300

RCS doesn't really do a whole lot of anything. It's a step up from SMS/MMS, but not by much.

All the features people think they mean when they're talking about RCS are proprietary Google extensions that only work if you go through Google's servers. They're basically exactly the same as Apple putting iMessage on top; Apple just brags about it while Google tries to trick you into thinking incompatibility is someone else's fault for not giving them control.

in reply to conciselyverbose

Usually I’ll defend Apple on this, but yes it’s a step up from SMS, and Apple is a big reason RCS hadnt been widely adopted as a replacement, and incremented to include more features.

I’m definitely on Googles side here: years of no one doing anything until “fine, I’ll take care it myself”

in reply to AA5B

Apple didn't bother because it sucks. It's not an actual solution (or path to one) for messaging not to be a dumpster fire.

Google "did it itself" exclusively for control. It's exactly the same as their browser behavior.

in reply to conciselyverbose

it at least allows larger files than mms* and has reactions.

*size may vary significantly with MMS and is rarely if ever communicated.

in reply to AA5B

Why would you defend Apple? It's just a stupid form of lock-in, it was at the start, and it always will be.

If you want security, use an app that provides security. RCS does a little to protect against MITM attacks, unless that MITM is your OS vendor.

This entry was edited (2 weeks ago)
in reply to conciselyverbose

I was under the impression Apple already allows RCS, and that RCS is E2EE, I was wrong.
in reply to Scolding7300

Apple did add RCS in one of the iOS 18 updates.

It's just only E2EE when routed through Google.

in reply to Scolding7300

Article is about phone company being hacked, so there’s a good chance that even if we had non-proprietary encryption, they’d be able to read it
in reply to AA5B

That's precisely what E2EE is supposed to prevent. If the phone company gets hacked, attackers can see all the traffic going through all of their towers, so if everything is encrypted before getting to the towers, they can't see the contents. IIRC, metadata like phone numbers can be read though, so they can see who you're talking to, but they can't see what you're saying.

The phone manufacturer, however, can see everything before it's encrypted and after it's decrypted.

in reply to sugar_in_your_tea

At this point you have to assume that if you are not using your own install of custom Android ROM, your end point is not secure beyond keeping stupid criminals out
in reply to return2ozma

Oh man it sure would be nice if the feds had the power to regulate something like this /s
in reply to rarbg

They did. That's the reason for this hack, they wanted Lawful Interception, they got their backdoor. It's what professionals and privacy advocates said all along, if it exists it will be abused.
in reply to da_peda

Do you have a source for this claim? I’d like to repeat it elsewhere…
in reply to sunbeam60

I.e. this article from October: techradar.com/pro/chinese-hack…

In an all too predictable turn of events, Salt Typhoon, an infamous Chinese state actor, has reportedly hijacked government systems to breach several American broadband providers and gain access to the interception portals required by US law.
in reply to da_peda

Thanks for bringing receipts. In stark contrast to my experience on Reddit, Lemmings usually seem allergic to showing their work for some reason.
in reply to capital

Yeah, I don't get it. I go out of my way to provide sources even before being asked.

What's really frustrating is when others users criticize me for providing evidence that could be used to counter my claim. I'm not trying to win arguments, I'm trying to show my work so others can correct me if I missed something. I'm here to learn and educate, in that order, yet so many only seem interested in engaging in discussion that jives w/ their existing opinions. That was a problem on Reddit too, but at least someone would chime in w/ sources much of the time.

in reply to sugar_in_your_tea

@sugar_in_your_tea I'm entering a conversation without reading the other posts, so I apologise. I just want to say that I deeply admire your approach. It is mine as well. I will begin a discussion with a view that I hold, but if someone is able to prove me wrong, I will admit it and thank him. And if my sources should be used to prove his point, then either I didn't read well enough or it's simply a line of thought that I hadn't considered. But I love civil discussions without wasting time on personal attacks and whatnot, and it seems you're the same way.
in reply to Screen_Shatter

The public broohaha surrounding that event makes me think Apple is providing a back door and this psyop was to make people comfortable trusting Apple.

Just a theory though. But apple is all proprietary so nothing is stopping them from doing whatever they want or what ever FISA order said.

in reply to granolabar

I still don't trust them, especially when they announced they were scanning images. I don't really care their reasons for it, that's intrusive. I can't trust any closed source tech, no matter what they say.
in reply to da_peda

This isn’t a hack in the way you’re thinking of, nor is it a product of government mandated interception, or a back door. The salt typhoon event you’re referring to is nothing more than the tip of the iceberg of a much bigger problem, which is abuse of the dated SS7 system we’ve known about for decades.
This entry was edited (2 weeks ago)
in reply to return2ozma

of course it is. forced 2fa BY SMS OF ALL THINGS is one of the stupidest ideas
in reply to umbrella

I assume businesses only jumped at the chance to enable SMS 2FA to get their greedy little fingers on our phone numbers.
in reply to capital

It was the simplest/cheapest form of 2FA to implement. Grandma will never understand how to setup TOTP.

Capitalism requires regulations, otherwise it will ALWAYS do what is cheapest or most profitable, regardless of how dangerous or destructive.

in reply to umbrella

Even stupider is supporting hardware keys for MFA, but having SMS fallback which can't be disabled (looking at you, Vanguard). I'd much rather have email as my second factor than SMS, and I literally abandoned a bank (Ally) for removing email as an alternative to SMS.
in reply to return2ozma

Oh it turns out we needed NSA to do its actual fucking job after all rather than holding onto exploits for the surveillance state.

Now — for the second time — we have an adversarial administration eager to weaponize government departments while Americans are vulnerable. Why? Because America is the good guys and would never abuse its extrajudicial powers (say, by detaining, rendering and torturing Americans with names similar to those of POIs.)

We could have had twenty-four years of robust communications security developments if NSA didnt sell the public out like Judas.

This entry was edited (2 weeks ago)
in reply to Uriel238 [all pronouns]

rendering


Wait, are they melting people down to make soap now? Fight Club wasn't just a meme then...

in reply to sugar_in_your_tea

Extraordinary Rendition is the euphemism from the aughts from which the movie Rendition was titled. It means taking your detainee somewhere else, often across national borders, to a black site, usually to do things there for plausible deniability (e.g. we don't torture in the United States )
in reply to Uriel238 [all pronouns]

Looks like I missed that movie, I'll have to check it out.

And I don't think I've ever heard the term "rendering" used in that context, I guess we just used other terminology. Thanks!

in reply to return2ozma

NIST has been saying since 2016 not to use SMS for MFA. It's always been horribly insecure.
in reply to Cornelius_Wangenheim

The problem for me is that most Canadian Banks give you the choice of SMS or their shitty adware filled bank app that relies on Google Play Services and wont implement TOTP so I can use a true MFA app. And Im done with being forced to accept user policies I don't agree with to do shit, and most of all done with Google Play Services on my device 😑
in reply to Routhinator

Adding to this that my Canadian bank just updated their app and it doesn't work with my older phone. So my only option is to use online services with SMS/call verification.

It's such a joy to know that my bank, who made $40.670 billion last year, takes care of every customer equally.

in reply to OpenPassageways

They support USB hardware tokens… but only for the website. Everything else is SMS which kinda defeats the point.

Annoyingly, other than Vanguard, they are the only financial institution to support USB FIDO tokens

This entry was edited (2 weeks ago)
in reply to carpelbridgesyndrome

in my experience, FIDO tokens suck. I have to around 10 times every time I use one to log in.
in reply to Routhinator

This is the main reason I switched to Fidelity here in the US. It's a brokerage, but it does basic bank things, like checks, debit card, etc, and they support SymantecVIP, which works w/o Google Play Services. TOTP support really isn't that hard, I don't understand why banks are so slow in adopting it...
in reply to sugar_in_your_tea

Thanks for this...I might be opening a Fidelity account....
This entry was edited (2 weeks ago)
in reply to dogma11

They're fantastic. :)

The only negative stories I've heard are from people who really push the boundaries, like people day trading and whatnot. If you're a regular user looking for a bank alternative, you should be good.

Just know their branches don't really have any banking services, so you can't go there to withdraw or deposit cash, get a cashier's check, etc. I keep an account w/ a local institution and transfer money as needed for banking services.

in reply to sugar_in_your_tea

I had a negative experience when initially setting up my account, because of TikTok. This group of kids who called themselves "Fidelity Boyz" discovered that you could deposit a fake check and immediately withdraw the money.

So many people did this that they had to severely lock things down. For most customers, money transferred in either via check or via ACH pull (telling Fidelity to take the money from an account at another bank), was subject to a 16 business day (three weeks and one day) hold. Direct deposits (e.g. paychecks) were not affected, and ACH pushes (when you tell another bank to send the money to Fidelity) were eventually fine too.

It was a big pain. The money I transferred was in limbo for a long time, after I had already switched all my auto-pays over to Fidelity, so I had to switch them all back until the money cleared.

Now that that's over, it's great. I love that they reimburse ATM fees worldwide, and I'm a big fan of their basket portfolios product since it makes it so easy to rebalance a portfolio. Saves me from having to manually do a bunch of calculations, and I love that it has a fixed monthly price instead of being percentage based like roboadvisors.

This entry was edited (2 weeks ago)
in reply to dogma11

I've got one. It's nice. The cash is automatically invested in a money market account, which is a bit like a high yield savings account.
in reply to sugar_in_your_tea

Now you've got me wondering about this for Canada. Would be a pita to move mortgage and investments, but there must be a better way than the big banks.
in reply to Routhinator

Here's a website that tracks this kind of thing. No guarantees about being up-to-date, but from a surface-level check, it looks like you have options.
in reply to sugar_in_your_tea

Wouldn't count on it being up to date. For my country 4 out of five biggest banks in the country are missing.
in reply to trxxruraxvr

They accept contributions, and I'm sure raising an issue with details would be fine as well if you don't feel comfortable making changes directly.
in reply to sugar_in_your_tea

The issue is, banks are only going to do what they're required to do by law. The government is run by dinosaurs who don't know what computers are, let alone what TOTP is.
in reply to ipkpjersi

No, they're only going to do what they're required to do by their insurance. The law is an option, but if insurance costs go way up if they don't have proper MFA, they'll get MFA.
in reply to sugar_in_your_tea

In case you weren't aware, Symantec VIP is just TOTP-OATH in a fancy coat. You can extract the secret and use it with any TOTP app. I use Authenticator Pro (now called Stratum) because it's open-source and has a watch app.
in reply to sugar_in_your_tea

I have this bookmarked from a few years ago, back when PayPal only supported Symantec VIP: gist.github.com/jarbro/ca7c9d3… I haven't tried it for a while, but it should still work.
in reply to Routhinator

My bank prides itself being the first in the country to support yubikeys for 2fa. I was so happy until i learned it's just for logging in, transactions are still confirmed by SMS or their app. And security experts all say it's better this way, using a regular 2fa solution would be insecure because you wouldn't know what you're confirming.

There really is no hope.

in reply to oldfart

It's definitely possible to have a hardware token which allows confirming the transfer details - manua.ls/nationwide/card-reade…
in reply to perviouslyiner

I'm not defending that madness, but that device doesn't show who is the recipient. The argument was that this is protection against phishing sites pretending to be a bank, proxying your connection but sending it to a different recipient.

Makes one wonder how much the user has to fuck up to end in such a scenario, and of it's really worth transmitting everyone's financial data in almost plain text over the air for this

in reply to 8000gnat

They will now push proprietary apps which steal your data, so you decide.

In a sane world we would move to yubikeys or codes like Google authenticator, but we live in a post sane technological world

in reply to return2ozma

id take email Authentication over sms Authentication if there was only them 2 let me use my 2facter app for the love of god plz i hate how banks use sms its like come on man
in reply to Edieto12

I'm really happy that my doctor's website uses Signal to send the authentication code.
in reply to return2ozma

Since when was sms ever secure? My understanding is that messages are sent in the clear, meaning your carrier and the recipient's carrier both have the opportunity to intercept messages.

I mean that's the message content, not the authentication, but still, sms is the opposite of secure, always has been.

This entry was edited (2 weeks ago)
in reply to Cocodapuf

Not true. SMS is encrypted in 3G, LTE, 5G. Block cyphers like Kasumi and A/9 are used. SMS is reasonably secure, because it's hard to infiltrate telecom systems like S7
in reply to brie

It's hard, but not hard enough from what I've been able to gather. We should want something better IMO. I'm surprised that TOTP isn't more common.
in reply to Abnorc

S7 will be retired or extended with access control. TOTP apps don't work for edge cases like broken phone. Dedicated token devices get lost. SMS will continue being the main solution for 2FA.
in reply to brie

Nah what we need is good privacy-focussed companies getting into the public IAM space.

You know how you can sign into stuff with your Google or Facebook account? And get a 2FA push to your phone?

Like that. Except by a company with a shred of ethics and morality. Like Proton.

I do also think that we all should have a cryptographically secure federally issued identity for official uses such as signing documents or signing into financial accounts and other things that must use your official identity, and not an online pseudonym. Like SSN but on a smartcard. Basically CAC or ECA but for general civilian use.

This entry was edited (2 weeks ago)
in reply to JasonDJ

Proton is already used for identity management: OTP via email. They'll implement OAuth if there's enough demand for it. A company's purpose is to be profitable, ethics side is largely irrelevant.

Many countries already have digital government ID: Australia, Estonia, Russia.

in reply to brie

A company's purpose is to be profitable, ethics side is largely irrelevant.


Maybe so, but companies such as Proton's biggest asset is their reputation...a reputation of being privacy-focussed. Without that they are nothing, and they know that. As a result, they try to live up to that reputation as well as possible.

Being as it was started by Sir Tim Berners-Lee (among some of CERN's other founding fathers of the web) is just icing on the cake.

This entry was edited (2 weeks ago)
in reply to JasonDJ

Proton gives data to governments if requested. Why are you trying to shill it?
in reply to brie

You can use TOTP with multiple devices. For example with an app on your phone and something like KeePass on your laptop/desktop.

Still not convenient since you don't walk around with this in your pocket - but it doesn't have to be just one point of failure.

in reply to HotChickenFeet

What about people who only have one device? Kids, elderly, people with only work computer.
in reply to brie

I agree, it's not a perfect system. Even if you do have multiple devices - you may be locked out if you lose your phone while traveling, can have multiple failures.

Although I don't know what is remotely secure and is elderly friendly. Email or SMS 2FA would have been the closest in mind, but it's not secure, and plenty of elderly struggle with both.

in reply to HotChickenFeet

Pedantic types always mention that secure is only relevant in the context of a particular threat model. The elderly can use hardware authentication like those RSA devices or ubikey. Unfortunately, this is expensive, and banks don't believe there's demand for that. Would you switch banks for this feature?
in reply to brie

Im not terribly familiar with the HW keys; Are you able to get multiple keys? I would worry that it would be similar to TOTP, in that if you lose/misplace/don't have the device then you would be locked out.

And I probably wouldn't switch banks for it, it would depend on how much more secure I perceived it and any other bank differences.

in reply to HotChickenFeet

Yes, you can have multiple devices with the same seed for the pseudorandom number generator. You can turn any computer into a hardware authenticator. In practice, it depends on the bank or your employer. Google reduced phishing success rate to zero after switching to ubikey.

As for perception, you really nailed it. It's more important than actual difficulty of gaining access to your accounts. Remember that most articles are written by low skill blue teamers who manipulate your perception into thinking it's really easy while they don't possess the skills to do it. Always call them out in a manner like "you claim it's easy, have you done it?". They will always say no.

in reply to brie

it's hard to infiltrate telecom systems like S7


Telecom systems can be (and are) infiltrated though, which is what the FBI is warning about.

SS7 is very insecure. See this video, too: youtube.com/watch?v=wVyu7NB7W6…

This entry was edited (2 weeks ago)
in reply to dan

Watch the video again to see how hard it was for Derrick to get access. He got it via his telecom/academia researcher contact.
in reply to brie

because it’s hard to infiltrate telecom systems like S7


cough You can pay a few grand and get access to SS7 networks.

Might be out of reach for most of us, but we can rest assured that any and all security firms and goverrnment agencies have access to this information at a moment's notice.

This entry was edited (2 weeks ago)
in reply to john89

Simply paying is not sufficient. You need to be a telecom company, or a researcher afaik.

In what world would the US gov care to get into your bank account? Or your Facebook account when it's already tightly controlled?

in reply to return2ozma

I hate forced 2FA that you can't disable anyway. I don't want to waste time waiting for an insecure text, I don't want to input an unencrypted code you sent to my email, I don't want to click your damn notification that runs through Play Services, and no I'm not enrolling in passwordless auth. I don't need to be babied into securing my accounts. Any account I do actively and willingly secure is already using TOTP. Let me put in my username and password, then kindly fuck off.
in reply to archchan

Yeah. So you, myself, and some others are the exception to the rule. But, you can't look at it that way because its a 'lowest common denominator' problem. The least secure of us means we are all only as secure. Others need to be hand held.

It's definitely time to raise all boats and drop SMS 2fa like a hot rock.

in reply to Charlatan

You can apply this logic to nearly anything with very bad consequences.
in reply to Charlatan

The most natural authentication mechanism for humans is a key. That thing you carry with yourself. A physical key containing, well, the actual secret (shouldn't be retrievable, should be used for decrypting access request and signing the response) that, maybe combined with your password (another natural for humans authentication mechanism) or maybe, yes, TOTP, gives you access.

Like those "security keys" Imperial officers in Jedi Outcast carry with them. Maybe a bad example.

Phone numbers are used as identifiers because governments like it, nerds don't like it, and normies explicitly like what nerds don't like and also want everything to be insecure, they call it "having nothing to hide".

Also "normal and social" people have that idea that their social prowess is more elegant, smarter at ensuring their security that those dumb and boring nerd technical solutions. So them always choosing things logically opposite of sane, like social media instead of forums, and phone numbers instead of any other identifier, is literally a matter of principle. It's really not that hard to use something else. They do the stupidest possible thing technically to prove a point that you only have to do the smart thing socially. I mean, in Galileo Galilei's case the other side of the disagreement is generally considered right, but that's not an argument effective in society.

I should admit that I've been doing the opposite - the stupidest possible thing socially to prove a point that only technical sense matters, which is why nobody would send me encrypted mail except Facebook with its notifications, and nobody would write me in Tox, and nobody would even contact me via XMMP. Which is why I'm now using TG, VK, FB, WA and Signal for communication, of these Signal is secure, and WA is kinda better than the rest of them.

in reply to archchan

is already using TOTP.


A lot of things are moving to phishing-resistant technologies like FIDO2/WebAuthn or passkeys. All my important accounts, like my password manager, are secured using Yubikeys (one that I keep with me and one as a backup in a secure place).

in reply to return2ozma

The end of an era.

Or actually, probably not until we redo whole cellular phone technology works and kick out all the bad actors using SS7 vulnerabilities for stuff like spoofing numbers and stealing messages. We really shouldn't be using a 45 year old system for almost all communications.

This entry was edited (2 weeks ago)
in reply to finitebanjo

Use Telegram.

Not the app, the 200 year old wire radio messaging system based on Morse code, E2EE (Elderly man to Elderly man Enciphered)

This entry was edited (2 weeks ago)
in reply to Agent641

I guarantee you that is the opposite of a solution, old man encryption is very easily hacked by other old men for spoofing, redirecting, or listening.
in reply to finitebanjo

In their defense, they JUST applied an update in March 1993, so they're knocking on the doors of cutting edge technology updates -_-

Edit: added link

This entry was edited (2 weeks ago)
in reply to DragonTypeWyvern

Something you know, something you are, something you have, and something you saw in a dream once when you were a kid at summer camp during a feverish Dr Pepper-overdose-driven fitful sleep at age 12.
This entry was edited (2 weeks ago)
in reply to return2ozma

Authentication for my work email: Enter 28 character password, receive sms, enter message, log in

Authentication for my Battle.net account:

-Enter email made before 2000 because they don't let you change email

-Enter password

-Get rejected

-Solve CAPTCHA

-Try backup passwords, get rejected

-Request new password

-Send request to 24 year old email

-Try to log on to 24 year old email, email is suspicious and sends Authentication request to my newer email

-Open newer email, Authenticate older email

-open old email, Put in code to battle.net

-Battle.net requests Authenticator code from Battle.net app

-Open battle.net app (no requests)

-Try manual code, doesn't work

  • Realize Battle.net app Authenticator not connected

-Try to connect Battle.net app Authenticator to account

-Realize you cannot connect Authenticator without signing in AND signing in requires Authenticator

-Close Battle.net app

-Open Blizzard Authenticator

-Close warning that this app got depreciated in January

-Enter manual code

-it works

-Attempt to change password to password I first attempted

-Won't let me use same password

-Try logging in using that password

-Still doesn't work - Solve one more CAPTCHA

-Change password to backup password and back to original password - have to solve 2 more Captchas

-Finally works

-Log in

in reply to randon31415

That just kept going. I feel you, but maybe try a password manager? You open it up, type blizzard and it tells you exactly what password you used. Even better, it can generate really good passwords for you.

I use bitwarden.

in reply to return2ozma

So many services still don't even offer 2FA at all. Any service that stores payment information and PII without any 2FA options, let alone a secure one, at this point are a disgrace.
This entry was edited (2 weeks ago)