by omnifischer on 10/25/20, 10:38 AM with 52 comments
by caymanjim on 10/25/20, 11:02 AM
They haven't learned any lesson, either. Their advice after this? Turn your laptop off when you're not using it (useless) and use Google Voice for 2FA. This is worse than useless; this is actively bad advice and you should not follow it.
The average user should install 1Password and use a TOTP application. Anyone can learn to do that, and it's really all you need. More advanced users, those with particularly extreme security needs, and pedantic nerds can use YubiKeys, hardware wallets, self-hosted password vaults, PGP-encrypted backup codes, and other measures that are worth considering, but aren't as approachable for everyone.
by arboghast on 10/25/20, 11:56 AM
by pontifier on 10/25/20, 3:30 PM
Nobody is perfect.
Every system has known or unknown vulnerabilities.
We need to be building systems that are forgiving of errors, and store important data redundantly.
I've been wondering a lot about how to truly secure an identity. Is there a way to have a meaningful and secure digital life if all your devices could be compromised and your memory is not perfect? I wouldn't want to trust my entire economic life to any single point of failure.
by teknologist on 10/25/20, 12:20 PM
A quick search online suggests that this is a Chinese app.
by jb1991 on 10/25/20, 11:49 AM
I stopped using Chrome but now realize I never thought to check into what it has saved for me. I’ll have to check into that and erase it all if I can.
by simonh on 10/25/20, 11:57 AM
by ksaitor on 10/26/20, 2:33 AM
Can someone explain how Telegram 2FA, Yahoo 2FA and Apple 2FA were bypassed?
Especially Apple 2FA - I received a 2FA call from Apple, picked it up, and the attacker logged in right after.
Please note, this was not a (typical) SIM swap. I was still receiving SMS and calls during the attack.
p.s. thanks for all the comments!
by kmbfjr on 10/25/20, 11:52 AM
by hacker_newz on 10/25/20, 11:51 AM
by foepys on 10/25/20, 11:59 AM
by fmajid on 10/25/20, 12:13 PM