Avatar
Johnny
03adefb282cd0220c0f424fdd2eaea1b3537638dcbc8d1929f1749c3037f6b16
GM

4 Tips for 2FA

2FA or 2-Factor Authentication is a great security tool if done correctly. Here’s 4 tips.

1) SMS 2FA Sucks

Ethereum developer Vitalik Buterin mouths off about decentralization, but got his Twitter account hacked by linking it to a government phone number. SMS texts are the easiest 2FA method for random hackers to compromise. There’s a technique known as SIM swapping which allows a hacker to switch SIM cards, so his or her device can receive your SMS texts. This can then be used to compromise your 2FA.

Also, SMS SIM cards leak your real exact physical location when it connects to a cellphone tower. In addition, you’ve given the mobile service provider the information to know what services or websites you’re using.

Another reason SMS 2FA is horrible is that the SIM card is often tied to your identity.

________________

2) KYC is less secure

Often out of ignorance, people associate real identity verification as being more secure. But in reality this is untrue because once you associate an account with a real person, then social engineering, SIM card swapping, and identity-based password guessing become possible. In addition, the physical location of password databases can become known to violent actors.

________________

3) Reject large proprietary companies

Also many people, out of ignorance, favor technology services from large corporations because they assume them to be more secure. They presume that the large company can be trusted with their identity information.

In reality, large companies may be bureaucratic, enabling hackers to prey on their inefficiencies. For example, recently Uber and Rockstar Games were hacked with social engineering. The Uber hack released not only the financial information of customers but also to where the customers had traveled.

Microsoft’s Password database manager for government accounts was hacked by Iranians. The local governments had to pay Bitcoin as ransom to get control back. This further demonstrates that large companies like Microsoft and Google can not be trusted to safely store your data or identity.

We do NOT recommend the use of omnipotent Google Authenticator for numerous reasons. First it’s not open source, so who knows what malicious tracking Google is doing. Google’s track record regarding privacy is piss poor, so why should you trust these malicious clowns?

Second, Google Authenticator will prevent you from getting the backup phrase which can be used to transfer the 2FA account to either a different authenticator phone app or a desktop client. The only thing that Google’s app will let you do is transfer the app to a different Google Authenticator account. So essentially Google has locked you into the Google ecosystem, and once you are dumb enough to use Google Authenticator, you can’t switch to an open source one without the website giving you a brand new backup phrase.

________________

4) Avoid Phones

You want to avoid doing 2FA on a phone that you carry around. A phone is real easy to accidentally lose or be stolen; you might leave it in an unsafe place. Additionally, phones have unsafe hardware. Phones have 2 “brains”, one with the CPU/RAM and another called the baseband modem that connects to cellphone towers. Numerous studies have demonstrated that hackers can remotely access bandband modems by pretending to be the cellphone tower.

When you put a phone in airplane mode, this is just an API REQUEST from the CPU/RAM brain to the baseband modem asking it to please stop. The baseband modem does not have to honor this request and won’t if corrupt government thugs are illegally hacking you in violation of their own constitutions.

________________

Conclusion:

2FA should be done on a Linux computer using KeePass XC with TOTP. This avoids connecting to the internet with open source software you control. Google Auth is just one client for TOTP, but KeePass XC will work.

Thanks, interesting.

Do you recommend to use Keepass for passwords and 2FA? Wouldn't that be a single point of failure?

Nachdem ich das Video gesehen hab, hab ich endlich das Problem mit der neuen #eIDAS Verordnung in der #EU verstanden.

https://www.youtube.com/watch?v=lAuFuW1FiQY

#Privatsphäre #Piraten #Deutsch

Tips for Signal

Signal is flawed in that it’s centralized on Amazon servers, requires a phone number, and can not be self-hosted. However regular SMS is so horrible, and Signal is so intuitive for new users, that telling people not to use it likely does more harm to privacy than good. So here are some tips to improve:

1) Turn off read receipts

Signal has a system called “Sealed Sender” to hide metadata, but it’s flawed. It works by putting the metadata of who sent the message inside the encrypted packets. However, cybersecurity researchers from the University of Colorado Boulder, Boston University, George Washington University, and U.S. Naval Academy, found that Sealed Sender could be compromised by a malicious cloud host in as few as 5 messages to reveal who is communicating with who. In this paper published by NDSS, headed by Ian Martiny, these researchers found that Signal’s “read receipts”, which lets the sender know that the receiver got the message, can be used as an attack vector to analyze traffic. This is because read receipts send data packets right back to the sender.

Source:

https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-4_24180_paper.pdf

Therefore, our recommendation to increase metadata protection is turn off read receipts, which can be toggled in the security settings.

2) Don’t use an American phone number

In an earlier post on burner numbers, we talked about burner crypto text services, such as virtualsim.net which allow you to pay a tiny bit of crypto for a 1 time SMS code. If you can be anywhere in the world, why would you pick a jurisdiction that’s hostile to privacy? You can reach us on our Cambodian line! Remember that spacing matters on Signal. It’s counting +4 4 and +44 as different countries.

3) Use Signal only for people you know

Signal has poor metadata protection because your real life friends likely don’t have DeGoogled phones, so they’ll save your burner Cambodian line as your real name in their contact list, and then their contact list syncs with Google or iCloud and your anonymity is blown.

So if you want to hide that you’re even talking to someone, then use SimpleX, Session, XMPP, or one of the many other options.

4) You can have multiple profiles with different numbers

With Graphene you can have different user profiles with new numbers, or even within the same user profile on a Work one. If you use a 2nd Work Profile number, just remember that the Amazon server can see two numbers pinging for messages from the same IP, so set your VPN to the largest city you can to disguise and don’t change cities/countries on both accounts at the same time. You could use numbers from different countries to throw them off too, but at the end of the day, Amazon would probably see that your Cambodian and Ohio identities both wake up at the exact same time every day.

If you really want anonymity, check out our SimpleX self-host script we made for you on our website.

How about using this fork?

https://github.com/mollyim/mollyim-android

Just finished watching the first season of Succession and it's already one of my favorite TV shows.

The series is just brilliant and such a good illustration of everything that's going wrong in the fiat world!

#Bitcoin #FIAT #TV #series

Das einzig interessante an der Grafik ist, wie stabil der Yen in der Vergangenheit war! Und das obwohl die japanische Notenbank mit Abstand das meiste Geld gedruckt hat. Ich denke Maurice würde wohl eher lachen als weinen 😉

Zwei deutsche Hochschulprofessoren kritisieren die Geldpolitik und reden positiv über Bitcoin. Sowas hat es früher nicht gegeben, wir sind echt weit gekommen!

https://www.podcast.de/episode/611341826/block52-217-interview-mit-prof-dr-holger-graf-finfluencer-at-profgoldgraf

#Bitcoin #Einundzwanzig #Deutsch #Podcast

Replying to Avatar Anti Spasti

This is dark! Love it

nostr:note1qyh0qrs8q5vhla6rnze6ywu5hkf7hd6qt2x4gmrez2zf9sx48hws5s5j9y

Sehenswerte Sendung zum organisierten Anlagebetrug. Falls ihr schon immer wissen wolltet wer euch da ungefragt anruft und Krypto-Investments andrehen will

https://www.youtube.com/watch?v=Z1FR4JIo1Mk

#Deutsch #Bitcoin #scam

Die SEC hat noch keinen Bitcoin ETF genehmigt, da sie Angst vor einer 51%-Attacke haben, durch #MarkusSeiMudda!

#Einundzwanzig #Deutsch

Die Node von #MarkusSeiMudda ist so fett, ihr eigener Sohn kann sich keinen Channel zu ihr leisten.

#einundzwanzig #lightning

#MarkusSeiMudda stackt mehr Sats als Michael Saylor, und das allein durchs Routing.

#einundzwanzig #lightning

Just paid my VPN using lightning. Wow, what a great experience!

You can buy a voucher for mullvad.net and redeem it in 10 seconds using this service:

https://vpn.sovereign.engineering/

#lightning #vpn #mullvad #spendl

Wenn du eine Hardware Wallet besitzt, musst du diesen Vortrag gesehen haben!

https://www.youtube.com/watch?v=sv6rRvbAo1Q&t=0

#Bitcoin #Deutsch #German #Einundzwanzig

Amerikanische Tech-Firmen wollen scheinbar die Chatkontrolle in der EU durchsetzen.

Wer ist schuld dran wenn es klappt, die Lobby oder die Politik?

https://www.heise.de/news/Lobbygeflecht-bei-Chatkontrolle-Schlimmste-Befuerchtungen-bestaetigt-9318337.html

#Deutsch #EU #Privacy #Einundzwanzig

Great report on the currency crisis in Argentina!

https://www.npr.org/2023/09/22/1197954122/argentina-peso-inflation-milei

#Bitcoin

#Argentina

#Bitcoinfixesthis