Avatar
Privacy Reboot
944daef8d905ac91bb823d9961ce259ddbb7025b3f543aa5bd4a5fd0ba1d4242
I'm interested in Online Privacy and Security. OSINT enthusiast.

Your WIFI access points and MAC addresses are being scanned and stored online on wigle.net

https://cybernews.com/security/your-wifi-is-part-of-global-tracking-network/

#osint

#privacy

In Australia we are less than 100 days away from having our biometrics harvested by social media platforms as a part of the reform's to block social media usage for under 16s.

Whilst I absolutely see the merit in limiting social media usage for children to avoid all kinds of harms I'm most concerned about how the platforms will implement this and have no faith they are doing it with the users best intentions.

If anything I think it will be used to train their algorithms, build out their networks and harvest even more of your data and user statistics to further their main interest, which from what I can see is growth and profits.

It's utterly horrifying really.

#privacy

#socialmedia

Replying to Avatar Guiding Whispers

The Risks of Mobile Phone Numbers in Two-Factor Authentication: A Guide to Staying Safe Online

In today's digital age, online security has become a top priority for individuals and organizations alike. One popular method of adding an extra layer of security to online accounts is Two-Factor Authentication (2FA), which requires both a password and a second form of verification, such as a mobile phone number. However, a growing concern surrounds the use of mobile phone numbers for 2FA, particularly in the context of "Know Your Customer" (KYC) requirements.

This practice can compromise user privacy and security, leading to identity theft, surveillance, and exploitation. In this article, we'll explore the risks associated with using mobile phone numbers for 2FA and provide concrete solutions to help you stay safe online.

The Risks of Mobile Phone Numbers in 2FA

When you provide your mobile phone number for 2FA, you're sharing sensitive personal information that can be used to track your activities online. This can lead to:

Identity theft: Your phone number can be used to create fake accounts or impersonate you online.

Surveillance: Your online activities can be monitored and recorded by third parties.

Exploitation: Your personal data can be sold or used for malicious purposes.

Alternative Methods of 2FA

If you're concerned about the risks associated with using mobile phone numbers for 2FA, there are alternative methods you can use:

Password-based verification: Use a password manager to generate and store unique, complex passwords for each of your online accounts.

Biometric authentication: Use fingerprint or facial recognition technology to verify your identity.

Hardware security keys: Use a physical security key that can be used to authenticate your identity.

No-KYC Phone Numbers: A Safe Alternative

If you still need to use a phone number for 2FA, consider using a no-KYC phone number. These numbers are designed to provide an additional layer of security and are not tied to your personal data.

Virtual phone services: Use a virtual phone service that provides a separate phone number that is not linked to your personal data.

Burner phones: Use a burner phone that is designed for temporary use and does not store any personal data.

Protecting Yourself Online

To stay safe online, follow these best practices:

Use strong passwords: Use complex, unique passwords for each of your online accounts.

Enable two-factor authentication: Enable 2FA for all of your online accounts, but consider using alternative methods to mobile phone numbers.

Keep your devices secure: Keep your devices and software up to date with the latest security patches.

By being aware of the risks associated with using mobile phone numbers for 2FA and taking steps to protect yourself online, you can help prevent identity theft, surveillance, and exploitation.

Interesting read thanks. Maybe a follow up on other MFA / 2FA options in lieu of mobile phones could be a solid part 2!

Surveillance capitalism profiles your data and habits turning you into the product for unseen buyers who trade in human habits and browsing history as a commodity.

It seems to be most prevalent on websites that people commonly interact with like news outlets, banks and social media which are crawling with trackers and pervasive advertising.

It's the classic watering hole attack.

Try a privacy focused browser like #Brave or use an ad blocker.

#privacy

#surveillancecapitalism

https://www.itnews.com.au/news/uk-agrees-to-drop-encryption-backdoor-mandate-for-apple-619721

The idea that an operating system deliberately bakes in a backdoor to their OS is ridiculous.

It's just begging yo be abused by malicious actors or more likely governments

#privacy

#infosec

The truth is anyone can become a victim of a scam.

Scammers spend vast amount of time and resources trying to manipulate and exploit you to click their links or engage with their malicious emails.

Don't be so hard on yourself, we are saturated with these attempts to rip us off.

Treat every interaction on the internet with a healthy dose of scepticism and you're on your way to a safer online experience.

Check out my blog in my bio if you want to learn more.

Don't take my word for it though, cut and paste it into virus total and you'll see it's safe to open.

#infosec

#online privacy

It's not until you start using privacy focused tools that highlight trackers blocked and advertisers that you really get a feel for how pervasive some of these websites are and how much they silently profile you on the way through their domain.

Oftentimes it's the sites you least expect.

Try #PrivacyBadger to block some of these trackers.

In 2025 and beyond it really is irresponsible to have a business that isn't thinking about data protection.

Data protection doesn't just mean data in transit (i.e email) it also means data at rest.

If it isn't encrypted in it's resting state, that is when it isn't being used then you're asking for trouble.

Insider threats or other malicious threats could compromise you and your business.

#dataprotection

#infosec

https://www.itnews.com.au/news/microsoft-plans-full-quantum-resistant-cryptography-transition-by-2033-619779

Microsoft planning on rolling out quantum resistant cryptography on their products.

Not a massive fan of the company but glad to see that it's being implemented.

#privacy

#encryption

https://cybernews.com/crypto/hackers-exploit-data-breaches-to-steal-89m-in-bitcoin/

A person was apparently social engineered out of $89M in BTC.

#SocialEngineering

#Hacked

#Bitcoin

Hint please? I've been looking for a couple of days!

Alternatives for Google Drive? Anyone use Proton Drive? A NAS maybe or SSD?

Protonmail look into it people you can password protect emails that require the other person to know your password to open the file. That alone is a pretty good feature.

Pretty simple, intuitive and free.

Plenty of other features too

#Protonmail

#Privacy

Privacy isn't easy. It's intentional and pretty inconvenient if I'm honest. It sometimes mean you'll have to turn your back on what is convenient and what's cool instead opting for a more secure channel.

If you're serious about privacy you'll miss out on doing things that some others take for granted. Refusing to be in photos that blindly get uploaded to social media will frustrate and inconvenience others

Focusing and valuing privacy though forces people to reflect on their own behaviors and limit your exposure online.

Try it. Shut down that old account. Delete a few old pics on social media. You'll be glad you did.

#PrivacyReboot

#Privacy

The viral Tea App was built for dating safety – allowing women to flag men anonymously – but what happens when a dating app gets breached revealing thousands of users and images.

Read about this privacy nightmare below:

https://privacyreboot.net/tea-app-privacy-breach/

When you have an affair sometimes you get publicly ousted.

As controversial as it is it's an example of how privacy is fragile and how your image and personal life can be flashed across the world.

Take steps to protect your online life incase the unthinkable happens.

https://privacyreboot.net/ceo-caught-cheating-at-coldplay-concert-privacy-wake-up-call/

#Privacy

#viralnews

Imagine driving around with a stranger in the backseat of your car telling people who you are talking to and messaging, where you're going and the things your searching online.

You can't see those people or know what they are saying. They are talking about anout you though.

Social media and smartphones. It's hard to see where surveillance starts and marketing ends.

Check out my blog at

www.privacyreboot.net

#privacy

#dataprivacy

🚨Qantas Data Breach Alert:

Your personal info may be exposed - names, emails, phone numbers and even meal preferences. Read what happened below and protect yourself now:

https://privacyreboot.net/qantas-data-breach-protect-yourself/

#DataBreach

#DataSecurity

Curious to hear honest reviews about GrapheneOS as a daily drive. How do you do all those things that phone users want to do? What are your best work around apps that you rely on. Was it a big adjustment changing over?

#Graphene

#GrapheneOS

#Privacy

Serious question how do they know what technology found it or who the miner is?

The KYC / AML questions for banks have gone too far. Imagine having your withdrawal of your funds denied until you provide them with an explanation of what you want to use your funds for. As if you'd tell them what you were doing anyway if you were doing something illegal.

#Privacy

#PrivacyMatters