<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>opsec &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/opsec/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Sun, 25 Aug 2024 23:00:28 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>opsec &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[Psssst! Your date of birth can be a random number!]]></title>
		<link>https://shkspr.mobi/blog/2024/08/psssst-your-date-of-birth-can-be-a-random-number/</link>
					<comments>https://shkspr.mobi/blog/2024/08/psssst-your-date-of-birth-can-be-a-random-number/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Tue, 13 Aug 2024 11:34:11 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[opsec]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=51243</guid>

					<description><![CDATA[For lots of online accounts, a date of birth is nothing more than a very weak second factor.  The majority of places aren&#039;t checking your identity, cross-referencing your birthdate, and personalising your experience based on your Zodiac sign. At most, they&#039;ll wish you a happy birthday and / or let you recover your account by providing your date of birth.  But, of course, lots of people know your…]]></description>
										<content:encoded><![CDATA[<p>For lots of online accounts, a date of birth is nothing more than a <em>very</em> weak second factor.</p>

<p>The majority of places aren't checking your identity, cross-referencing your birthdate, and personalising your experience based on your Zodiac sign. At most, they'll wish you a happy birthday and / or let you recover your account by providing your date of birth.</p>

<p>But, of course, <em>lots</em> of people know your birthday. Everyone you went to school with, family members, colleagues. It might even be on your Wikipedia bio.</p>

<p>A date of birth is <em>not</em> a suitable security measure. So I set mine to be a random number.</p>

<p>Let's get a few things straight. Don't lie to the cops, the state, or your spouse.  If you give an incorrect date of birth to an insurance company, medical provider, or financial institution; you're gonna have a bad time.</p>

<p>But for most other services...?</p>

<p>If I'm signing in to a free WiFi service, my date of birth is 1st of January, 1901 (or whatever the earliest year they will accept).</p>

<p>If a service uses my DoB for account recovery, I <a href="https://xkcd.com/221/">generate a random number</a>, save it in my password manager, and tell the site I was born on 17/07/1985, or whatever.</p>

<p>Look, I'm aware there are some <em>theoretical</em> downsides. If you ever lose your fake details, you won't be able to prove your identity using official ID. If you use fake details to get an age related discount, that's probably fraud - so don't do that!</p>

<p>For the vast majority of services which have no <em>legitimate</em> reason for knowing your age, it's OK to use a random number.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=51243&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2024/08/psssst-your-date-of-birth-can-be-a-random-number/feed/</wfw:commentRss>
			<slash:comments>15</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[There's nothing you can do to prevent a SIM-swap attack]]></title>
		<link>https://shkspr.mobi/blog/2024/03/theres-nothing-you-can-do-to-prevent-a-sim-swap-attack/</link>
					<comments>https://shkspr.mobi/blog/2024/03/theres-nothing-you-can-do-to-prevent-a-sim-swap-attack/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Sun, 24 Mar 2024 12:34:39 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[opsec]]></category>
		<category><![CDATA[sim]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=49966</guid>

					<description><![CDATA[It is tempting to think that users are to blame for their own misfortune. If only they&#039;d had a stronger password! If only they didn&#039;t re-use credentials! If only they had perfect OpSec! If only...!  Yes, users should probably take better care of their digital credentials and bury them in a digital vault. But there are some things which are simply impossible for a user to protect against.  Take,…]]></description>
										<content:encoded><![CDATA[<p>It is tempting to think that users are to blame for their own misfortune. If only they'd had a stronger password! If only they didn't re-use credentials! If only they had perfect OpSec! If only...!</p>

<p>Yes, users should probably take better care of their digital credentials and bury them in a digital vault. But there are some things which are simply impossible for a user to protect against.  Take, for example, a SIM-swap attack.</p>

<p>You probably have your phone-number tied to all sorts of important services. If you want to recover your email, log in to a bank, or prove your identity - you'll probably need to receive a call or SMS.  If an attacker can take over your phone number, they're one step closer to taking over your accounts.</p>

<p>I keep saying "your phone number", but that's a clever lie.  The phone number <em>does not belong to you</em>. It belongs to the network operator and they define which SIM the number points to.</p>

<p>This means a suitably authorised person at the telco can point "your" number to a new SIM card. That's helpful if you've lost your SIM but bad if an attacker wants to divert your number.</p>

<p>What can you do to stop this attack? Nothing.</p>

<p>Oh, you can have a strong and unique password on your account, and you can hope your telco uses TOTP and PassKeys. But it turns out that it is possible to bribe telco employees for the <a href="https://www.bleepingcomputer.com/news/security/former-telecom-manager-admits-to-doing-sim-swaps-for-1-000/">low, low price of US$1000</a>.</p>

<p>If your security rests on a phone number, you've effectively outsourced your security to the most bribeable manager employed by your telco.</p>

<p>Now, I said there's nothing you can do. That isn't quite true. You can attempt to pen-test yourself.</p>

<p>Go to your phone company's account. Set a long password and complex password. Change your mother's maiden name to <code>HK2BY@]'PU,:!VQ;}baTj</code>. Turn on every security measure you can find. Call the phone company from a different phone and explain that you lost your phone and want a new SIM card. If they ask for your mother's maiden name, say "Oh, I set it to a long stream of gibberish". If they ask where to send the SIM, give a trusted friend's address.  If your phone company is negligent and send out a new SIM on the basis of poor verification, then you should move your number to a more reputable provider.</p>

<p>It's good fun to try and social-engineer a call-centre worker for your own details. But it's probably illegal to try and bribe someone to hijack yourself.</p>

<p>Anyway, please try to remove your phone number as a critical lynchpin in your security regime.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=49966&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2024/03/theres-nothing-you-can-do-to-prevent-a-sim-swap-attack/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Who can I hire to hack me?]]></title>
		<link>https://shkspr.mobi/blog/2019/03/who-can-i-hire-to-hack-me/</link>
					<comments>https://shkspr.mobi/blog/2019/03/who-can-i-hire-to-hack-me/#respond</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Sun, 31 Mar 2019 11:59:36 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[opsec]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=31821</guid>

					<description><![CDATA[I use a password manager. I have 2FA set up on everything. When an organisation asks me to set a recovery question, I generate a 32 character passphrase. I don&#039;t use my mother&#039;s maiden name or my first pet&#039;s birthday on anything sensitive. I monitor my email addresses for breaches, and I regularly check my credit file.  I&#039;m doing everything a geek can to protect their online life.  Is it enough?  …]]></description>
										<content:encoded><![CDATA[<p>I use a password manager. I have 2FA set up on <em>everything</em>. When an organisation asks me to set a recovery question, I generate a 32 character passphrase. I don't use my mother's maiden name or my first pet's birthday on anything sensitive. I monitor my email addresses for breaches, and I regularly check my credit file.</p>

<p>I'm doing everything a geek can to protect their online life.  Is it enough?</p>

<blockquote class="social-embed" id="social-embed-1111943757233078272" lang="en" itemscope="" itemtype="https://schema.org/SocialMediaPosting"><header class="social-embed-header" itemprop="author" itemscope="" itemtype="https://schema.org/Person"><a href="https://twitter.com/edent" class="social-embed-user" itemprop="url"><img class="social-embed-avatar social-embed-avatar-circle" src="data:image/webp;base64,UklGRkgBAABXRUJQVlA4IDwBAACQCACdASowADAAPrVQn0ynJCKiJyto4BaJaQAIIsx4Au9dhDqVA1i1RoRTO7nbdyy03nM5FhvV62goUj37tuxqpfpPeTBZvrJ78w0qAAD+/hVyFHvYXIrMCjny0z7wqsB9/QE08xls/AQdXJFX0adG9lISsm6kV96J5FINBFXzHwfzMCr4N6r3z5/Aa/wfEoVGX3H976she3jyS8RqJv7Jw7bOxoTSPlu4gNbfXYZ9TnbdQ0MNnMObyaRQLIu556jIj03zfJrVgqRM8GPwRoWb1M9AfzFe6Mtg13uEIqrTHmiuBpH+bTVB5EEQ3uby0C//XOAPJOFv4QV8RZDPQd517Khyba8Jlr97j2kIBJD9K3mbOHSHiQDasj6Y3forATbIg4QZHxWnCeqqMkVYfUAivuL0L/68mMnagAAA" alt="" itemprop="image"><div class="social-embed-user-names"><p class="social-embed-user-names-name" itemprop="name">Terence Eden is on Mastodon</p>@edent</div></a><img class="social-embed-logo" alt="Twitter" src="data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%0Aaria-label%3D%22Twitter%22%20role%3D%22img%22%0AviewBox%3D%220%200%20512%20512%22%3E%3Cpath%0Ad%3D%22m0%200H512V512H0%22%0Afill%3D%22%23fff%22%2F%3E%3Cpath%20fill%3D%22%231d9bf0%22%20d%3D%22m458%20140q-23%2010-45%2012%2025-15%2034-43-24%2014-50%2019a79%2079%200%2000-135%2072q-101-7-163-83a80%2080%200%200024%20106q-17%200-36-10s-3%2062%2064%2079q-19%205-36%201s15%2053%2074%2055q-50%2040-117%2033a224%20224%200%2000346-200q23-16%2040-41%22%2F%3E%3C%2Fsvg%3E"></header><section class="social-embed-text" itemprop="articleBody">Is there a market / service for *personal* pen-testing or social engineering?<br><br>I like to think I've got all my security set up. But how easily could a fraudster take over my life?</section><hr class="social-embed-hr"><footer class="social-embed-footer"><a href="https://twitter.com/edent/status/1111943757233078272"><span aria-label="43 likes" class="social-embed-meta">❤️ 43</span><span aria-label="16 replies" class="social-embed-meta">💬 16</span><span aria-label="0 reposts" class="social-embed-meta">🔁 0</span><time datetime="2019-03-30T10:50:25.000Z" itemprop="datePublished">10:50 - Sat 30 March 2019</time></a></footer></blockquote>

<p>This is not an invitation to hack me. I'd like to pay a professional to see how far they can infiltrate my online life.  Is my bank particularly vulnerable to social engineering? Does my hosting provider accept a fax to transfer away my domains? Is an image of my passport floating around the dark web? What <abbr title="Open Source Intelligence (OSINT) is the collection and analysis of information that is gathered from public, or open, sources.">OSINT</abbr> should I be scrubbing from the web?</p>

<p>I've got <a href="https://shkspr.mobi/blog/2017/11/how-do-you-move-out-of-a-smarthome/">a stupid amount of smarthome tech</a> - and I know there's <a href="https://security.stackexchange.com/questions/118483/how-to-design-a-home-network-for-iot-devices">no way to secure my network</a> - but I imagine that's a target for someone more dedicated than a casual thief.</p>

<p>I can find pentesting services for companies. I can find some which claim to test the security of CEOs and celebrities. But I can't find anything for ordinary people.</p>

<p>Does this service exist? If not, is this a million-dollar start-up idea?</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=31821&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2019/03/who-can-i-hire-to-hack-me/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
