Forums
New posts
Articles
Product Reviews
Policies
FAQ
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Menu
Log in
Register
Install the app
Install
Forums
Apple Computing Products:
macOS - Apps and Programs
Password Manager Question
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="MacInWin" data-source="post: 1929128" data-attributes="member: 396914"><p>So, having watched the video:</p><p></p><p>1. Stay out of bars.</p><p>2. Use facial recognition or finger print to open the phone.</p><p>3. Set a stronger passcode, preferably alphanumeric, but the downside here is that if it is so difficult that you have to slow down to type it it, it may actually be easier to steal that a shorter code you can enter quickly with multiple fingers.</p><p>4. Don't put embarrassing stuff, or critical financial stuff, on the phone. OK, hard to do if you want to do banking, but maybe the phone isn't the best way to do that? Maybe restrict banking to your Mac? </p><p>5. Don't sweat it too much because it's really rare at this point. </p><p></p><p>I had read the WSJ article he refers to and while it was bad for the victim, a degree of prudence can reduce your exposure. </p><p></p><p>One thing he didn't point out is that 2FA doesn't HAVE to go to SMS to the phone. You can use other ways, including email, for many companies. Then set the email up NOT to be on the iPhone, just on some other device (your Mac). Again, not using the iPhone for banking. </p><p></p><p>BTW, One thing he missed is that if you have a third party password keeper and set it up for facial recognition and you go through the sequence the victim did and have the passcode to the phone stolen and then the phone stolen, if you have the third party password keeper set up for facial recognition to open it, the thieves can get into that by replacing your face with theirs using that same stolen passcode. Now the facial recognition will authorize the password keeper to open because the face matches what it's programmed for. So, if you DO get a password keeper, don't authorize any biometric access (facial or fingerprint recognition). It will be a really painful process to have to enter a strong password for the password keeper, in that case.</p><p></p><p>But I would say unless you hang out in bars, or other locations like that, where your code can be stolen by somebody getting really close and looking over your shoulder without you noticing, it's not something to really sweat over too much. Just use the biometrics in those risky locations.</p></blockquote><p></p>
[QUOTE="MacInWin, post: 1929128, member: 396914"] So, having watched the video: 1. Stay out of bars. 2. Use facial recognition or finger print to open the phone. 3. Set a stronger passcode, preferably alphanumeric, but the downside here is that if it is so difficult that you have to slow down to type it it, it may actually be easier to steal that a shorter code you can enter quickly with multiple fingers. 4. Don't put embarrassing stuff, or critical financial stuff, on the phone. OK, hard to do if you want to do banking, but maybe the phone isn't the best way to do that? Maybe restrict banking to your Mac? 5. Don't sweat it too much because it's really rare at this point. I had read the WSJ article he refers to and while it was bad for the victim, a degree of prudence can reduce your exposure. One thing he didn't point out is that 2FA doesn't HAVE to go to SMS to the phone. You can use other ways, including email, for many companies. Then set the email up NOT to be on the iPhone, just on some other device (your Mac). Again, not using the iPhone for banking. BTW, One thing he missed is that if you have a third party password keeper and set it up for facial recognition and you go through the sequence the victim did and have the passcode to the phone stolen and then the phone stolen, if you have the third party password keeper set up for facial recognition to open it, the thieves can get into that by replacing your face with theirs using that same stolen passcode. Now the facial recognition will authorize the password keeper to open because the face matches what it's programmed for. So, if you DO get a password keeper, don't authorize any biometric access (facial or fingerprint recognition). It will be a really painful process to have to enter a strong password for the password keeper, in that case. But I would say unless you hang out in bars, or other locations like that, where your code can be stolen by somebody getting really close and looking over your shoulder without you noticing, it's not something to really sweat over too much. Just use the biometrics in those risky locations. [/QUOTE]
Verification
Post reply
Forums
Apple Computing Products:
macOS - Apps and Programs
Password Manager Question
Top