Stop Treating Phone Numbers As A Digital ID (notthesolution.substack.com)
from formerlytomato@lemmy.sdf.org to technology@lemmy.world on 20 Jan 17:37
https://lemmy.sdf.org/post/28231517

#technology

threaded - newest

undefined@lemmy.hogru.ch on 20 Jan 17:44 next collapse

To the same audience: quit selling my fucking phone number!

I ditched a phone number I had for 10+ years because it was leaked everywhere. Only a few short months after updating my number with the DMV and a handful of other government agencies I started receiving scam calls/messages again.

At some point we need to adopt some fucking privacy laws. This is absolutely bonkers—is no one else fed up??

Edit: I already know how to silence unknown callers. What I want is to not have the problem in the first place, ideally by 1) having companies not sell personal data to third parties and 2) being able to block spoofed (non-encrypted) caller ID.

SnotFlickerman@lemmy.blahaj.zone on 20 Jan 17:52 next collapse

Oh everyone is fed up but we just elected a guy and government who is sure to make it all way way way worse.

He just helped put the nail in the coffin of the lie that crypto is for anything but scams, don’t worry, it’s gonna get real bad before it gets any better.

DannyBoy@sh.itjust.works on 20 Jan 19:26 next collapse

Did we? My government leader hasn’t changed nor have we had an election lately

nyan@lemmy.cafe on 20 Jan 20:41 collapse

There’s a subset of Americans who are rather like ostriches: heads so deeply buried in the sand that they forget anything exists outside their immediate surroundings. Reminding them that the rest of the world is out there rarely has any positive results, however.

Szyler@lemmy.world on 21 Jan 10:32 collapse

If they could read they would be upset by that.

tourist@lemmy.world on 20 Jan 20:05 next collapse

In South Africa, where I live, everyone is assigned an ID Number at Birth. You need an ID number, thumbprint scan AND proof of address to get issued a SIM card number due to a law introduced called RICA. It was meant to help fight crime. Worried that the government could listen in to calls or read their SMSs, the criminals just switched to WhatsApp, which also happened to become cheaper than SMSs and gained popularity in this time.

The cops never seemed to crack WhatsApp. The only drug busts that happen are when an open secret becomes laughably too open and when they harass every person arriving from South America at O.R. Tambo international airport just to catch the decoy mules carrying 12g of cocaine (total). Every dealer I ever organised with was over WhatsApp.

So now, woopsi, RICA stopped nothing and just became a liability. That treasure trove of fragile data made its way to scammers and spammers. A total net negative.

I’d encourage everyone else in other countries to apply major pushback to any government proposals in this direction.

sunzu2@thebrainbin.org on 20 Jan 22:34 collapse

Do people still believe that drug trade is ran by criminals?

I am pretty sure in every country, it is controlled either police or the spooks.

I am done pretending otherwise. Criminals are just useful idiots, the real thugs are the police and security apparatus

iopq@lemmy.world on 21 Jan 08:35 collapse

[citation needed]

sunzu2@thebrainbin.org on 21 Jan 14:09 next collapse
TseseJuer@lemmy.world on 21 Jan 20:10 collapse

there are MANY MANY examples don’t be a lazy pelican with your beak open. go look

explodicle@sh.itjust.works on 21 Jan 14:23 collapse

“Bitcoin, it just seems like a scam,” Mr Trump said. “I don’t like it because it’s another currency competing against the dollar.”

— Donald Trump

Of course, Trump Coin made just for him is fine. And any security who bribes him. Oh wait now none of them are securities; Gary Gensler was our last line of defense.

[Edit: got it backwards]

adarza@lemmy.ca on 20 Jan 18:09 next collapse

lists sourced from drivers licenses and motor vehicle registration records are literally sold by some states.

SpaceNoodle@lemmy.world on 20 Jan 18:56 next collapse

Source?

adarza@lemmy.ca on 20 Jan 19:08 collapse

wisconsin literally has an opt-out/opt-in (based on your current status) box on vehicle registration renewal forms, for one.

undefined@lemmy.hogru.ch on 20 Jan 22:13 collapse

Yep, wish I’d known that a couple years ago.

DaddleDew@lemmy.world on 20 Jan 18:15 next collapse

I’m pretty sure a lot of scam calls use machines that call every possible phone number within an area code and see who answers. There is no way to avoid it.

Pika@sh.itjust.works on 20 Jan 19:54 collapse

this right here. I stopped getting scam calls years ago, I stopped answering and they just eventually stopped calling. If you don’t interact with the call (interact being ignore it or mute it NOT reject it) and it just goes to voicemail, they seem to eventually stop

BlemboTheThird@lemmy.ca on 20 Jan 20:20 next collapse

Lucky you. I’ve been letting calls from any number I don’t recognize go to voicemail for years and nothing ever seems to change.

Speculater@lemmy.world on 20 Jan 21:53 next collapse

Setup a whitelist, I think it’s native on iPhone and there are multiple Android apps. Only calls from your contact list will ring through. My voicemail is, “You’re getting this because you’re not on my contact list, send a text and I’ll get back to you.”

ElegantBiscuit@lemm.ee on 21 Jan 13:15 collapse

I just block and report as spam any spam text messages I get and any calls that get marked as scam likely. It was terrible before the election because I live in a swing county in a swing state and I think everyone was just mass spamming every number in the area code, but since then I haven’t really gotten much, maybe one errant text every 2 or 3 weeks. Which is much better than it was last spring and summer when the amount started picking up for me.

atrielienz@lemmy.world on 20 Jan 20:35 collapse

If you’re job hunting, or work in specific fields this may not be a reasonable thing to do and that’s at least part of the problem.

Pika@sh.itjust.works on 20 Jan 20:57 collapse

This would deem troublesome yea, being said I firmly believe in separating work and home. I wouldn’t be willing to use a personal number for work related activities, at least not public related activities. Being said, I have no good solution for that, at least you are being paid for the scam call I guess.

atrielienz@lemmy.world on 21 Jan 00:50 collapse

Job hunting is what I meant. And you pretty much have to use your personal phone for that. I haven’t ever had a company phone. Doubt they’d give it to techs.

Pika@sh.itjust.works on 20 Jan 19:52 next collapse

I’m confused of how this keeps happening to people.

Like I use my phone on most sites that allow it and I’ve never had spam/scam calls really, but I’ve also explicitly unchecked the marketing boxes that appear on the signup so maybe that it.

The last instance that actually happened to me was with entering my university a few years ago for my BS degree. They 1000% sold my contact information as some part of the deans/honors list process. I reached out to them and stopped that so fast.

Ulrich@feddit.org on 20 Jan 20:51 next collapse

I set my phone to decline calls from unknown callers years ago.

These calls are already illegal. I used to report them to the FTC but I never heard anything back so I have no idea what happens, but I presume nothing. If I had the time to take them, and if they spoke English, I would record them with the Cube ACR app (which no longer works) and convince them to incriminate themselves. Ask their name, company, location, time/date, whether they ran my number through the DNC registry.

pHr34kY@lemmy.world on 20 Jan 21:32 next collapse

Australia has a “do not call register”. It seems to mostly work, but telcos are having trouble with calls originating from outside the network with spoofed caller ID. We still get spam/scam calls from India among other places.

Even if they’re not calling you directly, they are still using your phone number to link you to things and create a shadow profile behind the scenes.

sugar_in_your_tea@sh.itjust.works on 21 Jan 01:01 collapse

So does the US, though you need to re-register every so often. It works pretty well, but it’s not advertised very well.

CaptSpify@lemmy.today on 20 Jan 21:48 next collapse

I have an app called Silence that lets me block calls from numbets not in my addreasbook. Highly recommended

github.com/x13a/Silence

Reminder: Dont blindly trust random internet sources!

undefined@lemmy.hogru.ch on 20 Jan 22:11 collapse

That’s not the problem I’m referring to; this is already built-in to iOS (and I hope Android).

mox@lemmy.sdf.org on 20 Jan 22:18 next collapse

quit selling demanding my fucking phone number!

FTFY

Shimitar@feddit.it on 21 Jan 05:44 next collapse

Don’t worry, here in Europe we are full of privacy laws but I still receive tents of spam calls per day. Usually from non UE countries faking the number with my country numbers.

Blackmist@feddit.uk on 21 Jan 10:49 collapse

Anything with a London 020 number is guaranteed to be a man with an Indian accent pretending to be from British Telecom.

buddascrayon@lemmy.world on 21 Jan 15:26 collapse

At some point we need to adopt some fucking privacy laws.

Yeah we absolutely had to ban TilTok because of privacy concerns but the idea of creating a law to protect our privacy is ridiculous beyond all reasoning. The stupidity of the United States government is absolute.

undefined@lemmy.hogru.ch on 21 Jan 16:34 collapse

Agreed, but I’m not addressing TikTok specifically but rather policies similar to GDPR.

spankmonkey@lemmy.world on 20 Jan 18:06 next collapse

It is the same thing that happened with US Social Security Numbers, which were originally just tracking numbers for that one purpose that were coopted by capitalists and treated like something special.

[deleted] on 20 Jan 20:22 next collapse

.

Serinus@lemmy.world on 20 Jan 20:41 collapse

999,999,999

Ulrich@feddit.org on 20 Jan 20:55 collapse

It’s 1B. You’re forgetting zero.

Serinus@lemmy.world on 20 Jan 21:11 collapse

Now I know your social security number. You fool!

Corkyskog@sh.itjust.works on 20 Jan 21:09 next collapse

I remember I was flipping through some of my mom’s old college stuff and there was a club that she was involved with and everyone listed their address and social security numbers. It was wild, no idea why they felt the need to collect socials. But this was a very long time ago.

grysbok@lemmy.sdf.org on 21 Jan 04:50 collapse

My college ID used to be my social security number, so maybe it was something like that? Iirc that’s no longer allowed in the US.

sugar_in_your_tea@sh.itjust.works on 21 Jan 01:03 collapse

It’s not just “capitalists” (whatever that means), every government agency seems to want it, employers and banks are required to ask for it, etc. It’s more than just “some people misused it,” we actually wrote it into regulations.

HobbitFoot@thelemmy.club on 20 Jan 18:29 next collapse

Are Internet security and Internet privacy incompatible goals?

They are if the security is tied to knowing that an account is a person.

ogmios@sh.itjust.works on 20 Jan 18:43 next collapse

Computer technology is fundamentally insecure so long as everything is connected all the time. It drives me mental that idiots keep trying to foist the whole of human society onto devices which are clearly unfit for the task.

corroded@lemmy.world on 20 Jan 19:09 collapse

Technology exists to keep all your personal data exceptionally secure. Modern encryption is incredibly difficult to break (impossible really).

Humans are fundamentally insecure. Any time you read about a data leak, it’s because somebody stupidly opened an attachment or fell for a scam. Any time someone gets “hacked,” they didn’t. They gave away their information. Human error and a lack of education are the problems.

sevon@lemmy.kde.social on 20 Jan 19:53 collapse

While I also disagree with the claim that technology is “fundamentally” insecure, it’s unfortunately not that often made by smart and caring people.

ogmios@sh.itjust.works on 22 Jan 03:32 collapse

While I also disagree with the claim that technology is “fundamentally” insecure

For pretty much everyone other than perhaps the CIA and Mosad, it is.

IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com on 20 Jan 19:05 next collapse

This should be what digital ID looks like:

-----BEGIN PGP PUBLIC KEY BLOCK-----

mDMEZ26+ARYJKwYBBAHaRw8BAQdAsUGMjbGNUyyz9PHsHKP4xj/tIfYIuHb4miPH 0iCPpu60K0VSUk9SOiBFYXJ0aC5leGUgaGFzIGNyYXNoZWQgPG5vQGVtYWlsLmV4 ZT6IcgQTFggAGgQLCQgHAhUIAhYBAhkBBYJnbr4BAp4BApsDAAoJEI6E3uMn31Z3 028BAM5o8ER0dqTsxFlZSgZOvvgFHGuy2eFgF3rULkGKl1KrAP9fdE7WwnYbBer/ AVmw5jr0P5m/XsEQQrSueuk/FLYBBbg4BGduvgESCisGAQQBl1UBBQEBB0BDR0Bv pf4jxbwp9rVowFTnL59NGqnnh6XyF/LjAoYDGgMBCAeIYQQYFggACQWCZ26+AQKb DAAKCRCOhN7jJ99Wd1dMAP45xmN03SodkWHi7PYOORqNXJUBdMzzfsRXdqE8ZXaW vAD+PqNqPcbwJYCOEAXkg7DlZ0SX3o9MViZLdzHFQ3TpUA8= =krDh -----END PGP PUBLIC KEY BLOCK-----

PGP Key Fingerprint: 857957d40f06cc816fd3d29a8e84dee327df5677

Should be good until quantum computers come around

Zak@lemmy.world on 20 Jan 19:44 next collapse

I’m sad PGP didn’t become a popular way to log into websites. A challenge-response protocol could have even been built into web browsers. Big tech is reinventing that idea as Passkey, but with a very big tech flavor.

IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com on 20 Jan 19:50 collapse

I mean, passkeys are… sort of… PGP… 🤷‍♂️

Kusimulkku@lemm.ee on 20 Jan 22:34 collapse

I’m already hearing about restrictions on exporting passkeys and some apps requiring that you’re not running a custom ROM on Android and stuff like that. Makes me worried they’re going to fuck that up and make it restrictive bs

Korhaka@sopuli.xyz on 21 Jan 07:21 next collapse

Why should my OS be any of their concern?

RogueBanana@lemmy.zip on 21 Jan 07:41 next collapse

From what I heard passkeys need google services framework for some reason. Don’t know technical reasons behind it but I would assume its bs given its google.

dracs@programming.dev on 21 Jan 13:49 collapse

Yes, they don’t work without Google Play Services. Google didn’t implement passkeys in Android, only their own services.

Kusimulkku@lemm.ee on 21 Jan 09:03 collapse

I’m living this pain with a custom ROM already, with some banking stuff, Google Wallet, WhatsApp passkeys and I think Netflix (haven’t installed it) block you for tripping up Google’s security tests.

If passkeys become a big thing and they’ll start enforcing them and apps that have those security measures I’m going to fucking firebomb something. REEEEEE

Korhaka@sopuli.xyz on 21 Jan 09:10 collapse

Shit like this is why I don’t have a smartphone anymore. I have a brick phone that half the time I don’t even take out with me.

lmmarsano@lemmynsfw.com on 21 Jan 23:38 collapse

Passkeys or WebAuthn are an open web standard, and the implementation is flexible. An authenticator can be implemented in software, with a hardware system integrated into the client device, or off-device.

Exportability/portability of the passkey is up to the authenticator. Bitwarden already exports them, and other authenticators likely do, too.

WebAuthn relying parties (ie, web applications) make trust decisions by specifying characteristics of eligible authenticators & authentication responses & by checking data reported in the responses. Those decisions are left to the relying party’s discretion. I could imagine locked-down workplace environments allowing only company-approved configurations connect to internal systems.

WebAuthn has no bearing on whether an app runs on a custom platform: that’s entirely on the developer & platform capabilities to reveal customization.

Imgonnatrythis@sh.itjust.works on 20 Jan 20:18 next collapse

Thanks, gonna need your phone number to verify that though.

namingthingsiseasy@programming.dev on 20 Jan 22:27 collapse

No you don’t! That’s why we have key-signing parties!

Pika@sh.itjust.works on 20 Jan 20:53 next collapse

I want to preface this response saying I full agree with this, I want something like this to happen, I am responding because of some concerns I have. The real major one: How do you verify the authentication part of the data security chain?

A PGP key alone does not authentically validate that you are who you say you are. When the source is the untrusted party, it doesn’t accomplish the site’s goal. It’s the equivalent to me handing you a piece of paper saying “I’m John Smith and this is what I use to say I’m this” which works amazing for trusted exchanges, but when the source is “just trust me bro” it doesn’t solve anything for the website owner.

Websites get around this by having trust certificates/root servers that are co-signed with the PGP key. However, we lack any system like that for personal identities. Arguably, setting up such a system would isolate most of the known internet, as it is a significant roadblock, much like how SSL certificate usage was a huge roadblock for sites before Let’s Encrypt became a thing.

This setup would be amazing for logging into sites. However, it fails to accomplish what the websites that are asking for PII are looking for, which is verification that their user is who they say they are, and not a random third party.

To reliably use this setup, we would need something similar to Let’s Encrypt, but for user identification. The issue with that is it would become the de-facto attack vector (for both law enforcement and criminal parties), and that site would need to require PII to address the biggest concern on these sites, which is that you are who you say you are, and not Jo Smo or a bot looking to harvest data. Additionally, as mentioned earlier, a massive retraining of the internet would need to be done, which would mostly affect non-tech folk.

I am hopeful that an easy function that won’t violate users privacy comes out, but I don’t think the two topics are compatible sadly

wellbuddyweek@lemm.ee on 20 Jan 22:17 next collapse

How do they currently solve this problem for passwords? You could just have the register/create account button lead to a pubkey upload instead of a ‘set password’, no?

Pika@sh.itjust.works on 20 Jan 22:28 collapse

This problem isn’t addressing password authentication, its the website knowing who you are and that you are legitimate. Websites that collect things such as phone numbers during account creation don’t collect your PII as part of your password procedure. They collect it as a verification that you are an actual being and not a fake account/bot. The ease of being able to go through a forgot password thing is just a positive side effect.

This solution would work amazingly for logging in, there’s no argument for that, but it doesn’t address the elephant in the room: That the website wants to make sure you are a person/legitimate account and not a fake alias or a bot to scrape info, and when you are the only one providing that information that claim can’t be verified.

socsa@piefed.social on 20 Jan 22:22 collapse

The solution here is distributed trust by proxy. You start with a single exchange between two trusted peers, and build from there. As long as every individual link within the network is trusted, then any route between two disconnected endpoints can be trusted as well. As the network grows there is a very high statistical likelihood that there will exist many individual trust graphs between two nodes, which provides redundant validation.

I have always thought this would make a cool chat app. You enter the network by scanning someone's QR code to become their validated peer, and then you can theoretically communicate with anyone else on the network by exchanging keys via trust graphs. You could then build a social network on top of it which shows you how many hops it takes you to get to some celebrity or some shit.

kautau@lemmy.world on 20 Jan 23:01 next collapse
Pika@sh.itjust.works on 20 Jan 23:05 collapse

tox did something similar with this outcome, but it never took off. Basically with tox each account is actually stored locally, much like how Skype did when it was p2p, but the difference is your account is actually on your device, as in if you lost your “key” you lost your account, when you connected with others, you gave your friends your TOXID which was essentially your public key signature with some added information regarding what you wanted for privacy added to it, and then your messages were relayed through a p2p DHS network. Every communication was encrypted e2e. With tox anyone could create an account with any information, but only people you added were able to message you, and visa versa. The only time you were ever publicly disclosed was during adding contacts to people you didn’t already have, which helped minimize botting on it as bots wouldn’t be able to message you without your ID. The issue with that method was, both parties had to be online to message each other, there was no central server to manage identity and handle users, so every connection was considered trusted since you had to manually add the person via their tox ID.

I expect this solution /could/ be moved into a centralized system for all user accounts, since the only way to add people was manually adding their private key, but I would expect that on large scale, the lack of ability to actually stop problematic users might dissuade platforms from wanting to implement it, since account creation was as easy as just clicking “create account” and no accounts were ever verified server side, which in order to do, brings back to the issue topic: Privacy vs Security

bestboyfriendintheworld@sh.itjust.works on 20 Jan 22:09 next collapse

Now type it a form that doesn’t allow copy and paste.

mox@lemmy.sdf.org on 20 Jan 22:16 next collapse

Why?

TheBat@lemmy.world on 21 Jan 04:53 collapse

Wdym why? That’s how most bank portals are designed. Copy-paste functionality is disabled and you have to type username, password, authentication code

mox@lemmy.sdf.org on 21 Jan 05:44 collapse

I think my question was clear enough. The comment didn’t mention banks, I’ve never had a bank that did that, and we generally don’t try to hide our identities from our banks anyway. My best guess was that they misunderstood how public/private keys work, but since that was only a guess, I asked.

TriflingToad@sh.itjust.works on 20 Jan 22:57 next collapse

tbh ive never had a password box that I can’t copy/paste into

AbidanYre@lemmy.world on 20 Jan 23:48 collapse

I’ve seen a few. They’re super annoying when trying to use a password manager with a decent password.

llii@discuss.tchncs.de on 21 Jan 07:48 collapse

Can’t your password manager do autotype? That’s what I use mostly, because I don’t want all my passwords in my clipboard.

AbidanYre@lemmy.world on 21 Jan 15:18 collapse

Probably. It works >99% of the time I need it so I haven’t poked around in the settings too much.

bilb@lem.monster on 20 Jan 22:59 next collapse

Or even just a paper form.

ayyy@sh.itjust.works on 21 Jan 00:12 next collapse

The California DMV requires you to renew your vehicle registration every year by paying with a bank account number (no card) which is like a 30ish digit number and they disable paste. If you get it wrong they won’t notify you in any way until you get pulled over by a cop who is one bad sneeze away from murdering you. It’s a great system.

azl@lemmy.sdf.org on 21 Jan 03:59 next collapse

I have renewed my CA registration with a credit card going back to at least 2016. A responsible driver would know their renewal failed when their registration document did not arrive via mail.

AbsoluteChicagoDog@lemm.ee on 21 Jan 04:04 collapse

Nah dude fuck that. The burned of compliance with laws shouldn’t fall so hard on people.

frostysauce@lemmy.world on 21 Jan 04:28 collapse

Bank account numbers are, like, 8-10 digits. Certainly not 30ish.

PersnickityPenguin@lemm.ee on 21 Jan 05:53 collapse

What? Mine are 6 digits. Plus the routing number

frostysauce@lemmy.world on 21 Jan 09:03 collapse

Still, not 30ish digits like that person said. Hyperbole be damned.

Korhaka@sopuli.xyz on 21 Jan 07:20 next collapse

Yeah… I did this kind of thing before as a password and found that out the hard way

MisterFrog@lemmy.world on 21 Jan 13:27 collapse

A bit of a hacky workaround on Android. Get Keepass2Android, use the included keyboard.

“Paste” whatever via the inbuilt password input functionality. It basically auto types out your passwords. (You protect this behind a master password/and optionally quick accessed by biometrics)

Profit

phoenixz@lemmy.ca on 20 Jan 22:16 collapse

Nah, there are more than enough algorithms available that won’t work on quantum computers, I’m not too worried about that

werefreeatlast@lemmy.world on 20 Jan 20:33 next collapse

I have absolutely no need for my phone number, nor do I use it for anything that I couldn’t use a voice app for. Just get rid of them altogether.

Ulrich@feddit.org on 20 Jan 20:57 collapse

Yeah I mean I’d get rid of that and email entirely if I could but unfortunately there are legal and societal expectations.

werefreeatlast@lemmy.world on 20 Jan 21:02 next collapse

Get married, then legally, you only need one lol.

corsicanguppy@lemmy.ca on 20 Jan 21:18 next collapse

You’ll pry email from my #coldDeadHands, but I haven’t had a phone number for a decade.

pHr34kY@lemmy.world on 20 Jan 21:41 collapse

We need email. It’s one of the few protocols that are 100% in the user’s control. I run my own mail server. I can’t do the same for whatsapp.

We’ve added a lot of checks to email (SSL, DKIM, DMARC, SPF) so it’s very easy to identify spam these days. It’s also easy to avoid giving any two companies the same email address. That’s something much harder to avoid with a phone number.

For 2FA, per-account email addresses and authenticor apps are the best approach for privacy.

Ulrich@feddit.org on 20 Jan 21:48 collapse

I run my own mail server. I can’t do the same for whatsapp.

No, but you can do the same for a wide variety of chat apps.

it’s very easy to identify spam these days

LOL then why is my inbox constantly full of spam?

Platforms like SimpleX solve spam by requiring participants to have an invitation to message you. You can either send them a 1-time invitation or you can use a semi-permanent one that can be posted publicly and rolled as necessary without losing contact with anyone you’ve already connected with, so by the time it’s mined somehow and sold to some company, it’s already changed.

For 2FA, per-account email addresses and authenticor apps are the best approach for privacy.

LOL what? No they’re not. How does an email protect your privacy over just a username?

mox@lemmy.sdf.org on 20 Jan 22:24 next collapse

LOL what? No they’re not. How does an email protect your privacy over just a username?

They said per-account email addresses, presumably meaning that when giving out an email address, you would use a different one for each service. That way, they couldn’t be used to link you across services, and you could easily delete one (and know who to blame) if it was abused.

Ulrich@feddit.org on 20 Jan 23:04 collapse

Yes, I understand how email aliasing works. Again, how is that more private than a username?

mox@lemmy.sdf.org on 21 Jan 00:31 collapse

I don’t see a claim of it being more private than a username. Perhaps the person you’re arguing with views them as equally private, or is thinking of services that require some form of contact info. I can’t speak for them.

Ulrich@feddit.org on 21 Jan 01:45 collapse

It’s right here:

For 2FA, per-account email addresses and authenticor apps are the best approach for privacy.

I can’t speak for them.

But you just did.

TheBat@lemmy.world on 21 Jan 05:02 collapse

Zoomer spotted, opinion rejected. Email >>>>> chat apps.

Ulrich@feddit.org on 21 Jan 05:18 collapse

Zoomer spotted

Haha, not even close

Email >>>>> chat apps.

Wrong again. But please, do go on.

Ulrich@feddit.org on 20 Jan 20:46 next collapse

It’s not an accident. They’re not stupid. It is intentional. They want your personal information. Most of your personal information is tied to your email but it’s easy enough to spin up an alias to sign in with. Requiring a phone number ensures that they know exactly who you are and can buy/sell/use your data accordingly. They also know what a giant pain in the dick it is to change your phone number, especially when you need it for these security checks. They also know sales conversion rates are much higher if they can get you on the phone. So yeah, they’re not going to stop doing that.

Pika@sh.itjust.works on 20 Jan 20:51 next collapse

Are internet security and internet privacy incompatible goals?

Yes. They are completely incompatible goals when anything relating to identity/being is linked to it. Examples of this could be anything from your name, to your behavioral patterns, to your phone number

Disregarding the entire possibility that ANY site is hack-able/breach-able, the issue stands that the reasons that most sites request PII is valid, for security reasons. There does not exist any valid method of ensuring users identity that does not violate users privacy. CAPTCHAS are proven inefficient, email domains are easy as a 1-2 click. Once the setup is done server side changing to a new address is as easy as changing your server settings and registering a new domain, then just pointing your MX records there. Heck depending on your postfix setup you might not even have to change server settings, if your account lookup is setup to ignore the domain and it all uses the same database. Even phone numbers have proven troublesome but its the least troublesome method available

The entire reason PII style setups are used, is because its an easy verification site side, but a hard to spoof verification customer side. Like the article says, phone numbers are hard to change for verification, many only let you change so many times in X period, and usually require some form of physical identity to register, and the ones who don’t are forced such as VOIP style numbers get blocked.

We lack currently a good system aside from that, because at the end of the day, how do you prove you are who you say you are, without disclosing your identity. I personally think it should be fine to give up some PII for security purposes, but this NEEDS to be restricted only to security and should never be shared with any entity, and this includes government overreach. Alas this will never happen.

AnAmericanPotato@programming.dev on 20 Jan 22:20 collapse

This assumes a legitimate need to prove who you are outside the context of that specific site, rather than just within it. Sometimes that need is real, sometimes it is not.

When it’s not, and you only need to prove you are the same person who created the account, then a simple username and password is sufficient. Use 2FA (via authenticator app or key, NOT via SMS or email) on top of that. This allows users to prove to a sufficient degree that they are the owner of that account.

This is how most Lemmy instances work, for example. I can sign up by creating a username and password, with optional 2FA. They do not need my email. They do not need my phone number. They do not need my name, or my contacts, or anything else that is not related to my identity within their server.

I realize that this is untenable at large scales for any communications platform. Spam (and worse) is a problem wherever there are easy and anonymous signups. I’m honestly not sure how Lemmy is as clean as it is. I guess it’s just not popular enough to attract spammers.

Pika@sh.itjust.works on 20 Jan 23:12 collapse

You are correct with this comment yea, the biggest drawback (which as acknowledged we have seen on lemmy) is the anonymous of the account. It’s easy to spin up spam instances, and due to how federation works its hard to combat against it. I remember LW had an issue regarding that a bit ago with someone threatening to just keep changing domains to avoid blocking, which is indeed a problem for any of these style services. I agree at large scale, most sites are not going to want to have to put up with losing that level of control moderation side. It creates a lot of headaches and for most sites it’s just easier to enforce a policy that forces disclosing PII.

D_Air1@lemmy.ml on 20 Jan 21:15 next collapse

  • Phone numbers
  • social security numbers

Stop making personal information into digital ids because when it inevitably ends up in some kind of data breach. These companies all throw their hands up saying sucks to be you.

sugar_in_your_tea@sh.itjust.works on 21 Jan 00:55 next collapse

Yeah, just generate a unique ID and ask only for the information you actually need.

penquin@lemm.ee on 21 Jan 01:25 next collapse

Nah, man. Gotta get my $2.97 check.

ikidd@lemmy.world on 21 Jan 14:20 collapse

What I hate is when they want you to store “secret” information like your mother’s maiden name/ first pet name for later verifications. You know these are stored in plain text of course. My own damn government does this stupid shit, and they’ve had several hacks of PII including gun registrations because as far as I can tell, nobody competent works in government IT.

pixelscript@lemm.ee on 21 Jan 23:45 next collapse

Security questions don’t care what you put in there. It’s not an exam. It’s basically just an alt password.

I just generate a string of alphanumeric text from my password generator and stuff those in there. If I lose my password vault somehow I’m cooked anyway, so.

mycelium_underground@lemmy.world on 21 Jan 23:46 next collapse

I choose random questions and store the random passwords that I use as answers in my password manager. It’s also more secure because people can’t just Facebook stalk you for answers.

Boozilla@sh.itjust.works on 22 Jan 01:21 collapse

I use bullshit answers for these, and save them in the notes section of my password manager.

finitebanjo@lemmy.world on 20 Jan 22:25 next collapse

Theres an LTT video where one of the boys intercept all Linus’ calls and texts, classic prank.

rlychilplr@lemmy.world on 20 Jan 22:43 collapse

You mean the Veritasuim video with linus in it?

Source

jpablo68@infosec.pub on 21 Jan 00:42 next collapse

I’m in a quest to find a good email provider that doesn’t ask for a cellphone or another email address while creating an account, cock.li used to do this but now it’s “getting back on its feet”

wulf@lemmy.world on 21 Jan 03:55 next collapse

Personally I use mailbox.org, it’s not free, but you are not the product

dukethorion@lemmy.world on 21 Jan 04:20 next collapse

Proton?

TotalCourage007@lemm.ee on 21 Jan 05:08 next collapse

There used to be a way to make Google accounts with no number but that’s probably been patched. I generally refuse to add numbers if I can help it.

Proton, Mailbox & fastmail are all good options. Best way to avoid it is self-hosting but that is beyond most people (as in time-consuming).

frayedpickles@lemmy.cafe on 21 Jan 12:49 collapse

If it’s associated with a specific device it will let you (ex my Android tv has its own account, no phone)

ArchRecord@lemm.ee on 21 Jan 05:23 next collapse

Proton does this.

alekwithak@lemmy.world on 21 Jan 06:07 collapse

Proton? More like pro Nazi.

3laws@lemmy.world on 21 Jan 06:33 collapse

OFTL Did they support Trump?

aBundleOfFerrets@sh.itjust.works on 21 Jan 07:03 next collapse

Their founder did, very openly and expressively, it was quite bizarre

rumba@lemmy.zip on 21 Jan 08:12 collapse

Then he tried to walk it back by gaslighting.

“I wasn’t being political” said the man who was clearly being political.

SirQuackTheDuck@lemmy.world on 21 Jan 07:51 collapse

The CEO made a remark about Trump, and used his corporate account for it.

If I recall correctly (no press statement was made by Proton), it was a personal remark on a corporate account, which he was quick to allow anyone to do. It also didn’t support Trump as a whole, just a remark Orangeman made about getting small business a level playing field (which I totally trust from an olicharch).

I’m still sticking with Proton for the foreseeable future, as its privacy awareness and advocacy is still a core business value.

fatalicus@lemmy.world on 21 Jan 06:43 next collapse

Just signed up for Tuta and they do not ask for this.

leadore@lemmy.world on 21 Jan 07:02 next collapse

posteo.de

Matombo@feddit.org on 21 Jan 08:19 next collapse

create 2 proton mail account und use each other as a backup e-mail

muntedcrocodile@lemm.ee on 21 Jan 08:37 collapse

Don’t u need an existing email to bootstrap that process.

Matombo@feddit.org on 21 Jan 08:56 next collapse

nope, you can skip for the first account and then validate after the fact

Appoxo@lemmy.dbzer0.com on 21 Jan 12:13 next collapse

How do you get DSL/coax internet when you can’t visit web pages?

Spoiler: With the good old telephone.

renzev@lemmy.world on 21 Jan 13:28 collapse

I think you used to be able to “bootstrap” a proton account with a mail.ru account (which needs no prior email or phone), but I don’t think that works any more

Appoxo@lemmy.dbzer0.com on 21 Jan 12:12 next collapse

Ionos enabled me to do that.
But I chose not to.

Fijxu@programming.dev on 21 Jan 12:39 collapse

Selfhosted email I guess.

zagaberoo@sopuli.xyz on 21 Jan 13:02 collapse

Is that even feasible without getting marked as spam by all the major players?

renzev@lemmy.world on 21 Jan 13:26 next collapse

Hi, I recently set up my own email server

  • It’s a huge pain in the ass getting things like DMARC and DKIM and whatever to work. Without those, most providers won’t even deliver your messages. But luckily, there are websites that help you check and fix your configuration
  • Even once you do get these things set up correctly, most providers will send your outgoing messages straight to the recipient’s spam folder
  • That being said, I believe most providers will mark you as “not spam” if the other person initiates the conversation. So this could be a non-problem if you’re making an email for your business and putting it on business cards or something.
  • Mullvad (VPN provider) self-hosts their support email, and they seem to be doing fine.

Hope that helps

Fijxu@programming.dev on 21 Jan 14:14 next collapse

Yes. I host my own using Mailu.io. With the proper records, you will be able to send emails to any big email provider (proton, gmail, outlook). You need to pick a good TLD (.com, .net, .org, etc) so you don’t get your email thrown into the spam folder immediately.

If you buy a domain now, you will probably get on the Spamhaus blacklist, which every big email service seems to use (again, proton, gmail, outlook, and probably others), so you will need to wait a few months and keep a good spam record (well, don’t send spam emails obviously and keep your email server with the proper configurations).

Also, pick a good VPS provider (No vultr, no linode) with low levels of abuse, because if you setup your email server in an IP range with a lot of abusers, you may get your email flagged. (You can check that using www.uceprotect.net/en/rblcheck.php, but I’m not sure if uceprotect is trustable).

AnUnusualRelic@lemmy.world on 21 Jan 14:39 collapse

You can host your domain pretty much anywhere and they will provide mail hosting as part of most packages. From there, it’s up to you to talk to their servers to manage your mails, typically through IMAP.

Hosting companies will be whitelisted as far as mail routing is concerned.

HawlSera@lemm.ee on 21 Jan 04:02 next collapse

I absolutely love this.

y0kai@lemmy.dbzer0.com on 21 Jan 05:57 next collapse

I’ve been considering getting a pager or a burner phone just for this

KillerWhale@orcas.enjoying.yachts on 21 Jan 08:08 next collapse

Most phones are dual Sim these days

Appoxo@lemmy.dbzer0.com on 21 Jan 12:11 collapse

Better to not associate this number to your main phone anyway. Less likelyhood to have the info stolen from you.

viking@infosec.pub on 21 Jan 13:41 next collapse

Can pagers receive text messages? I thought they are closed ecosystems, basically?

ikidd@lemmy.world on 21 Jan 14:16 collapse

Just get a virtual DID number from something like Voip.ms or virtualphone. There may be other providers out there that use crypto for payment for added privacy, but if all you want to do is be able to keep your real phone # off the grid, these work.

funkless_eck@sh.itjust.works on 21 Jan 15:26 collapse

usually they check for VOIP numbers and give you an error. Has to be legit.

gamermanh@lemmy.dbzer0.com on 21 Jan 15:37 collapse

Never had that problem with the Google voice service

Yeah yeah it’s google, but it gives numbers that work

u_u@lemmy.dbzer0.com on 21 Jan 15:42 next collapse

Last time I checked, Google Voice is only available for US residents. Not sure if there’s alternative.

Boozilla@sh.itjust.works on 22 Jan 01:21 collapse

Google voice is hit or miss. It’s worked for a lot of smaller sites for me, but the bigger / more corporate it is, the less likely it seems to work.

Teknikal@eviltoast.org on 21 Jan 06:08 next collapse

Bane of my life as about a year ago my dad switched his sim and immediately started pestering me about not being able to log into his accounts.

Yes he got rid of the old number completly and expected me to somehow make his logins work. This is still going on to this day when he complains to me something doesn’t work it’s because he’s tied it to his old phone number.

Suavevillain@lemmy.world on 21 Jan 12:31 next collapse

Please. It is the most annoying part of trying to use some sites and I rather not give out my number to people who store important info in plain text files.

futatorius@lemm.ee on 21 Jan 21:07 next collapse

Internet security and internet privacy are only incompatible goals when combined with incompetency and shit user-exerience design.

Katana314@lemmy.world on 21 Jan 21:23 next collapse

On this question of verification, I don’t have a particularly foolproof solution, but maybe there just isn’t one.

I can criticize the modern web for a lot of things, but as long as we have situations where we want to check whether an account is a real person, as opposed to FarmingBot #295038, they need something. I’m not a fan of phone verification, but I’d only criticize it when we have alternatives.

I’d even be in favor of some kind of one-way algorithm by which a trusted real-person-identifying entity could tell a random third party site: Yes, this is a genuine human.

Ahrotahntee@lemmy.ca on 22 Jan 00:45 collapse

The technology has existed since the 80s.

X509 certificates would allow a government agency to sign a digital identity indicating that it’s legitimate, would allow for remote revocation in the event of loss or theft, and can be easily integrated with every existing computer and browser.

An issued physical card would resemble a credit card, with a chip in it. Other physical form factors can take the shape of USB-devices which bundle the card and the reader into a single device.

dual_sport_dork@lemmy.world on 22 Jan 03:45 collapse

I don’t want to treat phone numbers as an ID, but for some reason my customers will give their phone number to me online far more willingly than they’ll cough up their email address, which is baffling only until you realize:

  • Most people are technologically incompetent and are intimidated by the avalanche of crap they get in their email, and
  • They never answer their phones anyway, so who cares?

I actually offer the option, because I don’t give a rat’s ass how people ignore me when I try to contact them. But when they place an order I at least need to be able to prove that I tried.