![t mobile sim card reader t mobile sim card reader](https://sc04.alicdn.com/kf/Hdedb1eb2da2440b38adf2625c9d10dd22/220858908/Hdedb1eb2da2440b38adf2625c9d10dd22.jpg)
- #T mobile sim card reader update#
- #T mobile sim card reader verification#
- #T mobile sim card reader code#
If nothing else, T-Mobile could at least increase security when port outs look like a tennis match with the rightful owner and the crook moving the SIM back and forth in an attempt to gain control.Ĭompanies like TeleSign are trying to stop these types of attacks with carrier data (specifically: date/time of last SIM swap) and I hope wireless carriers will provide this data, since it is a fairly simple/obvious solution to the problem.
![t mobile sim card reader t mobile sim card reader](https://the-gadgeteer.com/wp-content/uploads/2019/09/tmobile-home-internet-10-800x600.jpg)
Even though it is inconvenient and crooks may steal or fake IDs, going into a retail store to port out a number might help, too. If there is an account holder like me with multiple lines, the least T-Mobile could do is require one or more other phones to validate the move through text message verification. I don't have all the answers on what US wireless carriers can do to help customers with SIM security, but this issue needs to be taken more seriously. I haven't tested this out yet, but honestly, I am not too confident that my number will remain secure with me moving forward.
#T mobile sim card reader verification#
I also asked that they continue the practice required of me: Sending a verification text to another phone in my family plan. Thankfully, a senior person at T-Mobile was able to provide what I asked for - that no changes be made to my account without first requiring that the person goes into a physical T-Mobile store and show an acceptable identification card. It's a mystery to me why this port validation PIN was not added the first time the hacker stole my phone number, and it shows me that T-Mobile needs to get more serious about this problem. T-Mobile was only able to make sure I had a port validation PIN enabled on my account. I was outraged that someone calling to port out my number twice in two days didn't raise any red flags, and there was no verification through the other phones in my family plan. Two days later, T-Mobile let the hacker steal my phone number again. I also asked that T-Mobile note in my account that my phone number should remain associated to my physical SIM that is currently in my iPhone XS. I asked that T-Mobile require the same family plan phone verification if someone tried to steal my phone number again, since that adds another level of verification to my account.
#T mobile sim card reader code#
Interestingly, T-Mobile required a verification text message and code be sent to one of the other four phones in my family plan before the representative would transfer the number back to my physical SIM. And once my number was no longer in my control, the floodgates were open for the hacker to take over my other accounts using SMS authentication methods. The thief was likely able to find enough personal information about me online to convince the T-Mobile representative that he was me without the port validation PIN setup, they let the thief steal my number. Had I been using this second pin, my SIM swap may have been prevented.
![t mobile sim card reader t mobile sim card reader](https://ae01.alicdn.com/kf/HTB1GSusBHuWBuNjSszgq6z8jVXa8/YuXi-Sim-card-reader-socket-for-Lenovo-S660-A690e-S686-S720i-a780e-A529-A800-A520-A580.jpg)
It turns out there is a PIN for when you call into customer service, but there is also a second PIN - a 6- to 15-digit port validation PIN - that you should also add. I did not see this message, but I had a PIN on my account that I believed would help keep things secure. In early 2018, T-Mobile issued a press release regarding unauthorized porting (SIM swapping) with some additional steps customers could take. It appears the weak link in the chain that broke first and let the hacker gain access to my Gmail - which in turn led to hacking my Coinbase, Twitter, and other accounts - was my mobile carrier. I've personally made a few changes - see below - that I hope better secured my account, but there remains one area of concern that still has me worried.Īlso: Wave of SIM swapping attacks hit US cryptocurrency users US wireless carriers are the weak link While it was an extremely stressful 10 days, I've had the opportunity to share my story with people, including appearing on Tech News Weekly with Jason Howell, and I've had a large number of people say they updated their security settings, noted some of the key recovery information I shared in that first article, and took a closer look at their cloud usage practices. Readers offered me fantastic advice in the comments to last week's article, and I sincerely appreciate all the helpful feedback, tips, and tricks.
#T mobile sim card reader update#
While I already provided many details about my experience, I wanted to update you on the progress made to date - while also offering some advice. You can make life difficult for a would-be identity thief by locking down these five key aspects of your online life. Having your identity stolen can be a nightmare, and cleaning up the mess can take months. Protect your online identity now: Fight hackers with these 5 security safeguards