SCAM 2FA Apps!
Вставка
- Опубліковано 1 лип 2024
- It’s super important to have a 2nd method of verification on your accounts. One popular option is an Authenticator app, otherwise known as a TOTP app.
But it turns out an overwhelming number of authenticator apps in the app store are actually scams.
In this video we’re going to show you how some of these fake apps actually steal your information; and explore the dark patterns they use to trick you into doing certain things. We’ll also show you how to stay safe when downloading 2FA apps so you can protect your data and your accounts.
00:00 Intro
01:52 2FA apps STEALING your seeds!
03:44 Dark Patterns Exposed
05:50 Analytic Events
06:46 Paywalls
07:17 Dark Patterns
09:54 Copycat apps
10:51 More Shady Tactics
12:32 Advice for Staying Safe
15:07 Conclusion
There are some well-regarded, open-source options out there. But it's SUPER important you make sure you're downloading the real version! Stay safe 🙏
Special thanks to the Mysk Team for their awesome research! Follow them here:
/ mysk_co
Brought to you by NBTV members: Reuben Yap, Sam Ettaro, Will Sandoval, and Naomi Brockwell.
To support NBTV, visit:
www.nbtv.media/support
(tax-deductible in the US)
Visit our shop!
Shop.NBTV.media
Our eBook "Beginner's Introduction To Privacy:
amzn.to/3WDSfku
Beware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.
Visit the NBTV website:
nbtv.media
Watch this video on LBRY/Odysee!
open.lbry.com/@NaomiBrockwell...
________________________________________________________________________
Here are a bunch of products I like and use. Using these links helps support the channel and future videos!
Recommended Books:
Beginner's Introduction To Privacy - Naomi Brockwell
amzn.to/3WDSfku
Permanent Record - Edward Snowden
amzn.to/305negc
What has the government done to our money - Rothbard
amzn.to/2KMzmcu
Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
amzn.to/3BLZ1gq
Digital version: inteltechniques.com/book7.html (non affiliate link)
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
amzn.to/2UQmJ4m
Some of my favorite products to help protect your privacy!
Brave browser: brave.com/nao076
Faraday bag (signal stopping, to protect your fob, credit card, computer, and phone)
amzn.to/3z02UiF
Data Blocker (if you're charging your phone in an unknown port, use this so that no data is transferred)
amzn.to/2SVh0J2
Camera tape (electrical tape is the best tape for covering phone and computer cameras)
amzn.to/3Xn8xBn
USB-C to ethernet adapter:
amzn.to/2lOVBoy
Privacy Screens (use your phone and computer in public? Keep your information safe!)
Computer: (Search for the size right for your computer)
MacBook Air 13" amzn.to/3VQvpZ7
HP/Dell/Acer/Asus/Lenovo 15.6" amzn.to/3KK1Oda
Lenovo Thinkpad/HP Elitebook/Dell 14" amzn.to/4enT2zq
Phone: (Search for the size for your phone, decide whether you want glass or plastic!)
Galaxy s24 - amzn.to/3VGgb8H
iPhone 15 - amzn.to/45vCd1h
Pixel 8 - amzn.to/3KFDuJF - Наука та технологія
A most informative yet sobering segment. It only stands to reason that it is just a matter of time before AI driven scam apps will become so prevalent that they will become virtually indiscernable from legitimate ones..
Naomi is a gem 💎
@@PaulyTater Blinding our vision precious.
Simps everywhere
@@sevenelven Aww, you learned a new word. 🥰
@@natemarx4999 uhh thanks? Lol
@@sevenelven Hi! You can give me compliments too. It helps balance out the nasty ones!
Thank you Naomi for highlighting this danger. You really are a treasure.
This channel has both given me confidence and anxiety LOL
knowledge enables us to empower ourselves and make more informed decisions! :)
Exactly right.
Naomi has that affect (effect?) on people.
Now read what I just wrote again if you're neurotypical or neurodiverse. 🙊🙉🙈
Thanks Naomi for breaking it down and keeping it real!!
It really appreciate that in the end you point out the spectrum of security. That not all of these concerns affect all users. Some of us aren't going to fall for dark app design but some of us will. We can adjust as needed.
I haven't flipped over to hardware yet but I'm using three different apps. Authy (Desk/Mobi), Aegis (Mobi), an open source browser extension (Desk). Definitely something to be mindful of regarding the apps.
Good points .
Authy is owned by Twillio who got breached and Authy also requires a phone number which can make your account vulnerable to sim swapping attacks.
I would recommend Raivo OTP for iOS or Aegis Authenticator for android or even better a hardware security key such as Yubikey.
@@IdkG7 Welp I'm not sure if you finished reading my post but I'm aware of the breach with Twillio. And hardware keys keys won't work with my use case. In my particular case I'm not concerned about SIM swapping but thanks for the general concern and the tips.
Great content! Curious to see the next vid on the open source ones.
You and these guys been doing God's work. Thank you.
Also something to note: 2FAS and Microsoft Authenticator have biometric lock on the app itself while Google Authenticator doesn't, at least on Android. This makes the former options even more secure
In iOS Google Authenticator also has biometric lock like Microsoft Authenticator.
@@alvaromonteiro7766 that's good. I mean I'm genuinely happy for ios users and even more pissed at Google now. For their own Android OS which has biometrics built in, they couldn't implement it yet🤦♂️
Thanks Naomi for enlightening us all😇
Thanks. Really interesting one - nice mix of what and how. Cheers!
Aegis authenticator is what i use and its great thank you reddit
Fortunate to find your channel! Good video! Keep it up! 👍🏼
🙏
This woman really does a great job. I wish I had found this channel sooner
You're here now! Welcome 💛
i just came across your channel. I haven’t finished the first video but started scrolling through your videos. Subscribed for all your content👍🏾(I finished the video and greatly appreciate your content. Made me happy I’d decided all these years to stick with SMS. Now I need to get a good security key)
here's a deep dive into sms to show you the other side of things! ua-cam.com/video/hLQpys14wW0/v-deo.html
@@NaomiBrockwellTV o Thank you very much. I'd heard about a year ago about the problems with using SMS for 2FA. I decided to stick with it rather than get an authenticator app.
Excellent guests . And the host is sublime .
Naomi , love you and your videos! You explain everything so well but in a way a dummy like me can understand!
Thanks
Seems like the app store could have liability for letting these scammers steal seeds
i feel like a lot of liabilities go away when a user agrees to the terms prior to using the app store.
Separate discussion, but this is one of the reasons I absolutely hate generic names for apps with common functionalities, and all big tech companies are guilty of doing this.
It's just another anti-consumer measure to confuse people, and it ends up enabling bad actors to do stuff like that - release their own app with some generic name that will live in peoples phones there scamming them out of their privacy and security because of a greedy decision by big tech.
This includes not only authenticator apps, which a whole ton of companies decided to name it simply as "Authenticator", but also almost all more common or system apps such as Clock, Calendar, Weather, Dialer, Messenger, MyFiles, Gallery, Camera, Voice Recorder, etc etc etc.
In a fair world this should be grounds for anti-trust investigations. A whole bunch of those apps are proprietary and often mass harvesting data without authorization. The practice should also be considered a dark pattern.
That's an interesting point. I've certainly had that problem distinguisihing the contacts app I downloaded vs the one that came with my phone.
Great to see you and Heidi talking together. My 2 fave tech and crypto girls keeping it real 🙏🏾💕🙏🏾
She's great :)
Excellent content. I think these clone apps/sites are not just targeting 2FA but all apps
Thanks alot! I needed this info....
Great show 👍 and a very important subject you are explaining in way, that everyone can understand. You have some great posters on the wall with Snowden and Monero. Could you please leave a link to where I can buy them? 😎
Actually unsure where to buy them these days! I'll find out
Fantastic content !! Thank you very much
Great video!
In addition to the official reliable authentication apps like Google and Microsoft, it's worth mentioning that Apple has a built in authenticator under settings in the password section. Of course, for those who have an iPhone.
thanks, just sent this to a colleague who didn’t want to recommend any specific app because the users should be able to decide by themselves
A (yearly) update on the best VPN, email, DNS, browser, search engine, etc. would be very cool! ☺️
Or a website that keeps updating when your top 10/top 5 change and why they change. ☺️
Great video. When will we see you on the Fediverse?
Dark Side of 2FA = Mouse Guarding Cheese!
Great video. I'm very fortunate to enjoy computers because the pitfalls for the unwary are endless.
Thanks Naomi you are a guardian angel !
Thank you Naomi.
You should mention SIM-LOCKING if you want to use SMS for the second factor. It sounds like that mitigates the risk of sim-swapping. Now all you have to worry about is a man in the middle attack for SMS to get your codes.
This is a video people should pay attention to.
Great video
You are such a splendid mind !
Excellent video
Luv your delicious accent and your classy vintage garde robe. So bri-ish. But most of all your knowledge and desire to share it in such a simple and easy to understand way for such technical topics. Thank you for sharing Naomi. You are the queen of the geeks.
"queen of the geeks" 😂 I'll take it
Great Video!!!
🙏
Naomi I miss you. Where have you been? You are even more beautiful today!!!
Nice video
Very. Ice and informative
Important video
Thanks for your excellent work❤🙏
I wish youtube would also allow you to archive Playlist... I have several IT related ones (this one for example I put in a Playlist "security") it would make my life easier with the amount of Playlists I have 😅
Good data, thanks. What do you thnk of getting codes via email or phone call, rather than SMS text?
I'd really like to see exactly how Tommy and Talal check these apps for maliciousness, like do they have an internet bandwidth monitoring app or tool they prefer to use to monitor every in and out bound communication from these apps and the nature of those communications and the info they're gathering and sending? Is the preferred software for this, Proxyman?
Thank you. When a business pushes 2FA, it is often done without training. We had several people click on the wrong application.
can't wait to see the next video
currently writing it!
Same. Naomi, please give ppl some basic advice on downloading apps. Ppl should always check number of download s for popular apps. That info is so easy to see and can't be faked. For example, Microsoft Authenticator haf 50M+ downloads. Other things ppl should do is look at the developer info (and email address) as well as read thru negative reviews. Can't tell you how many times I didn't install apps just because people said they were littered with ads, etc.
And thanks for your awesome content. When the WEF forces us all to have digital IDs and internet licence then your channel should be a part of the process in passing our internet licence test.
*TIC*
@@NaomiBrockwellTV Do please include links in the video description to websites for apps approved by the Queen Geek in your next video. ;-)
@@cdl0 will do!
I like open source FreeOTP+ although I disabled network access which I guess is used for icons.
2FAS is great! That's by far my fav
naomi this was helpful.. general.. would it not be helpful to list apps that are actual examples of apps that were uncovered,
and documented to be examples of what you are reporting?? respect achilles
Interesting video. One thing I do wonder is how those free 2fa generators that seem legit earn their money. When things are free, usually you are the product.
Another excellent video, once again, but in this case I have very little sympathy for users who download and trust random software developers on the Internet, regardless of whether it's security software, or social media software, or games. If I am thinking about downloading any software I first spend an hour researching the company that I'm downloading it from and also studying its Privacy Statement. Half of the products that I examine fail these tests and I don't download them.
Brilliant
Why was this 8:03 not identified during Apple's manual app verification process?
Hi, what’s the best 2fa for iPhone for personal use. Thank you.
She very good thank you
Another better solution is not paying for the scam software. You can close the app most of the times and if not, just switch the phone off. When reboot your phone, just uninstall that software. The biggest problem is that people are more and more "click happy" and clicking every button they see. Think about the "don't push this button" test. Everyone is going to hit that button.
The more authentication you need the less safe it is in my opinion specially if its Google and other similar company's.
Best open source Apps, where the public can check it, if ther is some wrong.
❤ thanks for your help, I have been targeted for 6 years by Leigh McLean who is a covert Narcissist. I could barely type this, do you have any information for me?
I’d give Naomi my seed
I Like your Video, Love From INDIA
I think apple’s 2FA in their password manager not being mentioned is a problem because even though they might be tracking usage, it’s inbuilt into all Apple devices
Yeah. It's baffling why she didn't mention that, especially Apple being big on Privacy.
I just saw a video by The WSJ about the iPhone's entire security relying on the phone's lockscreen passcode and how all of your data on that phone can easily be compromised just by knowing that one short PIN... so i would never advise using Apple's options for password management and/or 2FA authentication, you're better off using a 3rd party app which offers a separate way to lock the app itself (and don't use the same pin as to your phone of course)
@@beriont. while I agree that’s a problem right now, Apple will fix it. And the video wasn’t about the best way to keep safe and secure, it was about the easiest options that are better than “fake” apps.
Waited and waited but I never heard what apps to avoid.
Ok how would they be able to get your SEID, EID, or IMEI to do this? If your phone is locked how would you be able to stop this?
Nice video mam
Ya gotta watch out for fake password manager apps too.
absolutely
What about password managers with a OTP field, like 1Password?
But can someone tell us which apps are compromised and which are secure? I have a 2FA and even if I understand all this I still don't know if mine is one of the bad ones
The problem with a key is that you need two and have to carry something else about. If they were smaller, I would use them.
I would use Aegis.
Do you carry a house or car key around?
video with using vpn as firewall, like netguard? which can be setup as block by default so new app can't connect to the internet,
SMS is more secure than 2FA especially for eSIM. And SIM cloning is not easy anymore, it also need physical access to the sim and therefore more secure than Yubi keys.
Kind of a nightmare.
So much for the app store being safer. "side loading" is dangerous they say. Sounds like you are taking your chances either way.
2FAS is open-source and the most featured app.
I always try to use well knows FOSS apps of all kinds
Is there a way to use both TOTP and/or a FIDO Key. That way if you lose the FIDO KEY, you can still access the account/site?
Depends on the website, sometimes they all back up security keys, or back up other authentication methods
As long as Google Auth app is straight, I'm good!
Something to note andOTP is no longer getting updates as the dev has stepped away from the project.
Smartest, hottest redhead on UA-cam!
Surely the big weakest of a 2fa app is your phone which typically has a short code?
There are flavors of Android that allow you to block internet access to certain apps. I bet if you block access before setting them up, they can’t leak anything.
OnePlus’s flavor of Android has allowed for this but being a Chinese company, you may be subject to a lot of other data being leaked.
Oh thanx for that, i never used any of those but I didn't have a clue either
So company that demand you use 2FA is bad, too? Do you have a video on SMS? And last ❓is eSim vs Sim better or worse? Thank you👑!
If a company wants you to use 2FA, then they should be obliged to send you a hardware security key.
I will NEVER understand why anyone in their right mind would use their FACE (unique identifier) OR THEIR FINGERPRINTS (yet another unique ID) on a device thats tethered to the internet pretty much 24/7 and on a device that may or may not be transmitting those unique ID's to some 3rd party either deliberately or by interception of that information, and on a device that has been shown that corporations habitually use to take away our freedoms and liberties every bit day by day. I will never understand humans sometimes.
Why Apple permit all those apps in the App Store?
Sorry in advance for potential bad English, Bilingual(English is not my mother tongue, yes it's on a good level but still) and dyslectic
As long it's MS or Google expect your data to be collected and sold further. Yes as long it's free, you're the product but some companies are better than others. More and more companies have started to be more privacy based. I try to use the ones who are more privacy based more than the ones who are big known tech companies like MS, FB, google(alphabet), Apple etc....
Being online you have to sacrifice some privacy and information but some are way worse than others. Either you have to live outside the grid totally, or have 10 Firewalls, Anti-tracking, tor, VPNs and you're still not totally safe. So either you have to live not connected at all. Like in the middle of the forest in a cave and live like modern stone age. Or you must sacrifice something. You should try to use the more privacy based type of companies. The most secure way to use MFA is actually the HW keys which looks like an USB stick.
So much for Apple to not do anything for authenticity and still people believe that they respect our privcay bcoz they are premier and costly. Dont understand these money sucking corporates.
There's nothing to steal. They seem to have it all already. And they're still compulsively scavenging. It should tell you something about their real natural place on the food chain.
Unfortunately there are many fake 2FA apps in the app store and Google Play store and it can be hard to tell whether they are real or fake apps
Is it though? Because, its pretty obviously fake just by looking at the publishers name. There is only a handful of companies that make legitimate security apps and only two of them are actually worth using. Microsoft and Bitwarden.
andOTP has been abandoned
It has? When was the last active development? I'll look into that, thanks!
flocke Unmaintained on Jun 14, 2022
andOTP GitHub
oh snap. looks like it HAS been abandoned.
> This repository has been archived by the owner on Jun 14, 2022. It is now read-only.
Seems he got a "big boy job" as it were and doesn't have time and energy to do even more work after that. I wish the developer well. Sounds like it couldn't happen to a better person.
@@okay4634 will mention that in our upcoming followup video when we dive into open source options, thanks!
That dam evil hacker.
Hi, can i have this question. How can i be able to figure out which app is real and which app not not real? Thanks
That's highly illegal because of terms of service and bypassing device software via the website or an app is also illegal report this asp or else you'll be hacked, force restart your device if it's trying to force you to purchase something you don't want to buy, delete the website data immediately and completely delete the app from your account on all devices, update all devices to the latest version and turn on privacy settings to mitigate further hacking or fishing 8:44
I use Microsoft Authenticator and 2 Secure Keys
algorithms
gracias
The sad part is I know the exact users who would fall for this. Especially the one I married. 😂
...but as she says, that's why I'm still around (for tech support) 🙂
How can they do sim swap if you are using an Apple iPhone with only e-sim?
esim is functionally no different to a normal sim. number just gets ported to a new IMSI