this post was submitted on 16 Jun 2023
8 points (100.0% liked)

Australia

3507 readers
162 users here now

A place to discuss Australia and important Australian issues.

Before you post:

If you're posting anything related to:

If you're posting Australian News (not opinion or discussion pieces) post it to Australian News

Rules

This community is run under the rules of aussie.zone. In addition to those rules:

Banner Photo

Congratulations to @[email protected] who had the most upvoted submission to our banner photo competition

Recommended and Related Communities

Be sure to check out and subscribe to our related communities on aussie.zone:

Plus other communities for sport and major cities.

https://aussie.zone/communities

Moderation

Since Kbin doesn't show Lemmy Moderators, I'll list them here. Also note that Kbin does not distinguish moderator comments.

Additionally, we have our instance admins: @[email protected] and @[email protected]

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 1 year ago (1 children)

but they call and pretend to be you and get the number ported to the SIM they have

check out the Hot Swaps episode of Darknet Diaries

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

But shouldn't part of that process involve verifying the customer on the phone is currently in possession of the number? ie. Sending a text with a code and having you read the code back to them. Perhaps they manage this by fooling the victim into giving them that info through some other method.

Edit: thanks for the podcast recommendation btw, subscribed and downloading now!

[–] [email protected] 2 points 1 year ago (1 children)

They usually do the latter, by pretending to have lost their phone, and verifying through some other means, whether that be from the code, or questions.

[–] [email protected] 3 points 1 year ago

Yeah I listened to the podcast recommended a few replies back, great episode if you haven't listened already - it's hilarious how easily they can social engineer their way into accounts once they know the process:

https://darknetdiaries.com/episode/118/