• What to do before your phone is stolen

    Home » Forums » Newsletter and Homepage topics » What to do before your phone is stolen

    Author
    Topic
    #2541363

    SECURITY By Peter Deegan Having your smartphone or tablet stolen is a traumatic event, but there are things you can do beforehand to make loss and rep
    [See the full post at: What to do before your phone is stolen]

    11 users thanked author for this post.
    Viewing 6 reply threads
    Author
    Replies
    • #2541482

      Great article. Everyone should plan for the loss/theft of their smartphone.

      Get up to speed on router security at RouterSecurity.org and Defensive Computing at DefensiveComputingChecklist.com

      2 users thanked author for this post.
    • #2541487

      I had to do this myself six weeks ago. Having a password vault with all of my passwords, a full iCloud backup, and a helpful (and sympathetic) Apple Store employee really helped me get back on track when my iPhone was stolen. I also had FindMy enabled and was able to set a Lost Message and a command to lock and wipe the old phone.

      As mentioned, I’d not 2FA app and anything to do with it are  securely backed up in a way that can be easily restored. Just having passwords isn’t enough if all of them (as they should be whenever possible) are linked to two-factor codes you can’t get access too. Most of mine were, but not all; fortunately, I had easy access to help to get the ones I didn’t have reset. I am now periodically testing my ability to recover my 2FA in the event something goes awry.

      We are SysAdmins.
      We walk in the wiring closets no others will enter.
      We stand on the bridge, and no malware may pass.
      We engage in support, we do not retreat.
      We live for the LAN.
      We die for the LAN.

      1 user thanked author for this post.
    • #2541497

      I have a Samsung.  At home, awake, my phone is on my desk.  When I’m sleeping, it’s charging on my nightstand.  Any other time it’s in my back pocket unless I’m making a call.  I’ve been using cell phones for ~25 years, and have never lost one.

      It’s kinda like my truck keys; they are either in the ignition while I’m driving, or in my right front pocket.  I’ve been driving over 63 years and have never lost a set of car keys.  My house keys are separate from my ignition keys, and are either in my hand unlocking the door, or in my left front pocket.  I’ve never lost a set of house keys.

      There’s no setup involved, other than forming the habits.

      Always create a fresh drive image before making system changes/Windows updates; you may need to start over!
      We were all once "Average Users". We all have our own reasons for doing the things that we do to our systems, we don't need anyone's approval, and we don't all have to do the same things.

    • #2541525

      There’s nothing to protect on my phone. I’d call the cellular provider and have the SIM cancelled, and a new one sent. That should about cover it.

      There is not much point in trying to lock the phone, as it is neither an Android (proper) nor iOS device, and I don’t know of anything that would do that without the thing being logged in to an Apple or Google account. There is no such account on my phone. But even if it was locked, the thief, or more likely the ultimate buyer of the stolen device, could just wipe the internal storage and put on a new OS and bootloader, much in the same way that I did when I got rid of Android proper. My data would be gone, but there’s nothing really interesting to a thief anyway.

      I don’t need a spare smartphone in case this happens. I have a “dumb” flip phone I can use with the new SIM, once the cellular provider sent it. I would be using that in place of the smartphone if it had the mobile hotspot feature. My data plan exists to be used by tethered devices like my laptop (primarily my XPS, as it is the one that comes with me when I am out and about). Otherwise, a phone is (a) an actual phone, mainly to be used in case of car trouble or that kind of thing, and (b) an alarm clock. Any phone can fulfill these roles.

      If I were ever to have my phone stolen, I have plenty of time to research and decide what (if any) replacement phone I might want. My existing one is a $130 model (network unlocked, bought outright, not from the carrier) and it is at the absolute maximum size I am willing to tolerate… and it is discontinued in favor of bigger ones. I’d love one the size of the original iPhone, but it has to be iOS and Android free (or be able to be made so), and ideally still receiving regular updates.

      Barring that, I would probably go for a flip phone that does have the wifi hotspot. I actually thought my current flippy had that when I bought it, but it doesn’t. I can tether it with USB, but that means I would have to carry a USB cable in addition to the phone and laptop.

       

      Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon
      XPG Xenia 15, i7-9750H/16GB & GTX1660ti, KDE Neon

    • #2541530

      Just today I got an email newsletter from Malwarebytes discussing a growing trend where two or three people working together in a setting like a bar will watch or even record a victim entering a phone’s passcode–on an iPhone, the passcode is the 6-digit code you use when Face ID/Touch ID isn’t set up, or isn’t working (e.g. because it’s too dark/your hands are wet). Then they will distract a victim to pick the loose phone off the bar if left there, or pick the victim’s pocket, or drug or assault a victim to get the iPhone.

      Once bad guys have both the iPhone and the passcode, they can edit the passcode to a new one and even, according to the Wall St Journal article Malwarebytes was citing, lock a user out of their own Apple account, and then quickly exploit financial apps on the device to siphon money. This is not just a theoretical threat; it’s actually been happening.

      So it’s probably best to be very careful about using a phone in a public setting, and especially unlocking it with a passcode. Also Malwarebytes cautions that it’s best not to keep photos of critical documents like passports and drivers licenses on a phone, because these guys search a stolen phone for that too. Instead, if you have to have these on your phone, it’s best to keep the document copies in a password manager that is locked with a different and more complex key than a phone passcode.

       

      • #2541557

        Here is a chilling video on the passcode “vulnerability” described above, whereby, you loose everything.

        This link may be protected by a paywall, but worth a try.

        https://www.marketwatch.com/video/joanna-stern-personal-technology/apples-iphone-passcode-problem-how-thieves-can-take-over-in-minutes/967C3B74-90D3-45EA-BAA4-4ECDBB24715D.html

        How many secrets, including 2FA/MFA responses, you want tied to a high theft mobile device is an interesting question.

        Windows 10 22H2 desktops & laptops on Dell, HP, ASUS; No servers, no domain.

      • #2541614

        Thanks for that … it’s an argument in favor of FaceID and part of the reason why FaceID is not used before allowing access to some security functions, like changing the passcode.

        It’s also a reason to reduce the wait time before the screen is locked — something I mention in the article.

        Such operations to get the passcode/pattern do happen but my understanding from unofficial law enforcement sources is those types of sophisticated ‘snares’ are relatively rare.  Most ‘petty’ thefts of phones/purses/wallets are by solo thieves not gangs operating together – those solo ‘entrepreneurs’ then sell to organized gangs (which is probably why my phone ended up in Romania).

        You can still lock out a smartphone, even if the passcode is changed .  But you have to be fast, which is why I urge people to familiarize themselves with the Find My Phone (or similar) site and features.  If your phone is stolen or lost, it’s a simple, fast and already known process to get in and lock out the smartphone.

        What my article is trying to avoid is the all-too-common exchange like this:

        My phone’s been stolen, what can I do”

        ” First thing is remotely lock the phone so no one else can use it”

        ” How do I do that?”

        “Go to the Find my phone site and login with your (Apple) ID”

        “What’s an Apple ID?”

        <pause for long sigh>

        Peter Deegan

         

         

      • #2541700

        Too many people ar eused to leaving their phone sitting on a desk/table in front of them so they can see as msgs come across.  This is one reason why many manufacturers have replaced the read FP sensor with the in-display FP sensor on the front – that way you don’t even have to lift the phone to unlock.  Just press your finger on the face of the phone sitting there.

        IMO, this leads to people being sloppy and not paying full attention to the situation around them as their phone sits on the bar/table in a commercial environment.

        Making things too easy often leads to unintended consequences.

        • #2541718

          Yes – that’s what happened to me. I foolishly left the phone on a cafe table — switching between the phone and laptop.  Quick distraction and it was gone.

          Peter Deegan

          • #2541790

            When I do use my phone when out and about, when my laptop is also along for the ride, the only time the phone comes out of the pocket is to turn on the wifi hotspot tether (or if I have to make a call). Once turned on, the wifi tether works quite well from the relative safety of the pocket. If I have my laptop, and it has internet connectivity (which it does, at that point), I can just use the laptop for everything and have only one thing to worry about.

            I have never had a cell phone stolen in the ~19 years I have had one, but I did have a laptop stolen by some people (strangers) I tried to help in the early 2000s (by stealth and misdirection). No good deed goes unpunished, I guess… and I am much more wary now, viewing anyone asking for help first as a potential grifter and only secondarily as someone who may be what they appear. I don’t like it, but I do not intend to be so easily stolen from again.

            When I am out with my laptop now, I am just as wary. I grip it firmly at all times, never setting it down, and and I have a pretty powerful grip, so a snatch and run hopefully won’t succeed. I am a large and imposing individual, so I would not be the first choice to steal from in that manner, but you never know.

            When using the laptop, I don’t just let it sit on a table in front of me or in my lap… when I am not typing with my hands overlaying the keyboard, I use my left hand to grab it (on the body portion) near the hinge. If I have to get up even a few feet from it, I will close the lid and pick it up rather than leave it, even though it would never leave my sight.

            I never leave it in the car unattended, even though I could easily hide it . I have never had the car broken into, but if someone knew I had it and somehow recognized my car, they may decide to do so.

            I’ve thus far prevented any more thefts. If one does take place, all sensitive data is in an encrypted LUKS volume, protected with a very long and annoying to type in passphrase. It’s all backed up locally, as I was a backup fanatic when that laptop was stolen, and I have not become less of one after that.

            In your case (addressing @peterdeegan), you had a laptop and a phone, and the thief took the phone. Was the laptop less of a convenient target, or did the thief actively choose the phone when he had equal access to both?

            I wonder if laptops may be a little safer these days for lack of interest on the part of the thieves. Right now my go-to laptop is a high-endish Dell XPS 13, which would be a nice target for a knowledgeable thief, if the value of the laptop itself is a consideration. I am not sure what the breakdown is between thieves who steal for the hardware itself and those who just want a person’s data for identity theft or similar types of fraud.

             

            Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon
            XPG Xenia 15, i7-9750H/16GB & GTX1660ti, KDE Neon

    • #2541699

      I’ve wondered about this question for some time.

      I use a 6 digit logon code for restarting the phone.  That’s 1 million possible combinations.

      How fast would a thief with a crack program be able to run through and enter 1 million codes on a phone?

      How is this done mechanically?

      • #2541701

        Luckily, iOS employs time delays where the device locks itself after too many failed passcode attempts.

        For example, if you make 5 failed attempts, your iPhone will lock for 1 minute, 6 attempts will lock it for 5 minutes, 7 will lock it for 15, and anything more than that will lock it for 1 hour.

        How to Erase Your iOS Device After Too Many Failed Passcode Attempts

        Windows 11 Pro version 22H2 build 22621.1778 + Microsoft 365 + Edge

        1 user thanked author for this post.
        • #2541703

          How to Erase Your iOS Device After Too Many Failed Passcode Attempts

          You can’t erase without your passcode !

          • #2541708

            Unless preset as in the next section, which is the main topic of that article:

            There is another option: you can completely wipe your iPhone or iPad after 10 failed attempts. (Make sure you keep backups if you enable this, though.)

            This option is off by default. To turn it on, first open the Settings and then tap “Touch ID & Passcode”.

            You will need to enter your passcode to access these settings.

            Scroll to the bottom of the Touch ID & Passcode settings and tap on “Erase Data” to enable the self-destruct feature.

            This Device Is Set to Self-Destruct

            Windows 11 Pro version 22H2 build 22621.1778 + Microsoft 365 + Edge

            1 user thanked author for this post.
          • #2541715

            You can still lock or erase remotely (for Apple and Android) from the ‘Find my phone’ site — access to that needs standard login (email, password and 2fac) – not the passcode.

            Peter Deegan

    • #2543188

      I have a Samsung.  At home, awake, my phone is on my desk.  When I’m sleeping, it’s charging on my nightstand.  Any other time it’s in my back pocket unless I’m making a call.  I’ve been using cell phones for ~25 years, and have never lost one.

      It’s kinda like my truck keys; they are either in the ignition while I’m driving, or in my right front pocket.  I’ve been driving over 63 years and have never lost a set of car keys.  My house keys are separate from my ignition keys, and are either in my hand unlocking the door, or in my left front pocket.  I’ve never lost a set of house keys.

      There’s no setup involved, other than forming the habits.

      That’s a great thing, until someone mugs you, or the unexpected happens that you can’t control.

      In my case, I was standing in the way (being a larger human) of someone smaller than me to prevent them from suffering injury at the hands of someone at least as large as me. When pushed, I fell. My phone fell out of my pocket, and before I could get to it, someone else on the same street scooped it up and ran.

      Not everything in life is predictable. I’m glad that apparently you have never suffered something unpredictable. However, should you, none of your habits will save you, unless one of them includes a documented backup and restore procedure for your phone’s data, and any account names/numbers, passwords, secret questions, and so on.

      I have had cell phones since 1998 (my first Motorola StarTAC!) Up until this year, I have never had a problem. I’ve never damaged one, I’ve never lost one, be it Nextel, Palm, Blackberry, Android, or iPhone (had them all). And then I had an event that was completely out of my hands, and the first thing happened. So that’s 25 years for me; right up until the end of January. Ensuring everything is backed up, regardless of good habits is still useful.

      We are SysAdmins.
      We walk in the wiring closets no others will enter.
      We stand on the bridge, and no malware may pass.
      We engage in support, we do not retreat.
      We live for the LAN.
      We die for the LAN.

      6 users thanked author for this post.
    Viewing 6 reply threads
    Reply To: What to do before your phone is stolen

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: