this post was submitted on 12 Oct 2023
329 points (99.7% liked)
Games
16697 readers
653 users here now
Video game news oriented community. No NanoUFO is not a bot :)
Posts.
- News oriented content (general reviews, previews or retrospectives allowed).
- Broad discussion posts (preferably not only about a specific game).
- No humor/memes etc..
- No affiliate links
- No advertising.
- No clickbait, editorialized, sensational titles. State the game in question in the title. No all caps.
- No self promotion.
- No duplicate posts, newer post will be deleted unless there is more discussion in one of the posts.
- No politics.
Comments.
- No personal attacks.
- Obey instance rules.
- No low effort comments(one or two words, emoji etc..)
- Please use spoiler tags for spoilers.
My goal is just to have a community where people can go and see what new game news is out for the day and comment on it.
Other communities:
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I don't want to be too cynical, but I get the feeling this is working as intended on the parts of the "developers." If less than 100 people had the game installed, there is a good chance it was shovel-ware with a low or free upfront cost that was then sold to scammers. The scammers push the malware, get all the information they want from compromised machines, and then move on. The SMS will really only be a sort of "you gave the OK for this update to be pushed out, so you are responsible," type thing, which won't matter in the case of malicious shovel-ware and fly by night devs who only plan to sell out their install base, anyway.
It's not a confirmation via SMS, it's a verification via SMS, so the attacker has to have your phone number as well as your steam account to attack it, which makes it harder.
And SMS messages can be intercepted. Not a good option, use physical security keys instead!
Even authenticator apps are generally better than SMS.
One thing no one talks about with SMS verifications, though, is that it frequently confirms your phone number to the business you're giving it to. If they're in the habit of trading user data, this makes the data much more valuable. I think this is the real reason for many businesses that push for it, when normally they could hardly care less about user security.
Seriously, while 2FA via SMS is generally much better than nothing, it has zero security so might even make things worse in some cases by providing a false sense of security!
RCS messages are encrypted using TLS.
RCS isn't SMS though, nobody mentioned RCS!
RCS is a replacement for SMS, used by the majority of mobile carriers in Europe, Northern America, and Asia. It is used by default in all supported regions.
I know what it is, but it's got nothing to do with this discussion. What company provides 2FA codes via RCS instead of SMS?
Most of them do, because as you have noted before, SMS protocol is not secure.
Do they? I've never seen this as an option. In fact, I've never even seen RCS mentioned anywhere outside Android enthusiast forums!
It's not surprising if you haven't come across the rollout of RCS. Google developed this feature as a replacement for the less secure SMS standards and aimed for a seamless implementation without causing user disruptions. This could be a rare instance where we commend Google for a change that benefits users, not just their bottom line.
Except there's still very little support for it as they haven't opened up the protocol for people to actually write clients to use it
And it appears Apple isn't on board, and since the vast majority of my text messages go to my wife on her iPhone, it's largely useless for me.
I'm also considering moving to a Linux phone (PinePhone), which I assume also won't be able to use this. So it's a nice gesture, but ultimately has limited impact.
Only if you have the access to the same mast, otherwise no. This vastly reduces the number of attack vectors.