somenerdliam Profile Banner
Liam πŸ’» Profile
Liam πŸ’»

@somenerdliam

Followers
14K
Following
3K
Media
10
Statuses
218

code monkey by day, twitter philosopher by night. (Sir/Sire)

Joined September 2016
Don't wanna be here? Send us removal request.
@somenerdliam
Liam πŸ’»
6 years
How to DELETE 99.9% of your digital footprint from the internet [a thread]
1K
91K
357K
@somenerdliam
Liam πŸ’»
6 years
Back soonβ„’
25
1
81
@somenerdliam
Liam πŸ’»
6 years
Happy Sunday remember when you said you was going to delete some your old accounts, change some of your old passwords and buy a VPN? there's no time like the present Get it done.
13
35
214
@somenerdliam
Liam πŸ’»
6 years
They'll figure out a way to get the victim to adhere to the phone company's protocol of entering a pin or a code. They get pretty creative, so I can't really get much more precise than that.
@plaverty24
Patrick Laverty
6 years
@somenerdliam What happens when the phone company sends a code before swapping?
2
0
13
@somenerdliam
Liam πŸ’»
6 years
How sim swapping works: 1. Hacker gains information about target, usually through some trivial scam such as phishing. 2. Hacker convinces the phone company to switch the phone number to a new sim by telling them "they" had their phone compromised/lost/stolen. 3. Hacker wins.
2
7
70
@somenerdliam
Liam πŸ’»
6 years
Oh and there's thousands of hackers who do this. They will target lists they know have accounts with financial institutions, specifically those that dabble in cryptocurrency, namely Coinbase and they'll gain access to your account through sim swapping and empty your funds.
1
4
19
@somenerdliam
Liam πŸ’»
6 years
You know what the funniest part about Sim Swapping is? There's no real defense against it right now. You are helpless to the stupidity of your phone provider should you be targeted. The only solution is through prevention.
4
4
41
@somenerdliam
Liam πŸ’»
6 years
Have you taken action on anything I've said so far?
1
1
13
@somenerdliam
Liam πŸ’»
6 years
I told you what you needed to know, what you should do going forward and it took you 30 seconds to comprehend. Simple. That's how we want it to go from here on out.
1
1
13
@somenerdliam
Liam πŸ’»
6 years
Ask your local tech junkie how you should combat 2FA vulnerabilities in a 240 character message? It'd probably take him awhile, and you'd probably be left confused. Accessibility of information is also how it's communicated.
1
2
16
@somenerdliam
Liam πŸ’»
6 years
I don't write content that you can Google. If it's something you can google and find out faster than I can tell you, I won't create it. My point is not to waste your time and not to waste my own.
3
5
99
@somenerdliam
Liam πŸ’»
6 years
I want it to be perfect to access, so it might take a little bit longer than I expected. Stay posted.
1
0
44
@somenerdliam
Liam πŸ’»
6 years
To anyone who actually cares: I'm publishing content on my own website, I'll be making a compressed version for Twitter. I want it to be informational enough to take action on, and Twitter is too restrictive for me to tell you everything you need to know.
8
7
152
@somenerdliam
Liam πŸ’»
6 years
You can also store your software based 2FA on a cold backup. You could literally have the codes in your safe, should you ever need them again.
1
0
8
@somenerdliam
Liam πŸ’»
6 years
Are you guys starting to see how hacking works? You find the weakest link and you apply some pressure.
0
1
48
@somenerdliam
Liam πŸ’»
6 years
What's the moral of all these sim-swapping stories? hackers will use the easiest route available to them STOP making it so damn easy.
4
4
27
@somenerdliam
Liam πŸ’»
6 years
a. What should you use instead? application-based authenticators b. What if you can't use those? 1. Buy a SIM. 2. Keep the line active as cheap as you possibly can. 3. Keep the number private. 4. DON'T USE IT FOR ANYTHING OTHER THAN 2FA.
1
8
46
@somenerdliam
Liam πŸ’»
6 years
Why? https://t.co/shIWFSFpDq Twitter asks you to use the same thing their founder got hacked for using... Would he have gotten hacked if he didn't use their "security"? No.
Tweet card summary image
nytimes.com
Hackers have been targeting regular people and celebrities with the attack. Last week, it was used to hijack the Twitter account of Twitter’s C.E.O.
3
4
34
@somenerdliam
Liam πŸ’»
6 years
Again, I don't know who needs to here this but: STOP USING SMS TWO FACTOR AUTHENTICATION
14
76
251
@somenerdliam
Liam πŸ’»
6 years
Happy Saturday I hope you realize you are probably leaking your I.P Address by not disabling IPv6, and your VPN more than likely operates solely on IPv4 Have fun.
13
64
338
@somenerdliam
Liam πŸ’»
6 years
Want to make $50 in 10 minutes of work? 1. Sign up for a coinbase account. 2. Watch the videos on this page (hint, you can cheat using Google) 3. Claim your crypto and SELL it instantly. (this is not sponsored, I do not make money from telling you) https://t.co/n0Hu0YXmPQ
13
21
153