Oddbean new post about | logout
 The hacker interview is on nostr. Thanks to whomever uploaded it. https://media.nostr.build/p/7GDv2.mp3 
 I loved the interview! Thank you for being so quick on your feet there. 
 @bold 👀 
 🤫 
 Why didn't he onboard the hacker kid to nostr??

nostr:nevent1qqs2spua5xm4ltqkzda7u3tkc98dh240nj38mugqey9f6ufa0evw2xgpzpmhxue69uhkummnw3ezumt0d5hsyg94kfsetwh6z7mv0jlqzq9jjx8v830pdr8y7spn0hnk75rjlncy5upsgqqqqqqsxn3hyv 
 Clearly both are BSing each other. It's a bullshitter bullshiting the bullshitter case.
A Bullshitception if you will. 
 And you will 🫡 
 Holy shit 😂😂 
 This is wild.. 
 Did you get your Bitcoin off the exchange? 
 this was great.  thank you! 
 👀 
 #bitcoin #plebchain
nostr:nevent1qqs2spua5xm4ltqkzda7u3tkc98dh240nj38mugqey9f6ufa0evw2xgpr3mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmqzyz6mycv4htap0dk8e0spqzefrrkrchsk3nj0gqehmem02pe0euz2wqcyqqqqqqgf86vyc 
 Anyone know why they pulled it from all other social media? Junseth's account on X is now suspended. This is NOSTR moment to shine 💯

#grownostr #nostr #bitcoin #asknostr 
 Interview of the year 
 thanks 
 would have loved to have heard what he was going to say at 28:30 but it cut out, “…last night I was thinking about it while watching a movie…” 
 😧 
 You would think that you could already track down the hacker based on his statements...  🤔  
 Can you hook me up with the caller? I'm 90% sure I know the attacker's voice and accent. Meaning: I actually believe to have a real name, e-mail and phone number on this voice.  
 Wow 
 Well done sir. 👍 I feel the term hacker is almost too generous though, dude is just a scammer. 
 Exactly, scammers are the ones that use the tools created by hackers. Those won't be giving you an interview lol 
 That was a really good interview 👀 
 gracias! 
 No, its a thanks to whoever stores and serves it 
 Meh. If you're going down that (silly) route you may as well say no, it's thanks to the company who made the servers & whoever provides the Internet access. If someone hadn't uploaded the file wouldn't be available on nostr, that's the point. 🙄 
 You should run a relay without filters and we can chat in 5 years 
 incredible.

hide your keys, especially from yourself.

nostr:note14qremgdht7kpvymmaezhds2wmw42l89z0hcspjg2n4cn6ljcu5vsn0nush 
 Parasites! 
 This is fucking heartbreaking, and as you said in the call, disgusting 🤮 
I was once almost socially engineered and it is a horrific feeling thinking about what could have happened.
I hope he and his friends get caught and change their ways. 
 This is why you don’t answer calls from unknown numbers. I never answer unless I know exactly who it is. Hackers and scammers everywhere these days. Especially the Minecraft kids. 
 this kid is living life. soon he'll be *serving life*

but for now... his friend is 13... and has 4 million dollars. 

wtf am I doing with my life? looking forward to making tea, and eating a nice meal is my highlight of the day and I'm 37.

this kid is 16, making millions this year. with rich friends. living in la. self described GTA life. 

I'm literally looking forward to eating eggs and beef. Jesus.  
 This amazing impromptu interview is a great example of why anyone building or using a centralized web based service needs to switch to a password less authentication system, ideally supporting hardware tokens like a Yubikey.  

Your grandma can't be scammed out of her password if there is no password or SMS 2FA or anything like that to give the person on the phone scamming her. 

I hope new systems like Passkey become ubiquitous. Sure if you use Google or Apple for your keystores it's not ideal, but still a big improvement.  And there's no lock-in saying you HAVE to use a hosted keystore/password manager, it's an open standard with multiple open-source implementations. </end_rant>

https://passkey.org/

nostr:note14qremgdht7kpvymmaezhds2wmw42l89z0hcspjg2n4cn6ljcu5vsn0nush  
 I was looking everywhere for this one. WOW dude! My jaw was dragging on the floor the whole time.  
 nostr:nevent1qqs2spua5xm4ltqkzda7u3tkc98dh240nj38mugqey9f6ufa0evw2xgpzpmhxue69uhkummnw3ezuamfdejsyg94kfsetwh6z7mv0jlqzq9jjx8v830pdr8y7spn0hnk75rjlncy5upsgqqqqqqsv5muvu 
This one  
 Looks like Swan was hit hard enough to send out a guide on how not to get scammed. The kid was probably for real.

---

Hi Jay,

We have seen an elevated incidence of a phone-based scam across the financial industry. Please be vigilant and protect yourself from losing funds, including from your Swan account.

How does the scam work?

Hackers will call you, or contact you online from unknown phone numbers or unknown accounts, claiming to be from Microsoft, Google, your bank, or a company you have a relationship with, like Swan. These fake “agents” will ask you to take certain actions such as reading them a code from your phone or computer. After they obtain this code, they will drain all of your online accounts.

Swan representatives will never ask you to share codes or request access to your account.

How do you protect yourself?

- Never share any code from any device, for any reason, with anyone over the phone, the internet, or in person. Triple check that you’re on the right website before typing in any codes.
- Don’t interact with any phone calls requiring you to respond to a robot (“press 1 to continue”). Don’t respond to any calls that tell you your account is at risk and you must take urgent action. Contact us, or book calls, through [official channels](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTj-zEZobK2kXVjFTfu4WTw-gu-ZAr_iuvpGZpCCgZHmue0QzQu3gYfo0vn728bdQZO4=) only. 
- Set up app-based 2FA on all your online accounts, especially your email and Swan account. [Here’s how to do it on Swan](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTxLsXuzVkHvWlDp_K78gIQ7kcbH69itNYujTLVDniRDAETmZxMB9TtQRwJVm70SLFCw=).
- Consider disabling Google Authenticator Cloud Sync. Hackers are exploiting Google Authenticator because it has a feature called Cloud Sync, which is being exploited for this attack. If you use Google Authenticator, here is how to disable cloud sync: Open Google Authenticator ⇒ Tap Profile Photo ⇒ Hit “Use without an account” ⇒ Hit Continue
- Carefully read about [common online scams](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTgjWp-Yx27PWFYzErXtmu6f5XGCSloLqcEeiSRAUVGqMlppWPjUwa34FWqHm7239KYA=).
- Think twice before completing an identity verification such as a selfie request - Swan will only request a selfie in order to unlock your account. Hackers will often try to convince you to complete this flow and then attack the account once you complete it.
- Visit a site like haveibeenpwned.com. If your email has appeared in a data breach, consider updating your email password and changing the email associated with your Swan account. If you'd like to change your Swan email, instructions are located [here](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTsDvTiqvQZvejrvpxaluAjEoA2F1Xay23igJHyFnDBvKisfe5ZZL4cgXP_7IpHf1gPQ=).

How do hackers access my accounts?

1. Hackers typically first access your Google account because you’ve reused your password across online accounts, so they can easily guess it. Then they often bypass Google’s account protections by getting you to read them a code over the phone.
2. Once inside your Google account, they rely on people using Google Authenticator for 2FA. Google Authenticator has a dangerous “cloud sync” feature, where your 2FA codes become accessible as soon as they hack your Google account.
3. Once they have your 2FA codes, they can access most if not all of your online accounts including Bitcoin/cryptocurrency accounts, banking accounts, and other sensitive data. They will use this information to drain your funds, steal your personal data, and escalate their attack.

This scam can also be performed on other common email accounts such as Yahoo, AOL, Comcast, and others. Google Authenticator is not the only way to perform the scam, but it is common. Stay vigilant and never give information over the phone to anyone claiming to be an agent or protecting you.

Consider using a unique password for all your accounts and storing them in a service like 1Password.

Pay close attention to emails received from your trusted financial institutions. Prior to clicking on any link, right-click and copy it and validate that it goes to swanbitcoin.com or swan.com, for example. Check that the email From field is from those domains. These are the only authorized Swan domains.

If you would like more information, or have any further questions, please visit our [FAQ page](https://link.swanbitcoin.com/ODc1LVhLUS02MzQAAAGTIW8bTrDf1f6C3_bmgcIr25mZmyZuBCP6Rl-JQRSPXr3e3cq7147ieIs5XeXePrg5aQecGAQ=). 

Thank you,
Swan Team



nostr:nevent1qqs2spua5xm4ltqkzda7u3tkc98dh240nj38mugqey9f6ufa0evw2xgpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzpddjvx2m47shkmruhcqspv533mputctgee85qvmauah4quhu7p98qvzqqqqqqyfnuqxx 
 He sounds just excited as a friend i went to HS with when he figured out how to cook meth 
 Great job mate! Thanks for this insights 🙏 
 Just like @junseth experienced. 

nostr:nevent1qqs2spua5xm4ltqkzda7u3tkc98dh240nj38mugqey9f6ufa0evw2xgpz3mhxue69uhkummnw3ezummcw3ezuer9wcpzpddjvx2m47shkmruhcqspv533mputctgee85qvmauah4quhu7p98qvzqqqqqqy5hekfc