Talk of The Villages Florida - Rentals, Entertainment & More
Talk of The Villages Florida - Rentals, Entertainment & More
#91
|
||
|
||
![]() Quote:
If my car is stolen I'm much less worried about the valuables than I am about my car but if my concern is my valuables then I'm not worried about a key fob I'm worried about a brick. The thought of someone cloning my key fob and taking my car is way, way down on the list. Sure, it can happen, but the odds are greatly against it. You don't seem to have understood about the phone as a portal. Much of your data is not on your phone, it is simply accessed through your phone. I don't carry my phone because it has the entirety of Google on it, I carry my phone because I can access Google through it. If someone wants to get your personal information, stealing your phone or hacking it when you are at the pool is a terrible way to go about it. They would be better off hacking a credit card company, bank, health care company, or IRS where the data is actually stored. If you don't want to carry your phone and you don't want to use a digital ID that doesn't exist yet, no problem, no one is trying to force you to. But don't try to scare others away from it by throwing spaghetti at the wall to see what sticks. Carrying a phone isn't what makes the phone vulnerable, poor online practices does - and those generally happen in the home, not at the pool.
__________________
Why do people insist on making claims without looking them up first, do they really think no one will check? Proof by emphatic assertion rarely works. Confirmation bias is real; I can find any number of articles that say so. Victor, NY - Randallstown, MD - Yakima, WA - Stevensville, MD - Village of Hillsborough |
|
#92
|
||
|
||
![]() Quote:
Your plastic ID card, on the other hand, can't access anything at all, currently. You can't use it to open a gate, you can't scan it on a Villages computer to get to your villages.net account. You can't use it to reserve a room at the rec center. In order to do those things, someone ELSE has to scan the card, which gives THEM access to your information and authorizations/permissions. That access is available on THEIR device, not on yours. |
#93
|
||
|
||
![]() Quote:
|
#94
|
||
|
||
![]() Quote:
If I remember correctly you store your passwords on a thumb drive which means you have no access to them at all away from your home. (yes, you *could* plug the drive into a library computer but that would be a REALLY bad idea) Quote:
__________________
Why do people insist on making claims without looking them up first, do they really think no one will check? Proof by emphatic assertion rarely works. Confirmation bias is real; I can find any number of articles that say so. Victor, NY - Randallstown, MD - Yakima, WA - Stevensville, MD - Village of Hillsborough |
#95
|
||
|
||
![]() Quote:
Per AI: AI Overview Reports suggest that car thefts using key fob reprogramming and relay attacks are a growing concern in several cities. Here are some examples: Milwaukee, Wisconsin: Milwaukee police have reported a significant increase in car thefts targeting vehicles with push-to-start ignition systems using key reprogrammers. Nissan thefts, in particular, show a 90% increase through this method. Thieves are using devices to duplicate key fobs and start vehicles without the original key, according to Spectrum News. Charlotte, North Carolina: Police in Charlotte have warned of a new, high-tech method of car theft involving devices that clone key fobs and program new ones. Columbus, Ohio: Car thieves in Columbus are reportedly utilizing devices that capture key fob signals to steal cars with keyless entry. It's important to note that law enforcement agencies and organizations like the National Insurance Crime Bureau emphasize that this is a nationwide problem, not restricted to specific locations. The use of devices like key fob reprogrammers and relay attack tools makes keyless entry vehicles vulnerable in various locations. General trends and prevention Vulnerable Vehicles: Vehicles with push-button start and key fob ignition systems are particularly susceptible to these types of thefts. Methods: Thieves are employing "relay attacks" to capture and transmit key fob signals, or using devices to reprogram or create new key fobs for vehicles. Prevention: Security experts and police recommend taking precautions such as storing key fobs in an RFID blocking container (e.g., a metal box or foil), using a steering wheel lock, installing a kill switch, or parking in well-lit areas |
#96
|
||
|
||
![]() Quote:
I didn't write that it could not happen to me, I wrote that it is way, way down on my list of concerns. I don't know what kind of security is built into my fob. For all I know it has a rolling key that cannot be duplicated. But even if it does not, it still is low on my list. I'm not about to carry a metal box to put my key into when I carry it in my pocket. Not only unwieldy but it defeats the purpose of keyless entry. I don't go out of my way to park in well lit areas either. I park at the squares, I park at the rec centers, or I park in my very dark garage. As I'm sure someone is going to ask: What does this have to do with accessing Villages amenities?
__________________
Why do people insist on making claims without looking them up first, do they really think no one will check? Proof by emphatic assertion rarely works. Confirmation bias is real; I can find any number of articles that say so. Victor, NY - Randallstown, MD - Yakima, WA - Stevensville, MD - Village of Hillsborough |
#97
|
||
|
||
![]() Quote:
No, it is generally not wise to store all your information on your cellphone. While convenient, smartphones are susceptible to theft, loss, and hacking, which could expose sensitive data. It's best to use a combination of methods, including password managers and secure storage on personal computers, for sensitive information. Here's why storing everything on your phone is risky: Security Risks: . Smartphones are vulnerable to malware, phishing attacks, and physical theft, which could lead to your personal information being compromised. Data Loss: . Losing your phone, whether through theft or misplacement, can result in the loss of all data stored on it. Privacy Concerns: . Apps often request access to personal information, and some may collect and share data without your knowledge. Convenience vs. Security: . While storing information on your phone can be convenient, it often comes at the cost of increased security risks. Recommendations for Protecting Your Data: Use strong passwords and enable two-factor authentication: This adds an extra layer of security to your accounts. Consider a password manager: These apps securely store your passwords and other sensitive information, making it easier to manage and access them while minimizing risk. Be cautious about app permissions: Only grant necessary permissions to apps and be wary of apps that request excessive access to your data. Back up your data regularly: Backing up your phone's data ensures that you can restore it if your phone is lost, stolen, or damaged. Avoid storing sensitive information like passwords, financial data, or private photos on your phone: If you must store them, consider using secure encryption or storage solutions. Keep your phone's software and apps up to date: Updates often include security patches that can protect your device from vulnerabilities. Be cautious about public Wi-Fi: Avoid using public Wi-Fi networks for sensitive transactions, as they may not be secure. Consider using a separate device for sensitive tasks: If you need to access sensitive information frequently, consider using a more secure device like a laptop or desktop computer. By taking these precautions, you can minimize the risks associated with storing personal information on your phone and protect yourself from potential threats. Protecting the Privacy and Security of Your Health Information When Using Your Personal Cell Phone or Tablet | HHS.gov Jun 29, 2022 HHS.gov Why do people continue to store personal information on their phone ... Jan 3, 2019 — * Absolutely not. The only information I save on my smart phone are people's names and phone numbers, plus the occasio... Quora Mobile Matters: Keep Your Data Safe - CISO Global Feb 22, 2024 — Without adequate protection, our devices become glaring targets for cybercriminals, offering them an open invitation t... CISO Global As I said earlier, you do you. With relatives that work in cybersecurity, I'll listen to them. Also, I find it a hassle to jump through all security hoops suggested above. |
#98
|
||
|
||
![]() Quote:
Gonna be difficult to whip out my desktop while sitting in a restaurant trying to make last minute reservations. Laptops and desktops are more secure?! You really need to be careful trusting AI. Be careful making assumptions - your relatives are not the only ones who work(ed) in cybersecurity.
__________________
Why do people insist on making claims without looking them up first, do they really think no one will check? Proof by emphatic assertion rarely works. Confirmation bias is real; I can find any number of articles that say so. Victor, NY - Randallstown, MD - Yakima, WA - Stevensville, MD - Village of Hillsborough |
#99
|
||
|
||
![]()
Same here, my brother has a staff for cybersecurity at an ivy university, and a relative’s company works on cybersecurity for the CIA.
|
#100
|
||
|
||
![]()
We already have a Villages ID card, just scan it at the amenity entrance. Put up a camera too. Camera probably doesn’t have to go anywhere or be hooked to anything. Maybe put a Google logo on it. It’s not rocket science. Should solve most of the problems.
But it is fun reading about the cia and cloud theory here, always love hearing what the experts have to say ![]()
__________________
Making mirrors is a job I can really see myself doing. ![]() |
#102
|
||
|
||
![]() Quote:
![]() Yeah, there are hordes working for IT security and they can't keep ahead of the hackers, national or international. So what's your point? |
#103
|
||
|
||
![]() Quote:
Regardless, just bc people don't go INTO the pool with their phone, doesn't mean they don't have their phone WITH them at the pool. In which case, your point is moot and a digital ID would work fine. |
#104
|
||
|
||
![]()
If you drop or lose or have your wallet stolen, how do plan on continuing with your life with all your personal information IN that one device?
|
#105
|
||
|
||
![]() Quote:
|
Reply |
|
|