Amenity Access Amenity Access - Page 7 - Talk of The Villages Florida

Amenity Access

Reply
Thread Tools
  #91  
Old 08-06-2025, 12:42 PM
Bill14564 Bill14564 is offline
Sage
Join Date: Nov 2020
Location: Village of Hillsborough
Posts: 7,396
Thanks: 2,288
Thanked 7,729 Times in 3,034 Posts
Default

Quote:
Originally Posted by Aces4 View Post
You, in premise, agree with my post but are claiming that your information can be recovered quickly. It will still be compromised by the thief! One doesn't used bricks to steal a car when sly capturing and changing the keyfob will do the trick. I don't leave anything in my vehicle either other than some old CD's that make me happy when I listen to them.

Pack all you want on your phone and carry it with you everywhere, that's your choice. Many of us don't want that option and the card works. Leaving a cell phone poolside while swimming is a bizarre plan in my mind.
I understood your post to say that my information would be made visible to someone else or that I would lose access to it forever. Anything is possible but neither is likely and is both are more easily accomplished by other means.

If my car is stolen I'm much less worried about the valuables than I am about my car but if my concern is my valuables then I'm not worried about a key fob I'm worried about a brick. The thought of someone cloning my key fob and taking my car is way, way down on the list. Sure, it can happen, but the odds are greatly against it.

You don't seem to have understood about the phone as a portal. Much of your data is not on your phone, it is simply accessed through your phone. I don't carry my phone because it has the entirety of Google on it, I carry my phone because I can access Google through it. If someone wants to get your personal information, stealing your phone or hacking it when you are at the pool is a terrible way to go about it. They would be better off hacking a credit card company, bank, health care company, or IRS where the data is actually stored.

If you don't want to carry your phone and you don't want to use a digital ID that doesn't exist yet, no problem, no one is trying to force you to. But don't try to scare others away from it by throwing spaghetti at the wall to see what sticks. Carrying a phone isn't what makes the phone vulnerable, poor online practices does - and those generally happen in the home, not at the pool.
__________________
Why do people insist on making claims without looking them up first, do they really think no one will check? Proof by emphatic assertion rarely works.
Confirmation bias is real; I can find any number of articles that say so.


Victor, NY - Randallstown, MD - Yakima, WA - Stevensville, MD - Village of Hillsborough
  #92  
Old 08-06-2025, 01:42 PM
OrangeBlossomBaby OrangeBlossomBaby is offline
Sage
Join Date: Feb 2015
Posts: 10,416
Thanks: 8,357
Thanked 11,579 Times in 3,901 Posts
Default

Quote:
Originally Posted by Bill14564 View Post
I understood your post to say that my information would be made visible to someone else or that I would lose access to it forever. Anything is possible but neither is likely and is both are more easily accomplished by other means.

If my car is stolen I'm much less worried about the valuables than I am about my car but if my concern is my valuables then I'm not worried about a key fob I'm worried about a brick. The thought of someone cloning my key fob and taking my car is way, way down on the list. Sure, it can happen, but the odds are greatly against it.

You don't seem to have understood about the phone as a portal. Much of your data is not on your phone, it is simply accessed through your phone. I don't carry my phone because it has the entirety of Google on it, I carry my phone because I can access Google through it. If someone wants to get your personal information, stealing your phone or hacking it when you are at the pool is a terrible way to go about it. They would be better off hacking a credit card company, bank, health care company, or IRS where the data is actually stored.

If you don't want to carry your phone and you don't want to use a digital ID that doesn't exist yet, no problem, no one is trying to force you to. But don't try to scare others away from it by throwing spaghetti at the wall to see what sticks. Carrying a phone isn't what makes the phone vulnerable, poor online practices does - and those generally happen in the home, not at the pool.
The cloud has some of my info, but not other info. My list of passwords is not available on the Cloud. It is only available on the device, encrypted, coded by me, and hidden. However, a lot of information is in the Cloud. Your phone has access to that Cloud. Once it's in there, it's all fair game for whoever accesses it to use however they see fit.

Your plastic ID card, on the other hand, can't access anything at all, currently. You can't use it to open a gate, you can't scan it on a Villages computer to get to your villages.net account. You can't use it to reserve a room at the rec center. In order to do those things, someone ELSE has to scan the card, which gives THEM access to your information and authorizations/permissions. That access is available on THEIR device, not on yours.
  #93  
Old 08-06-2025, 02:17 PM
Aces4 Aces4 is offline
Soaring Eagle member
Join Date: Dec 2015
Posts: 2,405
Thanks: 1,137
Thanked 2,459 Times in 1,045 Posts
Default

Quote:
Originally Posted by OrangeBlossomBaby View Post
The cloud has some of my info, but not other info. My list of passwords is not available on the Cloud. It is only available on the device, encrypted, coded by me, and hidden. However, a lot of information is in the Cloud. Your phone has access to that Cloud. Once it's in there, it's all fair game for whoever accesses it to use however they see fit.

Your plastic ID card, on the other hand, can't access anything at all, currently. You can't use it to open a gate, you can't scan it on a Villages computer to get to your villages.net account. You can't use it to reserve a room at the rec center. In order to do those things, someone ELSE has to scan the card, which gives THEM access to your information and authorizations/permissions. That access is available on THEIR device, not on yours.
Thank you, facts matter.
  #94  
Old 08-06-2025, 02:22 PM
Bill14564 Bill14564 is offline
Sage
Join Date: Nov 2020
Location: Village of Hillsborough
Posts: 7,396
Thanks: 2,288
Thanked 7,729 Times in 3,034 Posts
Default

Quote:
Originally Posted by OrangeBlossomBaby View Post
The cloud has some of my info, but not other info. My list of passwords is not available on the Cloud. It is only available on the device, encrypted, coded by me, and hidden. However, a lot of information is in the Cloud. Your phone has access to that Cloud. Once it's in there, it's all fair game for whoever accesses it to use however they see fit.
Exactly what I wrote with the exception that I believe that obtaining physical possession of your phone and accessing your data that way has a lot less bang for the buck than simply grabbing the data directly from the cloud.

If I remember correctly you store your passwords on a thumb drive which means you have no access to them at all away from your home. (yes, you *could* plug the drive into a library computer but that would be a REALLY bad idea)

Quote:
Your plastic ID card, on the other hand, can't access anything at all, currently. You can't use it to open a gate, you can't scan it on a Villages computer to get to your villages.net account. You can't use it to reserve a room at the rec center. In order to do those things, someone ELSE has to scan the card, which gives THEM access to your information and authorizations/permissions. That access is available on THEIR device, not on yours.
That depends entirely on how the digital ID is implemented. If it is implemented like a Panera rewards card or a ticket to a dinner event or a digital Sam's card or a digital drivers license or a digital insurance card or a digital AARP card then it would have EXACTLY the same capabilities as your plastic card.
__________________
Why do people insist on making claims without looking them up first, do they really think no one will check? Proof by emphatic assertion rarely works.
Confirmation bias is real; I can find any number of articles that say so.


Victor, NY - Randallstown, MD - Yakima, WA - Stevensville, MD - Village of Hillsborough
  #95  
Old 08-06-2025, 02:24 PM
Aces4 Aces4 is offline
Soaring Eagle member
Join Date: Dec 2015
Posts: 2,405
Thanks: 1,137
Thanked 2,459 Times in 1,045 Posts
Default

Quote:
Originally Posted by Bill14564 View Post

If my car is stolen I'm much less worried about the valuables than I am about my car but if my concern is my valuables then I'm not worried about a key fob I'm worried about a brick. The thought of someone cloning my key fob and taking my car is way, way down on the list. Sure, it can happen, but the odds are greatly against it.
Thieves love this "it can't happen to me" mentality... I don't know if relying on the thought that the thieves are dumber in Flordia is valid but you do you.

Per AI: AI Overview
Reports suggest that car thefts using key fob reprogramming and relay attacks are a growing concern in several cities. Here are some examples:
Milwaukee, Wisconsin: Milwaukee police have reported a significant increase in car thefts targeting vehicles with push-to-start ignition systems using key reprogrammers. Nissan thefts, in particular, show a 90% increase through this method. Thieves are using devices to duplicate key fobs and start vehicles without the original key, according to Spectrum News.
Charlotte, North Carolina: Police in Charlotte have warned of a new, high-tech method of car theft involving devices that clone key fobs and program new ones.
Columbus, Ohio: Car thieves in Columbus are reportedly utilizing devices that capture key fob signals to steal cars with keyless entry.
It's important to note that law enforcement agencies and organizations like the National Insurance Crime Bureau emphasize that this is a nationwide problem, not restricted to specific locations. The use of devices like key fob reprogrammers and relay attack tools makes keyless entry vehicles vulnerable in various locations.
General trends and prevention
Vulnerable Vehicles: Vehicles with push-button start and key fob ignition systems are particularly susceptible to these types of thefts.
Methods: Thieves are employing "relay attacks" to capture and transmit key fob signals, or using devices to reprogram or create new key fobs for vehicles.
Prevention: Security experts and police recommend taking precautions such as storing key fobs in an RFID blocking container (e.g., a metal box or foil), using a steering wheel lock, installing a kill switch, or parking in well-lit areas
  #96  
Old 08-06-2025, 02:31 PM
Bill14564 Bill14564 is offline
Sage
Join Date: Nov 2020
Location: Village of Hillsborough
Posts: 7,396
Thanks: 2,288
Thanked 7,729 Times in 3,034 Posts
Default

Quote:
Originally Posted by Aces4 View Post
Thieves love this "it can't happen to me" mentality... I don't know if relying on the thought that the thieves are dumber in Flordia is valid but you do you.

Per AI: AI Overview
Reports suggest that car thefts using key fob reprogramming and relay attacks are a growing concern in several cities. Here are some examples:
Milwaukee, Wisconsin: Milwaukee police have reported a significant increase in car thefts targeting vehicles with push-to-start ignition systems using key reprogrammers. Nissan thefts, in particular, show a 90% increase through this method. Thieves are using devices to duplicate key fobs and start vehicles without the original key, according to Spectrum News.
Charlotte, North Carolina: Police in Charlotte have warned of a new, high-tech method of car theft involving devices that clone key fobs and program new ones.
Columbus, Ohio: Car thieves in Columbus are reportedly utilizing devices that capture key fob signals to steal cars with keyless entry.
It's important to note that law enforcement agencies and organizations like the National Insurance Crime Bureau emphasize that this is a nationwide problem, not restricted to specific locations. The use of devices like key fob reprogrammers and relay attack tools makes keyless entry vehicles vulnerable in various locations.
General trends and prevention
Vulnerable Vehicles: Vehicles with push-button start and key fob ignition systems are particularly susceptible to these types of thefts.
Methods: Thieves are employing "relay attacks" to capture and transmit key fob signals, or using devices to reprogram or create new key fobs for vehicles.
Prevention: Security experts and police recommend taking precautions such as storing key fobs in an RFID blocking container (e.g., a metal box or foil), using a steering wheel lock, installing a kill switch, or parking in well-lit areas
Reading comprehension is key!

I didn't write that it could not happen to me, I wrote that it is way, way down on my list of concerns.

I don't know what kind of security is built into my fob. For all I know it has a rolling key that cannot be duplicated. But even if it does not, it still is low on my list.

I'm not about to carry a metal box to put my key into when I carry it in my pocket. Not only unwieldy but it defeats the purpose of keyless entry.

I don't go out of my way to park in well lit areas either. I park at the squares, I park at the rec centers, or I park in my very dark garage.

As I'm sure someone is going to ask: What does this have to do with accessing Villages amenities?
__________________
Why do people insist on making claims without looking them up first, do they really think no one will check? Proof by emphatic assertion rarely works.
Confirmation bias is real; I can find any number of articles that say so.


Victor, NY - Randallstown, MD - Yakima, WA - Stevensville, MD - Village of Hillsborough
  #97  
Old 08-06-2025, 02:35 PM
Aces4 Aces4 is offline
Soaring Eagle member
Join Date: Dec 2015
Posts: 2,405
Thanks: 1,137
Thanked 2,459 Times in 1,045 Posts
Default

Quote:
Originally Posted by Bill14564 View Post
Exactly what I wrote with the exception that I believe that obtaining physical possession of your phone and accessing your data that way has a lot less bang for the buck than simply grabbing the data directly from the cloud.

If I remember correctly you store your passwords on a thumb drive which means you have no access to them at all away from your home. (yes, you *could* plug the drive into a library computer but that would be a REALLY bad idea)



That depends entirely on how the digital ID is implemented. If it is implemented like a Panera rewards card or a ticket to a dinner event or a digital Sam's card or a digital drivers license or a digital insurance card or a digital AARP card then it would have EXACTLY the same capabilities as your plastic card.
AI Overview
No, it is generally not wise to store all your information on your cellphone. While convenient, smartphones are susceptible to theft, loss, and hacking, which could expose sensitive data. It's best to use a combination of methods, including password managers and secure storage on personal computers, for sensitive information.
Here's why storing everything on your phone is risky:
Security Risks:
.
Smartphones are vulnerable to malware, phishing attacks, and physical theft, which could lead to your personal information being compromised.
Data Loss:
.
Losing your phone, whether through theft or misplacement, can result in the loss of all data stored on it.
Privacy Concerns:
.
Apps often request access to personal information, and some may collect and share data without your knowledge.
Convenience vs. Security:
.
While storing information on your phone can be convenient, it often comes at the cost of increased security risks.
Recommendations for Protecting Your Data:
Use strong passwords and enable two-factor authentication:
This adds an extra layer of security to your accounts.
Consider a password manager:
These apps securely store your passwords and other sensitive information, making it easier to manage and access them while minimizing risk.
Be cautious about app permissions:
Only grant necessary permissions to apps and be wary of apps that request excessive access to your data.
Back up your data regularly:
Backing up your phone's data ensures that you can restore it if your phone is lost, stolen, or damaged.
Avoid storing sensitive information like passwords, financial data, or private photos on your phone:
If you must store them, consider using secure encryption or storage solutions.
Keep your phone's software and apps up to date:
Updates often include security patches that can protect your device from vulnerabilities.
Be cautious about public Wi-Fi:
Avoid using public Wi-Fi networks for sensitive transactions, as they may not be secure.
Consider using a separate device for sensitive tasks:
If you need to access sensitive information frequently, consider using a more secure device like a laptop or desktop computer.
By taking these precautions, you can minimize the risks associated with storing personal information on your phone and protect yourself from potential threats.
Protecting the Privacy and Security of Your Health Information When Using Your Personal Cell Phone or Tablet | HHS.gov
Jun 29, 2022
HHS.gov
Why do people continue to store personal information on their phone ...
Jan 3, 2019 — * Absolutely not. The only information I save on my smart phone are people's names and phone numbers, plus the occasio...

Quora
Mobile Matters: Keep Your Data Safe - CISO Global
Feb 22, 2024 — Without adequate protection, our devices become glaring targets for cybercriminals, offering them an open invitation t...

CISO Global

As I said earlier, you do you. With relatives that work in cybersecurity, I'll listen to them. Also, I find it a hassle to jump through all security hoops suggested above.
  #98  
Old 08-06-2025, 02:40 PM
Bill14564 Bill14564 is offline
Sage
Join Date: Nov 2020
Location: Village of Hillsborough
Posts: 7,396
Thanks: 2,288
Thanked 7,729 Times in 3,034 Posts
Default

Quote:
Originally Posted by Aces4 View Post
.....
As I said earlier, you do you. With relatives that work in cybersecurity, I'll listen to them. Also, I find it a hassle to jump through all security hoops suggested above.
Which of those "hoops" are difficult? They're pretty much 2nd nature to many of us.

Gonna be difficult to whip out my desktop while sitting in a restaurant trying to make last minute reservations.

Laptops and desktops are more secure?! You really need to be careful trusting AI.

Be careful making assumptions - your relatives are not the only ones who work(ed) in cybersecurity.
__________________
Why do people insist on making claims without looking them up first, do they really think no one will check? Proof by emphatic assertion rarely works.
Confirmation bias is real; I can find any number of articles that say so.


Victor, NY - Randallstown, MD - Yakima, WA - Stevensville, MD - Village of Hillsborough
  #99  
Old 08-06-2025, 02:40 PM
Velvet's Avatar
Velvet Velvet is offline
Sage
Join Date: Mar 2019
Posts: 5,919
Thanks: 1,319
Thanked 4,509 Times in 1,996 Posts
Default

Quote:
Originally Posted by Aces4 View Post

As I said earlier, you do you. With relatives that work in cybersecurity, I'll listen to them. Also, I find it a hassle to jump through all security hoops suggested above.
Same here, my brother has a staff for cybersecurity at an ivy university, and a relative’s company works on cybersecurity for the CIA.
  #100  
Old 08-06-2025, 03:03 PM
bopat bopat is offline
Senior Member
Join Date: Dec 2022
Posts: 212
Thanks: 14
Thanked 178 Times in 77 Posts
Default

We already have a Villages ID card, just scan it at the amenity entrance. Put up a camera too. Camera probably doesn’t have to go anywhere or be hooked to anything. Maybe put a Google logo on it. It’s not rocket science. Should solve most of the problems.

But it is fun reading about the cia and cloud theory here, always love hearing what the experts have to say
__________________
Making mirrors is a job I can really see myself doing.
  #101  
Old 08-06-2025, 03:12 PM
Velvet's Avatar
Velvet Velvet is offline
Sage
Join Date: Mar 2019
Posts: 5,919
Thanks: 1,319
Thanked 4,509 Times in 1,996 Posts
Default

Yes, well I’m sure we all know somebody who is a “somebody”. But I am excited about AI. I think it has potential for us here in TV too.
  #102  
Old 08-06-2025, 03:40 PM
Aces4 Aces4 is offline
Soaring Eagle member
Join Date: Dec 2015
Posts: 2,405
Thanks: 1,137
Thanked 2,459 Times in 1,045 Posts
Default

Quote:
Originally Posted by Bill14564 View Post
Which of those "hoops" are difficult? They're pretty much 2nd nature to many of us.

Gonna be difficult to whip out my desktop while sitting in a restaurant trying to make last minute reservations.

Laptops and desktops are more secure?! You really need to be careful trusting AI.

Be careful making assumptions - your relatives are not the only ones who work(ed) in cybersecurity.
Like I said you do you I suppose all that hoop jumping keeps one in shape, if they have an issue. So you'd have to use a laptop to make a reservation because you don't know how to use a phone or cell phone for the purpose for which it was intended. At least it can get you into the pool though, lol.

Yeah, there are hordes working for IT security and they can't keep ahead of the hackers, national or international. So what's your point?
  #103  
Old 08-06-2025, 03:41 PM
Pugchief's Avatar
Pugchief Pugchief is offline
Gold member
Join Date: Mar 2023
Posts: 1,121
Thanks: 79
Thanked 1,381 Times in 542 Posts
Default

Quote:
Originally Posted by OrangeBlossomBaby View Post
With very few exceptions (because waterproof cases are a thing, albeit expensive): MOST people don't go into the pool with their cell phone. Most people can't, because most people don't have waterproof cases, or pockets in their swimsuits that can hold those waterproof cases, or sturdy waistbands on their swim bottoms where a waterproof case and phone can be efficiently and safely clipped.
Expensive? You can buy one on Amazon for under $10.

Regardless, just bc people don't go INTO the pool with their phone, doesn't mean they don't have their phone WITH them at the pool. In which case, your point is moot and a digital ID would work fine.
  #104  
Old 08-06-2025, 03:42 PM
Pugchief's Avatar
Pugchief Pugchief is offline
Gold member
Join Date: Mar 2023
Posts: 1,121
Thanks: 79
Thanked 1,381 Times in 542 Posts
Default

Quote:
Originally Posted by Aces4 View Post
So you drop, lose or have your phone stolen, how do plan on continuing with your life with all your personal information ON that one device.
If you drop or lose or have your wallet stolen, how do plan on continuing with your life with all your personal information IN that one device?
  #105  
Old 08-06-2025, 03:43 PM
Pugchief's Avatar
Pugchief Pugchief is offline
Gold member
Join Date: Mar 2023
Posts: 1,121
Thanks: 79
Thanked 1,381 Times in 542 Posts
Default

Quote:
Originally Posted by Aces4 View Post
Thieves love this "it can't happen to me" mentality... I don't know if relying on the thought that the thieves are dumber in Flordia is valid but you do you.

Per AI: AI Overview
Reports suggest that car thefts using key fob reprogramming and relay attacks are a growing concern in several cities. Here are some examples:
Milwaukee, Wisconsin: Milwaukee police have reported a significant increase in car thefts targeting vehicles with push-to-start ignition systems using key reprogrammers. Nissan thefts, in particular, show a 90% increase through this method. Thieves are using devices to duplicate key fobs and start vehicles without the original key, according to Spectrum News.
Charlotte, North Carolina: Police in Charlotte have warned of a new, high-tech method of car theft involving devices that clone key fobs and program new ones.
Columbus, Ohio: Car thieves in Columbus are reportedly utilizing devices that capture key fob signals to steal cars with keyless entry.
It's important to note that law enforcement agencies and organizations like the National Insurance Crime Bureau emphasize that this is a nationwide problem, not restricted to specific locations. The use of devices like key fob reprogrammers and relay attack tools makes keyless entry vehicles vulnerable in various locations.
General trends and prevention
Vulnerable Vehicles: Vehicles with push-button start and key fob ignition systems are particularly susceptible to these types of thefts.
Methods: Thieves are employing "relay attacks" to capture and transmit key fob signals, or using devices to reprogram or create new key fobs for vehicles.
Prevention: Security experts and police recommend taking precautions such as storing key fobs in an RFID blocking container (e.g., a metal box or foil), using a steering wheel lock, installing a kill switch, or parking in well-lit areas
This is a car tech issue, nothing more. How many Teslas get stolen? The minute it is gone, you use the app on your phone to disable the car.
Reply

Tags
access, carry, device, card, amenity


You are viewing a new design of the TOTV site. Click here to revert to the old version.

All times are GMT -5. The time now is 12:14 AM.