• What to do before your phone is stolen

    Home » Forums » Newsletter and Homepage topics » What to do before your phone is stolen

    Author
    Topic
    #2541363

    SECURITY By Peter Deegan Having your smartphone or tablet stolen is a traumatic event, but there are things you can do beforehand to make loss and rep
    [See the full post at: What to do before your phone is stolen]

    12 users thanked author for this post.
    Viewing 11 reply threads
    Author
    Replies
    • #2541482

      Great article. Everyone should plan for the loss/theft of their smartphone.

      Get up to speed on router security at RouterSecurity.org and Defensive Computing at DefensiveComputingChecklist.com

      2 users thanked author for this post.
    • #2541487

      I had to do this myself six weeks ago. Having a password vault with all of my passwords, a full iCloud backup, and a helpful (and sympathetic) Apple Store employee really helped me get back on track when my iPhone was stolen. I also had FindMy enabled and was able to set a Lost Message and a command to lock and wipe the old phone.

      As mentioned, I’d not 2FA app and anything to do with it are  securely backed up in a way that can be easily restored. Just having passwords isn’t enough if all of them (as they should be whenever possible) are linked to two-factor codes you can’t get access too. Most of mine were, but not all; fortunately, I had easy access to help to get the ones I didn’t have reset. I am now periodically testing my ability to recover my 2FA in the event something goes awry.

      We are SysAdmins.
      We walk in the wiring closets no others will enter.
      We stand on the bridge, and no malware may pass.
      We engage in support, we do not retreat.
      We live for the LAN.
      We die for the LAN.

      1 user thanked author for this post.
    • #2541497

      I have a Samsung.  At home, awake, my phone is on my desk.  When I’m sleeping, it’s charging on my nightstand.  Any other time it’s in my back pocket unless I’m making a call.  I’ve been using cell phones for ~25 years, and have never lost one.

      It’s kinda like my truck keys; they are either in the ignition while I’m driving, or in my right front pocket.  I’ve been driving over 63 years and have never lost a set of car keys.  My house keys are separate from my ignition keys, and are either in my hand unlocking the door, or in my left front pocket.  I’ve never lost a set of house keys.

      There’s no setup involved, other than forming the habits.

      Always create a fresh drive image before making system changes/Windows updates; you may need to start over!
      We all have our own reasons for doing the things that we do with our systems; we don't need anyone's approval, and we don't all have to do the same things.
      We were all once "Average Users".

    • #2541525

      There’s nothing to protect on my phone. I’d call the cellular provider and have the SIM cancelled, and a new one sent. That should about cover it.

      There is not much point in trying to lock the phone, as it is neither an Android (proper) nor iOS device, and I don’t know of anything that would do that without the thing being logged in to an Apple or Google account. There is no such account on my phone. But even if it was locked, the thief, or more likely the ultimate buyer of the stolen device, could just wipe the internal storage and put on a new OS and bootloader, much in the same way that I did when I got rid of Android proper. My data would be gone, but there’s nothing really interesting to a thief anyway.

      I don’t need a spare smartphone in case this happens. I have a “dumb” flip phone I can use with the new SIM, once the cellular provider sent it. I would be using that in place of the smartphone if it had the mobile hotspot feature. My data plan exists to be used by tethered devices like my laptop (primarily my XPS, as it is the one that comes with me when I am out and about). Otherwise, a phone is (a) an actual phone, mainly to be used in case of car trouble or that kind of thing, and (b) an alarm clock. Any phone can fulfill these roles.

      If I were ever to have my phone stolen, I have plenty of time to research and decide what (if any) replacement phone I might want. My existing one is a $130 model (network unlocked, bought outright, not from the carrier) and it is at the absolute maximum size I am willing to tolerate… and it is discontinued in favor of bigger ones. I’d love one the size of the original iPhone, but it has to be iOS and Android free (or be able to be made so), and ideally still receiving regular updates.

      Barring that, I would probably go for a flip phone that does have the wifi hotspot. I actually thought my current flippy had that when I bought it, but it doesn’t. I can tether it with USB, but that means I would have to carry a USB cable in addition to the phone and laptop.

       

      Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
      XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
      Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)

    • #2541530

      Just today I got an email newsletter from Malwarebytes discussing a growing trend where two or three people working together in a setting like a bar will watch or even record a victim entering a phone’s passcode–on an iPhone, the passcode is the 6-digit code you use when Face ID/Touch ID isn’t set up, or isn’t working (e.g. because it’s too dark/your hands are wet). Then they will distract a victim to pick the loose phone off the bar if left there, or pick the victim’s pocket, or drug or assault a victim to get the iPhone.

      Once bad guys have both the iPhone and the passcode, they can edit the passcode to a new one and even, according to the Wall St Journal article Malwarebytes was citing, lock a user out of their own Apple account, and then quickly exploit financial apps on the device to siphon money. This is not just a theoretical threat; it’s actually been happening.

      So it’s probably best to be very careful about using a phone in a public setting, and especially unlocking it with a passcode. Also Malwarebytes cautions that it’s best not to keep photos of critical documents like passports and drivers licenses on a phone, because these guys search a stolen phone for that too. Instead, if you have to have these on your phone, it’s best to keep the document copies in a password manager that is locked with a different and more complex key than a phone passcode.

       

      • #2541557

        Here is a chilling video on the passcode “vulnerability” described above, whereby, you loose everything.

        This link may be protected by a paywall, but worth a try.

        https://www.marketwatch.com/video/joanna-stern-personal-technology/apples-iphone-passcode-problem-how-thieves-can-take-over-in-minutes/967C3B74-90D3-45EA-BAA4-4ECDBB24715D.html

        How many secrets, including 2FA/MFA responses, you want tied to a high theft mobile device is an interesting question.

        Windows 10 22H2 desktops & laptops on Dell, HP, ASUS; No servers, no domain.

      • #2541614

        Thanks for that … it’s an argument in favor of FaceID and part of the reason why FaceID is not used before allowing access to some security functions, like changing the passcode.

        It’s also a reason to reduce the wait time before the screen is locked — something I mention in the article.

        Such operations to get the passcode/pattern do happen but my understanding from unofficial law enforcement sources is those types of sophisticated ‘snares’ are relatively rare.  Most ‘petty’ thefts of phones/purses/wallets are by solo thieves not gangs operating together – those solo ‘entrepreneurs’ then sell to organized gangs (which is probably why my phone ended up in Romania).

        You can still lock out a smartphone, even if the passcode is changed .  But you have to be fast, which is why I urge people to familiarize themselves with the Find My Phone (or similar) site and features.  If your phone is stolen or lost, it’s a simple, fast and already known process to get in and lock out the smartphone.

        What my article is trying to avoid is the all-too-common exchange like this:

        My phone’s been stolen, what can I do”

        ” First thing is remotely lock the phone so no one else can use it”

        ” How do I do that?”

        “Go to the Find my phone site and login with your (Apple) ID”

        “What’s an Apple ID?”

        <pause for long sigh>

        Peter Deegan

         

         

      • #2541700

        Too many people ar eused to leaving their phone sitting on a desk/table in front of them so they can see as msgs come across.  This is one reason why many manufacturers have replaced the read FP sensor with the in-display FP sensor on the front – that way you don’t even have to lift the phone to unlock.  Just press your finger on the face of the phone sitting there.

        IMO, this leads to people being sloppy and not paying full attention to the situation around them as their phone sits on the bar/table in a commercial environment.

        Making things too easy often leads to unintended consequences.

        • #2541718

          Yes – that’s what happened to me. I foolishly left the phone on a cafe table — switching between the phone and laptop.  Quick distraction and it was gone.

          Peter Deegan

          • #2541790

            When I do use my phone when out and about, when my laptop is also along for the ride, the only time the phone comes out of the pocket is to turn on the wifi hotspot tether (or if I have to make a call). Once turned on, the wifi tether works quite well from the relative safety of the pocket. If I have my laptop, and it has internet connectivity (which it does, at that point), I can just use the laptop for everything and have only one thing to worry about.

            I have never had a cell phone stolen in the ~19 years I have had one, but I did have a laptop stolen by some people (strangers) I tried to help in the early 2000s (by stealth and misdirection). No good deed goes unpunished, I guess… and I am much more wary now, viewing anyone asking for help first as a potential grifter and only secondarily as someone who may be what they appear. I don’t like it, but I do not intend to be so easily stolen from again.

            When I am out with my laptop now, I am just as wary. I grip it firmly at all times, never setting it down, and and I have a pretty powerful grip, so a snatch and run hopefully won’t succeed. I am a large and imposing individual, so I would not be the first choice to steal from in that manner, but you never know.

            When using the laptop, I don’t just let it sit on a table in front of me or in my lap… when I am not typing with my hands overlaying the keyboard, I use my left hand to grab it (on the body portion) near the hinge. If I have to get up even a few feet from it, I will close the lid and pick it up rather than leave it, even though it would never leave my sight.

            I never leave it in the car unattended, even though I could easily hide it . I have never had the car broken into, but if someone knew I had it and somehow recognized my car, they may decide to do so.

            I’ve thus far prevented any more thefts. If one does take place, all sensitive data is in an encrypted LUKS volume, protected with a very long and annoying to type in passphrase. It’s all backed up locally, as I was a backup fanatic when that laptop was stolen, and I have not become less of one after that.

            In your case (addressing @peterdeegan), you had a laptop and a phone, and the thief took the phone. Was the laptop less of a convenient target, or did the thief actively choose the phone when he had equal access to both?

            I wonder if laptops may be a little safer these days for lack of interest on the part of the thieves. Right now my go-to laptop is a high-endish Dell XPS 13, which would be a nice target for a knowledgeable thief, if the value of the laptop itself is a consideration. I am not sure what the breakdown is between thieves who steal for the hardware itself and those who just want a person’s data for identity theft or similar types of fraud.

             

            Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
            XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
            Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)

    • #2541699

      I’ve wondered about this question for some time.

      I use a 6 digit logon code for restarting the phone.  That’s 1 million possible combinations.

      How fast would a thief with a crack program be able to run through and enter 1 million codes on a phone?

      How is this done mechanically?

      • #2541701

        Luckily, iOS employs time delays where the device locks itself after too many failed passcode attempts.

        For example, if you make 5 failed attempts, your iPhone will lock for 1 minute, 6 attempts will lock it for 5 minutes, 7 will lock it for 15, and anything more than that will lock it for 1 hour.

        How to Erase Your iOS Device After Too Many Failed Passcode Attempts

        1 user thanked author for this post.
        • #2541703

          How to Erase Your iOS Device After Too Many Failed Passcode Attempts

          You can’t erase without your passcode !

          • #2541708

            Unless preset as in the next section, which is the main topic of that article:

            There is another option: you can completely wipe your iPhone or iPad after 10 failed attempts. (Make sure you keep backups if you enable this, though.)

            This option is off by default. To turn it on, first open the Settings and then tap “Touch ID & Passcode”.

            You will need to enter your passcode to access these settings.

            Scroll to the bottom of the Touch ID & Passcode settings and tap on “Erase Data” to enable the self-destruct feature.

            This Device Is Set to Self-Destruct

            1 user thanked author for this post.
          • #2541715

            You can still lock or erase remotely (for Apple and Android) from the ‘Find my phone’ site — access to that needs standard login (email, password and 2fac) – not the passcode.

            Peter Deegan

    • #2543188

      I have a Samsung.  At home, awake, my phone is on my desk.  When I’m sleeping, it’s charging on my nightstand.  Any other time it’s in my back pocket unless I’m making a call.  I’ve been using cell phones for ~25 years, and have never lost one.

      It’s kinda like my truck keys; they are either in the ignition while I’m driving, or in my right front pocket.  I’ve been driving over 63 years and have never lost a set of car keys.  My house keys are separate from my ignition keys, and are either in my hand unlocking the door, or in my left front pocket.  I’ve never lost a set of house keys.

      There’s no setup involved, other than forming the habits.

      That’s a great thing, until someone mugs you, or the unexpected happens that you can’t control.

      In my case, I was standing in the way (being a larger human) of someone smaller than me to prevent them from suffering injury at the hands of someone at least as large as me. When pushed, I fell. My phone fell out of my pocket, and before I could get to it, someone else on the same street scooped it up and ran.

      Not everything in life is predictable. I’m glad that apparently you have never suffered something unpredictable. However, should you, none of your habits will save you, unless one of them includes a documented backup and restore procedure for your phone’s data, and any account names/numbers, passwords, secret questions, and so on.

      I have had cell phones since 1998 (my first Motorola StarTAC!) Up until this year, I have never had a problem. I’ve never damaged one, I’ve never lost one, be it Nextel, Palm, Blackberry, Android, or iPhone (had them all). And then I had an event that was completely out of my hands, and the first thing happened. So that’s 25 years for me; right up until the end of January. Ensuring everything is backed up, regardless of good habits is still useful.

      We are SysAdmins.
      We walk in the wiring closets no others will enter.
      We stand on the bridge, and no malware may pass.
      We engage in support, we do not retreat.
      We live for the LAN.
      We die for the LAN.

      6 users thanked author for this post.
    • #2631683

      In this column you state: “<span style=”font-size: 10.5pt; font-family: ‘Verdana’,sans-serif;”>Always use some form of cloud storage or synchronization to automatically keep a copy of all your files elsewhere. Don’t save documents, photos, or files only on a portable device. Use OneDrive, Dropbox, iCloud, or — my personal preference — Resilio Sync.”</span>

      I tried out Resilio but could not figure out how to actually use the documents I synced: I sent Excel files from my pc to my iPhone and my iPad, on which I have the Numbers and Excel apps installed. but I could only read the files, even though I set it to read and write. My idea was to use the files and make changes as needed on any device, and it would be synced over all devices…. but nothing happened. I could only make changes on my pc.  The Resilio website was of no help.

       

      • #2631745

        I can’t comment specifically on the information provided.  All I can say is that I use Resilio Sync https://www.resilio.com/individuals/ daily and for many years to sync documents and files between computers and devices.  Changes made on any machine appear on the others within seconds.

        You may be in sight of your problem — make sure that all the shares are set to Read and Write from the beginning.  Personally I never use ‘Read Only’ since it doesn’t apply.

        There is a Resilio forum, perhaps someone there can help you out?

        Hope this helps a little …

        Peter Deegan

        1 user thanked author for this post.
        Ken
        • #2633115

          The Resilio Forum is about 150 pages… and no way to search. Too long to go through. Resilio themselves offer no help for beginners.  I think I can slowly find my way using it from one pc to another, but with iPhone and iPad I have not figured out how to use this. Where are files stored? I see them clicking within the Resilio window, but they are not usable there, only read-only, even if I have the correct apps in the device. I am not asked where to save the folder/files either.  Any help you can give or suggest elsewhere to go?

          On pc’s, I currently have an external drive with all my files on pc A, and equivalent external drive on my wife’s pc B. I currently synchronize using GoodSync which is great but only replaces old with new, it is not a “live sync”. I have to run it periodically to make sure all files equal.  The big problem here is if we both access the same file and make changes, then GoodSync does not know which is the one to be replaced – both are correct!  I have tried using the file location to open files on pc B = the network location on pc A., but Excel on pc B opens everything: 52 files! I can’t stop it, so am back to the external drives on each pc. Ideas?

    • #2631686

      The “find my phone” feature requires Location Services to be ON at all times. I never keep it ON unless I need it for some purpose such as Google Maps gps usage, etc. Why would I want anyone knowing my location at any time?  Does this feature locate the phone some other way if Location Services is OFF?

      • #2631744

        Any feature like Location Services is a compromise between the benefit and privacy. If we want the significant benefits of Location Services, then we have to accept the small possibility of privacy being breached.

        You can set iOS to only use Location Services with selected apps and even which iOS features use LS (Settings | Privacy & Security | Location Services | System Services).  But if you want to be able to Find My Phone, then LS has to be on for that feature.

        Peter Deegan

        2 users thanked author for this post.
        • #2633118

          The new option on IOS to safeguard wrong use in case of loss insists on biometric id.  But my wife and I access each other’s phone if necessary…. can one have more than one face or finger id?

          • #2633120

            Lookup ‘<b> Set Up an Alternate Appearance’ </b>in the iOS settings.

    • #2644256

      An interesting story of an iPhone lost in 15 meters of water and recovered 10 days later, still working. Impressive.

      https://www.abc.net.au/news/2024-03-02/lost-mobile-phone-found-scuba-diving-great-barrier-reef/103529720

      The owner was smart and used ‘Find my Phone’ to put a message up on the screen when it restarted.  A diver found the phone, recharged it and was able to contact the owner.

      Another reminder of how useful Find My Phone can be on Apple or Android … even if you’re sure that your phone will never be lost or stolen.

      Peter D/

       

    • #2644300

      can one have more than one face or finger id?

      Yes

    • #2644301

      recovered 10 days later, still working. Impressive.

      Lost iPhones were found after a year in water still working.

    Viewing 11 reply threads
    Reply To: What to do before your phone is stolen

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: