Pg 1024w” sizes=”(max-width: 1148px) 100vw, 1148px”>

▲ Image from: Development Software and Application Mobile

The New York Times said that the phone number is actually a stronger personal identity than your name. They asked Fyde, a mobile security company in Palo Alto, Calif., to demonstrate that when the phone number leaked, At the same time, there is a lot of information about this process.

Fyde’s security researcher Emre Tezisci is responsible for the query. It has never spoken to the author of the article. He has never met before and is completely strange to each other.

After Emre Tezisci entered the phone number provided by author Brian X. Chen into a public database. Soon, he got a fairly complete and detailed file – including name, date of birth, address, property tax paid, and family member information.

From this moment on, Brian X. Chen’s privacy security will become quite fragile. After the security officer Emre Tezisci has mastered this information, he can try to attack some of his accounts by answering security questions, or even go Phishing scams against his family. Of course, it is illegal to do so.

▲ Image from: YouTube

So, is the database that Emre Tezisci has just queried is an internal database that is difficult for outsiders to query? In fact, it is only a white page database member version that charges $5 a month. The difference is in the yellow pages of the nature of the enterprise. The white page is a database dedicated to querying personal information.

According to some clues, Emre Tezisci conducted a thorough web tracing, and an hour later, Brian X. Chen’s information was exposed:

  • Home address, size, price and property tax
  • Remarks made publicly over the past decade
  • Full name of father, mother, sister and auntie
  • Last phone number and the landline number of the parent’s home
  • A previous property record and mortgage record
  • Is there a criminal record

With this information, further attacks are highly likely to be successful, such as answering “mother’s name” or “previous address” to log in to some private accounts.

In addition, you can use this information to deceive the operator’s customer service to transfer the number to a new SIM card for call hijacking purposes;

After hijacking the phone, you can make more attempts, such as some phone verification accounts;

You can also scam your family with phishing information;

Do not disable phishing information and robot lock-in calls;

Try cracking your voicemail;

……

In the information society where all information is heavily bound, such a result can be said to be a necessity. However, illegal criminal activities are not normal after all, and it is more common to use your information for junk marketing. Your personal information will be relayed between various marketing companies, and then SMS advertising and harassing calls will continue to harass your life.

Even some targeted ads will often revolve around your SMS inbox and email, and you may be wondering why these ads understand you so much, surprised at the magic of big data.

So, when can the phone really play its original role?

In addition to your friend and colleague calling to find you, basically only when the bank double-verifies your password and mobile phone number, it will prove that you are your role. In addition, register with the phone number. Whether the website is good or published, it is actually a high-risk operation.

Don’t expect the tech giants to protect your personal information. In fact, Facebook has long been censored for improper use of phone numbers. A blog from Gizmodo last year found that after Facebook’s 2-step verification, advertisers can match Facebook’s database for personalized ad recommendations, as well as the ability to find user profiles by entering a personal phone number.