Is Boost Mobile REALLY safe?

2FA is just that, using 2 separate pieces:

Password
App Generated Token / SMS Token / FIDO
Biometrics (face/thumb/etc)

A biometric alone is not a 2FA setup.

And, you'll want to make sure that your face isn't just unlocking a local password database that's used to input the password in to the app. That's just like a master passcode on your password safe.
 
this could happen on any wireless carrier. if their phones have the ability to use esim that may be a safer alternative.
 
You can ask your provider for SIM Protection (or Number Lock). It locks down your device and SIM combination. You can't upgrade/change your service, port a number, or swap a device while the lock is in place.


1742858989720.webp
 
I wouldn’t think twice about my phone being cloned but if your are locking a physical SIM makes sense. Physical SIMs are like dinosaurs though and will become extinct.

Get a phone with ESIM and worry no more if the subject concerns you. HECK NEW USA iPhones dont even have a slot for a physical SIM

https://www.androidauthority.com/esim-vs-physical-sim-3325188/
 
Last edited:
I wouldn’t think twice about my phone being cloned but if your are locking a physical SIM makes sense. Physical SIMs are like dinosaurs though and will become extinct.

Get a phone with ESIM and worry no more if the subject concerns you. HECK NEW USA iPhones dont even have a slot for a physical SIM

https://www.androidauthority.com/esim-vs-physical-sim-3325188/
Yeah as I stated, not super (personally) worried, we both have i14's.

That said, I don't think esim = unhackable. Time and history, not in favor of that.
 
Sometimes it’s the big nut behind the wheel

My dad - several years back - answered a call on his land line and gave them a singular bank account information. Obviously more than checked out at that point in his life point being an example of a weak link
Well yes there’s variables that ease the villains attack.
 
Well yes there’s variables that ease the villains attack.
They use the shotgun approach and the arbitrage of extremely cheap labor in India and the middle east. In fact, Chinese gangs had giant call centers in the UAE IIRC. By giant I mean apartment blocks with their own pharmacies and stores where foreigners would live and work at. It was basically a call center compound. Some of them specialized in "pig-butchering" scams where online models lure unwitting men into online relationships and then get them involved in crypto schemes. The models would live on campus and respond with targeted videos and responses while some indian guy in a cubicle is chatting with these men. This one case I saw on YT was busted by the authorities but there are apparently call centers in Burma where there is no law enforcement (and a regional war) that are getting away with this behavior.

So you have 10's of thousand on low cost scammers using bespoke call center software to call millions of phone numbers each day. Even if you have a 2% hit rate, you will still make money because it's so cheap to do.

I'm afraid of what AI, realistic voice software, and voice cloning will do. This will get out of control. The solution will likely be white listing phone numbers and relying on voice mail because the gov't is too slow to respond and their attempts at blocking. The the Shaken / Stir call verification system isn't very effective as I still get calls.
 
Last edited:
They use the shotgun approach and the arbitrage of extremely cheap labor in India and the middle east. In fact, Chinese gangs had giant call centers in the UAE IIRC. By giant I mean apartment blocks with their own pharmacies and stores where foreigners would live and work at. It was basically a call center compound. Some of them specialized in "pig-butchering" scams where online models lure unwitting men into online relationships and then get them involved in crypto schemes. The models would live on campus and respond with targeted videos and responses while some indian guy in a cubicle is chatting with these men. This one case I saw on YT was busted by the authorities but there are apparently call centers in Burma where there is no law enforcement (and a regional war) that are getting away with this behavior.

So you have 10's of thousand on low cost scammers using bespoke call center software to call millions of phone numbers each day. Even if you have a 2% hit rate, you will still make money because it's so cheap to do.

I'm afraid of what AI, realistic voice software, and voice cloning will do. This will get out of control. The solution will likely be white listing phone numbers and relying on voice mail because the gov't is too slow to respond and their attempts at blocking. The the Shaken / Stir call verification system isn't very effective as I still get calls.
I think they cracked down on the scam call centers in Myanmar. There were news that the these towns are now desolate and empty - they were based in Myanmar but had 5g cell towers in Thailand.
 
I don't think esim = unhackable.
It would not matter at all. They are using the phone company process that switches the service to a different phone, a very common customer service operation. It would not matter what kind of SIM was in the old phone.
 
I will come riIf someone ht out and say I am not blaming Boost for an outright ID theft attempt and I have no idea how it was initiated, but Boost was involved.

My closest neighbor knocked on my door 8:30 Sat night, needed to use my phone. Both their phones were shut off by Boost at the request of, well dunno, hackers. Lady neighbor calls Boost, verbally on my phone and has their phones switched back on with very little information. Then guy tells me the story of battle with hackers on both their Boost service phones for 4-5 days now!! Hackers accessed some of their accounts and stuff.

I don't know much more than that. But I ask HOW?
I'm wondering If someone called your neighbors and pretended to be a Boost Mobile employee saying that there is something wrong with their account?
 
I got the feeling it is an industry.

I mean clean a guy’s Fidelity account out, feed a nation
These were gangs targeting Chinese people and scamming them. It had gotten to a point where they had labor shortage so they would lure people from China with a promise of employment in Bangkok, kidnap them at the airport and traffic them to Myanmar. After they did this to a couple of semi-famous actors, the Chinese government stepped in and made Thailand shut down these operations. For years the Thais couldn't do anything but within a few weeks after Chinese request they solved the issue.

Scams targeting Americans are probably based in Europe, India or Philippines.
 
Back
Top Bottom