T-Mobile owned companies and data breaches. Can you name a better duo?
deleted by creator
Also probably password hashes.
The company did not make it clear from this statement if hashed passwords were accessed by the attacker.
I don’t expect good news if they chose not to share that detail.
password hashes are getting stored by everyone for future decryption
laughs in 100+ char random unique passwords and hacker teard
All that the email I received from them said was that they fixed the problem and there was nothing further I needed to do.
Fuckin great. I ran out of hotspot like a month ago while working remotely on a road trip. I needed hotspot right then /there, and my phone is on a family plan. Increasing my hotspot data meant I had to do it for the whole family plan and pay almost double the amount on the monthly bill. I thought I outsmarted the system by getting a mint mobile 3 month subscription for like $40 to just use for that trip… Aaaaaand my data’s been breached… Cool…
I jumped ship to another carrier right after they were bought out by T-Mobile and I’ve dodged
price hikes and nowdata breaches. T-Mobile just ruins everything they touch.Price hikes? I just renewed for $250 for a year. I don’t remember the exact price I paid the year before, but $250 is still incredibly cheap compared to most, isn’t it?
Hmm, I think I might be mistaken on that then. I remember them announcing that they were nixing the $15 plan (which a couple of my family members were on), but it’s still there. Maybe they reverted it, or it was just Reddit spreading nonsense information. I’ll edit my comment.
Eh, I have my folks on t-mo’s $15/each for 3.5gb/unl/unl plan. My second line is with tello for $6/mo. $25/mo is cheap compared to my at&t business postpaid plan (phone + laptop + watch for ~$130 out the door), but if I wasn’t going for features, I’d be right there with them for the $15 plan. I’d even go both lines from tello, but the difference between tmo qci6 and qci7 is brutal in my area, and often means data becomes completely unusable during the day. Over-subscribed towers. So t-mo MVNOs are a nogo for me, thus $15.
Jumped to where if you don’t mind my asking?
Tello. The service and price have been basically the same as pre-acquisition Mint. They also use T-Mobile’s network but are not owned by them (…for now, at least.)
Tello (and all* [except Google Fi’s flex plan, and their most expensive plan] tmo MVNOs) run at qci7, or one peg below tmo direct customers* (except tmo essentials and those who go over their ‘high speed data cap’, which are at qci9 or ‘the back of the bus’). This can mean virtually nothing in some areas, or it can mean that the tower you are on is so over subscribed/at capacity so hard that data becomes non-existant.
I have tello as a second line, where data isn’t important. But my home area falls under the ‘data is non-existant’ category during the day, which is why they are my second line.
Just be cautious.
What makes you so sure they didn’t retain your data?
There’s chance they did, but I didn’t get any kind of announcement email about it. I also used an email alias for my old Mint account, so if I suddenly start getting spam emails to that address, I’ll have my answer, lol
“Once they gain access to the number, they can try to access the user’s online accounts by performing password resets and receiving the OTP codes to get past multi-factor authentication.”
Mint - “Can’t bypass multi-factor authentication when you never implemented multi-factor authentication!”
Is it just me or has 2023 been the year of the data breach? Maybe they are just larger or more widely reported. Just seems like there have been a fuck-ton of them this past year.
Hackers-for-hire on the darkweb is big business these days
While true, I’m not convinced that fully explains it. Having been in IT nearly 2 decades I feel like the second piece is cybersecurity budgets getting slashed. A lot of them have been super-basic shit like someone clicking on a malicious link.
Oh for sure, didnt mean to imply it was the only reason.
Spearphishing high-value targets, or even just phishing a company’s email roster are very very common practices because they yield significant results.
Theres also the “insurance approach” to cybersecurity, where its cheaper to run PR for a little while and/or take out insurance policies against cyber attacks such as ransomware. The latter is a key factor as to why many companies dont mind paying the ransom at all.