I guess when one starts depending upon "something that you have", you end up in a situation where you need to trust someone or some company not to let your identity be compromised. The question is whether the phone is the weak link or something else is (i.e., one's email address). Hard to say. > From: Flora <http://www.gmail.com/~flora> > Date: Mon, 21 Aug 2017 20:44:06 -0400 > > Meant to cc Robert on this > ---------- Forwarded message ---------- > From: "Flora " <http://www.gmail.com/~flora> > Date: Aug 21, 2017 8:41 PM > Subject: Re: account takeover ID theft > To: "Noelle" <http://dummy.us.eu.org/noelleg> > Cc: > > Just heard this myself. (Previously), I contacted my wireless telephone > company and told them that I was a victim of identity theft and had a > passcode put on the account. So, if someone tried to have the phone number > set up on a new phone, they would need the passcode. Also, I don't use the > same password on any of my accounts and use two factor authentication > whenever I can. It (the telephone takeover) used to happen mainly to high > profile people, but it seems to have grown. > > Basically, the way I see it, you have to prevent someone from taking over > your phone number.