So, you lost your device, you lost your password, you lost your email, and subsequently lost your mind.

Welcome to our security pages, now with a slightly different approach to security, we aren’t going to list out anything we cannot do ourselves.

So if you lost your phone, that has a face reader or finger print reader, password or finger swiping pattern, we provide methods here of how we bypass all of that.

Why this approach, isn’t this just how to commit crime?

Yep, it most certainly is.

From looking online there is also a shed load of tabloid or marketing material in the guise of consumer advice which actually has a negative impact on security for consumers.

The problem is, with several billion users, goodness knows how many applications, from payment services, gambling, email, social media, browsers, search engines, then subsequently consumer advice, which is just a guide on how to commit crime anyway, the criminals are given more technical know how than consumers. Consumers are only really given a “one glove fits all solution” which, to be honest, just exposes you more than it protects you.

So, we are going to show methods of bypassing security, including things like defining data dictionaries for a brute force attack, followed by instructions for consumers to prevent our methods.

The simple reason for this approach is

Cyber Criminal – Knows the technical methods and the consumer advice

Consumer – Knows the consumer advice

Pretty uneven playing field isn’t it!

Anyway, point of this exercise is, if we start conditioning users to think about the ways people technically take advantage of them, cyber security will start to become second nature.

That stuff is covered in the “How I would commit crime” section below.

Practice what you preach is how I have had to set up services, from this website to how I operate on social media, in order to find workarounds and solutions that make my services secure (not as easy as you might think, a lot of what “services” do for you is convenient, it isn’t secure).