<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Oblivious Investor</title>
	<atom:link href="https://obliviousinvestor.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://obliviousinvestor.com</link>
	<description>Low-Maintenance Investing with Index Funds and ETFs</description>
	<lastBuildDate>Mon, 06 Apr 2026 01:52:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Stop Trying to Remember Your Passwords (And Use a Password Manager Instead.)</title>
		<link>https://obliviousinvestor.com/password-managers/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 12:00:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9004</guid>

					<description><![CDATA[In the world of information security, the &#8220;CIA triad&#8221; is often used as a framework of objectives that must be met. (To be clear, it&#8217;s a mnemonic device and has nothing to do with the Central Intelligence Agency.) Confidentiality: access to data should be limited to the appropriate parties. Integrity: your data is accurate and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In the world of information security, the &#8220;CIA triad&#8221; is often used as a framework of objectives that must be met. (To be clear, it&#8217;s a mnemonic device and has nothing to do with the Central Intelligence Agency.)</p>
<ul>
<li><strong>Confidentiality:</strong> access to data should be limited to the appropriate parties.</li>
<li><strong>Integrity:</strong> your data is accurate and has not been tampered with.</li>
<li><strong>Availability:</strong> you have access to the data when you need it.</li>
</ul>
<p>When most of us think of cybersecurity, confidentiality is primarily what we&#8217;re thinking about, but integrity and availability are mission-critical also.</p>
<p>For many people, using a password manager is going to be an upgrade in all three categories, relative to what they&#8217;re currently doing.</p>
<h3>Confidentiality</h3>
<p>Just think of all the different accounts you have, which you would <em>really</em> not want accessed by a malicious party:</p>
<ul>
<li>Email accounts,</li>
<li>Bank accounts,</li>
<li>Brokerage accounts,</li>
<li>Credit cards, mortgage lender, or other financial services,</li>
<li>Credit bureaus,</li>
<li>MyChart (or other patient portals) for your health care system(s),</li>
<li>Login.gov,</li>
<li>Venmo,</li>
<li>Your providers of health insurance, car insurance, homeowners/renters insurance, umbrella insurance, etc.</li>
</ul>
<p>The list just goes on and on. And there are probably 100+ other websites with less critical information, but which you&#8217;d still prefer somebody else not to access.</p>
<p>For anybody with normal memory capabilities, it&#8217;s impossible to remember a unique password for each of those websites.</p>
<p>So, many people resort to one password that gets reused across a bunch of different accounts. This is a train wreck waiting to happen. <a href="https://en.wikipedia.org/wiki/Credential_stuffing" target="_blank" rel="noopener">Credential stuffing</a> is a common form of cyberattack, in which thieves use previously stolen credentials (username/password) on various other accounts. Once your password is stolen, it will be tried on a very long list of other websites. If you reuse the same password on many websites, you now have thieves accessing a whole bunch of your accounts all at once. This is an entirely avoidable scenario, so please don&#8217;t let it happen to you.</p>
<p>Alternatively, many people resort to short, easy to remember passwords (e.g., Boglehead123 for their Vanguard account or MagellanLynch1 for their Fidelity account). The problem is that easily remembered passwords are often easily guessed passwords.</p>
<p>The reality that you have to accept at this point is that <em>you aren&#8217;t supposed to be able to remember all of your passwords</em>. If you&#8217;re still trying to remember them all in your brain, you are almost certainly making major security compromises in order to make that happen.</p>
<p>A password manager allows you to create strong (lengthy and randomly-generated) passwords for each account, which are unique to each account, and it remembers them for you.</p>
<p>Another benefit with respect to confidentiality: a password manager will usually not offer to fill your password if the domain doesn&#8217;t match exactly. For instance, if you have a saved username/password for Schwab.com, and someday you accidentally find yourself on a different domain, which is designed to look exactly like Schwab&#8217;s website (and thus collect and maliciously reuse your credentials after you enter them), your password manager should not offer to fill your password (because it doesn&#8217;t see a saved password associated with the domain you&#8217;re currently on).</p>
<h3>Integrity and Availability</h3>
<p>Some people&#8217;s approach to password security is to record all of their passwords in a physical notebook, which is kept in their home. Assuming that the notebook is kept secure, that can do a reasonable job with respect to confidentiality. But that approach often falls short with respect to data <em>integrity</em>. At some point, ink becomes smeared. Or passwords get crossed out with new ones scrunched into the spare space nearby. Legibility declines and we can no longer read the password in question. Or something physically happens to the notebook itself: there&#8217;s a fire or natural disaster, or more likely, a beverage is spilled directly onto the notebook.</p>
<p>I&#8217;ve also seen that approach fail with respect to availability: whoops, we forgot to bring the notebook with us on vacation. Or your spouse just can&#8217;t read your handwriting.</p>
<p>Similarly, I&#8217;ve seen people take a post-it note approach to password management (i.e., just sticking post-its on or near their computer with various important passwords). While that approach has confidentiality problems if anybody else ends up near your computer, that approach also can easily fail the availability test if a post-it falls off and gets thrown away.</p>
<p>With a password manager, your passwords will be synced across your devices. As long as you can sign into your password manager, you will have access to your passwords. And no need to worry about your or your spouse&#8217;s handwriting.</p>
<h3>Password Sharing</h3>
<p>Password managers also allow for secure sharing between multiple people (e.g., two spouses on a shared family plan), which has benefits for confidentiality, integrity, and availability.</p>
<ul>
<li>Confidentiality: sharing passwords via a password manager is much more secure than sharing them with each other by text, for example.</li>
<li>Integrity: if one of you updates the password, it will be automatically updated for the other.</li>
<li>Availability: you can be in different physical locations, while both still having access to your shared passwords.</li>
</ul>
<h3>Which Password Manager?</h3>
<p>I&#8217;m not going to officially recommend one password manager as opposed to another. Most all-Mac households seem to be happy with Apple&#8217;s built-in password manager (known as Apple Passwords on newer devices). 1Password or Bitwarden are also popular and well respected.</p>
<p>LastPass was also very popular, but due to a <a href="https://en.wikipedia.org/wiki/LastPass_2022_data_breach">major breach in 2022</a>, many of the top experts in the field recommend using a different provider. (And if you were using LastPass at the time, you should change every password that was stored in your vault. And if you are still using LastPass even after that breach, you should absolutely change your master password as well.)</p>
<p>As far as the password managers built into Chrome and Edge, opinions vary. Many people consider them to be somewhat of a tradeoff, providing convenience but less security (and fewer features) than a dedicated password manager. Other people argue that the latest versions are meaningfully improved and now essentially as secure as 1Password or Bitwarden.</p>
<p>If you go looking for comparisons of one password manager to another, I&#8217;ll just make two observations:</p>
<ul>
<li>Many of the articles you&#8217;ll find are actually sales pitches in disguise. Many password managers offer &#8220;affiliate programs,&#8221; whereby they pay a commission to a referring party for each new customer that signs up. If somebody can publish an article that ranks well in search results for &#8220;best password manager&#8221; or &#8220;password manager comparison&#8221; &#8212; and then the article gets many people to sign up for one of the providers that pays a commission, that can be a substantial revenue stream.</li>
<li>Among cybersecurity enthusiasts, &#8220;should I use Bitwarden or 1Password&#8221; is akin to &#8220;should I tilt to small-cap value&#8221; for Bogleheads. They can talk about it forever, and there are ardent supporters on either side. There are real pros and cons of each. But the key thing to recognize is that either is a heck of a lot better than what many people are doing with their passwords.</li>
</ul>
<h3>Staying Secure with a Password Manager</h3>
<p>I want to be clear that simply <em>using</em> a password manager doesn&#8217;t in itself make you much safer. Password managers make it convenient to use strong passwords, but if you have existing weak passwords and/or passwords that are reused at a bunch of different places, you have to take the step of <em>updating</em> those passwords to new passwords that are stronger and unique. (The password manager should have a password generator to easily create strong passwords for you.)</p>
<p>It&#8217;s also <em>extremely</em> important to recognize that, with a bunch of passwords stored in one place, that one place becomes absolutely mission critical. You need to keep malicious parties out of it. And you need to make sure that you will not be locked out of it.</p>
<p>That means that for your password manager, you want to:</p>
<ul>
<li>Use a very strong master password.</li>
<li>Turn on multi-factor authentication.</li>
<li>Only use strong methods of multi-factor authentication. (The safest would be a hardware security key such as a YubiKey, of which you have multiples. Hardware security keys will be a topic for another day. But as noted previously, <a href="https://obliviousinvestor.com/authenticator-apps-a-better-multi-factor-option-than-text-or-email/">an authenticator app is generally a safer option than MFA by email or SMS</a>.)</li>
</ul>
<p>When using a password manager, device security becomes even more critical than it would otherwise be. For example, if you take your laptop around with you, and you normally keep yourself signed into your password manager on that device (e.g., via a Bitwarden or 1Password browser extension), you have a <em>very big problem</em> if somebody else gets their hands on that device. For devices that leave your home (or even for devices kept at home, if other people are around on a regular basis), I recommend using a very short screen-lock time, as well as configuring the password manager to lock (thus requiring your master password to be reentered) when the screen locks or the device goes to sleep.</p>
<p>And with respect to not getting yourself locked out, it&#8217;s important to recognize that if you forget your master password, many password managers cannot recover it for you. You would be permanently locked out. That&#8217;s by design. It&#8217;s one part of what makes the system secure. But it means that you should probably have that master password written down on paper somewhere, such as a fireproof safe or in a safe deposit box.</p>
<p>Similarly, your recovery code (which serves as a backup if your normal MFA method is unavailable) should be printed on paper and kept somewhere safe.</p>
<p>If your recovery code and master password are both printed out and kept together in a safe deposit box, this would provide you (or your heirs, when the time comes) with a way to sign into your account.</p>
<h3>Password Managers and Passkeys</h3>
<p>As discussed previously, passkeys <a href="https://obliviousinvestor.com/what-the-heck-are-passkeys/">are generally an improvement over traditional passwords</a>, for a variety of reasons (e.g., they&#8217;re more resistant to phishing). And your passkeys will generally be stored in a password manager, to be synced across your devices.</p>
<p>As I noted in previous articles though, it&#8217;s hard to explain exactly how that works in practice, because it will vary depending on what combination of technology you&#8217;re using (i.e., which operating system(s), which browser(s), which password manager(s), and whether or not you&#8217;re using hardware security keys such as YubiKey). There are too many possible combinations to give a complete set of answers for everybody.</p>
<ul>
<li>Apple Passwords can store passkeys on all Apple devices &#8212; and sync them across Apple devices.</li>
<li>Google Password Manager can store passkeys on any device browsing with Chrome (and sync across all such devices).</li>
<li>Edge Password Manager can store/sync passkeys on any devices browsing with Edge.</li>
<li>Third party password managers (e.g., Bitwarden or 1Password) can store passkeys and sync them across devices on which the software is installed (or accessible via an installed browser plugin).</li>
</ul>
<p>Imagine for instance that you have two devices: a Windows desktop on which you browse exclusively with Chrome and an iPhone on which you browse exclusively with Safari. And you don&#8217;t use a third-party password manager. In that case, it would be Google Password Manager storing the passkeys on your desktop and Apple Passwords storing them on your iPhone. And they would not &#8220;see&#8221; each other&#8217;s passkeys. (But even that is okay, because you can just set up multiple passkeys for each website.)</p>
<p>Conversely, if in the above situation you browsed with Chrome on <i>both</i> devices, then Google Password Manager would be syncing the passkeys across the two devices.</p>
<p>Or let&#8217;s say you have a desktop Mac and an iPhone. And you use Chrome on both. Then either Apple Passwords <i>or</i> Google Password Manager could be used to store and sync your passkeys. Google Password Manager seems to try to make itself the default when browsing with Chrome, but you can adjust your settings to turn that off (and thus use Apple Passwords) if desired.</p>
<p>And in any of the above cases, if you have a third party password manager (e.g., Bitwarden or 1Password) that you use on all devices, that password manager could instead be used to store/sync passkeys.</p>
<p>But the key things to know are that:</p>
<ol>
<li>It&#8217;s okay if you have some passkeys stored in one place and others stored in another place (as in the first example), because you can have multiple passkeys for each website.</li>
<li>Anywhere you are storing passkeys and/or passwords should be kept as secure as possible (i.e., using a strong password that is not used elsewhere and using strong multi-factor authentication).</li>
</ol>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investing Blog Roundup: Getting Used to Passkeys</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-getting-used-to-passkeys/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 12:00:44 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9018</guid>

					<description><![CDATA[Last week&#8217;s article about passkeys generated a ton of questions, about how they work behind the scenes, how to use them, why they&#8217;re generally safer than passwords, and more. As far as how they work behind the scenes (the public key/private key topic), that&#8217;s not something that you need to understand deeply (or at all, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Last week&#8217;s <a href="https://obliviousinvestor.com/what-the-heck-are-passkeys/">article about passkeys</a> generated a ton of questions, about how they work behind the scenes, how to use them, why they&#8217;re generally safer than passwords, and more.</p>
<p>As far as how they work behind the scenes (the public key/private key topic), that&#8217;s not something that you need to understand deeply (or at all, really) in order to use them and in order for them to improve your security. I simply included it because I know that many of the people who read this blog are the type who <em>do</em> want to understand the mechanics of how things work.</p>
<p>As far as what it&#8217;s like (from a user interface perspective) to actually <em>use</em> passkeys, it&#8217;s hard to explain universally what the process looks like, because it varies somewhat by website. (For example, when signing into Amazon with a passkey, they still send a 6-digit code by text, whereas most websites will not do so.) And it varies significantly based on what devices/browsers you&#8217;re using, as well as based on whether you&#8217;re using a separate password manager. For example:</p>
<ul>
<li>If you&#8217;re an Apple-only household, you browse only with Safari, and you use Apple Passwords to store your passwords, the whole thing will feel pretty seamless, with Apple Passwords storing your passkeys as well.</li>
<li>If you&#8217;re on macOS, browsing with Chrome, and you use Bitwarden password manager, then Apple Passwords, Google Password Manager, and Bitwarden will each want to be the thing that stores your passkeys.</li>
</ul>
<p>I would encourage you, next time you encounter a website that a) offers the option to use a passkey and b) is a low-stakes website for you so that it does not feel scary, create a passkey and then use that passkey to sign in going forward. Get used to using a passkey on one single website before trying to implement them more broadly.</p>
<p>For me personally, that would be something like target.com or walmart.com. Both of those websites have my name, email, shipping address, and my (not very lengthy nor particularly privacy-sensitive) order history. But neither has stored payment information, neither has my SSN, neither is linked to any financial accounts, etc.</p>
<h3>Other Recommended Reading</h3>
<ul>
<li><a href="https://www.advisorperspectives.com/articles/2026/03/16/fallacy-investing-based-forecasts">The Fallacy of Investing Based on Forecasts</a> from Allan Roth</li>
<li><a href="https://awealthofcommonsense.com/2026/03/an-asset-liability-mismatch/">An Asset-Liability Mismatch</a> from Ben Carlson</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/03/23/dimensional-vanguards-tax-busting-model-mutual-fund">Dimensional Grafts Vanguard’s Tax-Busting Model Onto Mutual Fund</a> from Katie Greifeld</li>
<li><a href="https://awealthofcommonsense.com/2026/03/whats-middle-class-in-new-york-city/">What&#8217;s Middle Class in NYC?</a> from Ben Carlson</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/03/27/private-credits-angry-investors-showing-limits">Private Credit’s Angry Investors Are Showing Its Limits</a> from Paul Davies</li>
<li><a href="https://www.morningstar.com/retirement/best-strategies-consistent-retirement-spending">The Best Strategies for Consistent Retirement Spending</a> from Amy Arnott</li>
<li><a href="https://www.aisi.gov.uk/blog/how-do-frontier-ai-agents-perform-in-multi-step-cyber-attack-scenarios">How do frontier AI agents perform in multi-step cyber-attack scenarios?</a></li>
<li><a href="https://www.nytimes.com/2026/02/28/health/scams-elderly-banks.html?unlocked_article_code=1.W1A.x9Kp.gRd7vux8YgQH&amp;smid=url-share">Banks Are (Trying to Become) Bulwarks for Vulnerable Seniors</a> from Paula Span (NYT)</li>
<li><a href="https://acsm.org/resistance-training-guidelines-update-2026/">The Biggest Benefits Come from Consistency, Not Complicated Programs</a> from the American College of Sports Medicine&#8217;s Updated Guidelines for Resistance Training</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What the Heck are Passkeys? And Should I Be Using Them?</title>
		<link>https://obliviousinvestor.com/what-the-heck-are-passkeys/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 12:00:05 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9005</guid>

					<description><![CDATA[Passkeys are a brilliant idea &#8212; a rare win, in that they are more secure than signing in with a password and (generally) easier to use as well. A very short summary is that when signing in with a passkey, the authentication happens on your own device. So if I&#8217;m signing in via passkey, my [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Passkeys are a <i>brilliant</i> idea &#8212; a rare win, in that they are more secure than signing in with a password and (generally) easier to use as well.</p>
<p>A very short summary is that when signing in with a passkey, the authentication happens on your own device. So if I&#8217;m signing in via passkey, my device essentially asks, &#8220;hey user, prove to me that you&#8217;re the person who is allowed to unlock this device.&#8221; Once I do that (e.g., by PIN or fingerprint), the message the device sends to the other institution is basically, &#8220;this device has verified the user, and they have access to the passkey for this account.&#8221; So it has benefits such as:</p>
<ul>
<li>No reusable secret information is being transmitted.</li>
<li>The institution doesn&#8217;t have to store any secret information (i.e., password).</li>
<li>It has the potential to eliminate the risk of somebody guessing/stealing your password, because somebody would have to be in possession of your device <i>and</i> be able to convince the device that they&#8217;re you.</li>
<li>It&#8217;s resistant to MFA-code phishing (such as in the <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">John/Rachel example</a>), because there&#8217;s no code to share in the first place.</li>
<li>It&#8217;s also resistant to fake-website phishing attempts (e.g., somebody buying Va<b>m</b>guard.com and putting a site up that looks exactly like Vanguard, with a login page to collect login credentials), because passkeys are tied to a specific domain, so they won’t work on look-alike sites like Vamguard.com.</li>
<li>It&#8217;s (usually) easier to sign in with a passkey than with a password, and passkeys eliminate the hassle of resetting passwords due to forgetting.</li>
</ul>
<h3>How Do Passkeys Work?</h3>
<p>When trying to understand how passkeys work, it&#8217;s helpful to keep in mind the goal. The goal is to have a system in which a user can sign into a website or app without having to transmit any secret information. All of the secret stuff lives on the user&#8217;s own device. And everything that gets transmitted, and any login-related info that&#8217;s stored on the website&#8217;s server is safe if anybody else sees it.</p>
<p>But how can you log into a website without sending them your password or some other secret information? That is, if you don&#8217;t have to transmit any secret information to the website (i.e., if only &#8220;public&#8221; information is necessary), how can the website make sure that nobody else can sign into your account? To create a system that works in such a way requires fundamentally rethinking the entire process.</p>
<p>And that&#8217;s what passkeys do. They solve those problems.</p>
<p>And broadly, the idea is that the &#8220;proving you&#8217;re who you say you are&#8221; process happens locally, on your own device.</p>
<p>We&#8217;ll go through it step-by-step (i.e., what happens when you create a passkey, and then what happens when you use that passkey to log in).</p>
<p>But first we have to start with one piece of jargon.</p>
<h3>What is a &#8220;Challenge?&#8221;</h3>
<p>In order to understand passkeys, you have to understand what a &#8220;challenge&#8221; is.</p>
<p>You can think of a challenge as a formalized &#8220;who are you, and please prove it&#8221; request.</p>
<p>An &#8220;unsigned challenge&#8221; is what the server sends to you. For example, if you&#8217;re on your bank&#8217;s website and you click &#8220;log in with a passkey&#8221; or if you&#8217;re already signed in and you click a link to create a new passkey, your bank will send an unsigned challenge to your browser.</p>
<p>And what your device will eventually send back to the server is a &#8220;signed challenge&#8221; (along with some other information). We&#8217;ll get to how a challenge is satisfied (&#8220;signed&#8221;) in a moment.</p>
<p>For now, one thing to know about a challenge is that each one has a unique identifier (e.g., challenge #203SNA30DNDQ), and each challenge is one-time-use-only. This is a critical security feature. It means that if somebody managed to spy on your transmission (and were thus able to view the signed challenge that you send to the server in order to log in), they would not be able to simply copy that signed challenge and send it to the server themselves in order to log into your account. The server would say, &#8220;sorry, this challenge has already been used,&#8221; and the fraudulent login attempt would be rejected.</p>
<h3>Magic Pen and Magic Magnifying Glass</h3>
<p>With &#8220;challenge&#8221; defined, let&#8217;s take a brief detour for an analogy, to explain the other major parts of the passkey ecosystem.</p>
<p>Imagine you have a magic pen. It writes in normal-looking ink. But you also have a magic magnifying glass. When this magic magnifying glass is used to examine something that was written with your magic pen, the ink glows sparkly purple. When it looks at anything written with any other ink (i.e., not written by your magic pen) the ink just looks normal.</p>
<p>There&#8217;s no way to &#8220;reverse engineer&#8221; the magic pen from the magic magnifying glass. In other words, if somebody were to have the magnifying glass, there&#8217;s no risk that they could create a copy of your magic pen.</p>
<p>So you give magic magnifying glasses to all of your friends. That way, any of them can see whether a message was <em>really</em> written by you, with your magic pen. Fun! And you can give out as many of these magnifying glasses as you want, because again, nobody can recreate your magic pen just by having one of these magnifying glasses.</p>
<h3>What Happens When You Create a Passkey</h3>
<p>When you&#8217;re signed into a website or app, and you choose to create a new passkey, the server will send your device a new unsigned challenge.</p>
<p>Your device takes that unsigned challenge and creates three new things:</p>
<ol>
<li>A private key.</li>
<li>A corresponding public key.</li>
<li>A credential ID. This is just a public identifier for the passkey (e.g., your new passkey is passkey #22093948310930).</li>
</ol>
<p>The private key is the secret thing. The private key lives on your device (or is synced securely across your devices via your Apple/Google/Microsoft account) and is never sent to the server. The private key is your magic pen, and it can be used to <em>sign a challenge</em>.</p>
<p>The public key is unique and linked to the private key. The public key is the magic magnifying glass. It&#8217;s essentially a <em>testing tool</em>. When somebody has the public key, they can use it to <em>test</em> the signed challenge to see if it was signed with the private key (magic pen) that corresponds to that public key (magic magnifying glass).</p>
<p>An important point here is that there is no way for somebody to look at a given public key and determine the corresponding private key. So it&#8217;s absolutely no problem if somebody were to intercept your public key. Just like with the magnifying glass, you could give out your public key to as many parties as you want, with no security risk.</p>
<p>After your device creates these three things (private key, public key, credential ID), it uses the newly-formed private key (magic pen) to sign the challenge. And it sends the public key, the credential ID, and the signed challenge back to the server. It does <em>not</em> send the private key to the server.</p>
<p>The server then stores the public key and credential ID and associates them with your specific user. (Remember, you&#8217;re already logged in before beginning the process of creating a passkey, so it already knows who you are.)</p>
<p>So at this point:</p>
<ul>
<li>You have a private key (magic pen) stored on your device.</li>
<li>And the server has a public key (magic magnifying glass) and a credential ID, both of which are now associated with your user.</li>
</ul>
<h3>What Happens When You Log in with a Passkey</h3>
<p>When you initiate the process to log in with a passkey, your device first checks: &#8220;Do I have a passkey saved for this app/website?&#8221;</p>
<p>This step is itself a valuable security measure. It means that if you ever accidentally visit a fake website (e.g., you fell for the first part of a phishing attempt, clicked the link in the email, and are now on usbamk.com rather than usbank.com), your device will immediately stop the process. It doesn&#8217;t have a passkey associated with this domain. Disaster averted. (Though seriously, <a href="https://obliviousinvestor.com/it-can-be-easier-to-fall-victim-to-fraud-on-mobile-than-desktop/">please don&#8217;t click that link in the first place</a>.)</p>
<p>If your device sees that it does have a passkey for the website/app in question, the website/app sends an unsigned challenge to your device.</p>
<p>Your device then goes through some process to satisfy itself that you are you. This might be entering your device PIN or providing some biometric identifier (e.g., fingerprint).</p>
<p>Once your device is satisfied that you are you, it uses the stored private key to sign the challenge.</p>
<p>And your device then sends the signed challenge, the credential ID, and your username to the server. Again, it <em>does not send the private key</em>. (Also note: your PIN/fingerprint is never transmitted to the server either.)</p>
<p>The server then:</p>
<ol>
<li>Checks that the username provided exists in the system,</li>
<li>Checks that the credential ID a) exists in the system and b) is linked to the username in question, and</li>
<li>Uses the stored public key (magnifying glass) that&#8217;s associated with the credential ID in question to test the signed challenge, to make sure that it was signed by the appropriate private key (magic pen).</li>
</ol>
<p>If all three of those things proceed happily, you&#8217;re signed in.</p>
<h3>Passkey Limitations</h3>
<p>An important issue to be aware of is that, at least as of right now, when websites let you use passkeys, they usually let you sign in using the passkey <i>or</i> a password. So the weak password/stolen password path of attack still works. Ideally we&#8217;d see websites that let you implement passkeys and then make it impossible to sign in with a traditional password. But so far, that sounds scary to many users because passkeys are unfamiliar. Hopefully that changes over the coming years as more and more people use them.</p>
<p>In addition, there&#8217;s messiness where everybody wants you to use <i>their</i> passkey ecosystem. So if you&#8217;re browsing on Chrome on an iPhone, and you visit a website for which you already have a passkey set up (via Apple), Chrome might prompt you to create a new one &#8212; which can feel very confusing. Fortunately, you can usually create a bunch of passkeys for the same website, so you can have one for each device/browser combination, for each website.</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investing Blog Roundup: Smoothed RMD Spending Strategy</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-smoothed-rmd-spending-strategy/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 12:00:32 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9012</guid>

					<description><![CDATA[The strategies for determining how much to spend from a retirement portfolio each year exist along a spectrum: At one of the spectrum are strategies that spend a certain dollar amount (or more often, a certain dollar amount, which is then adjusted for inflation each year). The classic &#8220;4% rule&#8221; strategy is in this category. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The strategies for determining how much to spend from a retirement portfolio each year <a href="https://obliviousinvestor.com/there-is-no-perfect-retirement-spending-strategy/">exist along a spectrum</a>:</p>
<ol>
<li>At one of the spectrum are strategies that spend a certain <em>dollar amount</em> (or more often, a certain dollar amount, which is then adjusted for inflation each year). The classic &#8220;4% rule&#8221; strategy is in this category. Strategies like this provide for predictable spending but allow for potential portfolio depletion if investment returns are poor (especially in the early part of retirement).</li>
<li>At the other end of the spectrum are strategies that spend a <em>percentage of the portfolio</em> each year. Strategies in this category are safer in the sense that they cut spending when portfolio performance is poor and thus reduce/eliminate the possibility of depleting the portfolio. But they can result in dramatic volatility in spending from year to year.</li>
</ol>
<p>And so there are also hybrid strategies. In an article for Kitces, Michael Woloch recently discussed a &#8220;modified RMD&#8221; spending strategy. Basing spending on RMDs is a percentage-of-portfolio strategy (though itself a specific subcategory, because the percentage increases each year with age). But here the &#8220;modification&#8221; is that rather than basing spending on a percentage of the portfolio balance on the final day of the previous year, it&#8217;s based on the <em>average</em> portfolio balance of the final days of the last three years, with the result being that spending is less volatile from one year to another.</p>
<ul>
<li><a href="https://www.kitces.com/blog/modified-required-minimum-distributions-rmd-swr-safe-withdrawal-rate-method-portfolio-retirement-income-paycheck-irs/">Reducing Retirement Income Volatility With The Modified RMD Safe Withdrawal Method</a> from Michael Woloch</li>
</ul>
<h3>Other Recommended Reading</h3>
<ul>
<li><a href="https://awealthofcommonsense.com/2026/03/10-rules-for-dealing-with-uncertainty/">10 Rules for Dealing with Uncertainty</a> from Ben Carlson</li>
<li><a href="https://awealthofcommonsense.com/2026/03/preparing-without-predicting/">Preparing without Predicting</a> from Ben Carlson</li>
<li><a href="https://www.theguardian.com/technology/ng-interactive/2026/mar/12/lab-test-mounting-concern-over-rogue-ai-agents-artificial-intelligence">‘Exploit Every Vulnerability’: Rogue AI Agents Published Passwords and Overrode Anti-virus Software</a> from Robert Booth</li>
<li><a href="https://www.mynbc5.com/article/cswd-phishing-3-million-scam/70716105">Municipal Water District Loses $3 Million to Phishing Scam</a> from Jack Thurston</li>
<li><a href="https://crr.bc.edu/older-workers-embrace-job-hopping-and-its-good-for-their-retirement-prospects/">Older Workers Embrace Job Hopping – and It’s Good for Their Retirement Prospects</a> from Geoffrey Sanzenbacher</li>
<li><a href="https://crr.bc.edu/the-government-is-trying-to-rein-in-medicare-advantage-costs-will-it-work/">The Government Is Trying to Rein in Medicare Advantage Costs. Will It Work?</a> from Alicia Munnell</li>
<li><a href="https://www.journalofaccountancy.com/news/2026/mar/irs-proposes-regulations-for-trump-accounts-pilot-program/">IRS Proposes Regulations for Trump Accounts, Pilot Program</a> from Martha Waggoner</li>
<li><a href="https://ofdollarsanddata.com/signal-collapse-and-the-new-proof-of-work/">Signal Collapse and the New Proof of Work</a> from Nick Maggiulli</li>
<li><a href="https://www.nytimes.com/2026/03/13/business/financial-fraud-money-scams-elderly-recovery.html?unlocked_article_code=1.TVA.QjpR.qANWDaBg_ff0&amp;smid=url-share">His Father Lost His Life Savings in a Scam. A Fake Lawyer Offered to Help.</a> from Tara Siegel Bernard (NYT)</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Authenticator Apps: a Better Multi-Factor Option than Text or Email</title>
		<link>https://obliviousinvestor.com/authenticator-apps-a-better-multi-factor-option-than-text-or-email/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 13:00:37 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9006</guid>

					<description><![CDATA[When a website requires somebody to set up multi-factor authentication (MFA), it often provides multiple options such as: Email SMS (text) Authenticator app Of the three, using an authenticator app is definitely the most secure approach. (Hardware authenticators such as a Yubikey will be a topic for another day.) The Problem with Email as MFA [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>When a website requires somebody to set up multi-factor authentication (MFA), it often provides multiple options such as:</p>
<ul>
<li>Email</li>
<li>SMS (text)</li>
<li>Authenticator app</li>
</ul>
<p>Of the three, using an authenticator app is definitely the most secure approach. (Hardware authenticators such as a Yubikey will be a topic for another day.)</p>
<h3>The Problem with Email as MFA</h3>
<p>Email as the multi-factor authentication method is pretty bad. Just think of how many websites you visit where:</p>
<ol>
<li>Your username is your email address, and</li>
<li>When you click the &#8220;forgot password&#8221; link, they just send an email with a reset password link.</li>
</ol>
<p>If #1 and #2 are true and you use your email as the multi-factor method, if a thief gets into your email account, they can now access any of those other accounts as well.</p>
<p>Granted, a thief getting access to your email account is <em>extremely bad news</em> as it is. We want to take serious precautions to avoid that scenario. But there&#8217;s no reason to make that scenario any more disastrous than it needs to be.</p>
<h3>SMS (Text) Isn&#8217;t Secure</h3>
<p>Using SMS (text) as the multi-factor method is not ideal either.</p>
<p>CISA (the Cybersecurity and Infrastructure Security Agency, which is a component of the United States Department of Homeland Security) <a href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf">put out a document in December 2024</a> that encouraged people to &#8220;migrate away from SMS-based MFA.&#8221; They note that &#8220;SMS messages are not encrypted &#8212; a threat actor with access to a telecommunication provider&#8217;s network who intercepts these messages can read them.&#8221; They also note that SMS is not phishing-resistant (see <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">the John/Rachel example</a>).</p>
<h3>SIM-Swap Fraud</h3>
<p>Another problem with SMS at the multi-factor authentication method: SIM-swap fraud.</p>
<p>Mobile providers can easily &#8220;port&#8221; a phone number from one device to another. This is commonly done when a customer switches to a new phone (e.g., to upgrade or because the previous device was lost).</p>
<p>In a SIM-swap fraud:</p>
<ul>
<li>The thief gathers personal information about the target. As we&#8217;ve discussed, <em>a lot</em> of information is simply purchasable. Other assorted information can often be gathered via social media or online searches (e.g., mother&#8217;s maiden name may be findable via an obituary posting).</li>
<li>The thief then contacts the target&#8217;s mobile provider and, with clever conversational skills and a bunch of personal (<em>ostensibly</em> private) information, convinces the company to transfer the target&#8217;s phone number to the thief&#8217;s device.</li>
</ul>
<p>And now the thief has access to any MFA codes that come in via text. And again, <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">as discussed recently</a>, in many cases <strong>that code is all they need</strong>, in order to access various critical accounts.</p>
<p>Your mobile provider probably offers a SIM-swap protection feature. <a href="https://www.verizon.com/about/account-security/sim-swapping">Verizon</a>, <a href="https://www.t-mobile.com/support/plans-features/help-with-t-mobile-account-fraud">T-Mobile</a>, and <a href="https://about.att.com/story/2025/wireless-account-lock.html">AT&amp;T</a> all provide it free of charge, but it isn&#8217;t activated by default. I would definitely encourage you to turn it on.</p>
<p>Even with SIM-swap protection activated via your mobile provider though, SMS is still not the ideal method for multi-factor authentication, because SMS is not encrypted.</p>
<h3>Authenticator Apps</h3>
<p>Authenticator apps are more secure than SMS or email as the multi-factor method. The authenticator app is installed on your phone and cannot be accessed remotely (short of your phone itself being infected with malware). To get an MFA code from an authenticator app on your phone, the thief would have to:</p>
<ul>
<li>Be in physical possession of your unlocked phone, or</li>
<li>Convince you to give them the code (which is also a potential failure point of email or text-based MFA). And again this is why we have to be super careful with these codes.</li>
</ul>
<p>Authenticator apps take a bit of time to get used to, but once you&#8217;re used to using one, it&#8217;s quite easy. I have found Google Authenticator to be easy to use, but there are many other options as well (e.g., Microsoft Authenticator or Authy).</p>
<p>If you&#8217;re new to it, do not worry, regardless of which authenticator app you pick, there will be a ton of intro/walk-through videos on YouTube.</p>
<p>When setting up app-based multi-factor authentication, the website may give you the option to store some backup codes. These codes are to be used in case you lose your phone, so do store them somewhere. But of course make sure it&#8217;s somewhere safe (e.g., printing them out and storing in a safe or secure filing cabinet).</p>
<h3>Removing Less-Secure MFA Methods</h3>
<p>After activating multi-factor authentication by app, you may have to manually <em>turn off</em> multi-factor authentication via SMS/email. For many websites, the default behavior is that, if you already had some other method of MFA set up, after setting up MFA via authenticator app, that previous method will still remain as an option. And we usually don&#8217;t want that, because it leaves you vulnerable to exactly the types of attacks discussed above.</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investing Blog Roundup: Phishing Software as a Service</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-phishing-software-as-a-service/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 13:00:13 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9007</guid>

					<description><![CDATA[Continuing with our theme of cybersecurity, I read an article this week about a new software product for fraudsters. With this software, the user (a would-be thief) types in a URL of a genuine website, and when a target visits a selected scam URL, the software loads up an invisible browser window to collect, in [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Continuing with our theme of cybersecurity, I read an article this week about a new software product for fraudsters.</p>
<p>With this software, the user (a would-be thief) types in a URL of a genuine website, and when a target visits a selected scam URL, the software loads up an invisible browser window to collect, in real-time, all of the genuine website&#8217;s information, which it then passes through to the victim&#8217;s browser window. In other words, from the victim&#8217;s perspective, everything looks exactly right, because it is literally the same thing showing in your browser.</p>
<p>But it gets crazier from there. Much crazier. The software also passes every keystroke and action from the victim back to the original website &#8212; including the MFA code. So from the victim&#8217;s perspective, everything is operating as normal, including all of the functionality after logging in, so as not to set off any mental alarms. But the software is collecting all of that information for the thief. And the thief is now logged in as well.</p>
<p>The software also has a full collection of other features, such as URL masking (i.e., making a fake link look genuine).</p>
<p>And it comes with customer support, regular software updates, and a community forum for users.</p>
<p>The takeaway, again: unless <em>you yourself directly typed the appropriate URL into your browser</em> (e.g., vanguard.com, schwab.com, chase.com, etc.), you might not be on the genuine website.</p>
<ul>
<li><a href="https://abnormal.ai/blog/starkiller-phishing-kit">Phishing Software as a Service (Complete with Customer Support)</a> from Callie Baron and Piotr Wojtyla</li>
</ul>
<h3>Other Recommended Reading</h3>
<ul>
<li><a href="https://www.morningstar.com/retirement/retirees-should-you-take-rmds-early-year-or-wait">Retirees: Should You Take RMDs Early in the Year or Wait?</a> from Christine Benz</li>
<li><a href="https://www.morningstar.com/funds/better-conditions-did-not-yield-better-results-active-managers-2025">Better Conditions Did Not Yield Better Results for Active Managers in 2025</a> from Bryan Armou</li>
<li><a href="https://awealthofcommonsense.com/2026/02/some-things-that-didnt-happen/">Some Things That Didn&#8217;t Happen</a> from Ben Carlson</li>
<li><a href="https://awealthofcommonsense.com/2026/02/can-you-live-off-your-dividends/">Can You Live Off Your Dividends?</a> from Ben Carlson</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/02/24/fear-frugality-harm-financial-wellbeing">Fear-Based Frugality Can Harm Your Financial Wellbeing</a> from Rick Kahler</li>
<li><a href="https://thecollegefinanciallady.com/2026/01/13/the-truth-about-529s-and-financial-aid/">The Truth About 529s and Financial Aid</a> from Ann Garcia</li>
<li><a href="https://www.npr.org/2026/02/18/nx-s1-5716010/brain-training-exercise-cut-dementia-risk-decades">This Form of Mental Exercise May Cut Dementia Risk for Decades</a> from Jon Hamilton</li>
<li><a href="https://www.businessinsider.com/meta-ai-alignment-director-openclaw-email-deletion-2026-2">Meta AI Alignment Director Shares her OpenClaw Email-Deletion Nightmare</a> from Hendry Chandonnet</li>
<li><a href="https://www.nytimes.com/2026/02/23/opinion/chatbots-open-claw.html?unlocked_article_code=1.OlA.jrGE.tebJbbfoboSQ&amp;smid=url-share">The Rise of Bratty Machines</a> from Elizabeth Spiers (NYT)</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>It Can Be Easier to Fall Victim to Fraud on Mobile than Desktop</title>
		<link>https://obliviousinvestor.com/it-can-be-easier-to-fall-victim-to-fraud-on-mobile-than-desktop/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 13:00:55 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9008</guid>

					<description><![CDATA[This article is the second in a series about cybersecurity/fraud prevention. (You can find the first article here: What Does a Thief Need to Access Your Financial Accounts? It’s Likely Less Than You Think.) I recently received a very clever phishing attempt by email. (In hindsight, I wish I had taken screenshots prior to deleting [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>This article is the second in a series about cybersecurity/fraud prevention. (You can find the first article here: <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">What Does a Thief Need to Access Your Financial Accounts? It’s Likely Less Than You Think</a>.)</em></p>
<p>I recently received a very clever phishing attempt by email. (In hindsight, I wish I had taken screenshots prior to deleting it.)</p>
<p>Here&#8217;s what it looked like in my inbox:</p>
<ul>
<li>From: Vanguard Brokerage Services</li>
<li>Subject: Your Vanguard statement is ready</li>
</ul>
<p>Looking at the email via my desktop browser, it was very easy to see that it was a phishing attempt.</p>
<p>Looking at the email on my mobile device, however, there was no immediately obvious sign that the email was not legit. Based on everything immediately visible via my mobile mail app, it looked exactly like a genuine Vanguard email.</p>
<h3>Looking at the &#8220;From&#8221; Field</h3>
<p>When I viewed the email on desktop, the &#8220;from&#8221; field was a dead giveaway. While the &#8220;name&#8221; of the sender was &#8220;Vanguard Brokerage Services,&#8221; the email address of the sender was complete gobbledygook. Something like &#8220;senderx34x3@xyzpayments.info.&#8221; Clearly, that&#8217;s not actually Vanguard.</p>
<p>On mobile though, the sender&#8217;s email address does not appear immediately (at least not on most mobile mail apps). You just see the name. When viewing the email, there will be somewhere you can tap to display the sender&#8217;s email address. But <em>you have to go out of your way to actually do that</em>. And of course the percentage of people who do that with every single email is vanishingly small.</p>
<h3>Body of the Email</h3>
<p>The text of the email was a character-for-character copy/paste of the real statement-notification emails that Vanguard sends, complete with the appropriate images, branding, etc. Everything looked exactly as you&#8217;d expect.</p>
<p>The only thing about it that was wrong is that the links that <em>appeared</em> to point to Vanguard&#8217;s login page <em>actually</em> pointed to a scam URL. (That is, the &#8220;anchor text&#8221; of the link was the appropriate URL, but that&#8217;s not where the link actually pointed.)</p>
<p>In other words, it was something like this:</p>
<p><a href="https://obliviousinvestor.com/">https://vanguard.com/</a></p>
<p>If you look only at the text of the link itself (the &#8220;anchor text&#8221;) you&#8217;ll think the link is going to take you to Vanguard. But it doesn&#8217;t. The link points to ObliviousInvestor.com. On desktop, you can see that easily by hovering over the link. Your browser (usually in the bottom corner) will show you where the link points. (Though even this can be spoofed. So as with the email address, if it looks suspicious, it definitely should not be trusted. But if it looks normal, that <em>doesn&#8217;t</em> necessarily tell you that it&#8217;s genuine.)</p>
<p>On mobile, however, &#8220;hover over&#8221; isn&#8217;t an option. You can tap a link and hold your finger down, in order to see where the link points. But how many people actually do that for every link they consider tapping? Also, there&#8217;s the risk that you tap the link and accidentally take your finger off the screen too early &#8212; and now you&#8217;ve <em>visited</em> the scam link rather than activating the &#8220;preview&#8221; functionality.</p>
<h3>Browser Location on Mobile</h3>
<p>Of course, I did not visit the links in the spam/phishing email. But if I had, I&#8217;m confident that the destination page would <em>look</em> exactly like Vanguard&#8217;s real login page. Except, of course, it wouldn&#8217;t have actually been Vanguard. It would have been a fraudster&#8217;s website, set up to collect people&#8217;s usernames and passwords as they entered them.</p>
<p>On desktop, at the top of your browser window, you easily see the full URL of the page you&#8217;re on. That makes it at least somewhat easier to recognize whether you&#8217;re on a legitimate website or not.</p>
<p>On mobile, depending on your browser and device, you often don&#8217;t. You might see the first several characters or the last several characters. But you might, for example, have accidentally visited:</p>
<p>vanguard.com-payments-us-vanguard.com</p>
<p>If you only see the beginning or end of that URL, you might think that you&#8217;re on Vanguard&#8217;s website. But that&#8217;s not Vanguard&#8217;s website. The actual domain in that URL is &#8220;com-payments-us-vanguard.com&#8221;, which any old fraudster could have purchased. (The &#8220;vanguard&#8221; at the start of the URL is a subdomain.)</p>
<h3>What To Do</h3>
<p>There are a handful of ways to avoid falling for this sort of thing.</p>
<p>Firstly, it&#8217;s helpful to actually look at the email address of the sender, even if it&#8217;s not immediately displayed in your mobile app. But even that can be spoofed. So while a spammy email address tells you it&#8217;s spam, a legit-looking email address does <em>not</em> necessarily tell you it&#8217;s genuine.</p>
<p>Secondly, it&#8217;s helpful to generally be aware when using mobile that 1) you aren&#8217;t seeing as much information as you would via desktop and 2) sometimes the information that you&#8217;re not seeing would have been a clear red flag.</p>
<p>Thirdly, if you <em>did</em> end up falling for the email and visiting the link in question, you&#8217;d be in better shape if you use passkeys or a password manager (both topics for another day, which we&#8217;ll get to). Your passkey would not work on the fake domain. And a password manager would recognize that the domain in question was not actually Vanguard.</p>
<p>But the most effective way to avoid falling for this? It&#8217;s the same exact rule that we discussed in the <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">first article in this series</a>! (I promise I&#8217;ll move on to other topics soon. But I just want to drive home how critical and valuable this rule is.)</p>
<p>If you receive any inbound communication (whether email, text, or phone call) that purports to be from a company with which you have any sort of account:</p>
<ul>
<li>Do not reply.</li>
<li>Do not give them any information whatsoever.</li>
<li>Do not click on any links.</li>
</ul>
<p>Essentially, don&#8217;t interact with inbound communications. Instead, if you think it might be genuine and require some sort of response, reach out directly, via trusted means (i.e., either typing the company&#8217;s URL directly into your browser or calling the number on the back of your credit/debit card) and ask the company in question about it.</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investing Blog Roundup: Maximizing Spending in Retirement</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-maximizing-spending-in-retirement/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 16 Feb 2026 13:00:59 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9000</guid>

					<description><![CDATA[There are many different strategies for answering the &#8220;how much should I spend each year in retirement&#8221; question. Which strategy works best for your household will depend on your priorities. (Maximizing expected spending over your life? Maximizing spending in early retirement? Maximizing spending predictability?) Morningstar&#8217;s Amy Arnott recently shared the results of her research, together [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>There are many different strategies for answering the &#8220;how much should I spend each year in retirement&#8221; question. Which strategy works best for your household will depend on your priorities. (Maximizing expected spending over your life? Maximizing spending <em>in early retirement</em>? Maximizing spending <em>predictability</em>?)</p>
<p>Morningstar&#8217;s Amy Arnott recently shared the results of her research, together with other Morningstar colleagues, discussing which strategies would be expected to maximize total spending through retirement.</p>
<ul>
<li><a href="https://www.morningstar.com/retirement/heres-how-you-can-spend-more-during-retirement">Here’s How You Can Spend More During Retirement</a> from Amy Arnott</li>
</ul>
<h3>Other Recommended Reading</h3>
<ul>
<li><a href="https://awealthofcommonsense.com/2026/02/iceberg-crashes/">Iceberg Crashes</a> from Ben Carlson</li>
<li><a href="https://awealthofcommonsense.com/2026/01/the-mid-life-spending-crisis/">The Midlife (Spending) Crisis</a> from Ben Carlson</li>
<li><a href="https://www.gelliottmorris.com/p/you-should-quit-social-media-for">You Should Quit Social Media for Good</a> from G. Elliott Morris</li>
<li><a href="https://ofdollarsanddata.com/why-you-cant-time-the-market-even-when-you-know-the-future/">Why You Can’t Time the Market (Even When You Know the Future)</a> from Nick Maggiulli</li>
<li><a href="https://ofdollarsanddata.com/is-inflation-higher-than-we-think/">Is Inflation Higher Than We Think?</a> from Nick Maggiulli</li>
<li><a href="https://kindnessfp.com/not-giving-enough-money-to-kids-and-grandkids/">You Aren’t Giving Enough Money to Your Kids and Grandkids</a> from Elliott Appel</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Does a Thief Need to Access Your Financial Accounts? It&#8217;s Likely Less Than You Think</title>
		<link>https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 09 Feb 2026 13:15:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9001</guid>

					<description><![CDATA[As I&#8217;ve written before, the most common financial planning mistake I see is to spend too much time focusing on asset allocation (or investments more broadly) and tax planning, while leaving one or more other major parts of the financial picture unaddressed. That&#8217;s often estate planning, some gap in insurance coverage, or spending tracking. But [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>As I&#8217;ve<a href="https://obliviousinvestor.com/investing-and-tax-planning-come-last/"> written before</a>, the most common financial planning mistake I see is to spend too much time focusing on asset allocation (or investments more broadly) and tax planning, while leaving one or more other major parts of the financial picture unaddressed. That&#8217;s often estate planning, some gap in insurance coverage, or spending tracking. But it can also be major gaps in cybersecurity/anti-fraud practices. So on that note, this article is the first in a series about cybersecurity/fraud prevention.</em></p>
<p>A long-time <em>Oblivious Investor</em> reader recently wrote in to share that he and his spouse had fallen victim to a fraud that resulted in a theft from one of their IRAs at Fidelity (which, as discussed below, was not reimbursed). The total loss was &#8220;only&#8221; about $4,000. But it absolutely could have been much worse.</p>
<p>Here&#8217;s how it played out.</p>
<p>John and Rachel (not their real names) had just returned from a trip abroad. Rachel received the following text:</p>
<div style="clear: both;"><a href="https://obliviousinvestor.com/wp-content/uploads/2027/02/Fraud-Text.png"><img decoding="async" class="alignnone wp-image-9002 size-medium" src="https://obliviousinvestor.com/wp-content/uploads/2027/02/Fraud-Text-174x300.png" alt="" width="174" height="300" srcset="https://obliviousinvestor.com/wp-content/uploads/2027/02/Fraud-Text-174x300.png 174w, https://obliviousinvestor.com/wp-content/uploads/2027/02/Fraud-Text.png 536w" sizes="(max-width: 174px) 100vw, 174px" /></a></div>
<p>If you can&#8217;t see the image, the conversation reads as follows:</p>
<p><strong>Incoming text:</strong><br />
Fidelity ®: Did You Attempt A Transaction of $374.52 At MODERN FEMME FASHIONS 12/02/2025 (EDT).<br />
Reply (YES) if Recognized.<br />
Reply (NO) if Unauthorized, A Call Will Be Generated To You Momentarily</p>
<p><strong>Outbound text:</strong><br />
No</p>
<p><strong>Incoming text:</strong><br />
Fidelity ®: Thank you for confirming. Please hold for the next available agent to assist you.</p>
<p>After that text exchange, Rachel received a phone call as indicated. At the outset of that call, the agent said that, in order to confirm her identity, Fidelity was going to send her a 6-digit code and asked her to please read it back to them. Rachel received the code and read it back to the agent on the phone.</p>
<p><strong>And that was it. As of that moment, the fraudster was able to access her Fidelity account.</strong></p>
<p>The thief promptly initiated a few money transfers out of the account. Fortunately, John promptly noticed what was going on and contacted Fidelity. Fidelity was able to recover one of the transfers, but the other two (totaling ~$4,000) were not recovered. And because the theft involved the victim unintentionally sharing login information with the thief, Fidelity did not reimburse John and Rachel for the theft.</p>
<p>Why was it only $4,000 that was stolen, when there was much more in the account? (Even the cash balance at the time far exceeded $4,000.) I&#8217;m not entirely sure. I think the thief must have intentionally chosen a low amount to hopefully not trigger any alerts on Fidelity&#8217;s end. But the situation clearly could have been much worse.</p>
<h3>How the Fraud Worked</h3>
<p>When we log into an account (if not using a passkey, which is a topic for another day), we provide username, password, and the multi-factor authentication (MFA) code. So we might think of all three as being necessary.</p>
<p>But the thief didn&#8217;t need Rachel&#8217;s username or password at all. All they needed was the six-digit MFA code.</p>
<p>If that sounds surprising to you, take a look at the password-reset forms for any number of financial institutions. (<a href="https://personal1.vanguard.com/lmi-forgotusernamepassword/home" target="_blank" rel="noopener">Here&#8217;s Vanguard&#8217;s</a> for instance. <a href="https://digital.fidelity.com/prgw/digital/login/user-identity" target="_blank" rel="noopener">Here&#8217;s Fidelity&#8217;s</a>.) Take a careful look at the information they ask for. For many financial institutions, the form requires:</p>
<ul>
<li>Name,</li>
<li>Date of birth,</li>
<li>Social Security number (or last 4 digits of Social Security number), and</li>
<li>Zip-code.</li>
</ul>
<p>After you enter that info, they send you a 6-digit code. And after entering that code, they let you reset your username and/or password, or perhaps they display your username on the screen in plain text and allow you to pick a new password.</p>
<p>And, unfortunately, for most of us, <em>all of that information is available for purchase</em> on the dark corners of the internet, due to large-scale security breaches that have already happened. In the <a href="https://www.ftc.gov/enforcement/refunds/equifax-data-breach-settlement">2017 Equifax breach</a> alone, approximately 147 million Americans had their name, DoB, SSN, home address, and phone number stolen. That&#8217;s roughly 43% of the U.S. population in just one data breach. And there have been tons of other breaches.</p>
<p><strong>In other words, for most of us, a thief has everything they need to get into our accounts, other than a 6-digit multi-factor authentication code.</strong></p>
<p>We deal with MFA codes so often that they feel commonplace, mundane, disposable. But they&#8217;re the keys to the kingdom. It&#8217;s not an exaggeration to say that MFA codes should be guarded <em>more closely</em> than your Social Security number.</p>
<h3>&#8220;We&#8217;re Contacting You About Fraud&#8221; Is Itself a Red Flag for Fraud</h3>
<p>The readers targeted in this incident are not at all the only people to fall victim to fraud, via a fraudster pretending to be the financial institution, warning them of fraud. It&#8217;s a very common tactic. Here are two other examples, if you&#8217;re interested in similar stories:</p>
<ul>
<li><a href="https://open.spotify.com/episode/0fzEF49xWBvuLfeiYkC9dP">Imposters Stole $8,000. How &#8216;Money with Katie&#8217; Got Scammed</a></li>
<li><a href="https://www.cnbc.com/2026/01/20/how-my-coinbase-account-was-almost-stolen.html">How My Coinbase Account Was Almost Stolen</a></li>
</ul>
<p>&#8220;We&#8217;re contacting you about a suspected fraud&#8221; is itself a great way to defraud somebody, for two reasons.</p>
<p>Firstly, it gives the fraudster a plausible reason for the initial contact to the targeted person.</p>
<p>And secondly, it puts the targeted person in a mindset of wanting to <em>take prompt action</em>, in order to stop the supposed fraud &#8212; thus making it easier for the fraudster to get the target to follow instructions. It might even be effective enough to generate a panic/fear response in the target, thereby inhibiting clear thought.</p>
<h3>What To Do When You&#8217;re Contacted</h3>
<p>When a financial institution with whom you have a relationship reaches out to you (whether about a suspected fraud or about anything else):</p>
<ul>
<li>If it&#8217;s a phone call, take down whatever information they give you. (Or frankly just don&#8217;t answer the phone if it&#8217;s from a number you don&#8217;t know. Just listen to the voicemail, if they leave one.)</li>
<li>Regardless of method of contact, do not give them any information. No information whatsoever. Not your date of birth. Not your Social Security number. And absolutely not a multi-factor authentication code. Give them nothing. Truly, nothing. If it&#8217;s a text, do not reply. If it&#8217;s an email, do not reply to the email.</li>
<li>If it&#8217;s an email, do not click on any links in the email.</li>
<li>Then reach out to a trusted phone number that you already have for that financial institution. If it&#8217;s your bank, call the number on the back of your credit/debit card. Or directly type in schwab.com (or whatever is the applicable website), and find the applicable phone number there. And once you know you&#8217;re actually in contact with the right organization, ask them for details on the situation.</li>
</ul>
<p>To summarize:</p>
<ul>
<li>Don&#8217;t respond to any inbound messages that appear to be from financial institutions. Don&#8217;t give them any information.</li>
<li>Separately reach out to a phone number that you know is genuine, to ask about what&#8217;s going on.</li>
<li>Treat multi-factor authentication codes with the utmost security and caution. If you accidentally give one to a thief, that&#8217;s quite possibly all they need to get into your account.</li>
</ul>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investing Blog Roundup: New Podcast Episodes</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-new-podcast-episodes/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 13:41:23 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=8995</guid>

					<description><![CDATA[I was recently a guest on two podcasts, which you might find to be of interest. First was a discussion of estate planning and Roth conversions, for the Advice-Only Podcast, which is hosted by Sarah Sprague Gerber of the Advice-Only Network. Mike Piper on Estate Planning Realities and Roth Conversion Strategies Next was a discussion [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I was recently a guest on two podcasts, which you might find to be of interest.</p>
<p>First was a discussion of estate planning and Roth conversions, for the <em>Advice-Only Podcast</em>, which is hosted by Sarah Sprague Gerber of the <a href="https://www.adviceonlynetwork.com/">Advice-Only Network</a>.</p>
<ul>
<li><a href="https://open.spotify.com/episode/4F6zUPxEhKcPIam5hp2qyq">Mike Piper on Estate Planning Realities and Roth Conversion Strategies</a></li>
</ul>
<p>Next was a discussion of Social Security, for the <em>Ben with Benefits</em> podcast, which is hosted by Ben Carlson of Ritholtz Wealth. (Ben also writes the blog <a href="https://awealthofcommonsense.com/">A Wealth of Common Sense</a>, which I frequently feature here.)</p>
<ul>
<li><a href="https://www.youtube.com/watch?v=3leNGSu_nlY">Is Social Security Going Bankrupt?</a> (interview by Ben Carlson for the Ben with Benefits podcast)</li>
</ul>
<h3>Other Recommended Reading</h3>
<ul>
<li><a href="https://www.nytimes.com/2026/01/18/business/aging-parents-finances.html?unlocked_article_code=1.JFA.pHor.6b8HOq7KTAQr&amp;smid=url-share">How to Prevent Aging Parents and Relatives From Making Financial Mistakes</a> from Paulette Perhach (NYT)</li>
<li><a href="https://jordangrumet.substack.com/p/stop-chickening-out">Stop Chickening Out</a> (regarding retirement spending strategies) from Jordan Grumet</li>
<li><a href="https://www.thetaxadviser.com/news/2026/jan/irs-releases-faqs-on-qualified-overtime-pay-deduction-under-h-r-1/">IRS Releases FAQs on Qualified Overtime Pay Deduction Under H.R. 1</a> from Martha Waggoner</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/01/21/relocation-guardrail-widowed-clients">Preventing Double Grief: A Relocation Guardrail for Surviving Spouses</a> from Kathleen Rehl</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/01/30/affordable-housing-tackling-insurance-costs">Affordable Housing Requires Tackling Insurance Costs</a> from Bloomberg News Editors</li>
<li><a href="https://www.neurology.org/doi/10.1212/WNL.0000000000214572">Treating Hearing Loss With Hearing Aids for the Prevention of Cognitive Decline and Dementia</a> from Lachlan Cribb et al.</li>
<li><a href="https://www.caniretireyet.com/artificial-intelligence-ai/">Intelligence Explosion: Navigating the High-Stakes AI Revolution</a> from Darrow Kirkpatrick</li>
<li><a href="https://www.nytimes.com/2026/01/30/business/stock-market-concentration-risk.html?unlocked_article_code=1.JFA.2NAA.iBlj0PHGg_xB&amp;smid=url-share">S&amp;P 500 and Total Stock Market Funds Meet Technical Definition of &#8220;Non-diversified&#8221;</a> from Jeff Sommer (NYT)</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
