<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Oblivious Investor</title>
	<atom:link href="https://obliviousinvestor.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://obliviousinvestor.com</link>
	<description>Low-Maintenance Investing with Index Funds and ETFs</description>
	<lastBuildDate>Mon, 27 Apr 2026 02:52:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Investing Blog Roundup: Government Guidance on Passkeys (from the UK)</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-government-guidance-on-passkeys-from-the-uk/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 12:00:45 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9030</guid>

					<description><![CDATA[We&#8217;ve been discussing passkeys a fair bit here in recent weeks, and by coincidence last week the UK&#8217;s National Cyber Security Centre released a new paper and guidance on the topic. General guidance document: Passkeys: what you need to know Press release: NCSC: Leave passwords in the past &#8211; passkeys are the future Technical paper: Comparing the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We&#8217;ve been <a href="https://obliviousinvestor.com/what-the-heck-are-passkeys/">discussing passkeys</a> a <a href="https://obliviousinvestor.com/password-managers/">fair</a> <a href="https://obliviousinvestor.com/security-keys-the-most-secure-way-to-log-in/">bit</a> here in recent weeks, and by coincidence last week the UK&#8217;s National Cyber Security Centre released a new paper and guidance on the topic.</p>
<ul>
<li>General guidance document: <a href="https://www.ncsc.gov.uk/passkeys">Passkeys: what you need to know</a></li>
<li>Press release: <a href="https://www.ncsc.gov.uk/news/ncsc-leave-passwords-in-the-past-passkeys-are-the-future">NCSC: Leave passwords in the past &#8211; passkeys are the future</a></li>
<li>Technical paper: <a href="https://www.ncsc.gov.uk/paper/traditional-user-and-fido2-credentials-personal-use">Comparing the security properties of traditional user credentials and FIDO2 credentials for personal use</a></li>
</ul>
<p>Below are a handful of quotes from the publications. Please note how strongly worded these statements are. And these are from a governmental cybersecurity organization, which is presumably being very intentional with its wording.</p>
<p>From the &#8220;what you need to know&#8221; document:</p>
<blockquote><p>&#8220;Passkeys are a more secure alternative to passwords that you don&#8217;t need to remember as they are created and managed safely by the software on your device(s). [&#8230;] The NCSC supports the public adoption of passkeys and recommends using passkeys over passwords wherever available.&#8221;</p></blockquote>
<p>From the press release:</p>
<blockquote><p>&#8220;Passwords are no longer resilient enough for the contemporary world.&#8221;</p></blockquote>
<blockquote><p>&#8220;Passkeys should now be consumers’ first choice of login across all digital services, the UK government’s technical authority on cyber security has announced today (Thursday).</p>
<p>Overhauling decades of security practice, the National Cyber Security Centre [&#8230;] has taken the decision to no longer recommend individuals use passwords where passkeys are available because passwords lack the relative resilience to modern cyber threats.&#8221;</p></blockquote>
<p>From the paper:</p>
<blockquote><p>&#8220;At all stages of a credential’s lifecycle, and against all commonly observed attacks, FIDO2 credentials including passkeys are as secure or more secure than all forms of traditional MFA for individuals.&#8221;</p></blockquote>
<p>Also of note (from the press release):</p>
<blockquote><p>&#8220;Where a particular service does not support passkeys, the NCSC’s advice to consumers is to use a password manager to create stronger passwords and keep using two-step verification.&#8221;</p></blockquote>
<p>If you want to read the paper (or even just the &#8220;Summary and recommendations&#8221; section at the end of the paper), a few points on terminology might be helpful:</p>
<ul>
<li>The word <strong>passkey</strong> itself is a colloquial term, and its exact usage varies a bit from one case to another.</li>
<li><strong>FIDO2 credential</strong> is a technical term for what would often colloquially be called passkeys.</li>
<li>When this paper uses the term <strong>passkey</strong> it is specifically referring to passkeys synced via the cloud. It uses the terms <strong>single-device passkey</strong> or <strong>device-bound FIDO2 credential</strong> to refer to what we might think of as passkeys stored on a single device, not synced to the cloud.</li>
<li><strong>Sync fabric</strong> refers to whatever system is being used to store your passkeys in the cloud and sync them across devices (e.g., Apple Passwords, Google Password Manager, etc.).</li>
<li><strong>Relying party</strong> refers to whatever website or app you&#8217;re logging into when using a passkey.</li>
</ul>
<h3>Other Recommended Reading/Viewing/Listening</h3>
<ul>
<li><a href="https://www.youtube.com/watch?v=Qmlr0841l-A">Causes We Love: Turning Students into Investors</a> (Bogleheads Conference session, in which I interviewed Cole Mattox and and Dylan Ingerman of First Generation Investors)</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/04/13/how-ai-portfolio-recommendations-hold-up">Analyzing the Analysis: How Do AI Portfolio Recommendations Hold Up?</a> from Allan Roth</li>
<li><a href="https://www.howtomoney.com/can-millennials-count-on-social-security-w-mike-piper-episode-1127/">Can Millennials Count on Social Security?</a> (in which I was interviewed for the <em>How to Money</em> podcast)</li>
<li><a href="https://crr.bc.edu/why-social-security-faces-a-financial-reckoning-just-a-few-years-from-now/">Why Social Security Faces a Financial Reckoning Just a Few Years From Now</a> from Alicia Munnell</li>
<li><a href="https://www.morningstar.com/personal-finance/social-security-is-slowing-down">Social Security is Slowing Down. Here’s How to Get Your Benefits On Time</a> from Mark Miller</li>
<li><a href="https://calnewport.com/what-neuroscience-teaches-us-about-reducing-phone-use/">2 Ways to Actually Reduce Smartphone Use</a> from Cal Newport</li>
<li><a href="https://www.nytimes.com/2026/04/23/your-money/401ks-and-similar-plans/401k-private-credit-crypto.html?unlocked_article_code=1.d1A.Mai4.Lh6lcXAATVCn&amp;smid=url-share">Private Assets May Be Coming to Your 401(k). You Should Know the Risks.</a> from Tara Siegel Bernard (NYT)</li>
<li><a href="https://www.thetaxadviser.com/news/2026/apr/irs-finalizes-deduction-rules-for-tips-adds-3-eligible-jobs/">IRS Finalizes Deduction Rules for Tips, Adds 3 Eligible Jobs</a> from Martha Waggoner</li>
<li><a href="https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/">Russia Hacked Routers to Steal Microsoft Office Tokens</a> from Brian Krebs (Don&#8217;t use an old router!)</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Keys: The Most Secure Way to Log In</title>
		<link>https://obliviousinvestor.com/security-keys-the-most-secure-way-to-log-in/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 12:55:32 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9027</guid>

					<description><![CDATA[We discussed some weeks ago that using an authenticator app is a more secure method of multi-factor authentication than SMS or email. An even more secure option is using a physical security key, such as a YubiKey. For anybody unfamiliar with security keys, they are small devices, which you insert into a USB port (or [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>We discussed some weeks ago that <a href="https://obliviousinvestor.com/authenticator-apps-a-better-multi-factor-option-than-text-or-email/">using an authenticator app is a more secure method of multi-factor authentication than SMS or email</a>. An even more secure option is using a physical security key, such as a YubiKey. For anybody unfamiliar with security keys, they are small devices, which you insert into a USB port (or in some cases tap against your mobile device) to verify your identity when logging in.</p>
<p>To be clear, there are other brands of security keys, such as the Titan Security Key from Google. I&#8217;ll be referring to YubiKeys in this article though simply because that&#8217;s what I&#8217;m most familiar with.</p>
<p>With multi-factor authentication via email, SMS, or authenticator app, a major threat is that the user can be <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/"><em>tricked</em> into giving the multi-factor authentication code</a> to a malicious party.</p>
<p>Another threat with such multi-factor options is the possibility of the code being somehow <em>intercepted</em> (e.g., <a href="https://obliviousinvestor.com/authenticator-apps-a-better-multi-factor-option-than-text-or-email/">through SIM swap fraud, as we&#8217;ve discussed</a>).</p>
<p>If you have an account for which the only way to log in is with a physical security key, those types of threats are largely eliminated. For a malicious party who is not able to get physical possession of your security key (i.e., almost any remote threat actor), their menu of options for trying to access your accounts is dramatically reduced.</p>
<h3>User Experience</h3>
<p>The user experience with a security key is going to vary from one website to another. In part that&#8217;s because there are, broadly, two different ways in which a security key can be used to log in.</p>
<p>Firstly, there&#8217;s the traditional/older method, in which you&#8217;d still use a username and password, and the security key would be your method of multi-factor authentication. If using your security key in this manner, to log into a website you would:</p>
<ul>
<li>Enter your username and password,</li>
<li>Connect your security key to your device, then touch the key to activate it.</li>
</ul>
<p>But security keys (at least modern ones) can also be used for passwordless login (i.e., they can be used to store a <a href="https://obliviousinvestor.com/what-the-heck-are-passkeys/">passkey</a> or similar <a href="https://www.yubico.com/authentication-standards/fido2/">FIDO2 credential</a>). In that case, in order to log in you would:</p>
<ul>
<li>Enter your username or select an account, if prompted to do so,</li>
<li>Connect your security key to your device,</li>
<li>Touch the key to activate it and (if the website requires such) enter the security key&#8217;s PIN (discussed below).</li>
</ul>
<p>With passkeys stored on a security key, you get all the various benefits of passkeys (i.e., phishing protection because they only work on the legitimate domain they were created for, no need for the institution to store a password, easier to use, etc.) <em>and</em> you make the passkeys themselves as secure as possible (i.e., making it as unlikely as possible for a malicious party to be able to use them).</p>
<h3>Get More Than One!</h3>
<p>If you&#8217;re going to use a security key for logging into anything, be sure to buy more than one. If you only have one, and you lose it or it gets damaged, you could be locked out of a bunch of important accounts &#8212; permanently in some cases.</p>
<p>Often, three (or possibly even more) is a good idea. One that you use regularly at home, another in a safe at home, and a third in a secure off-site location (e.g., safe deposit box at a bank). That way, even if the two at your home are destroyed (e.g., due to a fire or natural disaster), you still have a backup.</p>
<h3>Set Up a PIN (via Yubico Authenticator App)</h3>
<p>When using a key for passwordless login, many websites require you to verify yourself on the key (e.g., by entering a PIN). If you haven’t yet set a PIN, you’ll typically be prompted to create one the first time it’s needed.</p>
<p>Personally, after buying a YubiKey, I would encourage you to download the desktop Yubico Authenticator app, so that you can set a PIN (&#8220;FIDO2 PIN&#8221;) for your key as soon as it arrives at your home.</p>
<p>With regard to selecting a PIN, <a href="https://www.yubico.com/blog/10-things-youve-been-wondering-about-fido2-webauthn-and-a-passwordless-world/">Yubico notes the following</a>:</p>
<blockquote><p>&#8220;For those combining a hardware authenticator with a PIN, it’s important to note that PINs do not demand the same security requirement as a password. A PIN and a password are different. Since a PIN is not part of the security context for remotely authenticating the user (the PIN is not sent over the network for verification), it can be much simpler and less complex than a password, and does not need to be changed with the same frequency (or at all).&#8221;</p></blockquote>
<p>Point being, a PIN doesn&#8217;t need password-level complexity. (But still, don&#8217;t set it to 123456 or something quite so simple and guessable.)</p>
<p>Generally you&#8217;d want to set the same PIN on each of your keys, to reduce the likelihood of getting locked out in an emergency (e.g., you&#8217;ve lost your main key, go to the bank to get your backup key, and because it has a different PIN that you rarely use, you can&#8217;t remember it). The additional risk from using the same PIN on each is minimal. If a malicious party has one of the keys and has your PIN, the fact that it&#8217;s also the PIN to your other keys doesn&#8217;t make the situation any worse. Don&#8217;t give anybody else your security key or the PIN for your security key.</p>
<p>One last point about setting a PIN: when logging in with the PIN,  you&#8217;re attempt-limited, for security&#8217;s sake (i.e., so that if somebody manages to get a hold of your key, they can&#8217;t simply try over and over to get the correct PIN). If you enter the incorrect PIN 3 times, you&#8217;ll have to remove and reconnect the key. After 8 incorrect attempts in a row, the key itself is locked. You don&#8217;t have to throw it away, but it will have to be factory reset, in which case all the passkeys stored on the device will be deleted.</p>
<h3>Security Keys + Password Managers</h3>
<p><a href="https://obliviousinvestor.com/password-managers/">When we discussed password managers</a>, we also discussed the common &#8220;passwords in a physical notebook&#8221; approach to password management. The whole idea behind that approach is that it&#8217;s pretty unlikely that somebody is going to get into your house and steal that notebook. And that&#8217;s likely true. For most of us, our homes aren&#8217;t broken into on a regular basis.</p>
<p>But if you use a password manager and you secure your password manager account with a security key (i.e., your security key is required to log into your password manager), you <em>still have</em> that &#8220;somebody would have to steal this physical thing in order to access my passwords&#8221; -type of security. Plus, now they&#8217;d not only have to steal the physical thing, they&#8217;d <em>also</em> have to know the PIN to unlock the security key.</p>
<p>And in addition you get:</p>
<ul>
<li>Improved data integrity (i.e., no risk of a coffee spill destroying your record of passwords).</li>
<li>Improved data availability (i.e., no need to remember to take the notebook with you when traveling).</li>
<li>The anti-phishing security that results from the password manager <em>not</em> providing a password if you accidentally end up on a fake/malicious lookalike website.</li>
<li>Secure password sharing for a family.</li>
<li>The convenience of password auto-fill.</li>
<li>A secure place to store backup codes for websites.</li>
<li>A secure place to store fictional answers to &#8220;security&#8221; questions. (For example, for your auto insurer&#8217;s website, when they ask the name of your favorite food, you can store in the password manager that the required answer is &#8220;kCbc$A4qjmto4&#8221; rather than the true but quite guessable answer of &#8220;pizza.&#8221;)</li>
</ul>
<h3>What Happens if a Security Key is Stolen?</h3>
<p>You should take the physical security of your security keys seriously. Treat them as if they were, very literally, the keys to your accounts. And if you lose one, you should promptly remove that key as a sign-in option from your various accounts (i.e., by signing in via some other method, navigating to your security/sign-in options, and removing the security key that is no longer in your possession).</p>
<p>That said, if one of your security keys is stolen, the thief will probably not be accessing all of your accounts immediately.</p>
<p>Firstly, a thief who has stolen your key would not know, for example, that the key could be used as the multi-factor option for your Vanguard account with username HotBob1972. Even with passkeys stored on the device, access to those credentials is typically gated by user verification (such as a PIN).</p>
<p>Secondly, to use the security key to log into an account, the thief would generally still need either your password (if you were using the key for traditional multi-factor authentication) or the key&#8217;s PIN (if you were using the key to store a passkey).</p>
<p>But again, keep those security keys secure (i.e., never give them to anybody else, always be aware of where they&#8217;re located rather than leaving them randomly lying around the house). And if you do lose one, promptly remove it as a sign-in option from your various accounts.</p>
<h3>Security Key Limitations</h3>
<p>Firstly, not all websites allow security keys as a multi-factor authentication method or for passwordless login.</p>
<p>Second, as always, your accounts are only as secure as the <em>least</em>-secure method of accessing the account.</p>
<p>An authenticator app is more secure than SMS or email as a multi-factor authentication method. And a security key is more secure than an authenticator app.</p>
<p>After setting up secure methods, you generally want to <em>remove</em> the less-secure methods of signing in, if the website allows you to do so. (Though again, be sure you have multiple options. If the only way to sign into an important account is with a single physical security key, you&#8217;re setting yourself up to be locked out of the account someday.)</p>
<p>Be sure to also examine the account-recovery process for each of your accounts (as distinct from the normal method for signing in). If it&#8217;s some insecure method (e.g., a phone call to your mobile phone), the account is still insecure.</p>
<h3>Additional Reading</h3>
<p>For readers who want additional reading, the following articles from Yubico (the company that makes YubiKeys) may be helpful:</p>
<ul>
<li><a href="https://www.yubico.com/blog/10-things-youve-been-wondering-about-fido2-webauthn-and-a-passwordless-world">10 Things You&#8217;ve Been Wondering About a Passwordless World</a></li>
<li><a href="https://www.yubico.com/authentication-standards/fido2/">A Technical Guide to FIDO2 and Passkeys</a></li>
</ul>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investing Blog Roundup: Cybercrime Losses Grew by ~60% for the Age 60+ Crowd in 2025</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-cybercrime-losses-grew-by-60-for-the-age-60-crowd-in-2025/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 12:00:44 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9022</guid>

					<description><![CDATA[I hadn&#8217;t expected it, but interest in the recent cybersecurity-related articles has been absolutely off the charts, based on the volume of incoming questions, comments, and frequency with which readers are sharing the articles with other people. I only have two more articles planned for the series (hardware security keys and an overall plan to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I hadn&#8217;t expected it, but interest in the recent cybersecurity-related articles has been absolutely off the charts, based on the volume of incoming questions, comments, and frequency with which readers are sharing the articles with other people.</p>
<p>I only have two more articles planned for the series (hardware security keys and an overall plan to keep yourself and vulnerable loved ones safe), and then we&#8217;ll be back to more typical content (though mixing in cybersecurity-related topics here and there, as it really is a core part of personal finance).</p>
<p>In any case, here&#8217;s the series so far:</p>
<ul>
<li><a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">What Does a Thief Need to Access Your Financial Accounts? It’s Likely Less Than You Think</a></li>
<li><a href="https://obliviousinvestor.com/it-can-be-easier-to-fall-victim-to-fraud-on-mobile-than-desktop/">It Can Be Easier to Fall Victim to Fraud on Mobile than Desktop</a></li>
<li><a href="https://obliviousinvestor.com/authenticator-apps-a-better-multi-factor-option-than-text-or-email/">Authenticator Apps: a Better Multi-Factor Option than Text or Email</a></li>
<li><a href="https://obliviousinvestor.com/password-managers/">Stop Trying to Remember Your Passwords (And Use a Password Manager Instead.)</a></li>
<li><a href="https://obliviousinvestor.com/what-the-heck-are-passkeys/">What the Heck are Passkeys? And Should I Be Using Them?</a></li>
</ul>
<p>From 2018-2024, losses from cybercrime for people age 60+ went from $649 million to $4.8 billion &#8212; a seven-fold increase. (And it&#8217;s generally accepted as fact that actual losses are much higher than the reported figures, given that many people never report their losses due to simply not bothering with it or due to feeling embarrassed.)</p>
<p>Last week, the FBI released their annual report with the figure for 2025: $7.748 billion. That&#8217;s an increase of roughly 60% in just one year. Here&#8217;s what it looks like visually:</p>
<p><a href="https://obliviousinvestor.com/wp-content/uploads/2027/04/Cybercrime-Age-60-Plus.jpg"><img fetchpriority="high" decoding="async" class="alignleft size-full wp-image-9028" src="https://obliviousinvestor.com/wp-content/uploads/2027/04/Cybercrime-Age-60-Plus.jpg" alt="" width="900" height="562" srcset="https://obliviousinvestor.com/wp-content/uploads/2027/04/Cybercrime-Age-60-Plus.jpg 900w, https://obliviousinvestor.com/wp-content/uploads/2027/04/Cybercrime-Age-60-Plus-300x187.jpg 300w, https://obliviousinvestor.com/wp-content/uploads/2027/04/Cybercrime-Age-60-Plus-768x480.jpg 768w" sizes="(max-width: 900px) 100vw, 900px" /></a></p>
<p>And with AI tools being dramatically more powerful this year than last year, I have to imagine the 2026 figure is going to be even worse.</p>
<ul>
<li><a href="https://www.fbi.gov/news/press-releases/cryptocurrency-and-ai-scams-bilk-americans-of-billions">Cryptocurrency and AI Scams Bilk Americans of Billions</a> from the FBI</li>
<li><a href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf">FBI 2025 Internet Crime Report</a></li>
<li><a href="https://www.ic3.gov/AnnualReport/Reports">Prior years&#8217; reports here, if you&#8217;re interested</a></li>
</ul>
<h3>Other Recommended Reading</h3>
<ul>
<li><a href="https://www.whitecoatinvestor.com/highlights-wcicon26-mike-piper-christine-benz/">Talking to Mike Piper, Christine Benz about the Pressure of Being Right (and Dealing with Their Own Imposter Syndrome)</a> from Josh Katzowitz</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/04/07/wall-street-pull-back-trumps-deregulatory-push">Wall Street Watchdogs Pull Back Amid Trump’s Deregulatory Push</a> from Nicola White, Katanga Johnson, and J.J. McCorvey</li>
<li><a href="https://ofdollarsanddata.com/the-upper-middle-class-trap/">The Upper Middle Class Trap</a> from Nick Maggiulli</li>
<li><a href="https://www.kitces.com/blog/retirement-timing-date-withdrawal-strategy-retirees-financial-plan-window-market-environment-cohort-sequence-of-return-risk/">Creating A Flexible Retirement Date ‘Window’ To Mitigate Sequence And Cohort Risk</a> from Georgios Argyris</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/04/06/breakeven-real-rates-social-security-claiming">Breakeven Real Rates for Delayed Social Security Claiming</a> from Nathan Dutzmann</li>
<li><a href="https://www.wealthmanagement.com/estate-planning/five-beneficiary-designations-for-clients-to-review-now">It&#8217;s Time to Review Your Beneficiary Designations</a> from Daniel Michaelsen</li>
<li><a href="https://www.advisorperspectives.com/articles/2025/06/10/4-tips-choosing-best-healthcare-proxy">Tips for Choosing the Best Healthcare Proxy</a> from Diana Cabrices</li>
<li><a href="https://www.cnbc.com/2026/04/10/powell-bessent-us-bank-ceos-anthropic-mythos-ai-cyber.html">Scott Bessent and Jay Powell Call Meeting with Big Banks to Discuss Cyber Threats from Anthropic&#8217;s Latest Model</a> from Samantha Subin and Hugh Son</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stop Trying to Remember Your Passwords (And Use a Password Manager Instead.)</title>
		<link>https://obliviousinvestor.com/password-managers/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 12:00:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9004</guid>

					<description><![CDATA[In the world of information security, the &#8220;CIA triad&#8221; is often used as a framework of objectives that must be met. (To be clear, it&#8217;s a mnemonic device and has nothing to do with the Central Intelligence Agency.) Confidentiality: access to data should be limited to the appropriate parties. Integrity: your data is accurate and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In the world of information security, the &#8220;CIA triad&#8221; is often used as a framework of objectives that must be met. (To be clear, it&#8217;s a mnemonic device and has nothing to do with the Central Intelligence Agency.)</p>
<ul>
<li><strong>Confidentiality:</strong> access to data should be limited to the appropriate parties.</li>
<li><strong>Integrity:</strong> your data is accurate and has not been tampered with.</li>
<li><strong>Availability:</strong> you have access to the data when you need it.</li>
</ul>
<p>When most of us think of cybersecurity, confidentiality is primarily what we&#8217;re thinking about, but integrity and availability are mission-critical also.</p>
<p>For many people, using a password manager is going to be an upgrade in all three categories, relative to what they&#8217;re currently doing.</p>
<h3>Confidentiality</h3>
<p>Just think of all the different accounts you have, which you would <em>really</em> not want accessed by a malicious party:</p>
<ul>
<li>Email accounts,</li>
<li>Bank accounts,</li>
<li>Brokerage accounts,</li>
<li>Credit cards, mortgage lender, or other financial services,</li>
<li>Credit bureaus,</li>
<li>MyChart (or other patient portals) for your health care system(s),</li>
<li>Login.gov,</li>
<li>Venmo,</li>
<li>Your providers of health insurance, car insurance, homeowners/renters insurance, umbrella insurance, etc.</li>
</ul>
<p>The list just goes on and on. And there are probably 100+ other websites with less critical information, but which you&#8217;d still prefer somebody else not to access.</p>
<p>For anybody with normal memory capabilities, it&#8217;s impossible to remember a unique password for each of those websites.</p>
<p>So, many people resort to one password that gets reused across a bunch of different accounts. This is a train wreck waiting to happen. <a href="https://en.wikipedia.org/wiki/Credential_stuffing" target="_blank" rel="noopener">Credential stuffing</a> is a common form of cyberattack, in which thieves use previously stolen credentials (username/password) on various other accounts. Once your password is stolen, it will be tried on a very long list of other websites. If you reuse the same password on many websites, you now have thieves accessing a whole bunch of your accounts all at once. This is an entirely avoidable scenario, so please don&#8217;t let it happen to you.</p>
<p>Alternatively, many people resort to short, easy to remember passwords (e.g., Boglehead123 for their Vanguard account or MagellanLynch1 for their Fidelity account). The problem is that easily remembered passwords are often easily guessed passwords.</p>
<p>The reality that you have to accept at this point is that <em>you aren&#8217;t supposed to be able to remember all of your passwords</em>. If you&#8217;re still trying to remember them all in your brain, you are almost certainly making major security compromises in order to make that happen.</p>
<p>A password manager allows you to create strong (lengthy and randomly-generated) passwords for each account, which are unique to each account, and it remembers them for you.</p>
<p>Another benefit with respect to confidentiality: a password manager will usually not offer to fill your password if the domain doesn&#8217;t match exactly. For instance, if you have a saved username/password for Schwab.com, and someday you accidentally find yourself on a different domain, which is designed to look exactly like Schwab&#8217;s website (and thus collect and maliciously reuse your credentials after you enter them), your password manager should not offer to fill your password (because it doesn&#8217;t see a saved password associated with the domain you&#8217;re currently on).</p>
<h3>Integrity and Availability</h3>
<p>Some people&#8217;s approach to password security is to record all of their passwords in a physical notebook, which is kept in their home. Assuming that the notebook is kept secure, that can do a reasonable job with respect to confidentiality. But that approach often falls short with respect to data <em>integrity</em>. At some point, ink becomes smeared. Or passwords get crossed out with new ones scrunched into the spare space nearby. Legibility declines and we can no longer read the password in question. Or something physically happens to the notebook itself: there&#8217;s a fire or natural disaster, or more likely, a beverage is spilled directly onto the notebook.</p>
<p>I&#8217;ve also seen that approach fail with respect to availability: whoops, we forgot to bring the notebook with us on vacation. Or your spouse just can&#8217;t read your handwriting.</p>
<p>Similarly, I&#8217;ve seen people take a post-it note approach to password management (i.e., just sticking post-its on or near their computer with various important passwords). While that approach has confidentiality problems if anybody else ends up near your computer, that approach also can easily fail the availability test if a post-it falls off and gets thrown away.</p>
<p>With a password manager, your passwords will be synced across your devices. As long as you can sign into your password manager, you will have access to your passwords. And no need to worry about your or your spouse&#8217;s handwriting.</p>
<h3>Password Sharing</h3>
<p>Password managers also allow for secure sharing between multiple people (e.g., two spouses on a shared family plan), which has benefits for confidentiality, integrity, and availability.</p>
<ul>
<li>Confidentiality: sharing passwords via a password manager is much more secure than sharing them with each other by text, for example.</li>
<li>Integrity: if one of you updates the password, it will be automatically updated for the other.</li>
<li>Availability: you can be in different physical locations, while both still having access to your shared passwords.</li>
</ul>
<h3>Which Password Manager?</h3>
<p>I&#8217;m not going to officially recommend one password manager as opposed to another. Most all-Mac households seem to be happy with Apple&#8217;s built-in password manager (known as Apple Passwords on newer devices). 1Password or Bitwarden are also popular and well respected.</p>
<p>LastPass was also very popular, but due to a <a href="https://en.wikipedia.org/wiki/LastPass_2022_data_breach">major breach in 2022</a>, many of the top experts in the field recommend using a different provider. (And if you were using LastPass at the time, you should change every password that was stored in your vault. And if you are still using LastPass even after that breach, you should absolutely change your master password as well.)</p>
<p>As far as the password managers built into Chrome and Edge, opinions vary. Many people consider them to be somewhat of a tradeoff, providing convenience but less security (and fewer features) than a dedicated password manager. Other people argue that the latest versions are meaningfully improved and now essentially as secure as 1Password or Bitwarden.</p>
<p>If you go looking for comparisons of one password manager to another, I&#8217;ll just make two observations:</p>
<ul>
<li>Many of the articles you&#8217;ll find are actually sales pitches in disguise. Many password managers offer &#8220;affiliate programs,&#8221; whereby they pay a commission to a referring party for each new customer that signs up. If somebody can publish an article that ranks well in search results for &#8220;best password manager&#8221; or &#8220;password manager comparison&#8221; &#8212; and then the article gets many people to sign up for one of the providers that pays a commission, that can be a substantial revenue stream.</li>
<li>Among cybersecurity enthusiasts, &#8220;should I use Bitwarden or 1Password&#8221; is akin to &#8220;should I tilt to small-cap value&#8221; for Bogleheads. They can talk about it forever, and there are ardent supporters on either side. There are real pros and cons of each. But the key thing to recognize is that either is a heck of a lot better than what many people are doing with their passwords.</li>
</ul>
<h3>Staying Secure with a Password Manager</h3>
<p>I want to be clear that simply <em>using</em> a password manager doesn&#8217;t in itself make you much safer. Password managers make it convenient to use strong passwords, but if you have existing weak passwords and/or passwords that are reused at a bunch of different places, you have to take the step of <em>updating</em> those passwords to new passwords that are stronger and unique. (The password manager should have a password generator to easily create strong passwords for you.)</p>
<p>It&#8217;s also <em>extremely</em> important to recognize that, with a bunch of passwords stored in one place, that one place becomes absolutely mission critical. You need to keep malicious parties out of it. And you need to make sure that you will not be locked out of it.</p>
<p>That means that for your password manager, you want to:</p>
<ul>
<li>Use a very strong master password.</li>
<li>Turn on multi-factor authentication.</li>
<li>Only use strong methods of multi-factor authentication. (The safest would be a hardware security key such as a YubiKey, of which you have multiples. Hardware security keys will be a topic for another day. But as noted previously, <a href="https://obliviousinvestor.com/authenticator-apps-a-better-multi-factor-option-than-text-or-email/">an authenticator app is generally a safer option than MFA by email or SMS</a>.)</li>
</ul>
<p>When using a password manager, device security becomes even more critical than it would otherwise be. For example, if you take your laptop around with you, and you normally keep yourself signed into your password manager on that device (e.g., via a Bitwarden or 1Password browser extension), you have a <em>very big problem</em> if somebody else gets their hands on that device. For devices that leave your home (or even for devices kept at home, if other people are around on a regular basis), I recommend using a very short screen-lock time, as well as configuring the password manager to lock (thus requiring your master password to be reentered) when the screen locks or the device goes to sleep.</p>
<p>And with respect to not getting yourself locked out, it&#8217;s important to recognize that if you forget your master password, many password managers cannot recover it for you. You would be permanently locked out. That&#8217;s by design. It&#8217;s one part of what makes the system secure. But it means that you should probably have that master password written down on paper somewhere, such as a fireproof safe or in a safe deposit box.</p>
<p>Similarly, your recovery code (which serves as a backup if your normal MFA method is unavailable) should be printed on paper and kept somewhere safe.</p>
<p>If your recovery code and master password are both printed out and kept together in a safe deposit box, this would provide you (or your heirs, when the time comes) with a way to sign into your account.</p>
<h3>Password Managers and Passkeys</h3>
<p>As discussed previously, passkeys <a href="https://obliviousinvestor.com/what-the-heck-are-passkeys/">are generally an improvement over traditional passwords</a>, for a variety of reasons (e.g., they&#8217;re more resistant to phishing). And your passkeys will generally be stored in a password manager, to be synced across your devices.</p>
<p>As I noted in previous articles though, it&#8217;s hard to explain exactly how that works in practice, because it will vary depending on what combination of technology you&#8217;re using (i.e., which operating system(s), which browser(s), which password manager(s), and whether or not you&#8217;re using hardware security keys such as YubiKey). There are too many possible combinations to give a complete set of answers for everybody.</p>
<ul>
<li>Apple Passwords can store passkeys on all Apple devices &#8212; and sync them across Apple devices.</li>
<li>Google Password Manager can store passkeys on any device browsing with Chrome (and sync across all such devices).</li>
<li>Edge Password Manager can store/sync passkeys on any devices browsing with Edge.</li>
<li>Third party password managers (e.g., Bitwarden or 1Password) can store passkeys and sync them across devices on which the software is installed (or accessible via an installed browser plugin).</li>
</ul>
<p>Imagine for instance that you have two devices: a Windows desktop on which you browse exclusively with Chrome and an iPhone on which you browse exclusively with Safari. And you don&#8217;t use a third-party password manager. In that case, it would be Google Password Manager storing the passkeys on your desktop and Apple Passwords storing them on your iPhone. And they would not &#8220;see&#8221; each other&#8217;s passkeys. (But even that is okay, because you can just set up multiple passkeys for each website.)</p>
<p>Conversely, if in the above situation you browsed with Chrome on <i>both</i> devices, then Google Password Manager would be syncing the passkeys across the two devices.</p>
<p>Or let&#8217;s say you have a desktop Mac and an iPhone. And you use Chrome on both. Then either Apple Passwords <i>or</i> Google Password Manager could be used to store and sync your passkeys. Google Password Manager seems to try to make itself the default when browsing with Chrome, but you can adjust your settings to turn that off (and thus use Apple Passwords) if desired.</p>
<p>And in any of the above cases, if you have a third party password manager (e.g., Bitwarden or 1Password) that you use on all devices, that password manager could instead be used to store/sync passkeys.</p>
<p>But the key things to know are that:</p>
<ol>
<li>It&#8217;s okay if you have some passkeys stored in one place and others stored in another place (as in the first example), because you can have multiple passkeys for each website.</li>
<li>Anywhere you are storing passkeys and/or passwords should be kept as secure as possible (i.e., using a strong password that is not used elsewhere and using strong multi-factor authentication).</li>
</ol>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investing Blog Roundup: Getting Used to Passkeys</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-getting-used-to-passkeys/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 12:00:44 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9018</guid>

					<description><![CDATA[Last week&#8217;s article about passkeys generated a ton of questions, about how they work behind the scenes, how to use them, why they&#8217;re generally safer than passwords, and more. As far as how they work behind the scenes (the public key/private key topic), that&#8217;s not something that you need to understand deeply (or at all, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Last week&#8217;s <a href="https://obliviousinvestor.com/what-the-heck-are-passkeys/">article about passkeys</a> generated a ton of questions, about how they work behind the scenes, how to use them, why they&#8217;re generally safer than passwords, and more.</p>
<p>As far as how they work behind the scenes (the public key/private key topic), that&#8217;s not something that you need to understand deeply (or at all, really) in order to use them and in order for them to improve your security. I simply included it because I know that many of the people who read this blog are the type who <em>do</em> want to understand the mechanics of how things work.</p>
<p>As far as what it&#8217;s like (from a user interface perspective) to actually <em>use</em> passkeys, it&#8217;s hard to explain universally what the process looks like, because it varies somewhat by website. (For example, when signing into Amazon with a passkey, they still send a 6-digit code by text, whereas most websites will not do so.) And it varies significantly based on what devices/browsers you&#8217;re using, as well as based on whether you&#8217;re using a separate password manager. For example:</p>
<ul>
<li>If you&#8217;re an Apple-only household, you browse only with Safari, and you use Apple Passwords to store your passwords, the whole thing will feel pretty seamless, with Apple Passwords storing your passkeys as well.</li>
<li>If you&#8217;re on macOS, browsing with Chrome, and you use Bitwarden password manager, then Apple Passwords, Google Password Manager, and Bitwarden will each want to be the thing that stores your passkeys.</li>
</ul>
<p>I would encourage you, next time you encounter a website that a) offers the option to use a passkey and b) is a low-stakes website for you so that it does not feel scary, create a passkey and then use that passkey to sign in going forward. Get used to using a passkey on one single website before trying to implement them more broadly.</p>
<p>For me personally, that would be something like target.com or walmart.com. Both of those websites have my name, email, shipping address, and my (not very lengthy nor particularly privacy-sensitive) order history. But neither has stored payment information, neither has my SSN, neither is linked to any financial accounts, etc.</p>
<h3>Other Recommended Reading</h3>
<ul>
<li><a href="https://www.advisorperspectives.com/articles/2026/03/16/fallacy-investing-based-forecasts">The Fallacy of Investing Based on Forecasts</a> from Allan Roth</li>
<li><a href="https://awealthofcommonsense.com/2026/03/an-asset-liability-mismatch/">An Asset-Liability Mismatch</a> from Ben Carlson</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/03/23/dimensional-vanguards-tax-busting-model-mutual-fund">Dimensional Grafts Vanguard’s Tax-Busting Model Onto Mutual Fund</a> from Katie Greifeld</li>
<li><a href="https://awealthofcommonsense.com/2026/03/whats-middle-class-in-new-york-city/">What&#8217;s Middle Class in NYC?</a> from Ben Carlson</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/03/27/private-credits-angry-investors-showing-limits">Private Credit’s Angry Investors Are Showing Its Limits</a> from Paul Davies</li>
<li><a href="https://www.morningstar.com/retirement/best-strategies-consistent-retirement-spending">The Best Strategies for Consistent Retirement Spending</a> from Amy Arnott</li>
<li><a href="https://www.aisi.gov.uk/blog/how-do-frontier-ai-agents-perform-in-multi-step-cyber-attack-scenarios">How do frontier AI agents perform in multi-step cyber-attack scenarios?</a></li>
<li><a href="https://www.nytimes.com/2026/02/28/health/scams-elderly-banks.html?unlocked_article_code=1.W1A.x9Kp.gRd7vux8YgQH&amp;smid=url-share">Banks Are (Trying to Become) Bulwarks for Vulnerable Seniors</a> from Paula Span (NYT)</li>
<li><a href="https://acsm.org/resistance-training-guidelines-update-2026/">The Biggest Benefits Come from Consistency, Not Complicated Programs</a> from the American College of Sports Medicine&#8217;s Updated Guidelines for Resistance Training</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What the Heck are Passkeys? And Should I Be Using Them?</title>
		<link>https://obliviousinvestor.com/what-the-heck-are-passkeys/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 12:00:05 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9005</guid>

					<description><![CDATA[Passkeys are a brilliant idea &#8212; a rare win, in that they are more secure than signing in with a password and (generally) easier to use as well. A very short summary is that when signing in with a passkey, the authentication happens on your own device. So if I&#8217;m signing in via passkey, my [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Passkeys are a <i>brilliant</i> idea &#8212; a rare win, in that they are more secure than signing in with a password and (generally) easier to use as well.</p>
<p>A very short summary is that when signing in with a passkey, the authentication happens on your own device. So if I&#8217;m signing in via passkey, my device essentially asks, &#8220;hey user, prove to me that you&#8217;re the person who is allowed to unlock this device.&#8221; Once I do that (e.g., by PIN or fingerprint), the message the device sends to the other institution is basically, &#8220;this device has verified the user, and they have access to the passkey for this account.&#8221; So it has benefits such as:</p>
<ul>
<li>No reusable secret information is being transmitted.</li>
<li>The institution doesn&#8217;t have to store any secret information (i.e., password).</li>
<li>It has the potential to eliminate the risk of somebody guessing/stealing your password, because somebody would have to be in possession of your device <i>and</i> be able to convince the device that they&#8217;re you.</li>
<li>It&#8217;s resistant to MFA-code phishing (such as in the <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">John/Rachel example</a>), because there&#8217;s no code to share in the first place.</li>
<li>It&#8217;s also resistant to fake-website phishing attempts (e.g., somebody buying Va<b>m</b>guard.com and putting a site up that looks exactly like Vanguard, with a login page to collect login credentials), because passkeys are tied to a specific domain, so they won’t work on look-alike sites like Vamguard.com.</li>
<li>It&#8217;s (usually) easier to sign in with a passkey than with a password, and passkeys eliminate the hassle of resetting passwords due to forgetting.</li>
</ul>
<h3>How Do Passkeys Work?</h3>
<p>When trying to understand how passkeys work, it&#8217;s helpful to keep in mind the goal. The goal is to have a system in which a user can sign into a website or app without having to transmit any secret information. All of the secret stuff lives on the user&#8217;s own device. And everything that gets transmitted, and any login-related info that&#8217;s stored on the website&#8217;s server is safe if anybody else sees it.</p>
<p>But how can you log into a website without sending them your password or some other secret information? That is, if you don&#8217;t have to transmit any secret information to the website (i.e., if only &#8220;public&#8221; information is necessary), how can the website make sure that nobody else can sign into your account? To create a system that works in such a way requires fundamentally rethinking the entire process.</p>
<p>And that&#8217;s what passkeys do. They solve those problems.</p>
<p>And broadly, the idea is that the &#8220;proving you&#8217;re who you say you are&#8221; process happens locally, on your own device.</p>
<p>We&#8217;ll go through it step-by-step (i.e., what happens when you create a passkey, and then what happens when you use that passkey to log in).</p>
<p>But first we have to start with one piece of jargon.</p>
<h3>What is a &#8220;Challenge?&#8221;</h3>
<p>In order to understand passkeys, you have to understand what a &#8220;challenge&#8221; is.</p>
<p>You can think of a challenge as a formalized &#8220;who are you, and please prove it&#8221; request.</p>
<p>An &#8220;unsigned challenge&#8221; is what the server sends to you. For example, if you&#8217;re on your bank&#8217;s website and you click &#8220;log in with a passkey&#8221; or if you&#8217;re already signed in and you click a link to create a new passkey, your bank will send an unsigned challenge to your browser.</p>
<p>And what your device will eventually send back to the server is a &#8220;signed challenge&#8221; (along with some other information). We&#8217;ll get to how a challenge is satisfied (&#8220;signed&#8221;) in a moment.</p>
<p>For now, one thing to know about a challenge is that each one has a unique identifier (e.g., challenge #203SNA30DNDQ), and each challenge is one-time-use-only. This is a critical security feature. It means that if somebody managed to spy on your transmission (and were thus able to view the signed challenge that you send to the server in order to log in), they would not be able to simply copy that signed challenge and send it to the server themselves in order to log into your account. The server would say, &#8220;sorry, this challenge has already been used,&#8221; and the fraudulent login attempt would be rejected.</p>
<h3>Magic Pen and Magic Magnifying Glass</h3>
<p>With &#8220;challenge&#8221; defined, let&#8217;s take a brief detour for an analogy, to explain the other major parts of the passkey ecosystem.</p>
<p>Imagine you have a magic pen. It writes in normal-looking ink. But you also have a magic magnifying glass. When this magic magnifying glass is used to examine something that was written with your magic pen, the ink glows sparkly purple. When it looks at anything written with any other ink (i.e., not written by your magic pen) the ink just looks normal.</p>
<p>There&#8217;s no way to &#8220;reverse engineer&#8221; the magic pen from the magic magnifying glass. In other words, if somebody were to have the magnifying glass, there&#8217;s no risk that they could create a copy of your magic pen.</p>
<p>So you give magic magnifying glasses to all of your friends. That way, any of them can see whether a message was <em>really</em> written by you, with your magic pen. Fun! And you can give out as many of these magnifying glasses as you want, because again, nobody can recreate your magic pen just by having one of these magnifying glasses.</p>
<h3>What Happens When You Create a Passkey</h3>
<p>When you&#8217;re signed into a website or app, and you choose to create a new passkey, the server will send your device a new unsigned challenge.</p>
<p>Your device takes that unsigned challenge and creates three new things:</p>
<ol>
<li>A private key.</li>
<li>A corresponding public key.</li>
<li>A credential ID. This is just a public identifier for the passkey (e.g., your new passkey is passkey #22093948310930).</li>
</ol>
<p>The private key is the secret thing. The private key lives on your device (or is synced securely across your devices via your Apple/Google/Microsoft account) and is never sent to the server. The private key is your magic pen, and it can be used to <em>sign a challenge</em>.</p>
<p>The public key is unique and linked to the private key. The public key is the magic magnifying glass. It&#8217;s essentially a <em>testing tool</em>. When somebody has the public key, they can use it to <em>test</em> the signed challenge to see if it was signed with the private key (magic pen) that corresponds to that public key (magic magnifying glass).</p>
<p>An important point here is that there is no way for somebody to look at a given public key and determine the corresponding private key. So it&#8217;s absolutely no problem if somebody were to intercept your public key. Just like with the magnifying glass, you could give out your public key to as many parties as you want, with no security risk.</p>
<p>After your device creates these three things (private key, public key, credential ID), it uses the newly-formed private key (magic pen) to sign the challenge. And it sends the public key, the credential ID, and the signed challenge back to the server. It does <em>not</em> send the private key to the server.</p>
<p>The server then stores the public key and credential ID and associates them with your specific user. (Remember, you&#8217;re already logged in before beginning the process of creating a passkey, so it already knows who you are.)</p>
<p>So at this point:</p>
<ul>
<li>You have a private key (magic pen) stored on your device.</li>
<li>And the server has a public key (magic magnifying glass) and a credential ID, both of which are now associated with your user.</li>
</ul>
<h3>What Happens When You Log in with a Passkey</h3>
<p>When you initiate the process to log in with a passkey, your device first checks: &#8220;Do I have a passkey saved for this app/website?&#8221;</p>
<p>This step is itself a valuable security measure. It means that if you ever accidentally visit a fake website (e.g., you fell for the first part of a phishing attempt, clicked the link in the email, and are now on usbamk.com rather than usbank.com), your device will immediately stop the process. It doesn&#8217;t have a passkey associated with this domain. Disaster averted. (Though seriously, <a href="https://obliviousinvestor.com/it-can-be-easier-to-fall-victim-to-fraud-on-mobile-than-desktop/">please don&#8217;t click that link in the first place</a>.)</p>
<p>If your device sees that it does have a passkey for the website/app in question, the website/app sends an unsigned challenge to your device.</p>
<p>Your device then goes through some process to satisfy itself that you are you. This might be entering your device PIN or providing some biometric identifier (e.g., fingerprint).</p>
<p>Once your device is satisfied that you are you, it uses the stored private key to sign the challenge.</p>
<p>And your device then sends the signed challenge, the credential ID, and your username to the server. Again, it <em>does not send the private key</em>. (Also note: your PIN/fingerprint is never transmitted to the server either.)</p>
<p>The server then:</p>
<ol>
<li>Checks that the username provided exists in the system,</li>
<li>Checks that the credential ID a) exists in the system and b) is linked to the username in question, and</li>
<li>Uses the stored public key (magnifying glass) that&#8217;s associated with the credential ID in question to test the signed challenge, to make sure that it was signed by the appropriate private key (magic pen).</li>
</ol>
<p>If all three of those things proceed happily, you&#8217;re signed in.</p>
<h3>Passkey Limitations</h3>
<p>An important issue to be aware of is that, at least as of right now, when websites let you use passkeys, they usually let you sign in using the passkey <i>or</i> a password. So the weak password/stolen password path of attack still works. Ideally we&#8217;d see websites that let you implement passkeys and then make it impossible to sign in with a traditional password. But so far, that sounds scary to many users because passkeys are unfamiliar. Hopefully that changes over the coming years as more and more people use them.</p>
<p>In addition, there&#8217;s messiness where everybody wants you to use <i>their</i> passkey ecosystem. So if you&#8217;re browsing on Chrome on an iPhone, and you visit a website for which you already have a passkey set up (via Apple), Chrome might prompt you to create a new one &#8212; which can feel very confusing. Fortunately, you can usually create a bunch of passkeys for the same website, so you can have one for each device/browser combination, for each website.</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investing Blog Roundup: Smoothed RMD Spending Strategy</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-smoothed-rmd-spending-strategy/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 12:00:32 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9012</guid>

					<description><![CDATA[The strategies for determining how much to spend from a retirement portfolio each year exist along a spectrum: At one of the spectrum are strategies that spend a certain dollar amount (or more often, a certain dollar amount, which is then adjusted for inflation each year). The classic &#8220;4% rule&#8221; strategy is in this category. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The strategies for determining how much to spend from a retirement portfolio each year <a href="https://obliviousinvestor.com/there-is-no-perfect-retirement-spending-strategy/">exist along a spectrum</a>:</p>
<ol>
<li>At one of the spectrum are strategies that spend a certain <em>dollar amount</em> (or more often, a certain dollar amount, which is then adjusted for inflation each year). The classic &#8220;4% rule&#8221; strategy is in this category. Strategies like this provide for predictable spending but allow for potential portfolio depletion if investment returns are poor (especially in the early part of retirement).</li>
<li>At the other end of the spectrum are strategies that spend a <em>percentage of the portfolio</em> each year. Strategies in this category are safer in the sense that they cut spending when portfolio performance is poor and thus reduce/eliminate the possibility of depleting the portfolio. But they can result in dramatic volatility in spending from year to year.</li>
</ol>
<p>And so there are also hybrid strategies. In an article for Kitces, Michael Woloch recently discussed a &#8220;modified RMD&#8221; spending strategy. Basing spending on RMDs is a percentage-of-portfolio strategy (though itself a specific subcategory, because the percentage increases each year with age). But here the &#8220;modification&#8221; is that rather than basing spending on a percentage of the portfolio balance on the final day of the previous year, it&#8217;s based on the <em>average</em> portfolio balance of the final days of the last three years, with the result being that spending is less volatile from one year to another.</p>
<ul>
<li><a href="https://www.kitces.com/blog/modified-required-minimum-distributions-rmd-swr-safe-withdrawal-rate-method-portfolio-retirement-income-paycheck-irs/">Reducing Retirement Income Volatility With The Modified RMD Safe Withdrawal Method</a> from Michael Woloch</li>
</ul>
<h3>Other Recommended Reading</h3>
<ul>
<li><a href="https://awealthofcommonsense.com/2026/03/10-rules-for-dealing-with-uncertainty/">10 Rules for Dealing with Uncertainty</a> from Ben Carlson</li>
<li><a href="https://awealthofcommonsense.com/2026/03/preparing-without-predicting/">Preparing without Predicting</a> from Ben Carlson</li>
<li><a href="https://www.theguardian.com/technology/ng-interactive/2026/mar/12/lab-test-mounting-concern-over-rogue-ai-agents-artificial-intelligence">‘Exploit Every Vulnerability’: Rogue AI Agents Published Passwords and Overrode Anti-virus Software</a> from Robert Booth</li>
<li><a href="https://www.mynbc5.com/article/cswd-phishing-3-million-scam/70716105">Municipal Water District Loses $3 Million to Phishing Scam</a> from Jack Thurston</li>
<li><a href="https://crr.bc.edu/older-workers-embrace-job-hopping-and-its-good-for-their-retirement-prospects/">Older Workers Embrace Job Hopping – and It’s Good for Their Retirement Prospects</a> from Geoffrey Sanzenbacher</li>
<li><a href="https://crr.bc.edu/the-government-is-trying-to-rein-in-medicare-advantage-costs-will-it-work/">The Government Is Trying to Rein in Medicare Advantage Costs. Will It Work?</a> from Alicia Munnell</li>
<li><a href="https://www.journalofaccountancy.com/news/2026/mar/irs-proposes-regulations-for-trump-accounts-pilot-program/">IRS Proposes Regulations for Trump Accounts, Pilot Program</a> from Martha Waggoner</li>
<li><a href="https://ofdollarsanddata.com/signal-collapse-and-the-new-proof-of-work/">Signal Collapse and the New Proof of Work</a> from Nick Maggiulli</li>
<li><a href="https://www.nytimes.com/2026/03/13/business/financial-fraud-money-scams-elderly-recovery.html?unlocked_article_code=1.TVA.QjpR.qANWDaBg_ff0&amp;smid=url-share">His Father Lost His Life Savings in a Scam. A Fake Lawyer Offered to Help.</a> from Tara Siegel Bernard (NYT)</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Authenticator Apps: a Better Multi-Factor Option than Text or Email</title>
		<link>https://obliviousinvestor.com/authenticator-apps-a-better-multi-factor-option-than-text-or-email/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 13:00:37 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9006</guid>

					<description><![CDATA[When a website requires somebody to set up multi-factor authentication (MFA), it often provides multiple options such as: Email SMS (text) Authenticator app Of the three, using an authenticator app is definitely the most secure approach. (Hardware authenticators such as a Yubikey will be a topic for another day.) The Problem with Email as MFA [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>When a website requires somebody to set up multi-factor authentication (MFA), it often provides multiple options such as:</p>
<ul>
<li>Email</li>
<li>SMS (text)</li>
<li>Authenticator app</li>
</ul>
<p>Of the three, using an authenticator app is definitely the most secure approach. (Hardware authenticators such as a Yubikey will be a topic for another day.)</p>
<h3>The Problem with Email as MFA</h3>
<p>Email as the multi-factor authentication method is pretty bad. Just think of how many websites you visit where:</p>
<ol>
<li>Your username is your email address, and</li>
<li>When you click the &#8220;forgot password&#8221; link, they just send an email with a reset password link.</li>
</ol>
<p>If #1 and #2 are true and you use your email as the multi-factor method, if a thief gets into your email account, they can now access any of those other accounts as well.</p>
<p>Granted, a thief getting access to your email account is <em>extremely bad news</em> as it is. We want to take serious precautions to avoid that scenario. But there&#8217;s no reason to make that scenario any more disastrous than it needs to be.</p>
<h3>SMS (Text) Isn&#8217;t Secure</h3>
<p>Using SMS (text) as the multi-factor method is not ideal either.</p>
<p>CISA (the Cybersecurity and Infrastructure Security Agency, which is a component of the United States Department of Homeland Security) <a href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf">put out a document in December 2024</a> that encouraged people to &#8220;migrate away from SMS-based MFA.&#8221; They note that &#8220;SMS messages are not encrypted &#8212; a threat actor with access to a telecommunication provider&#8217;s network who intercepts these messages can read them.&#8221; They also note that SMS is not phishing-resistant (see <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">the John/Rachel example</a>).</p>
<h3>SIM-Swap Fraud</h3>
<p>Another problem with SMS at the multi-factor authentication method: SIM-swap fraud.</p>
<p>Mobile providers can easily &#8220;port&#8221; a phone number from one device to another. This is commonly done when a customer switches to a new phone (e.g., to upgrade or because the previous device was lost).</p>
<p>In a SIM-swap fraud:</p>
<ul>
<li>The thief gathers personal information about the target. As we&#8217;ve discussed, <em>a lot</em> of information is simply purchasable. Other assorted information can often be gathered via social media or online searches (e.g., mother&#8217;s maiden name may be findable via an obituary posting).</li>
<li>The thief then contacts the target&#8217;s mobile provider and, with clever conversational skills and a bunch of personal (<em>ostensibly</em> private) information, convinces the company to transfer the target&#8217;s phone number to the thief&#8217;s device.</li>
</ul>
<p>And now the thief has access to any MFA codes that come in via text. And again, <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">as discussed recently</a>, in many cases <strong>that code is all they need</strong>, in order to access various critical accounts.</p>
<p>Your mobile provider probably offers a SIM-swap protection feature. <a href="https://www.verizon.com/about/account-security/sim-swapping">Verizon</a>, <a href="https://www.t-mobile.com/support/plans-features/help-with-t-mobile-account-fraud">T-Mobile</a>, and <a href="https://about.att.com/story/2025/wireless-account-lock.html">AT&amp;T</a> all provide it free of charge, but it isn&#8217;t activated by default. I would definitely encourage you to turn it on.</p>
<p>Even with SIM-swap protection activated via your mobile provider though, SMS is still not the ideal method for multi-factor authentication, because SMS is not encrypted.</p>
<h3>Authenticator Apps</h3>
<p>Authenticator apps are more secure than SMS or email as the multi-factor method. The authenticator app is installed on your phone and cannot be accessed remotely (short of your phone itself being infected with malware). To get an MFA code from an authenticator app on your phone, the thief would have to:</p>
<ul>
<li>Be in physical possession of your unlocked phone, or</li>
<li>Convince you to give them the code (which is also a potential failure point of email or text-based MFA). And again this is why we have to be super careful with these codes.</li>
</ul>
<p>Authenticator apps take a bit of time to get used to, but once you&#8217;re used to using one, it&#8217;s quite easy. I have found Google Authenticator to be easy to use, but there are many other options as well (e.g., Microsoft Authenticator or Authy).</p>
<p>If you&#8217;re new to it, do not worry, regardless of which authenticator app you pick, there will be a ton of intro/walk-through videos on YouTube.</p>
<p>When setting up app-based multi-factor authentication, the website may give you the option to store some backup codes. These codes are to be used in case you lose your phone, so do store them somewhere. But of course make sure it&#8217;s somewhere safe (e.g., printing them out and storing in a safe or secure filing cabinet).</p>
<h3>Removing Less-Secure MFA Methods</h3>
<p>After activating multi-factor authentication by app, you may have to manually <em>turn off</em> multi-factor authentication via SMS/email. For many websites, the default behavior is that, if you already had some other method of MFA set up, after setting up MFA via authenticator app, that previous method will still remain as an option. And we usually don&#8217;t want that, because it leaves you vulnerable to exactly the types of attacks discussed above.</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Investing Blog Roundup: Phishing Software as a Service</title>
		<link>https://obliviousinvestor.com/investing-blog-roundup-phishing-software-as-a-service/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 13:00:13 +0000</pubDate>
				<category><![CDATA[Roundup]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9007</guid>

					<description><![CDATA[Continuing with our theme of cybersecurity, I read an article this week about a new software product for fraudsters. With this software, the user (a would-be thief) types in a URL of a genuine website, and when a target visits a selected scam URL, the software loads up an invisible browser window to collect, in [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Continuing with our theme of cybersecurity, I read an article this week about a new software product for fraudsters.</p>
<p>With this software, the user (a would-be thief) types in a URL of a genuine website, and when a target visits a selected scam URL, the software loads up an invisible browser window to collect, in real-time, all of the genuine website&#8217;s information, which it then passes through to the victim&#8217;s browser window. In other words, from the victim&#8217;s perspective, everything looks exactly right, because it is literally the same thing showing in your browser.</p>
<p>But it gets crazier from there. Much crazier. The software also passes every keystroke and action from the victim back to the original website &#8212; including the MFA code. So from the victim&#8217;s perspective, everything is operating as normal, including all of the functionality after logging in, so as not to set off any mental alarms. But the software is collecting all of that information for the thief. And the thief is now logged in as well.</p>
<p>The software also has a full collection of other features, such as URL masking (i.e., making a fake link look genuine).</p>
<p>And it comes with customer support, regular software updates, and a community forum for users.</p>
<p>The takeaway, again: unless <em>you yourself directly typed the appropriate URL into your browser</em> (e.g., vanguard.com, schwab.com, chase.com, etc.), you might not be on the genuine website.</p>
<ul>
<li><a href="https://abnormal.ai/blog/starkiller-phishing-kit">Phishing Software as a Service (Complete with Customer Support)</a> from Callie Baron and Piotr Wojtyla</li>
</ul>
<h3>Other Recommended Reading</h3>
<ul>
<li><a href="https://www.morningstar.com/retirement/retirees-should-you-take-rmds-early-year-or-wait">Retirees: Should You Take RMDs Early in the Year or Wait?</a> from Christine Benz</li>
<li><a href="https://www.morningstar.com/funds/better-conditions-did-not-yield-better-results-active-managers-2025">Better Conditions Did Not Yield Better Results for Active Managers in 2025</a> from Bryan Armou</li>
<li><a href="https://awealthofcommonsense.com/2026/02/some-things-that-didnt-happen/">Some Things That Didn&#8217;t Happen</a> from Ben Carlson</li>
<li><a href="https://awealthofcommonsense.com/2026/02/can-you-live-off-your-dividends/">Can You Live Off Your Dividends?</a> from Ben Carlson</li>
<li><a href="https://www.advisorperspectives.com/articles/2026/02/24/fear-frugality-harm-financial-wellbeing">Fear-Based Frugality Can Harm Your Financial Wellbeing</a> from Rick Kahler</li>
<li><a href="https://thecollegefinanciallady.com/2026/01/13/the-truth-about-529s-and-financial-aid/">The Truth About 529s and Financial Aid</a> from Ann Garcia</li>
<li><a href="https://www.npr.org/2026/02/18/nx-s1-5716010/brain-training-exercise-cut-dementia-risk-decades">This Form of Mental Exercise May Cut Dementia Risk for Decades</a> from Jon Hamilton</li>
<li><a href="https://www.businessinsider.com/meta-ai-alignment-director-openclaw-email-deletion-2026-2">Meta AI Alignment Director Shares her OpenClaw Email-Deletion Nightmare</a> from Hendry Chandonnet</li>
<li><a href="https://www.nytimes.com/2026/02/23/opinion/chatbots-open-claw.html?unlocked_article_code=1.OlA.jrGE.tebJbbfoboSQ&amp;smid=url-share">The Rise of Bratty Machines</a> from Elizabeth Spiers (NYT)</li>
</ul>
<p>Thanks for reading!</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>It Can Be Easier to Fall Victim to Fraud on Mobile than Desktop</title>
		<link>https://obliviousinvestor.com/it-can-be-easier-to-fall-victim-to-fraud-on-mobile-than-desktop/</link>
		
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 13:00:55 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Fraud]]></category>
		<guid isPermaLink="false">https://obliviousinvestor.com/?p=9008</guid>

					<description><![CDATA[This article is the second in a series about cybersecurity/fraud prevention. (You can find the first article here: What Does a Thief Need to Access Your Financial Accounts? It’s Likely Less Than You Think.) I recently received a very clever phishing attempt by email. (In hindsight, I wish I had taken screenshots prior to deleting [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em>This article is the second in a series about cybersecurity/fraud prevention. (You can find the first article here: <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">What Does a Thief Need to Access Your Financial Accounts? It’s Likely Less Than You Think</a>.)</em></p>
<p>I recently received a very clever phishing attempt by email. (In hindsight, I wish I had taken screenshots prior to deleting it.)</p>
<p>Here&#8217;s what it looked like in my inbox:</p>
<ul>
<li>From: Vanguard Brokerage Services</li>
<li>Subject: Your Vanguard statement is ready</li>
</ul>
<p>Looking at the email via my desktop browser, it was very easy to see that it was a phishing attempt.</p>
<p>Looking at the email on my mobile device, however, there was no immediately obvious sign that the email was not legit. Based on everything immediately visible via my mobile mail app, it looked exactly like a genuine Vanguard email.</p>
<h3>Looking at the &#8220;From&#8221; Field</h3>
<p>When I viewed the email on desktop, the &#8220;from&#8221; field was a dead giveaway. While the &#8220;name&#8221; of the sender was &#8220;Vanguard Brokerage Services,&#8221; the email address of the sender was complete gobbledygook. Something like &#8220;senderx34x3@xyzpayments.info.&#8221; Clearly, that&#8217;s not actually Vanguard.</p>
<p>On mobile though, the sender&#8217;s email address does not appear immediately (at least not on most mobile mail apps). You just see the name. When viewing the email, there will be somewhere you can tap to display the sender&#8217;s email address. But <em>you have to go out of your way to actually do that</em>. And of course the percentage of people who do that with every single email is vanishingly small.</p>
<h3>Body of the Email</h3>
<p>The text of the email was a character-for-character copy/paste of the real statement-notification emails that Vanguard sends, complete with the appropriate images, branding, etc. Everything looked exactly as you&#8217;d expect.</p>
<p>The only thing about it that was wrong is that the links that <em>appeared</em> to point to Vanguard&#8217;s login page <em>actually</em> pointed to a scam URL. (That is, the &#8220;anchor text&#8221; of the link was the appropriate URL, but that&#8217;s not where the link actually pointed.)</p>
<p>In other words, it was something like this:</p>
<p><a href="https://obliviousinvestor.com/">https://vanguard.com/</a></p>
<p>If you look only at the text of the link itself (the &#8220;anchor text&#8221;) you&#8217;ll think the link is going to take you to Vanguard. But it doesn&#8217;t. The link points to ObliviousInvestor.com. On desktop, you can see that easily by hovering over the link. Your browser (usually in the bottom corner) will show you where the link points. (Though even this can be spoofed. So as with the email address, if it looks suspicious, it definitely should not be trusted. But if it looks normal, that <em>doesn&#8217;t</em> necessarily tell you that it&#8217;s genuine.)</p>
<p>On mobile, however, &#8220;hover over&#8221; isn&#8217;t an option. You can tap a link and hold your finger down, in order to see where the link points. But how many people actually do that for every link they consider tapping? Also, there&#8217;s the risk that you tap the link and accidentally take your finger off the screen too early &#8212; and now you&#8217;ve <em>visited</em> the scam link rather than activating the &#8220;preview&#8221; functionality.</p>
<h3>Browser Location on Mobile</h3>
<p>Of course, I did not visit the links in the spam/phishing email. But if I had, I&#8217;m confident that the destination page would <em>look</em> exactly like Vanguard&#8217;s real login page. Except, of course, it wouldn&#8217;t have actually been Vanguard. It would have been a fraudster&#8217;s website, set up to collect people&#8217;s usernames and passwords as they entered them.</p>
<p>On desktop, at the top of your browser window, you easily see the full URL of the page you&#8217;re on. That makes it at least somewhat easier to recognize whether you&#8217;re on a legitimate website or not.</p>
<p>On mobile, depending on your browser and device, you often don&#8217;t. You might see the first several characters or the last several characters. But you might, for example, have accidentally visited:</p>
<p>vanguard.com-payments-us-vanguard.com</p>
<p>If you only see the beginning or end of that URL, you might think that you&#8217;re on Vanguard&#8217;s website. But that&#8217;s not Vanguard&#8217;s website. The actual domain in that URL is &#8220;com-payments-us-vanguard.com&#8221;, which any old fraudster could have purchased. (The &#8220;vanguard&#8221; at the start of the URL is a subdomain.)</p>
<h3>What To Do</h3>
<p>There are a handful of ways to avoid falling for this sort of thing.</p>
<p>Firstly, it&#8217;s helpful to actually look at the email address of the sender, even if it&#8217;s not immediately displayed in your mobile app. But even that can be spoofed. So while a spammy email address tells you it&#8217;s spam, a legit-looking email address does <em>not</em> necessarily tell you it&#8217;s genuine.</p>
<p>Secondly, it&#8217;s helpful to generally be aware when using mobile that 1) you aren&#8217;t seeing as much information as you would via desktop and 2) sometimes the information that you&#8217;re not seeing would have been a clear red flag.</p>
<p>Thirdly, if you <em>did</em> end up falling for the email and visiting the link in question, you&#8217;d be in better shape if you use passkeys or a password manager (both topics for another day, which we&#8217;ll get to). Your passkey would not work on the fake domain. And a password manager would recognize that the domain in question was not actually Vanguard.</p>
<p>But the most effective way to avoid falling for this? It&#8217;s the same exact rule that we discussed in the <a href="https://obliviousinvestor.com/what-does-a-thief-need-to-access-your-financial-accounts-its-likely-less-than-you-think/">first article in this series</a>! (I promise I&#8217;ll move on to other topics soon. But I just want to drive home how critical and valuable this rule is.)</p>
<p>If you receive any inbound communication (whether email, text, or phone call) that purports to be from a company with which you have any sort of account:</p>
<ul>
<li>Do not reply.</li>
<li>Do not give them any information whatsoever.</li>
<li>Do not click on any links.</li>
</ul>
<p>Essentially, don&#8217;t interact with inbound communications. Instead, if you think it might be genuine and require some sort of response, reach out directly, via trusted means (i.e., either typing the company&#8217;s URL directly into your browser or calling the number on the back of your credit/debit card) and ask the company in question about it.</p>

<h3>What is the Best Age to Claim Social Security?</h3>
Read the answers to this question and several other Social Security questions in my latest book:
<table style="height: 135px;" border="0" cellspacing="0" cellpadding="0"><colgroup> <col span="2" width="75" /></colgroup>
<tbody>
<tr>
<td width="158" ><a href="http://www.amazon.com/dp/1950967190/"><img decoding="async" class="alignleft size-full wp-image-6696" title="Book8FrontCovertilted150x200" alt="" src="https://www.obliviousinvestor.com/wp-content/uploads/2014/04/NewBook8CoverTiltedScaled2.png" width="158" height="211" /></a></td>
<td width="350"><em><strong>Social Security Made Simple: Social Security Retirement Benefits and Related Planning Topics Explained in 100 Pages or Less</strong></em>
<ul>
	<li><a href="http://www.amazon.com/dp/1950967190/" target="_blank">Click here to see it on Amazon</a>.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Disclaimer:</b>Your subscription to this blog does not create a CPA-client or other professional services relationship between you and Michael Piper or between you and Simple Subjects, LLC. By subscribing, you explicitly agree not to hold Michael Piper or Simple Subjects, LLC liable in any way for damages arising from decisions you make based on the information available herein. Neither Michael Piper nor Simple Subjects, LLC makes any warranty as to the accuracy of any information contained in this communication. The information contained herein is for informational and entertainment purposes only and does not constitute financial advice. On financial matters for which assistance is needed, I strongly urge you to meet with a professional advisor who (unlike me) has a professional relationship with you and who (again, unlike me) knows the relevant details of your situation.</p>
<p>You may unsubscribe at any time by clicking the link at the bottom of this email (or by removing this RSS feed from your feed reader if you have subscribed via a feed reader).</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
