<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Alvaro Navarro</title>
    <description>The latest articles on Forem by Alvaro Navarro (@alnacle).</description>
    <link>https://forem.com/alnacle</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F33669%2F91b4c642-5ce1-4ba8-a07b-4058dde1d2a0.png</url>
      <title>Forem: Alvaro Navarro</title>
      <link>https://forem.com/alnacle</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/alnacle"/>
    <language>en</language>
    <item>
      <title>What Is a SIM Swap Attack, and How Can You Prevent It?</title>
      <dc:creator>Alvaro Navarro</dc:creator>
      <pubDate>Thu, 17 Oct 2024 15:37:30 +0000</pubDate>
      <link>https://forem.com/vonagedev/what-is-a-sim-swap-attack-and-how-can-you-prevent-it-4dj</link>
      <guid>https://forem.com/vonagedev/what-is-a-sim-swap-attack-and-how-can-you-prevent-it-4dj</guid>
      <description>&lt;p&gt;A SIM swap attack is an example of fraud in which someone tricks a mobile phone carrier into transferring or associating the victim’s telephone number with a SIM card used by the attacker. When the criminal controls the victim’s phone number, they can easily intercept SMS and voice messages. &lt;/p&gt;

&lt;p&gt;In this article, we’ll learn how SIM swap attacks can severely compromise sensitive accounts and information. Knowing the risks and taking preventative measures may help reduce their impact.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How SIM Swap Works&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The attack begins by gathering personal information about the targeted person, such as names, addresses, phone numbers, account information, and sometimes even passport or ID details. This data can be obtained through different means, such as phishing attacks, social engineering, or directly from the information the victim shares on social media. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F970rh1r5b5goa4hf5xz9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F970rh1r5b5goa4hf5xz9.png" alt="SIM Swap attack" width="800" height="333"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After obtaining the personal information, the attacker contacts the mobile network provider to convince them to transfer the victim’s number to a new SIM card.&lt;/p&gt;

&lt;p&gt;Once the network provider transfers the phone number to a new SIM card, the victim’s phone loses its services while giving attackers all necessary controls. The attackers acquire the ability to reset passwords of online accounts that depend on such phone number for account recovery or two-factor authentication.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Consequences&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If the attacker gains control over your phone number and, by extension, the accounts and services attached to that number, the consequences can be extremely severe.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Bank account access&lt;/strong&gt;. An attacker who gains access to your bank account through password resets or one-time passwords sent via SMS might wire money out of your account, make unauthorized payments on your behalf, or sometimes even apply for loans you don’t need.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Identity theft&lt;/strong&gt;. The attacker may access personal information stored in your email, social media, or other online accounts, which could be used for further identity theft or sold on the deep web. You could face legal issues if the attacker uses your identity for illegal activities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Account takeover&lt;/strong&gt;. By changing passwords, the attacker can lock you out of your email, social media, and other important accounts. The loss could be permanent if the attacker deletes data, such as emails, contacts, or social media posts, especially if you don't have backups.&lt;/li&gt;
&lt;li&gt;An attacker could &lt;strong&gt;invade your privacy&lt;/strong&gt; by reading your text messages, listening to your voicemails, and even pretending to be you in calls or messages.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Dealing with a SIM swap attack can be a real hassle and take up a lot of time. You'll need to regain access to your accounts, keep an eye out for identity theft, and possibly recover any lost money or data. The effects aren't just about the financial or privacy issues; it can also take a toll on your emotional health and personal relationships.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How to Identify a SIM Swap Attack&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Reducing the impact of this kind of attack can be obtained through &lt;strong&gt;early detection&lt;/strong&gt;. If you see any of these signs, it could mean that your phone or number was involved in a SIM swap attack:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The most common sign of a SIM swap attack is the &lt;strong&gt;loss of cellular service&lt;/strong&gt;. Your phone may no longer make calls, send texts, or access data as it used to. You might see messages like “no sim card” or “emergency calls only.”&lt;/li&gt;
&lt;li&gt;You notice &lt;strong&gt;unusual activity in your account&lt;/strong&gt;, such as changing passwords, adding new devices, or changing security settings. Another red flag could be unfamiliar transactions or withdrawals from your bank account.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Unable to access your accounts,&lt;/strong&gt; even if you use the correct credentials, could mean an attacker has already changed your password.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What to Do if You're a Victim of a SIM Swap Attack&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If you notice any of the signs described above, it's essential to act quickly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The first thing you should do is &lt;strong&gt;contact your mobile network provider immediately&lt;/strong&gt;. Inform them of the situation and ask them to restore your number to your original SIM card. If possible, ask them to secure your account with additional measures, like a PIN or password.&lt;/li&gt;
&lt;li&gt;It is very important to &lt;strong&gt;report the incident&lt;/strong&gt;. Notify your bank or credit card company, and consider reporting the incident to local law enforcement and a fraud reporting agency. This will help to avoid potential legal consequences if attackers use your identity for illegal activities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Update the passwords&lt;/strong&gt; for all important accounts, especially those linked to your phone number. Review the security settings of your accounts, remove any unfamiliar devices, and check for unauthorized changes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Monitor financial accounts&lt;/strong&gt;. Check your bank accounts and credit card statements for suspicious activity.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How to Prevent a SIM Swap Attack&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;We can take several measures to prevent a SIM swap attack:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Contact your mobile carrier to request to &lt;strong&gt;set up a unique PIN&lt;/strong&gt; or password that must be provided before any changes can be made to your account, including SIM swaps.&lt;/li&gt;
&lt;li&gt;Always &lt;strong&gt;use strong passwords&lt;/strong&gt;: Avoid using easily guessable passwords. Using a password manager is always a good idea, so you don’t have to remember passwords anymore.&lt;/li&gt;
&lt;li&gt;Enable &lt;strong&gt;two-factor authentication (2FA) methods that don't rely only on SMS&lt;/strong&gt;, such as email, authentication apps or hardware tokens.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Change your online behavior&lt;/strong&gt;. Everything you post or share on the Internet could be used to launch an attack. Avoid disclosing personal information such as birth date, address or phone number.&lt;/li&gt;
&lt;li&gt;Be &lt;strong&gt;careful with phishing scam messages or calls&lt;/strong&gt; requesting your personal information. Always verify the source before providing any details.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Secure your mobile device&lt;/strong&gt;. Unlock your phone using a PIN, password, fingerprint, or facial recognition. This helps prevent unauthorized access if your phone is lost or stolen.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These steps can significantly reduce your chances of falling victim to a SIM swap attack. While nothing is entirely foolproof, using strong authentication, keeping a close eye on your accounts, and following secure practices can make it much more challenging for attackers.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How Can Companies Protect Their Users?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If your company relies on users’ phone numbers for activities such as two-factor authentication (2FA), password resets, or login processes, you can improve security and reduce fraud using APIs like the&lt;a href="https://developer.vonage.com/en/sim-swap/overview" rel="noopener noreferrer"&gt; Vonage SIM Swap API&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The SIM Swap API helps to mitigate account takeover risks by checking if the SIM card linked with a phone number has recently changed. This is particularly useful for identifying suspicious activity before sending an SMS during the two-factor authentication (2FA) process. If a recent SIM swap is detected, you can, for example, switch to an alternative verification method, such as email.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Get in Touch&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Is your company using the phone number for any account activities? How do you ensure sending them an SMS when resetting passwords is safe? We’d love to hear your feedback! Join us on the&lt;a href="https://developer.vonage.com/en/community/slack" rel="noopener noreferrer"&gt; Vonage Community Slack&lt;/a&gt; or message us on&lt;a href="https://twitter.com/VonageDev" rel="noopener noreferrer"&gt; X&lt;/a&gt;, and we will get back to you. &lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Getting Started with SIM Swap API</title>
      <dc:creator>Alvaro Navarro</dc:creator>
      <pubDate>Fri, 09 Aug 2024 14:26:16 +0000</pubDate>
      <link>https://forem.com/vonagedev/getting-started-with-sim-swap-api-2ai4</link>
      <guid>https://forem.com/vonagedev/getting-started-with-sim-swap-api-2ai4</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;Introduction&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This blog post will help you understand the SIM Swap API and guide you through making your first API call. Please note that this API is currently in beta, so some features may change as we continue to improve it.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What is SIM Swap API?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://developer.vonage.com/en/sim-swap/overview" rel="noopener noreferrer"&gt;The SIM Swap API&lt;/a&gt; allows developers to determine if the SIM card linked to the phone number has recently changed. The API includes two endpoints to answer the following questions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Has a SIM swap occurred during the last X hours?&lt;/li&gt;
&lt;li&gt;When did the last SIM swap happen?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;SIM Swap API belongs to the new &lt;a href="https://developer.vonage.com/en/getting-started-with-sim-swap-api/what-are-network-apis" rel="noopener noreferrer"&gt;Vonage Network APIs&lt;/a&gt;, a new collection of APIs based on the CAMARA standard that exposes developers to the network capabilities of mobile carriers (e.g., Telefonica, Deutsche Telekom, or Vodafone). These mobile carriers are also known as Communication Service Providers (CSPs).&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Why SIM Swap API?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;SIM swap fraud is considered one of the biggest threats because it grants attackers control over a victim's mobile phone number. Here are some of the most common risks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identity theft. Attackers can use SIM swapping to impersonate the victim's identity as they gain control over the victim’s phone number.&lt;/li&gt;
&lt;li&gt;Account takeover. Many online accounts, including email, social media, and financial accounts, use phone numbers for two-factor authentication (2FA) or account recovery. By swapping the SIM card, attackers can intercept authentication codes sent via SMS and gain unauthorized access to the victim's accounts.&lt;/li&gt;
&lt;li&gt;Financial fraud. Once attackers access the victim's accounts, they can conduct various forms of financial fraud, such as transferring funds, making unauthorized purchases, or taking out loans in the victim's name.&lt;/li&gt;
&lt;li&gt;Privacy violation. Attackers may access personal communications, contacts, and other sensitive information stored on the victim's devices or accounts.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;One of the primary purposes of the SIM Swap API is to provide an assessment of fraud risk by identifying SIM swap events. Integrating the SIM Swap API can complement various scenarios, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Adding a risk factor/fraud score to an individual&lt;/li&gt;
&lt;li&gt;Strengthening traditional 2FA method based on recent events reported by SIM Swap API&lt;/li&gt;
&lt;li&gt;Monitoring fraudulent activity on customers' phone numbers&lt;/li&gt;
&lt;li&gt;Regulatory compliance can require checks against SIM Swap&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Prerequisites&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;To follow this tutorial and make your first API call, you’ll need the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A Vonage account. You can &lt;a href="https://developer.vonage.com/sign-up?icid=tryitfree_api-developer-adp_nexmodashbdfreetrialsignup_nav" rel="noopener noreferrer"&gt;create a new account&lt;/a&gt; if you don’t have one.&lt;/li&gt;
&lt;li&gt;To access the network APIs, you need a business and application profile approved by the CSPs. The &lt;a href="https://developer.vonage.com/en/blog/introduction-to-the-network-registry" rel="noopener noreferrer"&gt;Introduction to the Network Registry&lt;/a&gt; post will guide you through the process.&lt;/li&gt;
&lt;li&gt;We will use &lt;code&gt;cURL&lt;/code&gt; to make API calls. You can install it from &lt;a href="https://curl.se/download.html" rel="noopener noreferrer"&gt;cURL download page&lt;/a&gt; using your favorite package manager.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Create New Application&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Let’s start by creating a new application with the capabilities of the Network APIs. The Vonage application contains the credentials needed to make API calls. Once your submission is approved by at least one of its CSPs, you can link it to one or more Vonage applications to start using the Network APIs.&lt;/p&gt;

&lt;p&gt;Warning: Remember that application credentials are secret and for personal use only. Do not share them with anyone.&lt;/p&gt;

&lt;p&gt;Go to "Applications" under the "Build &amp;amp; Manage" menu and click on the "Create a new application" button. Follow these steps:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Give a name to your application.&lt;/li&gt;
&lt;li&gt;Click on "Generate public and private key," as you’ll need this during the authentication process. A new public key will appear in the text box. Your browser will automatically download the private key.&lt;/li&gt;
&lt;li&gt;Under the capabilities section, enable "Network APIs" and select the business profile and the application profile you have previously created. Since SIM Swap API does not require Redirect UI, you can leave this field blank.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd1z2xevb5zgx476kj3p5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd1z2xevb5zgx476kj3p5.png" alt="Network APIs activation" width="512" height="320"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once finished, click "Generate new application".&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Make your First API Call&lt;/strong&gt;
&lt;/h2&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Authentication&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Vonage API calls require a valid access token, a credential used to authenticate and authorize access to the APIs. To create an access token, you'll first need to authenticate yourself using a JWT, a compact and self-contained JSON token.&lt;/p&gt;

&lt;p&gt;To generate a JWT, you can use our &lt;a href="https://developer.vonage.com/en/jwt" rel="noopener noreferrer"&gt;online generator&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Copy and paste the private key that was automatically downloaded to your browser.&lt;/li&gt;
&lt;li&gt;Copy and paste the application ID, which can be found under the application you created in the previous step.&lt;/li&gt;
&lt;li&gt;Set a valid period of the JWT. For this example, we’ll establish a valid time of 1 hour.&lt;/li&gt;
&lt;li&gt;Leave ACL and the rest of the checkboxes empty.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The JWT will appear on the right side of the screen. Copy the JWT token and send a POST request with the following headers and body:&lt;br&gt;
&lt;code&gt;curl --url https://api-eu.vonage.com/oauth2/bc-authorize \&lt;br&gt;
     --header 'Authorization: Bearer '"$JWT"'' \&lt;br&gt;
     --header 'Content-Type: application/x-www-form-urlencoded' \&lt;br&gt;
     --data-urlencode 'login_hint='"$MSISDN"'' \&lt;br&gt;
     —-data-urlencode 'scope='"$SCOPE"''&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;$JWT&lt;/em&gt; is the recently created JWT.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;$MSISDN&lt;/em&gt; is the phone number you wish to check (e.g. +34677123456)&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;$SCOPE&lt;/em&gt; corresponds to the purpose for which you are calling the API. Since we want to check if a SIM card was exchanged, let’s set this to this string value: "&lt;em&gt;dpv:FraudPreventionAndDetection#check-sim-swap&lt;/em&gt;"&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If everything goes well, the authorization server will return a response similar to this:&lt;br&gt;
&lt;code&gt;{&lt;br&gt;
    "auth_req_id": "arid/baad1320-93b9-4e28-a449-123445678",&lt;br&gt;
    "expires_in": 120,&lt;br&gt;
    "interval": 2&lt;br&gt;
}&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;The response includes the expiration time (in hours) and the &lt;em&gt;auth_req_id&lt;/em&gt;, which we’ll use in the following API call to generate the access token:&lt;br&gt;
&lt;code&gt;curl --url https://api-eu.vonage.com/oauth2/token \&lt;br&gt;
  --header 'Authorization: Bearer '"$JWT_AP"'' \&lt;br&gt;
  --header 'Content-Type: application/x-www-form-urlencoded' \&lt;br&gt;
  --data-urlencode 'auth_req_id='"$AUTH_REQ_ID"'' \&lt;br&gt;
  --data-urlencode 'grant_type=urn:openid:params:grant-type:ciba'&lt;/code&gt; &lt;/p&gt;

&lt;p&gt;The OAuth2 server should return a response like this, containing the access token:&lt;br&gt;
&lt;code&gt;{&lt;br&gt;
   "access_token": "hbGciOiJSUzI1NiJ9.eyJpYXQiOjE3MTM3OTI2NzAsImV4cCI6MTc",&lt;br&gt;
   "token_type": "Bearer",&lt;br&gt;
   "expires_in": 3600,&lt;br&gt;
  }&lt;/code&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;SIM Swap API Call&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;We are ready to perform our API call to SIM Swap API with the access token. According to the &lt;a href="https://developer.vonage.com/en/api/camara/sim-swap" rel="noopener noreferrer"&gt;API reference&lt;/a&gt;, the API contains two different endpoints:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check whether a SIM card was exchanged.&lt;/li&gt;
&lt;li&gt;Retrieve the date when the last swap was performed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let’s start by checking if our SIM card was swapped. Send a POST request with the following fields in the body in JSON format:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;phoneNumber&lt;/em&gt;: this is the phone number we want to check. It should match the phone number used during the authentication step.&lt;/li&gt;
&lt;li&gt;maxAge: corresponds with the maximum number of days we want to check if the SIM was swapped.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;curl --url https://api-eu.vonage.com/camara/sim-swap/v040/check \&lt;br&gt;
  --header 'Authorization: Bearer '"$TOKEN"'' \&lt;br&gt;
  --header 'Content-Type: application/json' \&lt;br&gt;
  --data '{"phoneNumber": "'"$MSISDN"'", "maxAge": "72"}'&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;The endpoint will return a boolean indicating whether a swap was performed on the given phone number:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;{&lt;br&gt;
   "swapped": true&lt;br&gt;
}&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Given that the endpoint has returned true, let’s find out when the swap was performed. To do so, we need to retrieve a new token as the scope of this second call -retrieve- is different from the previous one -check-:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;curl --url https://api-eu.vonage.com/oauth2/bc-authorize \&lt;br&gt;
     --header 'Authorization: Bearer '"$JWT"'' \&lt;br&gt;
     --header 'Content-Type: application/x-www-form-urlencoded' \&lt;br&gt;
     --data-urlencode 'login_hint='"$MSISDN"'' \&lt;br&gt;
     —-data-urlencode 'scope='"$SCOPE"''&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Where &lt;code&gt;$SCOPE&lt;/code&gt; should be pointing to:&lt;br&gt;
&lt;code&gt;"dpv:FraudPreventionAndDetection#retrieve-sim-swap-date"&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;With the new access token, we are ready to make the API call to the &lt;em&gt;retrieve-date&lt;/em&gt; endpoint:&lt;br&gt;
&lt;code&gt;curl --url https://api-eu.vonage.com/camara/sim-swap/v040/retrieve-date \&lt;br&gt;
  --header 'Authorization: Bearer '"$TOKEN"'' \&lt;br&gt;
  --header 'Content-Type: application/json' \&lt;br&gt;
  --data '{"phoneNumber": "'"$MSISDN"'"}'&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Finally, the endpoint will return a timestamp containing the exact moment when the SIM card was swapped:&lt;br&gt;
&lt;code&gt;{"latestSimChange":"2024-02-24T01:43:31Z"}&lt;/code&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Conclusion&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;SIM Swap API allows developers to determine if the SIM card linked to the phone number has recently changed, offering an additional layer of security in environments when having an uncompromised phone number is crucial: recovering your account, confirming bank transactions, or accessing your private data.&lt;/p&gt;

&lt;p&gt;If you have further questions, contact &lt;a href="https://developer.vonage.com/en/community/slack" rel="noopener noreferrer"&gt;Vonage Community Slack&lt;/a&gt; or &lt;a href="https://www.twitter.com/VonageDev" rel="noopener noreferrer"&gt;message us on X&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Read further&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;You can also learn more about the SIM Swap API in our &lt;a href="https://developer.vonage.com/en/sim-swap/overview" rel="noopener noreferrer"&gt;Developer Documentation&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>simswap</category>
    </item>
    <item>
      <title>Introduction to the CAMARA Project</title>
      <dc:creator>Alvaro Navarro</dc:creator>
      <pubDate>Mon, 10 Jun 2024 14:16:03 +0000</pubDate>
      <link>https://forem.com/vonagedev/introduction-to-the-camara-project-31ed</link>
      <guid>https://forem.com/vonagedev/introduction-to-the-camara-project-31ed</guid>
      <description>&lt;p&gt;In our previous article &lt;a href="https://developer.vonage.com/en/blog/announcing-vonage-network-apis-available-now" rel="noopener noreferrer"&gt;Announcing Vonage Network APIs&lt;/a&gt;, we introduced the idea of the new APIs have been built following the &lt;a href="https://camaraproject.org/" rel="noopener noreferrer"&gt;CAMARA standard&lt;/a&gt;. In this article, we'll delve deeper into the CAMARA project to understand its implications and what it means for the telecom industry.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is CAMARA?
&lt;/h2&gt;

&lt;p&gt;Imagine this: the giants of telecommunications and technology, assembling like The Avengers, to establish a new standard aimed at harmonizing and exposing new network capabilities to create a seamless user experience. Say no more. Welcome to CAMARA!&lt;/p&gt;

&lt;p&gt;CAMARA is an open-source project within the Linux Foundation that hosts the API standards and develops and tests the APIs. The project collaborates closely with the GSMA Operator Platform Group to align API requirements.&lt;/p&gt;

&lt;p&gt;The name CAMARA originates from the Greek word for "arched roof," symbolizing the collaboration or alliance of multiple entities under one vision.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Does it Work?
&lt;/h2&gt;

&lt;p&gt;The members (participants, coordinators, contributors, etc.) of the CAMARA project are organized into subprojects and working groups. Although it may sound similar, there are some differences.&lt;/p&gt;

&lt;h3&gt;
  
  
  Subprojects
&lt;/h3&gt;

&lt;p&gt;A subproject is where topics related to each API are discussed, including how to document and describe the API or develop and test it. Some examples of subprojects include &lt;a href="https://github.com/camaraproject/SimSwap" rel="noopener noreferrer"&gt;SIM Swap&lt;/a&gt;, &lt;a href="https://github.com/camaraproject/DeviceStatus" rel="noopener noreferrer"&gt;Device status&lt;/a&gt;, or &lt;a href="https://github.com/camaraproject/NumberVerification" rel="noopener noreferrer"&gt;Number Verification&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Members of each subproject meet virtually from time to time and organize their work around a GitHub repository and a mailing list. All repositories contain the same structure, making it easy to find information:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The &lt;code&gt;documentation/MeetingMinutes&lt;/code&gt; folder stores all minutes from previous meetings, during which decisions about the API's behavior are made.&lt;/li&gt;
&lt;li&gt;The &lt;code&gt;code/API_definitions&lt;/code&gt; contains the OpenAPI specification of the API in YAML format.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Working groups
&lt;/h3&gt;

&lt;p&gt;The &lt;a href="https://github.com/camaraproject/WorkingGroups" rel="noopener noreferrer"&gt;working groups&lt;/a&gt; typically address common topics across all subprojects. Some examples of working groups are the &lt;a href="https://github.com/camaraproject/WorkingGroups/blob/main/APIBacklog/documentation/APIbacklog.md" rel="noopener noreferrer"&gt;API Backlog&lt;/a&gt;, which manages the lifecycle of the API proposals, the Marketing group, responsible for promoting the APIs, or the Commonalities group, where common topics relevant to all APIs are discussed (e.g. authorization, documentation, or guidelines)&lt;/p&gt;

&lt;p&gt;Just like the subprojects, members of the working groups use a &lt;a href="https://github.com/camaraproject/WorkingGroups/" rel="noopener noreferrer"&gt;GitHub repository&lt;/a&gt; and a mailing list to coordinate their activities.&lt;/p&gt;

&lt;p&gt;If you're curious about the project's structure and the roles of its participants, check out the &lt;a href="https://github.com/camaraproject/Governance/blob/main/ProjectStructureAndRoles.md" rel="noopener noreferrer"&gt;Project Structure and Roles&lt;/a&gt; documentation page.&lt;/p&gt;

&lt;h2&gt;
  
  
  API Lifecycle
&lt;/h2&gt;

&lt;p&gt;One of the most interesting activities of the project is to maintain the lifecycle of the APIs.&lt;/p&gt;

&lt;p&gt;Everything starts with the &lt;a href="https://github.com/camaraproject/Governance/blob/main/documentation/API-onboarding.md" rel="noopener noreferrer"&gt;API onboarding&lt;/a&gt;, where companies can submit a new API proposal outlining a high description of the API (what it does with some examples), along with its technical and commercial viability.&lt;/p&gt;

&lt;p&gt;The API Backlog working group will evaluate the proposal and, if they approve it, they'll endorse the proposal to be sent to the steering committee for final approval. If all goes well, the API proposal will be transformed into an actual subproject, which will begin receiving contributions and ideas using the mechanisms described above.&lt;/p&gt;

&lt;p&gt;Once the API specification is stable enough, the implementation will be deployed and tested in one or more operator networks. The deployment can be used in production environments if the tests prove successful.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;The CAMARA project sets an important milestone in the telco industry in terms of coordination and cooperation. The open structure of the project facilitates tracking and understanding some decisions taken behind each API.&lt;/p&gt;

&lt;p&gt;The resources and documentation already generated by the project members are extensive. Be sure to explore their &lt;a href="https://github.com/camaraproject" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt; repositories and &lt;a href="https://wiki.camaraproject.org/" rel="noopener noreferrer"&gt;Wiki&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Interested in seeing how the CAMARA-based APIs work in real environments? Be sure to check out the Vonage &lt;a href="https://developer.vonage.com/en/sim-swap/overview" rel="noopener noreferrer"&gt;SIM Swap&lt;/a&gt; and &lt;a href="https://developer.vonage.com/en/number-verification/overview" rel="noopener noreferrer"&gt;Number Verification&lt;/a&gt; APIs.&lt;/p&gt;

&lt;p&gt;If you have any questions or comments, please let us know in our &lt;a href="https://developer.vonage.com/en/community/slack" rel="noopener noreferrer"&gt;Community Slack Channel&lt;/a&gt; and &lt;a href="https://www.twitter.com/VonageDev" rel="noopener noreferrer"&gt;follow us on X&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>camara</category>
    </item>
    <item>
      <title>Tips for speaking to college students about DevRel</title>
      <dc:creator>Alvaro Navarro</dc:creator>
      <pubDate>Thu, 23 Jan 2020 14:17:52 +0000</pubDate>
      <link>https://forem.com/alnacle/tips-for-speaking-to-college-students-about-devrel-32g5</link>
      <guid>https://forem.com/alnacle/tips-for-speaking-to-college-students-about-devrel-32g5</guid>
      <description>&lt;p&gt;I was invited to deliver a 30 minutes talk to last-year-students at a University on Wednesday this week. The talk was held on "Career Opportunities Day" so, considering the amount of consulting firms present at the event, I decided to talk about something totally different and new for most students: DevRel as professional career.&lt;/p&gt;

&lt;p&gt;Around 25 students showed up to attend the talk. Unfortunately my talk was scheduled right before the end of the agenda so many people had left already. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Tip #1: talking about "exotic" topics at these kinds of events can be challenging, so try to schedule your talk early in the morning when your audience is fresh.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;As you can imagine, I started the presentation with the obvious question: &lt;em&gt;"Does anyone know what is DevRel about?"&lt;/em&gt;. Nobody answered but that was kind of expected, right? :-)&lt;/p&gt;

&lt;p&gt;The content of the talk pretty much covered the usual DevRel 101 stuff: what DevRel is and is not, how we help developers to succeed, the beauty of working with communities or why DevRel is important for companies. I gave an example of &lt;em&gt;“A Day in the Life of a Developer Advocate at a Hackathon representing &lt;a href="https://developers.amadeus.com"&gt;Amadeus for Developers&lt;/a&gt;"&lt;/em&gt;, which they liked very much.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Tip #2: Next time I deliver this presentation to a similar audience, I will base the whole presentation on examples and personal stories, as they seem to work better.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Okay, time for some metrics and personal observations:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;All of them were surprised to see a professional career option related to software development that didn't imply a full-time coding position.&lt;/li&gt;
&lt;li&gt;Only 2 students raised their hands to the question &lt;em&gt;"Has anyone ever contributed to an Open Source project?"&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Almost everyone raised their hands to the question &lt;em&gt;"Do you have a public code repository (GitHub, GitLab...)?"&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;No one had participated in a Hackathon before.&lt;/li&gt;
&lt;li&gt;They loved the idea of traveling to attend events.&lt;/li&gt;
&lt;li&gt;I saw some &lt;em&gt;"No thanks"&lt;/em&gt; faces when I talked about public speaking skills.&lt;/li&gt;
&lt;li&gt;I realized that 20% of the students were taking notes. The other 80% just listened.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Tip #3: There is an interesting opportunity in proposing internal Hackathons at universities.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;As usual, I have the feeling that I forgot many ideas and examples, but all in all, I'm happy with the results.&lt;/p&gt;

&lt;p&gt;The slides I used as reference during the talk can be found on my &lt;a href="https://speakerdeck.com/alnacle/devrel-as-professional-career"&gt;speakerdeck&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;Looking forward to the next talk!&lt;/p&gt;

</description>
      <category>devrel</category>
      <category>career</category>
      <category>students</category>
    </item>
  </channel>
</rss>
