Table of Contents 94e1i
With the New Year and Carnival celebrations approaching, many people leave their cities to visit large centers such as Rio de Janeiro and Salvador to enjoy the festivities. However, according to the survey of Brazilian Public Security Yearbook published in July this year, 2.738 cell phones are stolen or stolen every day — in other words, a person loses their phone to crime every two minutes. 695j54
The loss of a cell phone has not only the financial impact of replacing the stolen device, but also possible fraud in bank s and leakage of data stored on smartphones — in addition, of course, to the inconvenience of blocking access, buying a new device and obtaining a new one. new chip for your telephone line. One solution adopted by the population is the use of a second device to take to the streets in situations of large concentration of people, which gained the nickname thief's cell phone. Learn how to set up and use this device and keep your main smartphone safe at home.
What is the thief's cell phone 2l2b1m

Current smartphones have a series of conveniences, to the point where it is no longer necessary to carry a wallet — just use your cell phone to present your document, make payments, request a transport car and a series of other things. However, with intermediate models costing from R$1.500 and top-of-the-line models well above that, such as the cell phone insurance, but the maxim “better safe than sorry” fits like a glove here,
O thief's cell phone It is a cheaper device that will be used in situations where there is a greater risk of robbery or theft, such as in large crowds typical of festivities such as New Year and Carnival. This smartphone could be an old cell phone that is no longer used or a cheap cell phone purchased specifically for this purpose — you can look for a model in our this year's selection of cheap cell phones.
On this device, you will only have the basics to go out in the crowd: WhatsApp, transport app (Uber, 99, or subway and bus apps in each city), digital wallet with a limit for payment via Pix. Of course, you can have other applications that you consider necessary, but that fewer applications on the criminal's cell phone = less risk of problems.
Configuring the thief's cell phone d36g
For the thief's cell phone, we will only consider the basic needs for leaving the house, as mentioned in the previous section. Here, the important thing is that you leave no options for the thief to gain access to your data and s from applications and financial institutions.
Carrier chip 12495y

You can use your main line on the thief's cell phone, simply by changing the chip from one cell phone to another. If you use eSIM On compatible smartphones, I'm sorry to say that switching will not be possible, as it depends on ing the operator to change from one to the other.
Our recommendation is that you purchase a prepaid chip, which can be purchased at operator stores and can also be found in supermarkets, pharmacies, convenience stores and other retail locations. And why a new chip? Because if you are robbed or robbed, you will prevent:
- It is necessary to immediately block the chip;
- It is possible to recover access to email s and other online services through two-factor authentication via SMS;
- You may need to go to the operator's store to request a new chip for your main line.
Two Factor Authentication 2266h
One of the most important security features for our online service s is the two-factor authentication (or verification). With it, it's not enough to just discover the to access your s: there needs to be a second layer of protection to validate access to your data. The main s that need to have two-factor authentication enabled are Google , for cell phone s Android. Here at Showmetech we have already created some tutorials explaining how to better protect your s with two-step verification:
It is important to emphasize that the use of SMS for two-step verification is not recommended, and the use of two-factor authentication applications is ideal, a safer and more robust solution.
WhatsApp 4b1a3i
If you have purchased a chip to be used only on the thief's cell phone, you can enable WhatsApp on this new number. Thus, all your conversations (along with s and media) are stored on your main smartphone, without the risk of being accessed by third parties.
If you choose to use your main line's chip, you can connect WhatsApp from the second device to your existing line. In this process, you do not transfer the WhatsApp from one cell phone to another, you just create secondary access to your main . Check out our complete tutorial that teaches how to use the same WhatsApp on two smartphones.
digital wallets 2v323p

Do you need to buy water, a snack or pay for transport? It's always good to have one digital wallet with balance to make payments by Pix. Here, our recommendation is that you do not have a bank app installed on the thief's cell phone, as this way you will not be able to access your bank if the device falls into the wrong hands.
Our suggestion is that you have a digital wallet installed and keep a limited amount of money in it, a maximum of R$200, to be used only to pay via Pix for small purchases. You can always top up this wallet at home, when you have access to your main cell phone with your bank's app. Some recommended digital wallets:
- Mercado Pago — Play Store (Android) e App Store
- PayBank — Play Store (Android) e App Store
- Piay — Play Store (Android) e App Store
- Love Digital — Play Store (Android) e App Store
Very important: when using these wallets, remove credit cards that are ed, to prevent them from being used in the event of theft or theft of the cell phone.
Transport apps 2h4q51

An important part is being able to leave home, go to your destination and return with peace of mind. To do this, you must keep the transport apps of its use, already ing the payment methods — be it credit, debit or Pix cards. For public transport apps, buy tickets before leaving home and keep them ed on your cell phone so you don't have to make payments in public.
If you use a credit card to pay for transport applications, use a virtual card (or digital card) for this purpose. Financial institutions like Nubank allow you to have more than one virtual card — which can even be temporary, valid for 24 hours — and you can create one for this specific moment
Here are some useful transport apps to have on your secondary cell phone:
- Uber — Play Store (Android) e App Store
- 99 — Play Store (Android) e App Store
- inDrive — Play Store (Android) e App Store
- TOP (Metro and TM/São Paulo) — Play Store (Android) e App Store
Safe cell phone 19301s

The Federal Government, in partnership with technology companies and telephone operators, launched the application Safe cell phone, which aims to facilitate the protection of data that has been stolen or stolen. To do so, the application must be installed and the phone (can be more than one device per F) must be ed in advance.
In the case of robbery or theft of the cell phone, the owner simply needs to block it by accessing their gov.br in the Celular Seguro app installed on another smartphone (of a family member or friend), and blocking it. Another way is, when ing, to inform a trusted , who can remotely block your smartphone.
“With just one click, the victim will send a warning simultaneously to Anatel, banks, telephone operators and other applications”, explained Ricardo Cappelli, executive secretary of the Ministry of Justice and Public Security. Here, at Showmetech, we made a tutorial showing how to use Secure Cell Phone.
O Safe cell phone can be found at Play Store (Android) e App Store.
See also:
Source: Examination, Depositphotos
Text proofread by: Pedro Bomfim (28 / 12 / 23)