SecureMac, Inc.

Checklist 426: T-Life Recorded and a 2FA Proposal

June 6, 2025

T-Mobile and The North Face incidents show why 2FA must be standard—credential stuffing and silent tracking tools put users at risk.

T-Life Recorded and a 2FA Proposal

Checklist 426: T-Life Recorded and a 2FA Proposal

T-Mobile’s “Screen Recording Tool” Raises Eyebrows Over Default Privacy Settings

T-Mobile has recently introduced a controversial feature in its T-Life app: a screen recording tool that is enabled by default. This move, reported by CNET, has sparked privacy concerns among users who discovered the tool unexpectedly active on their devices.

The T-Life app is pitched as an “all-in-one” digital hub for managing T-Mobile accounts, accessing perks, and shopping devices. But the quiet activation of this recording tool has led to unease over what exactly is being captured and whether user consent was appropriately prioritized.

What Does the Tool Actually Do?

According to T-Mobile, the tool is intended solely to troubleshoot issues within the T-Life app, helping the carrier identify bugs or usability problems. A spokesperson told CNET:

“This tool records activities within the app only and does not see or access any personal information.”

CNET’s analysis supports that the screen recording is limited to the app itself, and does not access broader device functions or unrelated data. The idea is similar to how Apple or app developers request crash reports — but with a critical difference: T-Mobile didn’t ask first.

Critics say the major flaw is the lack of initial opt-in. By making the screen recorder active out of the box, T-Mobile has triggered backlash from privacy-conscious users. As CNET noted:

“…the fact that T-Mobile is enabling the feature by default has rightly made customers suspicious. It should be off initially…”

Fortunately, the feature is not hidden, nor is it impossible to disable.

How to Check and Disable It

T-Mobile users can verify and control the screen recording setting with these steps:

  1. Open the T-Life app
  2. Tap Manage
  3. Tap the Settings (gear icon)
  4. Look under Preferences for “Screen Recording Tool”

If the option exists, tapping it reveals a toggle switch. The accompanying description reads:

“We use a tool to record how customers use the app to analyze and improve your experience… If you turn this toggle on or magenta, we will record your screen… If you turn this toggle off or gray, we will not…”

The toggle allows full user control — albeit after the feature has already been turned on by default.

While T-Mobile’s intentions may be rooted in improving user experience, the execution has reignited familiar debates over user privacy and transparency. The company could have avoided backlash by following a privacy-first model, asking users for consent before activating the feature.

As privacy experts often warn, even well-meaning analytics tools can erode trust if transparency and control are not baked in from the start.

The North Face Hit by Credential Stuffing Attack: Experts Call for Mandatory Two-Factor Authentication

Popular outdoor apparel brand The North Face has become the latest retailer caught in a growing wave of cybersecurity incidents. According to a report from The Register, the company experienced a “small-scale credential stuffing attack” in late April, targeting its U.S. site, thenorthface.com.

Rather than a direct breach of the company’s systems, attackers used stolen credentials from previous, unrelated data breaches to gain unauthorized access to user accounts. This technique exploits the common practice of reusing usernames and passwords across multiple websites.

Recycled Logins, Recycled Lessons

The attack on The North Face mirrors incidents discussed in previous episodes of The Checklist podcast, particularly episodes #425 and #424, which covered:

  • The exposure of 184 million user credentials uncovered by security researcher Jeremiah Fowler, likely harvested via infostealer malware.
  • The high-profile 23andMe breach, which began with a credential stuffing attack on a small user base and eventually snowballed due to a technical vulnerability, leading to a loss of data for 5–6 million users — and contributing to the company’s bankruptcy.

Despite repeated examples, many companies still do not mandate two-factor authentication (2FA), even though such safeguards could drastically reduce the effectiveness of these attacks.

The Industry-Wide 2FA Blind Spot

The podcast discussion emphasized a key frustration: companies continue to gamble with customer data by not requiring 2FA, citing concerns over usability or cost. The argument, however, is wearing thin.

“They’ll use [2FA] if you make ‘em,” the host noted, pointing out that the long-term costs of a breach often exceed the costs of prevention.

The North Face has not commented on whether it plans to adopt or enforce 2FA as a response to this incident. As of now, it remains an optional feature — if available at all.

What Was Exposed?

According to The Register, The North Face confirmed that compromised accounts may have exposed:

  • Full names
  • Order histories
  • Shipping addresses
  • User preferences
  • Dates of birth and phone numbers (if stored)

The company assured customers that no payment card information was compromised, as such data is managed by a third-party processor and not stored on its website.

Despite claiming it’s not legally obligated to notify customers, The North Face is doing so voluntarily “out of an abundance of caution.”

In its communication to affected users, The North Face issued the following guidance:

  • Avoid reusing passwords across multiple sites.
  • Use strong, hard-to-guess passwords.
  • Beware of phishing scams pretending to be from The North Face or other entities.
  • Do not provide personal information in response to unsolicited electronic communications.

The Takeaway: Make 2FA the Standard

Cyberattacks exploiting credential reuse are predictable and preventable. The Checklists hosts and cybersecurity experts alike argue it’s time for companies — especially retailers — to make 2FA mandatory, not optional.

The North Face may have avoided a more catastrophic breach, but the incident reinforces a recurring theme: Security is only as strong as your weakest reused password — and only as proactive as your authentication policies.

Get the latest security news and deals