Thursday, November 14, 2019
11 secrets that will make you more secure on the internet
11 secrets that will make you more secure on the internet 11 secrets that will make you more secure on the internet Hacked accounts in the news. Endless robocalls. Online ads that eerily seem to read your mind. Do I hear Alexa and Siri gossiping about your secrets? It almost feels like paranoia is a totally appropriate reaction.In 2018 alone, data breaches exposed four-point-five billion records to hackers. Three months into 2019 and another two-point-seven billion are already illegally available for sale. But hackers arenât the only problemâ¦Follow Ladders on Flipboard!Follow Laddersâ magazines on Flipboard covering Happiness, Productivity, Job Satisfaction, Neuroscience, and more!Weâve all read about the 50 million Facebook accounts involved in the Cambridge Analytica scandal. And another 30 million were exposed in October of 2018. Oh, and in September another 7 million had private photos revealed. Of course, Google knows every search youâve made (yes, even in incognito mode) and tons of other stuff about you. And in 2014, hackers released a lot of not-so-clothed pictures stolen from celebritiesâ Apple iCloud accounts.Oh, and donât forget that your internet service provider has a list of every website youâve ever visited at home. Yes, even âthoseâ websites that we donât discuss at family dinner. And they sell that info to marketers. Some retail stores now track how often you visit and which aisles you spend the most time in. Three-hundred bucks to the right shady individual can buy me your exact location at any time. And nobody wants their credit info leaking. But it already has. Multiple times.Feeling a bit â1984â over there, Winston Smith? Okay, letâs take a breath. Donât start folding your tinfoil hat just yet.There is one ironclad rule on our side: Nobody can abuse information about you that they donât have. Which is why we need to take security and privacy more seriously. Because itâs on us. And so I present you with what could be titled: âInternet Security and Privacy: The-More-Than-You-Care-To-Know Edition. âIâd like to single out Michael Bazzell for his fine work that I drew a fair portion of this info from. He spent years at the FBIâs cybercrime division and was a consultant on the first season of Mr. Robot. His incredibly thorough books are The Complete Privacy Security Desk Reference and Hiding from the Internet: Eliminating Personal Online Information.Weâre gonna cover everything from fundamentals like good passwords all the way to the paranoid level of aliases and burner phones. If you just want to be safer online or if you want that tinfoil hat to be nicely tailored, this should have you covered.So whatâs the first step?Know your âThreat ModelâSecurity and privacy are different. Security is somebody breaking into your online accounts. Privacy is someone having personal details about you. (So putting your entire digital life into Google products is excellent for security - but often terrible for privacy.) You can be more concerned about one and less about the other.And then thereâs the âsecurity/privacyâ vs. âconvenienceâ trade-off. Itâs pretty much axiomatic that more secure means less convenient. You can be concerned about privacy⦠but not concerned about it enough that you want to live in a Faraday cage. So how can we be responsible without being paranoid?The answer is to think about your âthreat model.â Ask yourself (non-rhetorically): âWhat am I afraid of? And how much am I willing to do to prevent it?â Are you more concerned about security or privacy? More worried about hackers or stalkers? Are you someone who just wants to be on fewer marketing lists or are you a whistleblower who may have the resources of a global corporation turned against him or her?Know what you want to defend against and youâll know what measures will be vital - and what is paranoid overkill.(To learn more about how you and your children can lead a successful life, check out my bestselling book here.)Alright, we know how to eva luate whatâs necessary for each of us. But this first one is non-negotiable, whatever your threat model may beâ¦1) Get FrozenNo, not the Disney movie. You need to get a credit freeze. Itâs the best defense against identity theft. The best time to get one is yesterday. Or sooner.Many of you are saying: âYawn. I did that a long time ago with all three credit agencies.â To which I would reply, âActually, there are 6 credit agencies.â Oooooops.So fill out the forms for Equifax, Experian, Transunion, Innovis, NCTUE and Chex. Thereâs an excellent overview of the whole deal here.And if you have young children get a credit freeze for them too. Kids are a big target because their credit is not only âcleanâ but also their reports are unlikely to get checked for, oh, about a decade or so. It would be awful for little Jimmy to be $300,000 in debt by age nine. More info on credit freezes for kids here.(To learn how to stop checking your phone all the time, click h ere.)Okay, letâs talk about that computer of yours. Itâs feeling vulnerable and needs a little more than a hugâ¦2) Full Disk Encryption, Firewall, And BackupsThis trio is critical for your computer. Full disk encryption keeps your data safer and a firewall protects you from some online attacks. (Hereâs how to setup FDE and a firewall on Mac, and hereâs FDE and firewall on Windows.)Backing up means if anything happens to your computer you wonât lose your data. Think of it like homeownerâs insurance for your digital life. You have to do this regularly, but itâs often easy to automate. If youâre very concerned about your data, you want to have multiple encrypted backups, with one of them maintained offsite. The latter means putting an encrypted copy of your info on a USB drive that you keep at a friendâs place (recommended) or in the cloud (not recommended.) This way if a meteor hits your house or the jackbooted minions of the great global conspiracy seize the rebellionâs plans, youâre covered. Good options are Time Machine and Carbon Copy Cloner. And I highly recommend this little guy.The most important part of smartphone privacy is limiting app permissions like location data, contacts, etc. And donât download sketchy apps.(To learn the 4-step morning ritual that will make you happy all day, click here.)Okay, you should be in good shape. But thereâs something that comes up again and again that we tend to put off. But itâs vital. In fact, many experts say itâs the single most important thing you can do to increase securityâ¦3) Updates Are Annoying. Do Them AnywayMost hackers arenât geniuses. Often theyâre using the same tricks from 5 years ago. But if you havenât updated your software in 5 years⦠uhhh yeah, thatâs a problem.Those updates youâre putting off? Most of them are security-related. Apply updates ASAP. It often feels like itâs doing nothing but youâre forgetting that when it comes to security , ânothingâ is a wonderful thing and âsomethingâ is very very bad.And routinely update all your devices. Desktop, laptop, smartphone, firmware on routers, etc. Enable automatic updates on any device that offers it.After any update, check your settings. When new features are added they often default to the least secure options. And sometimes updates even turn on options you turned off. Sadly, the price of digital liberty is often eternal vigilance.(To learn the 4 harsh truths that will make you a better person, click here.)Okay, youâre updating often. But thereâs a way to increase security and make updates less cumbersome at the same timeâ¦4) Apps Are Not Pokemon. Stop Collecting ThemIf you donât use something regularly, delete it. Smartphone apps, computer software, browser extensions, etc. This reduces âattack surface.â The more software you have, the more points of failure you have. More things that can have vulnerabilities. More potential rogue software d oing things it shouldnât do.That said, hold on to your antivirus and malware protection - especially if youâre using Windows.(To learn how to have a long awesome life, click here.)Alright, time for an intervention. We need to have a serious talk about a very serious subject. Iâm very disappointed in your behaviorâ¦5) Your Passwords Bring Shame Upon Your FamilyThe most common passwords are embarrassing: âThe top two slots have been left unchanged for the fifth year in a row. They are, maddeningly, â123456â and âpassword.ââIn fact, just by knowing the top ten most common passwords you could break into almost 1 out of every 50 computers. Okay, maybe your password is slightly better. But slight ainât cutting it, Bubba:A password-cracking expert has unveiled a computer cluster that can cycle through as many as 350 billion guesses per second. Itâs an almost unprecedented speed that can try every possible Windows passcode in the typical enterprise in less than six hours. By the way, that article is seven years old. You think computers have gotten faster or slower since then? Exactly. You need unique, strong passwords for every account and on every device. 12 characters or more, a mix of letters, numbers and special characters. No excuses.Some people are thinking, âAre you crazy? I canât remember all those.â But you donât need to. Get a good password manager like Lastpass. It will generate super-strong passwords for you and remember them all.Willing to forego convenience for super-duper security? Then forget Lastpass. You donât want a password manager that uses the cloud - that means your passwords are out there on someone elseâs computer. Yes, theyâre almost certainly safe and cloud-based systems are very convenient - but if youâre a die-hard about security the only place the keys to your digital kingdom should be is on your devices. Go with KeePassXC and MiniKeePass for your iPhone.Beyond that password, guard your primary email account with your life. If I can get into that, I can go to most every site you frequent and request a password reset. Boom - hacking one account gets me all of them. And Iâm not speculating here. This is exactly what happened to Wired reporter Mat Honan.You also need two-factor authentication. (â2FAâ) You know when you log into your bank and they text you a code? Yeah, that. And if youâre getting all your 2FA codes via SMS you are doing it wrong. Use an app-based system instead, like Google Authenticator (iPhone, Android) or Authy. Some sites only offer SMS-based 2FA and, inexplicably, many are companies you would expect the most security from. (Iâm looking at you, Bank of America.) If SMS is your only choice, itâs definitely better than nothing. A helpful list of all major sites offering 2FA is here.And finally, what if you want ultimate security (but not necessarily privacy) for that precious primary email account? Try Google Advanced Protection. Then nobody can get into your account without a password and a physical USB key. And it works. Google instituted it for all employees. How many phishing-based hacks have they had since then? Zero.(To learn how to deal with out-of-control kids - from hostage negotiators - click here.)Perfect. But what are you using to log into those accounts anyway? And is it as private as youâd like?6) Stock Browsers Are Bad BrowsersAt least if youâre very serious about privacy. Safari sends data to Apple and you better believe Chrome sends info to Google. If this is part of your threat model, ditch them both and go with Firefox, which is the most secure of the mainstream browsers.For super-duper security and privacy, here are some recommended extensions:HTTPS everywhere: This is a must for everyone. Forces sites to encrypt your connection whenever possible. Ublock Origin: Great, customizable ad-blocker. Do not install if you love ads. Cookie Autodelete: Prevents tracking. Not for everyone. Very secure, not-so-convenient. Multi-Account Container: This makes each tab operate as if it was a separate browser, preventing those eerie recommendations that seem to read your mind. Not for everyone. Track Me Not: It runs random Google searches in the background to bury your real searches in a haystack of noise. Only needed if youâre very privacy conscious and have a puckish sense of humor.For your smartphone, itâs Firefox again, unless you want super-security and donât mind a convenience hit; then go with Firefox Focus.And at the super-extreme outer edge we have the âDeluxe Snowden Package.â Youâll need Qubes and Tor (Pro tip: be careful with those exit nodes.) And you cannot afford to be tracked by your phone. Get a Faraday bag - or put it in a martini shaker. Yes, seriously.(To learn how to deal with passive-aggressive people, click here.)Browser secured. But thatâs not going to help much when the data leaves your computer and heads out there into the big bad internet. How do you keep your online activities secure and private when theyâre out of your hands?7) Dig A TunnelYour ISP can see every site you visit when youâre online at home. And so c an the marketers they sell that info to. If a connection isnât secure, hackers can intercept your traffic and mess with you. And using public WiFi is like making your poor little phone have unprotected sex with very unattractive strangers. How the heck do we stay safe from all these prying eyes and barbarians at the digital gate?Itâs called a VPN and Iâll go so far as to say everyone should have one. Basically, it creates an encrypted âtunnelâ between you and your VPN provider, protecting your internet activities from visibility and attacks. Your ISP now only knows youâre connected to the VPN, and nothing more. Hackers canât break through the encryption to monkey with your data. And public WiFi gets a much-needed condom.Note that some sites donât play well with VPNs, because many bad guys use them. VPNs are pretty cheap (roughly $5 a month) and theyâre simple to set up on both computers and smartphones. PIA and NordVPN are recommended providers.(To learn 5 se crets from neuroscience that will increase your attention span, click here.)So far weâve discussed a lot of attack scenarios youâre probably familiar with. But hereâs one most people arenât. And if youâre not protected, it could lead to someone emptying your bank accountâ¦8) The Phone Number Is The New Social Security NumberWhat do you do whenever you get a new phone? Call your cellular provider and have them move your number to the new device. Easy peasy. But what if I called your cellular carrier and pretended Iâm you? They move your phone service to my phone. And when I log in to Bank of America with your password, guess who gets the text with that 2FA code? Yup, moi. Shopping spree time. (Hacking the password was easy; itâs was â123456â, right?)This is called âSIM swapping.â These days people are signing up for 2FA more often, so SIM swapping is happening more often. If youâre doing 2FA with an app like Authy or a hardware token, youâre covered. But some sites (*cough*, *cough*, Bank of America) only offer 2FA by SMS. Ugh. What to do?Many of the phone companies are now offering to secure your account with a password, so go to their site or call them to get one. People wonât be able to port your number without the code.And whatâs the ultimate-privacy-Jason-Bourne-level-security-tinfoil-hat-conspiracy-theory solution? Thatâs easy: make sure nobody knows your phone number - not even you. This will prevent both SIM swapping attacks and shady dudes from selling your GPS location. But how the heck do you do it?Move your current phone number to Google Voice. (You can do that here for $10. Instructions here.) Sign up for a pre-paid mobile plan. (Mint Mobile is dirt cheap and reliable. Join here.) Theyâll give you a new SIM card with a new number. You now get all your calls, texts and voicemail through the Google Voice app. And you never give the new SIM card number out to anyone. Yes, this works. You canât be SI M swapped, you canât be tracked⦠and anyone you tell about it will probably assume youâre a fugitive, a drug dealer or utterly insane.While weâre driving down paranoia lane, SMS text messaging is fundamentally insecure. Switch to an encrypted free app like Signal. But the people youâre contacting need to have it as well. So now youâre an insane fugitive drug dealer who is also having an affair. Remember what I said about security vs convenience..?(To learn the neuroscience secret to how to quit bad habits without willpower, click here.)Weâve covered a lot of technical stuff, but one of the most important things to do when dealing with online security threats is to change your attitudeâ¦9) Be More SkepticalPhishing attacks donât always come in the obvious form of emails from Nigerian royalty. Increasingly, these attacks appear to come from close friends, leading you to click links without hesitation. Using a site like this I can send you an email that appear s to be from, well, anyone. And this site lets me do the equivalent with my phone, spoofing my caller ID. Yes, itâs that easy.Donât log in to anything important using a public computer or public WiFi without a VPN. Turn WiFi off on your phone to avoid being tracked in retail stores. And sign up for notifications here to find out if any of your personal information has popped up in data breaches.If giving out personal info is an overwhelming concern for you (everybody say it with me now: threat model) you might want to check out MySudo. Ever wanted a secret identity? MySudo offers you multiple âaliasesâ - each with their own working phone number and email address. For when you have to give the hotel a number but donât want marketing calls, when youâre not sure about that person on Tinder, when buying things online, or if you just want to pretend youâre Stringer Bell from âThe Wireâ carrying a burner phone.(To learn the 4 rituals from neuroscience that will m ake you happy, click here.)Okay, youâve got the skepticism part down. But weâre already using some services that may not pass that new threshold. Time to reevaluateâ¦10) Be Wary Of The Cloud And Social MediaMost of us see free iCloud backup as an awesome service. And it is⦠but also look at it through your security lens: any time you backup in the cloud you are putting all of your data on a computer you do not control.The cloud is great for convenience and data loss protection but anything you put on someone elseâs computer is subject to data breaches or nosy employees. For most people, the cloud is probably fine. But if you plan on becoming a political dissident or an international celebrity (no, Iâm not going to link to the hacked nudes of Jennifer Lawrence but I canât stop you from Googling them) keep your data on your devices. Thereâs also a middle path: encrypt files before uploading them. (Free software for that here.)So what about social media? Hereâs ho w to get what Facebook knows about you, how to delete it, or to change your privacy settings. Hereâs Google. This is Appleâs data on you, how to delete it, and how to limit ad tracking.For the extreme crowd, hereâs how to delete your Facebook account, your Google account and other social media.Me? Iâll be sharing this post all over social media. But you canât see my nudes. I know my threat model.(To learn the secret to never being frustrated again, click here.)Iâve tried to give a balance of reasonable options along with more extreme measures. At this point, the reasonable folks are more than covered. But there are going to be some who say Iâm not being paranoid enough. Oooooookay, letâs go to the total edge caseâ¦11) Convinced âTheyâ Are Watching You? Set Traps.If youâve got a stalker, an abusive spouse, or live in a country where having unpopular political opinions tends to make people vanish, youâve got a legit extreme threat model. And Iâm h ere to help.Whether itâs a despotic government, your boss, or the henchmen of the Illuminati, how do you know if someone already has access to your computer? What if you had a âcanary in the coal mineâ to warn you?Canary Tokens allows you to create, for free, files that send you an email when theyâve been opened, along with the IP address of the intruder. Throw one on your desktop with a too-good-not-to-click-on name like âpasswordsâ, âfinancesâ or my personal favorite, âstuff to discuss with therapistâ and then never touch them. If you get an email from Canary Tokens, somebodyâs looking at your stuff - and it ainât you.Yeah, agreed, this is all super-paranoid⦠That is, unless the canary sings.(To learn the science of how to take naps that will make you smarter and happier, click here.)We have covered a positively gargantuan amount of information. I should give you a diploma at this point. Letâs round it all up and Iâll tell you how to get everyt hing you need to get your info off all those sketchy online data broker sites that flood your inboxes with spam and robocall you to deathâ¦Sum UpHereâs how to be more secure on the internet: Get frozen: Credit freeze. All 6. For the kids too. (Donât raise lazy kids. Let them run up their own debt instead of having someone else do it.) Full disk encryption, firewall and backups: Armor and reinforcements. Updates are annoying. Do them anyway: Many security experts say this is numero uno. Apps are not Pokemon. Stop collecting them: What you donât download canât hurt you. Your passwords bring shame upon your family: Get a password manager and 2FA. Itâs as simple as 123456. Stock browsers are bad browsers: Get foxy, baby. Dig a tunnel: VPNâs are the best kept secret in security. (Bonus: they also let you watch region-specific Netflix content.) The phone number is the new social security number: Get a password from your cellular provider, or port your number to briefly turn your life into a spy thriller. Be more skeptical: Please wire me $500. Itâs a gullibility tax. Be wary of the cloud and social media: Think twice before putting anything important on computers that arenât yours. Convinced âTheyâ are watching you? Set traps: âTweet-tweet,â said the diabolical conspirator. Yeah, itâs a lot. Consider your threat model and do a little bit at a time. (No, you canât email me with your IT problems. Only my dad gets to do that.)If you want to get your info off those data broker sites, two excellent places to start the process are here and here. Also, in my next weekly email Iâll be sending out a PDF with an exhaustive list that will really help improve your online privacy, get you off marketing lists, and reduce the amount info out there that hackers can use against you. To make sure you get it, join here.And if you want to get more involved in the security and privacy cause, check out the EFF.I hope this will keep you, your loved ones and your beloved data that much safer.I mean, after all, They are watching our every move, you knowâ¦A canary told me.Join over 330,000 readers. Get a free weekly update via email here.This article first appeared on Bakadesuyo.com . You might also enjoy⦠New neuroscience reveals 4 rituals that will make you happy Strangers know your social class in the first seven words you say, study finds 10 lessons from Benjamin Franklinâs daily schedule that will double your productivity The worst mistakes you can make in an interview, according to 12 CEOs 10 habits of mentally strong people
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.