<?xml version='1.0' encoding='utf-8' ?>

<rss version='2.0' xmlns:lj='http://www.livejournal.org/rss/lj/1.0/' xmlns:atom10='http://www.w3.org/2005/Atom'>
<channel>
  <title>Cybersecurity for the Trumped</title>
  <link>https://cybersecurity.dreamwidth.org/</link>
  <description>Cybersecurity for the Trumped - Dreamwidth Studios</description>
  <lastBuildDate>Tue, 22 Nov 2016 13:26:07 GMT</lastBuildDate>
  <generator>LiveJournal / Dreamwidth Studios</generator>
  <lj:journal>cybersecurity</lj:journal>
  <lj:journaltype>personal</lj:journaltype>
  <image>
    <url>https://v2.dreamwidth.org/10778356/2563090</url>
    <title>Cybersecurity for the Trumped</title>
    <link>https://cybersecurity.dreamwidth.org/</link>
    <width>100</width>
    <height>100</height>
  </image>

<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/1589.html</guid>
  <pubDate>Tue, 22 Nov 2016 13:26:07 GMT</pubDate>
  <title>5. Password policy</title>
  <link>https://cybersecurity.dreamwidth.org/1589.html</link>
  <description>Passwords are the keys to our online lives. With our passwords, people  can read our email, post on our social media accounts, see our banking  data... and lock us out of our own accounts. So it&apos;s important to treat  them with great care. But how? Here are a few hints on a good password  policy.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Do not reuse passwords, ever. Reusing passwords means  that breaking into one of your accounts also compromises others. At the  very least, add some letters that differ for each site.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Switch to two-factor authentication wherever you can.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Do not keep the same passwords forever. It&apos;s good practice to change them every year, especially the important ones.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Do  not use passwords such as your date of birth, partner&apos;s first name, or  pet&apos;s name. People can find those easily by looking at social media or  even talking to you or your friends.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Do not rely too much on  often-used substitutions of letters by numbers. A zero instead of the  letter o is not exactly hard to guess.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;If you have trouble remembering your passwords, use a password manager. Read more about that &lt;a href=&quot;http://thehackernews.com/2016/07/best-password-manager.html&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;It&apos;s  not a horrible solution to write important passwords down, as long as  you make sure you&apos;re not leaving them in places where others can find  them.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;An option could be to create them in the form of fake  &apos;people&apos;, stored in an address book (either digital or physical), whose  made-up names help you remember what they belong to, and whose address  or telephone numbers are the password. If you saw &apos;Amalia 035-3445899&apos;  written down in my little black book, would you think that was a  password hint for my Amazon password? It&apos;s not, but it could have been.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Another  way to make a decent password that&apos;s easy to remember is to make a  sentence that&apos;s meaningful to you, and use the first letters of each  word to form your password. For example: the sentence &apos;My old aunt Emmy  has 3 pretty cute Greyhounds&apos; stands for the password MoaEh3pcG but is a  lot easier to remember, especially if you use it for your account on  the website where you buy your dog food, or the social network where  your aunt always posts pictures of her dogs.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;If it&apos;s  allowed, you could also use four (or more) random words that you can  easily remember by drawing a picture of them in your mind, instead of a  hard to remember and much shorter &apos;normal&apos; password. Let &lt;a href=&quot;https://xkcd.com/936/&quot;&gt;XKCD&lt;/a&gt; guide you here (just do not reuse his example).&lt;/li&gt;&lt;/ul&gt;Further reading on good password practices:&lt;br /&gt;&lt;a href=&quot;https://www.cnet.com/how-to/the-guide-to-password-security-and-why-you-should-care/&quot;&gt;Cnet&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/&quot;&gt;HowToGeek&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=1589&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/1589.html</comments>
  <category>passwords</category>
  <category>cybersecurity</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/788.html</guid>
  <pubDate>Tue, 22 Nov 2016 11:52:42 GMT</pubDate>
  <title>2. A list of things you can do</title>
  <link>https://cybersecurity.dreamwidth.org/788.html</link>
  <description>&lt;p&gt;A lot of people are worried about their level of online privacy and  safety lately, for reasons that shouldn&apos;t be too hard to understand. The  big thing here is that US companies collect data, and the US   government can grab hold of that data if they feel there&apos;s a need; if   you are now under a government that you distrust, it makes sense to   reduce the amount of data that you hand over to US-based companies.  &lt;br /&gt;Here&apos;s  a list of things you can do. Some are easy and some are hard, but   every one of them can help. Even if you can only do one of these things,  it&apos;s worth doing.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Here&apos;s the hardest one,  for many of you:  Get off of Facebook. Facebook collects a LOT of data,  even when you&apos;re  not on it. It&apos;s not just what you post on Facebook,  it&apos;s also about  your surfing habits on other sites, and a lot more. All  this data is  under the control of a man who called his users &apos;dumb  fucks&apos; for  trusting him. If that offends you, good! It should. If you  feel you  cannot do without Facebook, consider abandoning your account  and  setting up a new one, using an altered version of your name, and   reconnecting with your friends on that. Changes like that help obfuscate   your digital trail.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Get away from Google. I will post  in  more details about this later, because Google is an ecosystem that   consists of a lot of services. Most of them have good replacements! The   very fact that Google has all these services is also why it&apos;s so   potentially dangerous: they collect a LOT of different data from all   those sources and combine it all into a very detailed profile. Need a   good search engine? Try &lt;a href=&quot;http://startpage.com&quot;&gt;StartPage&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Get   your e-mail off of US soil. Use an e-mail provider that&apos;s hosted in   Europe and offers encryption. There are plenty of them and some of the  good ones are free.  More information on that is now posted &lt;a href=&quot;http://moem.dreamwidth.org/339431.html&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Compartimentalize.   Use different browsers for different purposes. Use different providers   for different services, so that your data is split up and therefore  less  meaningful. Keep your profiles on social media and other websites   separate. (I know, I don&apos;t always do that either. But I do have a few   online hangouts that you probably don&apos;t know about.)&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Here&apos;s   another hard one. Don&apos;t use a smartphone. If you must, be very wary of   the apps you install. Review and think about the permissions your apps   ask to use. Can they also operate with less? Switch it off when it&apos;s  not  in use. If you can make do with a nonsmart cellphone, or use that  for  phone calls and use your smartphone for data only, do that. That&apos;s   compartimentalizing too.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Here&apos;s some easy stuff! Use   adblockers and other browser add-ons that improve privacy. Your surfing   experience will be safer and faster and the sites you visit will look   nicer! This is another good topic for a &lt;a href=&quot;http://moem.dreamwidth.org/340185.html&quot;&gt;separate post,&lt;/a&gt;  but for  now I&apos;ll throw out some names: UBlock Origin, Ghostery,  BetterPrivacy,  PrivacyBadger, DecentralEyes, SelfDestructing Cookies.  If you use Ghostery, be sure to check the settings carefully, as the  default is not great.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Also easy: if a service you are using  offers two-factor authentication, set that up. It makes your accounts a  lot harder to  break into. This is especially important for webmail  accounts, since they are often the key to a lot of other things, because  many services use email to reset passwords.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Another fairly  easy one, and we should all be doing this already: use good, strong  passwords and be smart about using them. Read more on that &lt;a href=&quot;http://moem.dreamwidth.org/340412.html&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Learn   to use an e-mail client that supports encryption. You may not need it   now, but it&apos;s a good option to have. Thunderbird is just fine for this;   with the add-ons Enigmail and GPG installed, it works well. It&apos;s also  an all-around good e-mail program. And if more people use encryption,   those who use it won&apos;t stand out anymore. Remember when mail used to be   private? E-mail should be private, too.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;If you haven&apos;t yet,  consider getting away from Apple and Microsoft. Linux  isn&apos;t just for   geeks anymore. There are several good looking, easy to use Linux based  OSses nowadays, they can run on most of the hardware that you are using,  and they are free. Ask your friendly local nerd or  cybersmart  cousin  to show you Linux Mint. Bonus: your computer will  probably run  faster,  and will not need to be replaced as rapidly!&lt;/li&gt;&lt;br /&gt;&lt;li&gt;One of the best  things you  could do would be to attend a cryptoparty: an interactive  workshop  about cybersecurity, often aimed at beginners. Find out &lt;a href=&quot;https://www.cryptoparty.in/&quot;&gt;here&lt;/a&gt; when and where they are happening. A good place to ask about this would also be your local &lt;a href=&quot;http://hackerspaces.org/&quot;&gt;hackerspace&lt;/a&gt;;   hackerspaces are physical spaces (as in, buildings/rooms) where people   get together to tinker and to share knowledge about many things,   cybersecurity being one of them. Don&apos;t worry about the bad reputations   of hackers; there are good reasons why malicious hackers generally stay   away from hackerspaces (they don&apos;t need them, they aren&apos;t welcome, and   they don&apos;t want the extra visibility).&lt;/li&gt; &lt;br /&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=788&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/788.html</comments>
  <category>social media</category>
  <category>facebook</category>
  <category>browsers</category>
  <category>providers</category>
  <category>google</category>
  <category>addons</category>
  <category>messengers</category>
  <category>cybersecurity</category>
  <category>passwords</category>
  <category>email</category>
  <category>list</category>
  <category>encryption</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
</channel>
</rss>
