A
A
artmill2020-10-23 01:17:26
Information Security
artmill, 2020-10-23 01:17:26

How to organize personal security on the network?

Some time ago, I came across a video that showed how to intercept sessions on social networks through a shared Wi-Fi, which prompted me to be interested in some kind of minimal security on the network. The desire was reinforced after a story at work from a person who talked about intercepting all correspondence in networks at a previous job.

I thought about it and realized that having access to my computer or phone, you can get to your location almost all of my personal data, wallets, etc. It is unlikely that anyone would have picked up passwords, even if using a mask, but everything is tied to one public mail (which is always logged in on all my devices) and one mobile number, which is also listed on many sites.

I think that it is worth at least having a separate mail to which you can attach important accounts (probably tutanota). Perhaps a new number to which some wallets can be assigned. Install a password manager (I look at the dashline because of darknet monitoring (I don’t know if this is necessary) and epass because of the price), install a router with normal protection and vpn (maybe vpn separately).

Tell me, is it necessary or should I take out my tinfoil hat? And if it would be desirable to do, then what other measures would be nice to do, without bringing the decision to senile? What measures are you taking?

Answer the question

In order to leave comments, you need to log in

3 answer(s)
D
DevMan, 2020-10-23
@artmill

having access to your computer, you can get everything. and having access to you personally, you can get everything in general and without any of these computers.
in order not to wrap yourself in foil, you need to:
1. use https to the maximum (now it is already almost everywhere).
2. use otp / two-factor authentication wherever possible.
3. Minimize the use of other people's networks. and if you need to use them, get a VPN. highly desirable personal.
4. generally observe the rules of network hygiene.
the list could go on for a very long time, but the response format is very lazy.

Y
Yuri Samoilov, 2020-10-23
@takezi

It won't be redundant.
Of the password managers, I like KeepassXC.
You can also:
- For 2FA, you can use hardware keys like YubiKey (google supports, for example, such)
- Encrypt the database with passwords with a key file that is stored on a separate medium (you can destroy access to the database along with the medium, not that it is directly necessary, but it’s nice to have such an opportunity)
- What can be done in push notifications, set up for push (2FA, confirmations in bank clients)
And social networks are a storehouse of information for everyone interested, it’s better not to store anything there at all, they all share information on the first request.

L
Lone Ice, 2020-10-23
@daemonhk

And now let's go from the point of view of an ordinary person:
1. Who are you and to whom did you surrender? State? Fuck there. Asashai? Even more so. Robbers? Possibly .
2. Do you have something to steal? (Money, unique data, state secrets). In addition to money , I think there is nothing to steal. (And you can steal on trifles, but often).
3. They steal data from social networks... Yes, at least shoot how I masturbate in front of a webcam, who cares? Go to the ru twitch segment, there is 100 times more trash than you can generate.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question