TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Being privacy-aware in 2016

292 pointsby maglavaitssalmost 9 years ago

39 comments

nikcubalmost 9 years ago
Distilling tips down for regular users who don&#x27;t use SSH or are intimidated by compiling KeePassX for Linux themselves, my tips would be:<p>1. Use a user-friendly password manager like Dashlane or 1password with a long unique password and a second factor (that isn&#x27;t SMS based). Password re-use is the #1 way accounts are being compromised at the moment and there are now good password managers that are easy to use with a low barrier to entry<p>2. Use an extensive ad blocker like uBlock Origin and use <i>multiple profiles in your browser to separate your serious accounts like webmail and banking from general web browsing</i>. The other common way of being exploited is drive-by malware and web-based exploits. A combination of blocking third-party content and separating your browsing profiles will prevent a lot of it. Don&#x27;t feel guilty about blocking ads - most publishers are extremely negligent with what they allow on their sites via ad networks. Bonus: switch to Chromium[0] (firefox isn&#x27;t sandboxed and exploits are too common) (but alert yourself to Chromium updates with an IFTTT of the release blog to &lt;pick your notification method&gt;) or alternatively remove Google, Flash, Java etc.<p>3. Get a VPN subscription and set it up on your laptop &amp; mobile devices. Seriously, don&#x27;t use open WiFi networks or shared networks without wrapping your connections in encryption. sslstrip is extremely effective and many apps either don&#x27;t verify&#x2F;authenticate SSL connections or don&#x27;t pin certificates. IVPN, PIA, the Sophos VPN product - take a pick.<p>4. Most home routers are super shit and full of holes. Upgrade to a router that supports open firmware and pick one of openwrt, dd-wrt, monowall, pfsense etc. bonus: run an UTM like Untangled (commercial) or Sophos (free up to 50 CALs iirc)<p>5. Encrypt your stuff - VeraCrypt is a decent TrueCrypt fork but most operating systems now have support for volume encryption - your local disk, USB sticks[1], or a file-based volume. Backups should be to encrypted media<p>6. Be anonymous - create a disposable email with a fake name to signup to services with. even better sinkhole a random domain name you register. No service outside of banking, insurance, health, etc. <i>really</i> need to know your actual identity details.<p>[0] <a href="https:&#x2F;&#x2F;download-chromium.appspot.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;download-chromium.appspot.com&#x2F;</a><p>[1] <a href="http:&#x2F;&#x2F;www.theinstructional.com&#x2F;guides&#x2F;encrypt-an-external-disk-or-usb-stick-with-a-password" rel="nofollow">http:&#x2F;&#x2F;www.theinstructional.com&#x2F;guides&#x2F;encrypt-an-external-d...</a>
评论 #11849964 未加载
评论 #11846221 未加载
评论 #11846231 未加载
评论 #11846208 未加载
评论 #11849222 未加载
评论 #11848413 未加载
评论 #11847815 未加载
评论 #11846498 未加载
评论 #11846984 未加载
georgehotellingalmost 9 years ago
&gt; Use unique SSH keys for each service (sharing a SSH key on your GitHub&#x2F;Gitlab account, network router and AWS&#x2F;Azure instance is a very stupid idea); use ssh-keygen -t rsa -b 4096 to generate a 4096 bit RSA SSH key.<p>I tried this. Turns out to be a bad idea. SSH will walk through each private key and attempt to authenticate with it in order. That means a lot of bad login attempts which in turn leads to getting locked out. SSH public keys are public for a reason.<p>What attack is this even preventing - that someone will be able to reverse ssh public keys and get the private? A better approach is to generate a unique key per client so that if you lose access to a device you can remove only its public key.<p>&gt; Also, you should download the source code, compile it (using a Linux machine) and always look over the source code for rogue functions<p>So I becoming an Underhanded C Contest judge is the price of admission to using the internet? Can anyone really be expected to do that? Can we blame anyone who gets owned because they didn&#x27;t?
评论 #11847841 未加载
评论 #11846720 未加载
评论 #11847642 未加载
评论 #11851387 未加载
评论 #11848223 未加载
jgrahamcalmost 9 years ago
<i>I highly recommend using KeepassX as a password manager, secured using a key file and not a password.</i><p>I like KeePassX as well, but prefer to unlock using a password. I have a Yubikey programmed to output a 32 random password that I generated and I append to that a 16 character password that&#x27;s in my head. I keep the Yubikey and the SD card on which I have the password vault separate. The SD card itself is encrypted* and the version of KeePassX I run is on the card and is one I compiled myself.<p>Not sure I&#x27;d be getting additional protection with a key file. But perhaps I am wrong.<p>*I did that so that someone couldn&#x27;t just copy the KeePassX database off it when I wasn&#x27;t looking and run some offline attack against it. The SD card also has a kind of social engineering defence mechanism on it to dissuade the curious from playing with it... I wrote the word INFECTED on it.
评论 #11846678 未加载
评论 #11846003 未加载
评论 #11846122 未加载
评论 #11846056 未加载
zeroxfealmost 9 years ago
&gt; Also, you should download the source code, compile it (using a Linux machine) and always look over the source code for rogue functions, you CANNOT afford a vulnerability inside the password manager.<p>I&#x27;m not sure that this actually possible in any reasonable sense. Its not that hard to throw in an obfuscated back door into source code, especially in a complex system (ignoring the build chain and the whole trusting trust thing.)<p>Even if there are a small number of people who have the time and expertise to audit such systems, it just doesn&#x27;t scale.
评论 #11846138 未加载
globisdeadalmost 9 years ago
Nice list of browser extensions. Just to add on a few that I use that might not get a lot of exposure but is still very comprehensive<p>Privacy Settings: <a href="https:&#x2F;&#x2F;addons.mozilla.org&#x2F;en-US&#x2F;firefox&#x2F;addon&#x2F;privacy-settings&#x2F;" rel="nofollow">https:&#x2F;&#x2F;addons.mozilla.org&#x2F;en-US&#x2F;firefox&#x2F;addon&#x2F;privacy-setti...</a><p>Decentraleyes: <a href="https:&#x2F;&#x2F;addons.mozilla.org&#x2F;en-US&#x2F;firefox&#x2F;addon&#x2F;decentraleyes&#x2F;" rel="nofollow">https:&#x2F;&#x2F;addons.mozilla.org&#x2F;en-US&#x2F;firefox&#x2F;addon&#x2F;decentraleyes...</a>
jeffreyrogersalmost 9 years ago
This is overboard and paranoid for the average user. You are almost certainly not a target for your government and probably not a criminal and so don&#x27;t need to worry about full disk encryption, your google search history, a judge compelling you to unlock your phone, etc.<p>Most people should just use an adblocker and strong passwords.
评论 #11847054 未加载
amqalmost 9 years ago
It is scary to realize that there is no realistic real-life way to be at least close to keeping information secure. We are just closing holes in a sieve.
评论 #11846381 未加载
vladharbuzalmost 9 years ago
If you&#x27;re seriously concerned that someone will break into your house and remove the screws on your laptop to mess with it, you have problems way beyond what strong passwords and ad blockers can solve.
评论 #11846433 未加载
评论 #11846518 未加载
mavhcalmost 9 years ago
I&#x27;d rather a fingerprint to lock my phone and always lock on screen blank, than a pin so complex I&#x27;ll hardly ever lock my phone.<p>If you&#x27;re living as some kind of enemy of the state maybe it&#x27;s just time to stop developing software. And do you really need to holiday in North Korea?
评论 #11846232 未加载
评论 #11846424 未加载
评论 #11845848 未加载
Tepixalmost 9 years ago
The part about the browser is a bit too short.<p>If you are privacy conscious you should configure your browser to<p>a) block 3rd party cookies (all browsers except Safari have them enabled by default, even Firefox)<p>b) delete all cookies when the browser is closed.<p>Make it a habit to close the browser every now and then.
评论 #11845880 未加载
barkingalmost 9 years ago
Some people are advising that duckduckgo can say that they are not tracking you but being based in the USA could be made to do so by the NSA.
评论 #11845866 未加载
评论 #11850616 未加载
评论 #11847752 未加载
评论 #11846054 未加载
评论 #11847076 未加载
评论 #11850036 未加载
xgbialmost 9 years ago
Getting a Yubikey? What about this? <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11690774" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11690774</a>
评论 #11846402 未加载
评论 #11845851 未加载
chinathrowalmost 9 years ago
Very nice read. I would add a subscription to &quot;have i been pwned?&quot; to learn of data breaches.<p><a href="https:&#x2F;&#x2F;haveibeenpwned.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;haveibeenpwned.com&#x2F;</a>
评论 #11847532 未加载
评论 #11846817 未加载
评论 #11846251 未加载
libeclipsealmost 9 years ago
I don&#x27;t get the point about marking screws with nail polish. What does that accomplish?
评论 #11845928 未加载
评论 #11845895 未加载
评论 #11845897 未加载
评论 #11845923 未加载
ybrozealmost 9 years ago
<i>Use unique SSH keys for each service (sharing a SSH key on your GitHub&#x2F;Gitlab account, network router and AWS&#x2F;Azure instance is a very stupid idea)</i><p>I don&#x27;t see how this makes sense. Assuming your private keys all live on the same machine (presumably with 0600 in &#x2F;.ssh), then if your machine is stolen and your user password compromised, access to one private key is the same as access to all of them.
评论 #11845859 未加载
评论 #11845969 未加载
deanclatworthyalmost 9 years ago
The advice here recommends generating an RSA keys. Mozilla recommend using ED25519 keys &quot;when backwards compatibility is not required&quot; [1]<p>[1] <a href="https:&#x2F;&#x2F;wiki.mozilla.org&#x2F;Security&#x2F;Guidelines&#x2F;OpenSSH#Key_generation" rel="nofollow">https:&#x2F;&#x2F;wiki.mozilla.org&#x2F;Security&#x2F;Guidelines&#x2F;OpenSSH#Key_gen...</a>
评论 #11847349 未加载
ComodoHackeralmost 9 years ago
The sad thing about this and other otherwise good privacy guides is that it can be properly applied only by a small fraction of all people who really need this privacy in their everyday work and life. Especially I like the &quot;look over the source code for rogue functions&quot; part.
veeragonialmost 9 years ago
What about mobile privacy? which OS? which Phone? which app? the author forgot there is even more privacy info we could lose via mobile with its built in sensors and features.
评论 #11846119 未加载
评论 #11846210 未加载
评论 #11847975 未加载
Mendenhallalmost 9 years ago
I assume everything is hacked&#x2F;unsecure and any information put on the net will be able to be accessed by all sorts of bad actors.<p>I laugh when websites etc ask for a phone number to help secure. My first thought is great idea so now when you get hacked you can give up my phone number too!<p>Internet has been and always will be Mos Eisley spaceport to me.
mitm2mitmalmost 9 years ago
About full disk encryption for Windows: what is the safest bet here? I mean, what if a single sector of my disk gets corrupted, will I lose my entire data because of that? What kind of encryption is less prone to data corruption?<p>I&#x27;m worried about this. And how about .tar.gpg backups, if I lose a single byte I lose the entire file?
andrey_utkinalmost 9 years ago
I&#x27;d add apparmor or selinux or virtualization (or all at once) for untrusted closed-source crap like Skype. Well, for things with large attack surface, like web browsers, it&#x27;s important, too.<p>This is hard to recommend to everybody, but I use SELinux and this way I am more sure that my private keys won&#x27;t get stolen.
评论 #11848131 未加载
grimaceindexalmost 9 years ago
For those who want to learn more about Duck Duck Go bangs, I regularly update a blog that showcases useful Duck Duck Go bangs: <a href="http:&#x2F;&#x2F;wp.me&#x2F;P7uQ4N-7" rel="nofollow">http:&#x2F;&#x2F;wp.me&#x2F;P7uQ4N-7</a>
gravypodalmost 9 years ago
Does anyone know of any good hardware password managers?<p>I&#x27;d love to switch from a software to an offline, open source, and self maintainable solution that will work for everything, not just websites&#x2F;when I have my browser open.
评论 #11850222 未加载
TazeTSchnitzelalmost 9 years ago
I&#x27;m assuming OS X&#x27;s FileVault is fine for full-disk encryption? It only sends your key to Apple if you choose to, and it&#x27;s completely transparent from the end-user&#x27;s perspective.
评论 #11846804 未加载
wepplealmost 9 years ago
I think it&#x27;s somewhat negligent to recommend people use the only browser that doesn&#x27;t have a sandbox.<p>You&#x27;re trading privacy for security, and where you have less security your privacy is long gone.
评论 #11848268 未加载
corvalmost 9 years ago
Is it actually necessary to use both Privacy Badger and uBlock Origin?
评论 #11846793 未加载
lnalxalmost 9 years ago
<i>You should be using either Bitlocker (for Windows platforms, warning ahead) or LUKS (Linux platforms) full disk encryption</i><p>Using encryption on laptop can be very battery-greedy unfortunately.
评论 #11845966 未加载
评论 #11845972 未加载
ashitlerferadalmost 9 years ago
Amazing the post and no comments here have mentioned the Tor Project.<p><a href="https:&#x2F;&#x2F;www.torproject.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.torproject.org&#x2F;</a>
评论 #11846744 未加载
secfirstmdalmost 9 years ago
<i></i><i>Begins blatant plug</i><i></i><p>If your looking for a tool which has a ton of easy security guides all in one place, you might like to try Umbrella App. It has lessons and checklists on everything from how to send a secure email to how to deal with a kidnapping. Built by the human rights and tech community, it&#x27;s open source and available on Android.<p><a href="https:&#x2F;&#x2F;play.google.com&#x2F;store&#x2F;apps&#x2F;details?id=org.secfirst.umbrella" rel="nofollow">https:&#x2F;&#x2F;play.google.com&#x2F;store&#x2F;apps&#x2F;details?id=org.secfirst.u...</a><p><i></i><i>Ends blatant plug :)</i><i></i>
trollianalmost 9 years ago
This was funny until I got to the part about disable malware detection. Then it becomes dangerous. Is this idiocy or malice?
评论 #11846637 未加载
评论 #11847906 未加载
Machado117almost 9 years ago
Can someone explain to me why should I worry about stopping browser fingerprinting? Can&#x27;t they just check my ip?
ameliusalmost 9 years ago
&gt; you should have all Javascript forbidden<p>Is it even possible to use the web nowadays without JS enabled?
评论 #11851700 未加载
prettynewalmost 9 years ago
Are Windows RDP connections safe to do on wifi? like hotel wifi? curious.
评论 #11847154 未加载
jwattealmost 9 years ago
Trying to save privacy is like trying to save horses for transportation, or bows and arrows for warfare. We should figure out how to build a society that thrives on transparency instead!
stirneralmost 9 years ago
uMatrix combines the functionality of every recommended Firefox extension except HTTPS Everywhere.
评论 #11846620 未加载
whyagaindavidalmost 9 years ago
Why everyone forgot firefox sync? Why waste time with clipboard+1password+dropbox?
prettynewalmost 9 years ago
is RDP safe on wifi connections?
评论 #11846776 未加载
avodonosovalmost 9 years ago
The browser configuration here (disable various features) seemed too complex and reminded me of another, simpler, approach: do not power on your computer ever.
gnuralmost 9 years ago
I get it, you probably want to be private and rather not have someone read everything you do. But if you follow this checklist to the letter, you&#x27;ll have a big fat &quot;SUSPECT&quot; warning on your file in no time.<p>Hiding non-suspect behavior is, for everyone watching, the same as hiding very suspect behavior. If you do this and make a single mistake (anything really, speeding could be enough) there could be a red flag on your file that makes sure your possessions will be searched (and possibly taken) and be prepared to spend some time in jail.<p>I get it, everyone should be hiding all their activity online so that hiding your activity online isn&#x27;t suspect behavior. But I really don&#x27;t think that will ever happen and I&#x27;d rather be an open book about all my behavior then try to hide as much as possible while becoming a target.
评论 #11845921 未加载
评论 #11845886 未加载
评论 #11846110 未加载
评论 #11845914 未加载