TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How to encrypt your entire life in less than an hour

146 pointsby misnamedover 8 years ago

15 comments

njharmanover 8 years ago
The article is very slightly more nuanced but the conceptss the title purports is <i></i>DANGEROUSLY INCOMPETENT<i></i> for any security expert &#x2F; discussion &#x2F; context.<p>1) idea that security is something you check off and be done with is dangerously wrong. Security must be continuous, must be updated, reviewed, etc.<p>2) idea that you can &quot;encrypt&quot; [secure] your entire life is ludacris and leads to many dangerous security misconceptions. You don&#x27;t even have control of your entire life, let alone ability to secure it. Most the data on you is owned by others and not even available to you to secure. <i></i>The world is not private or secure<i></i>. Everyone needs to know and think about this when they are tweeting, sexting, talking shit about future president and then being surprised when SS comes to investigate.<p>3) idea that security is either on&#x2F;off, a binary, that you can be secure or not. Is False and leads to extremely poor security choices, over&#x2F;under securing. Nothing is secure. <i></i>There is not such thing as SECURE<i></i>. Things lie on a gradient of security from easy to break to impractically difficult. Things on the impractical to break technically end are still broken due to social engineering, externalities (power consumption of cpu), poor practices surrounding item, etc. Security is making the effort required to get an item greater than the value of getting the item.
评论 #12933767 未加载
评论 #12934552 未加载
评论 #12933906 未加载
schoenover 8 years ago
[Copied from my comment on a duplicate post -- there seems to be random tracking junk at the end of the URL that prevents these from being detected as duplicates!]<p>I appreciate how practical these tips are and I hope people will follow them.<p>I have two quarrels with this:<p>&gt; Andy Grove was a Hungarian refugee who escaped communism [... and] encourages us to be paranoid.<p>I&#x27;m pretty sure that Grove was referring to business strategy, not communications security.<p>&gt; Congratulations — you can now use the internet with peace of mind that it’s virtually impossible for you to be tracked.<p>Something I&#x27;ve seen over and over again is that Tor users tend to have a poor understanding of what Tor protects and doesn&#x27;t protect. The original Tor paper said that Tor (or any technology of its kind) can&#x27;t protect you against someone who can see both sides of the connection -- including just their <i>timing</i>. Sometimes, some adversaries can see both sides of a person&#x27;s connection. As The Grugq and others have documented, Tor users like Eldo Kim and Jeremy Hammond were caught by law enforcement because someone was monitoring the home and university networks from which they connected to Tor and saw that they used Tor at exactly the same time or times as the suspects did. (In Hammond&#x27;s case, recurrently, confirming law enforcement&#x27;s hypothesis about his identity; in Kim&#x27;s case, only once, but apparently he was the only person at the university who used Tor at that specific time.)<p>As law enforcement has <i>actually identified Tor users</i> in these cases, I think people need to understand that Tor is not magic and it protects certain things and not other things. In fact, I helped to make a chart about this a few years ago:<p><a href="https:&#x2F;&#x2F;www.eff.org&#x2F;pages&#x2F;tor-and-https" rel="nofollow">https:&#x2F;&#x2F;www.eff.org&#x2F;pages&#x2F;tor-and-https</a><p>This chart was meant to show why using HTTPS is important when you use Tor, but it also points to other possible attacks (including an end-to-end timing correlation attack, represented in the chart by NSA observing the connection at two different places on the network) because many people in the picture know <i>something</i> about what the user is doing.<p>I&#x27;ve been a fan of Tor for many years, but I think we have to do a lot better at communicating about its limitations.
评论 #12932958 未加载
Asookaover 8 years ago
Signal is atrocious for security. You literally log in with your phone number. Anything you send is directly and irrevocably tied with your physical identity. What good is to me that the messages are encrypted? When the police come knocking, either I&#x27;ll decrypt them, they&#x27;ll beat me until I decrypt them, or I&#x27;ll die in prison for not decrypting them. I do want my messages encrypted, but more than that I really want them not tied to ME.
评论 #12934455 未加载
评论 #12934471 未加载
acconradover 8 years ago
I tried using Signal but the problem is no one else wants to. So yeah I&#x27;d love e2e encryption but it requires both parties to use it, which is a problem.
评论 #12933086 未加载
评论 #12934595 未加载
pnathanover 8 years ago
If you&#x27;re being specifically targeted by a sufficiently capable adversary, this is, at best, a speed bump.<p>Categorize your levels of paranoia appropriately.
评论 #12933622 未加载
EuAndrehover 8 years ago
&gt; In a single sitting, you can make great strides toward securing your privacy.<p>There&#x27;s no such thing as privacy when using proprietary software.<p>If the goal is to secure your privacy, there no need to argue beyond that.
评论 #12934964 未加载
darkhornover 8 years ago
Be careful with 2 factot authentication. A Telegram user was hacked by the police in Russia. The government can receive your SMSes. Use non-SMS 2-factor.
评论 #12935828 未加载
skdd8over 8 years ago
I would also suggest using an actually encrypted email like:<p><a href="https:&#x2F;&#x2F;protonmail.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;protonmail.com&#x2F;</a>
WheelsAtLargeover 8 years ago
Question: Given that gmail can be compromised, even 2 factor auth. Why aren&#x27;t there any extensions that would make it easier to use a public key while keeping the gmail data encrypted? Yes, I understand that gmail is not eager to encrypt the emails but users would be will to do it if there was a simple extension in chrome or firefox. Using an extension would have saved many from email hacks in the past year. Yes, it would still be available on the user&#x27;s machine but it would certainly add another level of security.
nickpsecurityover 8 years ago
Better off reading JJ Luna&#x27;s How to Be Invisible plus espionage non-fiction about Cold War fieldcraft. Then just stop using electronics when you really want privacy. Also, if you do crypto, make it look like HTTPS or something normal to be lost in the crowds over WiFi proxies. Signal and Tor screams &quot;Look at me!&quot;<p>Truth is, though, you wont be participating with most people online if you have very strong INFOSEC and OPSEC. The baseline is just way too low with insecurity and surveillance everywhere.
duckmuckover 8 years ago
How is it possible for DuckDuckGo to offer google search results legally? Aren&#x27;t Bing and Google constantly sniping at each other for implementing each other&#x27;s results?
评论 #12933233 未加载
torrancesover 8 years ago
I would also add another tip: create a separate email to use for financial accounts.<p>Don&#x27;t use this email for anything else.
评论 #12933378 未加载
simonebrunozziover 8 years ago
I am not 100% sold on one particular password manager. Any hints&#x2F;suggestions?
评论 #12933509 未加载
评论 #12933823 未加载
评论 #12934144 未加载
评论 #12933491 未加载
评论 #12933705 未加载
评论 #12933370 未加载
评论 #12935297 未加载
hash-setover 8 years ago
The article didn&#x27;t cover email: Get off of the freebie services like Yahoo! and Gmail and go someplace else because we already know that these companies are in big-time cahoots with the government. Also, Google was working hard to get Clinton crime cabal elected to the point of messing with search results. WE WON&#x27;T FORGET.<p>FastMail is a decent paid service. Or ProtonMail, Hushmail who market on privacy and security.
评论 #12934165 未加载
nemo1618over 8 years ago
Isn&#x27;t 2FA considered dangerous now? We&#x27;ve seen how susceptible it can be to social engineering.<p>On a related note, I noticed that my Windows Phone displays text message notifications even when it&#x27;s locked... So adding a PIN doesn&#x27;t prevent an attacker from doing 2FA if they have access to my phone.
评论 #12932983 未加载
评论 #12933148 未加载
评论 #12933443 未加载
评论 #12933038 未加载
评论 #12934449 未加载
评论 #12933251 未加载