For further actions, you may consider blocking this person and/or reporting abuse
Read next
Edition 3 — Monday Memes
Sukhpinder Singh -
Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻
DevOps Descent -
Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits
JT Ziolo -
BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE
Adeniran Abdullahi -
Top comments (34)
I don't talk to anyone. Does that count? :P
What do you store in Keepass that falls under high security use? Why not just use KP for everything?
Maybe he just prefers the UI of LastPass over KeePass, and is willing to compromise on some security for usability?
Precisely.
One of the biggest measures is not exposing it online like that :)
To take it even one step further, Even I did not exposing anything should I write a comment for questions like this at all?!
Some sort of Privacy Paranoia! :D
I choose to strictly control my geographical location rights, recording rights, photo rights, etc. Because I don't want my privacy to be leaked when I don't know it when I go out, I will turn on the geographical location, but when I arrive at my destination, I will immediately turn off this function to protect my privacy. Is there anyone just like me?
Sorry to answer with a question, but how does encrypting your hard drive affect your software development environment, VMs etc.? Does it make things slower?
Recently started using Tor/Signal/ProtonMail, 2FA.
AFAIK it has no effect on read speed, and very slightly slows down write speed, but not noticeably.
I've physically removed the webcam, microphone, hard disk, and bluetooth/wifi chip out of my laptop. I boot the machine with a USB Tails w' persistent encrypted volume. I will be disabling Intel's Management Engine firmware a la hackaday.io once my Beagleboard arrives.
I've had to increase my laptop security on two different occasions two totally different ways - I'm looking forward to this thread to fill in some gaps.
~5 years ago someone got into and locked me out of several of my social media and email accounts by 1) me not logging myself out at the end of my session (on their computer), and b) successfully guessing my security questions. This was before MFA was near-standard, so I at least implemented my own version with notifications/email. I then set MFA up as soon as it was available. I've beefed up my security questions and use LastPass as a PW manager (that never remembers me). I also only use my own laptop, or another computer I strongly trust. I also have a backup email and phone contact number.
The second time my laptop was physically stolen from my apartment. Luckily I'm confident my password was strong enough, and there was very little data stored on the machine - everything was backed up and also stored in 'the cloud.' Since then I've moved out and encrypted my HDD. I hope to get a kensington lock soon to try and bolt down the machine if I have to leave it at home. The laptop webcam is also covered.
All the normal stuff (password manager, encryption), plus I unsubscribe from every online service that gets pwned, or is otherwise using bad security practices (like, sends forgotten passwords over email). And yes, that means I can no longer have a Tumblr, LinkedIn, or Adobe account, but these are the breaks.