Secure Your Devices
o Your phone is your ultimate endpoint. You carry it everywhere
and it usually holds your most personal secrets and sensitive information. Your iPhone encrypts as soon as you lock your screen(even the feds can't access it), but Android
devices have to be shut down entirely.
o Learn the appropriate methods to secure your device.
Old Links ==> Here's a guide on how to secure your iPhone, and here's another guide for most Android devices.
TURN OFF FINGERPRINT PHONE UNLOCK
o Your Touch ID or fingerprint sensor is meant to keep your data
more secure. However, in some cases federal agents can force you to unlock your phone with your
fingerprint, because the courts have determined that it is not a violation of
the Fifth Amendment, which protects against self-incrimination. The feds
however cannot force you to turn over your passcode.
BE MINDFUL OF EVERY APP YOU INSTALL
SET A STRONG PASSCODE
REDUCE YOUR ONLINE FOOTPRINT
o Websites like MyLife, Whitepages and Spokeo make millions by
selling access to this information. You can use this helpful guide from DeleteMe to remove yourself from each of these data
broker websites, but this process can be tedious and time consuming.
Secure Your Messaging
o Use Signal for encrypted messaging
SECURE YOUR BROWSING
·
Do I need a vpn?
o Security researcher Troy Hunt said in a blog post that because VPN providers
control your traffic, "they can inspect it, modify it, log it, and have a
very good idea of what it is you're up to."
o In short: using a VPN means having to trust it to not abuse your
trust and to resist demands for your data by the government in which the
provider is located.
·
Public wi-fi networks are a big 'no'
o Use your phone's data for better security
o If you need a secure network, you should use your phone's data
-- such as 4G or LTE -- or use your phone as a hotspot for your computer. It's
far better to use your phone's data plan for anything important than using
insecure public Wi-Fi.
·
Be aware of stingray 'downgrade'
attacks (https://oaklandmofo.com/blog/block-stringray-devices)
SECURE YOUR SERVERS AND CLOUDS
USE STRONG, UNIQUE PASSWORDS
o You must use a strong, unique alphanumeric password that is at
least in the double digits of characters for each account you have.
·
Set up two factor authentication on everything
·
Consider deleting accounts you no
longer use
·
Don't store your encryption keys in
the cloud
Protect Your Children Online
·
*No method is full proof. Even the
following tools must be audited and monitored.
· Google family link - set digital ground rules to help guide them
as they learn, play, and explore
·
Tablets for kids: Amazon Fire HD 8
kids edition, Kurio tablets, Lenovo’s new tab m10 hd gen 2
Comments