SECURE YOUR DIGITAL LIFE - Amazon S3

A REPORT FROM

SECURE YOUR

DIGITAL LIFE

2017 EDITION

PROTECT YOURSELF FROM UNAUTHORIZED AC C E S S TO YO U R D I G ITAL AS S ETS

A BLACK PAPER

SECURE YOUR

DIGITAL LIFE 2017 EDITION

A BLACK PAPER

CONTENTS

Introduction........................................................................................................................ 4 1.0 Passwords...................................................................................................................... 6

1.1 How Hackers Get Your Password............................................................................. 6 1.2 What Secure Passwords Look Like........................................................................... 9 1.3 Techniques for Creating Strong, Yet Memorable Passwords.................................... 10 1.4 Use a Password Manager........................................................................................ 13 1.5 Password Summary................................................................................................ 15 2.0 Phishing Prevention.................................................................................................... 17 2.1 What is Phishing?................................................................................................... 17 2.2 How to Detect & Prevent Phishing........................................................................ 17 3.0 Two-Factor Authentication.......................................................................................... 19 4.0 Backups....................................................................................................................... 21 4.1 Local Backups........................................................................................................ 22

4.1.1 Macs.............................................................................................................. 22 4.1.2 Windows....................................................................................................... 23 4.2 Cloud Backups....................................................................................................... 23 5.0 Data Encryption......................................................................................................... 25 5.1 Computer Full Disk Encryption............................................................................ 26 5.1.1 Full Disk Encryption on Macs....................................................................... 27 5.1.2 Full Disk Encryption on Windows PCs......................................................... 28 5.2 External HDD Encryption..................................................................................... 28 5.2.1 Software Solutions......................................................................................... 28 5.2.2 Hardware Solutions....................................................................................... 29 5.3 Encrypted Cloud Storage....................................................................................... 30 5.3.1 Consideration With US Based Providers........................................................ 30 5.3.2 Do You Need Encrypted Cloud Storage?........................................................ 31 5.3.3 Encrypted Cloud Storage............................................................................... 31

Tresorit.............................................................................................................. 31 Other Options - Ones we do NOT recommend................................................ 32 5.3.4 Unencrypted Cloud Storage........................................................................... 32 Cryptomator - Encrypt files in your normal cloud storage................................. 32 6.0 Internet Encryption..................................................................................................... 32 6.1 Why Additional Internet Encryption is Important................................................. 33 6.2 Use HTTPS whenever possible.............................................................................. 35 6.3 How to Encrypt ALL Internet Traffic With a VPN................................................ 36 6.3.1 How to Pick a VPN Provider......................................................................... 37

2

Secure Your Digital Life ? January 2017

SECURE YOUR

DIGITAL LIFE 2017 EDITION

A BLACK PAPER

6.3.2 Recommended Service................................................................................... 39 VyprVPN........................................................................................................... 39

6.4 Using TOR & Accessing the Darknet.................................................................... 40 6.4.1 The Darknet.................................................................................................. 40 6.4.2 Should you use Tor?....................................................................................... 41

7.0 Securing your Communication................................................................................... 42 7.1 Email..................................................................................................................... 42 7.1.1 Email Encryption........................................................................................... 43 7.1.2 How to increase your email privacy................................................................ 44 7.1.3 Recommended Email Provider....................................................................... 47 7.2 Instant Messaging & Calls...................................................................................... 48 7.2.1 Signal............................................................................................................. 48 7.2.2 Whatsapp....................................................................................................... 52

8.0 Secure Your Social Media Habits................................................................................. 55 9.0 Securing Your Smartphone.......................................................................................... 56

9.1 The Passcode.......................................................................................................... 57 9.2 Smartphone Encryption......................................................................................... 58

9.2.1 iPhone and iPad Encryption.......................................................................... 58 Enabling Encryption & Passcode....................................................................... 59 Making sure all user data is encrypted................................................................ 59

9.2.2 Android Encryption....................................................................................... 60 9.2.2.1 Limitations of Android Encryption........................................................ 60 Off-Box attacks are possible.......................................................................... 60 Only the internal memory is encrypted on some devices............................... 61 Performance impact...................................................................................... 62 9.2.2.2 Enabling Android Encryption................................................................ 62 9.2.2.3 Use the Most Recent Android Version................................................... 62

9.2.3 When Is My Data Encrypted and Decrypted?................................................ 63 9.3 Picking a Secure Passcode....................................................................................... 65 9.4 Fingerprint Sensors................................................................................................ 66 9.5 Additional Settings You Should Check................................................................... 69

9.5.1 Apple iOS...................................................................................................... 69 9.5.2 Android Devices............................................................................................ 72 10.0 Choice of Devices and Systems.................................................................................. 74 10.1 Windows vs Macs................................................................................................ 74 10.2 Android vs iOS.................................................................................................... 75 Conclusion........................................................................................................................ 76

3

Secure Your Digital Life ? January 2017

SECURE YOUR

DIGITAL LIFE 2017 EDITION

A BLACK PAPER

INTRODUCTION

Every day, you make yourself vulnerable.

Your phone knows every detail of your communications, your comings and goings, and your restaurant habits. Your wrist monitor knows your heart rate and other vitals. Amazon knows what you like to read and what brands of paper towels you buy on a regular basis. Netflix knows your taste in films, and Google knows your political leanings and whether or not your kid might have the croup.

We live in a world where more than 50 billion `things' are connected, where our refrigerators take photos of their contents and ping them to our phones, where our health records live in the digisphere, and where most of our banking, communicating, planning, driving and working prowess depends on the functionality of these electronics and their services.

The rewards can be great. But with all of this good, great real-time data shuffling and Big Data collection and analysis comes a price: The more we rely on technology, the more information we reveal about ourselves... rendering us vulnerable to attack.

Vulnerability makes us less free. That's why the best balance between convenience and security, in our view, always favors the protection of the user.

In this comprehensive report we'll help you craft that balance. We'll share the latest developments in data security and data hacking, as well as the biggest risks that users of Macs, iPhones, Windows and Android users must guard against.

And, of course, we'll recommend the best techniques, programs and apps we know of -- strategies we ourselves use here at Sovereign Man -- that will help you avoid becoming a target of mass surveillance, a hacker, or even a disgruntled ex-spouse.

Technology changes at a blistering pace; some of these tools we've recommended in the past either no longer exist or have been usurped by better ones. That's why we're committed to updating this vital report as often as necessary. (Make sure to study the sections on building strong passwords and on creating back-ups. Those are key.)

By following our simple steps, you can make yourself much less attractive to

4

Secure Your Digital Life ? January 2017

SECURE YOUR

DIGITAL LIFE 2017 EDITION

A BLACK PAPER

criminals. You can mitigate the loss of a misplaced or stolen device, and you can make it more challenging for government agencies to invade your privacy without due process.

We can't promise total invulnerability, of course. If your attacker has the necessary resources, he will find a way to access your data. And if you are the target of government agencies such as the NSA or CIA, the advice we'll share will indeed make their job harder, but not impossible.

Our aim instead is to thwart hackers who end up with your data as part of a breach of a company or service you trust; it's also to teach you Internet street-smarts that will keep you from becoming a target for criminals.

Think of how you protect your car. An alarm system, anti-theft steering wheel locks and GPS tracking may not stop the most determined thief out there, but the combination may indeed deter someone seeking an easy target.

The same idea applies to protecting your digital self.

We certainly hope you will find the information contained in this Black Paper valuable. If you have any suggestions or comments, please reach out to clients@.

5

Secure Your Digital Life ? January 2017

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download