<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Safe Living in the Internet Age]]></title><description><![CDATA[Easily Build Security, Privacy and Convenience Online]]></description><link>https://sec.terminusfoundry.com/</link><image><url>https://sec.terminusfoundry.com/favicon.png</url><title>Safe Living in the Internet Age</title><link>https://sec.terminusfoundry.com/</link></image><generator>Ghost 4.3</generator><lastBuildDate>Mon, 23 Mar 2026 19:49:54 GMT</lastBuildDate><atom:link href="https://sec.terminusfoundry.com/posts/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Bonus: Snowden-Level Security]]></title><description><![CDATA[How to stay as safe as the best. Even with everything we’ve done in the previous lessons, you are not un-hackable. Learn the advanced techniques.]]></description><link>https://sec.terminusfoundry.com/bonus/</link><guid isPermaLink="false">608496cfc56c9d1d25b0a393</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Devon Sydney]]></dc:creator><pubDate>Sat, 24 Apr 2021 23:17:17 GMT</pubDate><media:content url="https://sec.terminusfoundry.com/content/images/2021/04/image-14-1.png" medium="image"/><content:encoded><![CDATA[<blockquote><strong>Warning:</strong> Much of the topics covered below will be too much for 99% of people, including myself. However, it is <strong>useful </strong>and <strong>interesting</strong> to be aware of what&apos;s possible and apply whichever techniques you would like.</blockquote><h2 id="how-to-stay-as-safe-as-the-best">How to stay as safe as the best</h2><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-14-1.png" alt="Bonus: Snowden-Level Security"><p>Not to make you feel bad after all this hard work, but even with <strong><strong>everything</strong></strong> we&#x2019;ve done in the previous lessons, <strong>you are no<strong>t un-hackable</strong></strong>. If you feel paranoia and fear that you are being specifically targeted (like our friend <a href="https://en.wikipedia.org/wiki/Edward_Snowden">Edward Snowden</a>) then you need to take far more steps, and even that may not be enough. For instance, Mr. Snowden drapes a pillowcase over his head when entering passwords, in order to avoid them being compromised by spying eyes or cameras.</p><p>This lesson is <strong><strong>by no means</strong></strong> intended to guarantee you are invincible and hack-proof, it&#x2019;s more of a thought experiment on thinking more like a &#x2018;Snowden&#x2019;.</p><h2 id="targeted-attacks">Targeted Attacks</h2><p>If you believe you&#x2019;re a high value target (journalist, celebrity, high net-worth, powerful, an enemy in the government&apos;s eyes like a whistleblower) then hackers are incentivized to push harder (and will invest more resources and money to hack you). For this reason it&#x2019;s extremely hard to stay safe. You effectively have to be a crypto-nerd techie or hire a specialized security team. Even with all this, if bad people get you in a room, <strong>they will get your information</strong>.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-15.png" class="kg-image" alt="Bonus: Snowden-Level Security" loading="lazy" width="448" height="274"><figcaption><a href="https://xkcd.com/538" rel="noopener nofollow">https://xkcd.com/538</a></figcaption></figure><p>If you are this sort of target, you have far more to worry about, like kidnapping, physical attack, blackmail, and you also likely have money to pay for protection. This is <strong>wayyyy </strong>out of scope of this site, so please go hire a professional firm, like <a href="https://gavindebecker.com/" rel="noopener nofollow">Gavin de Becker and Associates</a>, who advise many of the world&#x2019;s most prominent media figures, corporations, and law enforcement agencies on predicting violence, and also serves regular citizens who are victims of domestic abuse and stalking.</p><h2 id="the-easiest-defense-%E2%80%94-reduce-reduce-reduce">The Easiest Defense &#x2014; Reduce, Reduce, Reduce</h2><p>Follow this simple formula:</p><!--kg-card-begin: html--><center>less accounts<br>+<br>less data<br>+<br>less passwords<br>+<br>less personal information<br>=<br><b>fewer vectors for attacks.</b></center><!--kg-card-end: html--><p>When posting publicly or entering information online, take a moment to think about what personal information the service <strong>actually </strong>needs and provide the <strong>minimum</strong>. Same goes for posting online, how much do you <strong>really</strong> need to share with everyone on your social media or the public. Some obvious cases of where people provide too much information or overshare:</p><ul><li><strong>providing extra information</strong> - birthdates, addresses, school names, children&apos;s names, places of work</li><li><strong>photos</strong> <strong>including private info</strong> - think cars with license plates, your home, photos of your children, or even documents with addresses or any identifiable info</li><li><strong>photos with GPS information</strong> - most devices attach location information to photos you take, you should <a href="https://helpdeskgeek.com/how-to/how-to-remove-exif-data-from-your-photos/">learn to remove it yourself</a> before uploading</li><li><strong>locations of your home or work</strong> - includes posting workouts that start and end at home. The US government even screwed this one up and <a href="https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases">gave away the location of a secret military base</a> in Afghanistan. Strava offers a <a href="https://support.strava.com/hc/en-us/articles/115000173384-Privacy-Zones">privacy zone</a> feature where you add a bounding box so it won&apos;t display the starts and ends of your map publicly but still allows you to share.</li></ul><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/1_Dm0i7FqBg7-tZeZUUPgWaQ.gif" class="kg-image" alt="Bonus: Snowden-Level Security" loading="lazy" width="600" height="248"><figcaption>Encryption ain&apos;t no match for the Girl with the Dragon Tattoo</figcaption></figure><h2 id="pseudonymity-and-doxxing">Pseudonymity and Doxxing</h2><p>Using a <strong>pseudonym </strong>simply means using a fake name. You&apos;ve probably seen a friend that uses a fake name on their Facebook or Instagram account. This is a good practice because it makes it more difficult for malicious actors to connect your online presence with your real identity (and therefore your real bank account, social insurance number, address and so on).</p><p><strong>Doxxing, or being doxxed</strong> is when someone has their private information leaked online without their consent, or in the case of someone acting under a pseudonym, having that publicly connected back to their real name.</p><p>The strength of your pseudonym is in how difficult it is for someone to doxx you. For social media it is likely good enough to use a fake last name to avoid unwanted people from finding you. The pseudonyms are weak, due to the nature of social media. You are interacting with many friends that know your real identity and could doxx you. This can even happen unintentionally by using your real name when commenting on a photo or a post.</p><p>If you are a whistleblower, you will probably want a full pseudonym, that has absolutely no connections back to your real identity. This means a using an identity that nobody you don&apos;t absolutely trust knows is one. It means using a different email to sign up, providing distinct information for every part of the signup. It can even extend to adapting your writing style, as their are machine learning algorithms intended to notice patterns in word usage and grammar styles.</p><h2 id="truly-private-browsing-with-tor">Truly Private Browsing with Tor</h2><p>Sometimes you want to be <strong>truly private</strong> online. This is very difficult, inconvenient and slow, but in the end possible to achieve.</p><p>You may have heard of the <a href="https://en.wikipedia.org/wiki/Silk_Road_(marketplace)">Silk Road</a> or the <a href="https://en.wikipedia.org/wiki/Dark_web">Dark Web</a>, which made <a href="https://www.torproject.org/"><strong>Tor</strong></a><strong> </strong>(the onion router) famous. Aside from its obvious illegal use cases, there are many legitimate reasons to use this approach for true anonymity online, including avoiding detection by oppressive regimes. Using Tor to browse the internet is <a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">sort of like having a VPN on steroids</a>, bouncing your data across several random inter-connected devices in a network around the world to encrypt your data.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-33.png" class="kg-image" alt="Bonus: Snowden-Level Security" loading="lazy" width="1345" height="584" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-33.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-33.png 1000w, https://sec.terminusfoundry.com/content/images/2021/04/image-33.png 1345w" sizes="(min-width: 720px) 720px"><figcaption>The Tor network encrypts your data in 3 layers before accessing the site you wish to go to [<a href="https://write.privacytools.io/my-thoughts-on-security/slicing-onions-part-1-myth-busting-tor">privacytools.io</a>]</figcaption></figure><p>Using Tor alone is not enough. You must layer many other techniques such as:</p><ul><li>never accessing the internet from home or work</li><li>obfuscating your information in a way that never ties back to your real identity</li><li>using a VPN over Tor</li><li>using encrypted chat like <a href="https://signal.org/en/">Signal</a></li><li>using a Tor-specific operating system like <a href="https://tails.boum.org/">Tails</a> or <a href="https://www.whonix.org/">Whonix</a></li></ul><p>You have to be smarter than a Hollywood spy to do this right. If you do, remember that a <strong>single mistake</strong> can make all the privacy disappear in a snap. <a href="https://en.wikipedia.org/wiki/Ross_Ulbricht">Ross Ulbricht</a> (the former operator of the Silk Road, who went by the pseudonym Dread Pirate Roberts) thought he was smart and careful but was caught when someone discovered his Silk Road username used on an old forum with his real email address. He is now serving double life + 40 years without possibility of parole, for money laundering, computer hacking and conspiracy to traffic narcotics.</p><p>This approach is not for the faint of heart, and make sure you have a really good reason or it&apos;s honestly not worth all the hype.</p><h2 id="protective-actions">Protective Actions</h2><p>Here are some other protective actions you can take:</p><p><strong>Airgapping:</strong> This is when you have a computer that is not connected to the internet in any way. If you have a high-value bitcoin wallet, or extremely senstitive documents, you may want to put them on an airgapped device and store them in a safe. Just make sure you have backups (also airgapped) elsewhere.</p><p><strong>Erasing data:</strong> If you are going into a sensitive area and want to protect your data, you can erase your devices. This would protect you against your devices being read at a border crossing. The downside is the inconvenience of restoring your device on the other side of the border. Also, ensure that whatever method you use to erase your device does a <strong>full</strong> erase, not one that can be restored.</p><h2 id="mr-robot">Mr. Robot</h2><p>For a really fun dive into the world of hackers I highly recommend the TV show <a href="https://www.usanetwork.com/mr-robot"><strong>Mr. Robot</strong></a> by Sam Esmail. Beyond the gripping story, beautiful cinematography and fantastic acting, the creators took great pains to make the attacks and protections as realistic as possible.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/6qeKp1SLEp5IoP30KyUPl9ZNquZ.jpg" class="kg-image" alt="Bonus: Snowden-Level Security" loading="lazy" width="600" height="900" srcset="https://sec.terminusfoundry.com/content/images/2021/04/6qeKp1SLEp5IoP30KyUPl9ZNquZ.jpg 600w"><figcaption><a href="https://www.themoviedb.org/">Mr. Robot Poster</a></figcaption></figure><h2 id="useful-resources">Useful Resources</h2><p>To end off, here are some useful links if you&apos;d like to dive deeper.</p><ul><li><a href="https://www.eff.org/deeplinks/2017/12/how-talk-your-family-about-digital-security"><strong>How to Talk to Your Family About Digital Security</strong></a> [EFF]</li><li><a href="https://www.privacytools.io"><strong>Encryption and tools to protect against global mass surveillance</strong></a> [Privacy Tools]</li><li><a href="https://www.amazon.ca/Enterprise-Cybersecurity-Successful-Cyberdefense-Advanced/dp/1430260823"><strong>Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats</strong></a> [Book]</li><li><a href="https://www.youtube.com/watch?v=7U-RbOKanYs"><strong>Password Cracking</strong></a> [Computerphile]</li><li><a href="https://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure"><strong>What To Know About Identity Theft</strong></a> [FTC]</li><li><a href="https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime"><strong>Facts + Statistics: Identity theft and cybercrime</strong></a> [III]</li><li><a href="https://www.wired.com/story/extreme-security-measures/" rel="noopener nofollow"><strong>Extreme Security Measures</strong></a> [Wired Magazine - behind a paywall]</li><li><a href="https://www.youtube.com/watch?v=lsRi74hJZNk"><strong>The Day-In-The-Life of a Hacked Smartphone</strong></a> video [Privoro]</li><li><a href="https://firstmonday.org/ojs/index.php/fm/article/view/5615/4346"><strong>Anonymity, pseudonymity, and the agency of online identity</strong></a> [FirstMonday]</li><li><a href="https://www.globalsign.com/en/blog/privacy-personality-trend-towards-online-pseudonymity"><strong>The Trend Towards Online Pseudonymity</strong></a> [GlobalSign]</li></ul><h2 id="thank-you">Thank you!</h2><p>We just wanted to thank you for sticking with us through this long course! Don&apos;t forget to go back and do any lessons you skipped. And please let your friends know about us!</p><p><strong>Back </strong>to the <a href="../lesson-plan"><strong>Lesson Plan</strong></a></p><!--kg-card-begin: html--><small>
    <i>
    	Header image credit:
    	<a href="https://wallpapercave.com/edward-snowden-wallpapers">Edward Snowden wallpaper</a>
    </i>
</small><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Security Lesson 6: Think Like a Hacker]]></title><description><![CDATA[Know the con to avoid being the mark. Hacking involves human psychology. People use the same password for many accounts and don't backup their data. Hackers know how to leverage fear to get your keys. The best encryption, password manager and backups won't protect against social engineering.]]></description><link>https://sec.terminusfoundry.com/lesson-6/</link><guid isPermaLink="false">60849645c56c9d1d25b0a382</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Devon Sydney]]></dc:creator><pubDate>Fri, 02 Apr 2021 20:15:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDV8fGhhY2tlcnxlbnwwfHx8fDE2MTk1NTcxNDY&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<h2 id="know-the-con-to-avoid-being-the-mark">Know the con to avoid being the mark</h2><img src="https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDV8fGhhY2tlcnxlbnwwfHx8fDE2MTk1NTcxNDY&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="Security Lesson 6: Think Like a Hacker"><p>In many ways, hacking someone is knowing their human psychology. It&apos;s knowing that people are lazy and use the same password for multiple accounts, it&apos;s knowing they won&apos;t backup their data, it&apos;s knowing how to leverage fear to get them to hand over the keys. You can have the best encryption, use a password manager perfectly, and keep multiple separate backups, but if someone phones you and pretends to be the government and you fall for it, all bets are off.</p><p>This lesson is more about understanding what it is to be a hacker and make yourself less of a target.</p><h2 id="white-hat-vs-black-hat">White Hat vs. Black Hat</h2><p>Not all hackers are bad. On one end, <strong>white hat</strong> hackers are trying to break into systems to find vulnerabilities, inform the system owners and help make the systems stronger. They can be hired to do penetration tests and security audits, and often work for respectable firms. They contribute to open source projects to remove bugs and add security. On the other end, <strong>black hat</strong> hackers are in it for financial and personal gain, or just to watch the world burn. In the ethical middle sit <strong>gray hat</strong>, who may be hacking governments or corporations to leak fraudulent behavior, or stealing from the rich to give to the poor.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-40.png" class="kg-image" alt="Security Lesson 6: Think Like a Hacker" loading="lazy" width="1518" height="788" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-40.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-40.png 1000w, https://sec.terminusfoundry.com/content/images/2021/04/image-40.png 1518w" sizes="(min-width: 720px) 720px"><figcaption><a href="https://en.wikipedia.org/wiki/Spy_vs._Spy">Spy vs. Spy</a></figcaption></figure><p>Black and white are in a constant battle. Systems can never remain safe because it&apos;s far easier to find flaws than to fix them. Some vulnerabilities found years ago remain open and easy ways for black hat hackers to attack people.</p><h2 id="finding-a-mark">Finding a Mark</h2><p>Most hackers want easy targets, and refer to them as <strong>targets of opportunity</strong>. The less secure and diligent you are, the more likely you are to become one of these targets. There are many ways hackers can find a target:</p><ul><li>actively looking for a starting place by searching social media, comments and reviews, or other public information</li><li>hacking into other systems that have your information stored in them</li><li>relying on previous hacks that have released private information online, including common passwords</li><li>scanning public Wi-Fi networks</li><li>following you and watching you until you enter your password in their sight</li><li>sending emails or making phone calls with private information to seem real</li></ul><h2 id="social-engineering">Social Engineering</h2><p>Psychological manipulation of people into performing actions or divulging confidential information. Social engineering is a cornerstone of successful attacks, and almost all hacking contains an element of understanding what humans do. The video below shows a hacker successfully social engineering <strong>full root access</strong> to a company, which is the holy grail of an attacker and basically lets them do anything they want. This hacker is white hat because they had permission and performed the attack for educational purposes at <a href="https://www.defcon.org/">DEF-CON</a>, a hacking and security conference.</p><figure class="kg-card kg-embed-card kg-card-hascaption"><iframe width="200" height="113" src="https://www.youtube.com/embed/SstZAIxl8wk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><figcaption>Social engineering attack at <a href="https://www.defcon.org/">DEF-CON</a></figcaption></figure><h2 id="script-kiddies">Script Kiddies</h2><p>Not all hacking is hard! The term for someone who isn&apos;t particularly skilled at programming but uses software to execute an attack is called a <strong><a href="https://en.wikipedia.org/wiki/Script_kiddie">script kiddie</a></strong>, or<strong> skiddie</strong> or <strong>skid</strong>. And skids aside, even the most sophisticated hackers tend to use some tools created by others before them. The point is that just like there&apos;s sophisticated free software to do your taxes or edit your photos, there sophisticated free software to steal your identity and crack your bank account open. So don&apos;t assume the person on the other side is necessarily smart, or that they even have to be.</p><p>One of the most famous recent leaks of tools usable by script kiddies was when the hacker group the <a href="https://en.wikipedia.org/wiki/The_Shadow_Brokers">Shadow Brokers</a> leaked a bunch of hacking tools believed to have been developed by the <a href="https://en.wikipedia.org/wiki/National_Security_Agency">National Security Agency</a> (NSA) of the United States. These tools are now available to script kiddies wishing to leverage the power of the NSA.</p><h2 id="methods-of-hacking">Methods of Hacking</h2><p>There are many crafty and nefarious ways a hacker can attack. It is good to be aware of these methods.</p><ul><li><strong>malware (including viruses)</strong> is software that infects your device to take information or modify the system.</li><li><strong><a href="https://www.phishing.org/">phishing</a> </strong>is one of the most common attacks and is when a hacker impersonates a trusted entity (like your bank or email provider) and asks you to do something (like click a link or enter information) that will give them information or access to your systems.</li><li><strong><a href="https://en.wikipedia.org/wiki/Zero-day_(computing)">zero day vulnerabilities</a> </strong>are security flaws unknown to the software creator, but known to a hacker that uses a <strong>zero-day exploit </strong>to take advantage of it. <strong>open vulnerabilities</strong> can be known by the software creator, but may have not been fixed yet or can be present in un-updated older versions of the software.</li><li><strong>wifi spoofing </strong>is setting up fake networks, usually in public places, and harvesting information and access when people connect to them.</li><li><strong><a href="https://en.wikipedia.org/wiki/Keystroke_logging">keyloggers</a></strong> are a form of malware that monitor every key you type and therefore can collect your passwords.</li><li><strong><a href="https://en.wikipedia.org/wiki/Brute-force_attack">brute force</a> </strong>attacks are where a hacker simply tries every combination of password to access an account. They also frequently use a list of the most commonly used passwords. Brute force attacks are not effectively against long generated passwords from a password manager</li><li><strong><a href="https://en.wikipedia.org/wiki/Denial-of-service_attack">denial of service</a></strong> (DoS) and <strong><a href="https://en.wikipedia.org/wiki/Denial-of-service_attack">distributed denial-of-service</a> </strong>(DDoS ) attacks use one (DoS) or many (DDoS) machines to overwhelm a website or other system with requests and therefore making it unavailable for normal usage.</li></ul><h2 id="real-life-attacks">Real-Life Attacks</h2><p>To make this real, here is a list of real life stories about some of the largest and scariest successful attacks.</p><h3 id="scary-attacks">Scary Attacks</h3><ul><li><strong><a href="https://en.wikipedia.org/wiki/Stuxnet">Stuxnet</a></strong> was an extremely sophisticated attack that was found spread through many of the programmable systems controlling global infrastructure from dams to telephone networks to nuclear power plants back in 2010. It was determined in the end that the specific target was Iran, where Stuxnet spun the nuclear centrifuges too quickly, damaging them. It is speculated that Israel and the United States were involved in developing and executing this attack.</li><li><strong>Baby monitor</strong> attacks hit their peak back in 2015 as an especially nefarious attack of opportunity. As cheap and remote accessible baby monitors became popular many had less-than-ideal security. Parents who didn&apos;t change the default settings of their baby monitors unwittingly streamed live imagery of their baby online for anyone to access. Changing the default password is important on <strong>any</strong> network connected device.</li><li><strong><a href="https://en.wikipedia.org/wiki/Heartbleed">Heartbleed</a> </strong>was a zero-day vulnerability in OpenSSL which is used for secure communication, and allowed an attacker to read through the encryption. It led to hundreds of social insurance numbers being stolen from Canadians among other breaches.</li><li><a href="https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)"><strong>Spectre</strong></a><strong> </strong>and <a href="https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)"><strong>Meltdown</strong></a> both attack vulnerabilities right at the processor level, and in the worst case can allow full takeover of machines.</li><li><a href="https://en.wikipedia.org/wiki/KRACK"><strong>KRACK</strong></a> stands for Key Reinstallation Attack and is targetted at WiFi security. If successful, it can break through the encryption on WiFi and allow an attacker to read all traffic on the network.</li></ul><h3 id="famous-leaks">Famous Leaks</h3><ul><li><a href="https://en.wikipedia.org/wiki/Edward_Snowden#Global_surveillance_disclosures"><strong>Edward Snowden</strong></a> is the most famous recent leaker. He stole information from the National Security Agency of the US. Among many other things, it exposed the <a href="https://en.wikipedia.org/wiki/PRISM_(surveillance_program)">PRISM surveillance program</a> where the US government was taking private information from US internet companies. Edward Snowden is extremely controversial, and whether you think he is a traitor or a hero, he is a respected speaker on security and privacy techniques.</li><li><a href="https://wikileaks.org/"><strong>WikiLeaks</strong></a> is a controversial organization that leaks confidential information stolen by hackers with an outward stated goal of exposing corruption. There is much speculation that it is actually an arm of Russian intelligence. Regardless, their leaks have exposed unprecedented information to the public. These leaks include <a href="https://wikileaks.org/ciav7p1/"><a href="https://en.wikipedia.org/wiki/Vault_7">Vault 7</a></a>, <a href="https://en.wikipedia.org/wiki/Democratic_National_Committee_cyber_attacks">2016 Democratic National Committee emails</a> claimed to have been hacked by <a href="https://en.wikipedia.org/wiki/Guccifer_2.0">Guccifer 2.0</a>, and documents behind the <a href="https://en.wikipedia.org/wiki/Trans-Pacific_Partnership">Trans-Pacific Partnership Agreement</a> during its negotiation.</li><li>The <a href="https://en.wikipedia.org/wiki/Panama_Papers"><strong>Panama Papers</strong></a> were the result of an email hack on a law firm <a href="https://en.wikipedia.org/wiki/Mossack_Fonseca">Mossack Fonseca</a> in Panama. These papers exposed the depth and breadth of shady off-shore banking of many world leaders.</li><li><a href="https://en.wikipedia.org/wiki/Sony_Pictures_hack"><strong>Sony Pictures</strong></a> was attacked in 2014. Confidential emails and other corporate information was leaked. It is suspected that North Korea was behind the attack, and the attack took over two months to execute. When they finished the hackers executed scripts to erase Sony&apos;s computer infrastructure.</li></ul><p>Phew! Although there was a lot of scary stuff in this lesson, you <strong>should nevertheless</strong> feel more prepared to not be taken by hackers. </p><blockquote>&quot;To know your enemy, you must become your enemy.&quot;<br>- Sun Tzu, Art of War</blockquote><p><strong><strong>Proceed</strong></strong> to <strong><a href="../bonus">Bonus Lesson: Snowden-Level Security</a></strong></p><p><strong><strong>Back</strong></strong> to the <a href="../lesson-plan"><strong>Lesson Plan</strong></a></p><!--kg-card-begin: html--><small>
    <i>
    	Header image credit:
    	<a href="https://unsplash.com/@cbpsc1?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Clint Patterson</a>
    </i>
</small><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Security Lesson 5: Don’t Lose Your Memories]]></title><description><![CDATA[Backups sound like something you know you should be doing, but aren’t. All those priceless photos, music, notes and business documents are at risk. You should be backing up and protecting anything that would bring hurt to lose. Dive into the world of digital asset management.]]></description><link>https://sec.terminusfoundry.com/lesson-5/</link><guid isPermaLink="false">60849560c56c9d1d25b0a365</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Devon Sydney]]></dc:creator><pubDate>Wed, 03 Mar 2021 21:15:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1558494949-ef010cbdcc31?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDl8fHNlcnZlcnxlbnwwfHx8fDE2MTk0ODExNzE&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<h2 id="backup-all-your-most-valuable-data">Backup all your most valuable data</h2><img src="https://images.unsplash.com/photo-1558494949-ef010cbdcc31?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDl8fHNlcnZlcnxlbnwwfHx8fDE2MTk0ODExNzE&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="Security Lesson 5: Don&#x2019;t Lose Your Memories"><p>Backups you say? Sounds like something you know you should be doing, but aren&#x2019;t. Naughty, naughty. All those priceless photos, music, notes, even business documents are at risk. You should be backing up and protecting anything that would bring a tear to your eye if you were to lose it. The term for managing and protecting all your information is <strong>digital asset management (DAM)</strong>.</p><p>For an excellent and exhaustive book on the topic, read <a href="http://thedambook.com/the-dam-book/">The DAM Book</a>. Although targeted at photographers, it is useful reference for anyone and covers the topic in far greater detail than we&apos;ll cover here.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-13.png" class="kg-image" alt="Security Lesson 5: Don&#x2019;t Lose Your Memories" loading="lazy" width="1200" height="1200" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-13.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-13.png 1000w, https://sec.terminusfoundry.com/content/images/2021/04/image-13.png 1200w" sizes="(min-width: 720px) 720px"><figcaption><a href="https://www.flickr.com/photos/janitors/5989981885" rel="noopener nofollow">&#x2018;Memories&#x2019; by K&#x101;rlis Dambr&#x101;ns</a></figcaption></figure><h2 id="data-losses-happen">Data Losses Happen</h2><p>Computers are imperfect. Disk drives fail or become corrupt. Laptops and phones get stolen. Website databases crash. There&apos;s even <strong><a href="https://www.kaspersky.com/resource-center/definitions/what-is-ransomware">ransomware</a> </strong>attacks where attackers will encrypt your data and force you to pay for the keys to unlock it. And I truly hope this never happens to you, but homes burn down and flood.</p><p>Everyone has at least one drive failure of some sort or another or two at some point in their lives.</p><p>The reality is you spent <strong>so much time</strong> collecting all this information, and it would be a shame to lose it all for not taking some basic precautions. The good news is it&apos;s possible to get your data truly safe and protected. If you do it right, it will make managing it much easier.</p><h2 id="what-to-protect">What to Protect?</h2><p>Different things are important to different people. To some their music collection is worth more to them than their photos, to others it&apos;s their writing or digital art projects. Here are some ideas on things you should be thinking about protecting.</p><ul><li>photos, videos, music and art</li><li>documents and writing</li><li>code, software licenses and other projects</li><li>business and tax documents</li><li>identity documents</li><li>chats and emails</li></ul><h2 id="get-protected">Get Protected</h2><p>I&apos;m not going to lie, getting a handle on data is a <strong>large </strong>and <strong>intimidating</strong> process. Having done this many times and helped friends, I&apos;m presenting a proven, simple, efficient and effective approach.</p><h3 id="1-survey">1. Survey</h3><p>Start by figuring out what you need to protect. What disk drives and devices do you have data on? What online services have your stories, your music, your photos that aren&apos;t stored anywhere else? Write it all down, and note the rough sizes of things as you go. This will give you a good sense of how big your problem is. </p><p>I use the free tools <a href="http://grandperspectiv.sourceforge.net/">Grand Perspective</a> for Mac OS and <a href="https://windirstat.net/">WinDirStat</a> for Windows to help visualize my data, you can point at a folder then hover over chunks of storage and see what&apos;s taking up the most space.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-16.png" class="kg-image" alt="Security Lesson 5: Don&#x2019;t Lose Your Memories" loading="lazy" width="820" height="540" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-16.png 600w, https://sec.terminusfoundry.com/content/images/2021/04/image-16.png 820w" sizes="(min-width: 720px) 720px"><figcaption>Data Visualized by <a href="http://grandperspectiv.sourceforge.net/">GrandPerspective</a></figcaption></figure><p>The goal of this step should be to make a <strong>single temporary backup</strong> of everything you come across, <strong>before organizing</strong>. This is because the moment you start moving data around you risk losing it. This backup will eventually be deleted, but it is insurance in case of a problem later on.</p><p>I like to do this step with a random external drive. You could even borrow a friends&apos; because it will only be temporary. If you have an extra computer in the household you could use that. </p><h3 id="2-organize">2. Organize</h3><p>This is the <strong>most time-intensive</strong> part of the process. It&apos;s all about de-cluttering, de-scattering, reducing and organizing your data. Make <strong>sure </strong>you have the time and the will to get this step done. Doing half the job will only create future problems.</p><ul><li>go through all your information, get it <strong>centralized in one spot</strong> - this includes pulling data off those old memory cards and USB keys</li><li><strong>export </strong>from services you don&apos;t use anymore, and import to new services or save on your drive - in <a href="../lesson-3">Lesson 3</a> you wrote down all the accounts you use, so refer to that list for reminders</li><li><strong>delete</strong> anything you no longer want, including duplicates of information</li><li><strong>organize </strong>it nicely, however your brain will have the best chance of finding it in the future when you need it</li><li><strong>note</strong> which drives and devices you&apos;ve pulled data off so you can delete them later</li></ul><p>Remember, if you screw anything up, you have that backup you made in step 1!</p><h3 id="3-backupat-least-two-copies-of-everything">3. Backup - At Least Two Copies of Everything</h3><p>Now that you have everything in one spot, you can make your first <strong>total backup</strong>. The easiest and quickest way to back up your data is to simply plug in a USB key or an external drive. Make sure the drive is big enough, and has space for new data you will be adding over the next few years. For now, this is amazing and if you are overwhelmed you can stop here.</p><p>External drives can be plugged into a laptop and come in a large range of size, speed and ruggedness for travel.</p><h3 id="4-maintain">4. Maintain</h3><p>The best digital asset management system is the one you maintain, so make sure whatever system you decide on it&apos;s one you&apos;ll actually follow. Set yourself <strong>regular reminders</strong> to update backups, and automate as much of the process as you can.</p><p>Part of maintenance is to regularly <strong>test</strong> your backups to make sure they still work. Wouldn&apos;t want to find out your backup drive failed <strong>after </strong>your primary drive fails, would you?</p><p>If you&apos;ve done this correctly, <strong>everything should have a home</strong>. Keep putting new data in its proper place, and stay on top of protecting your data.</p><h3 id="solid-state-vs-hard-disk-drives">Solid State vs. Hard Disk Drives</h3><p>When choosing hard drives for backups it is important to understand the two main types of disks. A traditional <strong>hard disk drive</strong> (HDD), also known as a <strong>spinning disk </strong>drive, has moving parts and uses a needle on an arm to read and write data off quickly rotating metal plates.</p><p>A modern <strong>solid state drive</strong> (SSD) has no moving parts. In general, they <strong>are better</strong>; being smaller, more reliable, faster, quieter and using less energy. On the downside they are typically <strong>more expensive</strong>, especially for larger storage.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-18.png" class="kg-image" alt="Security Lesson 5: Don&#x2019;t Lose Your Memories" loading="lazy" width="940" height="546" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-18.png 600w, https://sec.terminusfoundry.com/content/images/2021/04/image-18.png 940w" sizes="(min-width: 720px) 720px"><figcaption>HDD vs. SSD by <a href="partitionwizard.com">partitionwizard.com</a></figcaption></figure><p>Wherever you can afford it, use solid state!</p><h2 id="advanced-protection-techniques">Advanced Protection Techniques</h2><h3 id="network-attached-storage-nas">Network Attached Storage (NAS)</h3><p>Network attached stored is simply when external drives are connected to your network that your computer can connect to without plugging in. At their simplest they just have one drive, but multi-drive options are common and can have additional features like redundancy management built in.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-17.png" class="kg-image" alt="Security Lesson 5: Don&#x2019;t Lose Your Memories" loading="lazy" width="1336" height="800" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-17.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-17.png 1000w, https://sec.terminusfoundry.com/content/images/2021/04/image-17.png 1336w" sizes="(min-width: 720px) 720px"><figcaption><a href="https://www.synology.com/en-ca/products/DS420+">Synology NAS with 4 drive bays</a></figcaption></figure><p><a href="https://en.wikipedia.org/wiki/RAID">RAID</a> (Redundant Array of Inexpensive Disks) is a common infrastructure technology that allows for spreading data across multiple drives with redundancy and data-recovery options. Depending on what you are trying to achieve, RAID can be extremely difficult to manage, so this is only for technical users! There are also <a href="https://en.wikipedia.org/wiki/Non-RAID_drive_architectures">non-RAID</a> approaches and proprietary choices like <a href="https://www.drobo.com/">Drobo</a>.</p><h3 id="cloud-storage">Cloud Storage</h3><p>Storing your data in the cloud just means using drives that are hosted in data centers and that you connect to through the internet. The most common and easy-to-use storage services are <a href="dropbox.com">Dropbox</a>, <a href="box.com">Box</a>, <a href="drive.google.com">Google Drive</a>, <a href="onedrive.live.com">Microsoft OneDrive</a> or <a href="icloud.com">Apple iCloud</a>.</p><p>These services are costly and not feasible for large storage beyond about 2TB, so should be reserved for the most important and immediate data. </p><p>Many of the backup services allow <strong>rollbacks</strong> within the service for an extra charge. This is so that if you delete or overwrite something in your cloud storage, you can bring it back at a later date. To me this gives people a false sense of confidence. Better to build a system that doesn&apos;t rely on restoring deleted files.</p><h3 id="archiving-vs-backups">Archiving vs. Backups</h3><p>I personally have way too much data to store on my laptop and in cloud backups without breaking the bank in monthly fees. If this is the case for you, once you have too much data you can <strong>archive</strong> the data onto external drives, and then you can delete the data from your primary device and cloud storage. This will free up space and save money.</p><p>In general, archives should be for data that you rarely need access to as it is less convenient to attach to. It should also be as organized as possible before you archive it in the first place.</p><p>By nature, archives are not the same as backups since you are removing the original data. <strong>Archives need to be backed up</strong>! Since the whole point of the archive was to avoid the costly cloud, they will typically just use another external drive.</p><h3 id="off-site-off-line">Off-Site &amp; Off-Line</h3><p>Regardless of whether a backup or an archive, data should be protected with <strong>extra backups </strong>at a different location (<strong>off-site</strong>) and disconnected from the internet (<strong>off-line</strong>).</p><p><strong>Off-line backups</strong> are completely disconnected from computer and the internet and sit powered off when they&apos;re not being updated. This protects against accidental deletion, electrical shock, and remote attacks like ransomware. On-line data means data that is actively connected to a computer or the internet. This could include the data on your devices or in a cloud storage account. </p><p><strong>Off-site backups</strong> are especially important for archives. If there&apos;s a large electrical surge in your building, or a flood or a fire, or someone breaks in, you could lose <strong>all </strong>of the data in your home at once, including backups. Store it at a trusted friends&apos; house or in a safety deposit box and regularly update the data. Remember, encrypting backups is always a good idea!</p><p>Note that while cloud storage technically counts as off-site it is definitely <strong>not</strong> off-line. That is, if a file is deleted or overwritten on your local machine, that will also happen in your cloud storage. And if an attacker gets into your cloud storage and deletes it or encrypts it, it is effectively destroyed.</p><p>This is admittedly too much for some people, but my off-site backups have been the only thing protecting me against me losing valuable memories on several occasions.</p><h2 id="your-memories-are-much-safer">Your Memories are Much Safer!</h2><p>Good work. You have gone through the <strong>painful</strong> and <strong>huge</strong> effort to get everything nicely organized in one spot and backed up. As we have seen, the holy grail backup strategy:</p><ul><li>is <strong>complete</strong> and protects all your important data</li><li>has <strong>multiple </strong>and <strong>redundant </strong>backups</li><li><strong>regularly</strong> updated</li><li>includes<strong> at least one off-site </strong>and <strong>off-line </strong>backups</li><li>is <strong>encrypted</strong></li></ul><p>As a bonus, once you&apos;ve achieved this you can do fun new projects. That box of old photos you never went through? Now you can scan them, add them to your photo collection, edit them and post them. Same goes for old videos, letters, and anything you want to keep if the original were to be destroyed.</p><h3 id="reflection-on-imperfection">Reflection on Imperfection</h3><p>Backup strategies are never perfect. Several years ago, I went into Dropbox one day and noticed that many of my photos prior to 2014 were <strong>simply gone</strong>. I looked everywhere and worked with Dropbox support to no avail. My best guess is that the files had been deleted by a bug or simply by accident during a cleanup and I hadn&apos;t noticed in time for Dropbox to be able to restore them. I had thought I was good at backups. But I didn&apos;t have a full off-site and off-line backup for these particular files so they were lost forever. Thankfully this is the only loss of data I&apos;ve ever had but it goes to show even technical people can lose things.</p><blockquote>Congratulations! Getting your data in order is a step so many people never achieve, and putting these practices in place now will serve you for the long term.</blockquote><p><strong><strong>Proceed</strong></strong> to <a href="../lesson-6"><strong>Lesson 6: Think Like A Hacker</strong></a></p><p><strong><strong>Back</strong></strong> to the <a href="../lesson-plan"><strong>Lesson Plan</strong></a></p><!--kg-card-begin: html--><small>
    <em>
    	Header image credit:
    	<a href="https://unsplash.com/@tvick?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Taylor Vick</a>
    </em>
</small><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Security Lesson 4: Play Safer Online]]></title><description><![CDATA[Browse the Internet without getting Attacked
The average user is most vulnerable when they're browsing the internet. It is too easy to make decisions that can compromise your security and provide attackers valuable advantages.]]></description><link>https://sec.terminusfoundry.com/lesson-4/</link><guid isPermaLink="false">608493b1c56c9d1d25b0a342</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Devon Sydney]]></dc:creator><pubDate>Wed, 17 Feb 2021 21:14:00 GMT</pubDate><media:content url="https://sec.terminusfoundry.com/content/images/2021/04/image-12-1.png" medium="image"/><content:encoded><![CDATA[<h2 id="browse-the-internet-without-getting-attacked">Browse the Internet without getting Attacked</h2><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-12-1.png" alt="Security Lesson 4: Play Safer Online"><p>The average user is most vulnerable when they&apos;re browsing the internet. It is too easy to make decisions that can compromise your security and provide attackers valuable advantages. Let&apos;s make better decisions together.</p><hr><h2 id="secure-browsing-with-https">Secure Browsing with <code>https://</code></h2><p>Websites start with either <code>http://</code> or <code>https://</code>. If the &apos;s&apos; is missing, your traffic is unencrypted and open to attackers! This could be because the website forgot to implement https, didn&apos;t have time, didn&apos;t care about security, or simply made a mistake. <strong><em>Never</em> submit information to a site that doesn&apos;t have https.</strong> You can also protect yourself further by installing <a href="www.eff.org/https-everywhere">HTTPS Everywhere</a>, a browser extension that attempts to use https even on sites that were setup for http. Note that it makes an attempt but doesn&apos;t work on every single website.</p><hr><h2 id="accessing-the-internet">Accessing the Internet</h2><h3 id="wifi-at-home">WiFi at Home</h3><p>Most people just set up their WiFi at home without a password, or leave it with the default. This is dangerous and exposes your WiFi to be logged into from anyone. They can redirect traffic to their own devices and collect your personal information. Malicious actors will drive down streets looking for vulnerable WiFi networks.</p><p>Your <strong>router</strong> is the device with antennae you got from your internet provider, and is where you can protect yourself.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://images.unsplash.com/photo-1516044734145-07ca8eef8731?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlcnxlbnwwfHx8fDE2MTkzNzY0NjQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" class="kg-image" alt="Security Lesson 4: Play Safer Online" loading="lazy" width="4912" height="3264" srcset="https://images.unsplash.com/photo-1516044734145-07ca8eef8731?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlcnxlbnwwfHx8fDE2MTkzNzY0NjQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=600 600w, https://images.unsplash.com/photo-1516044734145-07ca8eef8731?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlcnxlbnwwfHx8fDE2MTkzNzY0NjQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1000 1000w, https://images.unsplash.com/photo-1516044734145-07ca8eef8731?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlcnxlbnwwfHx8fDE2MTkzNzY0NjQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1600 1600w, https://images.unsplash.com/photo-1516044734145-07ca8eef8731?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlcnxlbnwwfHx8fDE2MTkzNzY0NjQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2400 2400w" sizes="(min-width: 720px) 720px"><figcaption>Router image by <a href="https://unsplash.com/@extaf_ms?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Misha Feshchak</a></figcaption></figure><p>The default passwords to access routers <a href="https://www.softwaretestinghelp.com/default-router-username-and-password-list/">are often published online</a>, and most of them are just <code>admin</code> or <code>password</code>, so it is <strong>very </strong>easy to guess your way into a router that hasn&apos;t been properly secured. Take these steps right now:</p><ul><li>Change the username and password you use to log onto your WiFi (<strong>absolute</strong> minimum)</li><li>Change the <code>admin</code> or <code>root</code> password that accesses and modifies your router settings</li><li>Add a separate <code>guest</code> account with a different username and password</li><li>Ensure the device is using at least <code>WPA2</code> encryption (not <code>WEP</code> or <code>WPA</code>)</li><li>Add the passwords above to your password manager you set up in <a href="../lesson-3">Lesson 3</a></li></ul><p>The bonus is you can now choose a fun usernames like <code>wutangwifi</code> and passwords like <code>ghostdogsamurai</code> <strong>and </strong>you&apos;re being way more secure. Way easier than the random string of characters that came with your router you have to dig out every time someone needs WiFi, right?</p><p>To do everything above, you just <a href="https://www.techradar.com/broadband/how-to-change-your-router-password">need to log into the router</a>. You can do this from your phone or laptop, and it should only take a few minutes. The information you need will be printed on the side of the router. If not, just google the &apos;model number&apos; and &apos;change passwords&apos; into Google to find a guide.</p><h3 id="wifi-in-public-places">WiFi in Public Places</h3><p>When accessing public WiFi networks you are only as secure as the people who set up the network made you. It&apos;s also more dangerous because there will be many more people already in the same network. Think of the places caf&#xE9;s &amp; coffee shops, libraries, restaurants, anywhere you may log into private accounts or enter information. The most classic one is logging in to check your banking information at a coffee shop.</p><p><strong>Some things that attackers can do:</strong></p><ul><li>if there is unencrypted traffic (such as <code>http</code>) they can access the actual information being entered like credit card numbers or usernames and passwords - <strong>be especially diligent that sites use <code>https</code> in public</strong></li><li>see what sites you access (like which email or bank) to make guesses and start more advanced identity attacks</li><li>in some cases they could directly access your machine - this is far more difficult though</li></ul><p>To protect yourself you should make use of a VPN, which we&apos;ll get into a bit below.</p><h3 id="vpns-virtual-private-networks">VPNs (Virtual Private Networks)</h3><p>A <a href="http://en.wikipedia.org/wiki/Virtual_private_network">VPN</a> can be thought of as a network of computers used to connect to remote sites. The VPN secures your internet connection to ensure that most (but not all) data you&#x2019;re sending and receiving is encrypted and safe from attackers.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://images.unsplash.com/photo-1598946114829-162ee19ac506?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlciUyMGJsYWNrfGVufDB8fHx8MTYxOTM3NjQ0NQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" class="kg-image" alt="Security Lesson 4: Play Safer Online" loading="lazy" width="6000" height="4000" srcset="https://images.unsplash.com/photo-1598946114829-162ee19ac506?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlciUyMGJsYWNrfGVufDB8fHx8MTYxOTM3NjQ0NQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=600 600w, https://images.unsplash.com/photo-1598946114829-162ee19ac506?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlciUyMGJsYWNrfGVufDB8fHx8MTYxOTM3NjQ0NQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1000 1000w, https://images.unsplash.com/photo-1598946114829-162ee19ac506?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlciUyMGJsYWNrfGVufDB8fHx8MTYxOTM3NjQ0NQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1600 1600w, https://images.unsplash.com/photo-1598946114829-162ee19ac506?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHJvdXRlciUyMGJsYWNrfGVufDB8fHx8MTYxOTM3NjQ0NQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2400 2400w" sizes="(min-width: 720px) 720px"><figcaption>Browsing with a VPN by <a href="https://unsplash.com/@lagopett?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Petter Lagson</a></figcaption></figure><p>There are <strong>many </strong>VPN providers to choose from. Most cost money but there are some free. A popular and easy-to-use free choice is <a href="https://www.tunnelbear.com/">TunnelBear</a>. A popular paid choice is <a href="https://www.expressvpn.com/">ExpressVPN</a>. Do your own research. There are many considerations like the level of security and encryption, how many logs are kept on users, and how likely those logs will be handed over to the authorities if they suspect illegal usage.</p><p>VPNs can provide nice advantages beyond security, like watching that Netflix show that&apos;s blocked in the country you&apos;re on vacation in. Note however that content providers are working to block this sort of usage so there&apos;s no guarantee the VPN will work. The use of VPNs was also one of the key security tools used to help journalists and dissidents during the Arab Spring anonymously communicate.</p><p>VPNs are not a perfect tool and have flaws. You should still <strong>always use a VPN when entering or viewing private information on public networks</strong>.</p><h3 id="krack-wifi-vulnerability">KRACK WiFi Vulnerability</h3><p>Unfortunately, a major vulnerability was found in WiFi WPA2 encryption back in 2016 called <a href="https://en.wikipedia.org/wiki/KRACK">KRACK (Key Reinstallation Attack)</a>. This is a serious vulnerability and means even <code>wpa2</code> protections we set above can be bypassed, allowing attackers to intercept sent and received data. Ultimately all router providers must update their software to protect against these attacks, but you can protect yourself by keeping your devices updated like we learned in <a href="../lesson-2">Lesson 2</a>. Advanced users may want to google their &apos;router model KRACK protection&apos; to see if there are settings they can opt for more security.</p><hr><h2 id="blocking-trackers-and-ads">Blocking Trackers and Ads</h2><p>There are many entities that want your private information online. The most common one is advertisers. The reason Google is valued at more than <strong>$1.5 trillion</strong> and Facebook over <strong>$850 billion</strong> is that they have an amazingly high quality product for their primary customer; no, not you the user, but <strong>advertisers</strong>. Others like insurance providers also want your data so they can guess risks about you and charge higher premiums. You can do a lot to protect yourself against advertisers.</p><ul><li>One, you can <strong>remove ads</strong> <strong>from your life</strong> by using ad blockers. This also makes the internet way less stressful and overwhelming of a place to be.</li><li>Two, you can <strong>reduce the amount of information they can collect</strong> through your browser by using tracking protections.</li></ul><h3 id="ad-blockers">Ad Blockers</h3><p>Add an ad blocker to have a much cleaner and crisper experience online, and avoid being manipulated by advertisers. Some can even block ads in youtube videos. Two popular choices that I use are <a href="https://adblockplus.org/">Adblock Plus</a> (also has a mobile browser app, note this is unrelated to the similarly named AdBlock) and <a href="https://github.com/gorhill/uBlock">uBlock Origin</a> (which is optimized for high performance, note this is unrelated to uBlock.org).</p><blockquote>Note: Confusingly, Adblock Plus is unrelated to the similarly named AdBlock and uBlock Origin is unrelated to uBlock.</blockquote><p>Go ahead and install one or more ad blockers on your browser and also mobile device. Note that running ad blocking can slow down your machine a bit so if this is a problem try out a different one. There are many choices, check out this <a href="https://www.tomsguide.com/round-up/best-adblockers-privacy-extensions">Tom&apos;s Guide</a> article to help decide which one you want to use.</p><h3 id="protections-against-trackers">Protections Against Trackers</h3><p>Beyond just blocking ads there are browser extensions that can prevent companies from tracking your browsing online. The most common method trackers use are <strong><a href="https://en.wikipedia.org/wiki/HTTP_cookie">cookies</a></strong>, basically little text files a website stores on your machine. Now companies use sneakier <strong><a href="https://en.wikipedia.org/wiki/Web_beacon">web beacons</a></strong> like Facebook Pixel, a little invisible pixel that loads on sites without you knowing but allows Facebook to know you went there, <strong>even if you&apos;re not logged in </strong>to Facebook.</p><p>These attacks can be blocked by browser extensions like <a href="https://www.ghostery.com/ghostery-browser-extension/">Ghostery</a> and <a href="https://disconnect.me/disconnect">Disconnect</a> (which also has an iOS app). Add one now!</p><p><strong><strong><strong><strong>Proceed</strong></strong></strong></strong> to <a href="../lesson-5"><strong>Lesson 5: Don&#x2019;t Lose Your Memories</strong></a></p><p><strong><strong>Back</strong></strong> to the <a href="../lesson-plan"><strong>Lesson Plan</strong></a></p><!--kg-card-begin: html--><small>
    <em>
    	Header image credit:
    	<a href="https://www.flickr.com/photos/yusamoilov/13792583873">Yuri Samoilov</a>
    </em>
</small><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Security Lesson 3: Passwords Be Gone]]></title><description><![CDATA[Become an Authentication Ninja and fight off hackers! Remembering long, strong, unique passwords for every single site sucks. Enter password managers. A lesson to get up and running with a password manager, 2-factor and backup codes. No longer need to remember a pile of annoying and weak passwords.]]></description><link>https://sec.terminusfoundry.com/lesson-3/</link><guid isPermaLink="false">60848e6dc56c9d1d25b0a30a</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Devon Sydney]]></dc:creator><pubDate>Tue, 02 Feb 2021 22:35:00 GMT</pubDate><media:content url="https://sec.terminusfoundry.com/content/images/2021/04/1_qU0Tn9S0E4rsIRJ6KjGROg.jpeg" medium="image"/><content:encoded><![CDATA[<h2 id="become-an-authentication-ninja-to-fight-off-hackers">Become an Authentication Ninja to fight off hackers!</h2><img src="https://sec.terminusfoundry.com/content/images/2021/04/1_qU0Tn9S0E4rsIRJ6KjGROg.jpeg" alt="Security Lesson 3: Passwords Be Gone"><p><strong><strong>Authentication</strong></strong> is the process of confirming you really are the person that should be let into an account. The common way online is with a username and password. But remembering long, strong, unique passwords for every single site? Come on, that&#x2019;s insane!! Fear not, enter <strong><strong>password managers</strong></strong>. By the end of this lesson, you&#x2019;ll be up and running with a password manager, 2-factor and backup codes, and will no longer have to remember a pile of annoying and weak passwords.</p><blockquote><em><em>This lesson is longer than the previous ones. The big payoff is no longer needing to remember passwords <strong>makes life way more convenient!</strong></em></em></blockquote><hr><h2 id="concepts">Concepts</h2><h3 id="password-managers">Password Managers</h3><p><em><em>So what is a password manager?</em></em> It&#x2019;s an encrypted <strong><strong>vault</strong></strong> of all your other passwords. <em><em>But what does that mean?</em></em> You take one (really, really strong) <strong><strong>master password</strong></strong>, and use that password to encrypt (garble) all your other passwords. That way, <strong><strong>even if</strong></strong> your password vault is stolen, nobody will be able to read any of your passwords without your master password.</p><p>Secondly (and arguably more important) password managers make life online more <strong><strong>convenient and easy.</strong></strong> They can:</p><ul><li>make random, long, strong passwords for you so you don&#x2019;t have to spend brainpower</li><li>log you into your accounts with a the click of a button without even having to type in the website</li><li>auto-complete forms for you like credit card info and addresses.</li></ul><p><strong><strong>Trust me</strong></strong>, once you&#x2019;ve got one set up it is so worth it for these reasons alone. The added security becomes just a mega bonus.</p><h3 id="what-makes-a-good-master-password">What makes a good master password?</h3><p>It should be obvious that your master password should be by far the <strong><strong>strongest</strong></strong> password you&#x2019;ve ever made. Quick review of what makes one strong:</p><ul><li><strong><strong>REALLY</strong></strong> long (not kidding, I&#x2019;m talking <strong><strong>at LEAST</strong></strong> 25 characters)</li><li><strong><strong>easy</strong></strong> and <strong><strong>fast to enter</strong></strong> (on both phones and computers)</li><li><strong><strong>not just dictionary words</strong></strong> (either throw in a fake word that means something only to you, something in a different language, or break words in half with numbers)</li></ul><p>The Computerphile video below is a much deeper look at how a hacker could break your password. Many of the discussion points are covered in this post so watching isn&apos;t required.</p><figure class="kg-card kg-embed-card kg-card-hascaption"><iframe width="200" height="113" src="https://www.youtube.com/embed/3NjQ9b3pgIg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><figcaption><strong>LONG VIDEO WARNING!</strong> Only watch if you&apos;re really interested, it isn&apos;t required.</figcaption></figure><h3 id="2-factor-and-backup-codes">2-Factor and Backup Codes</h3><p>As we learned in <a href="../lesson-1">Lesson 1</a>, 2-factor (or multi-factor) authentication makes it so that you need your password (1st factor) <strong><strong>AND</strong></strong> a one-time random code (2nd factor) to get into your account. This lesson is a really nice and efficient time to turn on 2-factor for every account that allows it, since you&#x2019;ll have to log into all your accounts anyways.</p><p>When setting up 2-factor, most sites also offer you the chance to download <strong><strong>backup codes</strong></strong>. These can be thought of as <strong><strong>one-time-use 2-factor codes</strong></strong>, and are designed for when you can&#x2019;t get your 2-factor code another way. This could be when you&#x2019;re travelling and can&#x2019;t receive a text message code, or if you&#x2019;ve just lost your phone and need to get into the accounts to set up 2-factor on your new phone, or if you&#x2019;re logging into a public machine one time.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-11.png" class="kg-image" alt="Security Lesson 3: Passwords Be Gone" loading="lazy" width="447" height="179"><figcaption>Example backup codes (not mine, so don&#x2019;t even try!)</figcaption></figure><p>Where will you store these codes? You can write a few backup codes down for travel, or give them to a friend or family member to help you in case you ever get locked out. Each backup code <strong><strong>can only be used once</strong></strong>, so if you ever use them all up, you have to generate new ones from inside your account security settings. Since a password manager can also be used to store backup codes, this lesson will be a good time to generate them.</p><h3 id="emergency-recovery">Emergency Recovery</h3><p>A password manager makes it harder to get into your stuff when you lose or can&#x2019;t access your devices. This is by design, but it&#x2019;s still worth thinking about ahead of time in the tiny chance you need to recover your password manager in an emergency.</p><p>What if you&#x2019;re travelling and you lose ALL of your devices at once (think about a theft, or lost baggage, a fire, water damage), what steps would you do to get back into your email or your bank account, or to send a message to your family that you&#x2019;re safe, or anything else of importance? Less stressfully, what if you need to login to someone else&#x2019;s device where you don&#x2019;t want to install your password manager (say to log into a shared Netflix family account, or to log into a PlayStation that can&#x2019;t install a password manager)?</p><p>If you need to get into any accounts without your password manager, those passwords should <strong><strong>NOT</strong></strong> be generated by the password manager. Instead use the techniques in <a href="../lesson-1">Lesson 1</a> to make long, unique and easy to remember passwords. Still store them in your password manager, but also store them in your brain. Even for these easier-to-remember passwords, if the account has 2-factor authentication, you may also need to have your backup codes to get past the 2-factor step. In this case you could have them written down somewhere safe, and keep them with you (hidden) when you travel.</p><blockquote><em><em>Technical Note: Some services may ONLY offer 2-factor authentication using text messages (that is, no authenticator app or backup codes). This means you must be able to receive text messages while travelling to be able to get into your account, or else you have to turn off 2-factor before you leave. Of course, this comes with its own risks.</em></em></blockquote><p>The point of this thought experiment is to make sure you understand how to get back into your password vault. In the case of BitWarden, which is covered in this lesson, your password vault is stored in their cloud and doesn&#x2019;t require 2-factor by default, so as long as you have internet and your master password, you can get in. But others may have set up a vault locally, or in Dropbox, or have set up 2-factor for their password manager. All of these offer more security, but this security also make it harder to get in, so make sure you have the information to do it in an emergency.</p><p>Now that we&#x2019;ve covered all the basic concepts, let&#x2019;s get going!</p><hr><h2 id="become-an-authentication-ninja">Become an Authentication Ninja</h2><p>You&#x2019;ll need to carve off a big chunk of focused time for this lesson. Depending on how many accounts you have it could take a whole evening. But it&#x2019;s like ripping off a bandaid; once it&#x2019;s done it&#x2019;s <strong>done forever</strong>. No spring cleaning on this one.</p><p>I recommend doing this one-time setup on a laptop, not a phone, as it would be significantly harder without a full keyboard and larger screen.</p><h3 id="bitwarden-%E2%80%94-password-manager-of-choice">BitWarden &#x2014; Password Manager of Choice</h3><p>This lesson will focus on the password manager <a href="https://bitwarden.com/">BitWarden</a>. It is <strong>free</strong>, <strong>secure</strong> and <strong>easy to use</strong>, so is my go-to when getting people started. It has highly trusted security, their code is completely open-source so the public can review it to ensure it is safe, they get third party audits of their technology, and are recommended by the very hard to please <a href="https://www.privacytools.io/">privacytools.io</a>.</p><p>BitWarden (like any cloud-based password manager) stores your garbled up passwords in their cloud, but they <strong>NEVER </strong>need to even see your master password. This means your passwords will not be compromised <strong><strong>even if</strong></strong> they have a security breach and hackers download your password vault. </p><p>The side-effect of Bitwarden not knowing your master password is that if you ever forget it, you will have to delete your account and manually reset <strong><strong>ALL</strong></strong> of your passwords, so <strong><strong>DON&#x2019;T FORGET IT! </strong></strong>See more details on how this works for BitWarden <a href="https://bitwarden.com/help/article/forgot-master-password/">here</a>.</p><p>My lesson builds off components of the <a href="https://bitwarden.com/help/">BitWarden help centre</a>. Much greater detail can be found there if you get stuck.</p><blockquote><em><em>I do NOT have a relationship with </em>BitWarden<em>.</em> In fact, I used to recommend <a href="https://www.lastpass.com/">LastPass</a> until they removed key features from their free plan. You can see that previous guide <a href="../lastpass">archived here</a>.</em><br><br><em>F<em>eel free to check out <a href="https://www.tomsguide.com/us/best-password-managers,review-3785.html" rel="noopener nofollow">other popular password managers</a>, like </em><a href="https://www.keepersecurity.com/">Keeper</a>, <em><a href="https://www.dashlane.com/" rel="noopener nofollow">DashLane</a> &amp; <a href="https://1password.com/" rel="noopener nofollow">1Password</a>. </em>Whatever you choose, <em>make sure you understand the pricing model and that it has trusted security (namely they never require you to send them your master password).</em></em></blockquote><h3 id="getting-set-up">Getting Set Up</h3><p>BitWarden setup is easy. Just go to <a href="https://bitwarden.com/">their site</a> and click the <strong><a href="https://vault.bitwarden.com/#/register"><strong>Get </strong>Started</a></strong> button in the top right. This will get you set up with a new account and your password <strong>Vault</strong>.</p><p>The password to this account is your master password, so remember to <a href="../lesson-1"><strong>make it</strong> <strong><strong>crazy strong</strong></strong></a><strong><strong>!! </strong></strong>If someone is helping you with this lesson, you should change your master password once it&#x2019;s all done. You should be the <strong><strong>only</strong></strong> person that knows your master password, even loved ones don&#x2019;t count. Go ahead and set up your account now. Once set up you&apos;ll have to click the verification link in your email too.</p><blockquote><em><em>If you plan to fully complete this lesson right now, you may want to make your master password shorter for now, get set up, and then make it strong. But DON&#x2019;T leave it weak!!! <strong><strong>DO THIS AT YOUR OWN RISK!!</strong></strong></em></em></blockquote><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-23.png" class="kg-image" alt="Security Lesson 3: Passwords Be Gone" loading="lazy" width="1381" height="1383" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-23.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-23.png 1000w, https://sec.terminusfoundry.com/content/images/2021/04/image-23.png 1381w" sizes="(min-width: 720px) 720px"><figcaption><a href="https://bitwarden.com/help/article/create-bitwarden-account/">https://bitwarden.com/help/article/create-bitwarden-account/</a></figcaption></figure><h3 id="download-browser-extension">Download Browser Extension</h3><p>From the <a href="https://bitwarden.com/download/">download page</a>, add your browser extension of choice. This will allow BitWarden to save and retrieve passwords as you need. Once installed you&apos;ll see a gray Vault icon to the right of your address bar. Click it and log in with your email and master password and it will turn blue.</p><h3 id="saving-a-password-to-the-vault">Saving A Password to the Vault</h3><p>Now that you&#x2019;re all set up, just pick any account you already have and go to the login page. Fill in your username and password and log in. BitWarden will <a href="https://bitwarden.com/help/article/getting-started-browserext/">pop up with a banner</a> offering to save your password. Click Yes and the website, username and password will be saved to your vault. </p><figure class="kg-card kg-image-card"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-24.png" class="kg-image" alt="Security Lesson 3: Passwords Be Gone" loading="lazy" width="853" height="181" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-24.png 600w, https://sec.terminusfoundry.com/content/images/2021/04/image-24.png 853w" sizes="(min-width: 720px) 720px"></figure><h3 id="generate-a-stronger-password">Generate a Stronger Password</h3><p>Now that you&#x2019;re logged into that account, go ahead and change the password. On the change password page, instead of thinking of a new password, click the <strong>Vault</strong> button in your browser bar then click the <strong>Generator</strong> button (with the two arrows in a cirlce) to use the password generator. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-26.png" class="kg-image" alt="Security Lesson 3: Passwords Be Gone" loading="lazy" width="1448" height="1218" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-26.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-26.png 1000w, https://sec.terminusfoundry.com/content/images/2021/04/image-26.png 1448w" sizes="(min-width: 720px) 720px"><figcaption>BitWarden Password Generator</figcaption></figure><p>I recommend cranking the <code>Length</code> to at least 30 characters, and keeping all the options checked. Some sites have &#x2018;maximum length&#x2019; passwords <em><em>(shame on them!)</em></em> and restrict special characters, so in these cases you&#x2019;ll just have to change the settings to work on that site. One you&apos;re ready click <code>Copy Password</code>. Use your brand-new, strong, unique password to reset the password for the site you&apos;re on. BitWarden should notice and offer to update your password in the Vault. If it doesn&apos;t, search the Vault for the password and update it on your own with the password you just copied.</p><p>You can also quickly generate a password with your most recent settings by right-clicking anywhere in your browser and selecting <code>BitWarden &gt; Generate Password (copied)</code></p><h3 id="save-backup-codes">Save Backup Codes</h3><p>Since you&#x2019;re in your account settings anyways, you should generate backup codes if they are offered and save them in BitWarden. Simply edit the site and copy your backup codes into the <code>Custom Fields</code> section as a &quot;hidden field&quot;. Remember they are one time use so if you ever use one you should erase it here to avoid confusion later.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-29.png" class="kg-image" alt="Security Lesson 3: Passwords Be Gone" loading="lazy" width="818" height="446" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-29.png 600w, https://sec.terminusfoundry.com/content/images/2021/04/image-29.png 818w" sizes="(min-width: 720px) 720px"><figcaption>fake codes again, so don&apos;t bother trying them</figcaption></figure><h3 id="security-question-answers">Security Question Answers</h3><p>You can also use Custom Fields to save the answers to the <strong>security questions</strong> that some sites enforce like &quot;What was your mother&apos;s maiden name?&quot; And don&apos;t use your real mother&apos;s maiden name as that is easy for hackers to figure out! Simply generate another password and store that.</p><h3 id="turn-on-2-factor-authentication-2fa-for-this-site">Turn on 2-factor authentication (2fa) for this site</h3><p>This is also a good time to turn on 2fa with text messages if you haven&apos;t already. Do this for all accounts it&apos;s offered on, but especially sensitive ones like email, banking and work accounts.</p><h3 id="now-rip-that-bandaid-off">Now Rip that Bandaid Off!</h3><p>This is where we start the real big task. You now need to find ALL your accounts, and use BitWarden to generate new passwords, which will be stored in your password vault. It can be really daunting to try to remember all of the accounts you have online, so here are some tricks:</p><ul><li><strong><strong>look in the </strong></strong><a href="https://support.apple.com/kb/PH20093?locale=en_US" rel="noopener nofollow"><strong>Keychain</strong></a><strong><strong> app on your Mac:</strong></strong> this app collects many of the username and passwords you use on your laptop</li><li><strong><strong>browser saved passwords:</strong></strong> many internet browsers save your passwords (links for <a href="https://support.google.com/chrome/answer/95606" rel="noopener nofollow">Chrome</a>, <a href="https://support.apple.com/en-ca/guide/safari/passwords-preferences-sfri40599/mac" rel="noopener nofollow">Safari</a>, <a href="https://support.mozilla.org/en-US/kb/security-and-passwords-settings" rel="noopener nofollow">Firefox</a>)</li><li><strong><strong>search your email:</strong></strong> search for emails with a subject with &#x2018;Welcome&#x2019; in them, or search the word &#x2018;password&#x2019; in your email, which will give you a pretty good list of many of the sites you&#x2019;ve signed up for</li></ul><p>If you&#x2019;ve forgotten any passwords, that&#x2019;s ok, you&#x2019;ll just have to request a password reset.</p><p>For each account, rinse and repeat the following:</p><ol><li><strong><strong>Log in </strong></strong>to the account and add it to BitWarden</li><li><strong><strong>Update</strong></strong> the password with a <strong><strong>strong, generated one</strong></strong><br>(<em><em>the only exception is your master recovery email, which you should leave as the one you made in </em></em><a href="https://medium.com/@devonsydney/3d50177959a1" rel="noopener"><em><em>Lesson 1</em></em></a><em><em>, </em>which may be good to leave as a passphrase you can remember in case you ever need to access it while unable to access BitWarden<em>)</em></em></li><li>Turn on <strong><strong>2-</strong>f<strong>actor authentication</strong></strong> (if available)</li><li>Copy your <strong><strong>backup codes</strong></strong> into the &#x2018;Custom Fields&#x2019; of the site</li></ol><blockquote><em><em>(four hours later) </em></em>Phew!!! That wasn&#x2019;t too bad was it?</blockquote><h3 id="set-up-2fa-on-bitwarden-but-with-warning">Set up 2fa on BitWarden [But With Warning]</h3><p>The <strong>final recommended step</strong> is to add <a href="https://bitwarden.com/help/article/bitwarden-field-guide-two-step-login/#securing-bitwarden">2fa on BitWarden itself</a>. &#xA0;With 2fa even if someone gets your master password you will still be protected. BitWarden has ALL your passwords, so I recommend you take this step, however there is a very important warning below you must understand before proceeding. Read it several times.</p><blockquote><strong>WARNING: </strong>If you set up 2fa, then lose your 2-factor device in the future, you <strong>must</strong> provide your recovery code to be able to regain access to BitWarden. Since BitWarden <strong>does not store </strong>your master password or your recovery code, they cannot help you unlock your account otherwise. This is by design, for your safety. <a href="https://bitwarden.com/help/article/lost-two-step-device/">More information is here.</a></blockquote><p>Ok, if you understand that and promise to protect the recovery code, go ahead and set up 2fa. The recovery code should look like this:</p><figure class="kg-card kg-image-card"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-31.png" class="kg-image" alt="Security Lesson 3: Passwords Be Gone" loading="lazy" width="690" height="294" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-31.png 600w, https://sec.terminusfoundry.com/content/images/2021/04/image-31.png 690w"></figure><p>You must save and store this code outside BitWarden and <strong>never lose it</strong>. Do <strong>not</strong> even think of turning on 2fa if you think you may lose this code. <a href="https://bitwarden.com/help/article/two-step-recovery-code/">More info on the recovery code is here</a>.</p><h3 id="welcome-to-a-new-and-better-world">Welcome to a New and Better World</h3><p>Now whenever you go to a site, if you&#x2019;re logged into BitWarden, your info will be automatically entered. If not, the shortcut key is <code>ctrl+shift+L</code> (Windows) and <code>cmd+shift+L</code> (Mac) for autofill.</p><p><strong>Nice<strong>!</strong></strong> If you want to go to a site, instead of typing it into your browser, search it in your Vault, click it, and it will navigate to the site and log you in. <strong><strong>Sweet!</strong></strong> Whenever you want to sign up for a new site, add it in BitWarden, use the Generator, and start from day one with a strong password. <strong><strong>Awesome!</strong></strong></p><p>If a site doesn&#x2019;t autofill properly for whatever reason, you can click the Vault and manually copy/paste the information into the login page. It also just might be that the site didn&#x2019;t save enough information, so you can edit the entry in the Vault to fix it.</p><h3 id="using-bitwarden-on-mobile-devices">Using BitWarden on Mobile Devices</h3><p>Now that you&#x2019;re all setup on your laptop, <a href="https://bitwarden.com/download/"><a href="https://bitwarden.com/download/">download the BitWarden app</a></a> for your mobile device. Download the app, and simply log in with the same email and master password. Everything will then sync, that easy.</p><p>BitWarden works slightly differently on each device, so I recommend skimming their <a href="https://bitwarden.com/help/article/getting-started-mobile/">guides for Android and iOS</a>. It&apos;s worth going through the extra steps to make sure Autofill is working properly for your convenience.</p><h3 id="security-clean-up">Security Clean Up</h3><p>Remember when we used the list of saved passwords in Chrome or another browser to find out what accounts we had? That&#x2019;s a REALLY BAD place to store passwords. So let&#x2019;s go back in there, and turn off the feature that even offers to save passwords (we&#x2019;re better than that now). Also, delete all the ones it&#x2019;s saved from our old life pre-BitWarden. This includes text files or Excel sheets you had with all your passwords stored before.</p><h3 id="bonus-bitwarden-features">Bonus BitWarden Features</h3><p>BitWarden has plenty of other features you may be interested in:</p><ul><li><a href="https://bitwarden.com/help/article/managing-items/">Other Items</a>: BitWarden can store more than just logins. It also stores Cards, Identities and Secure Notes, and is more secure than storing them in your browser. You could even store your driver&apos;s license, passport and medical documents safely.</li><li><a href="https://bitwarden.com/help/article/auto-fill-card-id/">Auto-Fill Cards &amp; Identities</a>: BitWarden is a secure and convenient way of auto-filling credit card information, addresses and other form information to auto-fill it when you need it online.</li><li><a href="https://bitwarden.com/help/article/setup-two-step-login-authenticator/">2-factor via Authenticator</a>: BitWarden can generate 2fa codes for your sites so you don&apos;t need to receive text messages. This is a bit more advanced, so follow their guide carefully.</li><li><a href="https://bitwarden.com/help/article/about-send/">BitWarden Send</a>: Can be used to send information to anybody securely.</li></ul><p>Now that we&#x2019;re at the end, <strong><strong>make your master password strong</strong></strong> (if you had made a weak one to get through this). Also, if you have a security deposit box or a safe, it may be a place to store a printed version of your master password and recovery code if you feel you may ever forget it.</p><hr><h2 id="congratulations-you-are-now-an-authentication-ninja">Congratulations! You are now an Authentication Ninja.</h2><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://images.unsplash.com/photo-1605440190093-b67e90c96235?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fG5pbmphfGVufDB8fHx8MTYxOTM4NDYyMw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" class="kg-image" alt="Security Lesson 3: Passwords Be Gone" loading="lazy" width="4000" height="5000" srcset="https://images.unsplash.com/photo-1605440190093-b67e90c96235?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fG5pbmphfGVufDB8fHx8MTYxOTM4NDYyMw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=600 600w, https://images.unsplash.com/photo-1605440190093-b67e90c96235?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fG5pbmphfGVufDB8fHx8MTYxOTM4NDYyMw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1000 1000w, https://images.unsplash.com/photo-1605440190093-b67e90c96235?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fG5pbmphfGVufDB8fHx8MTYxOTM4NDYyMw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1600 1600w, https://images.unsplash.com/photo-1605440190093-b67e90c96235?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fG5pbmphfGVufDB8fHx8MTYxOTM4NDYyMw&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2400 2400w" sizes="(min-width: 720px) 720px"><figcaption>Ninja by <a href="https://unsplash.com/@9spart9?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Mojtaba Hosseinzade</a></figcaption></figure><blockquote>A reminder one more time, if you made your master password weak to get through this lesson, or if anyone else still knows it, RIGHT NOW is the time to make it strong, unique, and only known by you.</blockquote><p><strong><strong><strong><strong>Proceed</strong></strong></strong></strong> to <a href="../lesson-4"><strong>Lesson 4: Play Safer Online!</strong></a></p><p><strong><strong>Back</strong></strong> to the <a href="../lesson-plan"><strong>Lesson Plan</strong></a></p><!--kg-card-begin: html--><small>
    <em>
    	Header image credit:
    	<a href="https://www.flickr.com/photos/136807076@N07/24161819731">Peter Pham</a>
    </em>
</small><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Security Lesson 2: Protect Your Devices]]></title><description><![CDATA[Stop Thieves from Getting into your Phone and Computer. Your devices are your connection to the internet and the world. They’re also an easy way for hackers to gain access to your accounts. This is a quick lesson that applies to ALL your devices; your laptops, your phones, your tablets.]]></description><link>https://sec.terminusfoundry.com/lesson-2/</link><guid isPermaLink="false">60848dcdc56c9d1d25b0a2f4</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Devon Sydney]]></dc:creator><pubDate>Sat, 23 Jan 2021 22:31:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDE5fHxsb2NrfGVufDB8fHx8MTYxOTM4NTY1NQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<h2 id="stop-thieves-from-getting-into-your-phone-and-computer">Stop Thieves from Getting into your Phone and Computer</h2><img src="https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDE5fHxsb2NrfGVufDB8fHx8MTYxOTM4NTY1NQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="Security Lesson 2: Protect Your Devices"><p>Your devices are your connection to the internet and the world. They&#x2019;re also an easy way for hackers to gain access to your accounts. This is another quick lesson. Everything here applies to <strong><strong>ALL your devices</strong></strong>; your laptops, your phones, your tablets.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-5.png" class="kg-image" alt="Security Lesson 2: Protect Your Devices" loading="lazy" width="1280" height="720" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-5.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-5.png 1000w, https://sec.terminusfoundry.com/content/images/2021/04/image-5.png 1280w" sizes="(min-width: 720px) 720px"><figcaption><a href="https://www.flickr.com/photos/12375388@N08/31083977126/" rel="noopener nofollow"><em>&apos;Locked Android&apos; by Catalin Cimpanu</em></a></figcaption></figure><h2 id="passcode-locks">Passcode Locks</h2><p>It should be obvious, but all your devices should be locked with a passcode. This prevents a random person from just picking up your phone and going straight into any accounts that are attached to it. Most people have their primary email synced with their phone, which as we know is a gateway to all your other accounts.</p><figure class="kg-card kg-embed-card kg-card-hascaption"><iframe width="200" height="113" src="https://www.youtube.com/embed/FHexpeQEEw8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><figcaption>Way too long for anyone to practically use. And actually <strong>low security </strong>since they let it be filmed.</figcaption></figure><p><strong><strong>Do a mental check.</strong></strong> Is every device you own protected by a passcode or password? Are they decently long? 6 digits or characters is decent. If not, go set one right now.</p><p>Note that for some accounts (like your bank app) you can choose to add an extra passcode. This way if someone gets past your main phone passcode, they can&#x2019;t get into your bank afterwards.</p><h2 id="remote-lock-and-wipe">Remote Lock and Wipe</h2><p>Most devices have a feature to remotely access them. This means if they are lost you can find their location, de-activate them and erase information if need be.</p><ul><li><a href="https://myaccount.google.com/intro/find-your-phone" rel="noopener nofollow">Google / Android</a></li><li><a href="https://support.apple.com/en-ca/HT204756" rel="noopener nofollow">Apple / iPhone</a></li><li><a href="https://support.microsoft.com/en-us/account-billing/find-and-lock-a-lost-windows-device-890bf25e-b8ba-d3fe-8253-e98a12f26316" rel="noopener nofollow">Microsoft / Windows</a></li></ul><p>Make sure that all your devices are visible in the various remote access services, and understand how to use them in case something goes missing.</p><h2 id="keep-updated">Keep Updated!</h2><p>This is a major PSA. <strong><strong>Keep all your devices up to date!</strong></strong> The latest updates for each operating system are most often to cover up security flaws. Hackers know about these flaws and will use them to get into your system.</p><figure class="kg-card kg-embed-card kg-card-hascaption"><blockquote class="twitter-tweet"><p lang="en" dir="ltr">When you update your software, you are no longer a &#x201C;target of opportunity&#x201D; for cheap attacks that try to catch people running out-of-date software. <a href="https://t.co/lMgWRLN7sc">https://t.co/lMgWRLN7sc</a></p>&#x2014; EFF (@EFF) <a href="https://twitter.com/EFF/status/962387691101925376?ref_src=twsrc%5Etfw">February 10, 2018</a></blockquote>
<script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script>
<figcaption>The EFF (Electronic Frontier Foundation) knows what&apos;s up</figcaption></figure><p>There is a common belief that updates will slow down your device. In reality, updates are more likely to make your device faster. You are also better off clearing up space and uninstalling apps to speed up a device.</p><p>There is also a strange belief the updates bring bugs. They are actually intended to <strong><strong>fix</strong></strong> bugs, and the thought that they may introduce a new bug should be outweighed by the fact that they likely fix one or more real (and possibly serious) security holes.</p><blockquote><em><em>Clarity note: You do not have to upgrade to the latest version of an operating system (iOS 7 vs 8 vs 10). It is more important to have the latest updates for each version. For instance, you can still run iOS 7, but make sure to have the latest iOS 7 updates.</em></em></blockquote><h2 id="privacy-and-security-settings">Privacy and Security Settings</h2><p>Every device has a variety of privacy and security settings. It is worth going into those settings and making sure they make sense to your gut. Yes, it makes sense that Uber needs access to your location, but does that finance app really need access to your microphone and camera? If in doubt, turn off all the access for each program, and when you go to use it, the app will prompt when it needs to use each part of your phone.</p><h2 id="malware-and-viruses">Malware and Viruses</h2><p>Basic steps are necessary to protect against <strong>malware </strong>(malicious software). The most known form of malware are <strong>viruses</strong>, which replicate and spread across computers and through networks. There are many other types of malware including <strong>adware</strong>, <strong>spyware</strong>, <strong>botnets</strong>, <strong>Trojans</strong>, <strong>worms</strong>, <strong>rootkits </strong>and <strong>ransomware</strong>. All of them are designed to do something to you against your will, whether it be steal your data or money, crash or corrupt your computer, or even use your device for illegal activities.</p><p>Software to protect against malware is referred to as <strong>anti-malware</strong> or <strong>anti-virus</strong> software. All computers should have basic protective software running. Software that comes with your computer are <a href="https://www.microsoft.com/en-ca/windows/comprehensive-security">Windows Defender Antivirus</a> and <a href="https://www.howtogeek.com/217043/xprotect-explained-how-your-macs-built-in-anti-malware-works/#:~:text=To%20view%20this%20setting%2C%20click,the%20latest%20definitions%20from%20Apple.">Mac XProtect</a>. Make sure these are turned on on your devices in your system settings. They offer basic levels of protection, but are not quite enough.</p><p>For <strong>extra </strong>anti-malware protection, I recommend installing a third party anti-virus. There are <a href="https://www.tomsguide.com/us/best-antivirus,review-2588.html">many free and paid choices</a>. Excellent free choices are <a href="https://www.kaspersky.com/free-antivirus">Kaspersky Security Cloud Free</a> (Windows, Android, iOS) and <a href="https://www.bitdefender.com/solutions/free.html">Bitdefender Antivirus Free</a> (Windows, Mac, Android). So go ahead and install an anti-malware or anti-virus of choice on all your devices.</p><blockquote><strong>Note:</strong> Free is usually not really free, so beware of the risk of anti-virus companies <a href="https://www.pcmag.com/news/the-cost-of-avasts-free-antivirus-companies-can-spy-on-your-clicks">selling your data</a>. Best to understand their model and look for <strong>freemium</strong>, where the free services are simply a way to market and sell their paid plans.</blockquote><h2 id="encryption">Encryption</h2><p>When a device is not encrypted, it is shockingly easy for an attacker to get around your device password and access your data, simply by setting up a secret admin account. I have personally used this to help friends access their data when they&apos;ve forgotten their device password, which shocks them into using encryption. Encryption will protect your data unless you have the password, <strong>even if</strong> an attacker accesses your machine remotely or physically steals it from you.</p><p>For convenience, encryption is usually done with the same password you use to log into your machine, so make sure it&apos;s a <strong>strong</strong> password, <strong>protect it</strong>, and <strong>don&apos;t lose it</strong>!</p><p>On Mac, use <a href="https://support.apple.com/en-ca/HT204837">FileVault</a> to encrypt your machine, and can offer to store your encryption key in iCloud. On Windows, turn on encryption in <a href="https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838">Settings</a>.</p><blockquote><strong>Warning:</strong> If you encrypt your device and then lose the encryption key, your data will be lost with no way to retrieve it. So you may want to wait until after we have set up backups in <a href="../lesson-5">Lesson 5</a> to protect against this.</blockquote><h2 id="good-work-your-devices-are-now-protected">Good work, your devices are now protected!</h2><p>This was a quick lesson, but you have done <strong><strong>A LOT</strong></strong> to prevent attacks or stop them quickly.</p><p><strong><strong>Proceed</strong></strong> to <a href="../lesson-3"><strong>Lesson 3: Passwords Be Gone!</strong></a></p><p><strong><strong>Back</strong></strong> to the <a href="../lesson-plan"><strong>Lesson Plan</strong></a></p><!--kg-card-begin: html--><small>
    <em>
    	Header image credit:
    	<a href="https://unsplash.com/@franckinjapan?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Franck</a>
    </em>
</small><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Security Lesson 1: 10-Minute Quick Win!]]></title><description><![CDATA[No excuses, become safer than most people right now. Improve your security significantly with one action: make a strong, unique and easy-to-remember password with 2-factor authentication for your primary email. You will be WAY safer after doing this.]]></description><link>https://sec.terminusfoundry.com/lesson-1/</link><guid isPermaLink="false">60848c76f5499c120f935705</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Devon Sydney]]></dc:creator><pubDate>Sat, 09 Jan 2021 22:27:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1477039181047-efb4357d01bd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDZ8fHBhc3N3b3JkfGVufDB8fHx8MTYxOTM4NjIyOA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<h2 id="no-excuses-become-safer-than-most-people-right-now">No excuses, become safer than most people RIGHT NOW</h2><img src="https://images.unsplash.com/photo-1477039181047-efb4357d01bd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDZ8fHBhc3N3b3JkfGVufDB8fHx8MTYxOTM4NjIyOA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="Security Lesson 1: 10-Minute Quick Win!"><p>Do you have 10 minutes right now? Follow this quick lesson and you&#x2019;ll be <strong><strong>way safer </strong></strong>at the end of it.</p><p>This lesson is all about improving your security <strong><strong>significantly</strong></strong> with one action: making a <strong><strong>strong</strong></strong>, <strong><strong>unique</strong></strong> and <strong><strong>easy to remember</strong></strong> password with <strong><strong>2-factor authentication</strong></strong> for your <strong><strong>primary email</strong></strong>.</p><h2 id="why">Why?</h2><p>Your primary email is the one you use to sign up for other online accounts. If a hacker gets into this email they can easily request password resets for <strong><strong>ALL</strong></strong> your other accounts tied to this email (including your bank, your Facebook, your Dropbox and so on). They can reset the passwords for every site extremely quickly using scripts, and so this is the easiest hacking path to theft of your assets and your identity.</p><p><strong><strong>This is your most important account to protect.</strong></strong></p><h2 id="what-is-a-strong-unique-and-easy-to-remember-password">What is a Strong, Unique and Easy to Remember password?</h2><p>To begin, this web comic teaches us length is the main thing behind password strength. Note this comic is old and 1,000 guesses/second is really low these days, now it&#x2019;s more like a <a href="https://www.youtube.com/watch?v=7U-RbOKanYs" rel="noopener nofollow"><strong><strong>billion</strong></strong></a><strong><strong> or a trillion </strong></strong>guesses/second.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-4.png" class="kg-image" alt="Security Lesson 1: 10-Minute Quick Win!" loading="lazy" width="740" height="601" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-4.png 600w, https://sec.terminusfoundry.com/content/images/2021/04/image-4.png 740w" sizes="(min-width: 720px) 720px"><figcaption><a href="https://xkcd.com/936/" rel="noopener nofollow">https://xkcd.com/936/</a></figcaption></figure><p>Passwords like this are called passphrases. Hackers know about this method too, so they&#x2019;ll feed in common dictionaries to try to crack passphrases faster than shown in the comic. To protect against this, take it one step further, and throw a number into the middle of one word, or include a fake word that won&#x2019;t be in a dictionary, maybe from an inside joke. So &#x201C;correct<strong><strong>smorsie</strong></strong>batterystapl<strong><strong>9</strong></strong>e&#x201D; would be much harder to crack and still quite easy to remember, especially if you called horses &#x201C;smorsies&#x201D; as a kid (cute!).</p><p>Your email may also enforce capitals, numbers and symbols. To get by this, you could always add in a capital, number and symbol to every password in the same place. Let&#x2019;s say I always make the 2nd character capital, the 2nd last a 9, and then toss a # symbol at the end.</p><p>I&#x2019;m sitting in a coffee shop right now, with a sign that says &#x201C;A neon sign for Uncle Billy&#x201D; on the wall.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-3.png" class="kg-image" alt="Security Lesson 1: 10-Minute Quick Win!" loading="lazy" width="2000" height="1367" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-3.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-3.png 1000w, https://sec.terminusfoundry.com/content/images/size/w1600/2021/04/image-3.png 1600w, https://sec.terminusfoundry.com/content/images/size/w2400/2021/04/image-3.png 2400w" sizes="(min-width: 720px) 720px"><figcaption>Bonus tip: Phil and Sebastian is a great coffee shop from Calgary, Canada.</figcaption></figure><p>An effectively impossible to crack but easy to remember password would be &#x201C;aNeonsignforunclebill9y#&#x201D;. If your email doesn&#x2019;t enforce these rules, &#x201C;aneonsignforunclebilly&#x201D; would be also extremely strong (at least for now, before every written phrase is in a hacker database). So just pick a phrase that means something to only you, add a number, capital, symbol if you want and go change your primary email password, <strong><strong>RIGHT NOW</strong></strong>.</p><p>I&#x2019;ll wait.</p><p>Ok, done? Good.</p><h2 id="now-what-is-2-factor-authentication">Now, what is 2-Factor Authentication?</h2><p>What do people mean when they say 2-factor? All it means is that you need your <strong><strong>password</strong></strong> (1st factor) and a <strong><strong>one-time random code</strong></strong> (2nd factor) to get into your account. This one-time code is usually sent by text message to your phone. This means that if a hacker in another country gets your password, they <strong><strong>also</strong></strong> need your text messages to get in.</p><p>Major email providers have the option to turn on two-factor. Usually you just log in, find &#x2018;Security&#x2019; in the settings of the account, and find 2-factor authentication and turn it on. Then you&#x2019;ll receive a code by text, enter it to confirm it&#x2019;s you and boom, you&#x2019;re done.</p><p>Here are links to get set up for various services:</p><ul><li><strong><strong>Google/Gmail: </strong></strong><a href="https://www.google.com/landing/2step/" rel="noopener nofollow">https://www.google.com/landing/2step/</a></li><li><strong><strong>Microsoft/Hotmail/Live/Outlook:</strong></strong> <a href="https://support.microsoft.com/en-ca/help/12408/microsoft-account-about-two-step-verification" rel="noopener nofollow">https://support.microsoft.com/en-ca/help/12408/microsoft-account-about-two-step-verification</a></li><li><strong><strong>Apple/iCloud:</strong></strong> <a href="https://support.apple.com/en-ca/HT204915" rel="noopener nofollow">https://support.apple.com/en-ca/HT204915</a></li><li><strong><strong>Yahoo:</strong></strong> <a href="https://help.yahoo.com/kb/SLN5013.html" rel="noopener nofollow">https://help.yahoo.com/kb/SLN5013.html</a></li><li><strong><strong>Others:</strong></strong> <a href="https://authy.com/guides/" rel="noopener nofollow">https://authy.com/guides/</a></li></ul><p>Go and log into your primary email and set up 2-factor authentication, <strong><strong>RIGHT NOW</strong></strong>. Done? Great!</p><figure class="kg-card kg-image-card"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-2.png" class="kg-image" alt="Security Lesson 1: 10-Minute Quick Win!" loading="lazy" width="2000" height="1500" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-2.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-2.png 1000w, https://sec.terminusfoundry.com/content/images/size/w1600/2021/04/image-2.png 1600w, https://sec.terminusfoundry.com/content/images/size/w2400/2021/04/image-2.png 2400w" sizes="(min-width: 720px) 720px"></figure><h2 id="that%E2%80%99s-it">That&#x2019;s it!</h2><p>You are <strong><strong>WAY</strong></strong> safer now that you&#x2019;ve done this. I of course still recommend going through my entire lesson plan, but you should pat yourself on the back for taking at least this action.</p><p><strong><strong>Proceed</strong></strong> to <a href="../lesson-2"><strong>Lesson 2: Protect your Devices</strong></a></p><p><strong><strong>Back</strong></strong> to the <a href="../lesson-plan"><strong>Lesson Plan</strong></a></p><!--kg-card-begin: html--><small>
    <em>
    	Header image credit:
    	<a href="https://unsplash.com/@markusspiske?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Markus Spiske</a>
    </em>
</small><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Security Course Lesson Plan]]></title><description><![CDATA[This lesson plan balances pretty great security with something that people will actually do. I am even more of an efficiency nerd than a security nerd and do NOT want to add complexity or intrusion to your day. Security can be convenient. Hop in and start getting more secure right now.]]></description><link>https://sec.terminusfoundry.com/lesson-plan/</link><guid isPermaLink="false">60848875f5499c120f9356c2</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Devon Sydney]]></dc:creator><pubDate>Sat, 02 Jan 2021 22:18:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1557597774-9d273605dfa9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDUzfHxzZWN1cml0eXxlbnwwfHx8fDE2MTkzODYzNjA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1557597774-9d273605dfa9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDUzfHxzZWN1cml0eXxlbnwwfHx8fDE2MTkzODYzNjA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="Security Course Lesson Plan"><p>I am even more of an efficiency nerd than a security nerd and do NOT want to add complexity or intrusion to your day. I believe <strong><strong>security can be convenient</strong></strong>. Hop in below and start getting more secure right now.</p><h3 id="lesson-1-10-minute-quick-win"><a href="../lesson-1">Lesson 1: 10-minute Quick Win</a></h3><h3 id="lesson-2-protect-your-devices"><a href="../lesson-2">Lesson 2: Protect your Devices</a></h3><h3 id="lesson-3-passwords-be-gone"><a href="../lesson-3">Lesson 3: Passwords Be Gone!</a></h3><h3 id="lesson-4-play-safer-online"><a href="../lesson-4">Lesson 4: Play Safer Online</a></h3><h3 id="lesson-5-don%E2%80%99t-lose-your-memories"><a href="../lesson-5">Lesson 5: Don&#x2019;t Lose Your Memories</a></h3><h3 id="lesson-6-think-like-a-hacker"><a href="../lesson-6">Lesson 6: Think Like a Hacker</a></h3><h3 id="bonus-snowden-level-security"><a href="../bonus">Bonus: Snowden-Level Security</a></h3><h2 id="score-card">Score Card</h2><p>This scorecard will give you an idea of where you&#x2019;re at. You can <a href="https://sec.terminusfoundry.com/static/securityscorecard_1.0.1.pdf">download it</a>, print it and fill it out. If you don&#x2019;t understand something, give yourself a zero.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image-22.png" class="kg-image" alt="Security Course Lesson Plan" loading="lazy" width="1354" height="1759" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image-22.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image-22.png 1000w, https://sec.terminusfoundry.com/content/images/2021/04/image-22.png 1354w" sizes="(min-width: 720px) 720px"><figcaption><em><a href="https://sec.terminusfoundry.com/static/securityscorecard_1.0.1.pdf">Click here to download as PDF</a></em></figcaption></figure><blockquote><strong><strong>Fear mongering warning:</strong></strong> Working in technology, I am thinking about security risks <strong><strong>all the time</strong></strong>. Thankfully, this is not a mental burden on all of us, but I do care passionately. Trust me, the risks are real!<br><br>If these lessons look hard, fear not, just grab a techie that you <strong><strong>trust </strong></strong>(very important!!), and get them to go through the lessons with you.<br></blockquote><p>This lesson plan is my attempt at balancing <strong><strong>pretty great security</strong></strong> with something that <strong><strong>people will actually do</strong></strong>. I will try to continuously make this better, so feedback is appreciated!</p><p>Get started right now with <a href="../lesson-1"><strong>Lesson 1: 10-minute Quick Win!</strong></a></p><!--kg-card-begin: html--><small>
    <em>
    	Header image credit:
    	<a href="https://unsplash.com/@lianhao?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Lianhao Qu</a>
    </em>
</small><!--kg-card-end: html-->]]></content:encoded></item><item><title><![CDATA[Why Should I Care?]]></title><description><![CDATA[The most common response to talking about security and privacy is 'why should I care?' This post will answer that question for you.]]></description><link>https://sec.terminusfoundry.com/why/</link><guid isPermaLink="false">6084874af5499c120f935692</guid><category><![CDATA[Security]]></category><category><![CDATA[Privacy]]></category><dc:creator><![CDATA[Devon Sydney]]></dc:creator><pubDate>Sat, 02 Jan 2021 22:13:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1542107362-914757b935e1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDh8fGZlYXJ8ZW58MHx8fHwxNjE5NDA5NDkx&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1542107362-914757b935e1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDh8fGZlYXJ8ZW58MHx8fHwxNjE5NDA5NDkx&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="Why Should I Care?"><p>The most common response to talking about security and privacy is &apos;why should I care?&apos; This post will answer that question for you. If at any point you throw up your arms and are like <em>&#x2018;ok, I&#x2019;m scared already, and just want to start feeling safer!&#x2019;</em> feel free to <a href="../lesson-plan"><strong>jump ahead to the lesson plan</strong></a> and get started.</p><h2 id="the-scary-stuff-what-can-happen">The Scary Stuff (What Can Happen)</h2><p>When a hacker compromises your password, they can lock you out of your own account, and do any of the following:</p><ul><li><strong><strong>Steal your money! </strong></strong>&#x2014; this is way easier than you think</li><li><strong><strong>See and delete</strong></strong> everything you care about &#x2014; your messages, your photos, your documents, your memories</li><li><strong><strong>Use your identity</strong></strong> to send emails, sign up for services including loans, and use your private information to hijack others including your loved ones</li><li><strong><strong>Get into your other accounts</strong></strong> with the information from one account</li><li><strong><strong>Encrypt (garble) your data</strong></strong> and hold you hostage to have it decrypted (ungarbled)</li></ul><p>All of the evil deeds above can be run by hackers with scripts, which are just like mini downloadable apps. This makes it extremely fast and easy to hack many people at the same time with the click of a button.</p><h2 id="common-fallacies">Common Fallacies</h2><p>I find it can be easy to justify why you don&#x2019;t need to think about security. Here are the most common ways people convince themselves they&#x2019;re ok:</p><ul><li><em><em>&#x201C;There&#x2019;s nobody looking for me!&#x201D;</em></em> &#x2014; <strong><strong>WRONG:</strong></strong> Hackers attack indiscriminately, usually by first coming across your information in a compromised online account you have and then using that to get into other accounts.</li><li><em><em>&#x201C;I have nothing to hide, so I&#x2019;m not a target&#x201D;</em></em> &#x2014; <strong><strong>WRONG:</strong></strong> Even if you have nothing to hide, your private information (banking info, private convos, private documents) can be used to build up a false identity, steal your assets and create a world of nightmares that could cost thousands and stick with you your entire life.</li><li><em><em>&#x201C;I don&#x2019;t use my computer or phone for that much&#x201D;</em></em> &#x2014; <strong><strong>WRONG:</strong></strong> Unless you don&#x2019;t use the internet and have zero accounts with any private information, you are a target.</li><li><em><em>&#x201C;I have anti-virus, so I&#x2019;m ok&#x201D;</em></em> &#x2014; <strong><strong>WRONG:</strong></strong> Viruses are only one of many methods to hack you. There are social engineering tricks based on human psychology, phishing, security failures of systems you use and fraudulent companies to be worried about, just to name several.</li><li><em><em>&#x201C;My bank locks out after 3 failed attempts, so I&#x2019;m ok!&#x201D;</em></em> &#x2014; <strong><strong>WRONG:</strong></strong> Hackers don&#x2019;t tend to use the website itself to crack your password, they crack passwords offline and only try them once they know they are correct.</li></ul><h2 id="those-devious-hackers-how-it-happens">Those Devious Hackers (How It Happens)</h2><p>Today&#x2019;s world is getting more connected, and with that comes a whole bunch of ways attackers can compromise your life. How do hackers actually get at your data?</p><ul><li><strong>Human Psychology</strong> &#x2014; hackers know how we make our passwords</li><li><strong>Security vulnerabilities </strong>&#x2014; engineers accidentally leave flaws in programs like the iPhone software, your web browser, the WiFi network you&#x2019;re on, etc. Hackers exploit these.</li><li><strong>Phishing attacks </strong>&#x2014; trickster emails or sites that try to look legitimate to get you to enter your information</li><li><strong>Malware / Viruses </strong>&#x2014; programs that run on your computer or phone and scrape up information including passwords</li><li><strong>Brute Force attacks </strong>&#x2014; scripts that run on lists of passwords from hacked websites to break everyone&#x2019;s passwords; how easy this is depends on how much attention each site puts into security</li></ul><p><em><em>Listen to this 6-minute </em>snippet <em>from </em>the <em><a href="https://pca.st/1wn195ww#t=859">&#x201C;Slack Variety Pack&#x201D;</a> podcast for a story about how passwords get stolen and some general tips</em>.</em></p><!--kg-card-begin: html--><iframe width="100%" height="250" scrolling="no" frameborder="no" allow="autoplay" src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/1037805175%3Fsecret_token%3Ds-QnNdRAiCdKd&amp;color=%23ff5500&amp;auto_play=false&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&amp;show_teaser=true&amp;visual=true"></iframe><div style="font-size: 10px; color: #cccccc;line-break: anywhere;word-break: normal;overflow: hidden;white-space: nowrap;text-overflow: ellipsis; font-family: Interstate,Lucida Grande,Lucida Sans Unicode,Lucida Sans,Garuda,Verdana,Tahoma,sans-serif;font-weight: 100;"><a href="https://soundcloud.com/markofdevon" title="markofdevon" target="_blank" style="color: #cccccc; text-decoration: none;">markofdevon</a> &#xB7; <a href="https://soundcloud.com/markofdevon/slack-panic-pack-passwords/s-QnNdRAiCdKd" title="Slack Panic Pack - Passwords" target="_blank" style="color: #cccccc; text-decoration: none;">Slack Panic Pack - Passwords</a></div><!--kg-card-end: html--><p><br>At an absolute minimum you need to:</p><ul><li>Have strong passwords</li><li>Be careful opening files or apps downloaded from the internet</li><li>Be careful browsing and clicking on links while browsing</li><li>Be careful clicking on links from emails, even from loved ones</li></ul><h2 id="omg-my-security-is-terrible-what-now">OMG my security is TERRIBLE (What now??)</h2><p>You should be sufficiently scared and sweating by now. But fear not, I promise it isn&#x2019;t very hard to get to a much better place. And don&#x2019;t feel bad, this is a normal feeling!</p><figure class="kg-card kg-image-card"><img src="https://sec.terminusfoundry.com/content/images/2021/04/image.png" class="kg-image" alt="Why Should I Care?" loading="lazy" width="2000" height="1500" srcset="https://sec.terminusfoundry.com/content/images/size/w600/2021/04/image.png 600w, https://sec.terminusfoundry.com/content/images/size/w1000/2021/04/image.png 1000w, https://sec.terminusfoundry.com/content/images/size/w1600/2021/04/image.png 1600w, https://sec.terminusfoundry.com/content/images/size/w2400/2021/04/image.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>The chart above visualizes what you&#x2019;re feeling right now, having just realized your perception of your own security was WAY higher than your actual security. <strong><strong>We can fix that together.</strong></strong> And as a bonus, the more you do, the <strong><strong>easier to handle</strong></strong> internet life will be!</p><p>Have no fear, let&apos;s <a href="../lesson-plan"><strong>jump into the lessons and get safer right now</strong></a>!</p><blockquote>Fear mongering warning: Working in technology, I am thinking about security risks all the time. Thankfully, this is not a mental burden on all of us, but I do care passionately. Trust me, the risks are real!<br><br>If these lessons look hard, fear not, just grab a techie that you trust (very important!!), and get them to go through the lessons with you.<br><br>This lesson plan is my attempt at balancing pretty great security with something that people will actually do. I will try to continuously make this better, so feedback is appreciated!</blockquote><!--kg-card-begin: html--><small>
    <em>
    	Header image credit:
    	<a href="https://unsplash.com/@ladymilkydeer?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Olesya Yemets</a>
    </em>
</small><!--kg-card-end: html-->]]></content:encoded></item></channel></rss>