OLLI Course: Be Safer on the Internet

OLLI Course: Be Safer on the Internet

Course Desc. | Instructor | Course Topics


Course Description

  • upcoming: ?
  • previous: Zoom: Spring 2020; Ashland: Winter 2019, Fall 2017, Fall 2016, Spring 2015, Fall 2015; Medford: Winter 2016
  • Course URL: https://communicrossings.com/olli-course-be-safer-internet
    this site will continue to be available and updated
  • Course Handout: web pages as .pdf (offline copy), with active links; updated occasionally;
  • Zoom: Use, Setup, Safety
  • Be Safer on the Internet (version 2) is a shorter [3-session] remote version of my original [5-6 session] course.
  • Are you glued to your devices more these days, and concerned about the privacy and security of your personal information?
  • Learn preventive strategies, trade-offs and practical steps to reduce your risks (even from the NSA!) for computers, tablets, and smartphones.
  • "Offline" topics: software updates, local & cloud backups, WiFi and router setup.
  • "Online" topics: encryption, browsing, email, messaging/chat, search, malware, ad blocking, VPNs, social media.
  • Specific settings will be demonstrated only for latest macOS and iOS (iPad/iPhone) systems, Safari browser and selected apps.
    However, users of Android, Windows, and other/older devices/apps are welcome to find and then apply analogous changes to their own system and browser settings.
  • This shorter course will not discuss passwords and password managers -- see separate course P@s$w0rdz;
    nor the topics: firewalls, file sharing, mobile/travel, "Internet of Things", and children's safety.
  • Table comparing topics covered in Be Safer on the Internet -- original (version 1) & new (version 2) -- and P@s$w0rdz (Passwords)

Original (version 1) course description

  • Would you like to improve the privacy and security of your personal information -- offline and online?
  • This lecture course covers preventive strategies, discusses trade-offs and prioritizes practical steps to reduce your risks (even from the NSA!) for computers, tablets, and smartphones.
  • Topics include strong passwords, password managers, software updates, local & cloud backups, WiFi and router setup,
    browsing, email, messaging, encryption, malware, ad blocking, 2-factor authentication, VPNs, social media, travel, and the "Internet of Things".
  • Specific settings will be demonstrated only for latest macOS and iOS (iPad/iPhone) systems, Safari browser and selected apps.
  • However, users of Android, Windows, and other/older devices/apps, who are familiar with the location of their system and browser settings, are welcome to attend and use provided references to adjust similar settings.
  • Former students wanting a refresher are welcome, too -- there's too much information in the course to absorb and implement at one time; risks and best practices continue to evolve; these pages are updated periodically -- be sure to check back for advice, esp. about issues highlighted in the news -- In particular, the Course Updates page highlights major issues, e.g., Meltdown/Spectre CPU vulnerabilities, latest software updates, Equifax hack, etc.
  • Optional e-book: Take Control of Your Online Privacy (if it's updated in near future, discounted version may be available).
  • More about the course: Introduction: Approach, Audience, Devices, E-books

steve About the Instructor

Internet Privacy & Security Courses: Topics: Overview & Sessions

  • "Getting information off the Internet is like taking a drink from a fire hydrant." ~Mitchell Kapor
  • The same might be said about this course -- many topics to cover; too little time; it can seem overwhelming.
  • I'll highlight and introduce the most important issues.
  • We may touch on other topics briefly during Q&A, and/or you can study materials and References on your own.
  • You can even take the course again, if there's something you missed or didn't understand, or to hear the latest advice.
  • A 1-page 'cheat sheet' summarizes some of the advice from this course,
    which mirrors / includes much of the content of the ebook: Take Control of Your Online Privacy (TCYOP)
  • See this course's original Topics page for even more "Top 10" check lists & best practices.
Be Safer on the Internet (version 1) ... (version 2) P@s$w0rdz
  • 1. Passkeys; Biometrics
    Weak Passwords
    What Makes a Password Weak?
    The 25 (or 100) Worst Passwords
  • Stronger Passwords
    What Makes a Password Stronger?
    How to Remember Passwords?
    Two Types: Memorable & Random
  • Generating Passwords
    Memorable [Typable] Passwords
    for Device(s) and Password Manager;
    Random [Pastable] Passwords
    for Web sites, Apps: via
    Password Manager or OS
  • Testing Passwords
    Information Entropy; Tester: zxcvbn
  • Storing Passwords Tattoos; Memory;
    Paper; File; Browser; Single Sign On;
    Password Managers: Desirable Features,
    Demos (1Password)
  • 2. Offline: Backups:
    Incremental vs. Complete (Clone);
    Local vs. Remote (Cloud)
  • Offline: Software Updates: Minor & Major System;
    App Stores; Replacing a Device
  • Offline: Encryption: files, whole disk
  • Offline: Erasing Your Device: Secure Erase;
    Cleanup; Recycling
  • 4. Browse: Block Ads: Popups, Tracking; Content Blockers
  • Browse: Protect Passwords: review intro;
    Identity; Strength; Password Managers, e.g., 1Password; Biometrics;
    2-Factor Authentication/2-Step Verification
  • Browse: Search Privately: Search Suggestions,
    Providers, e.g., DuckDuckGo
Non-expert Online Practices
1. Use Antivirus Software
2. Use Strong Passwords
3. Change Passwords Frequently
4. Only Visit Websites They Know
5. Don't Share Personal Info
Expert Online Practices
1. Install Software Updates
2. Use Unique Passwords
3. Use 2-Factor Authentication
4. Use Strong Passwords
5. Use a Password Manager
  • 5. Browse: Anonymity: Censorship, Wikileaks; Dark Web;
    NSA, CIA; Tor
  • Browse: Shopping: credit cards; PayPal; Bitcoin
  • Email: Improve Email Privacy: webmail (browser)
    vs. email client (app) encryption; phishing;
    spam; remote content
  • Email: Email: Anonymity: end-to-end encryption
TCYOP summary

Safer Internet: Introduction

Safer Internet: Introduction

Quotes | The Problem | References


Quotes

The "Problem"

  • The Internet's initial design did not foresee today's privacy and security problems.
  • Instead, the Internet has evolved like patchwork over the past 50 years.
  • Human nature has not evolved much over the millenia.
  • Users can be gullible; governments, spies and criminals are attracted to ever more sensitive data and weak safeguards.
  • More people & devices are connected to the Internet, for many more uses, from more locations.
  • With inexpensive online storage, data tends to accumulate.
  • Total online privacy is basically impossible, but also probably not what you want.
  • Ordinary people with ordinary needs can still avoid the biggest privacy and security threats.
  • Additional sections -- from All Courses: Introduction [menu]
  • Resources: where to find materials, i.e., here
  • Navigation: using this web site
  • Handouts: how to create your own printed version

References


Safer Internet: Introduction: Approach

Safer Internet: Introduction: Approach

TCYOPThe Plan

  • Awareness: help you understand the kinds of information you might want to protect, and from whom, as well as techniques to improve privacy and security.
  • Promote a sense of urgency -- without undue panic, hopefully.
  • Vary the depth of coverage, depending on student background and questions.
  • Follow Joe Kissell's e-book: Take Control of Your Online Privacy {TCYOP}
    though it's not necessary to have a copy since it's getting out of date
  • Offer even more advice, and links to many articles: reviews, news, issues
  • TCYOPStart from the inside-out: you, your computer, network connection, the internet
  • Explain just enough of the underlying jargon, infrastructure and technology to enhance understanding
  • Emphasize preventive, proactive, personal measures -- rather than deal with post-loss emergencies -- though increasingly there will be some actions you need to take to deal with the aftermath of corporate and government breaches
  • Plan & Prioritize (by difficulty/experience labels: [1, 2, 3]): manageable steps you can take to reduce your privacy and security risks -- though not completely from the NSA.
  • Present trade-offs: convenience/effort for you vs. sensitivity/value of your info; one size does not fit all
  • Update advice over time, based on new threats and tools -- check Course Updates section
  • Guarantee that...

Safer Internet: Introduction: Audience

Safer Internet: Introduction: Audience

Who? | Advice Levels


Who

  • You -- "ordinary" users with willingness to:
  • Explore settings on your computers/devices and read articles
    -- or if you're not DIY, at least understand the risks/issues, while enlisting your 'techie' friend/relative
  • Take action: make some immediate changes, and create a plan for later actions
  • Avoid procrastination, panic, guilt or information overload
  • Ask questions, especially about jargon (or see PC Glossary definitions of Computer and Internet Terms)

Advice Levels / Tags

  • [#] prefix on advice/references suggests* experience, importance and/or effort:
  • [1] Beginners: some familiarity with system/browser settings; high impact; mostly easy
  • [2] Intermediate: more experienced; moderate, some complexity, less common
  • [3] Advanced: savvy users, developers, administrators; more complex; special situations; research or future-oriented
  • -- or Extreme: dissidents, journalists, whistleblowers, celebrities, lawmakers, lawbreakers, corporations, crytocurrency speculators, paranoids
  • *categories are not rigid -- arguably, some items could shift +/-1
  • This Chart Shows How Computer Literate Most People Are
    Distribution of Computer Skills (none, terrible, poor, medium, strong) Among People Aged 16-65, by country; 12/7/2016

Safer Internet: Introduction: Settings

Safer Internet: Introduction: Settings

Devices & OS | System Settings | Apps


Devices & Operating Systems

  • Modern-day desktop computers, laptops, tablets, and phones provide similar connection capabilities,
    and most web browsers and email applications provide similar privacy and security features
    -- though often with different names and options.
  • It would be difficult here to provide or discuss up-to-date recommendations and configuration advice
    specific to every site, device model, operating system version, application, and tool
    -- in every country & situation.
  • As mentioned in the course description, Steve will list or demonstrate specific examples
    of settings for only most recent macOS & iOS (iPad, iPhone) -- not: watchOS, tvOS;
    location of settings may change in newer software updates.
  • He will also demo (and sometimes recommend) specific applications in different categories,
    e.g., browser: Safari; email: Mail; local (disk) backup: Time Machine, Carbon Copy Cloner;
    remote (cloud) backup: Backblaze; password manager: 1Password;
    VPN (Virtual Private Network): Witopia; ad blocker: Wipr, Adblock Plus; etc.
    -- there may be other viable alternatives for you (platform, features, costs)
  • If you're using Windows, Android, Chromebook, Linux, or an older version of macOS or iOS,
    or some other wearable or home device/camera/streaming box/system (e.g., "Internet of Things"), don't panic
    -- you should be able to locate corresponding settings by exploring your device or reading articles (I provide many).
  • Each topic has links to articles in a References section, subdivided by platform and subtopics.
  • Also, see section: Finding More Help: other e-books, classes, consultants.

System Settings

via Menu

  • general setting format: OS: preference / application > menu/tab > etc., e.g.,
  • mac yosemite system prefsAndroid: Apps > Settings > etc.
  • iOS: Settings > General > etc.
  • macOS: Apple menu / Launchpad > System Preferences >
    Security & Privacy > etc.
  • Windows: Control Panel > etc.

via Search

Before Change

After Change

  • Save any new login name, password, recovery key, security answer, etc. in a secure place,
    e.g., password manager -- see Passwords section

Apps

  • Check Internet-related Preferences, Settings or Tools for your device's apps, e.g.,
  • web browsers: Firefox, Google Chrome, Internet Explorer, Opera -- in addition to Safari
  • mail clients: Outlook, Thunderbird -- in addition to Mail
  • communication, social networking, maps, etc.

Access

  • macOS: "dock" / Launchpad; also "Other" folder, e.g., Disk Utility; Keychain Access
  • Finder > Applications; also Utilities folder, e.g., Disk Utility; Keychain Access
  • menubar (top right), e.g., WiFi; Time Machine; DNSCrypt; Bluetooth; 1Password; Dropbox
  • iOS: Home button; double-click for open apps

Search

  • macOS: Launchpad > Search
  • iOS: swipe down on home screen > Search

Update / Buy

  • macOS: Apple menu > App Store
  • iOS: App Store

Safer Internet: Introduction: Topics

Safer Internet: Introduction: Topics

Summary | Not Covered | References, Check Lists


topics xwdSummary

  • Our topics parallel the sequence in Take Control of Your Online Privacy {TCYOP} discussed under Introduction: E-books -- plus pre-requisite offline practices for protecting local systems and info.
  • We'll cover these topics over six 2-hour sessions, which should allow enough time for you to understand background, context, tradeoffs, see demonstrations of settings/apps, and ask questions.
  • Typical privacy & security recommendations could be summarized in 15 minutes or so, e.g., free 1-page 'cheat sheet': Quick Start section {TCYOP-4: 11-12; TCYOP-3: 9-10} Fix the Easy Things; Choosing Better Passwords; About Two-Factor Authentication; Create Privacy Rules for Yourself; Purge Your Info from Data Brokers; Cope with Special Cases
  • summaryOr, you could read one of the ~50 overlapping 'fix this' articles available (Refs below) to improve some important practices, e.g., 'top-ten' check lists, best-practices, end-of-year reminders, New-Year's resolutions, after-the-fact-attack advice.
  • However, the goal of this course is for you to understand which of these many recommendations are the most important, why, and how to implement.
    Yes, I've perused and prioritized all of them -- so that you don't have to!
  • Introduction: The "Problem"
  • Approach: TCYOP; Info & Advice; Level of Detail; Tradeoffs
  • Audience: Who; Advice Levels / Tags
  • Settings: Devices & OS, Apps
  • Topics (this page): Table of Contents (TOC); below: # of Sessions; What We Won't Cover {TCYOP-4: 2-4; TCYOP-3: 2-4}
  • Finding More Help: Online; Groups, People
  • Discounts: E-books, 1Password, Witopia, etc.
  • E-books: TCYOP; Formats(.pdf, .epub, Kindle); Editions; Other e-books
  • Resources: this web site; article references
  • Navigation: Text / Image Size; Links; Search within a page; Top/Bottom of page controls; Slideshows
  • Handouts: print/pdf your own; e.g., print web page, with presentation points/discussion at top, possibly omitting References
  • Privacy, Security and Anonymity: Definitions & Analogies {TCYOP-4: 17; TCYOP-3: 15}
  • What Do You Have to Hide?: attacks, financial, health, identity theft, vehicles {TCYOP-4: 13-17; TCYOP-3: 11-15}
  • Who Wants Your Private Data?: companies, governments, hackers {TCYOP-4: 18-28; TCYOP-3: 16-28}
  • Develop a Privacy Strategy: Policy / Law; Behavior; Planning; Technology {TCYOP-4: 29-50; TCYOP-3: 29-38}
  • Offline Systems & Data {TCYOP: mentions importance of these in passing}
  • Passwords -- Introduction: Strength; Generate; Test; Store
  • Accounts: computers, phones
  • Backups: Incremental vs. Complete (Clone); Local vs. Remote (Cloud); also Death, Photos
  • Software Updates: Minor & Major System; App Stores; Replacing a Device
  • Encryption: archive or partition with files, notes; whole disk
  • Erasing Your Device: Secure Erase; Cleanup; Redaction; Recycling
  • Keep Your Internet Connection Private: connection encryption overview {TCYOP-4: 51-77; TCYOP-3: 39-63}
  • Encrypt Wi-Fi: Wi-Fi & Router Passwords; WPA2 Encryption; DNS (Domain Name System)
  • Use a VPN: Virtual Private Network, e.g., Witopia
  • Avoid Malware: User; App Stores; Anti-Virus; Browser Extensions; Flash; Java; cyberattacks / cyberwar
  • Turn Off Unnecessary Services: Lock Screen; Find My Mac/iPhone/iPad; Location; Camera; Microphone; Bluetooth
  • Use a Firewall: hardware, software
  • Browse the Web Privately: browsers {TCYOP-4: 78-109; TCYOP-3: 64-90}
  • Go to the Correct Site: Links; Bookmarks; Fraudulent Sites; Search
  • Use HTTPS: URLs; Updates; VPN; also, Certificates, OpenSSL
  • Manage Storage of Private Data: Private Browsing; Cookies; Autofill; Tracking; Browsing; Search; Download History; Caches
  • Block Ads: Popups, Tracking; Content Blockers, e.g., AdBlock Plus
  • Protect Passwords: Introduction: Strength, Generate, Test; Identity; Strength; Password Managers, e.g., 1Password; 2-Factor Authentication/2-Step Verification; Biometrics
  • Search Privately: Search Suggestions, Providers, e.g., DuckDuckGo
  • Anonymity: [3] Censorship, Wikileaks; Dark Web / Deep Net; NSA, CIA; Tor
  • Shopping: credit cards; ShopSafe; PayPal; Bitcoin
  • Improve Email Privacy: webmail (browser) vs. email client (app) encryption; phishing; spam; remote content {TCYOP-4: 110-131; TCYOP-3: 91-108}
  • Email: Anonymity: [3] additional encryption
  • Talk and Chat Privately: messaging, audio, video {TCYOP-4: 132-136; TCYOP-3: 109-114}
  • Keep Social Media Sort of Private-ish: Privacy Settings & Policies; Facebook; Twitter {TCYOP-4: 137-146; TCYOP-3: 115-120}
  • Share Files Privately: Apps, Music, Photos; Networks; also, BitTorrent, Copyright, Piracy {TCYOP-4: 147-155; TCYOP-3: 121-129}
  • Manage Your Mobile Privacy: Accounts; Backup; Encryption; Network; Location; Public Devices {TCYOP-4: 156-165; TCYOP-3: 130-139}
  • Keep the Internet of Things Private: Smart TVs, Wearables {TCYOP-4: 166-170; TCYOP-3: 140-144}
  • Maintain Privacy for Your Kids {TCYOP-4: 171-173; TCYOP-3: 145-147}
  • Course Updates: summary of significant changes

What We Won't Cover

  • Some intermediate [2] and most advanced [3] issues, unless there's time and student interest
  • Problems with your specific device & configuration (esp. non-Internet related); however, I may include tips about usage and cost, and interesting how-tos; also see More Help section for learning, troubleshooting recommendations
  • Other non-digital privacy / security issues: paper, home, surveillance, death, etc. -- some in Offline Reference sections
  • Internet history, technology questions and social issues ask me to re-offer OLLI course: Internet History and Issues

References: To Do (Not Do) / Check Lists

  • Apple: macOS: Security
    Software Updates; Gatekeeper; FileVault 2;
    Privacy Controls; Password Generator;
    iCloud Keychain; Sandboxing; Runtime protections;
    Antiphishing; Find My Mac
  • Apple: Manage Your Privacy
    Secure your Devices: passcode; Touch ID, Find My;
    Secure your Apple ID: password, security questions, 2-step verification;
    Stay secure: phishing, passwords, notifications;
    Sharing: iCloud settings, location data, apps, ads, private browsing, children's privacy, diagnostic data
  • Apple: iOS Security
    System Security: Secure boot chain; System Software Authorization; Secure Enclave; Touch ID; Face ID
    Encryption and Data Protection: Hardware security features; File Data Protection; Passcodes; Data Protection classes; Keychain Data Protection; Access to Safari saved passwords; Keybags; Security Certifications and programs
    App Security: App code signing; Runtime process security; Extensions; App Groups; Data Protection in apps; Accessories; HomeKit; SiriKit; HealthKit; ReplayKit; Secure Notes; Shared Notes; Apple Watch
    Network Security: TLS; VPN; Wi-Fi; Bluetooth; Single Sign-on; AirDrop security; Wi-Fi password sharing
    Apple Pay: Secure Element; NFC controller; Credit, debit, and prepaid card provisioning; Payment authorization; Transaction-specific dynamic security code; Contactless payments with Apple Pay; Paying with Apple Pay within apps, or on the web or with Handoff Rewards cards; Apple Pay Cash; Suica Cards; Suspending, removing, and erasing cards
    Internet Services: Apple ID; iMessage; FaceTime; iCloud; iCloud Keychain; Siri; Continuity; Safari Suggestions; Siri Suggestions;
    Device Controls: Passcode protection; iOS pairing model; Configuration enforcement; Mobile device management (MDM); Shared iPad; Apple School Manager; Device Enrollment; Apple Configurator 2; Supervision Restrictions; Remote Wipe; Lost Mode; Activation Lock
    Privacy Controls: Location Services; Access to personal data; Privacy policy
    Apple Security Bounty; iOS11 white paper; 1/2018
  • AARP: Online Safety AARP Technology Education and Knowledge (TEK) Center, e.g.,
    How Secure is Your Home Network?
    How to Practice Safe Browsing
    Keeping Your Computer Up to Date
    Seasons Cheatings: Protecting Yourself from Holiday Frauds & Scams
    Are Your Passwords Strong Enough
  • Back Up and Secure Your Digital Life
    product reviews: Hard drive;
    Online backup service; Cloud sync; Local backup software;
    Password manager: free, paid; Two-factor authentication;
    Virtual private network service; Secure browser extensions;
    Things to skip: Hard drive data-recovery plans;
    Traditional or free antivirus suites;
    Identity-theft protection; NYT; 11/14/2023
  • 9 Tips for Staying Safe Online with Your iPhone, Mac, or iPad
    1: Regularly Install Software Updates;
    2: Use Strong & Unique Passwords;
    3: Use a Password Manager;
    4: Use Two-Factor Authentication (2FA);
    5: Be Cautious with Sketchy Links & Websites;
    6: Be Cautious with Email Attachments;
    7: Ignore Scary Pop-ups and Alerts from the Web;
    8: Be Wary of Public Wi-Fi Networks;
    9: Backup Your Devices; OSXD; 8/14/2023
  • Let's bust these four myths of digital privacy and security
    1: Stop spammers by writing out “at” and “dot” in your email address;
    2: Digital criminals are dumb;
    3: You need a VPN to stay safe online;
    4: Your email address and phone number are secrets; WaPo; 2/17/2023
  • Lock down your Mac with these 10 security tips
    Choose a strong login password;
    Change your Lock Screen settings;
    Use Apple's password manager (or other PM);
    Turn on Find My Mac; Set up multiple users;
    Lock down your Mail; Limit your app downloads;
    Keep your software up to date; Use a VPN;
    Augment Apple’s XProtect antivirus; MW; 1/5/2023
  • Steps to Simple Online Security (ToC); articles:
    1: Always use strong passwords
    2: Set Up Two-Factor Authentication
    3: Enable Automatic Updates Everywhere
    4: Encrypt Your Computer's Storage
    5: Track or wipe a lost device
    6: Backups
    7: Secure Your Smartphone
    8: Free Antivirus Software Is Good
    9: Secure Your Web Browser
    10: Secure Your Wi-Fi
    Send messages and files safely
    Lock down social media accounts
    Extra security for financial and health data
    What to do if you think you've been hacked
    Secure small gadgets and smart-home devices
    Maintain privacy at international borders and protests
    Securely sell or donate old electronics
    Digital security for online dating and sexting; NYT; 4/1-4/22/2022
  • How to lock down your data and enhance privacy on iPhone and iPad
    Set a strong passcode & use biometrics;
    Edit your Lock screen; USB connections;
    Make sure Find My is enabled;
    Turn on App Tracking Transparency;
    Manage your permissions;
    Delete unused (or untrustworthy apps);
    Enable privacy in Mail (tracking pixels);
    Review Apple's privacy access;
    Wipe your EXIF data (location);
    Use strong passwords; ApIn; 3/29/2022
  • A Practical Guide to Securing Your Windows PC
    Click cautiously and install less;
    Don't put off automatic updates;
    Enable BitLocker;
    Back up your files;
    Set up Microsoft Defender properly;
    Secure your Windows login with a password (and consider logging in with Windows Hello);
    Remove software you don’t need (and any "bloatware");
    Do a permissions audit;
    Check your privacy settings;
    NYT; 3/4/2022
  • A Practical Guide to Securing Your Mac
    Be careful what you click and install;
    Don't turn off automatic updates;
    Enable FileVault;
    Enable the built-in firewall;
    Back up your files;
    Use a login password (and enable Touch ID if you can);
    Consider a guest account;
    Delete software you don’t need;
    Audit your privacy permissions;
    NYT; 3/4/2022
  • Privacy myths busted: Protecting your mobile privacy is even harder than you think
    settings alone aren't enough to secure your privacy,
    but they're a lot more powerful with the right apps;
    Use a PIN code to lock your phone
    -- not fingerprints or facial recognition;
    Disable location tracking;
    Turn off your mobile ad ID;
    Check your apps and accounts;
    Sign out of all other devices;
    Lock down your social media;
    Enable 2FA; Check for leaky apps;
    Fail-safe: Nuke your phone remotely;
    The real key to privacy: Add these five apps
    1. Signal Private Messenger App; 2. Surfshark VPN;
    3&4. Brave Browser and DuckDuckGo;
    5. BitWarden password manager; CNet; 1/9/2022
  • Securing your digital life:
    the key to protecting your digital life is to make it as expensive and impractical as possible
    for someone bent on mischief to steal the things most important to your safety, financial security, and privacy;
    Part one: The basics
    What in my digital life can give away critical information tied to my finances, privacy, and safety?
    What can I do to minimize those risks?
    How much risk reduction effort is proportional to the risks I face?
    How much effort can I actually afford?
    Reducing your personal attack surface: mobile, computers, browsers;
    threat modeling; Ars; 10/25/2021
  • Part two: The bigger picture—and special circumstances
    reduce the risks posed by data breaches and identity fraud
    Everything counts in multiple accounts
    When 2FA is not enough; Social exposure; Special cases; 10/27/2021
  • Part three: How smartphones make us vulnerable
    Targeted SMS phishing;
    Fleece apps and fake apps;
    Pigs to the slaughter: fake app stores;
    Ars; 11/14/2021
  • 6 Things You Need to Do to Prevent Getting Hacked
    Use Multi-Factor Authentication;
    Get a Password Manager;
    Learn How to Spot a Phishing Attack;
    Update Everything;
    Encrypt Everything;
    Wipe Your Digital Footprint;
    Wired; 8/29/2021
  • Five Tech Commandments to a Safer Digital Life
    Thou Shalt Not Use Weak Passwords
    Use Multifactor Authentication
    Thou Shalt Not Overshare
    Thou Shalt Not Share Data About Friends
    Remember to Stay Skeptical; NYT; 3/24/2021
  • How to Spring Clean Your Online Accounts Now That You're Stuck at Home
    Delete your unused accounts;
    Back up your stuff;
    Organize your photos;
    Declutter your devices;
    Catch up on your emails;
    Reset website permissions;
    Update your software;
    Analyze your fitness stats;
    Cancel some subscriptions;
    Turn on two-factor authentication; Giz; 3/26/2020
  • The Complete Guide to Avoiding Online Scams
    Never, ever click a link to your bank or financial institution from an email;
    Don’t give out your passwords;
    Use strong passwords (and secret questions);
    Don’t buy anything from a random email you receive;
    Watch out for job postings that look too good to be true;
    Do not give out your personal info or Social Security number;
    Take advantage of your browser’s security features;
    Ignore website popups that say you have a virus; LH; 1/13/2020
  • 8 Ways to Better Navigate the Internet in 2020
    Take back (some of) your privacy;
    Clean up after yourself;
    Mind your manners;
    Learn to fight fair;
    Write better emails;
    Think twice before you send that DM;
    Do a data ‘cleanse;
    Guard your health data; NYT; 12/26/2019
  • Staying safe online
    Use unique user name and password combinations on different websites;
    Sign up for 2-step verification on sites that offer it;
    Set up alerts for account changes;
    Contact details up to date (email, phone number, address, etc.)?
    Review your account at least monthly;
    Request and review your credit reports from the 3 major credit bureaus;
    On social media, don't share too much personal information, and check privacy settings; Vanguard; 10/29/2019
  • 10 Tips to Avoid Leaving Tracks Around the Internet
    Duck Google for email, search
    Jam Google (e.g., different gender)
    Avoid unnecessary web tracking
    Careful on public Wi-Fi
    Use Apple
    Don't "Sign in with Facebook"
    Identity theft, from a pro
    Don't use Facebook; NYT; 10/6/2019
  • 7 Cybersecurity Threats That Can Sneak Up on You
    Rogue USB Sticks
    Zombie (unused) Accounts
    Untrusted Browser Extensions
    Bogus Online Quizzes
    Leaky Photo Uploads
    Smart Home Snooping
    Malicious Charging Cables; Wired; 10/6/2019
  • 5 Cheap(ish) Things to Beef Up Your Digital Security
    1. A password manager, e.g., 1Password
    2. A virtual private network service (VPN)
    3. A two-factor authentication app, e.g., Authy (built-in to 1Password)
    4. A webcam cover
    5. A paper shredder; NYT; 9/25/2019
  • NYT: Secure Your Digital Life in 7 (Easy) Days:
    1. Set Up a Password Manager;
    2. Check Your Smartphone's Privacy Settings;
    3.Protect Your Browsing;
    4. Protect (Encrypt/Locate) Your Laptop;
    5. Vaccinate Your Computer;
    6. Get All the Software Updates;
    7. Lock Down Your Most Important Accounts (2FA)
  • 101 Data Security Tips: Quotes From Experts On Breaches, Policy, News 9/25/2019
  • 9 Seemingly Harmless Things You Should Never Do Online
    1. Don't Take Personality Quizzes From Unknown Sources in Social Media.
    2. Don't Post Your Full Birth Date and Hometown Online.
    3. Don't Use Public Wi-Fi Without Verifying that it's a Legitimate Network.
    4. Don't Follow Up a Gaming Session with Some Online Banking.
    5. Don't Click on Links or Attachments in Emails Without Verifying the Source.
    6. Don't Use The Same Password For Multiple Accounts.
    7. Don't Click Links To "Promotions" Sent Through SMS; MF; 7/2/2019
  • [2] 6 things you should do to protect yourself from hackers (but probably won't)
    #1: Know which public Wi-Fi to trust
    #2: Run tests for weaknesses
    #3: Disable and manage third-party permissions
    #4: Encrypt your data yourself
    #5: Overwrite any deleted files
    #6: Practice the ‘Principle of Least Privilege'; TNW; 4/14/2019
  • 15 strategies everyone should know to protect their online information
    1. Use a password manager
    2. Be fully aware of what you're sharing
    3. Avoid clicking on links
    4. Be diligent, aware, and cautious
    5. Enable double-confirmation on all accounts
    6. Use credit locks and cloud security
    7. Remove personal data from your social media
    8. Do your research
    9. Check your settings
    10. Protect your online browsing
    11. Stop using the same password for everything
    12. Stick with reputable sites
    13. Close old accounts you’re no longer using
    14. Start over with a new credit card and new accounts
    15. Remove yourself from people search sites; TNW; 2/15/2019
  • How to Do a Data 'Cleanse'
    1. Have you backed up your data?
    2. Are your phone's photos safe?
    3. Have you cleaned out your machine?
    4. Is your software up-to-date?
    NYT; 2/1/2019
  • How to Protect Yourself on Data Privacy Day
    1. Own Your Online Presence
    2. Keep a Clean Machine
    3. Protect Your Personal Information
    4. Connect with Care
    5. Be Web Wise; National Cyber Security Alliance (NCSA); OR DOJ; 1/29/2019
  • Keep your digital life secure with these 6 simple tricks
    1. Set boundaries. Decide -- on your own, and in advance -- what data you're willing to share with apps and online services, and stick to those limits
    2. Burst your filter bubble. People who get their news primarily -- or exclusively -- from social media are subjecting themselves to the whims of the algorithms that decide what to display to each user
    3. Manage your passwords
    4. Turn on multi-factor authentication
    5. Delete apps you don't use
    6. Keep the apps you do use up-to-date; TNW; 1/12/2019
  • Cybersecurity 101
    Why you need to use a password manager;
    Two-factor authentication can save you from hackers;
    How to protect your cell phone number and why you should care;
    How to browse the web securely and privately;
    How to choose and use an encrypted messaging app; TC; 12/25/2018
  • Online security tools: The holiday gift that shows you really care
    Give a password management app or subscription;
    Add a second factor to complement a password;
    Sign them up for account breach notifications;
    Install free or paid anti-malware software;
    Set up online backups;
    Turn on FileVault on their Macs;
    Set up a VPN account;
    Credit freeze; MW; 12/5/2018
  • Bad (Better) Consumer Security Advice
    unsecured Wi-Fi & VPN;
    proactively create accounts: Social Security Admin., IRS, USPS;
    two-factor authentication;
    strong passwords, unique for each account (but don't change frequently);
    credit freezes;
    airport outlets? Schneier; 12/4/2018
  • After Marriott Breach, How to Protect Your Information Online NYT; 11/30/2018
  • Guide to Not Getting Hacked
    Review Your Threat Model
    Keep OS and apps up to date
    Use a Password Manager
    Use two-factor authentication
    Don't use Flash
    Do use antivirus
    Do use an ad blocker
    Do use a VPN
    Disable macros
    Backup files
    Don't overexpose yourself for no reason
    Don't open attachments without precautions
    Do opt out of data broker websites
    Do sext if you want, but do it safely
    Mobile Threat Model
    If you can, get an iPhone
    If you love Android, get Pixel
    Lock up that Telephone Number
    Threat Model (privacy and surveillance)
    Signal
    Social Media
    Device Cameras, Microphones, and the Internet of Things
    Chatting
    Tor Browser
    Virtual Private Networks
    PGP
    Private Email Servers (don't do it)
    Encrypt your Hard Drive
    Credit Cards
    Data Retention for Lawyers, Journalists, and Anyone Else
    Log Off
    version 3: MB; 11/12/2018
  • How to Make Your Mac as Secure as Possible
    Software Update
    Identified Developers
    File Vault
    Location
    Spotlight Suggestions
    DNS; LH; 10/5/2018
  • How to Be Invisible Online (Without Going off the Grid) infographic;
    1. How to Anonymize Everything You Do Online: Go Incognito; Block 3rd Party Cookies; Tailor Permissions for Websites You Access; Use HTTPS Everywhere
    2a. On Facebook: Limits Access to Future Posts; Change Public to Friends-only; Stop People Using Your Personal Info for Finding You; Prevent Your Name Being Linked with Ads; Block Facebook Ads from Accessing Your Data
    2b. On Twitter: Prevent Twitter from Tracking You; Stop Including Location Data in Tweets; Stop Twitter from Using Your Contacts
    2c. On Instagram: Make Your Posts Private; Prevent Instagram from Sharing Info with other Social Network Sites
    2d. On Snapchat: Make Sure Only Your Friends Can Contact You; Select Who You Want to See Your Stories; Remove Yourself from the 'Quick Add' Section; Move Private Snaps Saved in your Memories to 'My Eyes Only'; Pay Attention to Screenshot Notifications
    3a. On iOS: Remove Website Tracking Data in Safari; Enable Fraudulent Website Warning; Block Ad Tracking
    3b. On Android: Opt Out of Ads Personalization; Disable Google Backup; 8/28/2018
  • Gizmodo: 6 Ways You're Risking the Security of Your Gadgets Without Thinking
    1. Watching TV and movies illegally
    2. Sharing your accounts with other people
    3. Using short PIN codes and pattern unlock
    4. Practising poor USB security
    5. Leaving your webcam and mic uncovered
    6. Not updating your software; Giz; 7/4/2018
  • Motherboard: Security Tuneup
    1. You Should Take Five Minutes to Update Your OS and Apps;
    2. It's Time to Actually Use Your Password Manager;
    3. You Should Be Using Two-Factor Authentication on Everything;
    4. Ad Blockers Are Good for Security, Too;
    5. Seriously, Stop Using Flash;
    [3] 6. Put an Extra Passcode On Your Cellphone Account (SIM hijacking)
    7. If You Use Word, You Need to Turn Off This One Feature: disable macros; MB; 5/23/2018
  • Gizmodo: All the Annoying Tech Chores You Need to Do When You Have Time
    Update your software;
    Free up some space;
    Scan for problems;
    Get your photos organized;
    Update your router;
    Move to the cloud;
    Untangle your wires;
    Clean your gadgets; Giz; 1/2/2018
  • 5 New Year's Resolutions to Protect Your Technology
    1. Update Your Software;
    2. Read Privacy Policies;
    3. Delete Unnecessary Apps;
    4. Use a VPN;
    5. Protect Your Hardware; NYT; 12/27/2017
  • Guide to Digital Security choose your profile:
    [1-2] Civilian: You're a regular user, but hackers and malware are lurking;
    7 Password Tips; Basic Smartphone Security; Resist Phishing Attacks; Keep Your Kids Safe; Protect Yourself from Doxing;
    [3] Public Figure: Activist? Journalist? Politician? Consider yourself a target;
    How to Encrypt All Your Data; Google Advanced Protection: a Step-by-Step Look; Use Tor for more than just Browsing; Physical Steps to Amp up your Digital Security;
    [3+] Spy: Professionals are after you. Time to get serious;
    How to Remove the Mic from your Devices; Sniff Out Bugs Planted in your Room; Extra Paranoid Measures for Superspies; Wired; 12/9/2017
  • [3] Physical Measures to Amp Up Your Digital Security
    Tape Over Your Webcam;
    Slap on a Privacy Shield;
    Use a Physical Authentication Key; Wired; 12/9/2017
  • [3+] Extreme Security Measures for the Extra Paranoid
    The Air Gap Up There;
    Faraday Cage aux Folles;
    Frickin' Laser Microphones;
    Literally Put a Blanket Over Your Head; Wired; 12/9/2017
  • Take These 7 Steps Now to Reach Password Perfection
    1. Use a password manager
    2. Go long
    3. Keep 'em (special chars) separated
    4. Don't change a thing
    5. Single-serve only
    6. Don't trust your browser
    7. Add two-factor too; Wired; 12/9/2017
  • How to Secure Your Mac
    Part 1 secure setup, non-admin account, parental controls, privacy settings; MW; 11/9/2017;
    Part 2 [3] firmware passwords, iCloud two-factor authentication, Safari Browser, Time Machine; MW; 11/15/2017
  • Gizmodo: 5 Incredibly Stupid Security Mistakes You Make Everyday
    1. Using the same login details everywhere/forever;
    2. Not protecting your phone’s lock screen;
    3. Not using two-step authentication;
    4. Sharing too much information;
    5. Using Wi-Fi without thinking; Giz; 10/4/2017
  • How to Create a Strong Password
    make your passwords very long
    don't use a common phrase
    test your password
    don't reuse your password
    use a password manager
    don't store passwords in your browser
    follow the rules every time
    use two-factor authentication
    don't ruin all this by using security questions
    remember, everything is broken; LH; 8/14/2017
  • A Hacker's Guide to Protecting Your Privacy While Dating
    1. Don't share your passwords or devices;
    2. Set up a Google Voice number to use for first dates;
    3. Use a VPN on shared Wi-Fi networks, including your home network;
    4. If you're going to make a sex tape, do it consensually and privately; Giz; 7/30/2017
  • 10 ways to protect your privacy now
    1. Don't overshare on social media;
    2. Take control of your children's devices;
    3. Secure your Wi-Fi;
    4. Become a password master;
    5. Keep software up to date;
    6. Be browser-savvy;
    7. Be a ghost (Ghostery);
    8. Be app-aware;
    9. Arm your computer (firewall, AV);
    10. Shred your documents; MT; 7/9/2017
  • Protecting Your Digital Life in 9 Easy Steps
    1. Download Signal, or Start Using WhatsApp to send text messages;
    2. Be wary of clicking on unfamiliar links or documents and apply software updates;
    3. Protect your computer’s hard drive with FileVault or BitLocker — and back up your data to an online backup service, external hard drive, or both;
    4. The way you handle your passwords is probably wrong and bad (use strong unique passwords, stored in a password manager);
    5. Protect your email and other accounts with two-factor authentication;
    6. Use a browser plug-in called HTTPS Everywhere;
    7. Invest in a Virtual Private Network, or VPN;
    8. Remember that incognito mode isn’t always private;
    9. Do sensitive searches in DuckDuckGo;
    Bonus: cover your webcam with tape; NYT; 5/16/2017
  • How Not to Protect Your Privacy Online
    1. Deleting your browsing history doesn’t work;
    2. Using an incognito window doesn’t work;
    3. Installing an ad blocker doesn’t work; Giz; 3/31/2017
  • How to Snoop-Proof Any Phone or Tablet
    passcode;
    lockscreen;
    apps (Signal, Whatsapp, browsers);
    VPN;
    minimize stored data; Giz; 3/3/2017
  • Consumer Reports: 66 Ways to Protect Your Privacy Right Now
    1. Check Your Data Breach Status
    2. Stop WiFi Imposters
    3. Use 10-Minute (Temporary) Mail
    4. See Who Shared Your Private Data
    5. Lock Your Screens: Long PIN;
    6. Try to Be Unique;
    7. But Not Too Personal;
    8. Do Better Finger Art
    9. Snail Mail Privacy: Shred These 5 Document Types;
    10. Shut Off the Flow of Credit Card Offers;
    11. Receive Less Mail
    12. Return to Sender
    13. Turn On Automatic Updates
    14. Make Sure There's Info-Security Staff
    15. Make Unbreakable Passwords: Stop Making Sense
    16. Use a Password Manager
    17. Got a Great One? Okay, Write It Down.
    18. Be Password Loyal (password entropy)
    19. Stop ID Theft After a Death
    20. Two-Factor Authentication
    21. Activate a PIN
    22. Watch Your Bills
    23. Let Google Scan Your Files
    24. Check on the Kids
    25. Lock Down Your Baby Monitor
    26. Outwit Your Smart TV
    27. Shut Down Webcam Creeps
    28. Deploy Your Firewall
    29. Restrict File Sharing
    30. Cloak Your Computer
    31. Do All of This Automatically
    32. Use a VPN
    33. You Know What? Just Fake It.
    34. Use Everyday Encryption: Do Your Phone First
    35. Encrypt Your Computer or just Sensitive Files
    36. Encrypt Your USB Drive
    37. Stop Oversharing on Facebook: Keep GPS Data Private
    38. Turn on Log-In Approvals (two-factor authentication)
    39. Become Elusive
    40. Leave a Group
    41. Reduce Ad Overload
    42. Hide ID-Theft Clues
    43. Use Separate Browsers for low- and high-stakes websites
    44. Tuneup Home WiFi Privacy: Find an Ethernet Cable
    45. Get the Router's IP Number
    46. Update the Router Username and Password
    47. Change the SSID
    48. Then Hide It
    49. Embrace Encryption
    50. Update Firmware
    51. Make Sure Remote Management Is Off
    52. Shut It Down
    53. And, Uh—Maybe Get a New Router
    54. Check Links Before You Click
    55. Add HTTPS Everywhere
    56. Block Snoops
    57. Avoid Ransomware: Back Up Your Data
    58. Keep Software Updated
    59. Try Haggling (Ransom discount)
    60. But Not Right Away (if you're going to pay)
    61. Use Ubuntu OS
    62. Scoff at Fake Email Notices
    63. Call Customer Service
    64. Tighten Google Privacy: Tweak the Settings
    65. Make Google Forget You
    66. Keep Your Fitness Data to Yourself; CR; 2/21/2017
  • Your 5 Totally Achievable Security Resolutions for the New Year
    1. Set Up a Password Manager;
    2. Enable Two-Factor Authentication;
    3. Make Backups;
    4. Know How to Use a VPN;
    [2] 5. Use End-to-End Encrypted Chat Apps; Wired; 12/29/2016
  • Five Resolutions to Simplify Your Tech Life
    1. Clean Up Your Password Hygiene;
    2. Maintain Your Devices;
    3. Mind Your Infrastructure;
    4. Be Less Wasteful (recycling);
    5. Be a Smarter Shopper; NYT; 12/27/2016
  • Let Your Whole Family Watch This Internet Security Basics Course
    How to choose a good password;
    How to know when to trust a website;
    Why we need all those software updates;
    How to protect your phone from hackers;
    How to protect your home from the Internet of Things;
    5 ways to protect yourself online; videos; LH; 12/15/2016
  • EFF (Electronic Frontier Foundation): Surveillance Self-Defense e.g., How-To Tutorials:
    Avoid Phishing Attacks;
    [3] Circumvent Online Censorship;
    Delete your Data Securely on Linux, Mac OS X, Windows;
    Enable Two-factor Authentication;
    Encrypt Your iPhone, Your Windows Device;
    [3] Install and Use ChatSecure;
    Use KeePassX password manager;
    [3] Use OTR (Off-the-Record) for Mac, Windows, Linux;
    [3] Use PGP (Pretty Good Privacy) for Linux, Mac OS X, Windows;
    [2] Use Signal for Android, iOS;
    [3] Use Tor (The Onion Router) for Windows, Mac OS X;
    [2] Use WhatsApp on Android, iOS; EFF; 12/1/2016
  • A beginner's guide to beefing up your privacy and security online
    Install updates, especially for your operating system and your browser;
    Use strong passwords and passcodes;
    Encrypt your phones and computers;
    Two-factor authentication;
    Using a password manager (and good password practices);
    [2] Using Signal for SMS and voice calls;
    Using VPNs, especially on public Wi-Fi;
    E-mail security (is hard to do);
    Deleting old e-mails; Ars; 12/1/2016
  • 3 Ways to Boost Your Family's Online Security This Holiday
    1. Download Firmware, Operating System, and App Updates;
    2. Securely Configure Wi-Fi Networks;
    3. Strengthen Email Password; Wired; 11/24/2016
  • 11 security basics that keep you safe from holiday tech dangers slideshow
    1. Card skimming;
    2. Support scams;
    3. Phishing;
    4. Public Wi-Fi;
    5. Internet of Things;
    6. System and software patching;
    7. Ad blocking;
    8. Two-factor authentication;
    9. Check statements;
    10. RFID protection;
    11. EMV cards (Europay-Mastercard-Visa chip); MW; 11/22/2016
  • 10-Minute Digital Privacy Tuneup
    Turn on Automatic Updates;
    Use Screen Locks on Every Device;
    Check Your Data-Breach Status;
    Use Temporary Email Addresses;
    Cover Your Laptop Webcam;
    Use the HTTPS Everywhere Browser Extension;
    Turn Off Location Tracking in Apps; CR; 9/20/2016
  • 12 Security Tricks to Stay Safe Online
    1. Keep your software up to date;
    2. Trim down your browser;
    3. Turn on two-step verification;
    4. Check activity on your accounts;
    5. Protect your phone's lock screen;
    6. Protect your laptop account;
    7. Embrace end-to-end encryption;
    8. Be careful on public wi-fi;
    9. Don't share more than you need to;
    10. Check your key accounts;
    11. Get help with online security;
    12. Use a few real-world hacks, e.g., tape over webcam, wired connection, no passwords on post-its; Giz; 8/5/2016
  • Mac News Network: security best practices:
    part 1 passwords, Wi-Fi, encryption, phishing; 6/6/2016;
    part 2 password managers, downloads, account security; 6/8/2016;
    part 3 unregistering devices, private browsing mode, VPNs; 6/10/2016
  • Top 10 Tech Security Basics Every Person Should Follow
    1. Watch Out for Social Engineering Attacks;
    2. Make Your Phone's Lock Code More Secure;
    3. Back Up Your Computer Automatically;
    4. Install the Best Antivirus and Anti-Malware Software;
    5. Lock Down Your Wireless Router;
    6. Never Send Sensitive Information Over Email Unless It's Encrypted;
    7. Don't Use Public Wi-Fi Without a VPN;
    8. Use a Password Manager;
    9. Use Two-Factor Authentication;
    10. Regularly Review Your App Permissions and Security Settings; LH; 3/26/2016
  • 9 Facts About Computer Security That Experts Wish You Knew
    1. Having a strong password actually can prevent most attacks;
    2. Just because a device is new does not mean it's safe;
    3. Even the very best software has security vulnerabilities;
    4. Every website and app should use HTTPS;
    5. The cloud is not safe -- it just creates new security problems;
    6. Software updates are crucial for your protection;
    7. Hackers are not criminals;
    [2] 8. Cyberattacks and cyberterrorism are exceedingly rare;
    [3] 9. Darknet and Deepweb are not the same thing; Giz; 8/9/2015
  • Google: Comparing Expert and Non-Expert Security Practices
    Use antivirus;
    Install latest OS updates;
    Turn on automatic updates;
    Update applications;
    Clear cookies;
    Use unique, strong passwords; Don't write down passwords;
    Save passwords or use a password manager;
    Check if HTTPS; Look at the URL bar;
    Be skeptical of everything;
    Be suspicious of links -- don't click links from unknown people;
    Don't enter passwords on links in email; Don't open email attachments;
    Visit only known websites;
    Use two-factor authentication; 7/23/2015
  • Oregon State Public Interest Research Group (PIRG): Resource Guide to Online Privacy
    1. Social Media Privacy;
    2. Secure Passwords;
    3. Stop Cookies;
    4. How to avoid viruses;
    5. Keeping your Social Security Number secure;
    6. Secure Websites;
    7. Scam Email; 11/7/2013
  • Electronic Frontier Foundation: Ten Steps You Can Take Right Now Against Internet Surveillance
    1. Use end-to-end encryption;
    2. Encrypt as much communications as you can;
    3. Encrypt your hard drive;
    4. Strong passwords, kept safe;
    [3] 5. Use Tor;
    6. Turn on two-factor (or two-step) authentication;
    7. Don't click on attachments;
    8. Keep software updated, and use anti-virus software;
    9. Keep extra secret information extra secure;
    10. Be an ally to EFF; 10/25/2013

Safer Internet: Introduction: Finding More Help

Safer Internet: Introduction: Finding More Help

Local Groups, Classes | Online | People, Consultants, Companies


flowchart
Tech Support Cheat Sheet by XKCD is licensed under a
Creative Commons Attribution-NonCommercial 2.5 License

Local Groups, Classes

Online

  • Help / ? in your OS and applications -- as you look for and change settings.
  • This course's References sections for each topic, especially for your OS
  • Support sections on hardware / software vendor web sites: manuals, tutorials, FAQs, software updates, forums
  • Take Control e-books
  • How to Chat with Apple Support OSXD; 8/26/2020
  • Tech blogs / magazines, e.g., LifeHacker.com [LH]; ArsTechnica [Ars]; macOS/iOS: Tidbits.com [TB]
  • Online security tools: The holiday gift that shows you really care MW; Give a password management app or subscription; Add a second factor to complement a password; Sign them up for account breach notifications; Install free or paid anti-malware software; Set up nline backups; Turn on FileVault on their Macs; Set up a VPN account; Credit freeze; 12/5/2018

People, Consultants, Companies


Safer Internet: Introduction: Discounts

Safer Internet: Introduction: Discounts

Save $

  • Time-sensitive discounts/promotions are sometimes available for software, services, and e-books,
    e.g., especially around "Black Friday" and "Cyber Monday" (after Thanksgiving)
    or special dates, e.g., World Backup Day (Mar 31 for backup products).
  • Some member/referral discounts for password manager, e-books, backups, VPN and cell service are listed below:
  • Tidbits.com members can receive discounts
  • 1Password (password manager): 6 months free subscription
  • Take Control e-books (Macintosh System, Apps; iPad/iPhone/iPod;
    Internet/Networking; Digital Photography; Windows): 30%
  • and over 80 Mac and other products, e.g., Retrospect backup software: 20% to 40%
  • Backblaze: if subscribing to Backblaze backup cloud service, use this referral link -- or code: 00gxf7 --
    to receive a free month; and Steve receives a free month credit.
  • Witopia (VPN): if subscribing to PersonalVPN (aka Witopia) service, use this referral link -- or code: Q8Hg3YRM --
    to receive a 15% discount; and Steve receives a similar credit.
  • For unlimited cellular voice and text (and limited 4G dataplan) in US, you can save money
    by having a monthly, pay-for-what-you-need cellular phone plan.
    I suggest checking your bills over past year to see your average monthly usage.
    I pay < 1/2 with Consumer Cellular for our calling, texting and data compared to AT&T.
    If you decide to switch to Consumer Cellular, mention that Steve Weyer referred you, and we'll both get a credit;
    if you're an AARP member, you'll save an additional 5% per month
  • Consumer Cellular Offers Cheap, No-Nonsense Access to AT&T's Cellular Network TB; 7/12/2021

Safer Internet: Introduction: E-books

Safer Internet: Introduction: E-books

TCYOP

  • TCYOPAs mentioned earlier, this course is based on Joe Kissell's e-book:
    Take Control of Your Online Privacy {TCYOP}, from the excellent Take Control series of technical e-books.
    TCYOP is suggested but not required for this course;
    this course generally uses the same chapter/section headings and sequence.
  • 4.0; 4/11/2019; 178 pp.; reg: $15*
  • 'cheat sheet'; free; 1 pp. .pdf
  • sample; free; 43 pp.; .pdf
  • older versions: 3.0; 4/2017; 152pp.; 2.0; 5/2015; 135pp.1.1; 3/2014; 123pp.
  • "{TCYOP-4: #}" in course material refers to Chapter and Figure pages in the current .pdf edition
  • "{TCYOP-4: #; TCYOP-3:#}" (in smaller font) refers to pages in older editions (for students from previous terms).
  • *If there's enough interest before the class is offered, I can obtain discounted copies of TCYOP (@$3) for students.
    Or, you can save $ if you order multiple TakeControl e-books (many about related topics: Passwords; 1Password (password manager);
    Apple Mail; Backing up your Mac; Dropbox; FileVault; iCloud; iOS; macOS; Mac Security)
    , or join Tidbits.com (30%)

Safer Internet: Privacy, Security, Anonymity

Safer Internet: Privacy, Security, Anonymity

Quotes | Definitions | Analogy | References


Quotes

Definitions

  • Privacy: freedom from observation or attention
  • Security: freedom from danger or harm
  • Anonymity: freedom from identification or recognition {TCYOP-4: 17}
  • Advice, settings and tools may affect more than one of these, and be repeated for different topics

Analogy: paper postal mail

  • Privacy: postcard vs. envelope
  • Security: stolen check or ID; white powder; locked mailbox
  • Anonymity: no return address; PO box
  • open network"Before" network diagram: {Figure 1. TCYOP-3: 44; TCYOP-2: 39; TCYOP-1: 39}

References

Analogies


Safer Internet: What Do You Have to Hide?

Safer Internet: What Do You Have to Hide?

Quotes | Summary | Who's at Risk | Types of Info | Identify Theft, Credit Freeze | Farfetched Example? |
References: General | Attacks,Leaks | Equifax, Credit Bureaus & Freezes |
Face | Financial | Health | Home | Identity Theft | Location | Vehicles | Voting


Quotes

Summary

Who's at Risk?

  • Everyone's information, even a fragment, can valuable to someone for
    profiling, money (e.g., advertisers, hackers) and/or control (e.g., governments, abusers).
  • [1] Anyone who has ever had a loan or credit card -- very likely affected by 9/2017 Equifax breach
  • [1] Anyone whose SSN, email or other sensitive details have been
    or will be leaked by a careless company or incompetent government agency
  • [1] Anyone who's posted to Facebook or other social media
  • [1] Anyone unaware of current recommended privacy and security practices.
  • [2] Anyone who's read privacy policies and changed some settings -- there's always more to review / do
  • [3] Any high-profile target: celebrity, politician, business, political dissident,
    investigative journalist, whistleblower

Types of Info

  • Contact information: home address, phone, email -- yours and family
  • Vital Statistics: your birthday, birthplace, family members
  • Financial information: SSN, credit cards, purchases, tax returns, bank statements
  • Your current and past locations -- via smartphone or car
  • Photos
  • Medical information: health records, DNA
  • Biometrics: fingerprints, face scans, movement (motion sensors)
  • Password(s): if a password is stolen, login to that site and change it, before a hacker does
    -- hopefully, you have devious security question answers
    and/or 2-factor authentication for any sensitive accounts.
  • However, if you re-used that password for other sites -- a big no-no -- you'll have to scramble...
  • Email, chat, and other communication history
  • Browsing behavior -- current and historical {List. TCYOP-4: 87-98; TCYOP-3: 73-74}; browser 'footprint'
  • Personally-identifiable vs. anonymously-aggregated information; content vs. metadata
  • Data across different sites via cookies or IP address (or 'browser fingerprint')
    can be mined/aggregated to reveal patterns, and lead to individuals
  • How anonymous/unique are you: zip code + birthdate + gender?
  • Other devices: voting systems, (smart)TV, set-top/streaming box, game console,
    smart watch, health/fitness trackers, home automation, car; section: "Internet of Things" (IoT)
  • Others' devices: cameras, wearable technology
  • NYT quiz: How Many Times Has Your Personal Information Been Exposed to Hackers?
  • NIST Quiz: Are you Safe Online?
  • Pew: Cybersecurity Knowledge Quiz
  • haveibeenpwned.com check if you have an account that has been compromised in a data breach;
    pwned (gaming term) = totally dominated, conclusively defeated
  • HPI Identity Leak Checker check whether your email address, along with other personal data
    (e.g. telephone number, date of birth or address), has been made public on the Internet
    where it can be misused for malicious purposes

Identity Theft

  • A good place to start: FTC: identitytheft.gov
  • 2023 cyber-attacks targeted a vulnerability in the MOVEit filesharing technology used by
    many federal & state agencies and corporations around the world. This exposed personal information
    of millions of people, including social security numbers in many cases.
  • e.g., MOVEit hack spawned over 600 breaches but is not done yet -- cyber analysts Reut; 8/8/2023
  • Your bank or financial institution may offer a free credit monitoring service; set up credit freezes (below).
  • If you have ever had a loan, mortgage or credit card,
    you are very likely affected by the Equifax breach (9/2017)
    -- with at least your birthdate, name, address, SSN available to hackers worldwide
  • Equifax grand leak total (5/2018): 146.6 million names, 146.6 million dates of birth,
    145.5 million social security numbers, 99 million addresses
    and 209,000 payment cards (number and expiry date) exposed;
    also 38,000 American drivers' licenses and 3,200 passport details
  • You may be vulnerable due to other past or future leaks
    from other companies or government agencies with sloppy security.
  • However, there are still some things you can do to minimize the damage
    -- many of them free (with some redundancy)
  • Closely monitor credit card activity for unrecognized charges
    with your credit card companies -- at least monthly, but preferably more often.
  • Set up SMS and/or email notifications and fraud alerts with your credit card company
    for charges over certain amounts or from certain sources, esp. online, international.
  • Check your credit report & score, e.g., annualcreditreport.com free; creditkarma.com
  • If your credit card is missing or stolen, in addition to checking your report,
    you can set up notifications/alerts with some credit agencies.
  • optoutprescreen.com: to reduce mailed credit and insurance offers
    which might be stoken from your mailbox; opt-out for 5 years (electronically), for life (via mail)
  • File your income taxes as early as possible -- and setup an online account with IRS
    to review past tax returns -- so that a hacker doesn't file early (with your SSN) and claim a refund,
    or steal your info/identity: Get Transcript; View Your Tax Account

Check/Freeze Credit Reports

  • Freeze credit reports with all 3 major credit reporting agencies
    -- to prevent future applications for mortgages, auto loans, credit cards with your SSN
  • Federal law now requires credit bureaus to offer security freezes free of charge,
    and they're much simpler to set up than in the past;
    some states used to charge $10; unfreezes should also be free?
  • A freeze accomplishes the same thing as a lock, but with a freeze, your rights are defined by law.
  • With credit locks, the credit bureaus set the rules;
    the lock option is more prominent on their websites -- but I've provided direct links for setting up freezes below
  • If you set up only a lock earlier with EquiFax (or the other agencies),
    re-enroll with a freeze; note: any pre-existing lock will be removed, e.g., TrustedID Premier
  • Save the generated PIN, e.g., in your password manager, in order to unfreeze
    when applying later for a new loan or credit card.
  • Equifax: Freeze
  • TransUnion: Freeze
  • Experian: Freeze
  • Innovis: Freeze; lesser known than the 'big 3' credit agencies, but since it's free, why not?
  • National Consumer Telecom and Utilities Exchange for telecommunication, pay TV and utility accounts
  • Some credit/identity monitoring services may be free (with ads):
    e.g., CreditKarma.com; or included in membership, e.g., ProtectID (AAA)
  • Credit agencies and others may offer some free credit/identity monitoring services,
    but beware of paid upgrades for these and other services -- they're often unnecessary,
    duplicative, overpriced, e.g., Equifax: Complete Premier, Family Plan, ID Patrol
    do you really want to trust and reward the company (Equifax) that leaked your info in 2017?
    ;
    or Lifelock which paid FTC fines for deceptive advertising?

Farfetched Example?

CALLER: Is this Gordon's Pizza?

GOOGLE: No sir, it's Google Pizza.


CALLER: I must have dialed a wrong number. Sorry.

GOOGLE: No sir, Google bought Gordon’s Pizza last month.


CALLER: OK. I would like to order a pizza.

GOOGLE: Do you want your usual, sir?


CALLER: My usual? You know me?

GOOGLE: According to our caller ID data sheet, the last 12 times
you called you ordered an extra-large pizza with three cheeses,
sausage, pepperoni, mushrooms and meatballs on a thick crust.


CALLER: OK! That’s what I want.

GOOGLE: May I suggest that this time you order a pizza
with ricotta, arugula, sun-dried tomatoes and olives
on whole wheat gluten free thin crust?


CALLER: What? I detest vegetables.

GOOGLE: Your cholesterol is not good, sir.


CALLER: How the hell do you know?

GOOGLE: Well, we cross-referenced your home phone number with your
medical records. We have your blood test results for the last 7 years.


CALLER: But I do not want your rotten vegetable pizza!
I already take medication for my cholesterol.

GOOGLE: Excuse me sir, but you have not taken your medication regularly.
According to our database, you purchased a box of 30 cholesterol tablets
only once, at Drug RX Network, 4 months ago.


CALLER: I bought more from another drugstore.

GOOGLE: That doesn’t show on your credit card statement.


CALLER: I paid in cash.

GOOGLE: But you did not withdraw enough cash
according to your bank statement.


CALLER: I have other sources of cash.

GOOGLE: That doesn’t show on your last tax return unless you bought
them using an undeclared income source, which is against the law.


CALLER: WHAT THE HELL?

GOOGLE: I'm sorry, sir, we use such information only
with the sole intention of helping you.


CALLER: Enough already! I'm sick to death of Google, Facebook, Twitter, WhatsApp
and all the others. I'm going to an island without internet,
cable TV, where there is no cell phone service
and no one to watch me or spy on me.

GOOGLE: I understand sir, but you need to renew your passport first.
It expired 6 weeks ago.

References

Attacks, Leaks

Equifax, Credit Bureaus & Freezes

Face

Financial

Health

Home

Identity Theft

Location

Vehicles

Voting


Safer Internet: Who Wants Your Private Data?

Safer Internet: Who Wants Your Private Data?

Quotes | Summary |
References: General | Companies | Government | Hackers, Trolls, Doxers


Quotes

Summary

  • Does a 'free' service require you to provide personal data or view ads?
  • How do social media, advertisers, your ISP/cell provider, "Big Data" to support 'free' content or generate revenue?
  • Employers, neighbors, stalkers, a vindictive ex
  • Banks, lenders, and insurance companies
  • Hackers
  • "Big Brother": the government and law enforcement. NSA, GCHQ (UK), FBI, CIA, DOJ, TSA, ...
    -- since 9/11, anything goes for 'war on terror'
  • Major copyright holders (RIAA, MPAA)
  • [2] Request what companies are storing about you, then perhaps make changes to permissions and settings to minimize what's collected and shared. A few companies that provide such a 'data dump':
  • Apple: Privacy (portal); privacy.apple.com > Get a Copy of your Data
  • Facebook: My Account > Sign-in & security > Apps with account access; Settings > General > Download a copy of your Facebook data > Download Your Information > View : customize: dates, type/quality of info; Create File; (wait); expand .zip, open index.html in browser
  • Google: Takeout: create an archive with your data from Google products

References

Companies

Government

Hackers, Trolls, Doxers


Safer Internet: Develop a Privacy Strategy

Safer Internet: Develop a Privacy Strategy

Summary | Policy/Law | Planning | Behavior | Technology |
References: General | Policy/Law | Plan | Behavior | Technology


Summary

  • This course will provide both...
  • Parts of a possible strategy:
  • Policy & Law, e.g., read privacy policies, lobby government representatives
  • Planning, e.g., important services/features vs. privacy & security? tradeoffs; cost? risks?
  • Behavior, e.g., strong passwords; backup; update; think before you click or post (or signup)
  • Technology, e.g., password manager, encryption
  • (References)

Policy / Law

  • "Relying on the government to protect your privacy is like...
  • "Privacy policies" specify how your information will be used / shared -- no guarantee of protection or enforcement;
    if you have some time, peruse -- rather than blindly accept
  • Privacy policies and settings may protect you against other users, but not against misuse or carelessness by the company itself or its advertising/business partners
  • Most companies do not provide details about robustness of their security practices (because they're clueless, embarassed?)
  • Terms & Conditions and Privacy Policies can change without notice, usually not for the benefit of users
  • e.g., Linkedin: User Agreement (T&C), Privacy Policy; also: Ad Choices; Community Guidelines; Cookie Policy; Copyright Policy
  • My Data Request summarizes/links to privacy policies at over 100 different companies
  • Government regulations & laws usually lag the technology;
    if they exist, they often favor corporate donors, lobbyists and surveillance agencies over consumers

Planning

  • "Anything that can go wrong,...
  • from EFF: Assessing Your Risks: Threat Modeling:
  • "What do you want to protect?"
  • "Who do you want to protect it from?"
  • "How likely is it that you will need to protect it?"
  • "How bad are the consequences if you fail?"
  • "How much trouble are you willing to go through in order to try to prevent those?"
  • Consider risks & needs by:
  • location: home, school, work, vacation
  • task: banking, searching, communicating, entertainment
  • device: phone, tablet, computer, etc.
  • type of information: required, optional, sensitive, personal
  • convenience: all mail, calendar, search, payments, passwords with one trusted provider, or different places?
  • What is the business product model of companies you use?
  • e.g., Facebook, Google (advertising) vs. Apple (hardware)
  • How "free" are their services? Do they track you, and sell/share your info?
  • How does company respond to mistakes? Do you trust them?
  • Will they admit and fix a problem, or deny and repeat?
  • If their privacy settings don't protect your data, delete account and/or switch providers?
  • Cost of your time & attention: would you rather be doing something else with your life vs. fake news/gossip, cute videos, tweaking settings, ...?

Behavior

  • "The only people who like change...
  • "Just because you can't do everything...
  • "Hoaxes use weaknesses in human behavior...
  • "We are all robots when...
  • "Denial...
  • Accept that some changes are necessary; to get the most out of this class, some homework is required.
  • Invest attention and energy upfront to be proactive before problems occur.
  • Since it would overwhelming to do everything that we'll discuss immediately, be selective and phase in gradually over months
    -- maybe even take the class again next year!
  • Learn good habits, such as backing up regularly, updating software, choosing strong passwords, storing passwords securely,
    logging out when not using your computer; connecting to known, encrypted WiFi networks, etc.
  • TV / movies often unrealistic when portraying security threats / practices
  • Consider eliminating certain sites altogether, e.g., social media
  • Before: minimize personal information that you provide / volunteer, e.g., Facebook
  • After: inspect companies' data about you -- see What, e.g., Apple, Facebook, Google
  • [2] After: purge info from data brokers
  • Avoid installing malware inadvertently, e.g., clicking on links in suspicious emails, panicking & responding to scary popups
  • "Social Engineering" can often defeat many otherwise secure systems -- especially if request comes from harried "boss",
    desperate "friend", incarcerated "grandchild", irate "customer", e.g., phishing, fake sites
  • Quiz: What's Your Privacy Personality? Are You a Believer, Realist or Shrugger? (scroll to bottom)
  • PICNIC: "Problem In Chair, Not In Computer",
    or
    PEBKAC: "Problem Exists Between Keyboard And Chair"

    the "Pledge": don't do anything stupid! {TCYOP-4: 48-50; TCYOP-3: 36-38;}

  • [3] Cyberinsurance? Hire Security Consultant? Pray?
Non-expert Online Practices
1. Use Antivirus Software
2. Use Strong Passwords
3. Change Passwords Frequently
4. Only Visit Websites They Know
5. Don't Share Personal Info
Expert Online Practices
1. Install Software Updates
2. Use Unique Passwords
3. Use Multi-Factor Authentication
4. Use Strong Passwords
5. Use a Password Manager

Technology

  • "If you think technology can solve your security problems,...
  • "Technology is...
  • "1) Everything that's already in the world when you're born is just normal;...
  • "1) When a distinguished but elderly scientist states that something is possible,...
  • A single technology fix may not be adequate: multiple technologies and/or behavior changes may be needed.
  • Start by making one-time changes, such as more secure passwords, system & browser settings, privacy options on social networking sites, etc.
  • Advice & tools change over time -- security is akin to game of "whack-a-mole"
  • Ongoing: check vendor sites for updates; refer back here to course summaries & reference articles

summaryReferences

  • {TCYOP-4: 29-50; TCYOP-3: 29-38}
  • see also course section: Intro: Topics: To Do / Check Lists
  • sections: Refs: Policy/Law; Plan; Behavior; Technology
  • topics: data brokers, security prompts & fatigue, social engineering, threat modeling
  • Vendor sites for privacy and security information, e.g.,
  • Apple: How We Protect Your Privacy We protect your information on our products. We can create personalized experiences without using personal information. We give developers tools to meet our strict guidelines
  • Apple: Security macOS; Software Updates; Gatekeeper; FileVault 2; Privacy Controls; Password Generator; iCloud Keychain; Sandboxing; Runtime protections; Antiphishing; Find My Mac
  • Apple: Manage Your Privacy Secure your Devices: passcode; Touch ID, Find My;
    Secure your Apple ID: password, security questions, 2-step verification;
    Stay secure: phishing, passwords, notifications;
    Sharing: iCloud settings, location data, apps, ads, private browsing, children's privacy, diagnostic data
  • Apple: iOS Security iOS10 white paper: System Security; Encryption and Data Protection; App Security; Network Security; Apple Pay; Internet Services; Device Controls; Privacy Controls; Apple Security Bounty; 3/2017
  • Apple: Privacy Built-in; Government Information Requests; Privacy Policy
  • TakeControl: Are Your Bits Flipped? trust; excerpt of e-book
  • EFF: Surveillance Self-Defense TOC copied: 12/1/2016
  • Playlists: Academic researcher? Activist or protester? Human rights defender? Journalism student? Journalist on the move? LGBTQ Youth? Mac user? Online security veteran? Want a security starter pack?
  • Overviews: An Introduction to Threat Modeling; Choosing Your Tools; Creating Strong Passwords; Keeping Your Data Safe; Seven Steps To Digital Security; What Is Encryption? Why Metadata Matters
  • Animated Overviews: How Strong Encryption Can Help Avoid Online Surveillance; How to Make a Super-Secure Password Using Dice; Protecting Your Device From Hackers; Using Password Managers to Stay Safe Online
  • Tutorials: How to: Avoid Phishing Attacks; Circumvent Online Censorship; Delete your Data Securely on Linux, Mac OS X, Windows; Enable Two-factor Authentication; Encrypt Your iPhone, Your Windows Device; Install and Use ChatSecure; Use KeePassX; Use OTR for Mac, Windows, Linux; Use PGP for Linux, Mac OS X, Windows; Use Signal for Android, iOS; Use Tor for Windows, Mac OS X; Use WhatsApp on Android; Use WhatsApp on iOS
  • Briefings: An Introduction to Public Key Cryptography and PGP; Attending Protests (Intl., USA); Choosing the VPN That's Right for You; Communicating with Others; How Do I Protect Myself Against Malware? Key Verification; Protecting Yourself on Social Networks; The Problem with Mobile Phones; Things to Consider When Crossing the US Border
  • Passcode: Modern field guide to security and privacy CS Monitor; cybersecurity news and analysis
  • How to Declutter Your Digital World NYT; 9/15/2020
  • Total digital privacy is impossible, but obfuscation, the intentional shrouding of identity with useless information, can be a compromise MIT; 9/27/2019
  • What We've Learned From Our Privacy Project (So Far) Surveillance Tools Are Readily Available; We Don't Know Enough About What Happens to Our Data; Privacy Violations Affect Us in Tangible Ways; Sacrificing Your Privacy Might Sometimes Be Worthwhile; 7/16/2019

Policy/Law

Plan

Behavior

Technology


Safer Internet: Offline Data

Safer Internet: Offline Data

Introduction | Summary


Introduction

  • There are only 2 kinds of users:...
  • What happens to your information if:
  • your devices and/or backups are lost, stolen, destroyed or corrupted -- at home or while travelling?
  • you neglect to install security updates -- and your system is compromised?
  • you lose/forget your passwords?
  • you donate or sell your computer?
  • you become forgetful, incapacitated, or deceased?

Summary


Safer Internet: Offline: Passwords Intro

Safer Internet: Offline: Passwords Intro

Non-expert Online Practices
1. Use Antivirus Software
2. Use Strong Passwords
3. Change Passwords Frequently
4. Only Visit Websites They Know
5. Don't Share Personal Info
Expert Online Practices
1. Install Software Updates
2. Use Unique Passwords
3. Use 2-Factor Authentication
4. Use Strong Passwords
5. Use a Password Manager

Summary

  • Passwords are now covered in a separate 3-session OLLI course: P@s$w0rdz
  • As an introduction, each section below includes highlights copied from P@s$w0rdz --
    each Heading links to the corresponding detailed P@s$w0rdz section for the latest information.
  • A later section Browse: Protect Passwords originally covered advanced password issues;
    it now provides only an updated list of Reference articles about Passwords

Weak Passwords? Stronger Passwords

Generate Memorable / Complex Passwords

  • Three types of passwords:
  • 1. phone PIN/passcode -- memorable & typable; 8+ digits; optional: alphanumeric
  • 2. computer/tablet passcode; password manager; some online accounts
    -- memorable and/or typable; 4+ word phrases; optional: customize w/ digits, puncutation
  • 3. most online accounts -- complex & pastable: 20-64 complex character sequences
  • Possible random password generators:
  • Your imagination -- not so random, really!
  • Diceware: roll die 5 times to select a word from a list of 7776 (65) words in some language;
    repeat 4+ times to generate a random phrase; e.g., "correct horse battery staple"
    -- famous XKCD:cartoon
  • Diceware-like functionality in macOS and 1Password -- "Memorable"
  • mac pw assistantOS: e.g., macOS: System Preferences > Users & Groups > Password > Change Password > "key icon": Password Assistant : Numbers Only; Memorable; Random
  • mempina password manager, e.g., 1Password > Generate Password: PIN, Memorable, Random
  • Misc. web sites: quality varies; not so private if site logs trial passwords!

mac randTest Password Strength

  • Different web sites can rate the same password differently: Poor, Good, Excellent.
  • For more reliable, consistent result use one of these testers:
  • OS: e.g., macOS Password Assistant; only up to 31-characters
  • 1pw ollia password manager, e.g., 1Password, works for longer sequences
  • recommended online tester: zxcvbn
    -- zxcvbn also directly embedded in P@s$w0rdz:Testing
  • optional: disconnect network after loading page to prevent possible password logging (not necessary for zxcvbn).
  • below demo heading, enter password/passphrase into input field
  • goal for important accounts: entropy value: 75+ -- with crack time: centuries; explanation provided.

Store Passwords Securely

  • paper: ok for accounts if well-hidden? good for backup in Safety Deposit Box.
  • human memory: good for 2+ strong passwords -- for devices, password file/manager
  • browser autofill: avoid -- possible exception: if all Apple devices via iCloud?
  • "Single Sign-On" -- avoid entering Google, Facebook, Twitter credentials on 3rd party sites
  • computer file: fine if strongly encrypted, e.g., Excel doc via 7-Zip or Keka (AES-256); more manual step;s
  • Password Manager (PM): best. features: strong encryption (AES-256); sync/share between devices & family members;
    generate random passwords; autofill login credentials, organize/update passwords; credit cards; 2FA support; ...
    downsides: learning curve, possible cost
  • recommended PMs: 1Password, LastPass, Dashlane

Updating Passwords

  • Only change passwords if they're weak, reused or compromised -- or site insists on it.
  • Check if any of your accounts have been hacked ('pwned')
  • Plan an upgrade strategy for many passwords -- to avoid overload / procrastination.
  • Use password manager, e.g., 1Password "WatchTower", to proactively identify Reused; Weak; Compromised; Vulnerable passwords.

Security Questions / Secret Answers

  • "I don't have a bank account because...
  • Some sites use so-called 'secret answers' to questions as a pseudo-authentication factor besides a password.
  • However, an answer isn't secret if hackers can find it in public records, from breaches from other sites,
    or on social media sites -- don't post such personal details widely, or participate in 'fun' quizzes that reveal this info!
  • Instead, supply untrue, opposite, misspelled, foreign language, or unpredictable answers -- even random phrases.
  • If you're using a password manager, no need to remember these -- just store; then later, copy & paste

Recovery; User Names

  • Include email address and possibly phone # in account information, to facilitate account access and possible recovery , e.g., password reset.
  • For a primary email account, specify a secondary email address to receive notices about suspicious activity.
  • Most sites require an email address as a 'username';
    if so, provide a 'permanent' email address (rather than an ISP email address), or an email alias;
    if not, provide a unique username (not email) that marketers and hackers can't use to easily correlate your information.

Biometrics

  • You still need a strong passcode -- not only for initial setup and after updates / restarts,
    but also if you want to grant access to someone you trust or if you injure your finger, face...
  • A fingerprint or facescan is fairly reliable, and fairly secure (though subject to spoofing).
  • Biometrics can be a convenient shortcut to avoid entering device passcode too frequently, but use apprpriate timeouts.
  • Be extra cautious if using with important applications / sites, e.g., password manager
  • Legally you can be compelled to provide a fingerprint or facescan -- it's considered public;
    a password/passcode is considered private ("self-incrimination"), but courts or border crossing agents may try to compel you anyway.

2-Factor Authentication (2FA)

  • Although unique user names & random secret answers provide minor additional protection,
    for especially important accounts, e.g., financial, email, use a different second "authentication factor" (2FA)
    -- in addition to a strong password.
  • Generally, a good 2nd factor is a temporary code, provided via SMS (texting); issues: spoofing, service access
  • Best 2FA is a TOTP (Time-based One Time Passcode) provided via an "authenticator app" or physical token
  • Once set up, both the site and app generate -- in sync -- the same, new random code, which changes frequently.
  • Examples of authenticator apps: 1Password (built-in), Authy, Google Authenticator, Microsoft Authenticator

Safer Internet: Offline: Accounts

Safer Internet: Offline: Accounts

Summary | Account Password | Permissions | Firmware/SIM |
References: General | Android | Apple ID / iCloud |
iOS | macOS | Windows


Summary

  • [1] Set a strong account password / passcode:
    on your computer, tablet, phone to protect access:
  • to still logged-in apps, e.g., messaging, email, browser windows;
  • to files -- and encrypt also?
  • to contacts
  • to notifications, e.g., received (SMS/email) or generated (TOTP) account access codes (2FA).
  • Don't forget other devices (IoT): home security/control systems, smart speakers/TV, ...
  • [2] Setup separate accounts for each user to control access, e.g., non-admin, Parental Controls
  • [2] Use non-admin account for everyday access -- require admin password for software install & updates
  • [3] Set passwords for firmware and/or SIM
  • References

[1] Set Account Password

  • After setting a strong random password: 8+ digit PIN passcode for phone, 4+ word phrase for computers,
  • set a suitable timeout to make sure it's required when others might try to access:
  • longer: at home -- to minimize inconvenience;
  • shorter: in public or travelling;
  • immediate: when crossing border or leaving device unattended, e.g.,
  • macOS: (apple) > Lock Screen
  • There's no handy 'Lock Screen' button in the iOS Control Center;
    however, there is a workaround to display the Lock Screen and require a passcode -- maybe simpler to just shutdown device?
    in iOS 11, clicking power button quickly 5 times displayed Lock Screen-- now this sequence makes an Emergency Call
  • iOS: Settings > Accessibility > Touch > Assistive Touch: on -- enable Assistive Touch (handy if power button broken)
  • iOS: Settings > Touch ID & Passcode > iPhone Unlock: off -- disable Touch ID (so fingerprint can't be used on Lock Screen)
  • iOS: (assistive button) > Device > Lock Screen -- Lock Screen appears; passcode required
  • Limit number of login attempts? Auto-erase?
  • Add contact info maybe -- in case of loss (vs. Privacy) -- see Services: Location section
  • Avoid giving your password to to government entities who might access files, plant files or add spyware
  • -- or to tech support, esp. remote scammers; if you do, change it immediately afterwards, scan for malware, etc.
  •  macmacOS: System Preferences > Security & Privacy > Change Password
  • System Preferences > Users & Groups > Password > Change Password -- to set initial password, or change other accounts
  • System Preferences > Security & Privacy > Require password > (time)
  • Use same strong admin password for whole disk encryption, i.e., encrypt main storage disk/SSD (FileVault) and backup drive/partitions: incremental (TimeMachine), clone(Carbon Copy Cloner via FileVault) -- see Backup section
  •  iosiOS: Settings > Passcode > Turn Passcode On
  • iOS: Settings > Passcode > Change Passcode > Passcode Options: Custom Alphanumeric Code, Custom Numeric Code, 6-Digit Numeric Code
  • This code automatically encrypts your information (ditto for Android)
  • Use custom -- more than the default (4-6 digit); stronger, plus attacker won't even know length.
  • Although letters and symbols can be included, a much longer numeric PIN can be entered more easily on larger number-only keypad;
    it would still difficult to brute force, esp. if OS limits login attempts -- unless law enforcement has a bypass cracking device.
  • iOS: Settings > Passcode > Require Passcode > After x minutes/hours shorter when traveling?
  • iOS: Settings > Passcode & gt; Allow Access When Locked : Today View, Recent Notifications, Control Center, Siri, Home Control, Return Missed Calls
  • iOS: Settings > Passcode > Erase Data after 10 failed passcode attempts
  • iOS: Settings > Touch ID & Passcode fingerprint sensor on selected models, e.g., iPhone 6
  • Win: Settings > Accounts > Sign-in Options > Password > Add/Change
  • Enable whole disk encryption, i.e., BitLocker

[2] Setup separate accounts/permissions for each user

  • Admin account for installs/updates; 2nd admin backup account
  • Non-admin accounts for routine use to avoid accidental malware
  • Setup "Parental Controls" on shared computers?
  • When: now, or the next time you upgrade your OS or replace hardware, and migrate user info
  • macOS: System Preferences > Users & Groups
  • Win: Settings > Accounts

[3] Set Firmware password, SIM PIN

References

Android

Apple ID / iCloud

iOS

macOS

Windows


Safer Internet: Offline: Backups

Safer Internet: Offline: Backups

Quotes | Summary | Where? | Incremental | Complete | Offsite | What I Use | Other |
References: General | Android | Backblaze | Carbon Copy Cloner | Cloud | Death |
Dropbox | Future | Google | Hard Drive/SSD | iCloud | iOS | macOS |
Natural Disaster, esp. Cascadia Quake | OneDrive | Paper/Other | Photos |
Retrospect | SuperDuper | Thumb / USB Drive | TimeMachine | Windows


Quotes

Summary

  • "Data loss is when you no longer have access to your own data...
  • "Data theft is when someone else gets access to your data illicitly...
  • Backup frequency poll (2020) -- never: 19%; annual: 39%; monthly: 20%; 12%: weekly; daily: 10%; ~Backblaze; 6/18/2020
  • "3-2-1" backups: 3 copies of your data; 2 different, local methods (formats); 1 offsite
  • Disks & solid state drives (SSDs) -- and CDs, DVDs and thumb drives -- will eventually fail /corrupt
  • Recover from accidental deletions, theft, ransomware (Malware, Encryption), and incomplete system updates
  • 3Rs: Redundancy, Resiliency, Reliability
  • 1. Incremental: user files, settings -- to local or network external drive;
    often maintains some older file versions -- hourly/daily/weekly;
  • 2. Complete: user files & settings plus system and applications
    -- ideally an exact copy and bootable clone -- to local or network external drive -- weekly/monthly
  • 3. Offsite: cloud service -- ongoing (with internet connection), preferably automatically;
    partial: email, photos, contacts, notes, calendar, e.g., iCloud;
    selected files, folders (manually), e.g., iCloud, Dropbox, Google Drive, Microsoft OneDrive;
    passwords: synced between cloud & devices via password manager, e.g., 1Password;
    complete: cloud backup service such as Backblaze
  • Backups don't usually take long, e.g., < 30 minutes -- start before a coffee break or meal
  • World Backup Day March 31st (just before April Fool's)
  • International Verify Your Backups Day every Friday the 13th; TB
  • Check periodically that your backups actually occurred and that you can restore files!
  • When changing device settings, it's best to 'backup' the current settings, either via paper or screenshot, in case you change your mind.
  • References

Where to Backup?

  • Device or disk manufacturer may provide backup software, e.g., Time Machine, Retrospect
  • What is the total size (used + available) of your internal disk/SSD?
  • Option 1: Separate external drives, one for incremental, one for clone
    -- if you're concerned about the risk of a single drive failing or disappearing;
    some (newer) partitioned drives don't support bootable clones
  • Incremental (TimeMachine): size: 4x internal -- or more, if you'd like more versions and deleted files to be preserved
  • format: Disk Utility > OS Extended Journaled -- Encrypted (recommended); save recovery key!
  • you can enable encryption later: Time Machine Preferences > Encrypt Disk, which uses FileVault also
    -- however, enabling later is much s-l-o-w-e-r
  • Bootable clone(s) [Carbon Copy Cloner]: size: 1x internal -- or more, if you'd like multiple macOS versions, each in a separate partition
  • format: Disk Utility > OS Extended Journaled -- not Encrypted; CCC will convert to AFPS format (encrypt later)
  • before backing up [first time], System Preferences > Spotlight > Privacy: exclude backup drives
  • before cloning [each time], disable any automatic cloud-based backup,
    e.g., Backblaze Preferences > Settings > Schedule > Only When I Click Backup Now
  • after cloning [each time], renable any automatic cloud-based backup,
    e.g., Backblaze Preferences > Settings > Schedule > Continuously
  • to encrypt bootable clone backup, option-Restart; in Startup Manager, select backup disk/partition
  • after clone booted, System Preferences > Security & Privacy > FileVault: Turn On; save recovery key!
  • after clone encrypted, option-Restart; re-select internal disk/SSD
  • Option 2: [2] single local external disk partitioned to contain both incremental and clone backups -- convenient and economical; however, some cloned backups might not boot from newer partitioned drives?
  • e.g., 1x: 250G (clone); 3x: 750G (incremental; multiple versions/deleted files accessible)
  • Option 3: Cloud storage, e.g., iCloud, Backblaze. How secure is the cloud?
  • Very -- depending on how files are encrypted and stored, and who has access.
  • For brief explanation of different levels of security (via encryption) for Local and Cloud, see P@s$w0rdz:Storing:Encrypt
  • Option 4: [2] Shared local network drive (possibly with redundant drive arrays, e.g., RAID)

[1] Incremental Backup

  • Backup only what's changed, automatically: user files, multiple versions, settings, contacts, bookmarks
  • Frequency: hourly/daily/weekly -- esp. if many files added/changed; also, before any system updates
  • Alternatively, you could periodically backup selected files/folders manually to USB drive and/or cloud folder, e.g., DropBox, Box, Google Drive, Microsoft, OneDrive -- but, will you remember to do it?
  • macOS: Time Machine > Open Time Machine Preferences: select disk; Backup Now
  • (restore): Time Machine > Enter Time Machine [image]
  • Win: Settings > Update & Security > Backup > Backup Using File History
  • File History tool automatically saves multiple versions of a given file, so you can restore a file before it was changed or deleted

[1] Complete Backup

  • A complete, bootable clone contains everything, including applications and system files, and can help you recover from incomplete software updates
  • Frequency: weekly/monthly; also, before major system cleanup & updates -- and after successful updates
  • iOS (USB): Finder > Preferences > Sidebar > CDs, DVDs, and iOS Devices
  • macOS (to disk): Carbon Copy Cloner
  • Due to increased security in macOS, backup apps need to be granted permission for 'full disk access':
  • macOS: System Preferences > Security & Privacy > Privacy > Full Disk Access --
    apps provide directions, e.g., Carbon Copy Cloner, Backblaze; permission needed also for system cleanup tools like Titanium's Maintenance or Onyx
  • Win: Settings > System & Security > Set up backup
  • Backup and Restore creates a single backup of the latest version of your files on a schedule. It can also create a “system image,” which is a snapshot of your entire system -- operating system, programs, documents, and all -- which makes it easy to restore everything

[1] Offsite: Cloud and/or Other Physical Location

  • Store backup(s) somewhere other than your house/office in case your device and local backups are damaged, stolen, hacked, ...
  • USB/external disk/DVD at a remote site, e.g., bank Safety Deposit box, trusted friend's house
  • For desktop systems, a cloud provider can provide an automatic, complete backup with 'unlimited' storage for relatively small cost, e.g., ~$5/mo.
  • Frequency: ongoing
  • macOS (to cloud): Backblaze
  • Initial backup may take days, depending on number/size of files, and speed of internet connection
  • Restore selected files via download; since restoring everything from a remote backup could take awhile, service may ship a loaner drive, e.g., Backblaze
  • see References for other products, e.g., Retrospect; Carbonite: Windows ok, but Mac not, due to lack of private keys
  • Other cloud options are available for mobile devices and selected data and settings -- often free if default storage used, e.g., iCloud < 5GB
  • A password manager can store/sync encrypted passwords, e.g., 1Password on 1password.com, iCloud or Dropbox
  • Email backup may not be necessary if using IMAP, i.e., messages already stored on ISP's mail server and cached on each device
  • Share -- and backup -- documents & photos via services like Dropbox, Google Drive, iCloud, Microsoft OneDrive
  • Back up/sync system settings, bookmarks and certain types of documents and data via iCloud
  • iOS: Settings > (your acct) > iCloud: Photos, Mail, Contacts, Calendars, Reminders, Notes, Safari, News, Home, Game Center, Siri, Keychain, Find My iPad/iPhone, iCloud Backup
  • iOS: Settings > (your acct) > iCloud > Storage > Manage Storage > Backups: device; Documents&Data
  • iOS: Settings > (your acct) > Family Sharing -- setup
  • iOS: Settings > (your acct) > iCloud > Manage Storage > Share With Family -- share iCloud storage
  • What's shared: Apple media purchases, Apple Music family plans, iCloud storage plans, Photo album, Calendar, Reminders, Locations, Find My iPhone family view
  • Not shared: songs in iTunes Match (not purchased in the iTunes Store), in-app purchases, items hidden by a group member, some apps from the App Store (this is left up to each developer)
  • macOS: System Preferences > iCloud: Photos, Mail, Contacts, Calendars, Reminders, Safari, Notes, Keychain, Back to My Mac (File/Screen Sharing), Find My Mac
  • macOS: System Preferences > iCloud > Manage... (lower right)
  • macOS: icloud.com > Settings (home) > Storage
  • Is cloud storage safe?
  • Encryption depends on the strength & security of the encryption key -- in addition to the password you use to login to cloud provider (plus its security practices)
  • Encrypting in transit (via HTTPS:) is assumed; is file decrypted by provider before being re-encrypted?
  • If cloud provider has that key, files are vulnerable to hacking or government request -- only you should know / control separate 'private key' (which is not same as login password)
  • Conclusion: Extremely secure if file already encrypted 'end-to-end', e.g., password manager;
    or cloud service uses a separate (non-account) key which only you have, e.g., Backblaze
  • Ideally, 2-step authentication is available to protect account login -- section: Passwords

update backup iTunesWhat I Use

  • two separate external drives: for TimeMachine and for Carbon Copy Cloner
  • cloud services: iCloud, Backblaze
  • incremental [ext disk]: macOS: TimeMachine -- files; several times/week
  • incremental [cloud]: macOS, iOS: iCloud -- Safari, Settings, etc.; notes; ongoing; 1password.com
  • incremental [cloud]: macOS: Backblaze -- all files; ongoing (also external non-backup partitions);
    if you subscribe to Backblaze, use this referral link (or code: 00gxf7) to receive a free month; Steve receives a free month credit.
  • complete [ext disk]: macOS: Carbon Copy Cloner -- files, apps, system; monthly, esp. before macOS updates
  • complete (via macOS) iOS: files, settings, etc. (Manual) before iOS updates -- see screenshot on right {???}

Other

  • [1] Paper: important device & account passwords (esp. for password manager!) in SD box
  • [1] Save .pdf of various paper documents, e.g., manuals for devices & appliances from manufacturers sites
  • [1] While travelling, backup digital photos to local drive, other device or cloud
  • [2] Customize photo storage settings to optimize space, cost, sync time, esp. if you have many GB of photos & devices
  • [3] If you host a blog or website, make backups, e.g., WordPress.com > Dashboard > Tools > Export

References

Android

Backblaze

Carbon Copy Cloner (Mac)

Cloud

Death, Divorce

Dropbox

Future

Google

Hard Drive, SSD

iCloud (Apple)

iOS

macOS

Natural Disaster

OneDrive (Microsoft)

Paper, Other

Photos

Retrospect

SuperDuper (Mac)

Thumb / USB Drives

TimeMachine (Mac)

Windows


Safer Internet: Offline: Software Updates

Safer Internet: Offline: Software Updates

Quotes | Summary | When, What | OS | Apps | Add-ons |
Incremental Updates | Major Upgrades | Replace? |
References: General | Android | Apps | ChromeOS/Book |
Drivers, Firmware | iOS / iPadOS | macOS | Meltdown/Spectre |
Office Suites (and other apps) | Replace / Switch Devices | Windows


Quotes

Summary

  • "If it ain't broke, don't fix it"?
  • Even if you don't care about bug fixes or new features, privacy & security updates are very important.
  • It's a myth (procrastination excuse?) that newer versions are always larger, slower, buggier.
  • Take note of software upgrade/update notifications, e.g., popups, emails -- -- but don't interact directly with them.
  • It's better not to click on links/buttons in unexpected notifications, even if they seem from legitimate sources;
    browser popups about Flash are a notorious avenue for malware
  • Instead, check/update officially via app store, vendor, OS/app or settings.
  • Although most updates are generally reliable, it's a good idea to backup first anyway.
  • [1] Install Minor/Incremental Updates: System, Apps, Add-ons/Extensions -- within a few days
  • [2] Install Major Upgrades -- within a few weeks
  • [2] Consider replacing your device or browser -- if security updates are no longer offered; in the meanwhile, exercise extra caution when online; or run selected apps on a different more secure device.
  • [2] Don't forget other network(ed) devices, e.g., router, smart TV, IoT
  • [3] Run software and hardware diagnostics/repair utilities
  • References

When, What to Update: System, Apps, Add-ons

  • Backup!
  • If you minimize number of applications and add-ons, esp. if infrequently or not used (see Erasing section), there will be fewer items to update.
  • Each user will have different risk vs. benefit tradeoffs for what & when to update
  • Most tech-savvy user in family might do updates for everyone (whose accounts lack admin privileges)
  • Update sooner if the system or app security fixes are critical, i.e., browser, email, network, cloud
  • It's usually ok to wait a few days -- for a few weeks for major versions -- if you're travelling or extra busy, or to research incompatibilities.
  • Many bugs have already been detected and fixed during wider beta testing by developers (and daring users)
  • Any problem with a software update itself is usually remedied in a day or two -- plus, upgrade servers will be more responsive
  • Current/recent OS versions:
  • Usually, the latest version numbers/dates will be listed below -- and on Course Updates page:
  • The labels and color-coding suggest status/urgency for upgrading:
  • green: up to date
  • lighter green: Recent; incremental; upgrade soon
  • orange: Old; major; upgrade when convenient
  • red: Obsolete; upgrade asap, or replace -- if internet is used and security upgrades no longer avail

Operating System

  • system: e.g., Android, iOS, macOS (formerly "OS X"), Windows
  • for checking version / installing system update:
  • iOS: Settings > General > About : Version
  • iOS: Settings > General > Software Update
  • macOS: [apple] > About
  • macOS: System Preferences > Software Update
  • Win: Settings > System > About
  • Win: Settings > Update & Security > Windows Update
  • [2] Update software/firmware on other connected devices, e.g., router, smart TV
  • [3] Test/beta official OS versions -- only if you are a developer, bugged by a bug, can't live without a new shiny feature, or crave living on the 'bleeding edge'.

Apps

  • Individual apps: check for updates via app store, upon startup (app preference), or manually (via menu)
  • Ok to ignore updates for apps that you never use, e.g., built-in apps like GarageBand -- but why not remove if unneeded, or offload if easily re-downloaded?
  • Install system & application updates only from official store, from within apps, or reputable developers
  • Some apps offer option of automatically downloading and installing updates; it's up to you; I prefer to backup before installing most updates.
  • [2] Generally, don't download from 3rd party sites, e.g., CNet, Soft32, ZDNET, download.com, etc.
  • [3] Don't jailbreak your device with an unofficial OS, so that you can install nifty but questionable apps.
  • iOS: App Store > Updates
  • iOS: Settings > iTunes & App Store > Automatic Downloads > Music, Apps, Books & Audiobooks, Updates: ?
  • iOS: Settings > iTunes & App Store > Use Cellular Data: ?
  • macOS: App Store > Updates: apps installed from store
  • macOS: Adobe Reader > Help > Check For Updates
  • macOS: Backblaze > Check For Updates
  • macOS: Carbon Copy Cloner > Carbon Copy Cloner > Check For Updates
  • macOS: Firefox > Firefox > About Firefox
  • macOS: Google Chrome > Chrome > About Google Chrome
  • macOS: System Preferences > Java > Update
  • macOS: LibreOffice > Help > Check For Updates
  • macOS: Microsoft Excel/Word/Powerpoint > Help > Check For Updates
  • macOS: Skype > Skype > Check For Updates
  • macOS: Zoom > Check for Updates
  • Allow easier installation of free apps?
  • iOS: Settings > (your acct) > iTunes & App Store > Password Settings > Free Downloads > Require Password: off
  • [2] Save $ by purchasing apps only once for each family device via accounts usually sharing same payment method
  • iOS: Settings > (your acct) > Family Sharing
  • macOS: System Preferences > iCloud > Manage Family
  • [3] macOS: System Preferences > Security & Privacy > 'app was blocked from opening because it is not from an identified developer' > Open Anyway

Add-ons: Plugins, Extensions

  • add-ons customize/extend an app, esp. a browser
  • Once installed, most browsers check/update automatically, or via sytstem preference
  • Do not update browser extensions, e.g., Flash, or apps when prompted via a browser popup -- use app store, or app or extension's own 'Check for Updates' command
  • Look for install options -- often checked by default -- that might install unwanted extensions or adware, or change settings (home page, search engine); e.g., Oracle's Java installer
  • plugins: e.g., Adobe Flash; Oracle Java -- or consider uninstalling altogether
  • extensions: e.g., Adblock Plus, HTTPS Everywhere
  • macOS: Safari > Preferences > Extensions > Updates : Install Updates Automatically
  • macOS: System Preferences > Flash Player > Advanced > Updates

[1] Install Minor/Incremental Updates, e.g., #.1

  • Backup -- both incremental and clone -- before cleanup; again before actual installation;
    see When, What to Upgrade; Backup section
  • If you always keep your device up-to-date, it should be easier to migrate to future system & app releases
  • You can usually wait a day or two -- or even longer if there are no security fixes for your particular device
  • Update may contain bug fixes, and minimal new features
  • Allow enough time for backup, download and install -- probably not before a trip or big presentation; updates usually go smoothly, but allow a little more time in case you need to troubleshoot or restore a previous system version.
  • General update info in previous sections, specific directions for different OS in subsequent subsections -- and References

Android

iOS

  • [Refs:iOS]
  • iOS: Settings > General > Software Update
  • iOS: App Store > Updates
  • iOS users may want to use iTunes to update iOS: easy to backup first
  • for OTA (over the air) updates via WiFi or cellular
  • < iOS9: update can fail due to low device memory
  • ≥ iOS9: update can be slower; apps are removed/reinstalled if needed to create temporary space

macOS

  • [Refs:macOS]
  • Out-of-cycle Security or Supplemental Updates may also be available, with no change to system version #
  • macOS: [apple] > About > Software Update
  • macOS: App Store > Updates -- macOS and selected apps
  • macOS (10.14): System Preferences > Software Update
  • macOS: System Preferences > App Store: download/install, password

Windows

[2] Install Major OS Updates, e.g., #.0

  • Backup -- both incremental and clone -- before cleanup or running diagnostics;
    again before actual installation; see When, What to Upgrade; Backup section
  • Install incremental or other updates to current OS and apps -- including Safari, iTunes for macOS -- before installing major updates
  • Allow even more time for backup, download and install -- to anticipate and remedy incompatibilities -- and if things don't go smoothly, for troubleshooting or restoring previous system version
  • Usually released about once/year: more major fixes, new features and possible incompatibilities
  • iOS: you should upgrade 'as soon as possible'; usually less complex than desktop upgrades; security fixes sometimes available for previous iOS version
  • macOS: incremental security fixes are still provided for previous system and browser for 1-2 years, so if there are really major changes, e.g., app incompatibility, user interface makeovers, missing features, performance issues, you could delay your upgrade -- though not indefinitely
  • Generally, you could wait a week or two for ".1" version to be released to avoid major bugs, especially if there are no critical security fixes and there are significant changes, e.g., file system
  • If there are multiple devices in a family, upgrade one first to test the process & outcome before upgrading others.
  • When you are ready to upgrade:
  • Read articles here about latest version, e.g., Android, iOS, macOS, Windows, or buy Take Control e-books to find out more about what's changed, compatibility/adequacy of your hardware (to run new os) and of apps (with new os), cleanup & backup steps, new features that you might actually like to have (or old features that might be removed that you can’t live without), installation advice
  • Remove unused applications and browser add-ons -- see Erasing section
  • Check if new OS version is incompatible with any important applications you have, e.g., upgrade info, release notes, vendor sites
  • Apple: macOS versions, compatibility; iOS, iPadOS updates
  • macOS: (apple) > About This Mac > System Report > Software > Applications: 64-bit(Intel) -- some 32-bit apps may still continue to work under High Sierra.
  • iOS10: Settings > About > Applications: 'these apps may slow down your iPad and will not work with iOS 11 if they are not updated'
  • For incompatible apps, consider upgrading version or finding a (free) alternative.
  • For example, instead of Microsoft Office 2011, which may not work with macOS 10.13 (High Sierra): HS 32-bit app incompatibility; plus, Microsoft has stopped providing support and security patches
  • offline apps: Microsoft Office 2016 -- $$; Steve's spouse upgraded to this
  • macOS/iOS iWork suite: Pages, Numbers, Keynote -- free; Steve switched to these
  • Open Office, LibreOffice, NeoOffice -- free
  • SoftMaker: Free Office (free); Softmaker Office: Std ($20+) / Pro; comparison
  • cloud-based storage & office suite (via browser): Microsoft: OneDrive: Word, Excel, PowerPoint Online -- free;
    Microsoft 365 -- subscription; includes apps (And,iOS,Mac,Win), 1Tb OneDrive cloud storage, 60 Skype minutes/mo.
  • Google Drive: Docs, Sheets, Slides -- free
  • Apple's iCloud: iWork (Pages, Numbers, Keynote) -- free
  • [2] Check disk permissions, repair (less necessary recently)
  • macOS (< 10.10): Disk Utility > Repair Permissions -- or run Maintenance (or Onyx) utility
  • [3] Restart from Recovery partition; check main disk; repair (if necessary)
  • macOS: restart w/ cmd-R > OS X Utilities > Disk Utility > Repair Disk
  • [3] Check hardware, e.g., memory
  • macOS: restart w/ D key; diagnostic runs automatically

[2] Replace Device?

  • Strongly consider replacing your device if security/privacy problems are no longer patched in your OS version -- and you can't upgrade, e.g.,
  • if your computer OS is more than 1-2 major versions behind -- see macOS, Win
  • usually if your tablet/phone OS is 1 or more major versions behind -- see Android, iOS
  • Your device doesn't support a newer OS -- or needs extra memory that you cannot (or do not want to) add
  • Apps you rely on are no longer provided/supported on your old OS (e.g., 32-bit when 64-bit will be required) -- and no updates are available
  • In the meanwhile, use an actively maintained browser, e.g., Firefox, Chrome -- rather than built-in browser, i.e., macOS Safari, Windows IE; and consider using the device only for casual (non-encrypted) browsing
  • Do you need just browsing, email, basic document creation/editing, and simple photo manipulation? If so, you might consider a tablet (iPad) or Chromebook -- less expensive, and much simpler to maintain/update than a full-blown desktop or laptop computer with macOS, Windows or Linux.
  • When purchasing a new device, especially a subsidized or less expensive one, request that vendor remove pre-installed bloatware, crapware, adware
  • If you're switching between different OS (versions or vendors), check if migration tools are available for contacts, bookmarks, settings, photos, accounts, etc.
  • When donating / discarding old device -- see Erasing section

References

Android

Apps

ChromeOS/Book

Drivers, Firmware

iOS / iPadOS

macOS

Meltdown / Spectre / ZombieLoad (hardware CPU flaws)

Office Suites (Microsoft & others)

Replace, Switch

Windows


Safer Internet: Offline: Encryption

Safer Internet: Offline: Encryption

Quotes | Summary | Intro | Device | Cloud | Notes | Indiv. Files |
References: General | Android | FBI (vs. Apple) | Government; Backdoor |
iOS | macOS | Quantum | Windows


Quotes

Summary

Encryption: Intro

  • We'll cover various kinds of encrypted internet connections later under Internet Connection: Wi-Fi, VPN and Web Browsing: HTTPS, shopping, Email, Talk and Chat
  • With today's faster processors, there's no perceptible delay for encryption/decryption.
  • For strong encryption, look for "AES-128" or "AES-256" (Advanced Encryption Standard) -- and create a strong password!
  • Avoid weak encryption, i.e., weak password (even with AES-128,-256), or older .zip format; standard .pdf or Office file
  • Backup any encryption or recovery key somewhere secure, e.g., password manager, SD box
  • If you also save recovery key in cloud (iCloud, Microsoft), you could conveniently access it, but so could government (legally or illegally) or hackers
  • Encryption becomes more vulnerable over time with faster processing, better algorithms, uncovered backdoors, more invasive laws / exceptions, quantum computers.
  • As a last resort, if you must share sensitive info, e.g., key, credit card, password, and end-to-end encryption is not available (email is typically decrypted at server, or your recipient may not be as careful as you are), communicate the information in fragments, e.g., separate emails, or use an alternate channel, e.g., text or phone

[1] Encrypt Entire Device / Disk -- and Backups

  • It's simpler to just encrypt entire drive rather than selected files.
  • iOS9+: automatic -- assuming strong (> 6 digit) passcode; also for recent Android
  • macOS: System Preferences > Security & Privacy > FileVault;
    i.e., FileVault 2; not recommended: "Legacy" FileVault (version 1) -- see Mac: FileVault references
  • You'll have to re-enter password after Logout / Shutdown, or sleep timeout; if you have a very strong macOS account password, you could encrypt using that same password and have it saved in KeyChain for convenience
  • Encrypt backup (incremental & clone) partitions/drives, e.g.,
  • macOS: Time Machine > Open Time Machine Preferences > (partition/disk) > Encrypt backups -- note much faster to encrypt during original partition/erase, rather than later
  • macOS: Carbon Copy Cloner: boot backup system, enable File Vault -- see Mac: Carbon Copy Cloner, FileVault references

[1] Encrypt Cloud Files & Backups

  • See Backups for earlier discussion of cloud storage
  • Files are normally encrypted in transit -- from your device to the cloud server
  • Many cloud services then encrypt the files based on their key and/or your account password;
    the files are accessible not only to you, but also to the provider, and by subpoena, to the government;
    also, if file/folder URL is shared or discovered, anyone could access file
  • More secure cloud services, e.g., BackBlaze, support use of a private key known only to you (different from your password).
  • The cloud service cannot decrypt files without this key, even under government demand -- more secure and preferable.

[2] Encrypt Notes

  • If you have a strong device password and full device encryption, this may be unnecessary
  • iOS: Notes > (share icon) > Lock Note
  • macOS: Keychain Access > Secure Notes

[3] Encrypt Individual Files / Folders

  • For individual files / folders, use "zip" utility w/ strong encryption, e.g., 7-Zip (Win, Linux) or Keka (macOS ), or recent WinZip -- not older original zip format
  • 'Password protection' provided by some apps, e.g., Word, .pdf, may be weak
  • If you want to encrypt more than a few files, and don't want to encrypt entire disk (or have an older Mac system), you can create a 'Disk Image' (embedded, compressed volume)
  • macOS: Disk Utility > File > New > Blank Image > encryption, image format: sparse bundle

References

Android

FBI (vs. Apple)

Government; Backdoor

iOS

macOS

[2] Quantum; Future

Windows


Safer Internet: Offline: Erasing Your Device

Safer Internet: Offline: Erasing Your Device

Summary | Apps | Device | Files | Redacting |
References: General | Android | iOS | macOS | Photos |
Recycling/Reselling | Redacting | Windows


Summary

[2] Erasing Apps -- and associated settings, and maybe data

  • Removing an unused app can free up storage, and reduce software update nags
  • To find out how much storage is used on your device: (esp. for apps, movies, videos, podcasts, music, photos, iOS backups)
  • iOS10: Settings > General > Storage&Cloud Usage > Storage > Manage Storage
  • iOS: Settings > General > iPad/iPhone Storage: Offload Unused Apps; iCloud Photo Library; individual apps
  • iOS: Settings > iTunes & App Store: Offload Unused Apps
  • macOS: [apple] > About This Mac > Storage > Manage
  • To remove not only an app, but also its settings, storage caches, etc.:
  • iOS: press down on app icon to enter move / delete ('jiggly') mode
  • tap "x" in upper left corner
  • popup: "Deleting (app) will also delete all of its data"
  • (press Home button to exit 'jiggly' mode)
  • To immediately delete related iCloud data:
  • iOS10: Settings > iCloud > Manage Storage > (device) > disable old app
  • iOS: Settings > (your acct) iCloud > Manage Storage > (app) > Delete Documents & Data
  • macOS: just dragging an app (from Applications folder) to Trash does not remove extra preference/library files
  • Use app's uninstaller (if one is provided) or an app removal utility, e.g., App Cleaner
  • [2] macOS: 3rd party utilities can find duplicate and large files, e.g., Disk Cleanup Pro (free; in the Mac App Store)
    "Disk Cleanup Pro automatically cleans up the big offenders, Caches and Logs, plus it allows you to scan for duplicate files and large files. You can set the threshold for file size (e.g. bigger than 50 MB) in preferences, and can set separate thresholds for different types of files (Movies, Photos, Text, etc.). It tells you broadly what type of file it is dealing with (Photos, Music, Documents, etc.); fileinfo.com can help you identify the kind of file for a file extension you don't recognize." ~Peter DeGroot, AshMUG
  • [3] macOS: (select files/folders) > File (ctrl-click) > Compress -- to reduce size of files you want to keep, but access infrequently; rename .zip if desired; delete originals when done
  • [3] macOS: Monolingual removes unused languages (and processor architectures) from System/Apps , e.g., just keep English yields ~2Gb
  • [3] macOS: (HD/SSD) : "Previous System" folder (if present: ~1-2Gb) can be deleted, but it can be very difficult/tricky to actually Empty Trash

[2] Securely Erasing Device / Disk

  • Securely erase drive before donating, discarding, recycling, selling or transferring your device; to be nice, re-install OS
  • This assumes that you've already backed up anything you care about, and migrated files/settings to any new device.
  • iOS: Settings > General > Reset > Erase All Content and Settings
  • Trigger auto-erase if lost or stolen?
  • iOS: Settings > Passcode > (passcode) > Erase Data -- after 10 failed passcode attempts
  • iOS: Settings > (your acct) > iCloud > (device) > Find My iPhone/iPad -- allows you to erase remotely
  • [3] macOS: erase disk and install OS
  • Boot from Recovery Partition (option-R during Restart); or your bootable clone; for older macOS, boot from DVD or USB
  • Utilities: Disk Utility > (select drive) > Erase -- generally use Format: Mac OS Extended (Journaled) (for now, don't use High Sierra's APFS); for older macOS, and non-SSD, use option to Erase Free Space: 3 (or more times), if available
  • Utilities: Reinstall macOS/OS X

[3] Securely Erasing Files

  • Even if you empty Trash / Recycle Bin, various utilities might be able to recover file content -- unless it's encrypted.
  • macOS: (≥ 10.10) use FileVault: erased file sectors are still encrypted -- thus unreadable; see Encryption section
  • macOS (< 10.10): Finder > Secure Empty Trash

[3] Redacting Files

  • Some source files (e.g., .doc, .pdf, .jpg) can retain layers / versions of info, i.e., metadata, or track changes;
    it might be recoverable via copy/paste or tools; just deleting it or overlaying an annotation may not be enough!
  • So, omit sensitive info from files in the first place: content as well as metadata such as Author, Organization
  • or, save edited document or selected screen area as an image
  • or, copy/paste selected (non-sensitive) info into a simpler format, i.e., one that removes any hidden info -- or use redaction tools
  • Remove photo metadata; e.g., phone location via iOS: Photo Investigator
  • Redact a .pdf or source document to remove sensitive info -- using proper tools, i.e., Adobe Acrobat Pro; otherwise, simple annotations / changes can be selected, copied, revealed

References

Android

iOS

macOS

Photos

Recycling / Reselling

Redacting

Windows


Safer Internet: Keep Your Internet Connection Private

Safer Internet: Keep Your Internet Connection Private

Summary | Preview | References


Summary

Preview: privacy / security / anonymity via encryption / indirection

  • Recall the letter / post office analogy in Privacy, Security, Anonymity section?
  • We're mostly concerned about content (postcard vs. letter) -- encryption
  • The address (actual vs. PO Box) could be important too -- anonymity via indirection
  • The following figures show the effect of encryption from various techniques
  • What's not shown: which information might be added, e.g., ads, tracking, malware
  • which information might be saved on client or servers, e.g., history, logs, caches
  • how secure your data is on their server, e.g., passwords, medical records, credit card, social security no.
  • how someone else accesses information you've 'published', e.g., email recipient, blog reader
  • no encryptionNone: {Figure 1. TCYOP-4: 56; TCYOP-3: 44} -- at right
  • [1] Wi-Fi (WPA2) [device-to-router]:
    {Figure 3. TCYOP-4: 58; TCYOP-3: 46}
  • [1] HTTPS: for browser, SSL/TLS for email [device-to-final specific site]
    {Figure 6. TCYOP-4: 67; TCYOP-3: 55}
  • [1-2] VPN [device-to-intermediate server; some address]
    {Figure 4. TCYOP-4: 60; TCYOP-3: 48}
  • [3] Tor [device-to-intermediate servers; most of address]
    {Figure 14. TCYOP-4: 104; TCYOP-3: 87}

References

  • {TCYOP-4: 51-77; TCYOP-3: 39-63; Wi-Fi connections, Cellular connections, DNS disruptions, ISP monitoring, Router monitoring, Malware, Location discovery, Quantum Computing and Encryption, Prevent Snooping}
  • Crosswords: Connection; Malware

Safer Internet: Connection: Encrypt Wi-Fi

Safer Internet: Connection: Encrypt Wi-Fi

Quotes | Summary | Connecting | Encrypting | Admin | Remote Admin |
DNS | Conn. Problems | Backup | Firmware | SIM Pin |
References: General | Android | Cellular | DNS, IP | iOS |
ISP | macOS | Modem, Router | Wi-Fi | Windows


Quotes

Summary

[1] Connecting to a Wi-Fi Network

  • Connect to known networks using WPA2 -- unless you're already encrypting traffic using a Virtual Private Network (VPN), and/or HTTPS: for all web sites and TLS/SSL for email.
  • This assumes that your device, router and destination web server have the latest security updates installed;
    there are exceptions depending on your risk tolerance.
  • WEP (Wired Equivalency Protocol) is old and easily cracked -- barely better than no encryption
  • WPS (Wi-Fi Protected Setup) lets you use WPA without having to enter a long password; however, you may be vulnerable if you have not changed the pre-shared WPA key from the factory default setting, and PIN feature is enabled -- one reason why WPS is less secure than WPA2
  • wpaNetwork figures
  • with no encryption (Wi-Fi, SSL/HTTPS): {Figure 1. TCYOP-4: 56; TCYOP-3: 44}
  • with Wi-Fi encryption: {Figure 3. TCYOP-4: 58; TCYOP-3: 46}
  • Connect intentionally -- not automatically -- to open (insecure) Wi-Fi networks.
  • By default, macOS & iOS connect automatically only to "known" networks, i.e., open or password-protected networks that you've connected to before
  • Automatic connections might occur in older systems or on other platforms?
  • For a new, unknown network, you can be prompted to join it, or to select it manually. it won't connect automatically
  • macOS: System Preferences > Network > Wi-Fi > Ask to Join New Networks : "on" (prompt you when a new network is avail) or "off" (you'll select manually)
  • iOS: Settings > Wi-Fi > Ask to Join Networks (same as macOS)
  • iOS: Settings > Wi-Fi > (select network > 'i' > Auto-Join -- customize for individual networks
  • high altitude dolomitesiOS: If a friend's iOS 11 device tries to connect to your Wi-Fi network, you’ll receive a prompt that lets you send over the password by tapping Send Password
  • To remove a network from the list of automatically connecting "known" networks (that you've connected to previously)
  • macOS: System Preferences > Network > Wi-Fi > Advanced > W-Fi > (select network) > "-"
  • iOS: Settings > Wi-Fi > "i" (for network) > Forget This Network
  • warningCheck encryption level from client: none?, WEP?, WPA? WPA2?
  • macOS: menubar > [option-click] Wi-Fi icon: current network stats displayed; other networks: hover to display stats
  • iOS: Settings > Wi-Fi insecure connection warning (right)
  • You could also use a utility, e.g., NetSpot (Mac, Win) that displays encryption level for nearby networks -- and signal/noise, etc.
  • Android, macOS, Windows: How to Check WiFi Security Encryption Type 1/24/2014

[1] Encrypting your Wi-Fi Network

  • Encrypt Wi-Fi networks you control WPA2 (Wi-Fi Protected Access) -- not WPA or WPA2/WPA combo -- certainly not WEP; eventually WPA3 -- with a strong password: memorable / typable occasionally by you & your guests
  • Weak/no password could create problems if neighbors use your connection (& IP address)
    for illicit activities or excessive downloads -- not an issue (e.g., hackers in your driveway)
    if your WiFi range does not extend outside, or for hard-wired devices (via Ethernet cable)
  • Check your router's manual (download .pdf) to locate settings and router IP address, e.g., http://192.168.1.1
  • Connect via web browser to router's local web server, or use manufacturer's configuration app
  • Netgear WPAUse WPA2/AES rather than TKIP encryption (note: old Netgear figure shows incorrect combo setting)
  • Apple Airport config {Figure 2. TCYOP-4: 47; TCYOP-3: 45}
  • Netgear: Wireless Settings > Security Options > WPA2
  • TP-Link: Wireless (freq) > Wireless Security > WPA2 [screenshot]
  • [2] To make your network freely available to others, e.g., during a disaster, set up a separate Guest network (with no password), rather than disabling security on your regular network, if possible [screenshot]
  • If you set up your smartphone to share its data connection via Wi-Fi (aka 'Personal Hotspot' or 'tethering'), be sure to set a password for security and to avoid others using your data allocation.
  • iOS: Settings > Personal Hotspot (if Cellular Data on) > On (Wi-Fi,Bluetooth,USB); Wi-Fi Password: xxx

[1] Router: Admin Password

  • Set a strong admin password -- this protects the router itself -- different from the Wi-Fi password you use or supply to guests; long, random -- save in password manager!
  • If password is required to be short (older routers?), also change admin user name
  • Netgear: Maintenance > Set Password
  • TP-Link: System Tools > Password [screenshot]

Netgear remote[1] Router: Disable Remote Admin and UPnP

  • Turn off ability to log in and administer your router remotely -- hopefully, it was already off by default
  • Netgear: Advanced > Remote Management
  • TP-Link: Security > Remote Management [screenshot]
  • [3] Re-enable if you have need / expertise
  • Disable UPnP (Universal Plug and Play) -- hopefully, it was already off by default
  • TP-Link: Forwarding > UPnP (or maybe Advanced > NAT Forwarding?)
  • Check if disabled: F-Secure's Router Checker or ShieldsUp!! Instant UPnP Exposure Test

Netgear DNS[1] Router/Device DNS

  • "What does a network administrator say after returning from work?...
  • DNS (Domain Name System) is a directory service that returns an IP address corresponding to a domain name, e.g., www.google.com (analogous to telephone white pages)
  • Change DNS name servers; e.g., Netgear w/ OpenDNS (right)
  • suggested servers (below) usually faster than your ISP's DNS
  • reliability/speed: these servers generally better than what your ISP provides
  • privacy: reduce ISP logging of sites visited
  • security: avoid ISP redirecting non-existent addresses to promotional ad sites
  • Several free DNS services, and their primary and secondary name servers: {TCYOP-4: 69}
  • CloudFlare: 1.1.1.1; 1.0.0.1
  • Cloudflare: malware blocking 1.1.1.2; 1.0.0.2; + adult content blocking: 1.1.1.3; 1.0.0.3;
  • Google Public DNS: 8.8.8.8; 8.8.4.4
  • OpenDNS (Cisco): 208.67.222.222; 208.67.220.220
  • Quad9: 9.9.9.9; 149.112.112.112
  • Recursive DNS: 156.154.70.1; 156.154.71.1
  • If set centrally in your router, all your connected devices will use the DNS servers
  • Netgear: Basic Settings > DNS Address
  • TP-Link: DHCP > DHCP Settings [screenshot]; Network > WAN [screenshot]
  • If you have no router (or it's someone else's), you can change DNS directly on individual devices via "Network > DNS settings"
  • iOS: Settings > WiFi > (network: "i") > Configure DNS
  • For iOS (and Android) devices, an app can manage DNS more simply, esp. for cellular data. e.g., "1.1.1.1 Faster Internet" (Cloudflare) sets up a VPN connection for DNS lookups.
  • macOS: System Preferences > Network > Advanced > DNS > DNS Servers
  • macOS: If possible, create separate network profile, e.g., Home, Travel?
  • You can also hide -- and encrypt -- DNS lookups by using a VPN (next section)

[2] Wi-Fi Connection Problems?

  • If your Wi-Fi connection seems 'stuck', first try toggling Wi-Fi connection off/on; check that expected router reconnects
  • macOS: (Wi-Fi icon) > Turn Wi-Fi Off/On
  • iOS: Settings > Wi-Fi: off/on -- note: disabling via iOS11 Control Center does not completely turn off!
  • If just one app not working, e.g., browser ok, but not email, close/reopen app
  • [2] Reset/get new device IP address
  • iOS: Settings > Wi-Fi > (current network "i" icon) > Renew Lease
  • macOS: System Preferences > Network > Advanced > TCP/IP > Renew DHCP Lease
  • Basic troubleshooting (step 1): Disconnect/Reconnect to router (Mac: option-click Wi-Fi icon); Turn Wi-Fi Off/On; reboot computer/device
  • Basic troubleshooting (step 2): Turn Off cable/DSL modem & Router; wait ~60 seconds; Modem On; wait ~30-60 seconds (for internet connection to be established); Router On; wait until Wi-Fi connection reappears on device

[2] Router: Backup Settings

  • If you have made numerous changes, back up router settings to ease restoration after any 'factory reset'.
  • Netgear: Maintenance > Backup Settings
  • TP-Link: System Tools > Backup & Restore

[2] Router: Update Firmware

  • Check your router manufacturer's web site periodically (or automatically upon login) for firmware (i.e., low-level software) upgrades -- and install them
  • Beyond having a good admin password, and disabling remote admin, this should further minimize security problems and attempts to weaken or hijack router, e.g., WPA2 protocol vulnerability (KRACK: Key Reinstallation Attacks) 10/16/2017; VPNFilter 5/23/2018
  • Netgear: Maintenance > Router Upgrade
  • TP-Link: System Tools > Firmware Upgrade [screenshot]
  • If you rent a router from your ISP, check with them about updates.
  • [3] Firmware in a cable modem should be updated automatically by your ISP.
  • Check current modem version by browsing (usually) to: http://192.168.100.1 to access diagnostic page;
    check manufacturer site for recommended version; contact ISP if major discrepancy.

[3] Set Device SIM PIN

  • On some devices, e.g., iPhone, iPad*, you can lock your SIM card so that cellular data can't be used without entering a PIN -- whenever you swap SIM cards or restart. To enable, disable or change your SIM PIN:
  • iPhone: Settings > Phone > SIM PIN
  • iPad: Settings > Cellular Data > SIM PIN (*Wi-Fi + Cellular models)

References

Android

Cellular

DNS, IP Addresses

iOS

ISP; Satellite

macOS

Modem, Router

cafe iceland no wifiWi-Fi

Windows


Safer Internet: Connection: Use a VPN

Safer Internet: Connection: Use a VPN

Summary | Choosing | Configuration |
References: General | Android | Government | iOS |
Products/Reviews | macOS | Windows


Summary

  • [1] Choose and Configure a Virtual Private Network (VPN) to connect to the Internet:
  • To keep info extra private or secure:
    when your device (or remote site) lacks the latest security updates
    -- https: (normally secure) might be vulnerable,

    or when communicating insecurely with a site via plain (unencrypted) http:
    -- block ad injections/tracking by ISPs,

    or when you're on an open, public, insecure non-WPA Wi-Fi network
    (including Wi-Fi with a widely distributed password, e.g., coffee shop -- though https: is usually enough)
    -- avoid MITM (man-in-the-middle) attacks from nearby,

    or when using a foreign cell carrier or SIM card (whose encryption might be compromised),

    or when plugging into a public ethernet jack, e.g., hotel cabling and/or switches may have been compromised.
  • If travelling, esp. internationally -- avoid monitoring and bypass content/service blocking,
    e.g., [1] location-based "geofencing", e.g., streaming services, banks? [2] government censorship of sites/apps
  • Potential disadvantages: configuration, slower, sites may detect/block VPN access
  • diagramHow much of connection is encrypted / anonymous?
    {Figure 4. TCYOP-4: 60; TCYOP-3: 48}
  • Connection between you and the VPN uses your IP address
    -- everything is encrypted.
  • Connection between VPN and destination site uses VPN's IP address
    -- content still encrypted, if https: used initially
  • Site does not see original IP address -- however, anonymity not guaranteed
    if government or hacker can obtain VPNs server logs
  • [1] Reduce monitoring/logging by network providers (ISPs, cell companies) and governments
  • If not using a full VPN, at least encrypt web address (DNS) lookups?
  • "1.1.1.1 Faster Interet" (free Cloudflare app; iOS, Android) uses a VPN
    to enable faster more secure DNS lookups (only) -- not content) (section: WiFi: DNS)
  • [2] If working remotely -- company info very attractive to hackers/spies
  • [2] Reduce recording of your searches by search engines, e.g., Google
    -- there are easier ways, e.g., see :Browsing:Search Privately
  • [3] For more anonymity (IP address), see Browsing:Anonymity, e.g., Tor, TAILS
  • [3] If you're a high-profile target: dissident, whistleblower, executive, celebrity, wealthy, cryptocurrency speculator, ...
  • [3] Supplement your firewall protection
  • References

Choose a VPN Service

  • paid version vs. free (ads, limits)
  • performance -- it can be somewhat -- or a lot -- slower
  • company experience, longevity, privacy policy, trustworthiness
  • anonymity decreased by server logs?
  • network reliability, availability
  • bandwidth/transfer limits
  • configuration ease & support
  • trustworthiness & accuracy of product reviews
    -- there are many mediocre or bad services; don't choose only because of an 'incredible' (life-time) price.
  • country of company's servers and operations?
    some believe their government can't obtain their logs if a VPN company is based 'offshore';
    if ownership and security policies of a VPN are not transparent, can you trust that it isn't run by a government agency, or ?
  • Joe's recommendations {TCYOP-4: 60-61; TCYOP-3: 49-50} -- all platforms, unless otherwise noted
  • [1] Free, ad-supported, usage caps, e.g., Hotspot Shield; privacy risk?
  • [1] Free, specific browser, e.g., Opera; Mac, Win
  • quick[1] Paid services/subscriptions:
  • Cargo VPN (Mac-only)
  • Encrypt.me (formerly Cloak)
  • Disconnect Premium; browser only? includes other privacy and security features
  • IVPN
  • personalVPN / WiTopia* (also: jumpthewall.net);
    Why Use a VPN?; Why We're the Best VPN;
    [1] And, iOS, Mac, Win; [2] others -- on right: "Quick Connect" screen;
    *if you subscribe to personalVPN, please use this referral link (or code: Q8Hg3YRM)
    -- you'd receive an immediate 15% discount, and Steve receives a similar credit!
  • Private Internet Access (PIA)
  • [3] NordVPN; also routes your connections through Tor
  • [3] Hardware VPN router, e.g., WiTopia Cloakbox Pro, e.g., for all home devices

setting iosConfigure and Use a VPN Service

  • Example personalVPN (Witopia): all platforms: apps & manual setup
  • personalVPN apps available: Android; iOS; macOS, Windows
  • others (manual setup): Chromebook, Fire, Linux, Surface, etc.
  • In app, login using separate VPN username and password
    -- different from main account credentials.
  • iOS: Settings > VPN; right: configurations: "1.1.1.1" & personalVPN
  • other macipad otherInstead of default (Quick) connection, change to
    a gateway/server in a different country or specific city,
    e.g., on right: iOS and Mac screens
  • [2] comparison of protocols;
    setup: IPsec; L2TP; IKEv2;
    [3] OpenVPN/OpenSSL most secure/customizable;
    [3] PPTP older, not recommended

References

Android

Government

iOS

macOS

Products / Reviews

Windows


Safer Internet: Connection: Avoid Malware

Safer Internet: Connection: Avoid Malware

Quotes | Summary | Types | User Practices | Apps | Plugins | Flash | Java | Anti-Virus | Advanced |
References: General | Android | Anti-virus | Cyberattacks/Cyberwar |
Extensions, Plug-ins | Flash, Shockwave | iOS | Java | JavaScript | macOS |
Microsoft Office | Ransomware | Spyware | Web Servers | Windows


Quotes

Summary

[1] Understand Different Types of Malware

  • Malware can access, compromise local files -- and online identities and accounts.
  • Viruses Wreak Havoc On Your Files
  • Spyware Steals Your Information
  • Scareware Holds Your PC for Ransom
  • Trojan Horses Install a Backdoor
  • Worms Infect Through the Network
  • There's often overlap

[1] Improve User Practices

  • Pay attention -- most malware requires active user involvement
  • Don't click on links or open attachments in an unexpected email from "friends", "boss", "family"
  • Use browser Bookmarks / Favorites or a password manager to access web sites -- see later section: Browsing: Go To Correct Site
  • Don't click on links in popups, or unknown links in web pages, esp. ads
  • Do not respond to popups that "hijack" your browser, esp. those that "found malware" or download unexpected 'Flash updates' -- just quit browser (see Block Ads section if you can't close/quit); reputable companies do not use such annoying / scare tactics

[1] Install and Update Approved Apps

  • Backup your Devices; install & update your software -- system and applications -- by downloading only from vendor's app store (if screened), app's own Update preference or control panel, other reputable sites
  • [3] macOS: System Integrity Protection (SIP) is enabled by default, which aims to protect critical system folders by locking them down; temporarily disable SIP only if you know what's you're doing
  • [3] Don't "jail break" or "root" your device, i.e., don't install unofficial or pirated system/application software -- or visit "warez" or "dark" sites
  • macOS: App Store
  • iOS: App Store
  • macOS: System Preferences > Security & Privacy > General > Allow Apps Downloaded From: [screenshot]
  • [1] Mac App Store
  • [2] Mac App Store and Identified Developers
  • [3] Anywhere -- note: option hidden by default in 10.12
  • [2] To open an "unidentified" app that you're sure about:
  • macOS: Applications > (ctrl-click app) > Open > Open
  • iOS: use the TestFlight app to accept expected invitations from known developers
  • Enable phishing/malware/plugin warnings
  • macOS: Safari > Preferences > Security > Fraudulent sites; Internet plug-ins [screenshot]
  • macOS: Firefox > Preferences > Security > Block reported attack sites / web forgeries / add-ons
  • macOS: Chrome > Settings > Advanced Settings > Privacy > Protect you and your device from dangerous sites
  • iOS: Settings > Safari > Privacy & Security > Fraudulent Website Warning [screenshot]
  • [2] Don't automatically open downloaded files (check file types)
  • macOS: Safari > Preferences > General > Open "safe" files after downloading [screenshot]

[1] Manage / Minimize Plugins, Extensions, Add-ons

  • macOS: Safari > Preferences > Security > Allow plugins [screenshot]; [screenshot: Plug-in Settings]
  • macOS: Firefox > Preferences > Applications
  • macOS: Firefox > Preferences > Security > Warn me when sites try to install add-ons
  • macOS: Chrome > Preferences > Advanced Settings > Privacy > Content Settings > Plugins; also Unsandboxed Plugins
  • Consider disabling problematic, obsolete, infrequently-used plugins
  • most sites, e.g., YouTube, default to HTML5 for video if Flash not present; Java less popular -- covered next
  • iOS: unnecessary -- since plugins are not generally allowed
  • configure to selectively load a plug-in if desired, or re-install if needed
  • remove obsolete plugins, e.g., Microsoft Silverlight
  • macOS: Finder > (disk/user) > Library > Internet Plugins

[1] Flash: Update, Block or Uninstall

  • iOS: NA
  • macOS: I generally recommend uninstalling Flash from system; if necessary to use for some Flash-based sites, selectively use Google Chrome, which keeps Flash up-to-date automatically (at least for a little while longer), provides "sandboxing", and also auto-pauses certain videos / ads
  • macOS: Chrome > chrome://plugins > Enable, Always Allow to Run maybe possible to run on-demand selectively via ctrl-click?
  • If you do need to use Flash more frequently / conveniently, make sure it's always up to date and control using a flash blocker
  • macOS: System Preferences > Flash Player > Advanced > Updates
  • macOS: System Preferences > Flash Player > Storage > Delete All
  • macOS: Safari > Preferences > Extensions > Get Extensions : ClickToFlash
  • macOS: Safari (ctrl-click) > ClickToFlash Preferences
  • macOS should automatically disable insecure versions, and display message: 'Blocked plug-in', 'Flash Security Alert' or 'Flash out-of-date'

 yahoo[1] Java: Update, Block or Uninstall

  • iOS: NA
  • macOS: System Preferences > Java > Update [screenshot]
  • macOS: System Preferences > Java > Security > Security Level
  • macOS: Safari > Preferences > Security > Allow Plugins > Website Settings : Java : Ask [screenshot]
  • If installer wants to install any crapware or change settings by default, e.g., Yahoo homepage, search engine -- uncheck anything you don't want! -- installer now seems to be 'clean'

[1] Install Anti-Virus (AV)

  • Install & maintain antivirus software on your device, if applicable & desired
  • Be careful where you obtain malware protection software -- some may be malware / adware itself -- especially if obtained via ad links, popups, pop-under windows
  • Having AV installed is no excuse to be careless
  • iOS: unnecessary
  • macOS: optional -- to avoid distributing infected files to others, e.g., Windows friends, or if still using external portable media from unknown sources: USB drives, CD/DVD, floppies, etc.
  • virus definitions may not include newest threats; scanning may slow down, interfere with system
  • examples: Avast; Avira; ClamXav; Comodo; Sophos
  • note: if you're running Windows on macOS (using Boot Camp, or virtualization software like VMware Fusion or Parallels Desktop), you should absolutely run Windows anti-malware software -- Mac anti-malware won't help
  • Windows: Windows Settings > Update & Security > Windows Defender
  • If you must use others' devices to access your accounts, make sure they're well-protected (antivirus) and maintained (software updates) -- see Mobile Privacy section, esp. to avoid keyloggers or other spyware

[3] Advanced Settings: JavaScript, WebGL, web admin

  • JavaScript: on
  • JavaScript (not the same as 'Java') is essential for most modern sites; most browsers don't provide an option to disable
  • macOS: Safari > Preferences > Security > Enable JavaScript
  • You can generally remove tracking scripts by using a Content/Ad Blocker -- see Block Ads section
  • WebGL: on
  • WebGL (Web Graphics Library) JavaScript-based graphics using GPU
  • macOS: Safari > Preferences > Security > Allow WebGL
  • If administering your own website, check system log for suspicious activity, e.g., logins to non-existent or unauthorized accounts, unexpected accesses to admin pages or to non-existent modules / pages / directories; add suspicious IP addresses to a 'deny list'

References

Android

Anti-Virus

Cyber Attacks, CyberWar

Extensions, Plug-ins

Flash, Shockwave [Adobe]

iOS

Java

JavaScript (JS)

macOS

Microsoft Office

Ransomware

Spyware

[3] Web Servers

Windows


Safer Internet: Connection: Turn Off Unnecessary Services

Safer Internet: Connection: Turn Off Unnecessary Services

Summary | Sys. Prefs | Login Screen | Find My ... |
Location | Camera, etc. | Bluetooth | Notifications | Speech |
References: General | Android | Bluetooth | Camera | iOS | Location |
macOS | Microphone | Notifications | Screens | Video | Windows


Summary

[1] Review System Preferences

  • Besides exploring every option under Preferences / Settings, you can use Search
  • macOS: System Preferences > Security & Privacy > Privacy : Location Services, Contacts, Calendars, Reminders, Accessibility, Diagnostics & Usage [screenshot]
  • macOS: System Preferences > Sharing : Screen, Files, Printer, Remote, Internet, Bluetooth [screenshot]
  • macOS: System Preferences > Extensions : All, Actions, Finder, Photos Editing, Share Menu, Today
  • iOS: Settings > Privacy : (many) [screenshot]
  • iOS: Settings > General > Restrictions: (many)
  • Windows: (File Sharing) {Figure 7. TCYOP-4: 72; TCYOP-3: 59}

[1] Add Contact Info to Login ('Lock') Screen

  • macOS: System Preferences > Security & Privacy > General (lock message) [screenshot]
  • iphoneiPhone: Health > Medical ID: Medical Conditions, Spouse, Child, Blood Type, Organ Donor
  • result: "Emergency" link on lock screen
  • iOS: add a message to your Lock Screen by overlaying text* on an image
  • You can also set this (or a different) image as your Home Screen (background for app icons).
  • iOS: Settings > Wallpaper > Choose a New Wallpaper > Camera Roll > [screenshot]
  • ... (tap lock image) > (iPhone:Set) > Set Lock Screen
  • ... (tap home image) > (iPhone:Set) > Set Home Screen
  • *[2] Use an image app on desktop or iOS to add text to an image; tradeoffs: cost, simplicity, flexibility.
  • e.g., use Preview on Mac to create 2 appropriately-sized images: one for use with Home Screen, one with text for Lock Screen
  • macOS: Finder > (select original image) > File > Duplicate; rename with suffix, e.g., 'home'
  • macOS: Preview > File > Open: 'home' image, e.g., my-ipad-screen-home.jpg
  • Preview: use rectangular selection tool to highlight a square area corresponding to device's smaller dimension
  • e.g., iPad Air: 2048x2048, iPhone 7: 750x750; square wallpaper will work with both portrait and landscape screen orientations
  • macOS: Preview > Tools > Crop; File > Save
  • macOS: Finder > (select 'home' image) > File > Duplicate; rename with suffix, e.g., 'lock'
  • macOS: Preview > File > Open: 'lock' image, e.g., my-ipad-screen-lock.jpg
  • macOS: Preview > Tools > Annotate > Text
  • add text, e.g., name, email, phone: yours(iPad), spouse(iPhone); customize font, size, etc.
  • macOS: Preview > File > Save
  • transfer lock (& home) image file(s) to Photos (iOS) via AirPlay, Messages, Mail, ...
  • set wallpaper(s) -- per earlier instructions
  • iOS: Settings > Control Center > Access on Lock Screen If on, someone would be able to enable Airplane Mode on a lost/stolen phone, which would disable Find My iPhone
  • iOS: Settings > Passcode (or Touch ID & Passcode) > Allow access when locked: Notifications, Siri, Wallet, etc. [screenshot]

[1] Enable Find My iPhone, iPad, Mac, Windows

  • To use: login to iCloud account
  • macOS: System Preferences > iCloud > Find My Mac [screenshot]
  • iOS: Settings > (my acct) > iCloud > Find My iPad/iPhone [screenshot]
  • [2] iOS: Settings > Privacy > Location Services > System Services > Status Bar Icon: off If your phone is lost/stolen, and you're tracking it, it's better not to advertise it, though this turns off for all location services?
  • Windows: Windows Settings > Update & Security > Find my Device
  • Windows iCloud setup for iOS devices

[1] Control Access to your Location

  • Before
  • And: Settings > Security & Location > Location > App-Level Permissions: on, off
  • macOS: System Preferences > Security & Privacy > Privacy : Location Services [screenshot]
  • macOS: ... Location Services > System Services > Details > Show location icon in menu bar when System Services request your location
  • macOS: Safari > Preferences > Privacy > Website use of Location Services [screenshot]
  • macOS: Firefox -- none?
  • macOS: Chrome > Preferences > Advanced Settings > Privacy > Content Settings > Location
  • iOS: Settings > Privacy : Location Services: Share My Location; Apps; System Services choices: Never, Always, While Using [screenshot]
  • iOS: Settings > (your acct) > iCloud > Share My Location
  • After: allow/deny for specific web sites that request access on an adhoc basis

[1] Control Access to your Computer, Keyboard, Camera, Microphone, Screen

  • An entrepreneur has made a device that can prevent the NSA from spying on you by blocking your laptop's camera. This new high-tech device is...
  • Avoid snooping on your keyboard and screen over your shoulder in public places; control remote access
  • macOS: System Preferences > Security & Privacy > Privacy > Accessibility > Allow apps to control your computer [screenshot]
  • macOS: System Preferences > Sharing > Screen Sharing; Remote Login [screenshot]
  • macOS: System Preferences > Security & Privacy > Privacy > Camera
    older versions: use a piece of cardboard & tape except for specific apps!
  • macOS: Chrome > Preferences > Advanced Settings > Privacy > Content Settings > Mouse cursor; Media (camera, microphone)
  • iOS: Settings > Privacy > Microphone, Camera, Motion [screenshot]
  • iOS: Settings > Safari > Camera & Microphone Access
  • Windows: Windows Settings > System > Remote Desktop

[1] Limit Access to Bluetooth

  • a wireless technology standard for exchanging data over short distances between "paired" devices, e.g., for keyboard, headset, AirDrop (file sharing), share Internet connection
  • range: 30-300' depending on device power Class and environmental factors
  • most modern devices and implementations support encryption
  • however, if you enable only temporarily when you need it, your device will be more secure, use less power, etc.
  • macOS: System Preferences > Bluetooth > Turn Bluetooth: On/Off [screenshot]
  • iOS: [swipe up] > AirPlay
  • iOS: General > AirDrop: Contacts Only -- or Receiving Off; if Everyone then just temporarily
  • iOS: Settings > Bluetooth: On/Off [screenshot] -- note: disabling via iOS11 Control Center does not completely turn off!

[2] Control System and App Notifications

  • Messages that appear in the 'Notification Center' can be useful vs. annoying
  • risk if someone sees screen, e.g., verification codes via SMS; allow/deny for web sites that request access?
  • macOS: System Preferences > Notifications [screenshot]
  • macOS: Safari > Preferences > Websites > Notifications: Allow websites to ask for permission to send push notifications
  • macOS: Chrome > Preferences > Advanced Settings > Privacy > Content Settings > Notifications
  • iOS: Settings > Notifications [screenshot]
  • iOS: Settings > Notifications > Show Previews > When Unlocked
  • Windows: Windows Settings > System > Notifications & Actions

[2] Control Sharing of Speech & Analytics Data

  • Collecting data about crashes and usage of services can improve system services and applications
  • Is it anonymized? Read privacy policies
  • iOS: Settings > General > Siri > About Siri and Privacy (read)
  • Dictation online: spoken words are recorded and uploaded to Apple's servers for translation
  • Enhanced (offline) mode more private but requires software install
  • macOS: System Preferences > Dictation & Speech > Dictation > Use Enhanced Dictation
  • iOS: Settings > Privacy > iPad/iPhone Analytics: [none/all] Share iPad Analytics (with Apple), Share With App Developers, Share iCloud Analytics (with Apple)
  • macOS: System Preferences > Security&Privacy > Privacy > Analytics: [select] Share Mac Analytics (with Apple), Share with App Developers, Share iCloud Analytics (with Apple)

References

Android

Bluetooth

Camera

iOS

Location

macOS

Microphone

Notifications

Screens

Video

Windows


Safer Internet: Connection: Use a Firewall

Safer Internet: Connection: Use a Firewall

Summary | Built-in Software | Block Ports | Other Software |
References: General | macOS | Windows


Summary

[1] Enable your device's built-in software firewall

  • iOS: not necessary
  • macOS: System Preferences > Security & Privacy > Firewall > Turn On
    [screenshot] you'll need to click the lock and provide your admin password
  • macOS: {Figure 9. TCYOP-4: 76; TCYOP-3: 62}; Win: {Figure 8. TCYOP-4: 75; TCYOP-3: 61}

[2] Block/unblock specific ports/services

  • macOS: System Preferences > Security & Privacy > Firewall > Firewall Options [screenshot]

[3] Install 3rd party software

References

macOS

Win


Safer Internet: Browse the Web Privately

Safer Internet: Browse the Web Privately

Quotes | Summary |
References: General | Chrome (Google) | Crosswords | DuckDuckGo |
Edge, Internet Explorer (Microsoft) | Firefox (Mozilla) | Opera | Safari (Apple)


browsersQuotes

Summary

References

Chrome: Google

Crosswords

DuckDuckGo

Edge: Microsoft

Firefox: Mozilla

Opera

Safari: Apple


Safer Internet: Browsing: Go to the Correct Site

Safer Internet: Browsing: Go to the Correct Site

Quotes | Summary | Navigating | Malicious | Fraudulent Warnings |
URL status | Shortened URLs | Web Archives |
References: General | Dark Patterns | Fake, Hoax |
Shortening Services | Web Archives


Quotes

Summary

  • Use browser bookmarks/favorites or a password manager to navigate, rather than type or click on links
  • Use browser's built-in Search box, or combo Address field, rather than typing "google.com"
  • In search results, look for "Official Site" or at actual URL to determine if expected destination
  • Some search engines hide addresses in favor of more human readable names.
  • Avoid fake/conspiracy news sites (and this includes a lot of social media)
    -- besides disinformation and wasting your time, they can be an avenue for malware.
  • Avoid DNS problems -- see section: Connection : Wi-Fi (Router)

[1] Avoid Insecure, Impostor and Malicious Sites

  • Typos & look-alike characters in site addresses (URLs) could lead you
    to malicious, impostor sites -- or insecure versions (HTTP: vs. HTTPS:)
  • Think twice before clicking on links in an email
  • Think twice before clicking on links in popups, or unknown links in web pages,
    esp. ads which might redirect you to look-alike sites
  • Quiz: Can you identify a phishing web site login?

[1] Enable Fraudulent Site Warnings

  • macOS: Safari > Preferences > Security > Fraudulent sites [screenshot]
  • macOS: Firefox > Preferences > Security >
    Block reported attack sites / web forgeries / add-ons
  • macOS: Chrome > Settings (advanced) > Privacy >
    Protect you and your device from dangerous sites
  • iOS: Settings > Safari > Privacy & Security > Fraudulent Website Warning [screenshot]
  • Enable phishing/malware/plugin warning: -- see section: Connection : Malware

[1] Learn to Examine and Recognize URLs

  • Show links in status bar; inspect before you click
  • macOS: Safari > View > Show Status Bar
  • Display full address (URL) in address/location bar
  • macOS: Safari > Preferences > Advanced > Show Full Website Address
  • iOS: Safari > (tap in address bar)
  • For secure sites, check HTTPS: and verify status (lock icon or certificate) -- see next section: Use HTTPS:

[2] Access Shortened URLs Cautiously

  • Due to shortening or normal redirects, you may not be seeing the 'real', final URL,
    e.g., https://communicrossings.com/olli
  • https://bit.ly/20ICWYg, https://tinyurl.com/hg8776o
  • There are several sites that follow any redirects and display the final destination
  • e.g., CheckShortURL, Unshorten
  • If the URL was generated by:
  • Bitly: add a plus sign ('+') to the URL and Bitly will display a preview
  • TinyURL: place 'preview' in front of the shortened URL
  • Instead of this manual process, you could install a browser extension that displays final URL
    via popup, status area (if overlap, hide regular status bar), or in-line (in page itself)
  • Safari: Ultimate Status Bar
  • Firefox: No Redirect, Long URL Please Mod
  • Chrome: LongURL

[3] Find Old Versions of Pages or Sites via Web Archives

References

Dark Patterns

Fake News, Hoaxes

Shortening Services

Web Archives


Safer Internet: Browsing: Use HTTPS

Safer Internet: Browsing: Use HTTPS

Summary | Update | https: | Vulnerable Sites | Insecure Connection | TLS |
References: General | Apple | Certificates | Firefox |
Google/Chrome | OpenSSL, Freak, Heartbleed


Summary

[1] Update System/Browser Software

  • Check that your system, browser and application software have latest security updates -- see section: Software Updates
  • Otherwise, content could be exposed if security vulnerabilities have not been patched on both ends.

[1] Use https: (HyperText Transport Protocol Secure) instead of regular http:

  • More and more sites default/redirect to HTTPS:, e.g.
  • wider availability of free certificates for sites, e.g., Let's Encrypt
  • automatically from http: paypal.com
  • via browser extension, e.g., HTTPS Everywhere for Chrome, Firefox; not avail for IE, Safari -- maybe not needed
  • via preference, e.g., linkedin.com: Account > Security
  • Some password managers, e.g., 1Password, can check for non-https and vulnerable sites
  • Check browser Address Bar: lock icon and/or URL beginning with "https://"
  • Be especially aware on login pages and shopping and finance sites.
  • Some browsers, e.g., Chrome, will flag 'insecure' sites: any http: page in "incognito" (private browsing) mode, or any http: page with an input field
  • Client-server connection with HTTPS: {Figure 6. TCYOP-4: 67; TCYOP-3: 55}.

[2] Check for Vulnerable sites

  • Although you can't update the security software on sites, you can minimize your exposure
  • Change passwords on any sites with unpatched security vulnerabilities, e.g., Heartbleed; use a password manager to monitor, e.g., 1Password: Watchtower; also PM can flag any non-https: logins
  • Otherwise, content could be exposed if security vulnerabilities have not been patched on both ends.

[2] Use VPN and 2FA to Compensate for an Insecure http: Connection

[3] Test Your Browser's TLS; Use sftp:; Install a Certificate

  • Test Your Browser's TLS(SSL): How's My SSL?
  • Safari(macOS,iOS) may include some fallback older 'insecure cipher suites' I'm checking if this is serious and/or being fixed; Firefox, Chrome better?
  • File transfer: use sftp: instead of ftp:
  • Web site admin: free certificate: letsencrypt.org; possible installation cost, configuration issues depending on web host

References

Apple

Certificates

Firefox

Google / Chrome

Microsoft

OpenSSL, Freak, Heartbleed


Safer Internet: Browsing: Manage Storage of Private Data

Safer Internet: Browsing: Manage Storage of Private Data

Summary | Where/When | Private Browsing | Cookies | Autofill |
Do Not Track | Browser 'Fingerprinting' | Browser History |
Search History | Download History | Caches | Statistics |
References: General | Bookmarks / Favorites | Cookies | FingerPrinting | Google |
History | iOS | macOS | Microsoft | Private (Incognito) Browsing | Tracking


Summary

[1] When: Before, After; Where: OS, Apps, Browsers

  • Some data can be useful to you: speed, convenience, even necessary, e.g., for logins
  • Other data could be damaging in the wrong hands
  • Two strategies (or combo of both) to minimize this data:
  • Before: prevent data from being stored on your device or on servers in the first place -- settings or private browsing
  • After: remove stored data later -- manual commands or automatically upon exit from browser / app
  • [2] System utilities can remove some caches, history, e.g., macOS: Maintenance, Onyx; Win: CCleaner
  • Android: Settings
  • iOS: Settings > Notifications, Control Center, Privacy
  • macOS: System Preferences > Security & Privacy, Sharing, Parental Controls
  • Win: Control Panel / Settings
  • Applications that access the internet, e.g., Facebook, Maps, Skype, etc.; also see Email section
  • for Location, Notifications: Connection: Unnecessary Services section
  • Browsers -- settings vary; meanings of 'history' and 'web data' may vary
  • macOS: Safari > Preferences > Privacy, Security
  • Firefox > Preferences > Privacy, Security
  • Chrome > Preferences (or address: chrome://settings)
  • iOS: Settings > Safari
  • Windows: IE: Control Panel > Internet Options
  • [3] Some browsers come with pre-sets for more privacy/security settings, e.g., Epic, WhiteHat Aviator

[1] Consider Private Browsing

  • Typically stored locally & temporarily -- until tab/window closed: cookies; browsing, download, and search histories; form/autofill data; page or image caches
  • What's stored / hidden / erased may vary by browser; tradeoffs: performance, convenience
  • Another possible benefit: ability to exceed n-article/month limits on certain paywalled sites.
  • Potential loopholes: data from plug-ins / extensions; downloaded files still on disk; bookmarks; search engine might store terms on server; cached DNS lookups
  • Despite 'private/incognito' label, it does not provide anonymity per se -- just more temporary / compartmentalized browser storage; see VPN, anonymous browsing, e.g., Tor
  • Before (all windows by default)
  • Possible in some browsers, but not too practical since some sites won't work well; would there still be a way to open a new window in non-private mode?
  • macOS, iOS: Safari: not avail
  • macOS: Firefox > Preferences > Privacy > History > Always Use Private Browsing Mode
  • [3] Chrome -- involves starting with "-incognito" switch in AppleScript (macOS), Properties (Win) or command line
  • After (specific new window & tabs)
  • macOS: Safari > File > New Private Window
  • macOS: Firefox > File > New Private Window
  • macOS: Chrome > File > New Incognito Window {Figure 10: TCYOP-4: 91; TCYOP-3: 74}
  • iOS: Safari > [rects] > Private

[1] Reduce Cookies

  • Cookies are usually erased by Private Browsing, but some browser settings are useful anyway
  • Recommended: blocking "3rd-party" cookies
  • Blocking all cookies means some sites won't work well (or at all)
  • Allowing all cookies is a bad idea
  • Some badly implemented web sites may require use of 3rd-party cookies and/or cross-site tracking
    -- if you need to use that site: temporarily disable settings, finish your work, then re-enable
  • Erasing cookies means you'll have to re-login to sites, and perhaps re-enter a security answer or 2FA code
  • Before
  • macOS: Safari > Preferences > Prevent Cross-Site Tracking: on; Block All Cookies: off
  • macOS(older): Safari > Preferences > Privacy > Cookies and website data > Allow from websites I visit [screenshot]
  • macOS: Firefox > Preferences > Privacy > History > Accept Third-party Cookies > Never; Keep until:(expire, close Firefox); {Figure 11: TCYOP-4: 93; TCYOP-3: 76;}
  • macOS: Chrome > Preferences > Advanced Settings > Privacy > Content Settings > Cookies > Block third-party cookies and site data
  • iOS: Settings > Safari > Prevent Cross-Site Tracking: on; Block All Cookies: off
  • iOS10: Settings > Safari > Privacy & Security > Block Cookies > Allow from websites I visit [screenshot]
  • After
  • macOS: Safari > History > Clear History and Website Data (cookies, history, other data)
  • macOS: Safari > Preferences > Privacy > Cookies and website data > Remove All Website Data [screenshot]
  • macOS: Firefox > History > Clear Recent History
  • macOS: Chrome > Preferences > Advanced Settings > Privacy > Clear Browsing Data
  • macOS: System Preferences > Flash Player > Storage > Delete All (flash cookies)
  • iOS: Settings > Safari > Clear History and Website Data (cookies, history, other data) [screenshot]
  • [2] macOS: System Preferences > Flash Player > Storage > Delete All, i.e., "Flash Cookies"
  • see section Malware : Flash for more about Flash cookies or uninstalling Flash

[1] Minimize Browser AutoFill: Passwords, Credit Cards, Contacts

  • Most browsers can provide autofill; however, info is only as secure as device admin password
  • Backup? Share between browsers on same device?
  • Share between devices -- esp. if different vendors?
  • Generally, it's better to use a password manager
  • Before
  • macOS: Safari > Preferences > Autofill (contacts, passwords, credit cards)
  • macOS: Firefox > Preferences > Security > Logins > Remember Passwords for Sites
  • macOS: Chrome > Preferences > Advanced Settings > Passwords and forms > Enable AutoFill to fill out web forms in a single click; Offer to save your web passwords
  • iOS: Settings > Safari > Passwords & AutoFill (contact, passwords, credit cards)
  • iOS: Settings > Accounts & Passwords: edit
  • Win: Edge > Settings > View Advanced settings > Autofill: Save Passwords/Cards: off; Manage
  • After
  • macOS: Safari > Preferences > Passwords > Remove All (or selected)
  • macOS: Firefox > Preferences > Security > Logins > Saved Logins
  • macOS: Chrome > Clear Browsing Data
  • iOS: Settings > Safari > Passwords & AutoFill > Saved Passwords / Credit Cards

[2] Reduce Web Site Tracking

  • Turn off tracking in browser, even though some web sites may ignore this (optional) request;
    Apple has removed this setting in latest macOS & iOS (see below for older) --
    since it wasn't effective, and perhaps gave false sense of security?
  • macOS: Safari > Preferences > Privacy > Website tracking > Ask websites not to track me [screenshot]
  • macOS: Firefox > Preferences > Privacy > Tracking > Tell websites I do not want to be tracked
  • macOS: Chrome > Preferences > Advanced Settings > Privacy > Send a "Do Not Track" request with your browsing traffic
  • iOS: Settings > Safari > Privacy & Security > Ask websites Not To Track Me [screenshot]
  • Win: Edge > Settings > View Advanced settings > Privacy and services > Send Do Not Track Requests: on
  • Avoid "Single Sign On" login feature on 3rd-party sites using your Google, Facebook, Twitter credentials
  • In addition to controlling cookies (next), see section Ad Blocking to further reduce tracking

[2] Reduce Browser 'Fingerprinting'

  • Your unique combination of system settings and browser properties can enable web sites to identify you,
    even if you're minimizing/clearing cookies, using private browsing, etc.
  • Currently, some systems/browsers are better at minimzing fingerprinting,
    e.g., Safari, Firefox; -- and iOS generally; see Refs: Fingerprinting
  • Check your web browser's tracking settings, fingerprint uniqueness: EFF: Cover Your Tracks
  • Unfortunately, Cover Your Tracks doesn't advise on how to fix this...
  • Maybe use more defaiult browser settings -- to become less unique?
  • Hopefully other tools/approaches will be forthcoming.

[2] Reduce / Clear Browsing History

  • list of sites visited; usually erased by Private Browsing and utilities, e.g., Ghostery, Blur {TCYOP-4: 97, 101}
  • history may be accessible by other users, e.g., nosy friend, cybercafe, law enforcement
  • you can also use Bookmarks or Password Manager to save / return to important sites, rather than rely on history list
  • Before
  • macOS: Firefox > Preferences > Privacy > History > Remember my browsing and download history
  • After
  • macOS: Safari > Clear History and Website Data (cookies, history, other data)
  • macOS: Safari > History > Clear History and Website Data
  • macOS: Safari > General > Remove History Items (time) [screenshot]
  • macOS: Firefox > History > Clear History
  • macOS: Firefox > Preferences > Privacy > History > Clear history when Firefox closes (Settings: browsing, downloads)
  • macOS: Chrome > Clear Browsing Data
  • iOS: Settings > Safari > Clear History and Website Data (cookies, history, other data)
  • iOS: Settings > Safari > Frequently Visited Sites

[2] Reduce Search History / Suggestions

  • Usually erased by Private Browsing
  • Before
  • macOS: Safari > Preferences > Search
  • macOS: Firefox > Preferences > Search
  • macOS: Firefox > Preferences > Privacy > History > Remember search and form history
  • macOS: Chrome > Preferences > Advanced > Privacy > Use a prediction service to help complete searches and URLs typed in the address bar or the app launcher search box; searches still saved and not clearable?
  • iOS: Settings > Safari > Search Engine Suggestions
  • After -- same as browsing history?

[2] Clear Download History

  • usually erased by Private Browsing -- though files may still be Downloads
  • Before
  • macOS: Safari > General > Remove Download List Items (time) [screenshot]
  • macOS: Chrome > Preferences > Advanced > Privacy > Content Settings > Automatic Downloads
  • After -- same as browsing history?
  • macOS: Safari > Show Downloads (far right icon)l > Clear
  • macOS: Firefox > Tools > Downloads > Clear Downloads
  • macOS: Chrome > Clear Browsing Data

[2] Clear Caches: Pages & Images

  • usually erased by Private Browsing and utilities
  • Before
  • macOS: Firefox > Preferences > Advanced > Network > Cached / Offline Content
  • After -- same as browsing history?
  • macOS: Safari: shift+click on the Refresh page button -- clears cache for only that page
  • macOS: Safari > Preferences > Advanced > Show Develop menu in menu bar -- add Develop menu
  • macOS: Safari > Develop > Empty Caches

[3] Reduce Browser Statistics

  • Diagnostic data may be useful to vendors for bug fixes and improvements -- optional: it's up to you
  • macOS: System Preferences > Security & Privacy > Diagnostics & Usage
  • macOS: Firefox > Preferences > Advanced > Data Choices
  • macOS: Chrome > Preferences > Advanced Settings > Privacy > Automatically send usage statistics and crash reports to Google

References

Bookmarks / Favorites

Cookies

Fingerprinting

Google

History

iOS

macOS

Microsoft

Private Browsing

Tracking


Safer Internet: Browsing: Block Ads

Safer Internet: Browsing: Block Ads

Quotes | Summary | Block Pop-ups | Avoid Pop-ups |
Install Ad Blocker | Unblock Sites | Remove Adware |
References: General | Android | Chrome |
Firefox | iOS | macOS | Windows | Wipr


Quotes

  • NYT crossword clue: 8A. Internet nuisance...

Summary

[1] Block Pop-ups

  • Some browsers have a site-by-site preference, others global -- for no/all sites
  • macOS: Safari > Preferences > Web Sites > Popup Windows: Block, Block&Notify, Allow
  • macOS: Firefox > Preferences > Content > Block pop-up windows [screenshot]
  • iOS: Settings > Safari > Privacy & Security > Block pop-ups [screenshot]
  • If necessary for some sites to function, re-enable temporarily, then re-disable.

[1] Avoid Pop-ups

  • Some pop-up windows may occur despite block settings, esp. 'pop-unders' which appear to 'hijack' your browser
  • Some may warn of detected malware, and offer software, services, scams, or scans
  • Although you should already be protected (see Software Updates, Malware sections),
    you might still be vulnerable to "drive-by" malware -- so, do not click on links or close the popup, or respond to the threats/offers (would reputable organizations/companies act this way?)
  • Instead, close the browser entirely ('forcibly' if necessary), then run your own malware scan.
  • I haven't encountered this problem in iOS, but if you need to force-close a window or force-quit Safari:
  • iOS: (diagonal pinch gesture; window thumbnails) > tap "x" in upper left of window
  • iOS: (4-finger swipe up gesture; all open apps; flick left/right if Safari not visible) > swipe up on Safari
  • macOS: Safari (in Dock) > ctrl-click > Quit (or Force Quit)
  • Safari icon > click w/ Shift key -- to reopen w/o previous windows
  • Win: (task bar) > right-click (on window) > Close
  • [2] Win: ctrl-alt-del > Task Manager > Applications > (browser) > Close

[1] Install an Ad-blocking Extension (aka "Content Blocker")

  • Several different approaches / business models:
  • 'avoidance': avoid ads in first place: find alternatives to ad-heavy sites, apps, services, e.g., Facebook, Google
  • 'consensual': block all except those you allow via your 'allow list' or opt-in; e.g., Privacy Badger; too drastic? support small publishers? some publishers may detect ad blockers and block content access; some, e.g., Spotify, consider ad blocking grounds to terminate your account!
  • 'acceptable ads'; block all ads except vendor allows, e.g., Adblock Plus; who decides which sites are allowed or blocked? publisher payoffs?
  • 'anonymised tracking': block ads but provides summary data; e.g., Ghostery
  • 'some blocking free': pay for additional blocking; e.g., Disconnect and 1Blocker
  • Some (free) apps may display advertising (and track you); consider a paid version that removes ads, check tracking/ad preferences (if any), or do you really need the app?
  • Before: If using HTTPS: or VPN, some ads not inserted by your ISP; a VPN may also make it more difficult for ad sites to identify you
  • Before: If using WPA2 (WiFi), avoid local 'man-in-the-middle' ads/malware
  • Before: if you use Safari's "Reader View" (if available), most ads, navigation and sidebars are removed
  • Before: use an ad blocker to remove adds and reduce tracking
  • other advantages: speeds up page loading; downloads less data, esp. important for limited data plans.
  • many good extensions are free; some paid tools are waste of money, and possibly malware
  • may block ads/tracking only in web browsers, not apps
  • Note: OS handling of browser extensions, especially content blockers, continues to evolve
  • Content blocker Steve is currently using with Safari (iOS12+, macOS 14+): Wipr: $2;
    it's simple to set up, and blocks ads fast and effectively
  • These previously recommended general tools (& example settings) may or may not work with your system and browser:
    AdBlock Plus; IronVest (Blur); Ghostery; Privacy Badger; [3] uBlock Origin
  • Ghostery: {Figure 12: TCYOP-4: 97; TCYOP-3: 79}
  • macOS: Safari > Preferences > Extensions > Get Extension : AdBlock Plus
  • macOS: AdBlock Plus > [deselect] Allow some non-intrusive advertising
  • iOS: Settings > Privacy > Advertising > Limit Ad Tracking
    Enabling this will cut down on unnecessary network traffic, but doesn't totally block
  • iOS: Settings > Safari > Content Blockers
  • If a site doesn't work properly (esp. for 'mobile-friendly' sites):
  • macOS & iOS: Safari > [press refresh icon] > Reload Without Content Blockers
  • iOS: Safari > [press refresh icon] > Request Desktop Site

[2] Selectively Allow Ads: Add Sites to 'Allow List'?

[3] Prevent / Remove Adware

  • Before: obtain software only from official app stores, and pay attention to installation options
  • After: tools to remove adware, e.g., Windows: AdwCleaner

References

Android

Chrome

Firefox

iOS

macOS

Windows

Wipr


Safer Internet: Browsing: Protect Passwords

Safer Internet: Browsing: Protect Passwords

Summary |
References : General | 1Password | Multi-Factor Authentication | Android | Apps | Biometrics; Passkeys |
Bitwarden | Breaches / HaveIBeenPwned | Browser (as PM) | Chrome | Credential Stuffing | DashLane | Edge |
Facebook | Firefox | Freq. of Changing | iCloud/KeyChain | iOS | LastPass | macOS | Password Managers |
Safari | Security Questions | SMS, SIM hijacking | SSO (Single Sign-On | Password Strength | Windows


Non-expert Online Practices
1. Use Antivirus Software
2. Use Strong Passwords
3. Change Passwords Frequently
4. Only Visit Websites They Know
5. Don't Share Personal Info
Expert Online Practices
1. Install Software Updates
2. Use Unique Passwords
3. Use Multifactor-Factor Authentication
4. Use Strong Passwords
5. Use a Password Manager

Summary

  • Passwords are now covered in a separate 3-session OLLI course: P@s$w0rdz
  • Passwords:Intro (from earlier in this course) now summarizes highlights from P@s$w0rdz.
  • This section originally provided more details about other password issues, e.g., secret answers, biometrics, 2FA, etc.
  • This section now provides only Reference articles (below) [for P@s$w0rdz] -- it will continue to be updated.

References

1Password

Multi / 2 Factor Authentication (2FA) / 2 Step Verification

Android

Apps

Biometrics, Fingerprints, Facial Recognition; Passkeys

Bitwarden

Breaches / HaveIBeenPwned

Browser (as PM)

Chrome

Credential Stuffing

DashLane

Edge

Facebook

Firefox

Frequency of Changing

iCloud

iOS

LastPass

macOS

SSO (Single Sign-On); OAuth

Password Managers

Questions

Safari

SMS, SIM swapping/hijacking

Password Strength; Diceware

Windows


Safer Internet: Browsing: Search Privately

Safer Internet: Browsing: Search Privately

Quotes | Summary | Search Providers | Search Suggestions | Local Search |
References: General | AI | Apple | Bing | DuckDuckGo | Google | iOS | macOS


Quotes

Summary

[1] Change Search Provider

  • Most 'free' search providers (aka 'engines'), e.g., Google, Bing, store identifiable search history remotely on server
  • Change search provider to one that does not collect your search data, e.g., DuckDuckGo
  • macOS: Safari > Preferences > Search
  • macOS: Firefox > Preferences > Search
  • macOS: Firefox > Preferences > Privacy > History > Location Bar
  • macOS: Chrome: duckduckgo.com; click button: 'Add DuckDuckGo to Chrome'; help
  • macOS: Chrome > Preferences > Search > Manage Search Engines > Make Default
  • note: if using an ad blocker, you might consider allowing DuckDuckGo
    to show a few ads; section: Browsing : Block Ads
  • iOS: Settings > Safari > Search Engine
  • If you relied on Home page or new window to access search site, e.g., google.com, be sure to change there also
  • macOS: Safari > Prefs > General > New Window Opens With & Homepage [screenshot]
  • If you find that you don't like the new search results (format, number, etc.),
    you can easily switch to a different search engine -- just be sure to read the privacy policy
  • If you'd still prefer Google searches for some results, use startpage.com, which is more private
  • Other private search sites/engines: search.brave.com; ecosia.org; peekier.com; qwant.com
  • Deleting Search History or using Private Browsing -- see earlier section Browsing : Managing Data
  • FrogFind (powered by DuckDuckGo) is optimized for vintage computers and browsers,
    including the Newton, by converting the search result pages to extremely basic HTML.
  • [2] Some search engines support "right to be forgotten" (content about you) -- submit a form on Bing or Google site

[2] Turn Off Search Suggestions

  • If you're not using Private Browsing, do you want to share your searches or see others' phrases?
  • Maybe speed things up, reduce crashes
  • macOS: Safari > Preferences > Search > Include Safari Suggestions
  • iOS: Settings > Safari > Search Engine Suggestions
  • If you're using a smart home device, e.g., Amazon Alexa, Google Home, check search engine settings;
    also settings for search history & suggestions

[2] Check Local Search Settings

  • Allow internet searches in 'local' search results; settings only in older versions < macOS 10.12, < iOS 10?
  • macOS: System Preferences > Spotlight > [list] Spotlight Suggestions [off]
  • macOS: System Preferences > Spotlight >
    [checkbox] Allow Spotlight Suggestions in Look up [off]
  • iOS: Settings > Siri & Search > Suggestions in Search [?],
    Suggestions in Lookup [?]
    specify by app
  • iOS: access Spotlight search:
    1) while on the Home screen, pull down from anywhere between the status bar and Dock;
    2) from the Lock screen or first page of the Home screen, swipe right to enter the Widgets screen,
    which features a Spotlight search box
  • It's unclear if Spotlight still uses Bing rather than your preferred search engine
  • Allow Siri request logging?
  • iOS: Settings > General > Siri > About Siri and Privacy (read)

References

AI

Apple (generally)

Bing

DuckDuckGo

Google

iOS

macOS


Safer Internet: Browsing: Anonymity

Safer Internet: Browsing: Anonymity

Quotes | Summary |
References: General | Censorship, Journalism, Wikileaks |
Dark Web / Deep Net | NSA, CIA | Tails | Tor


Quotes

Summary

  • [3] Use Tor "The Onion Router" and Tails OS "The Amnesic Incognito Live System"
  • Advantages: more anonymity for targeted users, e.g., political dissidents, investigative journalists, whistleblowers, criminals, trolls, hate groups
  • minimizes associating your actual IP with routing/server activities
  • more encryption (like VPN); random routing via multiple nodes
  • how tor worksDisadvantages: difficult to guarantee 100% anonymity, and likely to attract unwanted attention
  • difficult to setup; slow; government monitoring / filtering / blocking / censoring
  • network {Figure 14: TCYOP-4: 104; TCYOP-3: 87}
  • configuration {Figure 15: TCYOP-4: 105; TCYOP-3: 88;}

References

Censorship, Journalism, Wikileaks

Dark Web / Deep Net

National Security Agency (NSA); CIA

Tails

torTor


Safer Internet: Browsing: Shopping

Safer Internet: Browsing: Shopping

Summary | Correct, Secure Site | Credit Cards | Other: Paypal, Bitcoin,... |
References: General | Amazon | Apple |
Crytocurrency, Bitcoin | Google | Payment, Credit | Paypal


Summary

[1] Use Correct, Secure Site / App

  • Many of these already covered in other sections:
  • Be sure to navigate to correct web site, esp. not via ads / impostor links
  • Use HTTPS: for login & entering contact / payment details -- see section
  • Clear purchase history on sites?
  • If using an app, make sure it's authentic & up-to-date: app store, exact name, ratings, etc.

[1] Protect Credit Card Info

  • Save credit card info in a password manager rather than browser -- more secure, sync across browsers/platforms
  • macOS: Safari > Preferences > AutoFill > Credit Cards: off
  • iOS: Settings > Safari > AutoFill > Credit Cards: off
  • Avoid storing credit info on merchant site, if possible -- though some may require a card on file
  • This should be less of an issue for major vendors, e.g., Amazon, Apple -- who can invest more on security
  • If you misplace your card, you can lock your card with some credit card companies (and unlock it later when you find it).
  • Check your credit card statements monthly, or more frequently, to detect fraudulent charges
  • Enable account notifications (email/text) if supported, e.g.,
  • for an international charge
  • for an online, phone or mail charge
  • for an amount over $x
  • Check Apple Pay (or similar) settings, if applicable
  • iPhone: Settings > Wallet & Apple Pay
  • iPhone: Settings > Safari > Check for Apple Pay
  • Rank credit cards by importance and impact; what happens if one is compromised?
  • Use different credit cards for different purposes/sites, e.g., online only, regular automatic payments, one-time purchases with new vendors, etc.
  • A single-use, virtual credit card number linked to a credit card (or bank account) provides additional security
  • Virtual Account Numbers creates a temporary credit card # & security code; you set expiration date and credit limit; e.g., Citi not avail for Costco Visa apparently
  • Bank of America formerly offered virtual card numbers via "ShopSafe", which has now been discontinued in favor of Digital Wallets?
  • Check with your bank or credit card company

[2] Consider other Forms of Payment

  • PayPal can be linked to checking account or credit card; vendor doesn't see credit card info
  • Downsides: yet another account; does not provide same protection for contesting charges; may block some quasi-legal purchases, which use VPN or violate their definitions of copyright, decency, etc.
  • Other services can be used to transfer cash, e.g., Square, Messenger, Venmo -- understand possible fees and consumer protections
  • [3] Avoid cryptocurrency, e.g., Bitcoin
  • Although a cryptocurrency might provide more anonymity and can be used to hide transactions, it's also unreliable, variable and hackable; also, definitely not an 'investment'

References

Amazon

Apple

[3] Cryptocurrency, e.g., Bitcoin

Google

Payment

Paypal


Safer Internet: Improve Email Privacy

Safer Internet: Improve Email Privacy

Quotes | Summary | When Email Best? | Email Account |
Malware | Spam | Web Mail | Client App | Tracking |
References: General | Android | Gmail, Google | Government | iCloud |
iOS | macOS | ReplyAll | Spam | Tracking | Windows | Yahoo


Quotes

Summary

[1] Is Email the Best Communication Method?

  • Type of information -- and its sensitivity? Audience? Timeliness?
  • Even though email should be encrypted in transit to mail server, it may no longer be private when stored on mail server or on recipient's computer; what if it becomes public later?
  • Verify intended addressees before sending, i.e., To:, cc:; autocomplete/autofill may be incorrect; Reply vs. Reply All
  • Use bcc: for groups to protect privacy and reduce Reply All volume
  • Email is not the best way to send large / many attachments -- see Share Files Privately
  • Is the email service provided by your ISP adequate, reliable, secure, well-maintained?
  • Email provider's privacy policy and business model?
    some providers, e.g., ProtonMail; Posteo; Tutanota; FastMail; Thexyz; Kolab Now; Mailbox.org, may provide more privacy or "end-to-end encryption"; section Encryption, Anonymity
  • Ethical.net: Email services
  • Maybe communicate fragments of secrets over different channels, e.g., phone, text message, video, etc., to replace / complement email -- see section Talk and Chat Privately

[1] Protect Email Account

  • Use a 'permanent' account if possible, e.g., icloud.com, gmail.com, outlook.com
  • If you rely primarily on your ISP (charter, comcast, ashlandhome), what happens to your address if you move or change ISPs?
  • If your email account is hacked, change password immediately.
  • If that same password was used for any other accounts, be sure to update those accounts also.
  • Check Sent/Trash for any messages sent by hacker, e.g., password resets for other accounts.
  • Strengthen security answers; turn on 2-factor authentication if available, etc.

[1] Avoid Malware in Attachments and Links

  • Don't open/download unexpected attachments in messages; enable malware protection; check Sender:
  • [1] macOS: click on the little downward pointing “v” at the right of the From address to see address of sender
  • [2] macOS: Mail > View > Message > All Headers
  • Most email applications display messages as mini-web pages -- with problems (like web) of ad tracking, fraudulent links, etc.
  • Don't click on links in messages; even truer for unexpected messages about products/sites/services you don't use
  • Exceptions: after changing an email address on an account, the site often sends an email with a link to verify the address; others??
  • If an email asks you to click a link/button to address a problem or change your password, log in to the site directly using your password manager -- not the email links, unless you've just initiated a "I forgot my password" request
  • If it's an offer to update software, use the official methods described earlier to check, download and install
  • Quiz: Can You Identify Phishing Emails?
  • To avoid displaying possible mal-content, don't open or display message in first place:
  • macOS: Mail > ctrl-click msg > Delete (individual msg)
  • macOS: Mail > Mailbox > Erase Junk Mail (delete all w/o opening)
  • macOS: Mail > (drag dot on separator bar -- between message list & preview area -- to bottom of window); select & delete message(s); restore bar
  • iOS: Mail > (swipe left on title in message list) > Trash
  • When sending large attachments, enable "Mail Drop", which uses iCloud temporarily
  • macOS: Mail > Preferences > Accounts > (account) > Advanced > Send Large Attachments with Mail Drop
  • iOS: no need to set -- triggered automatically; select Use Mail Drop from popup
  • When sending attachments to a Windows user:
  • macOS: Mail > File > Attach Files > Options > Send Windows-friendly Attachments

[1] Reduce Spam

  • Don't forward chain letters or spam; check Snopes
  • Unsubscribe from reputable sources only; otherwise, you just confirmed validity of your address to a spammer
  • Limit auto-reply usage: omit dates when your house can be burgled, spam confirmations
  • It's difficult to reduce/eliminate spam once your email address has been disseminated, e.g., by replying to spammers, by making address public on a web site or forum, by malware harvesting your friend's Contacts, etc.
  • Use filters to minimize danger from phishing, and annoyance from spam;
    check Junk/Spam folder periodically for good messages, move messages to "train"
  • If using multiple devices and IMAP, centralize settings with mail provider
  • gmail.com: Spam: no setup required
  • gmail.com: Settings > Filters
  • If not centralized, spam and filter settings for individual device:
  • macOS: Mail > Preferences > Junk Mail
  • macOS: Mail > Preferences > Rules
  • The most common scams will target you through fake emails, text messages, voice calls,
    letters or even someone who unexpectedly shows up at your front door.
    Review all five scenarios for important red flags that could signal a scam.
  • 1. You're pressured to act immediately
  • Remember: In some cases, scammers can be friendly, sympathetic and seem willing to help.
    In others, they use fear tactics to persuade a potential victim, for example:
  • You're instructed to not trust your bank, or to respond to questions in untruthful ways.
  • You're pressured to send money.
  • You're threatened with law enforcement action.
  • You receive a request from a government agency or the IRS
    asking you for a payment and/or to verify your personal information.
    Scammers may threaten lawsuits or law enforcement action to trick you in to acting quickly.
  • 2. You're asked to provide authorization codes
  • Remember: Authorization codes are important ways to verify who you are in order to access your account.
  • Never share your authorization codes, regardless of the reason someone gives you,
    unless you've contacted the company through a verified method.
    Once a scammer has your codes, they can gain full access to your accounts.
  • Your company should never text, email or call you asking for an authorization code.
    If someone reaches out to you and asks for it, it is a scam.
  • 3. You've received a suspicious text or email
  • Your account should not use email or text to ask you for personal information
    such as your account number, card PIN, Social Security number or tax ID number.
  • The best way to avoid email or text fraud is to remain vigilant.
    Never click on a link in an email or text message unless you are absolutely certain
    who sent the email and where the link is taking you.
  • Fraudulent emails or texts typically imply urgency, attempting to get you to act quickly
    before you have time to carefully read and examine the message.
    They often don't address you by name and contain obvious grammar and/or spelling errors.
  • 4. You're told to buy a gift card to pay a debt or a service.
  • Never share gift card information (such as the card's unique identifier number) with someone you don't know.
  • Criminals may pressure you to send funds via gift cards by asking for the code numbers
    or PINs on the backs of the cards so they can be redeemed immediately.
  • A scammer may tell you a story that they urgently need funds to pay a debt,
    for a medical emergency or they want to travel to see you.
  • 5. You're asked to deposit a check and return the money
  • Never cash a check for someone you don’t know.
    The bad check will be held against your account when it doesn't clear.
  • If you're asked to return money for overpayment of an item you’re selling, it’s most likely a scam
    and the bad check will be held against your account when it doesn't clear.
  • You're approached by a stranger who claims to have left their wallet at home and asks you to cash a check for them.
    Or you may be asked to deposit a check that overpays for something you’re selling, then send the difference elsewhere.

[2] Webmail in Browser: use HTTPS:

  • Webmail on your ISP's website, e.g., icloud.com/#mail, gmail.com, mail.yahoo.com, webmail.aol.com
  • Some ISPs, e.g., ashlandhome.net, may support HTTPS: only for desktop (not mobile) browser
  • If ISP also doesn't support SSL/TLS in email client (next), obtain a separate, secure account for your main communication; also more portable if you move or change providers
  • Some sites communicate only via secure email "portal", e.g., medical, financial

[2] Email Client App: use TLS/SSL for login, transfer, sending

  • Use SSL (Secure Socket Layer, or newer TLS: Transport Layer Security) in an email client app, e.g., Mail on iOS / macOS; Thunderbird, Outlook, Outlook Express; network: {Figure 6. TCYOP-4: 67}
  • i.e., for your account: login, transfer, sending
  • When adding an account, certain providers may have automatic settings/templates
  • iOS: Settings > Accounts & Passwords > Add Account
  • macOS: Mail > Accounts > +
  • Otherwise, check email app or email provider's site for configuration details, e.g., mail settings tool
  • Login, transfer: enable SSL for IMAP or POP email; {Figure 16: TCYOP-4: 120; TCYOP-3: 96}
  • Do not use unencrypted POP, e.g., earthlink
  • IMAP: better for sharing messages & folders between devices; webmail; backup?
  • if using IMAP, check if supported by email provider; enable if necessary
  • iOS: Settings > Mail, Contacts, Calendars > (account) > Account > Advanced > Use SSL
  • macOS: generally, adding a new account will automatically enable SSL for receiving & sending; to check this:
  • macOS: Mail > Inbox > (ctrl-click) > Account Info > Summary > Incoming SSL: on
  • macOS (older): Mail > Preferences > Accounts > (account) > Advanced > Use SSL
  • Sending: enable SSL, i.e., SMTP server
  • Can you access email easily while traveling, esp. sending?
  • iOS: Settings > Mail, Contacts, Calendars > (account) > Account > SMTP > (server) > Use SSL
  • macOS: Mail > Inbox > (ctrl-click) > Account Info > Summary > Outgoing SSL: on
  • macOS (older): Mail > Preferences > Accounts > (server) > Account Info > Outgoing Mail Server (SMTP) >
    Edit SMTP Server List > (server) > Advanced > Use SSL

[2] Reduce Email Tracking

  • Disable image display -- to minimize tracking; extra benefit: slightly faster display
  • macOS: Mail > Preferences > Viewing > Load content in remote messages
  • macOS: Mail > (individual message) > Load Remote Content
  • iOS: Settings > Mail,Contacts,Calendar > Load Remote Images
  • Some messages provide a link to view the message in browser, which, if configured properly, might provide better security.
  • more selective solutions are being developed to block 1x1 tracking pixels (all, or selected marketers) --analogous to Browsing : Adware); e.g., PixelBlock, UglyMail; stay tuned
  • Create different email addresses or aliases for different purposes -- via different providers: iCloud, Yahoo, Gmail, Live, etc.
  • Apple allows 3 aliases that are redirected to main account, e.g., main: johsmith@icloud.com; aliases: jsmithabc@icloud.com, jsmithdef@icloud.com, jsmithghi@icloud.com
  • macOS: Mail > Preferences > Accounts > iCloud > Edit: Email Address > (icloud.com/) > Mail > Add an alias
  • Some providers allow "+" suffix, e.g., johnsmith+amazon@icloud.com, john.smith+facebook@gmail.com; those recipients appear in main Inbox
  • This allows you to track who gave out your address, and to setup email filters; addresses completely separate from your main account are desirable for password resets, even though inconvenient; it also could provide some anonymity if your address is leaked later; unfortunately, some sites may not allow "+" in username or email contact fields.
  • [Spam]: 'Gmail: Your address has more or fewer dots (.) or different capitalization'

References

Android

Gmail, Google

Government

iCloud

iOS

macOS

Outlook, Hotmail

Reply All

Spam

Tracking

Windows

Yahoo


Safer Internet: Email: Anonymity, Encryption

Safer Internet: Email: Anonymity, Encryption

Summary |
References: General | iOS | macOS | PGP | ProtonMail


Summary

  • If content and/or sender/receiver are extremely sensitive, additional measures may be desired beyond encryption during transit of message and attachments via HTTPS:.
  • [2] Send files encrypted separately via email but transmit key via non-email-- see Encryption section, e.g., 7-zip
  • Transfer via cloud or other sharing method -- see Share Files Privately
  • [3] Encrypt email messages using PGP or S/MIME (requires certificate) -- or other services, e.g., Lavabit
  • iOS: Settings > Accounts & Passwords > Account > Advanced > S/MIME
  • [3] Send email anonymously, e.g., specialized providers
  • [3] Use self-destructing email -- never stored on recipient's system

References

iOS

macOS

PGP

ProtonMail


Safer Internet: Talk and Chat Privately

Safer Internet: Talk and Chat Privately

Summary |
References: General | Clubhouse | Facetime |
Google: Meet, etc. | iOS, Messages | Messenger | macOS | Phone | Robocalls | Signal |
Skype, Teams | Slack | Telegram | Webex | WhatsApp | Yik Yak | Zoom


Summary

  • "I sold my users' privacy...
  • [1] Check preferences -- do not assume default settings are the most secure
  • [1] Read the privacy policies of (and articles about) services you use:
    what they log, share or encrypt, especially 'free' services
    (and especially Google and Facebook)
  • Text messaging, audio, video apps can be more secure than email.
  • Messages and Facetime (for Apple users) are generally very private and quite secure.
  • webcampractice olliZoom (like other meeting services) can be very private and secure, even the free version --
  • if problems are quickly fixed -- and users install updates
  • if privacy & security preferences are provided and explained -- and checked! e.g.,
  • user: strong unique account password; enable 2FA if avail; minimize user profile info;
    click only on expected meeting links; etc.
  • host: keep meeting ID private; set meeting room password; use waiting rooms to admit participants; route calls outside China; etc.
  • Zoom (or any communication) app may be more secure/private on iOS compared to Mac or Windows.
  • Zoom's free version doesn't have ads or market your info (like some other products)
    -- it's offered as 'trialware', with the hope that you'll upgrade to bypass limits (e.g., session length) and access other features.
  • In its early years, Zoom was slow to acknowledge & address problems; it has made substantial progress in recent months.
  • Refs:Zoom (articles -- below); Strong Passwords: Zoom 'credential stuffing' explanation
  • [1] Create a 2nd entry in Contacts with minimal info about you: name, phone, email;
    share that with others who shouldn't have all your info!
  • [1] Enable sending unknown phone callers (not in your contacts) directly to voicemail, e.g.,
  • iOS: Settings > Phone > Silence Unknown Callers
  • [2] Install software to block robocalls
  • [2] Use less common apps to improve privacy (and to avoid government monitoring?)
  • [2] Consider using video (ideally) or audio instead of any text -- more difficult to capture and analyze
  • [3] Secure phones

References

Android; Allo

Clubhouse

Facebook Messenger

Facetime

Google: Meet, etc.

iOS; Messages; Facetime

macOS

Phone

Robocalls

Signal

Skype, Teams

Slack

  • All the Ways Slack Tracks You -- and How to Stop It e.g., changing privacy settings, putting limits on those infuriating notifications; Wired; 10/29/2020
  • What if All Your Slack Chats Were Leaked? Slack stores everything you do on its platform by default -- your username and password, every message you've sent, every lunch you've planned and every confidential decision you've made. That data is not end-to-end encrypted -- accessible by Slack, law enforcement, hackers; NYT; 7/1/2019

Telegram

Webex

WhatsApp

Yik Yak

Zoom


Safer Internet: Keep Social Media Sort of Private-ish

Safer Internet: Keep Social Media Sort of Private-ish

Quotes | Summary |
References: General | Dating | Facebook | Genealogy, DNA Testing |
Instagram | LinkedIn | Mastodon | Metaverse | NextDoor | Parler | Tiktok | Twitter / X


Quotes

Summary

  • "Social" media is by its nature un-private.
  • "Free" services rely on collecting and selling your information.
  • [1] Consider limiting the info & photos that you post or share -- it's difficult to delete
  • [1] Don't assume 'private' messages really are; Don't assume 'secret' services really are
  • [1] Limit friend lists and apps
  • [1] Review vendors' Terms & Conditions: these are incomprehensible and changing,
    and grant them broad rights to use your freely given info -- pretty much however they want
  • [1] Review the privacy policies & settings for each site or service you use;
    {Figure 17: TCYOP-4: 143; TCYOP-3: 117}
  • Policies: e.g., Facebook; Google; Linkedin; Twitter
  • Settings: e.g., Facebook; Google+; Linkedin; Twitter
  • [1] Realize that sensitive info, e.g., health, financial, entered in other apps may be shared with Facebook, without your permission -- hopefully this will decrease as more of these apps/practices are exposed
  • [1] Don't use SSO (Single Sign On) to log into 3rd party sites using your Facebook credentials
  • [1] Minimize Facebook tracking of your browsing activities across the web:
  • on computer: use Firefox web browser, with Facebook Container add-on that isolates your browsing activities from Facebook.
  • on your phone: delete the Facebook mobile app and use Facebook.com only via the mobile browser.
    Install a tracker blocker, like Disconnect.me, and activate the blocking.
    Alternatively, you can install a private web-browsing app like Firefox Focus,
    which blocks trackers by default, and only use this browser when loading Facebook.com.
  • [1] Beware of impostors, e.g., a sockpuppet is an online identity used for purposes of deception; catfishing is a type of deceptive activity where a person creates a sock puppet social networking presence, or fake identity on a social network account, usually targeting a specific victim for deception.
  • [1] Avoid providing personal details to 'fun' polls / quizzes
    -- now available to marketers, and to hackers ('secret answers' for accounts)
  • [1] When you finally realize that the settings & privacy policies & empty promises of the major players don't actually protect you or your information, drastically minimize your usage or just deactivate / remove your account
  • [1] Enable 2-Factor Authentication (2FA) -- see Passwords: 2FA
  • [2] If you must share information with a group, switch to services that do support privacy, e.g., Slack.
    The inertia of moving your family / friends / workgroup also makes this option particularly difficult
  • [2] Request the data they've collected about you, e.g., Facebook;
    see section Who Wants Your Private Data : Companies

References

Dating

Facebook

Genealogy, DNA Testing

Instagram

LinkedIn

Mastodon

Metaverse

NextDoor

Parler

Tiktok

Twitter / X


Safer Internet: Share Files Privately

Safer Internet: Share Files Privately

Summary |
References: General | BitTorrent | Copyright, Piracy |
iOS | macOS, iTunes | Windows


Summary

  • How to share / distribute files, photos, media, ...
  • [1] Email attachment -- generally not recommended for many / large files; security?
  • macOS: attach a large file (up to 5Gb) in Mail app
  • MailDrop feature will store in iCloud; recipient can download file (for up to 30 days)
  • [1] AirDrop (via Bluetooth and Wi-Fi): transfer files, videos, photos wirelessly between Apple devices; multiple files should be same type, e.g., .pdf, .jpg
  • [1] AppStore: share apps within a household -- if AppleIDs use same credit card to purchase apps
  • Even better, setup Family Sharing for separate AppleIDs, which share same credit card.
  • macOS: System Preferences > iCloud > Manage Family
  • iOS: Settings > iCloud > Family
  • [1] Photos: share/stream via iCloud (free / $)
  • settings...
  • [1] Music
  • macOS: iTunes > Preferences > Sharing
  • [1] Cloud service: store files on iCloud, Box, Dropbox, Google Drive, Microsoft OneDrive, etc.
    -- see section Backup
  • Email file link to recipient
  • [2] If information is extra sensitive, don't depend on the encryption built into Dropbox or other cloud services (protected only by account password); encrypt sensitive files yourself first, e.g., 7-zip; note: 1Password already encrypted
  • [1] "SneakerNet": on USB thumb drive or DVD
  • [2] Local network: remote drive
  • For specific purposes only, use temporarily -- don't forget to disable when no longer needed
  • macOS: System Preferences > Sharing : Files
  • Windows: (File Sharing) {Figure 7. TCYOP-4: 72}
  • [3] Friend-to-friend networks, e.g., Retroshare
  • [3] Peer-to-peer networks, e.g., BitTorrent; note: sharing of other's content can be illegal (piracy) or dangerous (malware)
  • [3] Create your own private cloud, e.g., Transporter

References

BitTorrent

Copyright, Piracy

iOS

macOS, iTunes

Windows


Safer Internet: Manage Mobile Privacy

Safer Internet: Manage Mobile Privacy

Summary | Accounts | Backup | Encryption | Network | Location | Public Device |
References: General | Android | Border Crossings |
Cell Networks | iOS | macOS | Travel


Summary

  • Mobile Devices are more vulnerable to loss, theft, hacking and inspection -- whether travelling internationally or just away from home for a few minutes.
  • Many recommendations echo previous sections, but with an emphasis on mobility / travel:
  • [1] Strong Passwords on all Devices; 2FA avail at destination?
  • [1] Backups, especially Photos; portable drives?
  • [1] guide borderEncryption, especially Passwords; border concerns?
  • [1] Networks: secure Wi-Fi? use VPN?
  • [1] Location: enable Find My xxx; disable other services?
  • [1] Using Non-Personal Devices to access online accounts -- don't, or exercise extreme caution
  • References

Accounts

  • Consider not only laptops, tablets, phones, but also other smart mobile devices, e.g., camera, watch, wearables.
  • Strong passwords are especially recommended for your mobile device -- in case it gets lost or stolen -- and for any important remote accounts that you need to access while traveling.
  • [2] If using 2-factor authentication (or 2-step verification), check that phone/token can be used at destination, or bring backup codes -- or disable 2FA until back home.

ipad camera cablesBackup

  • Backup data before leaving home
  • During trip, backup new photos / info
  • from camera / phone / tablet
  • to cloud / other device
  • Depending on network speed / cost / security, you may want to disable automatic cloud backup / sync.
  • macOS: System Preferences > iCloud
  • iOS: Settings > iCloud > Photos etc.
  • Bring copies of travel info as .pdfs, e.g., scanned passports / driver's license, air/hotel confirmations, itinerary
  • Tag portable items with address labels, add phone no. and/or email contact
  • Bring any needed cables, chargers, adapters, plugs, spare batteries, battery pack
  • Avoid "juice jacking" at public USB charging ports, which can also access data ! -- bring your own wall charger

Encryption

Network

  • Access WiFi: securely -- WPA2 recommended
  • Use a Virtual Private Network (VPN) if appropriate
  • Check with carrier about voice / data plans if leaving US
  • Avoid excessive charges by using "airplane mode" or disabling cell data on an app-by-app basis
  • iOS: Settings > Cellular Data > Use Cellular Data For:
  • [2] Opt out of your cell carrier's "supercookies"
  • "Unlike regular cookies, supercookies can't be blocked or deleted, because the carrier inserts these unique identifiers between the time a request for a page leaves your device and the time it's sent to the server"

Location

  • Enable/test tracking service, e.g., Find My Mac/iPad/iPhone, in case device lost/stolen
  • Be aware that your approximation physical location can be determined from your cell network, from geotagging in photos, or by apps that ask to track you -- or even from device MAC address when using Wi-Fi (though iOS 8 randomizes MAC address regularly)
  • iOS: Settings > Privacy > Location Services
  • [2] iOS: Settings > Bluetooth: off -- if you want to disable iBeacon

When Traveling Without Your Device

  • Best not to use public computers, e.g., cybercafe, hotel -- even if 'well-maintained' and privately location -- malware, keyloggers, etc.?
  • If you need to login, uncheck 'remember me' or 'stay signed in'
  • 2FA (2-factor authentication) can provide some protection your account, but changing your password later (from a secure system) is recommended
  • Use private browsing; cleanup cookies, history, downloads that you've created and left behind
  • Logout / Turn off

References

Android

Border Crossings

Cell Networks

iOS

macOS

Travel


Safer Internet: Internet of Things

Safer Internet: Internet of Things

Summary |
References: General | Alexa (Amazon Echo), Ring | Apple |
Camera | Cars | Google Home | Health | Home; |Smart TVs | Wearables


Summary

  • Q. How many engineers does it take to change a lightbulb?...
  • "Amazon Alexa is for...
  • There ever more types of internet-connected devices -- at home and on our person:
  • Home: Amazon Alexa, Google Home, security cameras, home automation, lightbulbs, thermostats, smoke alarms, appliances, water valves
  • Set-top Devices: camera, microphone, people identification (Kinect), playlist, game consoles
  • Wearable technology: watches, fitness trackers, glasses
  • [1] Be vigilant about cool new features: Helpful Assistant vs. 'Big Brother'
  • [1] Check list: privacy & security settings, changeable password, ongoing support, security updates, encryption, ...
    -- or, don't purchase gadget, or disable 'smart' functionality altogether?

References

Alexa, Ring

Apple

Camera, Drones

Cars

Google Home

Health

Home

Smart TVs

Wearables


Safer Internet: Maintain Privacy for Your Kids

Safer Internet: Maintain Privacy for Your Kids

Summary |
References: General | iOS | IoT, Toys | macOS |
Phones | School | Shopping | Social Media, YouTube | Teens


Summary

  • In addition to recommendations covered in earlier sections, certain users may be more vulnerable
  • Infants, teenagers, grandkids, aging parent / partner may be unaware, less experienced, naive, impulsive, or be memory-/judgment-impaired
  • [1] Provide safe environment, and teach/model awareness and safer online practices
  • [1] Technology, e.g., parental controls, might help -- though more tech-savvy kids may be able to bypass?
  • [1] Extra caution about social media: any text, photos, videos are posted -- by child or you -- will be online forever, with greater impacts on future careers, relationships, etc.
  • [1] Location: Avoid posting anything that can give away your child's location or that might embarrass the child later in life

References

iOS

Internet of Things, Toys

macOS

Phones

School

Shopping

Social Media, YouTube

Teens


Safer Internet: Course Updates

Safer Internet: Course Updates

Summary

  • Students of earlier courses can refer back to this site as a refresher and to learn more about the latest privacy and security updates, significant changes, information and advice.
  • Students who implemented only a few changes are welcome to re-enroll in the future to review, fine-tune and expand their protection.
  • OS Update Status:
  • Ongoing: newest articles appear at the top of Reference sections for each topic
  • older (more than ~4 years ago) article references will usually be removed
  • new subsections will be added as needed

Spring 2020

Fall 2019

  • For updated discussion of passwords and password managers, see my shorter (2-session) course: P@s$w0rdz
  • Software Updates: iOS, iPadOS 13; macOS: 10.15

Winter 2019

  • Wipr for ad blocking (iOS, Mac)
  • Consider quitting social media altogether -- privacy settings won't really protect you from advertisers and data brokers; spend more time with your family & real friends
  • added Summary sections with recommendations and links to subsections
  • added topics: to References to supplement major subsections

Winter 2018

  • Meltdown and/or Spectre processor 'speculative execution' flaws affect almost all computers/devices with Intel, AMD, ARM CPUs over past decade or so; Software Updates > References > Meltdown/Spectre
  • It's not possible to completely fix (w/o replacing with newer CPU), but risk can be mitigated/minimized
  • Update system software (Android, iOS, Linux, macOS, Windows); avoid malware; Software Updates > References
  • Reorganized main topics and References with more subsections; included reference articles as examples