Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Computer Safety Discussion

Posted on 12/23/2024 10:23:41 AM PST by Mean Daddy

With everything going on in the world, I wanted to reach out to see what other Freepers are doing online to protect yourselves, whether its subscribing to a monitoring service for activity under your name, using VPN (which one & why), password managers, multi-factor authentication etc.

What else should a person consider?


TOPICS: Chit/Chat
KEYWORDS: 2fa; complexity; computers; cybersecurity; internet; mfa; multifactor; passwordmanager; passwords; safety; tech; vpn; windowspinglist
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-93 next last
To: Mean Daddy

Proton VPN is free if you sign onto it. So are some others. Such as Urban VPN Proxy
_________________

From AI search>>>>>>

Yes, Proton VPN offers a free plan with unlimited data usage. This makes it stand out among free VPN services, as most others impose data caps or other restrictions13.

Key Features of Proton VPN Free
Unlimited data: Users can browse, stream, and download without any bandwidth restrictions13.

No ads: Unlike many free VPNs, Proton VPN’s free tier is completely ad-free3.

No logs: Proton VPN maintains a strict no-logs policy, which has been independently verified through audits3.

Basic security features: The free plan includes a kill switch, DNS leak prevention, and encrypted servers2.


41 posted on 12/23/2024 12:34:46 PM PST by dennisw
[ Post Reply | Private Reply | To 1 | View Replies]

To: PAR35

“‘trust this computer’ but I would only do that with a desktop, never with a laptop that would leave the house.”

Yes...my biggest fear is losing the phone, but getting into the phone requires facial recognition. And, if the phone is gone, then I can erase it remotely.

I’ve got the same concern about the computer. I take it with me on trips. It uses fingerprint security, so I should be protected. But I watch it like a hawk.

I use Apple’s “Find My” to track the known location of the iPhone, iPad and Mac.


42 posted on 12/23/2024 12:35:56 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: ProtectOurFreedom

++++++++


43 posted on 12/23/2024 12:36:22 PM PST by dennisw
[ Post Reply | Private Reply | To 40 | View Replies]

To: Mean Daddy

That is a very interesting table. Thanks for posting it.

I use complex, long passphrase for the most important things. My LastPass passphrase with mixed numbers and punctuation is 23 characters long, so it looks like I am safe for more than 26 trillion years!

Of course, Google’s quantum computer breakthrough is going to change all of this at some point.

The big problem I have is my wife who has almost zero tolerance for complexity. Getting her off “abc123” was hard (just kidding). I got her to use a short passphrase and append some numbers and characters. But she just cannot grok number/letter substitutions like using a “3” for letter “E” or using “@” for letter “a.” If a passphrase has three letter “a” in it, I’ll use the “@” substitution in just one or two of them. That randomization adds more complexity.

I remember when the auto manufacturers were moving to encrypted keys and they calculated how much computing power it would take a thief to crack the encryption and how long to crack it. They set the bar just high enough such that a car thief would have to invest a lot in computers and take a long time.

Of course, Kia never thought about that.


44 posted on 12/23/2024 12:43:51 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Mean Daddy

“I no longer allow passwords to be saved via browser either.”

I’ve always denied that. I only trust my passwords to two places: Apple’s “Passwords” and to LastPass. As somebody pointed out above, LastPass got hacked but no passwords were lost. (I think an employee fell for a social engineering scam, IIRC). Passwords are hashed.


45 posted on 12/23/2024 12:48:16 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: AppyPappy
"Chances of you falling for a scam = increases as you get older."

I'm 73, wife is 72. We are both VERY wary and sharp now, but am concerned about the next 10 - 20 years (if the Good Lord blesses us that way).

46 posted on 12/23/2024 12:50:43 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: MichaelRDanger

Iw@sborninDecember1985onthe15th — 31 characters and easy to remember after a few practices. I always toss in four to six letter/puncutation/numeral substitutions for good measure.
1 = !
@ = a
7 = T
0 = O
3 = E

It takes a few minute to master it, but using an English passphrase base helps a lot.

“D0n@t3ToFRe3RepublicToday” would be a good one.


47 posted on 12/23/2024 12:55:38 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 28 | View Replies]

To: rellic
"File on the computer as is the computer, is password protected." -- why not turn on computer file encryption to encrypt your entire computer?
How does FileVault work on a Mac? If you store sensitive information on your Mac—for example, if you carry your company’s financial data on your Mac laptop—you can use FileVault to protect your files and keep someone from accessing or copying sensitive data.

If you have a Mac with Apple silicon or an Apple T2 Security Chip, your data is encrypted automatically. Turning on FileVault provides an extra layer of security by keeping someone from decrypting or getting access to your data without entering your login password.

"The only hacks that have affected me are the ones where someone stole credit card info from the credit card companies or credit bureaus."

Look into CapitalOne "Virtual Credit Cards." Every merchant you buy from gets a unique credit card number. They all roll up to your main number on your statement. If you have a lot of auto-pays set up, you only have to change the one CC number if it gets hacked; you don't have to change all of your auto-pays to a new cc number.

48 posted on 12/23/2024 1:00:14 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 29 | View Replies]

To: ProtectOurFreedom

I read a study that said some people are just “scam fallers”. They are usually repeat offenders and it starts early. I blame push technology like television. They are used to believing everything they are told because analysis is hard.


49 posted on 12/23/2024 1:03:30 PM PST by AppyPappy (If Hitler were alive today and criticized Trump, would he still be Hitler?)
[ Post Reply | Private Reply | To 46 | View Replies]

To: linMcHlp
"Use your computer's firewall"

Better yet, use your router's firewall AND turn on your router's "Threat Protection" to protect everybody in your household using wifi and your router. My router has "Safe Access" and "Threat Prevention," two different approaches to network security.

Safe Access is DNS- and IP-based. It uses integrated external databases (such as Google Safe Browsing) to identify domains and IP addresses associated with malware, phishing, botnets, command and control servers, social engineering, and other threats. Devices on the network that attempt connections to banned destinations are denied access.

Threat Prevention is signature-based and uses Deep Packet Inspection (DPI) to monitor incoming and outgoing traffic. Malicious packets are discovered in real-time and dropped automatically. You can enable it to alert you to Internet attacks and inappropriate user behaviors.

Safe Access and Threat Prevention do not conflict with each other. Both packages operate silently in the background.

50 posted on 12/23/2024 1:06:11 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: GingisK

Or you could just use “Y0u@reNu7$”


51 posted on 12/23/2024 1:07:06 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: ProtectOurFreedom

Th4t_Freep_paccwerd

Most hackers know l33t


52 posted on 12/23/2024 1:07:08 PM PST by AppyPappy (If Hitler were alive today and criticized Trump, would he still be Hitler?)
[ Post Reply | Private Reply | To 47 | View Replies]

To: AppyPappy

“I read a study that said some people are just “scam fallers”. “

Makes a lot of sense. I have fallen for just one scam in my life. I was in Spain about 30 years ago on a business trip and fell for a guy’s pitch for a special woman’s perfume called “Nada” (pronounced “natha” in Spain so I didn’t pick up on it.”) He got a few bucks from me, but he bought me a beer and we had a nice conversation (LOL).

Getting ripped off like that changes your whole attitude toward security.


53 posted on 12/23/2024 1:11:42 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 49 | View Replies]

To: AppyPappy

OK, you got me with “Most hackers know l33t”! Huh?


54 posted on 12/23/2024 1:12:52 PM PST by ProtectOurFreedom (Marxism is a politics for the ugly, unwanted, uneducated, unhealthy, and insane.)
[ Post Reply | Private Reply | To 52 | View Replies]

To: TheThirdRuffian
He’s concerned both because it relies a lot on modules from other sources and is generally sloppy, but also because, by design, it logs every keystroke and sends them somewhere unknown.

Search:

how to turn off all windows 11 telemetry

how to prevent certain Windows Updates

how to permanently turn off prevent disable windows updates [not recommend)

how to Completely Uninstall OneDrive

Meanwhile, to customize a Linus distro the way I can rather easily (mostly, and includes saving certain .reg file hacks) - if possible, has never warranted the time and energy (and I have installed all major and most leading minor distros.

55 posted on 12/23/2024 1:14:45 PM PST by daniel1212 (Turn 2 the Lord Jesus who saves damned+destitute sinners on His acct, believe, b baptized+follow HIM)
[ Post Reply | Private Reply | To 26 | View Replies]

To: wally_bert

Getting the spouse to move to Mac or Linux won’t be easy.

********************************************************

I put wife on Linux Mint from W10. She has had no problems with the switch and I don’t have to “fix” her machine anymore.

Mail, web browser, recipes.


56 posted on 12/23/2024 1:15:26 PM PST by dagunk
[ Post Reply | Private Reply | To 36 | View Replies]

To: Mean Daddy

Yikes!


57 posted on 12/23/2024 1:23:37 PM PST by GOPJ (https://files.catbox.moe/rwi6a2.jpeg //files.catbox.moe/14hch9.jpg <img src="[image url]">)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Mean Daddy

Linux Mint, FreeBSD. For the supremely paranoid OpenBSD.

Passwords are in a file but the entries are memory ticklers. Trying the entry doesn’t work.

DO NOT click on email links. Just got one the other day, checked with the vendor through other means and I’m up to date. The fake looked good too, proper doctor name and address. Go figure....

Consider cranking down hard on the firewall in your router. Usually some basic capability is provided.


58 posted on 12/23/2024 1:24:59 PM PST by dagunk
[ Post Reply | Private Reply | To 1 | View Replies]

To: ProtectOurFreedom

Substituting numbers and symbols for letters was called “1337” or leet code back in the 90’s.


59 posted on 12/23/2024 1:27:50 PM PST by AppyPappy (If Hitler were alive today and criticized Trump, would he still be Hitler?)
[ Post Reply | Private Reply | To 54 | View Replies]

To: AppyPappy

“If you answer calls from unknown numbers or do call back, you are ripe for the picking.”

That’s something I never do because they’ll leave a message if necessary. Only exception is if I’m expecting a critical call that day and then I’ll answer.

If I do happen to answer an unknown number, I never say “hello”. I’ll ask, “Can I help you?” With a weird accent. They (bots, I assume) hang up. It might the be that their algorithm is programmed to respond to “hello”, and anything else causes confusion.

Also never answer a question with a simple “yes” or “no”. Have heard that your voice speaking those words can be “spliced” into things for nefarious purposes.


60 posted on 12/23/2024 1:36:28 PM PST by MayflowerMadam (It's hard not to celebrate the fall of bad people. - Bongino)
[ Post Reply | Private Reply | To 23 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-93 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson