What methods do you use to keep yourself safe regarding banking or other sensitive account management/control?What are you asking about exactly?
What is the problem with using public unencrypted Wi-Fi as long as your traffic is SSL?From a technical perspective?
You're only as safe as the weakest link in your chain.
Make sure you are using the latest security updates of whatever device and software you have. Choice of operating system (for your phone and for your laptop) can also be a factor.
Use strong passwords and enable two-factor authentication (2FA) wherever possible. Avoid 2FA via SMS because it leaves you vulnerable to SIM cloning.
Use a password manager to make sure your passwords are long and complex. If you want to go all the way, consider one with YubiKey support to enable 2FA of your password manager: Yubico | YubiKey strong two factor authentication
Some free options:
KeePassXC: KeePassXC Password Manager Based on KeePass and KeePassX. There KeePass apps for Android and iOS, too.
Bitward: Open Source Password Management Solutions | Bitwarden
Look at PrivacyTools (PrivacyTools - Encryption Against Global Mass Surveillance) for information about how to improve your privacy, which might also affect security by reducing risk of exposure to malicious scripts and trackers.
Avoid public Wi-Fi networks, especially if they are not encrypted.
In most cases, VPN doesn't add anything for security, unless you are in an ultra repressive country like China. But if you find yourself in an airport lounge with no 4G coverage and a dodgy Wi-Fi, a good and trusted VPN is better than no VPN.
Thanks a lot! Let me ask a few questions.From a technical perspective?
You're only as safe as the weakest link in your chain.
Make sure you are using the latest security updates of whatever device and software you have. Choice of operating system (for your phone and for your laptop) can also be a factor.
Use strong passwords and enable two-factor authentication (2FA) wherever possible. Avoid 2FA via SMS because it leaves you vulnerable to SIM cloning.
Use a password manager to make sure your passwords are long and complex. If you want to go all the way, consider one with YubiKey support to enable 2FA of your password manager: Yubico | YubiKey strong two factor authentication
Some free options:
KeePassXC: KeePassXC Password Manager Based on KeePass and KeePassX. There KeePass apps for Android and iOS, too.
Bitward: Open Source Password Management Solutions | Bitwarden
Look at PrivacyTools (PrivacyTools - Encryption Against Global Mass Surveillance) for information about how to improve your privacy, which might also affect security by reducing risk of exposure to malicious scripts and trackers.
Avoid public Wi-Fi networks, especially if they are not encrypted.
In most cases, VPN doesn't add anything for security, unless you are in an ultra repressive country like China. But if you find yourself in an airport lounge with no 4G coverage and a dodgy Wi-Fi, a good and trusted VPN is better than no VPN.
1. Google Authenticator, AuthyThanks a lot! Let me ask a few questions.
1. What can you use as a replacement for 2FA with SMS?
2. How do you trust password managers? (Unless you compile the source code yourself)
3. Popular VPNs have features like these: data encryption (AES-128), data authentication (GCM), handshake (RSA-2048) and HTTPS port for connection. These won't keep you safe?
4. How safe is using your mobile hotspot with your computer in public?
MITM attack is prevented by data encryption, authentication and the handshake. No?3. VPNs HTTPS feature only protects you from HTTP connection accidentally made by the website. However if your original traffic is not SSL (not HTTPS) you are open for the man in the middle attack by your VPN provider.
You are talking about SSL between VPN and your machine. There is another SSL under this VPN SSL. Two SSL on top of each other. Basically nothing stops your VPN from performing MITM on you if you dont have underlying SSL encryption (under SSL given by VPN provider)MITM attack is prevented by data encryption, authentication and the handshake. No?
Almost none. Probably just an old fear from when it was easier to spoof certificates.What is the problem with using public unencrypted Wi-Fi as long as your traffic is SSL?
1. As mentioned, Authy and Google Authenticator are among the most popular.1. What can you use as a replacement for 2FA with SMS?
2. How do you trust password managers? (Unless you compile the source code yourself)
3. Popular VPNs have features like these: data encryption (AES-128), data authentication (GCM), handshake (RSA-2048) and HTTPS port for connection. These won't keep you safe?
4. How safe is using your mobile hotspot with your computer in public?
The first question you should ask is - who is your enemy? And then adjust your opsec appropriately.Not sure if this is the right category but wanted to ask.