So where you do you land on the privacy spectrum? Are you passive or paranoid? I'm eager to hear what other commandments I'm missing in my framework and how your privacy principles might be different. And whether or not you completely agree, join the conversation by subscribing to this channel! ▶ Subscribe! ua-cam.com/users/allthingssecured
Turned 19 a few days ago and privacy has always been on my mind for the last couple years. I’m glad I’m taking control early on in my life- especially considering technology is the future and I’m getting a head start before most. Thanks for the wisdom and info!
I have been in the industry for over 40 years now, and I can only recommend your channel to anyone, because the content and presentation are exquisite. Thank you!
I stumbled upon your channel by chance. For the last couple of weeks I've been wound around the axle about how to increase my online privacy. I have watched other videos but I don't think degoogled or Linux phones are the solution. Your framework is a breath of fresh air. Subscribed.
I think your approach is quite good, you should never trust one company to do security and privacy at the same time. Basicly what you are doing is letting the company do the security while you take control of the privacy yourself, or which ever direction you prefer this to be.
few questions: 1. If my ISP provides a router should I get a separate router and run a VPN or use a 3rd party VPN or both? 2. What are the best security software or anti-virus software for PC and/or Apple computers? 3. Can you do a tutorial on integrating all your devices whether you have a VPN running on your physical router or 3rd party router?
This video covers critical basic information! You presented it well! What I understand: your data is in four different locations. 1) Local 2) Local external backup 3) Offsite external backup 4) Cloud (encrypted) Should we assume the Cloud provider is protected against EMPs (Electromagnetic Pulse) ?
@@AllThingsSecured I don't know of any cloud providers which provide protection against the 12%/decade exposure of solar storms, etc. I will assume the 12% risk will increase as tension increases between China and the U.S. For people reading this, and are unfamiliar with EMPs, search 1859 Carrington Event or 1921 Railroad Storm.
Why is everyone worried about the privacy , what the company will do to us but help us and give us what we want . I think the bad people only who want to be invisible . The good people won't be afraid from thier data .. the only thing must protect us form it is the hackers
I stumbled up your UA-cam channel looking for help to secure my home WiFi. My neighbor (I'm assuming due to his relentless harassment and stalking) hacked my WiFi and made charges to Walmart, eBay and amazon thru my accounts. My gmail started acting really weird and still is so I'm looking to find a more private, secure email provider. Anyways, I love your videos. The are spot on with subjects that are very relevant in what we struggle with day by day. The best part is, you teach things that can be quite complex in a way that a preschooler could understand lol. That, I'm sure, is helpful to many of us. Do you have any suggestions on what I should buy to make my network as solid as can be on a very limited budget? I'm on disability so I have a very low fixed income but I know I'll have to figure out how to buy whatever is needed to secure my network. Thank you!
A question about Yubikey and the likes: As I’ve understood it, also backup keys need to be registered when using it for a new service. Right? Having an off-site (as protection against fire, flooding, …) backup key creates a time gap when no backup exists. One could keep track of new services that need to be unregistered, and batch register them on a regular basis. Adding a second backup key increases the work keeping them all up to date.
That may be true, but I don’t add many new accounts that I would consider “ultra sensitive” very often. For those less sensitive accounts, I simply try to back up with an Authenticator app or the like.
I care about my privacy and I'm pretty good at limiting my exposure but my exposure isn't limited. Family is the biggest threat I percieve to my on-line anonymity. That is out of my control and no one has any respect for my privacy.
SIM card cloning makes voids all claims about privacy. If your SIM is cloned forget about any and all security measures including two step verification. Proton mail opened a backdoor with implementing "other sessions" . You have to be very careful with those sessions. I once said I had nothing to hide, I do not- got divorced and he knows 'people in law enforcement- Everything is hacked. It is not a mater of hiding anything- your employer- ex- neighbor can have all your data if they know and pay off the right people.
Sorry about the divorce, GiGi. It should be noted, though, that SIM card cloning does not void all privacy claims. 2FA implemented by Authenticator app or hardware key cannot be copied via SIM swap.
All you have to do with Authy is turn off the multi-device feature and SIM swapping is no longer an issue. Again, you seem to fear the SIM swap attack way more than it deserves.
I would've taken the time to subscribe, but I already did many videos ago. Thanks for putting out such fantastic information! I do agree with your points, and I like how you made it easy to take action. Right now I am guilt of using google for way too much, so I may switch to Firefox. Been meaning to switch to that anyways just because I like using MDN docs a lot.
Yes Google authenticator problem happen with me my old phone damage.. So i don't have login access . I request to website to off Google authenticator on my account
DearJosh! You are doing a great job teaching us to privacy and security! Thank You very much! You mentioned, You have a Yubikey and use 1 Password too. I am using 1Password too and have a Yubikey also, but I store ALL my logins (and 2FA) in 1Password and I use my Yubikey just to enter a MAIN password for 1Password. How can I store all my existing 1PAssword logins in my Yubikey? As I understood You have all your password on your Yubikey. Is that mean You store in 1Password AND on Your Yubikey? Is there any "easy" way to migrate my logins (and 2FA's) from 1PAssword to my Yubikey? Can You make a video about this? It would be great! I hope You understood my problem, but my native language is Hungarian, so maybe I not wrote it correctly! :)
Please review the service the so called "Mine : Your Smart Data Assistant " I recently enrolled in it and its making track of all my services linked with my google account and also has option to tell them if i need that service or else they send an email on behalf of me [of course, they take permission] to the particular company for my personal data erasure and it has worked I tried it on spotify, fedex, coursera and the companies had malied me back saying that either i have to do this to delete my personal data or they have deleted all by themselves....
Not necessarily. Chris Luna was specifically referring to those who want to privatize their lives from the government. If you don’t pay your taxes and report your actual information to the government, it is illegal.
I am on the paranoid side of the scale. You are doing important work and should know by now that you are doing a great job at it. I wish the internet was like swimming in a backyard pool instead of a shark infested ocean, but at least you recommend a good spear gun and show me how to use it.
Of course I do! Security and privacy require a bit of paranoia. What, you think I'm talking bad about those people? Dumb or not, my goal here is to get people to realize that privacy comes in different degrees and you have to know where you're comfortable.
So where you do you land on the privacy spectrum? Are you passive or paranoid? I'm eager to hear what other commandments I'm missing in my framework and how your privacy principles might be different. And whether or not you completely agree, join the conversation by subscribing to this channel!
▶ Subscribe! ua-cam.com/users/allthingssecured
can you do one on ''privacy phones", bc I keep hearing about it, but no comprehensive review yet
im definitely trying to land in the middle of the privacy spectrum :)
Started watching your video on 2FA, then continued with several videos. Never thought binging on security videos would be fun.
Keep up the great work.
Ha! That makes me happy to hear. Thank you!
Turned 19 a few days ago and privacy has always been on my mind for the last couple years. I’m glad I’m taking control early on in my life- especially considering technology is the future and I’m getting a head start before most. Thanks for the wisdom and info!
I have been in the industry for over 40 years now, and I can only recommend your channel to anyone, because the content and presentation are exquisite. Thank you!
Thank you, Henry!
I have a video suggestion. My parents are fairly privacy naive, a basic video helping older folks that I can point them too.
That’s an excellent suggestion. Thank you!
Was such a video made in the meantime? Because I’m in a similar situation with my folks.
@@nicola6323 Not really there's a hole in the market place.
Really like your lighting!
Ha! Thank you 🙏
I stumbled upon your channel by chance. For the last couple of weeks I've been wound around the axle about how to increase my online privacy. I have watched other videos but I don't think degoogled or Linux phones are the solution. Your framework is a breath of fresh air. Subscribed.
I think your approach is quite good, you should never trust one company to do security and privacy at the same time. Basicly what you are doing is letting the company do the security while you take control of the privacy yourself, or which ever direction you prefer this to be.
I love your videos. You are by far the best security analyst I've watched.
I don't think I deserve that, but thank you anyway, Lee.
@@AllThingsSecured he isn't saying you're the best out there, but the best he watched which is definitely true for me
Thanks, Yaakov.
few questions:
1. If my ISP provides a router should I get a separate router and run a VPN or use a 3rd party VPN or both?
2. What are the best security software or anti-virus software for PC and/or Apple computers?
3. Can you do a tutorial on integrating all your devices whether you have a VPN running on your physical router or 3rd party router?
What a great video mannnnn!!!! Loved it!!!!
Thanks 🙏
Thank you for your videos, very informative and it adds to what I know already but also helps explain to my friends who don't know. So thank you!
Glad to hear it, Matt!
This man wants to protect us... at least support him in some way.
Thank you, Chuck.
👍👍👍👍👍Yes, it's a balance btw usability & security. Security is a like an onion - layer upon layers.
Once again, thanks for sharing.
Your channel and SumSub's is very invaluable to me despite being in the privacy game for about 5 years now.
Glad to hear it! Thanks for watching.
This video covers critical basic information! You presented it well!
What I understand: your data is in four different locations.
1) Local
2) Local external backup
3) Offsite external backup
4) Cloud (encrypted)
Should we assume the Cloud provider is protected against EMPs (Electromagnetic Pulse) ?
Thanks, Dennis. Which cloud providers offer protection against this threat of EMPs?
@@AllThingsSecured I don't know of any cloud providers which provide protection against the 12%/decade exposure of solar storms, etc. I will assume the 12% risk will increase as tension increases between China and the U.S.
For people reading this, and are unfamiliar with EMPs, search 1859 Carrington Event or 1921 Railroad Storm.
you got some really good videos man. keep it up!.
Thank you so much, Shane!
Excellent video, thanks
Thanks for watching and commenting!
Why is everyone worried about the privacy , what the company will do to us but help us and give us what we want . I think the bad people only who want to be invisible . The good people won't be afraid from thier data .. the only thing must protect us form it is the hackers
Great stuff thank u for all the inf u are giving us.
My pleasure.
I stumbled up your UA-cam channel looking for help to secure my home WiFi. My neighbor (I'm assuming due to his relentless harassment and stalking) hacked my WiFi and made charges to Walmart, eBay and amazon thru my accounts. My gmail started acting really weird and still is so I'm looking to find a more private, secure email provider. Anyways, I love your videos. The are spot on with subjects that are very relevant in what we struggle with day by day. The best part is, you teach things that can be quite complex in a way that a preschooler could understand lol. That, I'm sure, is helpful to many of us.
Do you have any suggestions on what I should buy to make my network as solid as can be on a very limited budget? I'm on disability so I have a very low fixed income but I know I'll have to figure out how to buy whatever is needed to secure my network. Thank you!
Very sensible advice
Thanks.
Outstanding videos and I really appreciate them.
My pleasure, Geoff. Thanks for watching!
LOVE your channel
Thanks 🙏
You earned a new subscriber my friend, keep up the good work.
I like the Amazon link for How to be Invisible 😉
Haha! Touché.
A question about Yubikey and the likes: As I’ve understood it, also backup keys need to be registered when using it for a new service. Right?
Having an off-site (as protection against fire, flooding, …) backup key creates a time gap when no backup exists. One could keep track of new services that need to be unregistered, and batch register them on a regular basis. Adding a second backup key increases the work keeping them all up to date.
That may be true, but I don’t add many new accounts that I would consider “ultra sensitive” very often. For those less sensitive accounts, I simply try to back up with an Authenticator app or the like.
I'm more towards the paranoid end of the spectrum. After a life as an IT technician I've seen how bad things can get! 😉
I bet!
I wouldn't call it paranoid, more like thoughtfully realistic.
I care about my privacy and I'm pretty good at limiting my exposure but my exposure isn't limited. Family is the biggest threat I percieve to my on-line anonymity. That is out of my control and no one has any respect for my privacy.
That’s a great point I didn’t consider. Sometimes there are threats to your privacy that are mostly out of our control.
Sorry! What was the key for keeping password on me all the time?
Amazing video as usual ....I use 4 different browsers for different things
i use 3 different browsers: Tor for downloading stuff, chrome for casual browsing and firefox for secret stuff
I got a data breach letter what do I do
Great video as always!
Thank you, Gabriel! I appreciate the view and the comment.
SIM card cloning makes voids all claims about privacy. If your SIM is cloned forget about any and all security measures including two step verification. Proton mail opened a backdoor with implementing "other sessions" . You have to be very careful with those sessions. I once said I had nothing to hide, I do not- got divorced and he knows 'people in law enforcement- Everything is hacked. It is not a mater of hiding anything- your employer- ex- neighbor can have all your data if they know and pay off the right people.
Sorry about the divorce, GiGi. It should be noted, though, that SIM card cloning does not void all privacy claims. 2FA implemented by Authenticator app or hardware key cannot be copied via SIM swap.
Authy is SIM based did more damage than good. Would love to hear about others. Thank You
All you have to do with Authy is turn off the multi-device feature and SIM swapping is no longer an issue. Again, you seem to fear the SIM swap attack way more than it deserves.
Would you kindly do a video on the ''Onlykey"" ?????????
I’m still testing it out. Not bad, but not sure if I’ll dedicate a whole video to it. We’ll see!
I like the idea of local encryption before storing to the cloud. Do you know of a way to do that from mobile devices, say an iPad?
I love the irony that someone who considers apple products too intrusive into their privacy is writing about it in a comment on a youtube video.
I would've taken the time to subscribe, but I already did many videos ago. Thanks for putting out such fantastic information! I do agree with your points, and I like how you made it easy to take action. Right now I am guilt of using google for way too much, so I may switch to Firefox. Been meaning to switch to that anyways just because I like using MDN docs a lot.
Thank you!
Good advice
Appreciate it, Craig. 👍
Yes Google authenticator problem happen with me my old phone damage.. So i don't have login access . I request to website to off Google authenticator on my account
So sorry…that’s hard.
DearJosh!
You are doing a great job teaching us to privacy and security! Thank You very much!
You mentioned, You have a Yubikey and use 1 Password too.
I am using 1Password too and have a Yubikey also, but I store ALL my logins (and 2FA) in 1Password and I use my Yubikey just to enter a MAIN password for 1Password.
How can I store all my existing 1PAssword logins in my Yubikey?
As I understood You have all your password on your Yubikey. Is that mean You store in 1Password AND on Your Yubikey?
Is there any "easy" way to migrate my logins (and 2FA's) from 1PAssword to my Yubikey?
Can You make a video about this?
It would be great!
I hope You understood my problem, but my native language is Hungarian, so maybe I not wrote it correctly! :)
why is there no mention of keepass on this whole channel?
Because I don’t use it. I only recommend what I personally use.
Please review the service the so called "Mine : Your Smart Data Assistant "
I recently enrolled in it and its making track of all my services linked with my google account and also has option to tell them if i need that service or else they send an email on behalf of me [of course, they take permission] to the particular company for my personal data erasure and it has worked I tried it on spotify, fedex, coursera and the companies had malied me back saying that either i have to do this to delete my personal data or they have deleted all by themselves....
Interesting. Never heard of that before.
I trust no-one with anything because everyone lies.
That’s a difficult way to live.
please do a video on SIM card cloning
Thanks for the suggestion!
I totally agree, however too much effort for the average Joe. Legislation should be put into place to make great security passive.
Hmm…I’m not sure security/privacy will ever be passive.
“How I protect my identity” he says, after sharing his image on UA-cam 😝
Illegal to be too private? 3:07 I guess you mean changing your identity?
Not necessarily. Chris Luna was specifically referring to those who want to privatize their lives from the government. If you don’t pay your taxes and report your actual information to the government, it is illegal.
The 6th Commandment:
Thou shalt not covet thy neighbours 2FA key!
😂😂
I am on the paranoid side of the scale. You are doing important work and should know by now that you are doing a great job at it. I wish the internet was like swimming in a backyard pool instead of a shark infested ocean, but at least you recommend a good spear gun and show me how to use it.
Thanks so much, Franklin!
You care about your privacy but your not crazy.
I try not to be.
Do you know Ron Swanson personally?
I have a feeling this is a cultural reference I’m not getting. Sorry, I haven’t seen Parks & Rec.
@@AllThingsSecured Hahaha you don't know him because he's on the paranoid end of the spectrum
Privacy
lmao , you call the people who actually care about their privacy "Paranoid" , actually it is so dumb to follow a such guy
Of course I do! Security and privacy require a bit of paranoia. What, you think I'm talking bad about those people?
Dumb or not, my goal here is to get people to realize that privacy comes in different degrees and you have to know where you're comfortable.