Day 30

Review / Share With Friends / Take It FUrther with these Resources

 
 
 

DAY 30: Review / Share With Friends / Take It Further with these Resources

Welcome to Day 30 of my 30 day security challenge, the month long challenge I created to help you gain control of your privacy and security online. You can follow along with the whole series at snubsie.com where you can also download a checklist, and subscribe to youtube.com/tekthing for the entire video playlist.

You've officially reached the end of the challenge! Pat yourself on the back, go out and buy yourself some Starbucks or a new video game, and freakin treat yourself. This was a big challenge and you should feel accomplished and much better about your online security and privacy.

Today, I'm going to leave you with a few last minute pointers that I thought of while I developed this 30 day security challenge, as well as some awesome feedback from folks who watched along. If you want some additional reading material, I've linked to ALL the things in the shownotes for today, including resources I've used throughout this challenge and some brand new ones that I didn't share until today.

BUT FIRST! I want to thank you for joining me on this journey. This challenge was done completely by me, which is why I posted the entire thing on my blog. I wanted it to reach a big audience so I posted each video on our TekThing channel on youtube, and monetized them as much as possible on the platform, which honestly isn't much, but if you really got some good info out of it, please consider contributing to the TekThing Patreon or my own support links found at snubsie.com. I really appreciate it, since this 30 day security challenge wasn't sponsored by any companies. It was a work of love.

So, onto some additional pointers! When it comes to physical security, some optional things you can do include putting tape or a privacy sticker over your webcam. It sounds stupid but it's a thing. I recently shared an article about folks who install malware on girls computers, then call them their "slaves". Ew. Another thing you could do on your computer is to set up a BIOS or a firmware password. These are passwords that are required upon bootup ONLY and are tied to the physical device. You cannot forget these, as they cannot be changed by reinstalling the operating system.

For internet hygiene, another thing to consider is what you're taking photos of. If you've gotten a new ID, car, or credit card, don't take a photo of it. Your license plate, ID, and credit card all have information tied to you, so protect them from the internet. Taking photos of travel tickets is a big no-no, because social engineering tactics could put you at risk of losing your flight to an attacker or having someone mess with your itinerary. Taking photos of house keys puts you at risk of someone 3D printing a copy of your keys.

For reference articles and online sources, definitely hit up some of these sites. The first few sites are overviews of security tools and tutorials that can be super helpful if you have the time to read them. The Department of Homeland Security (what? I know.) has a resource lists in downloadable PDF form for everyone from kids to law enforcement. Security In A Box lists security advice based on operating system and includes Linux for the pro users out there. The EFF runs one of my favorite sites for info called Surveillance Self-Defense and has well written overviews to dig deeper into the theory behind many of the tools and protocols that I've recommended during this challenge.

I've already recommended several other sites in this 30 day security challenge, but in case you need a recap, each of the ones I've provided previously will also be available on this episodes shownotes page, so you can easily bookmark this page and come back to the material whenever you need it.

Lastly, do a review! Did you miss or skip any days? Did you want to go back and consider the "pro tip" options I gave for taking your privacy a step further? Now's the day to go back and finish those steps before closing out your 30 day security challenge.

Make sure to check out the comments on our youtube episode pages for this series, as I've seen tons of excellent comments come through with regard to other security and privacy minded tips you can implement.

So how'd you do? Did you run into any hiccups? Did you complete each step? How long did it take you? What did you find out about your own security while working through the challenge?

Your 30 day security challenge is now complete! Thank you again for joining me on this journey for the month. Share it with your friends now! Find all the info on youtube.com/tekthing and hit up snubsie.com for the shownotes. Again, I'm Shannon Morse - Congratulations!

30 Day Security Challenge Links:
https://docs.google.com/document/d/1ti8isUDQCN-9khgStmnU41c9O_qmxA_dq_OMX4hmcRA/edit#heading=h.5zm4nwiid0a7
https://snubsie.com/30-day-security-challenge

Security Overviews:
https://www.dhs.gov/stopthinkconnect-toolkit
https://securityinabox.org/en/
https://ssd.eff.org/en
http://www.crashoverridenetwork.com/resources.html

Subject Focused Resources:
https://www.privacytools.io/
https://2fa.directory/
https://thatoneprivacysite.net/vpn-section/
http://backgroundchecks.org/justdeleteme/
https://knowem.com/
https://haveibeenpwned.com/
https://mypermissions.com/
https://www.consumer.ftc.gov/blog/2017/06/avoid-skimmers-pump
https://www.optoutprescreen.com/?rf=t
http://plaintextoffenders.com/
https://www.grc.com/shieldsup

Recommended Blog Reading:
https://tisiphone.net/2017/02/08/is-digital-privacy-a-privilege-of-the-wealthy/
https://tisiphone.net/2017/01/25/thwart-my-osint-efforts-while-binging-tv/
https://decentsecurity.com/#/holiday-tasks/
https://medium.com/be-secure/securing-mac-os-x-90137aac6144
https://lifehacker.com/the-privacy-enthusiasts-guide-to-using-android-1792432725?utm_campaign=socialflow_lifehacker_twitter&utm_source=lifehacker_twitter&utm_medium=socialflow
https://lifehacker.com/how-to-secure-your-online-accounts-by-revoking-access-f-1794631133
https://lifehacker.com/roll-your-own-unroll-me-with-a-google-script-1794606005
https://www.wired.com/2017/05/spring-clean-digital-clutter-protect/
https://www.wired.com/2017/02/guide-getting-past-customs-digital-privacy-intact/
https://arstechnica.com/information-technology/2016/12/a-beginners-guide-to-beefing-up-your-privacy-and-security-online/
https://www.theverge.com/2017/6/17/15772142/how-to-set-up-two-factor-authentication
https://www.cnet.com/videos/keep-hackers-and-friends-from-using-your-hulu-and-netflix-accounts/

Router and Modem Recommendations:
https://thewirecutter.com/reviews/best-wi-fi-router/
https://thewirecutter.com/reviews/best-cable-modem/

Setting up your lock screen:
https://support.google.com/nexus/answer/2819522?hl=en
https://www.imore.com/lock-screen

Smartphones are easy to encrypt and lock down!:
https://ssd.eff.org/en/module/how-encrypt-your-iphone
http://www.androidauthority.com/how-to-encrypt-android-device-326700/
https://www.lifewire.com/encrypt-the-data-on-your-android-phone-or-iphone-2377707

Using Find My Device:
https://www.google.com/android/find
https://support.apple.com/explore/find-my-iphone-ipad-mac-watch
https://support.google.com/android/answer/6160491?hl=en

Update your phone:
https://support.google.com/nexus/answer/4457705?hl=en
https://support.apple.com/en-us/HT204204

Turn on (or change) your lock screens:
https://www.laptopmag.com/articles/change-password-windows-10
https://support.apple.com/kb/PH25376?locale=en_US

Encrypt your hard drive:
https://support.apple.com/kb/PH25553?locale=en_US
https://www.howtogeek.com/234826/how-to-enable-full-disk-encryption-on-windows-10/
https://support.microsoft.com/en-us/help/4028713/windows-turn-on-device-encryption
https://www.veracrypt.fr/en/Home.html

Find your Computer:
https://support.microsoft.com/en-us/help/11579/microsoft-account-find-lost-phone-device
https://support.apple.com/explore/find-my-iphone-ipad-mac-watch
https://account.microsoft.com/devices

Update your computer:
https://support.apple.com/en-us/HT201541
https://support.microsoft.com/en-us/help/12373/windows-update-faq

AntiVirus and AntiMalware Recommendations:
https://www.avast.com/free-antivirus-download
https://www.malwarebytes.com/premium/
https://www.microsoft.com/en-us/windows/windows-defender
https://www.microsoft.com/en-us/wdsi/products/scanner
https://www.bitdefender.com/solutions/antivirus-for-mac.html

Browser Security:
https://support.apple.com/en-us/HT201607
https://support.microsoft.com/en-us/help/4028606/windows-change-your-default-browser-in-windows-10
https://allaboutdnt.com/
https://duckduckgo.com/
https://support.google.com/chrome/answer/114836?co=GENIE.Platform%3DDesktop&hl=en
https://support.google.com/chrome/answer/114662?co=GENIE.Platform%3DDesktop&hl=en
https://brave.com/
https://www.mozilla.org/en-US/firefox/
https://www.google.com/chrome/browser/desktop/index.html
myaccount.google.com

Browser Extensions:

https://www.privacytools.io/
https://www.eff.org/https-everywhere
https://www.eff.org/privacybadger
https://getadblock.com/
https://adblockplus.org/
https://www.ghostery.com/
https://disconnect.me/
https://github.com/gorhill/uBlock

Smartphone Apps:
https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms&hl=en
https://play.google.com/store/apps/details?id=com.whatsapp&hl=en
https://play.google.com/store/apps/details?id=org.telegram.messenger&hl=en
https://play.google.com/store/apps/details?id=com.brave.browser&hl=en
https://play.google.com/store/apps/details?id=com.ghostery.android.ghostery&hl=en
https://play.google.com/store/apps/details?id=org.mozilla.focus&hl=en
https://play.google.com/store/apps/details?id=org.torproject.android&hl=en
https://play.google.com/store/apps/details?id=com.privateinternetaccess.android&hl=en
https://play.google.com/store/apps/details?id=com.tunnelbear.android&hl=en

Cloud Service Backup Recommendations:
https://spideroak.com/one/
https://www.sync.com
https://tresorit.com/
https://www.odrive.com

Password Manager Recommendations:
https://lastpass.com/f?5074626
https://1password.com/
https://keepass.info/
https://www.dashlane.com/

Two Factor Authentication Recommendations:
https://authy.com/
https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&hl=en
https://play.google.com/store/apps/details?id=com.duosecurity.duomobile&hl=en
https://duo.com/

VPN Recommendations:
https://www.privateinternetaccess.com/
https://www.tunnelbear.com/

Removing Third Party App Permissions:
https://myaccount.google.com/permissions
http://www.facebook.com/settings/?tab=applications
http://twitter.com/settings/applications
https://www.linkedin.com/secure/settings?userAgree=&goback=.aas
https://instagram.com/accounts/manage_access
https://account.live.com/Consent/Manage
https://api.login.yahoo.com/WSLogin/V1/unlink?.intl=us&.scrumb=oGuZry/Yg97
https://www.dropbox.com/account#applications

Online Account Security:
https://myaccount.google.com/privacycheckup
https://www.facebook.com/settings/?tab=privacy
https://www.instagram.com/accounts/edit/

Secure Mail Recommendations:
https://protonmail.com/
https://mail.google.com
(with PGP)
http://keybase.io/

How to Spot a Scammer:
https://support.microsoft.com/en-us/contactus/?ws=support
https://www.microsoft.com/en-us/reportascam/
https://support.microsoft.com/en-us/help/4013405/windows-protect-from-tech-support-scams

Credit Freezes and ATM Skimmers:
https://krebsonsecurity.com/all-about-skimmers/
https://consumersunion.org/research/consumers-unions-guide-to-security-freeze-protection-2/
Equifax — 1-800-349-9960
Experian — 1‑888‑397‑3742
TransUnion — 1-888-909-8872
Innovis — 1-800-540-2505

Faraday Bag / RFID Blocking Wallet Recommendations:
http://amzn.to/2yyBYGo
http://amzn.to/2zgq1Co

How to Delete Yourself From The Internet:
https://www.abine.com/deleteme/landing.php
https://www.abine.com/blog/2017/how-to-delete-things-from-the-internet/
https://www.abine.com/optouts.php

Operating System Security:
https://support.apple.com/kb/PH25672?locale=en_US
https://support.apple.com/kb/PH25551?locale=en_US
https://support.apple.com/guide/safari/privacy-preferences-sfri35610
https://en.wikipedia.org/wiki/Security-focused_operating_system