"Everyone is going to be hacked"

I recently posted an essay about how and why you should protect yourself from the NSA with encryption.
What people often forget is that the NSA is not the only entity you need to protect yourself from.

"It's likely that everyone has already been hacked."
  - Michael Wolf

  Michael Wolf is someone that you should listen to when it comes to issues of technology and business.
  He might just shake you out of your false sense of security.

Recently it was revealed at a Russian criminal gang stole 1.2 Billion username password combinations, plus another 500 million email addresses.
   You do the math. Chances are that more than one of you who are reading this had your password stolen.

  How did they steal so many passwords? With botnet computer viruses, and the computers most attacked are home computers.
  I know what some of you are thinking. I'm careful. I'm different. I have an anti-virus.

 What if I was to tell you that you aren't nearly as safe as you think? Don't believe me? You shouldn't. I could be anybody.
   However, you should listen to Symantec's senior vice president Brian Dye.

 Earlier this week, Symantec's senior vice president Brian Dye declared to the Wall Street Journal that antivirus "is dead." ...
    Not only that, Dye bemoaned that they simply can't keep hackers out. In the interview, Dye estimated that AV only catches 45 percent of cyber attacks.

 The article goes on to point out that lots of cybersecurity experts disagree with the vice president of world’s biggest IT security company.
   Dye didn't say not to use an anti-virus, and no one else is saying that either. The point is that anti-virus software simply isn't very effective.

 Amichai Shulman, Imperva’s chief technology officer, and a group of researchers collected and analyzed 82 new computer viruses and put them up against more than 40 antivirus products, made by top companies like Microsoft, Symantec, McAfee and Kaspersky Lab. They found that the initial detection rate was less than 5 percent.

 Translated, anti-virus software simply can't detect a virus until it has been discovered by the anti-virus makers. That's a big deal because virus writers are so prolific.
   In 2000 there were less than a million new strains of malware. By 2010 there were 49 million new strains.

'The traditional signature-based method of detecting malware is not keeping up.'
 - Phil Hochmuth.

Even this underestimates the problem. The assumption is that anti-virus companies discover them quickly, but that isn't true. The Flame virus went two years without being discovered. It took more than a year to discover Stuxnet virus.
   These aren't typical cases, but then there doesn't have to be many before its a problem.

  Some of you might be thinking that once the virus is detected then the problem is over, but that isn't true either.
  A popular strain of banking malware is called Zeus.

 "For some perspective, we're analyzing about 400,000 binaries per week, and of that malware, about 92 percent is Zeus or Zeus-based," Cohen says. According to the Zeus Tracker, as of June 30, there were 1,149 known Zeus C&C servers being tracked. Meanwhile, only about 40 percent of Zeus malware was being detected by antivirus products, which is a selling point for fraudsters seeking a free crimeware toolkit.

 As Dye pointed out, only 45% of cyber attacks are blocked. Symantec's own internal report says their product only detects about 70% of virus in the wild. Microsoft Security Essentials only catches 61% of malware.

Cyber-crime is a VERY big deal

  The mistake many people make is applying too much attention to the wrong danger. For instance, people walk around scared of terrorists despite the fact that you are 8 times more likely to be killed by a cop.
   A similar thing is how people are afraid of having their cars stolen, but not their ID.

 Identity theft victims suffered more than $24.7 billion in direct and indirect losses in 2012 -- that's more than the combined $14 billion in losses consumers experienced from other types of theft (burglary, motor vehicle theft and other property theft) in the same period.
   The Bureau of Justice Statistics highlighted these and other staggering statistics in its 2012 Victims of Identity Theft report, which was released this month. About 16.6 million U.S. residents ages 16 and older were victims of at least one incident of identity theft last year. That's about 7 percent of the population in that age group, and they most often experienced misuse of existing bank and credit card accounts.

 Let that sink in for a moment: Identity theft is nearly twice as big of criminal activity than all other types of theft combined.

  So many IDs are being stolen that there is a glut of stolen IDs on the market and it is driving prices down.
   I've read about websites you can visit where they have databases so you can select the type and area of the ID you want to steal, as if you are shopping at Amazon.com. It's insane!

 Just in time for the holidays, the price of a stolen identity has dropped as much as 37 percent in the cybercrime underground: to $25 for a U.S. identity, and $40 for an overseas identity.
    For $300 or less, you can acquire credentials for a bank account with a balance of $70,000 to $150,000, and $400 is all it takes to get a rival or targeted business knocked offline with a distributed denial-of-service (DDoS)-for-hire attack. Meanwhile, ID theft and bank account credentials are getting cheaper because there is just so much inventory (a.k.a. stolen personal information) out there.

 The market for traditional illegal cyberactivity has gotten so saturated, that criminals are branching out into extortion.
   They are stealing sensitive information and threatening to disclose it unless their victims pay hundreds or even thousands of dollars in ransom.
   They've also infected the computers of small businesses and locked up the systems, then brazenly demand ransom to undo the damage.
1 in 6 Windows computers in the world have no anti-virus. In the United States nearly 20% have no virus protection.
  Between 30% of computers in the United States are already infected to 48%. As many as half of the people reading this have malware on their computer.
  99.4% of virus are made for the Windows operating system.

It doesn't end with your laptop

Cell phone security is a joke. Specifically Android.

It's not Windows and its not Apple. Because of its business model, it may be the least secure of them all.
  Malware written for Android is growing by leaps and bounds. In fact, between 79% and 99% of all malware for mobile is written for the Android OS.
   As people move from using computers to mobile devices, criminal gangs are following.

 “Cyber crime is moving to mobile but people are not aware. It’s still not as big as computer crime but it’s growing fast. The trend is a very dangerous situation,” Kaspersky said, noting that it took the Chernobyl virus in 1998 for people to properly protect their computers. “I expect something really bad to happen to change people’s minds and awareness.”
   Sonatype CEO Wayne Jackson and New Enterprise Association General Partner Harry Weller shared similar sentiments in a Fox Business interview, which detailed more than 718,000 malicious Android apps have been discovered, up to June 2013.

The money in the bank isn't safe

 When an ATM in Kiev started spitting out cash whether customer were in front of it or not, a Russian cybersecurity firm, Kaspersky Lab, was called to investigate. They discovered that the ATM was the least of the problems.

 The bank’s internal computers, used by employees who process daily transfers and conduct bookkeeping, had been penetrated by malware that allowed cybercriminals to record their every move. The malicious software lurked for months, sending back video feeds and images that told a criminal group — including Russians, Chinese and Europeans — how the bank conducted its daily routines, according to the investigators.
   Then the group impersonated bank officers, not only turning on various cash machines, but also transferring millions of dollars from banks in Russia, Japan, Switzerland, the United States and the Netherlands into dummy accounts set up in other countries.

 The heist involved around 100 banks and financial institutions in 30 countries. The amount estimated stolen is up to $1 Billion.
 To put this into perspective, the Great Brink's Robbery was less than $3 Million.

The bank computer hacking crime just keeps getting bigger, and even before the extent of damage has been fully assessed the idea of a taxpayer bailout is being floated.

 Bankers and U.S. officials have warned that cyber-terrorists will try to wreck the financial system’s computer networks. What they aren’t saying publicly is that taxpayers will probably have to cover much of the damage.

 Washington never fixed the Too-Big-To-Fail problem (which is also the Too-Big-To-Prosecute problem), thus it is simply assumed that the taxpayer will always be there for the Wall Street banks.

The full extent of the hacks is still being determined. JPMorgan Chase's computer systems were compromised for two full months before it was discovered.

The hackers unleashed malicious programs that had been designed to penetrate the corporate network of JPMorgan -- the largest U.S. bank, which had vowed two months before the attack began to spend a quarter-billion dollars a year on cybersecurity. With sophisticated tools, the intruders reached deep into the bank’s infrastructure, silently siphoning off gigabytes of information, including customer-account data, until mid-August.

 How much damage was done during those two months is unknown. A new report says that "some bank records at JPMorgan were altered and possibly deleted".
   It also turns out that the attack "affected seven financial organizations", not just two as originally reported.

   Easily the most amusing part of this whole event is how JPMorgan Chase reported that it wasn't seeing "unusual fraud" in its investigation.
   We can only assume that "unusual fraud" is different from the "regular fraud" that JPMorgan Chase typically engages in. JPMorgan has paid around $27 Billion in fines in the last few years from its "regular fraud".

Now that we have some idea of how serious this hacking event was, let's get back to the taxpayer bailout trial balloon.

 The government might have little choice but to step in after an attack large enough to threaten the financial system. Federal deposit insurance would apply only if a bank failed, not if hackers drained accounts. The banks would have to tap their reserves and then their private insurance, which wouldn’t be enough to cover all claims from a catastrophic event, DeMarco and other industry officials said.
   Discussions about the government’s role in cleaning up after a catastrophic cyber assault have centered on the Terrorism Risk Insurance Act, or TRIA. States are also pressing Washington to clarify how the Stafford Act, the main statute for relief from natural disasters, would factor in.
  The insurance law, enacted after the 2001 attacks, authorizes the government to provide financial support for insurance companies in the wake of terrorism. It is up for renewal this year. Under TRIA, insurers cover a fixed amount of losses from terrorist attacks with the government backstopping additional costs up to $100 billion. The law gives the Treasury secretary broad latitude to invoke the backstop.
    In private meetings, Treasury officials have told insurance industry lobbyists that the department would treat cyber-terror like a physical attack under TRIA, said the people involved with the talks, who spoke on condition of anonymity because the discussions were private.

 So there you have it. Wall Street will be protected from its own incompetence by the taxpayer because terrorists.

Share
up
0 users have voted.

Comments

link

Every computer system in the world is vulnerable to hackers and criminals, according to Marten Mickos, CEO of HackerOne. That's nothing new with major data breaches at Yahoo and the federal government.
up
0 users have voted.
WindDancer13's picture

She tells us persistently that there is no proof her home server was ever hacked. She must be the only person who hasn't been.

up
0 users have voted.

We are what we repeatedly do. Excellence, then, is not an act, but a habit.--Aristotle
If there is no struggle there is no progress.--Frederick Douglass

snoopydawg's picture

In her deposition to JW she stated that their email server was hacked and it was offline for 3 days while Justin was working on it.
I don't know if she said if or what was hacked from the account.
Maybe Mszgrin or Amanda knows.
Funny how that tidbit hasn't been reported or talked about, isn't it?

Thanks for the information GS. Great essay.

up
0 users have voted.

Which AIPAC/MIC/pharma/bank bought politician are you going to vote for? Don’t be surprised when nothing changes.

Voting is like driving with a toy steering wheel.

WindDancer13's picture

is still being denied by HRC. It is kind of like how they don't talk about the fact that HRC is way more computer savvy than she lead the FBI to believe (or that the FBI chose to believe).

up
0 users have voted.

We are what we repeatedly do. Excellence, then, is not an act, but a habit.--Aristotle
If there is no struggle there is no progress.--Frederick Douglass

Lily O Lady's picture

very bad idea. They sounded so vulnerable to hacking, I wondered how anyone could consider them a good idea. Yet on they went, tempting fate.

Not that computers are all that safe either. With all the new advancements in technology, security seems to take a back seat. I doubt things will change.

up
0 users have voted.

"The object of persecution is persecution. The object of torture is torture. The object of power is power. Now do you begin to understand me?" ~Orwell, "1984"

computers drive cars? While we're at it, let's put them at the helm of 18-wheelers. Hell, why not airliners too?

We can't interfere with corporation's divinely granted right to maximize profits by requiring companies to hire competent human drivers to steer their vehicles.

up
0 users have voted.
sojourns's picture

On board computers on existing cars can be hacked impacting steering and braking systems.

up
0 users have voted.

"I can't understand why people are frightened of new ideas. I'm frightened of the old ones."
John Cage

Deja's picture

was called an idiot for not trusting them because of autopilot in planes. My point was that my phones have flipped out for no reason - like auto rebooting, for instance. So, I say hell no to smart cars. (I think the discussion was on Orange State, actually.)

Not sure if autopilot can be hacked and completely taken over, preventing the pilot/copilot from overriding autopilot like a hacked smart car can. I thought autopilot was wholly contained within the plane, while smart cars are on a network and can be accessed remotely. Otherwise, air traffic controllers could prevent (or deliberately cause) plane crashes.

AnyWho, hell no to "smart" cars - just look at auto correct on "smart" phones! No thanks.

up
0 users have voted.
Oldest Son Of A Sailor's picture

Designed for self driving cars, trucks, and buses...

One of the theories of the Stuxnet virus was that it was a US Government, and or, Israeli Government, created virus designed to infect the Iranian Nuclear Program Uranium Enrichment Centrifuges, causing them to spin out of control, and self destruct. Part of the reason why it was undetected for so long is it didn't do anything except multiply and infect more computers until it went after its target which is unconfirmed that the target was the Iranian Centrifuges...

Imagine if you will the "Billiard or Pinball Virus," which isn't detected because of no adverse effects while it multiplies and infects, until one day when all the driverless vehicles on the road careen out of control smashing into each other across the entire country at a time where the maximum number of people were calculated to be traveling...

up
0 users have voted.
"Do you realize the responsibility I carry?
I'm the only person standing between Richard Nixon and the White House."

~John F. Kennedy~
Economic: -9.13, Social: -7.28,
elenacarlena's picture

How do we best protect our computer systems without spending a small fortune (or with, for that matter, if it would be worth the money spent - I gave up on Norton and McAfee because they borked my computers!)?

up
0 users have voted.

Please check out Pet Vet Help, consider joining us to help pets, and follow me @ElenaCarlena on Twitter! Thank you.

I'll tell you what I've been doing in my next essay.

up
0 users have voted.
elenacarlena's picture

Not too technical for us non-techies, I hope!

up
0 users have voted.

Please check out Pet Vet Help, consider joining us to help pets, and follow me @ElenaCarlena on Twitter! Thank you.

http://www.washingtonsblog.com/2013/06/microsoft-programmed-in-nsa-backd...

NSA Built Back Door In All Windows Software by 1999
Posted on June 7, 2013 by WashingtonsBlog
Government Built Spy-Access Into Most Popular Consumer Program Before 9/11

In researching the stunning pervasiveness of spying by the government (it’s much more wide spread than you’ve heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.

Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software:

A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled. ...

... according to two witnesses attending the conference, even Microsoft’s top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was “stunned” to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the “entropy” of programming code.

Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers. ...

... According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system “is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system“. The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards. ...

If you haven't read this in full at source before/recently, you might want to, even if it is older material. How many hackers are out there taking advantage of these vulnerabilities?

https://theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-...

March 12 2014, 8:19 a.m.

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. ...

... In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites. ...

... Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.” ...

... Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations.

Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers.

The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.”

The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”

Circumventing Encryption

The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes.

One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer.

An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.

The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. ...

up
0 users have voted.

Psychopathy is not a political position, whether labeled 'conservatism', 'centrism' or 'left'.

A tin labeled 'coffee' may be a can of worms or pathology identified by a lack of empathy/willingness to harm others to achieve personal desires.

gendjinn's picture

The halcyon days of the internet are truly over and one should assume all cloud computing solutions funnel your data to the security state.

I'd say any company that has VC from Gre-ylock partners is in bed with the CIA.

up
0 users have voted.
Late Again's picture

But what can be done about smartphones, I wonder?

up
0 users have voted.

"When we remember we are all mad, the mysteries disappear and life stands explained." - Mark Twain

sojourns's picture

No need to hesitate. Several of the Ubuntu distributions are very easy to learn. Not much to learn, really. More like familiarize yourself with. You don't have to learn to be a terminal jockey like in days past. There is only one terminal thing you need to do after installing Ubuntu and that is open a terminal and run sudo apt-get update and then sudo apt-get install and that brings it up to speed with security patches. There are also software updates that are done with a friendly GUI. Best of all -- It's free and so is most of the needed software. You can run the live CD and play around with it without installing it. Also, it will run on very early any computer which is great if you have a older machine.

Linux, like Unix is difficult to hack because of the nature of the file system. Which is why Mac's are rarely hacked. The mac OS is built on Unix and made proprietary. If you absolutely need a windows program to run, you can set up a virtual machine that runs with in the Linux OS, e.g. you can run windows 7, 10 or whatever within the virtual machine safely as it is running in a sandbox.

https://www.ubuntu.com/download

up
0 users have voted.

"I can't understand why people are frightened of new ideas. I'm frightened of the old ones."
John Cage

WindDancer13's picture

to keep my credit cards maxed out. = )

up
0 users have voted.

We are what we repeatedly do. Excellence, then, is not an act, but a habit.--Aristotle
If there is no struggle there is no progress.--Frederick Douglass

will increase your credit limits.

up
0 users have voted.

dfarrah

Lily O Lady's picture

up
0 users have voted.

"The object of persecution is persecution. The object of torture is torture. The object of power is power. Now do you begin to understand me?" ~Orwell, "1984"

WindDancer13's picture

On the other hand, there is not an established debtors prison...yet. So, if the credit card did not make the appropriate adjustments, I could just quit making payments. Who needs a credit score anyway? It is a fictional construct.

up
0 users have voted.

We are what we repeatedly do. Excellence, then, is not an act, but a habit.--Aristotle
If there is no struggle there is no progress.--Frederick Douglass

Money from the 1% to the rest of us? Do something really entertaining like taking that $15T or so hidden offshore and putting $50K for each household member in everybody's account!
There's just not enough whimsy going on with our internet savants.

up
0 users have voted.

Orwell: Where's the omelette?

And why can't our side set up surveillance on the PTB so we know what they're doing all of the time?

up
0 users have voted.

dfarrah

Zinman's picture

encryption works, but avoidance works better.

up
0 users have voted.

Be a Friend of the Earth, cherish it and protect it.

Cant Stop the Macedonian Signal's picture

Or else you're merely retreating to isolation. It's extremely difficult to make connections w/people anywhere but the internet now.

up
0 users have voted.

"More for Gore or the son of a drug lord--None of the above, fuck it, cut the cord."
--Zack de la Rocha

"I tell you I'll have nothing to do with the place...The roof of that hall is made of bones."
-- Fiver

riverlover's picture

just yesterday. Frozen, call a toll-free number, get a male named Jonathan with an Indian accent. In India. They will "fix" my brand-new Win10 for only $300. I canceled the charge and get a new CC number. Less than a month ago my .edu addy was stolen and locked after it was used several times in different countries simultaneously.

Antivirus software will always be behind the game, as my son told me yesterday. I was "saved" from malware installation or worse by a convenient 8 hour power outage.

up
0 users have voted.

Hey! my dear friends or soon-to-be's, JtC could use the donations to keep this site functioning for those of us who can still see the life preserver or flotsam in the water.

still insist that voting systems are safe.

Headline from Denver Post: How Colorado’s election system makes large-scale result rigging nearly impossible
“It’s not that these events never occur. It’s that we catch them.”

How can anyone reach a conclusion that rigging is 'nearly impossible' when so many systems have been hacked?

up
0 users have voted.

dfarrah

thanatokephaloides's picture

How can anyone reach a conclusion that rigging is 'nearly impossible' when so many systems have been hacked?

In Colorado, it's actually pretty simple -- and old-school.

It's called PAPER. Ballots in Colorado are still made of paper. And paper leaves, well, a paper trail.

Wink

up
0 users have voted.

"US govt/military = bad. Russian govt/military = bad. Any politician wanting power = bad. Anyone wielding power = bad." --Shahryar

"All power corrupts absolutely!" -- thanatokephaloides

paper ballots are counted by electronic systems that can be hacked.

up
0 users have voted.

dfarrah

thanatokephaloides's picture

Yes, and the paper ballots are counted by electronic systems that can be hacked.

It's still better than in most places, where the electronic systems are all there is.

up
0 users have voted.

"US govt/military = bad. Russian govt/military = bad. Any politician wanting power = bad. Anyone wielding power = bad." --Shahryar

"All power corrupts absolutely!" -- thanatokephaloides

I've known this would be the result of things for over a decade now. Some tips I live by:

--Block everything you can on your browser. Use Ghostery, AdBlock, Click to Flash, whatever you can to reduce or eliminate your behind-the-scenes data footprint. Clear your cookies often, and regularly expunge your persistent cookies that things like Flash embed. Or better yet, turn off Flash and Java permanently!

--Don't bank online. Don't do your taxes online. Yes, this does not help protect against the networks within the banks themselves--but, it elminates one vector (your computer to the bank) that can also be spied upon or hacked. Have paper copies of your bank/stock statements mailed to you. That way, if your bank is hacked and your account disappears, you have an official record of things as of a recent date--all your accounts should be insured to a large extent. Those paper copies are your proof so you can get your money back!

--When you shop online, use false e-mails addresses and phone numbers, and use a credit card that has a low limit. Take a screen snapshot of the confirmation number of the transaction and keep it on your desktop until your shipment arrives. YOU CAN ALWAYS CONTACT THE SHOP to find out where your package is at, using that confirmation number! They don't need to know your true email or phone number!

--Encrypt everything you can. Or, use encrypted services when you can. For example, using iMessage/Messages on iPhones/Macs is encrypted end-to-end. You actually need your device itself in hand to be able to read the texts without cracking the encryption (which is extremely difficult--not impossible, but very, very hard).

--Use hard to crack passwords. There are a couple methods to make these very difficult to crack. Use a password generator, or, if you prefer not to: 1) Use very long phrases instead of single words. The longer the phrase, the more diffcult it is to crack. 2) Alternatively, combine a favorite (long) word with a longish number that you'll easily remember. For example, "janet1985" is easily cracked. "ja19ne85t" is much harder for a computer to crack, but still easy for a human to remember once they've used it a few times. Preferably longer, though--minimum of 12 characters, but longer than that is even better.

--Don't use cloud services! Or Facebook or Google+ or Instagram or Twitter. I mean you can, but then anything you put on those is out there (personal info, pictures, political views, whatever). Back your stuff up internally onto a bootable drive at regular intervals instead of in the cloud.

--Don't use your real name on the web. Use different names at different sites.

--I run my own server, so my email isn't reliant upon Google, or Apple, or Microsoft, or anyone else. I have my own personal "Facebook" that I share only with my family and very close friends. Invite only. Strong password protected. My own encrypted VPN (kind of like a cloud service) where I can access things from wherever! Hey, it was a learning experience, and yes, this part took a lot of effort! There are constant attacks against it, but I have certain easy-to-exploit services turned off and firewalled. And I can check against my own network usage and online blocklists (like spamhaus) to see if my server has been compromised (never has been).

All except that last one are pretty easy to do. Make them habbits. Not that hard. Much safer.

up
0 users have voted.
Deja's picture

I'd love a non droid, but can't afford one.

up
0 users have voted.

Lol about the farmhouse!

Yeah, I'm not an Android person. But I assume you can just not use all that Google stuff, yes? I'd imagine--on Android in particular--it must be simple to use another e-mail client.

Apple doesn't allow removal of most of their built in apps. I just relegate them to a "never used" folder and use what I want instead.

up
0 users have voted.
Oldest Son Of A Sailor's picture

But you can have a very fake profile...
I have numerous ones i use for different reasons...
Keep things compartmentalized...

up
0 users have voted.
"Do you realize the responsibility I carry?
I'm the only person standing between Richard Nixon and the White House."

~John F. Kennedy~
Economic: -9.13, Social: -7.28,
thanatokephaloides's picture

The last 3 phones I've had will not let me uninstall Google plus. Or any of the other crap from Google, like newsstand, play, etc..

That's because Google owns the Android OS. It's Linux-based, but most of the serious fuck-ups are Google's. And Google Play is the app store (reposiitory) for Android, which is why you can't remove it.

I'm working on a permanent rooting for my Android ZTE Maven Z812. Once I have it, I'm looking at Ubuntu Touch (straight Linux) for it.

up
0 users have voted.

"US govt/military = bad. Russian govt/military = bad. Any politician wanting power = bad. Anyone wielding power = bad." --Shahryar

"All power corrupts absolutely!" -- thanatokephaloides

Song of the lark's picture

Eventually the gloves will come off and hackers will just quietly disappear, one by one. Only State actors will be allowed to hack.

up
0 users have voted.
Pluto's Republic's picture

Neuromancer re-sorted and reset my processors. I was different after reading it. I suppose it was a brain hack.

up
0 users have voted.

____________________

The political system is what it is because the People are who they are. — Plato
Azazello's picture

Somehow they managed to associate the account name with my clever password. I won't be using that account anymore. It was the one I gave to various political campaigns and organizations so at least I won't have to waste time deleting DCCC spam anymore.

up
0 users have voted.

We wanted decent healthcare, a living wage and free college.
The Democrats gave us Biden and war instead.

Deja's picture

Seriously, though, the fact that you used it for political stuff made my aluminum foil antennae pop up from my head like a scene from My Favorite Martian! Creepy! So, my subject line is only partial snark.

up
0 users have voted.
Alex Ocana's picture

Is that I don't use any cell or landline phones and everytime I go to sign up for some Internet service I need one for a fucking verification code.

up
0 users have voted.

From the Light House.

but while I was reading this c99% logged me out and forgot my password. I would have been worried, but this happens about every 2 weeks.

up
0 users have voted.

On to Biden since 1973