Security

Cybersecurity issues: Hacks, data breaches, malware/ransomware. Security tools: Password managers, security keys, 2FA/MFA, encryption (E2EE), VMs, OS.

Security - Software - Email - Computer Screen

Email is Insecure – Here’s How to Improve Email Security

Email was never designed to be private or secure, so not surprisingly, it is neither private, nor secure. In the previous episode, we explained the reasons why as well as the risks inherent to email. However, email is so prevalent that it is unfortunately a necessary evil. In this episode, we provide seven recommendations for how to use email somewhat securely. Of course, due to email’s inherent design limitations, you can only use it securely to a limited extent, but some security is better than no security. These recommendations are (1) reducing your reliance on email, (2) using encrypted email providers like Proton Mail or Tutanota, (3) enabling more secure multi-factor authentication (MFA/2FA) options, (4) using your email provider’s native app on mobile, (5) controlling your email address, emails, and other data like contacts, (6) dealing with potentially-malicious attachments, and (7) being vigilant with email links. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us. Disclaimer: Our podcasts, including this episode, are for informational purposes only. Some of the items discussed may not be appropriate or lawful in your jurisdiction or industry.

Email is Insecure – Here’s How to Improve Email Security Read More »

Drake - Bad Choice-Good Choice - Linux vs Windows macOS ChromeOS

Linux Doesn’t Suck – Here’s Why Even Normies Should Use It

Linux has long been viewed as a science fair project for nerds. We explain why Linux doesn’t suck and why it’s now usable even for normies. Some of the items discussed: Issues with Windows, ease of use, performance (efficient use of resources), hardware support, application support, OS licensing, concerns about Windows/macOS/ChromeOS evolving into Orwellian adware. These other operating systems have their place, but we believe Linux should be used for personal and sensitive computing. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us break through Big Tech suppression and keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us.

Linux Doesn’t Suck – Here’s Why Even Normies Should Use It Read More »

Email - Mobile Phone - Privacy and Security - Technology - Hands

Email is Insecure – Stop Using it for Sensitive Communications

Email is the primary means of sending messages and documents for many people. Unfortunately, email was never designed to be private or secure. Over time, we’ve developed several tools and techniques to help make it more secure. But at the end of the day, no matter how uncomfortable it makes us feel, email is inherently insecure. Just ask the US military. Millions of military emails are going to Mali (.ml TLD) rather than the military (.mil domain) due to mundane typos. We go into detail about why email is insecure and go over real-world and personal examples. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us break through Big Tech suppression and keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us.

Email is Insecure – Stop Using it for Sensitive Communications Read More »

Cybersecurity - Privacy and Security - Virtual Private Network (VPN)

Are Virtual Private Networks (VPNs) Useless Honeypot Scams?

You may have heard others in the privacy and security community call virtual private networks (VPNs) “useless”, “scams”, or “honeypots”, but is this actually the case? There are certainly a lot of sketchy VPNs and creators who shill them, but does that invalidate the thesis for using a VPN? We discuss this issue as well as offer a few tips for using VPNs and Tor to protect your privacy. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us break through Big Tech suppression and keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us.

Are Virtual Private Networks (VPNs) Useless Honeypot Scams? Read More »

Defense - Defending - Boxer - Boxing - Fighting

Defending GrapheneOS and Daniel Micay

Trouble has been brewing between Daniel Micay, GrapheneOS, and the privacy and security community for several months. This has culminated in Daniel, the founder of GrapheneOS, stepping down as lead developer of the project in late May, 2023. In this episode, we go over this issue in some detail and defend Daniel Micay and GrapheneOS from some of the criticisms and responses they’ve received, which we believe are unjustified. We also share our key takeaways and final thoughts so current and prospective GrapheneOS users can make a more informed decision as to whether they should use this operating system. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us break through Big Tech suppression and keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us. Disclaimer: As of the time of this recording, we have no relationship or association with GrapheneOS or Daniel Micay other than the use of GrapheneOS.

Defending GrapheneOS and Daniel Micay Read More »

Mobile Phone - Cell Phone - Flip Phone - Dumb Phone - Man Using Flip Phone

Should You Use a Dumb Phone for Privacy & Security?

The constant stream of news regarding mobile phone spyware (e.g. Pegasus) and hacks may have you wondering – should you use a dumb phone for privacy and security? We often see criminals in movies and TV using dumb phones as burners, but does this really make you more private and secure relative to using a smart phone? We answer these questions in this episode, as well as impart some cold, hard truths about the privacy and security implications of voice (PSTN) and SMS. Finally, we wrap up by explaining some of the ways you can improve the security of your smart phone and why this matters. Buy a good quality smart phone, harden it, and keep it up-to-date before you get pwned. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us break through Big Tech suppression and keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us. Disclaimer: Nothing in this episode should be construed as legal or other advice.

Should You Use a Dumb Phone for Privacy & Security? Read More »

Delete Facebook - Social Media - Corporate Surveillance - Creepy

Finding, Sanitizing, and Closing Old Accounts

You probably have more accounts than you realize – perhaps dozens that you’ve opened over the years and forgotten about. Every account you have is a potential liability in terms of your privacy and security. In this episode, we detail: 1. Techniques for finding accounts you’ve forgotten about; 2. Why and how you should sanitize accounts before closing them; and 3. Why and how you should close old/unneeded accounts. We also discuss valuable insights that we’ve gained from our years of experience in decommissioning hundreds of accounts. Of course, anyone can simply delete an account, but there are many nuances to contemplate before doing so because closing an account can have irreversible side-effects. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us break through Big Tech suppression and keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us. Disclaimer: We are not attorneys or other legal professionals and nothing in this episode should be construed as legal or other advice.

Finding, Sanitizing, and Closing Old Accounts Read More »

Corporate Surveillance - Data Sharing - Data Breaches - Account Linking

12 Considerations for Opening Your Next Account – Part 2

Have you ever opened an account and regretted it? Has your private data been used, abused, and breached? We have years of experience fighting with hundreds, if not thousands of different apps and services to harden, sanitize, delete sensitive information, and recover from data breaches. In this episode, we share our insights from these experiences so you can hopefully avoid the pitfalls we and our clients have encountered over the years. More specifically, here in Part 2 of 2, we discuss: 1. App and service providers may make it difficult or impossible to close your account or delete your data; 2. Many or most entities will be breached; 3. App and service providers may not actually be deleting your data when they’re supposed to; 4. Phone numbers for SMS two-factor authentication (2FA) being abused; 5. Usernames and email addresses revealing information and linking accounts; and 6. Password recovery and other features revealing information about you. Take these considerations seriously when you consider opening your next account. We also discuss detailed action items for addressing these concerns, but caution listeners that some of the techniques detailed in this episode (fake information, email aliases, VOIP phone numbers, etc.) may not be appropriate or lawful in some jurisdictions or some circumstances. Some of the images presented in the video and blog content for this episode are AI-generated and provided for entertainment purposes only. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us break through Big Tech suppression and keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us. Disclaimer: We are not attorneys or other legal professionals and nothing in this episode should be construed as legal or other advice.

12 Considerations for Opening Your Next Account – Part 2 Read More »

Corporate Surveillance - Privacy-invasive Apps and Services - Spying on Unsuspecting Users - Smart Devices

12 Considerations for Opening Your Next Account – Part 1

Have you ever opened an account and regretted it? Has your private data been used, abused, and breached? We have years of experience fighting with hundreds, if not thousands of different apps and services to harden, sanitize, delete sensitive information, and recover from data breaches. In this episode, we share our insights from these experiences so you can hopefully avoid the pitfalls we and our clients have encountered over the years. More specifically, here in Part 1 of 2, we discuss: 1. Avoiding data silo mentality; 2. Your account and data can be taken away at any time; 3. Policies can change against you at any time; 4. If a system can ID you, assume this is permanent; 5. Apps/services making it difficult or impossible to change or delete data; and 6. Some systems will disable your account when you change your data. Take these considerations seriously when you consider opening your next account and stay tuned for Part 2. The images presented in the video and blog content for this episode are AI-generated and provided for entertainment purposes only. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us break through Big Tech suppression and keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us. Correction (25, July 2023): It was stated in this episode that Amazon purchased iRobot. Amazon has entered into an agreement to purchase iRobot, but this transaction has yet to close. However, we expect it to close and remain concerned about Amazon’s data collection.

12 Considerations for Opening Your Next Account – Part 1 Read More »

Cybersecurity - Security - Hacking - Security Alert

LastPass Hacks – Lessons and What to Do

LastPass has been hacked… again. This time, user vaults were stolen by hackers. The more updates we receive about this dumpster fire, the worse it gets. In this episode, we explain what happened and how you should protect yourself. We also outline lessons everyone (users, business owners, developers) should take away from this event and apply them to create a more private and secure future. Visit us at biggerinsights.com to request a consultation or read our blog. Please consider making a non-deductible contribution to help us break through Big Tech suppression and keep this podcast going. OpenAlias: contribute.biggerinsights.com. Monero (XMR), Bitcoin (BTC), and Litecoin (LTC) addresses at biggerinsights.com/support-us.

LastPass Hacks – Lessons and What to Do Read More »

Scroll to Top