User Tag List

First 1234 Last

Results 11 to 20 of 62

  1. #11
    Analytical Dreamer Coriolis's Avatar
    Join Date
    Apr 2010
    MBTI
    INTJ
    Enneagram
    5w6 sp/sx
    Posts
    17,011

    Default

    Quote Originally Posted by Qlip View Post
    My home computer is Linux (Mint), but I also needed a solution that included work (Mac) and mobile (Android). I have never used any other password managers, besides password protected text and my own insufficient password scheme, this has been a long time coming. I can't really say much as I just started using it, but one really great plus is that it is multi-platform. I am keeping the encrypted database on a usb drive on my keychain, it has a micro-usb connector as well as standard so I can plug it into my phone. Also, I put keepass binaries on the drive for Mac and Windows just in case I have to use it on a strange computer without a connection. The program itself seems pretty straightforward, store a username/notes/url, generate a password in an encrypted database, I have yet to explore its other features, which from what I understand includes ways to expedite cutting and pasting passwords into websites. I intend to let Chrome remember website passwords, unless I feel like it's an unnecessary risk.

    Are you using anything right now for password management?
    So your passwords are only on your encrypted flash drive, then, and nowhere online?

    Right now I use old fashioned methods. Passwords I need only at work are in a password protected file on my computer. Our work systems/network are fairly secure, and someone would have to know what to look for even to find the right file. For the rest of it, I use a paper list. It's not hard to keep memorized the 10 or so passwords I use often; the rest I look up when needed.

    I have been hearing alot about password managers and know a few people IRL who use them. It seems to have its own risks, though, namely if someone hacks that one master password, they get everything. Now, if someone hacks one of my passwords, they can access only that one account.
    I've been called a criminal, a terrorist, and a threat to the known universe. But everything you were told is a lie. The truth is, they've taken our freedom, our home, and our future. The time has come for all humanity to take a stand...

  2. #12
    Administrator highlander's Avatar
    Join Date
    Dec 2009
    MBTI
    INTJ
    Enneagram
    6w5 sx/sp
    Socionics
    ILI Ni
    Posts
    17,289

    Default

    Quote Originally Posted by Coriolis View Post
    So your passwords are only on your encrypted flash drive, then, and nowhere online? Right now I use old fashioned methods. Passwords I need only at work are in a password protected file on my computer. Our work systems/network are fairly secure, and someone would have to know what to look for even to find the right file. For the rest of it, I use a paper list. It's not hard to keep memorized the 10 or so passwords I use often; the rest I look up when needed. I have been hearing alot about password managers and know a few people IRL who use them. It seems to have its own risks, though, namely if someone hacks that one master password, they get everything. Now, if someone hacks one of my passwords, they can access only that one account.
    Do you have any reason to believe your computer is more secure than a database at cloud security provider encrypted with a password that only you know? If you reuse passwords they are only as secure as the most poorly secured computer you use that password on.

  3. #13
    ציפור Julius_Van_Der_Beak's Avatar
    Join Date
    Jul 2008
    MBTI
    CROW
    Enneagram
    5w6 sp/so
    Socionics
    LII None
    Posts
    8,763

    Default

    I bought a booklet and have all my passwords written in the booklet.
    I looked out this morning and the sun was gone
    Turned on some music to start my day
    I lost myself in a familiar song
    I closed my eyes and I slipped away


    Visit my Johari: http://kevan.org/johari?name=Birddude78
    Likes Starry, Fate liked this post

  4. #14
    Analytical Dreamer Coriolis's Avatar
    Join Date
    Apr 2010
    MBTI
    INTJ
    Enneagram
    5w6 sp/sx
    Posts
    17,011

    Default

    Quote Originally Posted by highlander View Post
    Do you have any reason to believe your computer is more secure than a database at cloud security provider encrypted with a password that only you know? If you reuse passwords they are only as secure as the most poorly secured computer you use that password on.
    As I have mentioned several times in various places, I do not reuse passwords, nor do I keep them on my personal computer. The computer at my office where I keep work-related passwords is not connected to the internet in any way. I certainly do trust this over some cloud database over which neither I nor my organization have any physical control.* If someone did manage to get through my workplace physical security to my actual computer, I'm not sure how they would even identify my password file to try breaking the password on it. It's not like the filename is "passwords".

    * In general, I don't trust a cloud DB further than I can throw it. Perhaps I place too much emphasis on physical security, but IME if someone has access to the hardware and lots of time, I wonder what they would NOT be able to do.
    I've been called a criminal, a terrorist, and a threat to the known universe. But everything you were told is a lie. The truth is, they've taken our freedom, our home, and our future. The time has come for all humanity to take a stand...
    Likes SpankyMcFly, Floki liked this post

  5. #15

    Default

    Quote Originally Posted by labyrinthine View Post
    Excellent thread @Listening. I plan to go over those links carefully.

    I have a question for anyone skilled at technology @Coriolis @Totenkindly and @highlander come to mind.

    To what extent can people hack into mobile phones? I had a friend who was assaulted by someone who was impersonating a friend through text messaging. What I don't know is if he physically had the phone. He works for a security company, so has some tech background, and I was looking online and found you can get set up to text message from a landline on sites like this:
    Text-enable Your Business Phone Number with TextBox

    I'm wondering if a person could set up other phone lines to text from their computer, and if they can, would they also be able to read texts from remote phones? My friend and I do text message, so I just got a nervous feeling about whether or not those conversations could be hacked into and viewed remotely.
    Yes, mobile phones are very vulnerable. It is the number one concern for companies in terms of their security vulnerabilities. If you have the money you can for over like $1500-$3500 for a cryptophone that will protect your system if you are in a vulnerable position (think intelligence agency, working in corporate upper mid tier and above, politics, etc). If not you probably will not be attacked by persons skilled enough to pull off something too crazy so just downloading an app to encrypt your phone should be enough. There is some opensource code out there from some of the cryptocompanies available on the internet for free, but the problem is that it is only for certain phone models.
    Accept the things to which fate binds you, and love the people with whom fate brings you together, but do so with all your heart.

    Meet Richard P. Feynman
    Likes labyrinthine liked this post

  6. #16
    Analytical Dreamer Coriolis's Avatar
    Join Date
    Apr 2010
    MBTI
    INTJ
    Enneagram
    5w6 sp/sx
    Posts
    17,011

    Default

    Quote Originally Posted by Listening View Post
    Yes, mobile phones are very vulnerable. It is the number one concern for companies in terms of their security vulnerabilities. If you have the money you can for over like $1500-$3500 for a cryptophone that will protect your system if you are in a vulnerable position (think intelligence agency, working in corporate upper mid tier and above, politics, etc). If not you probably will not be attacked by persons skilled enough to pull off something too crazy so just downloading an app to encrypt your phone should be enough. There is some opensource code out there from some of the cryptocompanies available on the internet for free, but the problem is that it is only for certain phone models.
    Any recommendations, or personal experiences with these SW?
    I've been called a criminal, a terrorist, and a threat to the known universe. But everything you were told is a lie. The truth is, they've taken our freedom, our home, and our future. The time has come for all humanity to take a stand...
    Likes labyrinthine liked this post

  7. #17
    Post Human Post Qlip's Avatar
    Join Date
    Jul 2010
    MBTI
    ENFP
    Enneagram
    4w5 sp/sx
    Posts
    9,245

    Default

    Quote Originally Posted by Coriolis View Post
    So your passwords are only on your encrypted flash drive, then, and nowhere online?

    Right now I use old fashioned methods. Passwords I need only at work are in a password protected file on my computer. Our work systems/network are fairly secure, and someone would have to know what to look for even to find the right file. For the rest of it, I use a paper list. It's not hard to keep memorized the 10 or so passwords I use often; the rest I look up when needed.

    I have been hearing alot about password managers and know a few people IRL who use them. It seems to have its own risks, though, namely if someone hacks that one master password, they get everything. Now, if someone hacks one of my passwords, they can access only that one account.
    They're not online, but they will be soon as backup. I'd say the security risk is pretty equal, but my setup is more accessible. My master password is a long obscure passphrase, a whole sentence and not written down anywhere, for somebody to 'hack' it, they'd have to have a keylogger or a camera trained on me, which means physical access. That's about the same risk as finding your book or keylogging your passwords.

  8. #18
    darkened dreams labyrinthine's Avatar
    Join Date
    Apr 2007
    MBTI
    isfp
    Enneagram
    4w5 sp/sx
    Posts
    8,421

    Default

    Quote Originally Posted by Listening View Post
    Yes, mobile phones are very vulnerable. It is the number one concern for companies in terms of their security vulnerabilities. If you have the money you can for over like $1500-$3500 for a cryptophone that will protect your system if you are in a vulnerable position (think intelligence agency, working in corporate upper mid tier and above, politics, etc). If not you probably will not be attacked by persons skilled enough to pull off something too crazy so just downloading an app to encrypt your phone should be enough. There is some opensource code out there from some of the cryptocompanies available on the internet for free, but the problem is that it is only for certain phone models.
    This may be a naive question, but is there safety in something simple like having a second tracfone with a number you don't share with many people? Even though it could be easily hacked, at least someone with a specific intention towards a specific person may not find the number? I'm assuming the phone and minutes could be purchased with cash at Walmart or something?
    Step into my metaphysical room of mirrors.
    Fear of reality creates myopic morality
    So I guess it means there is trouble until the robins come
    (from Blue Velvet)


  9. #19
    Level 8 Propaganda Bot SpankyMcFly's Avatar
    Join Date
    Nov 2009
    MBTI
    INFJ
    Enneagram
    461 so/sx
    Posts
    2,332

    Default

    As a security measure I use DeepFreeze by Faronics. Your only vulnerability is real time. Soon as you reboot though, poof, buh bye. Instant Restore Software for Windows PCs, Mac and Servers | Deep Freeze

    Nothing sticks, at all. Malware, viruses, aware etc absolutely nothing.

    There was this one time where I got hacked real time and 'he' remotely took over my computer. Launched a ton of hack ware at me and started browsing my c drive right in front of me. Locked my mouse too. Hit the restart button. Buh bye. Ran several sweeps/scans and nothing. I got paranoid though and shredded and did a fresh reinstall, just in case.




    "Deep Freeze is a kernel-level driver that protects hard drive integrity by redirecting information being written to the hard drive or partition, leaving the original data intact. This redirected information is no longer referenced once the computer is restarted, thus restoring the system to its original state at the disk sector level. This allows users to make 'virtual' changes to the system, giving them the appearance that they can modify core files or even delete them, and even make the system unusable to themselves, but upon reboot the originally configured 'frozen' state of the operating system is restored."

    Deep Freeze (software) - Wikipedia, the free encyclopedia
    "The most merciful thing in the world, I think, is the inability of the human mind to correlate all its contents... Some day the piecing together of dissociated knowledge will open up such terrifying vistas of reality, and of our frightful position therein, that we shall either go mad from the revelation or flee from the light into the peace and safety of a new Dark Age. " - H.P. Lovecraft

  10. #20
    Rainy Day Woman MDP2525's Avatar
    Join Date
    Oct 2008
    MBTI
    ISTP
    Enneagram
    6w5 sx/sp
    Posts
    5,499

    Default

    ~luck favors the ready~


    Shameless Self-Promotion:MDP2525's Den and the Start of Motorcycle Maintenance

Similar Threads

  1. [Other] Missunderstood and other things.
    By lorkan in forum Myers-Briggs and Jungian Cognitive Functions
    Replies: 7
    Last Post: 03-18-2015, 06:40 AM
  2. Hacking & Security
    By meowington in forum Science, Technology, and Future Tech
    Replies: 15
    Last Post: 04-17-2014, 12:57 PM
  3. Paleo Diet 4 Week Meal Plan + Recipes & Other Resources...
    By Halla74 in forum Health and Fitness
    Replies: 0
    Last Post: 02-02-2014, 11:58 AM
  4. [Other] severe anxiety over other's perceptions?
    By pinkteabag in forum The NF Idyllic (ENFP, INFP, ENFJ, INFJ)
    Replies: 0
    Last Post: 01-30-2011, 10:51 AM
  5. [Other] Craigslist (and other) ads?
    By INTPness in forum The NF Idyllic (ENFP, INFP, ENFJ, INFJ)
    Replies: 0
    Last Post: 11-28-2009, 07:46 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
Single Sign On provided by vBSSO