Jehu Security
Jehu Security
  • Видео 10
  • Просмотров 113 315
Security Fundamentals: Passwords and Phrases
Strong passwords are hard. They're hard to create, hard to remember, and hard to manage on your own. However, the alternative of creating simple passwords can be detrimental to your security. This video will take a look at passwords and offer essential recommendations you can apply today.
NIST Password Guidelines:
auth0.com/blog/dont-pass-on-the-new-nist-password-guidelines/?utmsource=pocketsaves
Strong Passwords... (CNET):
www.cnet.com/tech/services-and-software/strong-passwords-arent-as-easy-as-adding-123-heres-what-researchers-say-helps/?utmsource=pocketsaves
The Record Article:
therecord.media/attackers-dont-bother-brute-forcing-long-passwords-microsoft-engineer-says/?
Timestamp Chapters:
00:...
Просмотров: 169

Видео

Getting Started With: Cryptee
Просмотров 2,5 тыс.2 года назад
Cryptee is an encrypted writing tool and photo storage application. It has an excellent document editor with great features, and it's all done behind a secure progressive web application. This means there are no apps to download from an app store and no waiting for security updates to go through an approval pipeline. It has a clean, minimalist image while retaining a broad array of features. Th...
Security Fundamentals: Threat Modeling
Просмотров 4512 года назад
Threat modeling is a useful tool for examining your life with the purpose of determining threats and vulnerabilities with the aim of protecting against them. “A way of thinking about the sorts of protection you want for your data so that you can decide which potential threats you are going to take seriously.” ~EFF Timestamp Chapters: 00:00 Intro 00:56 What is Threat Modeling? 05:57 Steps to Thr...
Getting Started With: Tutanota
Просмотров 10 тыс.3 года назад
Tutanota is one of the more secure and private Email providers available. It offers incredible encryption, goes above and beyond to respect user privacy, is open source, and has a really clean interface in its mobile and desktop apps. Tutanota offers a generous 1GB of storage on their free accounts, and has reasonably priced paid accounts. Arguably one of the best Email providers that we have u...
Getting Started With: ProtonMail
Просмотров 24 тыс.3 года назад
ProtonMail is one of the most reputable and innovating secure and private Email services available. It offers a solid free tier, and several outstanding paid tiers depending on your needs. The support PGP, forward-secrecy, zero-access, and very strong encryption options, including a way to encrypt messages outside of their system of servers. If you’re using another “free” Email service like Gma...
Getting Started With: 1Password
Просмотров 19 тыс.3 года назад
1Password is one of the older and more respected password managers available, and possesses many strong features. It maintains End-To-End encryption, zero knowledge practices, and applies encryption while in use and at rest. It offers Two-Factor Authentication (2FA), which helps prevent account takeover. It is for these reasons that we recommend this app. 1Password: 1password.com/ 1Password Pas...
Getting Started With: NordPass
Просмотров 14 тыс.3 года назад
NordPass is a new addition to the password manager scene, but draws on the success and security the company developed in earlier products like NordVPN. It maintains End-To-End encryption, zero knowledge practices, and applies encryption while in use and at rest. It offers Two-Factor Authentication (2FA), which helps prevent account takeover. It is for these reasons that we recommend this app. N...
Getting Started With: Wickr Me
Просмотров 42 тыс.3 года назад
Wickr Me is an encrypted messaging app that really shines in terms of its privacy features. Although this app may take a little more getting use to because of its layout, it is a great option for secure communication. This app may be more appropriate for those with much higher privacy considerations, as other apps like Signal have the same level of outstanding encryption but with a slightly mor...
Getting Started With: Signal
Просмотров 9913 года назад
Signal is a private messaging app with incredible end-to-end encryption (E2EE). No product can claim to be perfect. This app does offer potentially the best security and privacy for communication for everyday use. In this video we show you how to install Signal, get started with account creation, and explore a few of the many great features. Signal: www.signal.org/#signal Signal Private Contact...
Welcome to Jehu Security
Просмотров 1323 года назад
A brief introduction to our channel and to the Jehu Security goals for future videos. Internet Advancement Articles: Farming - www.iotforall.com/smart-farming-future-of-agriculture Medicine - healthtechmagazine.net/article/2020/01/how-internet-medical-things-impacting-healthcare-perfcon Banking - www.gobankingrates.com/banking/technology/new-banking-technology/ Knitting - www.theguardian.com/me...

Комментарии

  • @SinenBazian
    @SinenBazian 2 месяца назад

    i cant recieve any emails using my proton mailbox

  • @ThaLintons
    @ThaLintons 3 месяца назад

    You stop making videos?

  • @wtopp345985
    @wtopp345985 3 месяца назад

    I'm familiar with RoboForm, it is similar. I'm trying to find a difference.

  • @stevejarvis186
    @stevejarvis186 3 месяца назад

    BUT do Proton Mail really off a FREE service. I looked at this video and a couple of others and because you said they offerred a FREE email service I signed up. They also say on their website that they offer a FREE email service, and I signed up around 2 weeks ago but two days ago got an email from them saying I`d only gotten a few days left of my trial period? I`ve written them an email querying this but no response as yet.

  • @leifhenningoliversen1663
    @leifhenningoliversen1663 6 месяцев назад

    Good vid, love Cryptee

  • @godschild917
    @godschild917 8 месяцев назад

    Excellent video!!

  • @andrew-xr1de
    @andrew-xr1de Год назад

    OMG, it's way too complicated....stop! I am half way through and your still on the phone???

  • @kathleensteeves488
    @kathleensteeves488 Год назад

    I’m not receiving…..???

  • @Livingtheglobe
    @Livingtheglobe Год назад

    You should have added "For Mobile" in title

  • @zish3655
    @zish3655 Год назад

    Is it possible to have timestamps for individual messages?

  • @deusvult539
    @deusvult539 Год назад

    You seem to have a good knowledge of Proton but please help with this problem I clicked "Forgotten Password" and to complete the procedure had to recall "last known password used". I could not do so and now my complete encrypted account is unreadable in that it stays encrypted so I have now a situation in which I can use Proton only as a normal conventional email system e.g. Google, outlook, AOL, etc. Proton Support won't assist even although I have told them the new password that I have - I still don't have "last password used". What options do I have?

  • @truecarcosa
    @truecarcosa Год назад

    Good explanation video, but i didn`t understand, why you post this video in 360p max 😂

    • @jehusecurity
      @jehusecurity Год назад

      Hi, thank you for watching! Sadly, we got so busy for a while there and didn’t release videos at a steady pace. So it seems like the YT algorithm downscaled our videos. We’re planning a release schedule to add more frequent videos moving forward, so hopefully this will be fixed moving forward.

  • @dna2gether
    @dna2gether Год назад

    How do I make NordPass my primary option? I’m EXITING lastpass I’m so DONE with having my passwords and data stolen! I have Apple iPad & iPhone. I paid off my phone now looking to do away with Apple and ATT forever! I will not allow tracking, or blocking what I want to log into

    • @jehusecurity
      @jehusecurity Год назад

      Debi, thank you for watching and congratulations on deciding to improve your security! On iOS/iPad devices go to Settings > Passwords > Password Options. First, make sure that “AutoFill Passwords” is enabled (slider is green, not gray). Second, under “Allow Filling From:” make sure that NordPass is enabled. Finally, if you only want to use NordPass (this is recommended) then make sure to deselect the other options such as iCloud Keychain, so that your preferred password manager is the only one being used on the device. This last step to keep it clean and to not accidentally save a password in iCloud if you want it in NordPass. Hope this helps!

  • @dna2gether
    @dna2gether Год назад

    Jehu Security… I LOVE THE NAME 😊

  • @marywoods3276
    @marywoods3276 Год назад

    I lost my old password number because I haven’t used it in about 10 to 15 years. I need to know how to say get a new Social Security number password. 1:43

    • @jehusecurity
      @jehusecurity Год назад

      Hi Mary, thanks for watching our video! In most cases each website has a specific method to reset a password. For something sensitive like government services, this will likely involved a greater degree of proving identity and not simply emailing a reset code to the email on file.

  • @marywoods3276
    @marywoods3276 Год назад

    I need a new one 0:45

  • @gunnardegard1154
    @gunnardegard1154 Год назад

    Thank you soo much. I really needed this.. I have fucked up this app 3 times now because of the settings

    • @jehusecurity
      @jehusecurity Год назад

      Thank you for the comment and glad this helped! Hopefully you have it set up now and ready to use.

  • @Yfrismael
    @Yfrismael Год назад

    POV: you're a pedophile

  • @bartholomewhorrocks3750
    @bartholomewhorrocks3750 Год назад

    p͓̽r͓̽o͓̽m͓̽o͓̽s͓̽m͓̽ ☺️

  • @sushantpatil2975
    @sushantpatil2975 Год назад

    Make a video on dashlane

  • @ninemoons9336
    @ninemoons9336 Год назад

    Where do I go to resume my import to avoid cancelation?

  • @DEWorDEWnot
    @DEWorDEWnot Год назад

    Miserable to watch. you went thru way to fast making it difficult to even freeze the frame to see what you are talking about.

  • @jamesfreeman2258
    @jamesfreeman2258 Год назад

    I'm a complete novice, and watched cause I'm interested in the product. The posts I read seem more knowledgeable than me. However, tge only thing I can say is thanks for the information. Also, can you slow down your information on the different fields on the proton app? It was for me way too fast to absorb.

    • @jehusecurity
      @jehusecurity Год назад

      Thank you for the feedback! We will absolutely make an effort to produce better quality and more user-friendly videos for our next tutorials and guides.

  • @7thebill
    @7thebill Год назад

    I really wish there was videos such as this for most of what we do online, explaining every step, what to expect and explaining the settings.

  • @Flat_Earth_Addy
    @Flat_Earth_Addy Год назад

    Protonmail is the WORST email service!..

    • @jehusecurity
      @jehusecurity Год назад

      Lucy, it’s unfortunate you feel this way or had a bad experience. We have nothing but a great experience for years.

    • @Flat_Earth_Addy
      @Flat_Earth_Addy Год назад

      @@jehusecurity Well you're lucky then. But I'm not alone. Thousands of people have had their lives ruined byProtonMail. Sure, the CIA spies on me through Gmail. But they never caused me any problems!

    • @deusvult539
      @deusvult539 Год назад

      @@jehusecurity Ok for you, Jehu. You are a professional IT geek. Most of us are not.

  • @ivanpeterjameswavell3490
    @ivanpeterjameswavell3490 Год назад

    I was a member of Proton until June the 1st last year when it's suddenly no longer work because I have done nothing wrong only told the truth about 90 domination after watching hunting Hitler on Sky history 2 and I would like to go back

  • @tincanboat
    @tincanboat Год назад

    it is out of focus

  • @user-kg7qu8th7c
    @user-kg7qu8th7c 2 года назад

    it always tells me that i cannot send or receive emails and i first need to write an email to a specific support adress. But then again i cannot send this mail because its blocked. What can i do to fix this?

  • @chepebeto3876
    @chepebeto3876 2 года назад

    Could you please tell us how to use it? Everytime I try to it requests a code but I don’t know what to do with it.

  • @sonnelighting3565
    @sonnelighting3565 2 года назад

    Thank you.

  • @HEADBANGRR
    @HEADBANGRR 2 года назад

    Hello Can outlook express be used with tutanota? Thanx

    • @jehusecurity
      @jehusecurity 2 года назад

      Hello Headbangrr, thanks for watching our video! No, Tutanota cannot be integrated into a mailbox app like Outlook, Mail, or Thunderbird. They do have their own mobile and desktop app that works and looks well. Largely it seems like they restrict this because they want more control over how messages are encrypted/decrypted on the device for enhanced security. Proton Mail does have a way of supporting this through a bridge application for desktop/laptop. So, if being able to have all your mail in Outlook is important for you then you might consider that. Otherwise Tutanota is a great choice.

    • @HEADBANGRR
      @HEADBANGRR 2 года назад

      @@jehusecurity okay thanks

  • @dekkers2000
    @dekkers2000 2 года назад

    How do they do to finance and pay the servers? Donations maybe..? Because is not cheap keep all servers and pay salaries..

    • @jehusecurity
      @jehusecurity 2 года назад

      Mario, Thank you for watching our video. That’s exactly the right question! They run Wickr Me off the same platform that they run their enterprise solution Wickr Pro platform on, so the increase of demand is a minimal impact for this free version. Last year, after this video, Wickr was bought by Amazon. We have considered making a follow up video to this, since that may change the threat model necessary for this particular product. We may still do that, but are trying to assess when there’s a real change in the core encryption or message handling code. To be transparent, there has been no obvious signs that Wickr Me’s security or privacy has been compromised or impacted. Amazon seems most interested in adding a secure enterprise communication platform to their offering through Wickr Pro. However, this acquisition is something to take into account when determining if this product is right for your needs. Something like Threema may be a better alternative.

  • @xdfaceondabeat931
    @xdfaceondabeat931 2 года назад

    I'm on android and cannot find any user by looking up their name

    • @jehusecurity
      @jehusecurity 2 года назад

      Da Beast, while we can’t speak to every case we would make sure you’re searching by username and not only your contact names. This usually requires that you know the username of the individual you’re trying to communicate with. This does make Wickr Me more challenging as a primary messaging app, since users are not required to register a phone number or email. However, it may still work well for some use cases where anonymity is more desirable.

  • @moonlightfitz
    @moonlightfitz 2 года назад

    It is possible to share docs?

    • @jehusecurity
      @jehusecurity 2 года назад

      Moonlight, thank you for watching our video. Yes, you can either share an encrypted Cryptee document with someone who has the app (they can create a free account) or you can export to pdf, Word or markdown format and share from there, all within the app.

  • @vwy9892
    @vwy9892 2 года назад

    What happens if I pay for it, then create aliases and stop paying for it in the future? Will my aliases be deleted or something?

    • @jehusecurity
      @jehusecurity 2 года назад

      Vwy, thanks for watching the video. If you have a paid account, or have at any time in that account’s history, then nothing happens. Proton has stated that accounts that have ever been paid, even if they are subsequently downgraded to free, are exempt from inactivation. However, if it is a free account (and always has been) then after 12 months they only reserve the right to inactivate it and/or delete all data. It sounds like they lean towards more leniency here rather than strictly locking and deleting accounts.

  • @thaboshikwambane5578
    @thaboshikwambane5578 2 года назад

    Finding a username is a mission. Even if you type random gibberish, it says,"Email address is not available".. Really sucky user experience

    • @jehusecurity
      @jehusecurity 2 года назад

      Thabo, thanks for watch the video. Yes, the fact that Tutanota doesn’t recycle usernames is something that we considered as having an impact later on. We’re sure they did, too. For now, there are multiple domain options to choose from besides the obvious (at)tutanota[dot]com. We imagine they’ll add more over time. The whole reason for this is to prevent personal data leak or account take over/recovery from using abandoned email addresses tied to accounts. Generally, we find this to be a good thing even if it makes the signup process more… challenging.

  • @yeetyeet7070
    @yeetyeet7070 2 года назад

    Screen: "Tutao" Video: "Tutanota"

  • @roshanhegde
    @roshanhegde 2 года назад

    Great video... Love cryptee ❤️

    • @jehusecurity
      @jehusecurity 2 года назад

      Roshan Hegde, we’re glad that you like our video! We love Cryptee, too. It’s a phenomenal document editor and photo storage solution. If you don’t know, they just made some amazing updates to saving and the way they handle photos.

  • @astupidmonkeyygaming544
    @astupidmonkeyygaming544 2 года назад

    Another wonderful video! Loved how the information was presented and very easy to understand. Thank you!

    • @jehusecurity
      @jehusecurity 2 года назад

      Monkeyy Gaming, thank you for another friendly comment. Stay tuned as we continue into our “Security Fundamentals” topics over the next few weeks.

  • @Donrik_30
    @Donrik_30 2 года назад

    Thanks bro

    • @jehusecurity
      @jehusecurity 2 года назад

      Topper Worship, our pleasure! We hope it was helpful.

  • @malicerising5569
    @malicerising5569 2 года назад

    shit i paid for this, i thought it was nord vpn

    • @jehusecurity
      @jehusecurity 2 года назад

      Malice Rising, it’s certainly unfortunate to purchase the wrong product. However, if you choose to keep it, Nord Pass is a fine way to store and use unique passwords for all your accounts.

  • @astupidmonkeyygaming544
    @astupidmonkeyygaming544 2 года назад

    Really well done! Would Threat Modeling work against Data Collection from Corporations like Facebook, Google and other large markets that make money from taking your data and search history for profit? You named a few that could prevent from taking it, like family, government and even rival businesses but what about businesses that aren't rivals? Fantastic video and great reasoning plus insight, on the cost of not using Threat Modeling.

    • @jehusecurity
      @jehusecurity 2 года назад

      AStupidMonkeyy Gaming, Great question! While we presented some examples in the video, there are any number of ways that threat modeling could be used for each situation. As we discussed, the most important thing is to understand the process of how to think about potential threats and have a framework to approach them. In the case you described it's important to understand what you are trying to protect. It could be the data you have in emails, on your social media, location, or purchase history. Determining the worst case risk here is challenging for some people because it can be hard to describe the impact that personal data has on your life or well-being. However, we would suggest that the aggregate loss or involuntary disclosure has a very deep impact. In your suggested concern, the bigger issue is how to address the risk. For Google or related companies, this might mean transitioning to more privacy focused services where possible. To be clear, Google is very secure but terrible with privacy. These two concepts are not the same, even though a lot of people discuss them as though they're interchangeable. One method of protecting your data is to thoroughly review the settings on these services and restrict as much information gathering as possible by "opting out" to anything you can. But realize that this sometimes only has minor effects. Another great defensive control is limiting the type of information you share with these services and the frequency of that information.

  • @BrainFester
    @BrainFester 2 года назад

    I enjoy your channel and look forward to each new video. I’d like to make a request. Can you do some security videos for phones and tablets? Example: Test Bitdefender on iPad, iPhone and Android phones. Thanks for your consideration.

    • @jehusecurity
      @jehusecurity 2 года назад

      Brian, We’re very glad you like our channel and content. We’ve taken down both of your recommendations and will come up with something soon. We’ve considered adding a playlist of “By Viewer Request”, or something to that effect. Stay safe!

  • @jerryarnold1999
    @jerryarnold1999 2 года назад

    Well explained, thank you for the video.

    • @jehusecurity
      @jehusecurity 2 года назад

      Jerry, thank you for watching our video.

  • @BrainFester
    @BrainFester 2 года назад

    Are you avoiding using your Apple device as a password manager on purpose? In other words, do you not trust your iCloud Keychain?

    • @jehusecurity
      @jehusecurity 2 года назад

      Brian, the most basic reason we avoid Apple KayChain in our videos is to demonstrate the other password managers and to prevent duplicate entries or software competition between two password managers (I.e., both trying to save a password). We also aim to offer advice that requires the least complexity to implement while providing the greatest security. Since many viewers may use devices across multiple operating systems, a unified approach typically is easier to stick with. That being said, Apple’s KeyChain is actually a very secure password manager and there’s nothing we’ve seen to indicate that there is great cause for concern. If an individual uses devices almost solely within the Apple ecosystem, then we would recommend KeyChain since it is highly secured with Apple’s Secure Enclave and the plain text passwords are not synced to iCloud. There is a new iCloud Password extension for Chrome-based browsers (Edge, Chrome, and our favorite Brave). This does allow a use with Apple phones and/or tablets to use KeyChain on Windows computers.

  • @BrainFester
    @BrainFester 2 года назад

    How does this app make money?

    • @jehusecurity
      @jehusecurity 2 года назад

      Brian, now THIS is a great question! We are remiss for not clarifying this in the video (although slightly out of scope for the video’s intended purpose). The source of revenue for any company providing a claim of privacy is extremely important. Signal survives on donations in almost all cases. This is either through direct donations through PayPal or cryptocurrencies, or indirect donations through Amazon Smile (it appears like they earn somewhere around $3-5k/mo from this). The exceptions are few, but most notably in 2018 Brian Acton (co-founder of WhatsApp) “invested” or “donated” (the exact distinction of what return would be expected, if any is unclear so it’s probably just a donation) $50 million to Signal after resigning due to privacy concerns with Facebook’s direction with his app after they bought it. Keep in mind that while they have a polished website and great app, this is the work of only a handful of people, and have a pretty decent group of volunteers offering help on their open source code.

  • @alanzweig8168
    @alanzweig8168 2 года назад

    When you use a mail client bridge like with Apple mail, do the emails you send go though the Proton mail servers when receiving mail from other email providers?

    • @jehusecurity
      @jehusecurity 2 года назад

      Alan, yes they do. Proton uses the bridge to connect their emails through their servers and Apple Mail (or other mail clients like Thunderbird) simply display the emails. As a note though, do keep in mind that an email from a third party (i.e. Gmail, Yahoo, or any other non-ProtonMail provider) will still pass through that service’s servers. Meaning, if someone sends you an email from an @gmail account their email and it’s contents will be seen by Google before being transferred to Proton’s servers. You can send an encrypted email to these addresses from your ProtonMail account, which will prevent the other servers from scanning the contents. This provides privacy and security at the expense of some convenience (that is, the recipient will have to click a link to an https website to open and read the email). They can then respond through this to again prevent snooping.

    • @alanzweig4799
      @alanzweig4799 2 года назад

      @@jehusecurity Thank you for the clear and comprehensive answer. If I am sending and receiving messages through the Proton Mail servers, even though my sender or recipient may be subject to privacy issues, my identity is not revealed? I understand the content of the email is vulnerable, but am I correct when I say my identity is still private?

    • @jehusecurity
      @jehusecurity 2 года назад

      @@alanzweig4799 It becomes a bit complicated, but at the core the answer could be that your identity is offered protection from being revealed. We don’t mean to speak in riddles, but the degree to which your identity is shielded would depend on a few details: 1) Does your ProtonMail email response give away your identity? (That might be if you have set your real name or a known sobriquet to the name field.) 2) How often have you emailed this person and could the contents of the emails revealed (or unmasked) your identity? (Such as referencing things, like accounts, that are clearly mapped to your real identity.) 3) Is it possible that your recipient knows your real identity and has saved your email as a contact tied to your real identity? (Google, Yahoo, and some others will have access to contacts saved in their users’ accounts and often in their devices, if the permissions are given.) 4) Do you send the emails encrypted, requiring them to enter a shared secret and access the email via a secure link? Depending on the answers to these questions (and some other matters) it could be that your identity is still protected. ProtonMail has among the highest thresholds for revealing account information, and it’s extremely unlikely that they would reveal it to any company or anyone who is not a Swiss legal authority even in those rare cases. Understand, though, that email is considered terribly open. Among other things, your IP address can be transmitted in the header of the email. If your threat model calls for discreet communication which protects your identity, then it may be better to seek other forms of communication. Signal, Wickr Me, and Threema are great options for full featured messengers. We have videos currently on the first two. Onion Chat is another possible way, but isn’t as feature rich or as intuitive for many. We do have plans to include videos for Threema and Onion Chat in the near future.

  • @davidm6287
    @davidm6287 2 года назад

    You’re the worlds slowest speaker.

  • @jhtuckwell
    @jhtuckwell 2 года назад

    I have an iphone 12 and a laptop on Windows 10. Which device is it best to set up my passwords and vaults? I assume I will have access on both devices after I download the app to both?

    • @jehusecurity
      @jehusecurity 2 года назад

      Hello James. For most users, setting up the password manager in either place should be safe. We might slightly lean towards conducting the initial account setup and vault creation on the iPhone, which does offer a more robust privacy environment. Keep in mind the vaults are actually created in the 1Password cloud unless you choose the local storage option. However, local storage would prevent syncing across devices and would likely not be best for most users as it would break much of the usability features for multi-device households. Once you have it setup, then install the app and/or browser extension anywhere you’d like and it will sync across the devices quickly. For most users, creating a new login on Windows in the vault is safe. We would recommend Brave or Firefox browsers for the best privacy and security. Generally, Brave may be more secure “out of the box” but Firefox is a stellar option, too.

  • @familygrant2900
    @familygrant2900 2 года назад

    how can i block another emailer on proton mail?

    • @jehusecurity
      @jehusecurity 2 года назад

      Family Grant, you can block email addresses (or even entire domains) from the web interface. There isn’t an option for this on the mobile, which we admit is odd. Go to Settings → Filters → Spam filters → Block List → Add. You can mark an email address as Spam from the mobile app which will still deliver the email address but send it directly to the spam folder, but this may not be desirable in certain cases. In those cases you would need to login on a browser and block the address.