What Do Hackers Do With Your Data? What Is PII?

Поделиться
HTML-код
  • Опубликовано: 30 окт 2024

Комментарии •

  • @BeckyStern
    @BeckyStern 8 месяцев назад +13

    Amen! Thanks for making this video, it's a great thing to send to folks to back up my plea to use a password manager.

  • @MrEric377
    @MrEric377 8 месяцев назад +4

    Great video. I think whenever my friends or family ask why I do certain things, I am going to send them a link to this video.

    • @ShannonMorse
      @ShannonMorse  8 месяцев назад

      Go for it! Privacy is important!

    • @wrighty6631
      @wrighty6631 8 месяцев назад

      @@ShannonMorseon pc I need to input a pin when using my yubikeys do you now how the pin can be changed as I’ve not got pin required on the security keys themselves just seems to be required when using windows

  • @brickerhaus
    @brickerhaus 8 месяцев назад +4

    I like the idea of having multiple email accounts. I learned this early on as I acquired accounts from every service that pop up. I started only giving certain email for certain things. It has served me well. But they become a nasty chain of recovery email if you are not careful. And these recovery chains have been used to exploit people. Especially with those pesky security questions. And those security questions are asked to your friends in things like quizzes like "How well do you know your friend." It just social engineering and sadly most people fall for it. Another reason why I make up my own answers. Always have. Those answers have been part of website leaks since the beginning. Which is why I change those answers too. Good video Shannon.

    • @ShannonMorse
      @ShannonMorse  8 месяцев назад +1

      All of mine are randomly generated answers. I don't even know the answers to my security questions.

    • @word42069
      @word42069 8 месяцев назад

      @@ShannonMorseSolid tips as usual! Quick question.. I find it hard to keep track of passwords, pins, security question answers, etc. but I’m weary of putting some information on password managers… but at the same time physical password journals have their own inherent flaws… any advice on how to organize and secure all this data but not necessary have it on on a cloud service? I recently looked at the digital password managers that are like calculators and don’t connect to the internet.. but idk if they’re reliable. I feel like there’s a gap in the market for a more advanced piece of tech.

    • @brickerhaus
      @brickerhaus 8 месяцев назад

      @@ShannonMorse What do you use to create the random generated answers?

    • @ShannonMorse
      @ShannonMorse  8 месяцев назад +2

      I use a password managers password generation tool!

    • @ShannonMorse
      @ShannonMorse  8 месяцев назад +3

      I don't know if this will work for everyone but you could use more than one password manager 😜 store passwords in one and backup codes in the other.

  • @xxraverxxonxtacy
    @xxraverxxonxtacy 8 месяцев назад +2

    Awesome Vid Shannon, what are your thoughts on Google always asking in email for your Birthday to Comply with the "Law'?

  • @LionRoars918
    @LionRoars918 8 месяцев назад +3

    Why I love my Yubikey

  • @jeffhale1189
    @jeffhale1189 8 месяцев назад

    Thanks for sharing. I enjoyed the information. Blessings on your day.

  • @BosleyBeats
    @BosleyBeats 8 месяцев назад +2

    Stahp with that sick Hyrule college shirt 😭😭😭😭😭😭😭

  • @MrRObot-bin
    @MrRObot-bin 8 месяцев назад

    Hey its Snubs, great to see you again.

  • @tedrodriguez3856
    @tedrodriguez3856 3 месяца назад +1

    I have blocked a number and text message on my Android phone, they are able to use bypass My block? How are they doing this?

  • @edtamakloe5875
    @edtamakloe5875 8 месяцев назад

    What are the best linux distributions to use for aspiring Cybersecurity enthusiasts. Should it be Kali, Qubes, TAILS or Pure OS.

    • @olympiawa
      @olympiawa 4 месяца назад

      It depends on the intention. If you are using Qubes, you are doing so because of a concern for security and getting an application or OS compromised. This way, you can just throw it away and start over from a template. Tails has a bit of a different use case. You are funnelling your traffic through the Tor network and thus, you are trying to protect against having your traffic identified. Whonix would have a similar purpose. Kali has a different use case from those three. You wouldn't be using Kali as your daily driver. Kali is great for the fact it has a bunch of tools prebaked into the OS. I wouldn't install Kali directly on hardware. It makes most sense to run it in a VM. A few things to note, you could run Qubes and run all these OS's as Qubes. You can also run Qubes through the Tor network. Tails also is more so designed to be used as a live USB. Each session is meant to be destroyed after use so that you don't leave behind evidence of whatever it was you were doing. Qubes has disposable VMs though that you can funnel through the Tor network as well. I imagine you have most of this information through but I thought I would continue the conversation surrounding OS's. Also, this is a very basic description and I didn't touch on everything.

  • @kolz4ever1980
    @kolz4ever1980 7 месяцев назад

    Lol exactly why I don't use free wifi outside ever. I'll just get a bigger data plan if needed. Simple avoidance.

  • @spikeevans1488
    @spikeevans1488 8 месяцев назад +1

    ublock blocked me from using your link to deleteme because of loading a pafe from : Peter Lowe’s Ad and tracking server list

    • @ShannonMorse
      @ShannonMorse  8 месяцев назад +1

      Yes, it's an affiliate link, so I get credit whenever people use it. You can use the coupon code without hitting the link though.

  • @aquahoodjd
    @aquahoodjd 8 месяцев назад

    You're right but we need to make a Rubik's cube on steroids

  • @janokartal5690
    @janokartal5690 8 месяцев назад

    Shannon 👍

  • @0xVeniVidiVici
    @0xVeniVidiVici 8 месяцев назад

    Hi Shannon. Good advice in the video. Just curious but have you ever actually seen the dark web?

    • @ShannonMorse
      @ShannonMorse  8 месяцев назад +1

      I HAD to in order to fully understand some videos I've written. I have no general need to visit the dark web so on a day to day basis, no, I use consumer browsers.

  • @DrXJ
    @DrXJ 4 месяца назад

  • @davidparker2173
    @davidparker2173 5 месяцев назад

    Well, I am learning, even though you go kinda fast for me. I really have to harden my entire online purview. What really disgusts me is human behavior with dishonor being so ubiquitous, and running free. Being human though includes me too. Could full scale nuclear war be a solution? There would still be a remnant, and we would inevitably return, so maybe not. The real complexity exists within human nature, and could be the only real correction, but obviously, that is all of which we know very little. Sometimes your hair colors work better than other times. I am sure you have your admirers. Peace.

  • @NotMolly-jf2rh
    @NotMolly-jf2rh 8 месяцев назад

    🌹

  • @MrSandshadow
    @MrSandshadow 8 месяцев назад

    Is it me, or does it feel like the vid was cut short?

    • @ShannonMorse
      @ShannonMorse  8 месяцев назад +2

      It was on purpose. So you watched the full video?

  • @Belkacemnotafraid
    @Belkacemnotafraid 8 месяцев назад

    they can hack you too dont worry and dont be samrt any one can hack you even you are profetional or hacker