@@ShannonMorseon pc I need to input a pin when using my yubikeys do you now how the pin can be changed as I’ve not got pin required on the security keys themselves just seems to be required when using windows
I like the idea of having multiple email accounts. I learned this early on as I acquired accounts from every service that pop up. I started only giving certain email for certain things. It has served me well. But they become a nasty chain of recovery email if you are not careful. And these recovery chains have been used to exploit people. Especially with those pesky security questions. And those security questions are asked to your friends in things like quizzes like "How well do you know your friend." It just social engineering and sadly most people fall for it. Another reason why I make up my own answers. Always have. Those answers have been part of website leaks since the beginning. Which is why I change those answers too. Good video Shannon.
@@ShannonMorseSolid tips as usual! Quick question.. I find it hard to keep track of passwords, pins, security question answers, etc. but I’m weary of putting some information on password managers… but at the same time physical password journals have their own inherent flaws… any advice on how to organize and secure all this data but not necessary have it on on a cloud service? I recently looked at the digital password managers that are like calculators and don’t connect to the internet.. but idk if they’re reliable. I feel like there’s a gap in the market for a more advanced piece of tech.
It depends on the intention. If you are using Qubes, you are doing so because of a concern for security and getting an application or OS compromised. This way, you can just throw it away and start over from a template. Tails has a bit of a different use case. You are funnelling your traffic through the Tor network and thus, you are trying to protect against having your traffic identified. Whonix would have a similar purpose. Kali has a different use case from those three. You wouldn't be using Kali as your daily driver. Kali is great for the fact it has a bunch of tools prebaked into the OS. I wouldn't install Kali directly on hardware. It makes most sense to run it in a VM. A few things to note, you could run Qubes and run all these OS's as Qubes. You can also run Qubes through the Tor network. Tails also is more so designed to be used as a live USB. Each session is meant to be destroyed after use so that you don't leave behind evidence of whatever it was you were doing. Qubes has disposable VMs though that you can funnel through the Tor network as well. I imagine you have most of this information through but I thought I would continue the conversation surrounding OS's. Also, this is a very basic description and I didn't touch on everything.
I HAD to in order to fully understand some videos I've written. I have no general need to visit the dark web so on a day to day basis, no, I use consumer browsers.
Well, I am learning, even though you go kinda fast for me. I really have to harden my entire online purview. What really disgusts me is human behavior with dishonor being so ubiquitous, and running free. Being human though includes me too. Could full scale nuclear war be a solution? There would still be a remnant, and we would inevitably return, so maybe not. The real complexity exists within human nature, and could be the only real correction, but obviously, that is all of which we know very little. Sometimes your hair colors work better than other times. I am sure you have your admirers. Peace.
Amen! Thanks for making this video, it's a great thing to send to folks to back up my plea to use a password manager.
Absolutely!
Great video. I think whenever my friends or family ask why I do certain things, I am going to send them a link to this video.
Go for it! Privacy is important!
@@ShannonMorseon pc I need to input a pin when using my yubikeys do you now how the pin can be changed as I’ve not got pin required on the security keys themselves just seems to be required when using windows
I like the idea of having multiple email accounts. I learned this early on as I acquired accounts from every service that pop up. I started only giving certain email for certain things. It has served me well. But they become a nasty chain of recovery email if you are not careful. And these recovery chains have been used to exploit people. Especially with those pesky security questions. And those security questions are asked to your friends in things like quizzes like "How well do you know your friend." It just social engineering and sadly most people fall for it. Another reason why I make up my own answers. Always have. Those answers have been part of website leaks since the beginning. Which is why I change those answers too. Good video Shannon.
All of mine are randomly generated answers. I don't even know the answers to my security questions.
@@ShannonMorseSolid tips as usual! Quick question.. I find it hard to keep track of passwords, pins, security question answers, etc. but I’m weary of putting some information on password managers… but at the same time physical password journals have their own inherent flaws… any advice on how to organize and secure all this data but not necessary have it on on a cloud service? I recently looked at the digital password managers that are like calculators and don’t connect to the internet.. but idk if they’re reliable. I feel like there’s a gap in the market for a more advanced piece of tech.
@@ShannonMorse What do you use to create the random generated answers?
I use a password managers password generation tool!
I don't know if this will work for everyone but you could use more than one password manager 😜 store passwords in one and backup codes in the other.
Awesome Vid Shannon, what are your thoughts on Google always asking in email for your Birthday to Comply with the "Law'?
Why I love my Yubikey
Thanks for sharing. I enjoyed the information. Blessings on your day.
Stahp with that sick Hyrule college shirt 😭😭😭😭😭😭😭
Hey its Snubs, great to see you again.
Hey, thanks
I have blocked a number and text message on my Android phone, they are able to use bypass My block? How are they doing this?
What are the best linux distributions to use for aspiring Cybersecurity enthusiasts. Should it be Kali, Qubes, TAILS or Pure OS.
It depends on the intention. If you are using Qubes, you are doing so because of a concern for security and getting an application or OS compromised. This way, you can just throw it away and start over from a template. Tails has a bit of a different use case. You are funnelling your traffic through the Tor network and thus, you are trying to protect against having your traffic identified. Whonix would have a similar purpose. Kali has a different use case from those three. You wouldn't be using Kali as your daily driver. Kali is great for the fact it has a bunch of tools prebaked into the OS. I wouldn't install Kali directly on hardware. It makes most sense to run it in a VM. A few things to note, you could run Qubes and run all these OS's as Qubes. You can also run Qubes through the Tor network. Tails also is more so designed to be used as a live USB. Each session is meant to be destroyed after use so that you don't leave behind evidence of whatever it was you were doing. Qubes has disposable VMs though that you can funnel through the Tor network as well. I imagine you have most of this information through but I thought I would continue the conversation surrounding OS's. Also, this is a very basic description and I didn't touch on everything.
Lol exactly why I don't use free wifi outside ever. I'll just get a bigger data plan if needed. Simple avoidance.
ublock blocked me from using your link to deleteme because of loading a pafe from : Peter Lowe’s Ad and tracking server list
Yes, it's an affiliate link, so I get credit whenever people use it. You can use the coupon code without hitting the link though.
You're right but we need to make a Rubik's cube on steroids
Shannon 👍
Hi Shannon. Good advice in the video. Just curious but have you ever actually seen the dark web?
I HAD to in order to fully understand some videos I've written. I have no general need to visit the dark web so on a day to day basis, no, I use consumer browsers.
❤
Well, I am learning, even though you go kinda fast for me. I really have to harden my entire online purview. What really disgusts me is human behavior with dishonor being so ubiquitous, and running free. Being human though includes me too. Could full scale nuclear war be a solution? There would still be a remnant, and we would inevitably return, so maybe not. The real complexity exists within human nature, and could be the only real correction, but obviously, that is all of which we know very little. Sometimes your hair colors work better than other times. I am sure you have your admirers. Peace.
🌹
Is it me, or does it feel like the vid was cut short?
It was on purpose. So you watched the full video?
they can hack you too dont worry and dont be samrt any one can hack you even you are profetional or hacker