Comments by "James Edwards" (@jamesedwards3923) on "Ask Leo!"
channel.
-
6
-
6
-
4
-
4
-
3
-
2
-
2
-
2
-
2
-
2
-
2
-
1
-
1
-
1
-
1
-
1
-
1
-
Mr. Leo is correct. You best bet is simply change the password and keep multifactor authentication data backed up for the account.
Although, Mr. Leo does not suggest it. I recommend changing the passwords on accounts you use. Now here is where I partially agree. Accounts you use the least, should be changed in less frequency. However, they should be changed. Also, they should be completely randomized.
If the account has computer generated recovery code list. Every so often, you should also change those codes. Especially, if it is a high risk account. For example, Google. Or Facebook. They give you a recovery code list. Which means if you lose your secondary factor, but have these. You get ten opportunities to get into your account.
If you are using accounts that have secret question answers and stuff like that. You treat them as you would any other password. I know people who have excellent security. Yet in this area screw up completely. Why, because they give real answers to the questions. Again, treat them like you would any other password. Put them in a password manager and make them randomized. Which means whichever way you make them random. Let the computer handle the tasks.
I have accounts that are very old that I can not delete. Yet I still make the effort to periodically change the passwords to all of them. If they have multifactor authentication options. I enable them. Even though I will never use the account again.
1
-
1
-
1
-
1
-
I prefer total software encryption of drives. However like you have stated Mr. Leo. You do not want to encrypt yourself into a corner.
I tell people all the time. If you do not encrypt your drives. At least encrypt your sensitive files. Also, although I am well aware of the follies of hardware encryption. For low level to moderate threats. There is a middle ground.
My steps are for external portable drives only and not for internal drives. Also, these Steps are not in order.
Wester Digital and Samsung make popular hardware encrypted drives. For low to moderate threat levels:
Step 1: Read up on the flaws, risks, and limitations of the hardware encryption you are choosing to use. A few example baseline articles.
Flaws in self-encrypting SSDs let attackers bypass disk encryption
Master passwords and faulty standards implementations allow attackers access to encrypted data without needing to know the user-chosen password.
catalin-cimpanu.jpg
Written by Catalin Cimpanu, Contributor on Nov. 5, 2018
https://www.zdnet.com/article/flaws-in-self-encrypting-ssds-let-attackers-bypass-disk-encryption/
Western Digital encrypted external hard drives have flaws that can expose data
Researchers found serious flaws in the encryption implementation on Western Digital external drives
By Lucian Constantin
PCWorld OCT 21, 2015 4:42 AM PDT
https://www.pcworld.com/article/424079/western-digital-self-encrypting-external-hard-disk-drives-have-flaws-that-can-expose-data.html#:~:text=Western%20Digital%20encrypted%20external%20hard%20drives%20have%20flaws%20that%20can%20expose%20data,-Researchers%20found%20serious&text=The%20hardware%2Dbased%20encryption%20built,without%20knowing%20the%20user%20password.
Flaws in Popular SSD Drives Bypass Hardware Disk Encryption
By Lawrence Abrams
November 5, 2018
https://www.bleepingcomputer.com/news/security/flaws-in-popular-ssd-drives-bypass-hardware-disk-encryption/
Samsung, Crucial’s Flawed Storage Drive Encryption Leaves Data Exposed
Author:
Tara Seals
November 6, 2018 12:08 pm
https://threatpost.com/samsung-crucials-flawed-storage-drive-encryption-leaves-data-exposed/138838/
https://www.ieee-security.org/TC/SP2019/papers/310.pdf
Step 2: Purchase external portable drives.
Step 3: Enable proprietary hardware encryption. Remember we are not using internal encrypted drives.
Step 4: Figure out which encrypt software you are going to use. Do the files have their own encryption? How good is the encryption? What is your threat level tolerance?
Step 5: Encrypt files before putting them on hardware encrypted drives.
Step 6: Understand the differences and security risks between SSDs and Platter Drives. If you are worried about deleting and erasing data. Platter drives are your better option. As SSDs wear out. Many default into read only modes. Also remember that SSDs come in different technologies new and old. My personal opinion. Only if you are concerned about dropping the drive or environmental hazards. Should use store external backup data on SSDs. I used to wear up a lot of MicroSD cards reading and writing data frequently. So eventually I read up on my failure rate. If you are using an SSD for backup or even general use. My personal belief is that you should buy the largest capacity you can afford. That way the life is longer.
https://en.wikipedia.org/wiki/Solid-state_drive
https://en.wikipedia.org/wiki/Hard_disk_drive
Step 7: Budgets and Projection of Use: Anybody will tell you that all drives and media die eventually. Your goal is to make sure that if the data is important. That it last as long as possible. Take your current age. Then project to your death. Who wants the data after you die? Whom will have access to it?
Step 8: Criminals and Thieves: As of 2023, it is no secret that bad guys are getting smarter in STEM and computer data crimes. The easy of use is lowering. Accessing brute forcing tools both services and hardware is sinking fast. Not to mention Quantum computers. My philosophy is simple. Encrypt damn near everything with the highest tech at my disposal. Even when implementing this method. It should take decades at the bare minimal for bad guys to break your file encryption.
That means knowing most of your passwords is a horrible idea. Password Managers. They are important.
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1
-
1