Security Made Simple – Part 6

Your Handbook for Everyday Security


This series of articles is based on a handbook used as an outline for cybersecurity courses, viewed from a user perspective. The handbook, or these articles, is copyrighted by Vasco F. Gonçalves, working for SDNC sàrl.


Understanding Crypto Wallets and Protection

Software Wallets vs. Hardware Wallets

  1. Software Wallets:
    • Definition: Software wallets are applications or digital platforms that store cryptocurrency keys on devices like smartphones, computers, or online services.
    • Example: Coinbase Wallet, Exodus, or MyEtherWallet are software-based options.
    • Accessibility: Convenient for frequent transactions but might be more susceptible to online security threats.
  2. Hardware Wallets:
    • Definition: Hardware wallets are physical devices specifically designed to store cryptocurrency keys offline, offering enhanced security.
    • Example: Ledger Nano S, Trezor, or KeepKey are popular hardware wallet choices.
    • Security Emphasis: Designed to keep keys isolated from internet-connected devices, providing enhanced protection against online threats.

Setup Steps for Wallets

Software Wallet Setup:

  • Download and Installation: Install the wallet application on your device from a trusted source.
  • Create a Wallet: Generate a new wallet within the application, following the setup prompts to create keys and backup phrases.

Hardware Wallet Setup*:

  • Device Initialization: Unbox and initialize the hardware wallet according to the manufacturer’s instructions.
  • Generate Backup Seed: Create a backup seed phrase (recovery phrase) during the setup process. This phrase is critical for recovering the wallet if the device is lost or damaged.

Backup Phrases and Recovery

  • Seed Phrase Importance: The backup seed phrase generated during wallet setup is crucial. It serves as the master key to restore access to the wallet if the device is lost, stolen, or damaged.
  • Secure Backup: Safeguard the seed phrase offline in multiple secure locations, ensuring it’s not accessible to unauthorized individuals.

Best Practices

Regular Updates and Security: Keep software wallets updated and practice caution while interacting with cryptocurrency-related services or platforms.

Offline Storage: Store backup phrases or recovery seeds securely offline, away from digital threats like hacking or malware.

Exchange Security Measures

Two-Factor Authentication (2FA)

  • 2FA Implementation: Enable two-factor authentication on cryptocurrency exchange platforms for an additional layer of security.
    • Example: Use authenticator apps like Google Authenticator or hardware keys for 2FA setup on exchanges.

Whitelisting Addresses

  • Address Whitelisting: Some exchanges offer the option to whitelist withdrawal addresses.
    • Setup Process: Register specific cryptocurrency wallet addresses where funds can be withdrawn. Any other withdrawal attempt to an unlisted address gets rejected.

Avoiding Scams and Phishing

  • Scam Awareness: Be cautious of phishing attempts, fraudulent schemes, and fake exchanges impersonating legitimate platforms.
    • Vigilance: Double-check website URLs, avoid clicking suspicious links, and verify the authenticity of communication from exchanges.

Self-Custody Options

  • Cold Storage and Hardware Wallets: Consider moving cryptocurrency assets from exchanges to self-custody solutions for added security.
    • Cold Storage: Transfer funds to hardware wallets or offline storage solutions for enhanced protection against online threats.

Best Practices for Exchange Security

  • Regular Security Audits: Periodically review security settings, account activities, and access permissions on exchange platforms.
  • Education and Research: Stay informed about the latest security practices, potential scams, and evolving threats within the cryptocurrency space.

Risk Mitigation and Self-Custody

  • Risk Diversification: Spread cryptocurrency holdings across different wallets or platforms to mitigate potential risks associated with a single point of failure.
  • Security Hygiene: Practice robust security measures, such as strong passwords, device security updates, and cautious engagement with unknown or suspicious entities.

Anti-Malware and Patching

Anti-Malware Protection

  • Antivirus and Anti-Malware Software: Install reputable antivirus and anti-malware software on devices used for cryptocurrency transactions.
    • Routine Scans: Schedule regular scans to detect and remove potential threats from the system.

Operating System and Application Updates

Never forget to do updates – everyday, even if the system does it automatically, check them if it was done.

Security Made Simple – Part 5

Your Handbook for Everyday Security


This series of articles is based on a handbook used as an outline for cybersecurity courses, viewed from a user perspective. The handbook, or these articles, is copyrighted by Vasco F. Gonçalves, working for SDNC sàrl.


Mobile Security Essentials

App Permissions

  1. Review App Permissions: Regularly check and manage app permissions on your mobile device to control what data apps can access.
    • Example: Review and revoke unnecessary permissions, such as location access for apps that don’t require it for their functionality.
  2. Permission Prompts: Pay attention to permission prompts when installing new apps and evaluate whether the requested access aligns with the app’s purpose.
    • Example: A photo editing app requesting access to contacts might be unnecessary and could indicate potential data misuse.

Wireless Security

  1. Secure Wi-Fi Connections: Avoid connecting to unsecured or public Wi-Fi networks, which could expose your device to security risks.
    • Example: Use VPNs when connecting to public Wi-Fi to encrypt data and enhance security.
  2. Bluetooth Awareness: Disable Bluetooth when not in use to prevent unauthorized access or attacks through Bluetooth vulnerabilities.

Remote Wiping and Device Management

  1. Remote Wipe Functionality: Enable remote wiping on your mobile device to protect sensitive data if the device is lost or stolen.
    • Example: Services like Find My iPhone (iOS) or Find My Device (Android) allow remote wiping to erase data if the device is unrecoverable.
  2. Device Tracking and Locking: Utilize features that enable device tracking and locking remotely to prevent unauthorized access.
    • Example: Geolocation services help track and locate the device, while remotely locking it secures personal data.

Best Practices for Mobile Security

Biometric Authentication: Use biometric authentication methods like fingerprints or facial recognition for added security.

Regular Updates: Keep your device’s operating system and apps updated to patch vulnerabilities and improve security.

Next, many expect that – we will speak about:

Understanding Crypto Wallets

Security Made Simple – Part 4

Your Handbook for Everyday Security


This series of articles is based on a handbook used as an outline for cybersecurity courses, viewed from a user perspective. The handbook, or these articles, is copyrighted by Vasco F. Gonçalves, working for SDNC sàrl.


Rise of WireGuard Personal VPN in Routers

Router-Level WireGuard VPN

  1. Enhanced Privacy Integration: Some router manufacturers have begun integrating WireGuard, a high-performance VPN protocol, directly into their firmware.
    • Example: Companies like ASUS, Netgear, or others have started including WireGuard support in their router firmware, allowing users to establish a personal VPN directly from their router.
  2. Simplified Privacy Protection: WireGuard in routers enables users to encrypt and protect all internet traffic from connected devices without needing individual installations or configurations.
    • Example: Users can secure their entire home network with VPN encryption, safeguarding every device connected to the router.

Benefits of Router-Integrated VPNs

  • Ease of Use: Users can establish a VPN connection for their entire network with a few clicks, simplifying the process for those less familiar with VPN setup.
  • Comprehensive Security: Encrypting internet traffic at the router level ensures privacy and security for all devices connected to the network.

Considerations and Adoption

  • Compatibility Check: Ensure your router supports WireGuard or any other VPN protocols you prefer before relying on this feature.
  • Configuration and Setup: Despite being integrated, understanding router-specific settings for VPN configuration might still be necessary.

Seamless Setup with WireGuard Smartphone App and FritzBox Integration

WireGuard Smartphone App Integration

  1. QR Code Import: The WireGuard smartphone app allows users to generate a QR code containing configuration details for their VPN setup.
    • Example: Users can create a QR code within the WireGuard app on their smartphone that holds all the necessary configuration data for a VPN connection.
  2. FritzBox Compatibility: When setting up a WireGuard VPN on a FritzBox router, users can use the smartphone app’s QR code to import the configuration seamlessly.
    • Example: Scanning the QR code from the WireGuard app with the FritzBox interface automates the setup process, importing all necessary settings for the VPN connection.

Advantages of QR Code Integration

  • Effortless Configuration: QR code integration simplifies the transfer of setup data from the smartphone app to the FritzBox router, reducing manual input errors.
  • User-Friendly Experience: Users can enjoy a streamlined setup process without the need for extensive technical knowledge or manual configuration.

Utilizing QR Codes for Setup

  • Generate QR Code: Within the WireGuard smartphone app, users can generate a QR code containing the configuration details for their VPN connection.
  • Scan QR Code on Router: Using the FritzBox interface, users can scan the generated QR code from their smartphone, importing the settings for the WireGuard VPN.

Next – we will speak about:

Mobile Security Essentials

Security Made Simple – Part 3

Your Handbook for Everyday Security


This series of articles is based on a handbook used as an outline for cybersecurity courses, viewed from a user perspective. The handbook, or these articles, is copyrighted by Vasco F. Gonçalves, working for SDNC sàrl.


Identifying Phishing and Social Engineering Tactics

Understanding Phishing

Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication. Phishing is one of the oldest and most effective methods to gain unauthorized access to your system, whether it be personal or professional. Here are some common tactics:

  1. Email Spoofing: Attackers send emails appearing to be from legitimate sources, often mimicking well-known companies, requesting personal information or account credentials.
    • Example: An email claiming to be from a bank, asking the recipient to update their account details by clicking a link that leads to a fake website.
  2. Fake Websites: Fraudulent websites imitate legitimate ones, tricking users into entering sensitive information.
    • Example: A website resembling a popular shopping site offering unbelievable discounts to lure users into providing payment details.

Spotting Phishing Attempts

  • Check the Sender: Verify the sender’s email address to ensure it matches the legitimate source.
  • Hover Before You Click: Hover over links in emails to see the actual URL destination. Be cautious if it looks suspicious or differs from the expected address.
  • Avoid Urgency or Threats: Phishing emails often create a sense of urgency or use threats to manipulate recipients into immediate action.

Social Engineering Examples

  1. Pretexting: Attackers create a fabricated scenario to obtain information from a target.
    • Example: Someone pretending to be from IT support asking for login credentials to ‘fix’ an issue.
  2. Baiting: Offering something enticing to manipulate individuals into disclosing information.
    • Example: Leaving a USB drive labeled ‘Confidential’ in a public place, hoping someone plugs it in, infecting their device with malware.

Defensive Measures

  • Verify Requests: Contact the supposed sender through official channels to confirm unusual requests for sensitive information.
  • Security Training: Regularly educate yourself and others about phishing and social engineering tactics to stay vigilant.

Deeper Insight into Phishing and Social Engineering Tactics

Sophisticated Phishing Techniques

  1. Spear Phishing: Tailored attacks aimed at specific individuals or organizations.
    • Example: An email seemingly from a colleague requesting sensitive company information, utilizing insider knowledge to appear authentic.
  2. Whaling: Targeting high-profile individuals like executives or CEOs for sensitive information or financial gain.
    • Example: Impersonating a CEO in an urgent email to the finance department, requesting an immediate transfer of funds.

Social Engineering Tactics

  1. Pharming: Redirecting users to fraudulent websites, often through manipulation of DNS servers.
    • Example: Users trying to access a legitimate site are redirected to a fake site that steals their login credentials.
  2. Tailgating: Gaining unauthorized access by following an authorized person into a restricted area.
    • Example: Holding the door open for someone without verifying their access badge.

Identifying Advanced Threats

  • Zero-Day Attacks: Exploiting software vulnerabilities unknown to the software developer or antivirus vendors.
  • Man-in-the-Middle (MitM) Attacks: Intercepting communication between two parties to steal information.
  • Deepfakes: AI-generated videos or audios impersonating someone, used to manipulate and deceive individuals.

Strengthening Defense

  • Employee Training: Regularly conduct security awareness training to educate individuals about evolving threats.
  • Multi-Factor Authentication (MFA): Implement MFA to add an extra layer of security, reducing the risk of successful phishing attacks.

Next – we will speak about:

WireGuard Personal VPN in Routers

Security Made Simple – Part 2

Your Handbook for Everyday Security


This series of articles is based on a handbook used as an outline for cybersecurity courses, viewed from a user perspective. The handbook, or these articles, is copyrighted by Vasco F. Gonçalves, working for SDNC sàrl.


Setting Up 2-Factor Authentication with Microsoft Authenticator

Understanding 2-Factor Authentication

2-Factor Authentication adds an extra layer of security to your accounts by requiring a second form of verification beyond your password. This typically involves something you know (your password) and something you have (like your phone).

Using Microsoft Authenticator

  • Download Microsoft Authenticator: Install the Microsoft Authenticator app from the App Store (iOS) or Google Play Store (Android).
  • Account Setup: For accounts supporting 2FA (e.g., Microsoft accounts, certain third-party services), navigate to the security settings within the account.
  • Scan QR Code or Enter Details: Use the app to scan the QR code provided or manually enter the setup details.
  • Cloud Backup: Microsoft Authenticator offers cloud backup, enabling easy recovery of your 2FA setup if you switch devices or lose access to your phone.
  • Verification Code: Upon setup, the app generates temporary 6-digit codes for each account that require authentication.

Tips for Enhanced Security

  • Cloud Backup Importance: Enabling cloud backup ensures easier recovery in case of device loss or replacement.
  • Multi-Account Management: Microsoft Authenticator can manage multiple accounts, each with its unique verification codes.

Action Steps:

  1. Install Microsoft Authenticator: Get the app from the App Store (iOS) or Google Play Store (Android).
  2. Enable 2FA on Accounts: Visit your account’s security settings and look for the option to enable 2FA.
  3. Set Up Accounts in Authenticator: Use the app to scan QR codes or enter setup details for supported accounts.
  4. Enable Cloud Backup: Within the Authenticator settings, ensure cloud backup is activated for added security.

Using Microsoft Authenticator’s cloud backup feature provides a convenient way to safeguard your 2FA setup, ensuring access to your accounts even if you switch devices.

Setting Up 2-Factor Authentication: Google Authenticator vs. Microsoft Authenticator

Google Authenticator Strengths

Google Authenticator is a widely used 2FA app known for its simplicity, reliability, and ease of use. It generates time-based one-time passwords (TOTP) without requiring an internet connection once set up, ensuring accessibility even offline.

Limitations Compared to Microsoft Authenticator

However, unlike Microsoft Authenticator, Google Authenticator lacks certain advanced features, such as cloud backup. This absence of cloud backup might pose challenges in restoring your 2FA setup if your device is lost or replaced.

While both apps serve the basic function of providing a second layer of security through authentication codes, Microsoft Authenticator’s additional cloud backup feature can be advantageous for those seeking more comprehensive security and easier recovery options.

Next – we come to the most interesting aspect of cybersecurity:

Identifying Phishing and Social Engineering Tactics

Security Made Simple – Part 1

Your Handbook for Everyday Security


This series of articles is based on a handbook used as an outline for cybersecurity courses, viewed from a user perspective. The handbook, or these articles, is copyrighted by Vasco F. Gonçalves, working for SDNC sàrl.


Introduction

Staying Safe in a Connected World

Our lives are increasingly lived online. We bank, shop, communicate and store important information digitally. With so much of our personal data out there, it is essential to protect ourselves, even against cyberbullying.

This section gives you the basics of staying secure in today’s technology. Whether you are using a phone, computer or dealing with cryptocurrency, these core principles will help shield you from online threats.

We will look at everyday things like using strong passwords and avoiding email scams. You will also learn about cryptocurrency wallet security and how exchanges work. Other topics include keeping your devices protected with antivirus software and making sure apps and programs are up-to-date.

Everything is broken down into simple, clear steps. Do not worry if technology is not your thing – we will make even complex security concepts easy to grasp. Following these foundational guidelines will prepare you to safely enjoy all the digital world has to offer.

This section provides a solid starting point for anyone using the internet. Read on to build your security knowledge from the ground up. Feel empowered to strengthen your online protections and keep what matters most secure in today’s connected age.

Using a Password Manager: KeePassXC

Why Strong Passwords Matter

Passwords are like the locks on your online accounts. Using strong, different passwords for each account helps protect you from hackers trying to break in.

Creating Strong Passwords

  • Length Matters: Aim for passwords that are at least 16 characters long. Longer passwords are harder to crack. For instance, you may use password as passphrases as “Les chatons du château jouent joyeusement dans le jardin ensoleillé.” (billions to trillions of years to decode).
  • Mix it Up: Use a combination of uppercase and lowercase letters, numbers, and special characters.
  • Avoid Common Phrases: Steer clear of easily guessable passwords like “password123” or “I love you” or “New York” or “123456789” or …

KeePassXC: Your Secure Vault

  • Open Source Security: KeePassXC is an open-source password manager, meaning its code is transparent and continuously reviewed by the community for security.
  • Local Database: Your passwords are stored locally on your device, encrypted with a master password, enhancing security.
  • Cross-Platform Compatibility: KeePassXC is available for various operating systems, ensuring access across multiple devices.
  • Password Generator: Easily create strong and unique passwords with the built-in password generator feature.

Action Steps:

  1. Download KeePassXC: Visit the official website ( https://keepassxc.org ) and download KeePassXC for your operating system.
  2. Set Up Your Database: Here are some screenshots
    ( https://keepassxc.org/screenshots ) to set up and create a new database, and set a strong master password that you can remember but is difficult to guess.
  3. Add Your Passwords: Enter your existing passwords or generate new ones using the password generator feature.

Remember, regardless of the password manager you choose, enable two-factor authentication (2FA) wherever possible for added security.

Next:

Setting Up 2-Factor Authentication with Microsoft Authenticator, and Google Authenticator vs. Microsoft Authenticator

Unveiling the Mystery of Cryptocurrency Heists

Understanding Risks and Safety Measures

In the fast-paced world of digital currencies, there’s an alarming trend making headlines – cryptocurrency heists, or robbery. These cybercrimes, often orchestrated by skilled hackers, have governments and investors on edge. Let’s break down:

  • What’s happening?
  • What’s at risk?
  • How to stay safe in this crypto world?

What’s Worrying Governments?
Governments, especially in Western countries, are sweating over the potential for huge crypto heists funding shady activities and the bankruptcy of individuals and companies. Imagine nuclear weapons programs or money laundering schemes, all funded by stolen cryptocurrencies.

That’s not all, some governments are waiting for the heist of the century – behind doors, many mention up to half a trillion dollars. It’s not a tale. Recently, hackers linked to the supposed North Korean government pulled off a jaw-dropping $100 million heist from a California-based company, even more recently HTX with its Heco Chain had a heist of $115 million (see TikTok and Instagram for more information*). That money was quickly laundered, leaving authorities scrambling.

As this article says: “[Many] discovered the hard way that trading cryptocurrencies such as bitcoin happens in an online Wild West where sheriffs are largely absent.” [1].

The Troubling Trends.

Cryptocurrency heists are on the rise, and quite fast. Think of 2022 as the “Year of Crypto Hacking,” with a staggering $3.8 billion swiped from crypto businesses [2]. And here’s a shocker: most attacks, a whopping 82.1%, targeted decentralized finance (DeFi) platforms [2]. Those North Korean hackers? They’ve made off with over $2 billion in various attacks over the past few years [3].

Who’s in the Center of attention?

Picture this: hackers setting their sights on cryptocurrency exchanges and DeFi platforms. These are like treasure troves for cyber bandits. They’re using sneaky tactics like tricking people (that’s called social engineering – see these TikTok and Instagram accounts*) or finding weaknesses in software, especially software wallets, to get into these systems [4].

What Happens Next?

When these heists occur, it’s chaos for individuals and companies. Sometimes, the thieves vanish with the loot because tracing cryptocurrencies is nearly impossible. Other times, law enforcement manages to reclaim some funds [5]. The FBI’s been busy chasing after North Korea’s Lazarus Group, which has snatched hundreds of millions of dollars in crypto [6].

Keeping Safe in the Crypto Jungle

Now, how do you protect yourself from these sneaky thieves? Strong security measures are key. Imagine having a lock with two keys instead of one – that’s two-factor authentication. It’s like having an extra security guard for your digital wallet. Staying informed about the latest tricks hackers use is also crucial.

Big Fish and Small Fish

Whether you’re a big investor (called crypto whales) or a small one, these heists can seriously sting, in average almost $100,000.[7] But there are ways to safeguard your assets. Crypto whales often use what’s known as multi-key wallets, a super-secure way to store their digital money [8] – generally more complicated, as slower speed in transactions, need a certain technical know-how, and it takes longer to recover your funds [8A]. For everyone else, using secure hardware wallets, along with extra authentication steps, can help keep those digital coins safe.

The Ledger Lockdown

Speaking of secure wallets, let’s talk about Ledger wallets. These are like ultra-safe piggy banks for your digital cash. They use a fancy thing called a Master Seed, which generates lots of keys. Although it’s not exactly the usual multi-key system, it’s close enough to make it super secure [9]. My colleague tested some hardware wallets. Most of them were extremely secure, but Ledger came out in first place.

Here’s my recommendation for a hardware wallet. The reason for it is its multi-versatility among our computers and smartphones (works securely on the major platforms, Windows, MacOS, iOS and Linux systems):

https://shop.ledger.com/pages/ledger-nano-x/?r=56eeff14bf75

It exists in different colors.

ONLY DOWNLOAD Ledger Live from verified and official sources. For the smartphones through their respective stores, Apple and Android or from https://www.ledger.com/ledger-live for computers. NOWHERE else !!! It prevents phishing attempts or malware infections.

In Conclusion

Cryptocurrency heists are like modern-day bank robberies, only way sneakier. But understanding the risks and taking steps to protect yourself can make a world of difference in this fast-evolving crypto world.

Disclaimer:

I have an affiliation with Ledger due to their top-notch security features.

References

[1] https://www.reuters.com/investigates/special-report/bitcoin-exchanges-risks/

[2] https://www.chainalysis.com/blog/2022-biggest-year-ever-for-crypto-hacking/

[3] https://www.trmlabs.com/post/inside-north-koreas-crypto-heists

[4] https://blog.cryptostars.is/how-cryptocurrency-exchanges-get-hacked-369633976322

[5] https://edition.cnn.com/2021/12/12/tech/crypto-exchange-hacks-explainer/index.html

[6] https://www.darkreading.com/threat-intelligence/fbi-warns-of-cryptocurrency-heists-by-north-koreas-lazarus-group

[7] https://usa.kaspersky.com/about/press-releases/2023_kaspersky-survey-finds-one-in-three-users-have-experienced-crypto-theft-average-loss-is-97583

[8] https://linen.app/articles/store-crypto-as-whales-do-the-definitive-guide

[8A] https://blockworks.co/news/what-are-multisig-wallets

[9] https://www.ledger.com/ledger-live

* TikTok: https://www.tiktok.com/@dark_web_legal/ (last videos – as of Nov 2023)

Instagram: https://www.instagram.com/encryptyourworld/ (last slides – as of Nov 2023)

HTX and Heco Chain: https://www.coindesk.com/tech/2023/11/22/justin-sun-confirms-htx-heco-chain-exploited-after-100m-in-suspicious-transfers/

For inquiries, please contact:

info [at] digitaltran [dot] eu

Everyone has something to hide!

Author: Vasco Gonçalves
Date: April 19, 2022

Secure your data (composed by Vasco Gonçalves / images source: PixaBay)

Let’s start with a real-life story where some of you might identify yourselves:

A CEO, let’s call her Joanna, lost her job for being trolled on social media.

What happened?

Joanna worked very hard to attain her position. She was relatively young, ambitious, and very successful. One morning, as usual, she arrived at the office and found her employees whispering and acting strangely.

She called her executive assistant and asked if she knew what was going on. Reluctantly, the assistant explained:

“Someone posted some photos of you and a man kissing, along with some nasty comments and other stuff.” The “other stuff” included partially masked nude photos of Joanna and a man, avoiding Twitter’s bans.

She asked to see the posts.

“Oh my God! These photos are of my husband and me! How did they get these photos? They were in my encrypted Cloud! Nobody could have accessed them! These photos are private!”

In that instant, she knew her career had come to an end and felt overwhelming shame. She wanted the ground to swallow her whole. She ran out of the office and went home, never to return.

Joanna had a virtual conference with the Board of Directors to announce her resignation. She handed in her written resignation the next day via postal mail. Although the Board opposed her resignation, Joanna could no longer work with her colleagues.

What happened to Joanna? Where does she live now? Does she still work?

Keep reading, the answers will be given.

Consequences

Have you ever faced a situation so overwhelming you felt like retreating from the world?

Maybe due to compromised photos like Joanna, or perhaps some confidential documents or patents are circulating on the Internet.

Gossip starts to mushroom everywhere, from your family to unknown people. You are trolled on social media. Many move away to unknown places, permanently or until the dust settles, as Joanna did. Some people lose jobs they cared about and receive no financial compensation. Though rare, some even commit suicide.

As a business owner or CEO, it is very difficult to hire someone who is or was trolled on social media or in gossip columns, even if the news is fake and they are innocent.

Others will say, “I have nothing to hide!

Joanna was a respected professional and active member of her community, balancing family and career with dedication, but in an instant, she lost everything!

Maybe you are young and free-spirited. But one day, you might make mistakes, knowingly or unknowingly. That’s when you’ll wish the ground to swallow you whole!

One thing we should never forget:

“The Internet NEVER FORGETS anything!”

Once comments, photos, videos… are published, they remain somewhere in the world forever. Just search your favorite search engine, and you will see that some photos pop up even if they are no longer available on certain websites.

  • Are you in such a situation? Maybe, or maybe not yet!
  • Are you a celebrity?
    An actress or an actor, a social media magnate, a business leader,
    a politician …
  • Do you have innovations, patents… to secure and hide?
  • Do you have professional or private pictures or videos to secure and hide?

If you answered yes to any of these questions, you are certainly a candidate to secure and hide professional or private data or information, especially if it could be embarrassing to the public!

“I already have my data in a secure online cloud.”

Can you trust such online clouds? Joanna thought her data was secure in the Cloud. She paid a hefty fee for the provider to secure her phone and cloud.

If you ‘secure’ your data on the cloud, you become a perfect target for hackers, paparazzi, corporations, and rogue governments. With today’s circumstances, everyone is in need of money, and this could likely intensify over the next 5 to 10 years!

Despite their best efforts, clouds from Amazon, Apple, Google, Microsoft, and others are serious hacking targets. Here is a simple example:

“iCloud hacker stole intimate photos from hundreds of Apple customers” (techradar.pro – https://www.techradar.com/news/icloud-hacker-stole-intimate-photos-from-hundreds-of-apple-customers)

How many accounts have been compromised (publicly known and undisclosed)?

You just need to look on Twitter, at hacker sites, and anonymous forums. Many brag about their exploits and sometimes post a nude picture of a celebrity or publish a few lines of a top-secret document as proof. They want to monetize these documents and photos or sell them back to you for a huge amount of money.

What is the guarantee that the malicious hackers will not retain a copy for future financial demands (again and again)? Many companies are in such a position and pay regularly – as an insurance policy – without being assured of the data’s destruction!

What can be done? What is the best option?

The best storage is a Secure Local Open Source Personal Cloud (SLOSPC). Think of SLOSPC as a personal vault in your home, fortified with cutting-edge security.

What is that?

Simply said, SLOSPC is a highly secure computer in your house or premises. Not any kind of security, but the highest form of security that exists for now – all the software opensource and free**.

How does it work? Simply said:

  • We install it with all the securities (Linux-based).
  • We test it.
  • We let it be tested by an independent ethical hacker.
  • We arrange for a non-published domain name (difficult to guess) if you need to access documents via the Internet.
  • We train the user(s) in security matters.
  • If you wish, we intervene only in urgent matters and perform annual maintenance (we never see your private documents since they are encrypted under your name).

I hope you understand the implications of ‘everyone has something to hide’ and the vulnerabilities of online cloud systems.

  • So, what happened to Joanna?
  • Where does she live now?
  • What does she do for a living?

Joanna and her new life

She relocated with her family to a quieter location to start afresh. After a year, she applied for a business permit and now does local marketing for small companies – keeping it local.

She asked me for a solution to her problem, and I proposed the above solution, a SLOSPC.

How to get the SLOSPC or more information?

If you wish for more information, send us a simple message through our website: https://digitaltran.eu/#contact.

Thereafter, we will contact you more privately.


* Some news about photoshoots, new collection designs, innovations, officially non-published patents, private photos, private documents, accounts and passwords (sensitive people may abstain from viewing some websites):

https://firewalltimes.com/amazon-web-services-data-breach-timeline/

https://thehackernews.com/2022/04/github-says-hackers-breach-dozens-of.html?m=1

https://edition.cnn.com/2022/03/23/tech/microsoft-lapsus/index.html

https://nypost.com/2021/12/08/google-warns-over-1m-devices-have-been-infected-in-russian-hack/

https://thehackernews.com/2021/11/hackers-using-compromised-google-cloud.html

https://abc7.com/jennifer-lawrence-nude-photos-hacker-ariana-grande-victoria-justice/288987/

http://myunique.info/vintage/icloud-hacked-celebrity-photos.php

https://celebrityrevealer.com/

** You may contribute financially to the opensource community so they can continue to perfect their free products, which we can enjoy. More and more companies and private individuals are turning to open-source and contributing heavily so developers can continue developing and controlling any code available full-time.

Disclaimer

The story presented in this article, while inspired by real events, includes fictional elements and altered facts to protect the privacy and safety of individuals involved. The individual referred to as “Joanna” is not based on any one person, and details have been intentionally modified to prevent identification.

As the author, I acknowledge being an acquaintance of a family whose experiences loosely inspired this narrative. However, the fictionalization ensures that no harm or harassment can be traced back to anyone connected to the events. This article aims to educate readers about digital security and privacy, not to disclose or speculate on any individual’s personal life.