So recently I’ve gotten a bit more serious about my internet security, and made some changes. Here’s a short list of what I’ve done, but I’m wondering if I’m missing anything important:

  • Moved from Brave to Firefox
  • Bought my own domain for my email (so I can switch email providers at any time)
  • Switched to Duck Duck Go from google (It’s gotten worse anyways)
  • Bought the Proton package (VPN, Encrypted email, etc…)
  • Installed Thunderbird (instead of microsoft mail app)
  • Installed uBlock Origin
  • Installed Bitwarden for password managing (My passwords are also no longer all the same)

Is there anything that I have missed that should be a priority for internet security?

    • @[email protected]
      link
      fedilink
      4
      edit-2
      1 year ago

      custom email aliases (proton have SimpleLogin) use separate email for every account just like password

      voluntarily subjecting yourself to mitm attack is… uh… not the smartest idea in the world 😂

      and definitely not something you should advise to someone asking how to increase their security.

      get VoIP phone number redirect your current phone to VoIP.

      you have to pay for every such call. and what is the security gain here?

      use phone that was never registered to your name (don’t reuse old phones)

      that is to protect you from nsa, in some enemy of the state scenario?

      setup always on VPN on your home on router with killswitch so you never reveal your IP accidentally

      again, what scenario is this useful in? lets say i am not really into international terrorism…

      The lengths that you go to protect your privacy will depend on your threat model.

      yeah, and reading your advises, you are obviously some james bond hunted by 10 enemy intelligence services at once 🤣

      • MuchPineapples
        link
        41 year ago

        Why would using email aliases increase you mitm attack vector threat?

        • @[email protected]
          link
          fedilink
          11 year ago

          because unless you use some paranoid email that can do this in house (and majority of people do not) it means using third party service, which is, by definition, that man in the middle.

            • @linearchaos
              link
              English
              11 year ago

              Another nice thing about doing this, when one of the emails you use is compromised and it starts being used for purposes other than that company, You know that It’s been sold or compromised. You can go shut it off or change the email or just dump it all to trash.