Are password managers the best way to achieve identity compartmentalization online?

I’ve been using a well-known password manager to create several identities for use on each web service I sign up to.

I had the idea of creating 3+ email addresses with strong passwords consisting of 40+ random characters and signing up on… Continue reading Are password managers the best way to achieve identity compartmentalization online?

5 things you should never do when using anonymous operating systems

By David Balaban
Some people overestimate the capabilities of anonymous operating systems, thinking that after they launch OS like Tails, they are completely protected from any enemy.
This is a post from HackRead.com Read the original post: 5 things yo… Continue reading 5 things you should never do when using anonymous operating systems

Ideas That Become Obvious In Hindsight

Award-winning tech journalist Leo Laporte’s interview with Scott Petry, Co-founder and CEO of Authentic8, maker of the Silo Cloud Browser.
The post Ideas That Become Obvious In Hindsight appeared first on Security Boulevard.
Continue reading Ideas That Become Obvious In Hindsight

About Internet Anonymity, Our Life and Its Relativity

By David Balaban
So, you have some reason to remain anonymous on the net. You open Google, type in something like: “Basics of Internet anonymity” and get some results.
This is a post from HackRead.com Read the original post: About Internet Anonymity, O… Continue reading About Internet Anonymity, Our Life and Its Relativity

About Internet Anonymity, Our Life and Its Relativity

By David Balaban
So, you have some reason to remain anonymous on the net. You open Google, type in something like: “Basics of Internet anonymity” and get some results.
This is a post from HackRead.com Read the original post: About Internet Anonymity, O… Continue reading About Internet Anonymity, Our Life and Its Relativity

Could you anonymously upload a file on the internet if the threat model was the entire world trying to find your identity after you do so? [on hold]

Thought experiment: You need to upload a file, and the threat model is the entire world trying to find out who you are after you do so.

I know this is absurd, but bear with me, it’s a thought experiment, where the scenario i… Continue reading Could you anonymously upload a file on the internet if the threat model was the entire world trying to find your identity after you do so? [on hold]