Comparing the Security Practices of Experts and Non-Experts
by metaschima from LinuxQuestions.org on (#GMV2)
https://www.schneier.com/blog/archiv...g_the_s_1.html
https://www.usenix.org/system/files/...-paper-ion.pdf
The main things that experts find important compared to non-experts:
Keep your system up-to-date.
Use two factor authentication (when available).
Use password manager + unique passwords.
HTTPS only.
Be suspicious.
Use Linux.
Using verified software and strong passwords are generally agreed upon.
I definitely keep my system up-to-date, and I also recommend this. I know people have posted threads about this here.
Unfortunately two factor authentication is not too common, but you should use it if it is available.
I will be migrating my passwords to a password manager, likely
https://encryptr.org/
I've read about it before and I think it's a great use of zero knowledge protocol. If you are paranoid you may want to wait for the third crypton audit and the security model paper.
https://crypton.io/docs/


https://www.usenix.org/system/files/...-paper-ion.pdf
The main things that experts find important compared to non-experts:
Keep your system up-to-date.
Use two factor authentication (when available).
Use password manager + unique passwords.
HTTPS only.
Be suspicious.
Use Linux.
Using verified software and strong passwords are generally agreed upon.
I definitely keep my system up-to-date, and I also recommend this. I know people have posted threads about this here.
Unfortunately two factor authentication is not too common, but you should use it if it is available.
I will be migrating my passwords to a password manager, likely
https://encryptr.org/
I've read about it before and I think it's a great use of zero knowledge protocol. If you are paranoid you may want to wait for the third crypton audit and the security model paper.
https://crypton.io/docs/