Wired's new Guide to Digital Security is an excellent addition to the genre of simple-to-follow how-tos for reducing the likelihood that you'll be victimized by computer-assisted crime and harassment, and that if you are, the harms will be mitigated.
Like Motherboard's guide, it is formatted as a series of short articles; like EFF's Surveillance Self Defense kit, it is structured around different kinds of threats, with separate paths for "civilians," "public figures" and "spies."
Some of the standout articles:
* Smartphone Security 101: The Steps That Matter Most in which Lily Hay Newman offers "quick and easy steps to make big improvements to your mobile security";
* How to Encrypt All of the Things, where Andy Greenberg shows you "how to keep snoopers out of every facet of your digital life, whether it's video chat or your PC's hard drive";
* How to Sweep For Bugs and Hidden Cameras, where Lily Hay Newman basically shows that unless you're really technologically sophisticated, this is very, very hard;
* and What to Do if You’re Being Doxed, where Newman interviews the Electronic Frontier Foundation's Eva Galperin for really practical advice on what could easily be a nightmare scenario.
Electronic security is a team sport: that's why the Cybersecurity Campaign Playbook has a chapter for how family members of political campaigners should armor themselves against being used as a means to get at their relatives.
This is the ideal season for you to help you up your family's security game. When you go home for the holidays, think about how you can install software, change defaults, and teach your family good practices to help you -- and them -- stay safe.
If this interests you, read EFF's Security Education Companion, which teaches you how to be an effective communicator of security precepts.
The WIRED Guide to Digital Security
A family in DeSoto County, Mississippi, bought a Ring security camera so they could keep an eye on their three young girls in their bedroom. Four days later, they learned that a hacker had broken into the camera and subjected their children to continuous bedroom surveillance, taunting the children through the camera's built-in speaker.
Evan from Fight for the Future writes, "A new investigation from Gizmodo just revealed that anyone, anywhere can get geographic coordinates of Ring devices from Amazon’s Neighbors App. Not only can someone find out where users live, they can use footage to track bystanders, locate children, and monitor people going into buildings, like clinics, for […]
Princen Alice created a “password generator” that glues random Welsh-sounding words into a craggy landscape of letters. It’s probably not very good, since it’s three or four dictionary words and a number plus the fallacious ethnocentric belief that unpronouceability to English speakers reflects randomness, but what a delightful mess!
There are few intellectual exercises better than a good game of chess against a capable opponent, which is why a lot of old hands at the gameplay it online. But there’s still nothing like the tactile thrill of moving a knight into checkmate. (Or sweeping the pieces off dramatically when you lose.) That’s why we’re […]
Got a real music junkie on your list this year? It’s a good bet that they already have a solid pair of earbuds, but probably nothing quite like these Seeds Earphones. Here’s the thing: Wireless earbuds are all the rage right now, and there are a lot of good reasons for that. But for true […]
When it comes to the qualities of a good project manager, you hear a lot of talk about “soft skills” like leadership ability and confidence. And where does confidence come from? It comes from people who are dead certain they know the right steps to take. In other words, you’ve got to master the hard […]