Securely Storing Contacts Within Password Managers

Posted on August 2nd, 2020

My contacts are extremely important to me. My clients trust me with personal cell numbers, private email addresses, and the the locations of their homes which are not associated with their true names. My contacts are almost as sensitive as my passwords. Because of this, I go to great lengths protecting them. I recently discussed this on my show HERE, then provided a quick update HERE, and finally an embarrassing correction HERE. There are many scenarios which I now never allow, such as the following.

I do not store them within my phone’s stock contacts app because it is often prone to abuse by apps and synchronizes content to Apple or Google by default.

I do not store them within services such as Apple, Google, or Fastmail because they could be abused by a rogue employee or a data breach.

I no longer store them in ProtonMail because the name and email fields cannot be encrypted (but the phone/address/etc are encrypted, visible only to me).

I no longer want my contacts anywhere online, much like I never store my passwords online. While there are great options, such a ProtonMail, there are still weaknesses which must be monitored. I have decided that all of my contacts will ONLY be stored offline. This presents a dilemma since I need my contacts with me at home (laptop and iPod Touch), and on the road (iPhone). I have decided to use a password manager for my contacts, which securely stores any sensitive content. The following is the solution which works well for me.

EXPORT

I have hundreds of contacts, even after pruning people with which I no longer communicate. Manual entry is out of the question. Since I had everything in ProtonMail, I used their export feature to create a VCF file. A typical entry looked like this:

BEGIN:VCARD
VERSION:4.0
TEL;PREF=1;TYPE=voice:(202) 555-1212
TEL;PREF=2;TYPE=voice:303-555-1212
ADR;TYPE=x-adr:;;1234 Main;Houston;TX;77089;USA
ORG:Privacy Corp
NOTE:We met at Blackhat
UID:proton-web-28ae3095-21b6-483e-acbc-454853cb88a4
FN:John Doe
item1.EMAIL;TYPE=x-email:jdoe@protonmail.com
item1.X-PM-ENCRYPT:false
item1.X-PM-SIGN:false
END:VCARD

Note that I could have exported the same type of file via FastMail with a protocol of VCard 3.0 or higher. A typical CSV export would have been missing phone numbers if more than one entry for personal numbers was present. I always prefer VCF files over CSV.

Now that I have a single file with hundreds of contacts, I need to clean it up. I cannot import this file into my password manager (KeePassXC) unless I have one clean entry per line. I also need a single field with the full name of my contact, followed by the email field, followed by all of the remaining data. The full name cannot possess a comma, and the details after the email also cannot have a comma. This is because we need everything to import correctly, and KeePassXC sees a comma as a delimiter.

First, I want to rename the file (proton.vcf) to contacts.txt for easy viewing. Then, I want to remove the unnecessary lines with the following commands within Terminal on Linux or Mac (Windows users would need to install Sed). The following works on Mac, eliminate the two single quotes after -i on Linux and Windows.

sed -i '' '/^BEGIN/d' contacts.txt
sed -i '' '/^VERSION/d' contacts.txt
sed -i '' '/^UID\:/d' contacts.txt
sed -i '' '/^item1\.X/d' contacts.txt
sed -i '' '/^END\:/d' contacts.txt

I now have entries such as below.

TEL;PREF=1;TYPE=voice:(202) 555-1212
TEL;PREF=2;TYPE=voice:303-555-1212
ADR;TYPE=x-adr:;;1234 Main;Houston;TX;77089;USA
ORG:Privacy Corp
NOTE:We met at Blackhat
FN:John Doe
item1.EMAIL;TYPE=x-email:jdoe@protonmail.com

I want all of my telephone numbers to appear as ten digits without hyphens, periods, or parentheses. This is because some dialers need a pure number. The following cleans this up, and I ran each of these a few times.

sed -i '' 's/(\([0-9]*\)) \([0-9]*\)-\([0-9]*\)/\1\2\3/' contacts.txt
sed -i '' 's/(\([0-9]*\)) \([0-9]*\)\([0-9]*\)/\1\2\3/' contacts.txt
sed -i '' 's/\([0-9]*\)-\([0-9]*\)-\([0-9]*\)/\1\2\3/' contacts.txt
sed -i '' 's/\([0-9]*\)\.\([0-9]*\)\.\([0-9]*\)/\1\2\3/' contacts.txt

My telephone numbers now appear much cleaner:

TEL;PREF=1;TYPE=voice:2025551212
TEL;PREF=2;TYPE=voice:3035551212

Next, I need to start moving entries from one line up to the entry on the previous line, and I want a colon as the delimiter on MOST, but a comma after the name. The following continues my cleanup using TextEdit on Mac to find and replace text. Most text editors should support this type of behavior. The commands can be seen in the query windows and the results are below within the text. This places all phone numbers on one line, colon delimited:

This removes the junk before the address:

This moves the ORG line up:

This moves the NOTE line up:

This moves the email line up and eliminates the junk:

I am close now, but I need to make everything on one line, with the name first, last name followed by first. the following is complex, but gets the job done:

I now have everything in order on one line, without junk, ready for import. My contact list appears as follows.

Doe: John,jdoe@protonmail.com,2025551212:3035551212:1234 Main:Houston:TX:77089:USA:Privacy Corp:We met at Blackhat
Doe: Mary,mdoe@protonmail.com,2025551212:3035551212:1234 Main:Houston:TX:77089:USA:Privacy Corp:We met at Blackhat
Doe: Kim,kdoe@protonmail.com,2025551212:3035551212:1234 Main:Houston:TX:77089:USA:Privacy Corp:We met at Blackhat
Doe: Joe,joedoe@protonmail.com,2025551212:3035551212:1234 Main:Houston:TX:77089:USA:Privacy Corp:We met at Blackhat
Doe: Mike,mikedoe@protonmail.com,2025551212:3035551212:1234 Main:Houston:TX:77089:USA:Privacy Corp:We met at Blackhat

Next, I can import this list into KeePassXC:

Rename contacts.txt to contacts.csv
KeePassXC > Database > Import > CSV File…
Label as “Contacts” > Continue > Continue
Enter Password > Continue
Save as “Contacts.kbdx”

When prompted, change the following fields:

My contacts are clean and sorted by last name:

An individual entry appears as follows:

I can now save this database and copy it to my mobile devices for use with Strongbox. I can copy/paste any numbers or email addresses from KeePassXC. It is offline an securely encrypted. My contacts are now protected, only visible to me, and no longer prone to online attacks. Overkill? Na…

Filed under Privacy, Security | Comments Off on Securely Storing Contacts Within Password Managers

The Privacy, Security, & OSINT Show – Episode 181-B

Posted on August 1st, 2020

EPISODE 181-B-Four More Minutes Please…

This supplement to yesterday’s episode provides an important correction to last week’s contact show.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.

Listen to THIS episode at https://soundcloud.com/user-98066669/181-b-four-more-minutes-please

Listen to ALL episodes at https://inteltechniques.com/podcast.html

or Subscribe at: RSS / iTunes / Stitcher  / Spotify


SHOW NOTES:

INTRO:

None

FOUR MORE MINUTES PLEASE…:

Discussion

OSINT:

None


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon: https://amzn.to/2B5svbH


Filed under Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 181-B

The Privacy, Security, & OSINT Show – Episode 181

Posted on July 31st, 2020

EPISODE 181- Four Updates in Ten Minutes

This week I briefly present a few privacy updates.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.

Listen to THIS episode at https://soundcloud.com/user-98066669/181-four-updates-in-ten-minutes

Listen to ALL episodes at https://inteltechniques.com/podcast.html

or Subscribe at: RSS / iTunes / Stitcher  / Spotify


SHOW NOTES:

INTRO:

None

FOUR UPDATES IN TEN MINUTES:

Discussion

OSINT:

None


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon: https://amzn.to/2B5svbH


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 181

The Privacy, Security, & OSINT Show – Episode 180

Posted on July 24th, 2020

EPISODE 180-Contact Management & Crash Reporting Concerns

This week I discuss considerations for contact management, along with several ways your stored contacts are abused, a privacy concern with Wickr and other apps which use third-party crash reporting and analytics, plus an interesting OSINT tip which could partially identify a target’s iPhone serial number and confirm their Apple ID.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.

Listen to THIS episode at https://soundcloud.com/user-98066669/180-contact-management-crash-reporting-concerns

Listen to ALL episodes at https://inteltechniques.com/podcast.html

or Subscribe at: RSS / iTunes / Stitcher  / Spotify


SHOW NOTES:

INTRO:

Casio Data-Cal DC-10

CONTACT MANAGEMENT:

The Problems
Things to Avoid
Better Options
Extreme Options
Importing from Contacts Apps
Considerations

CRASH REPORTING CONCERNS:

Wickr incident

OSINT:

https://www.smartphoneperformancesettlement.com/submit-claim.php


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon: https://amzn.to/2B5svbH


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 180

The Privacy, Security, & OSINT Show – Episode 179

Posted on July 17th, 2020

EPISODE 179-While We Were Away

This week I dive into all of the Privacy, Security, and OSINT topics which I missed while completing the first Privacy Crash Course. There are many important topics to discuss.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.

Listen to THIS episode at https://soundcloud.com/user-98066669/179-while-we-were-away

Listen to ALL episodes at https://inteltechniques.com/podcast.html

or Subscribe at: RSS / iTunes / Stitcher  / Spotify


SHOW NOTES:

INTRO:

De-funding Cyber Crimes Units

WHILE WE WERE AWAY:

Cash being refused at stores
US Bank concerns (again)
Listening devices snooping when accidentally triggered
Spycloud public criticisms
Spycloud malware notification
Yahoo employee avoids jail for snooping through your email
Avoiding email scanning services
LinkedIn monitoring your iOS clipboard
Mozilla’s new VPN
Firefox Containers new feature

OSINT:

https://leakix.net


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon: https://amzn.to/2B5svbH


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 179

The Privacy, Security, & OSINT Show – Episode 178

Posted on July 10th, 2020

EPISODE 178-Privacy Crash Course 05: Listener Questions

This week I tackle 50 listener submitted questions about the Privacy Crash Course episodes.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.

Listen to THIS episode at https://soundcloud.com/user-98066669/178-privacy-crash-course-05-listener-questions

Listen to ALL episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Stitcher  / Spotify


SHOW NOTES:

INTRO:

Listener Question Report

PRIVACY CRASH COURSE 05: LISTENER QUESTIONS:

What Little-Snitch like software do you recommend for Linux?

Do you have any alternatives to MySudo? Twilio often lacks any SMS functionality for virtual numbers, and in some countries charges 14-50$ per number.

What VeraCrypt Encryption option should I use? (AES, Serpent, Twofish, ect.)

we want to download photos from our phones (which as of now are in a faraday bag when they are at or near our house) and we aren’t sure how we will do this. Do we make an exception and turn the phone on in airplane mode at our home so that we can connect a wire to our computer purchased for this purpose? Or do we need to take that new computer to a different location outside of the house everyone time we want to download photos?

It seems that using both ProtonVPN and NetGuard on my Android phone is mutually exclusive (there can be only one VPN app at a given time). Is it so? and if it is, what is the more important app.

What is/are the best method(s) for purchasing a phone as anonymously as possible?

Does Apple have a way of tracking from where I download my OS X iso ? The IP address from where I downloaded it, and from which account? If so, how would you go about obtaining a copy that will not be traced back to you.

Thoughts on Keeper?

What are your recommondation/considerations in regard to FileVault2 keys being retained in memory while the MAC is in the “Sleep” mode? How vulnarable is the MAC in such a situation?
(sudo pmset ‘hibernatemode’ 25)
(sudo pmset destroyfvkeyonstandby 1)

Can you explain the difference between ‘encryption’ when it comes to privacy friendly platforms such as Signal & Wire VS more commonly adopted platforms such as iMessage & WhatsApp?

On your most recent show, you stressed the importance of full disk encryption. I have read on various forums that due to the design and function of SSD, the encryption task should be done first. What should be the proper procedure of encryption for SSD vs HDD?

how would you approach adopting a 2nd android device as a media player/web browser device that will use wifi often and bluetooth occasionally?

I wanted to see your thoughts about: Syncthing / NextCloud / Brew

You’ve said that your iPhone stays in a faraday bag and doesn’t enter your home. At home you use an iPod Touch (I think) via wifi. I’m curious how you utilize the same communication apps on both devices without sharing an Apple ID. For example, if you have MySudo on your iPhone, how do you get the same MySudo data onto your iPod Touch? If, as you say, the devices are never in the same room together, this would prevent the use of a QR code. Wouldn’t it?

Did you go to college and if so what was your major? Also, do you make good money doing privacy stuff.

Once I’ve hardened my iMac and iPhone, how do I harden an iPad?

Were you aware that virustotal is owned by google? I was surprised to hear you recommend knockknock to send executables to virustotal in the latest show. That is a good chunk of unique data to be giving to google.

When creating accounts that require text verification and doesn’t accept VoIP, do you recommend using a paid text verification service

My idea is to buy a crappy, basic phone that just calls and texts, and buy a new SIM card that is in no way identified with my current cell plan. Then, I’ll use that new number, which will NEVER be given out or used for anything else, as the phone number/SMS 2FA for those accounts. I use Google Auth or Yubikey where available, but for example my crypto accounts trace back to a proton mail which cannot be 2FA protected.

You suggest using simple login to avoid having to use your main email address. I have a paid protonmail account. Can I achieve the same thing by creating multiple email addresses in protonmail and using them instead of simple login?

I plan on moving from Android to iPhone. What is the best way to start clean and private? Also what should I do if I plan on purchasing some apps through the app store as well.

is CripText mail a good alternative for ProtonMail.

What is the least stupid way to log into a Google account to both keep it active or do limited things? Email/text forwarding works to get messages from it, but I learned the hard way if you don’t log into the account after a period of time, google will take back your phone number.
IMAP

My daily driver is a Windows 10 home laptop, I can’t replace my Windows OS with Ubuntu at the moment but I do have Ubuntu set up inside of a virtual machine in Windows 10. Does that set-up provide me with any amount of security or does Windows see everything I do inside of VM Ubuntu and send all that data back to Microsoft?

Where to get a Windows LTSC License? Would you recommend it to install on device or in a vm?
(https://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise)

You’ve spoken quite a bit about controlling inflow / outflow of data to various telemetry collectors from Microsoft, Apple, etc. I have found using a service like NextDNS.io, or a Pi-hole, or a Winston privacy devie can accomplish the same without needing to configuration individual machines – they simply block DNS resolution to undesirable sites. Thoughts on the two approaches (individual machine config vs. a DNS blocker)?

You recommend Protonmail but admit you use fastmail for your business. What gives? Why don’t you trust PM for your business?

If I want to put Music on my iPhone, I have to import the music into iTunes first, then send to the phone. I also can’t copy music onto multiple phones. There must be a better way?

I recently heard you talk about your Apple laptops. What happened to using Linux? WTF?

You said to be wary of Tutanota since they are in a 14 eyed country but then said not to worry about wire being in the US. WTF?

In episode 177 you indicated that OneDrive was not a good product for those who are privacy conscious. What cloud storage product, if any, would you recommend instead of OneDrive?

SIMPLELOGIN: Is it zero knowledge i.e. if subjected to a court order could they reveal the protonmail forwarding email and all the aliases?

Are you certain (and how) you can trust people that are building LibeageOS or GrapheneOS to not put backdoors in them?

does having multiple separate gmail (or icloud) accounts, including, for example, one dedicated to each important financial account, materially increase security?

If I do Full Disk Encryption for my current Mac computer, all files get wiped out?

What do you think about syncing Keepass’ db with Dropbox on different devices?

Phone numbers that are used in mySudo app– are those vulnerable to SIM swap attacks?

What are your thoughts about the recent negative reviews of Signal due to cloud storage of the PIN protected profile?

How do you configure your uBlock Origin?

You mentioned several mail providers in the email and messengers crash course, but I noticed you never really discuss using MySudo. Is there a reason you don’t really mention using the MySudo email address and instead opt for recommending Anonaddy and Simple Login?

What are your thoughts on sophisticated fingerprinting techniques?

What is best practice for using ones real name in an email address? Should anyone ever consider creating an email address that contains ones real name?

Is there anything in Extreme Privacy that you would not recommend to someone with a security clearance?

How do you pay for mysudo on android when they only accept payment from google play? Also, any way to DL to LineageOS?

Recommendation for Linux laptop?

Recommended email Client if you are in a Windows Environment and want to POP or IMAP your email.

Can you explain the benefit of keeping your files in a Veracrypt container when the computer is already encrypted? Is this just to mitigate your exposure if someone has access to your computer when it is unlocked?

In India we cannot buy a sim card without providing some form of ID card, what to do?

If you use Firefox, but you still Google services (youtube or Maps), how would you recommend to block Google from gathering your info? You brought up a way to “fence in” sites in Firefox, is that the only thing? Would you recommend something else?

Do you recommend the Librem or Pinephone at this point?

Since only one laptop, POP over IMAP? Workaround for lack of POP support with ProtonMail bridge?

BOOK:

Extreme Privacy 2nd Edition: https://inteltechniques.com/book7.html

NEXT WEEK:

Next week I dive into all of the Privacy, Security, and OSINT topics which I missed while completing the first Privacy Crash Course.


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon (Extreme Privacy Book): https://amzn.to/2B5svbH


Filed under OSINT, Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 178

The Privacy, Security, & OSINT Show – Episode 177

Posted on July 3rd, 2020

EPISODE 177-Privacy Crash Course 04: Computer Configuration

This week we wrap up the first Privacy Crash Course with a conversation about operating system settings and configurations.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.

Listen to THIS episode at https://soundcloud.com/user-98066669/177a

Listen to ALL episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Stitcher  / Spotify


SHOW NOTES:

INTRO:

My First PC

UPDATES:

Listener questions episode next week

PRIVACY CRASH COURSE 04: COMPUTER CONFIGURATION:

OOSU10 (Free): https://www.oo-software.com/en/shutup10
Glasswire (Free): https://www.glasswire.com
Patch My PC (Free): https://patchmypc.com/home-updater-download
KnockKnock (Free): https://objective-see.com/products/knockknock.html
Little Snitch ($): https://obdev.at/products/littlesnitch/index.html
Lulu (Free): https://objective-see.com/products/lulu.html
MacUpdater ($): https://www.corecode.io/macupdater/
BleachBit (Free): https://www.bleachbit.org/
Veracrypt (Free): https://www.veracrypt.fr/en/Introduction.html

BOOK:

Extreme Privacy 2nd Edition: https://inteltechniques.com/book7.html

NEXT WEEK:

Privacy Crash Course Q & A


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon (Extreme Privacy Book): https://amzn.to/2B5svbH


Filed under Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 177

The Privacy, Security, & OSINT Show – Episode 176

Posted on June 26th, 2020

EPISODE 176-Privacy Crash Course 03: Mobile Devices

This week I continue the privacy crash course with a detailed discussion about mobile devices. If you apply only one privacy strategy from this entire show toward your own daily habits, this should be it.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.

Listen to THIS episode at https://soundcloud.com/user-98066669/176-privacy-crash-course-03-mobile-devices

Listen to ALL episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Stitcher  / Spotify


SHOW NOTES:

INTRO:

Mobile Device Scenario

PRIVACY CRASH COURSE 03: MOBILE DEVICES

Concerns

Hardware
Apple: iPhone SE (New version)
Android: Pixel 3a (https://amzn.to/31eRnc0)
LineageOS: https://lineageos.org/
GrapheneOS: https://grapheneos.org/

Apple/Google Accounts

Service
Mint: https://amzn.to/3fZBB91

Settings

Apps
Lockdown Firewall: https://lockdownhq.com/
NetGuard Firewall: https://www.netguard.me/
Firefox Focus: https://support.mozilla.org/en-US/kb/focus

Camera Stickers: https://amzn.to/2NqaW98
Mic Blocker (3.5mm): https://amzn.to/385fDyP
Mic Blocker (Lightening): https://amzn.to/3i1SSQK

VOIP
MySudo: https://mysudo.com/
Linphone: https://www.linphone.org/
Twilio: www.twilio.com/referral/9FGpxr

Faraday Bags: https://amzn.to/2B6XSTJ

Challenges

Extreme Privacy 2nd Edition: https://inteltechniques.com/book7.html


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon (Extreme Privacy Book): https://amzn.to/2B5svbH


Filed under Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 176

The Privacy, Security, & OSINT Show – Episode 175

Posted on June 19th, 2020

EPISODE 175-Privacy Crash Course 02: Email & Messengers

This week I continue the Privacy Crash Course and we tackle truly secure email and instant messenger services.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.

Listen to THIS episode at https://soundcloud.com/user-98066669/175-privacy-crash-course-02-email-messengers

Listen to ALL episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Stitcher  / Spotify


SHOW NOTES:

INTRO:

Privacy Crash Course Introduction

PRIVACY CRASH COURSE 02: EMAIL & MESSENGERS

Protonmail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
Tutanota: https://tutanota.com/
Anonaddy: https://anonaddy.com/
Simple Login: https://simplelogin.io/
CheckTLS: https://www.checktls.com/
Signal: https://signal.org
Wickr: https://wickr.com/
Wire: https://wire.com/en/download/
MySudo: https://mysudo.com/
Session: https://getsession.org/
Book: Extreme Privacy-Second Edition


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon (Extreme Privacy Book): https://amzn.to/2B5svbH


Filed under Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 175

The Privacy, Security, & OSINT Show – Episode 174

Posted on June 12th, 2020

EPISODE 174-Privacy Crash Course 01: Passwords & 2FA

This week I begin the Privacy Crash Course with a conversation around passwords and 2FA. Afterward, I have some thoughts about the recent concerns regarding Apple IDs and the Brave Browser.

Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.

Listen to THIS episode at https://soundcloud.com/user-98066669/174-privacy-crash-course-01-passwords-2fa

Listen to ALL episodes at https://inteltechniques.com/podcast.html

or Subscribe at:

RSS / iTunes / Stitcher  / Spotify


SHOW NOTES:

INTRO:

Privacy Crash Course Introduction

PRIVACY CRASH COURSE 01: PASSWORDS & 2FA

BitWarden: https://bitwarden.com/
KeePassXC: https://keepassxc.org/
KeePassXC Browser: https://addons.mozilla.org/en-US/firefox/addon/keepassxc-browser/
Yubikey: https://amzn.to/2HZlT0Z
OnlyKey: https://amzn.to/2CVUF7l
Authy: https://authy.com/

UPDATES:

https://inteltechniques.com/blog/2020/06/08/apple-id-creation-update/
https://www.coindesk.com/brave-browsers-affiliate-link-controversy-explained


Data Removal Workbook: https://inteltechniques.com/data/workbook.pdf

Affiliate Links (products we use):
VPN Considerations: https://inteltechniques.com/vpn.html
ProtonMail: http://proton.go2cloud.org/aff_c?offer_id=15&aff_id=1519
ProtonVPN: https://proton.go2cloud.org/aff_c?offer_id=6&aff_id=1519
PIA VPN: https://www.privateinternetaccess.com/pages/buy-vpn/crimeinfo
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Fastmail: https://ref.fm/u14547153
Amazon (Extreme Privacy Book): https://amzn.to/2B5svbH


Filed under Podcast, Privacy, Security | Comments Off on The Privacy, Security, & OSINT Show – Episode 174

Search

Recent Posts