How do you protect or setup your e-mails for banking purposes?

Status
Not open for further replies.
What are you asking about exactly?

Email is inherently flawed, which is why EMIs and‌ banks usually don't send anything sensitive via email.

While using Protonmail, Tutanota, Criptext, or other‍ encrypted email service can increase your email security (especially if you are emailing to other⁠ users of the same service, of use PGP), they don't help you avoid the fundamental⁤ insecurities with email.
 
What methods do you‌ use to keep yourself safe regarding banking or other sensitive account management/control?
 
From a technical perspective?

You're only as safe as the weakest link in your chain.‌

Make sure you are using the latest security updates of whatever device and software you‍ have. Choice of operating system (for your phone and for your laptop) can also be⁠ a factor.

Use strong passwords and enable two-factor authentication (2FA) wherever possible. Avoid 2FA via⁤ SMS because it leaves you vulnerable to SIM cloning.

Use a password manager to make⁣ sure your passwords are long and complex. If you want to go all the way,⁢ consider one with YubiKey support to enable 2FA of your password manager: Yubico | YubiKey︀ strong two factor authentication

Some free options:
KeePassXC: KeePassXC Password Manager Based on KeePass and︁ KeePassX. There KeePass apps for Android and iOS, too.
Bitward: Open Source Password Management Solutions︂ | Bitwarden

Look at PrivacyTools (PrivacyTools - Encryption Against Global Mass Surveillance) for︃ information about how to improve your privacy, which might also affect security by reducing risk︄ of exposure to malicious scripts and trackers.

Avoid public Wi-Fi networks, especially if they are︅ not encrypted.

In most cases, VPN doesn't add anything for security, unless you are in︆ an ultra repressive country like China. But if you find yourself in an airport lounge︇ with no 4G coverage and a dodgy Wi-Fi, a good and trusted VPN is better︈ than no VPN.
 
What is the problem with using public︈ unencrypted Wi-Fi as long as your traffic is SSL?
 
Thanks a lot! Let me ask a︈ few questions.
1. What can you use as a replacement for 2FA with SMS?
2. How do you trust password managers? (Unless you compile the source code yourself)
3. Popular︉ VPNs have features like these: data encryption (AES-128), data authentication (GCM), handshake (RSA-2048) and HTTPS︊ port for connection. These won't keep you safe?
4. How safe is using your mobile︋ hotspot with your computer in public?
 
1. Google Authenticator, Authy
2. I dont know either lol.
3. VPNs⁢ HTTPS feature only protects you from HTTP connection accidentally made by the website. However if︀ your original traffic is not SSL (not HTTPS) you are open for the man in︁ the middle attack by your VPN provider.
4. As safe as your mobile device is.︂ If it doesnt get hacked, then you are good.
 
You are talking about SSL between VPN and your machine. There is another‌ SSL under this VPN SSL. Two SSL on top of each other. Basically nothing stops‍ your VPN from performing MITM on you if you dont have underlying SSL encryption (under⁠ SSL given by VPN provider)
 
Almost none. Probably just an old fear from when‍ it was easier to spoof certificates.

1. As mentioned, Authy and Google Authenticator are among the most popular.

2. Trust is︀ ultimately a personal choice. I tend to trust popular open source projects with many contributors︁ and widespread usage among technically minded people more than closed-source products. I'd rather use KeePass︂ or Bitwarden over Dashlane or LastPass.

3. Think of VPN as nothing more than a︃ way to watch Netflix from other countries and, possibly, improve your personal privacy. I don't︄ mean to imply that VPNs are bad. But they do not in most cases make︅ your internet experience any safer.

4. It depends on what encryption your hotspot uses but︆ if it's any modern phone, chances are it'll be just as safe as using your︇ phone directly.

Some phones don't rotate the password very often so, just as a precaution,︈ make sure you change your hotspot password every once in a while.
 
I would also recommend encrypting your drives and USB sticks with VeraCrypt and/or FileVault.
 
The first question you should ask is - who is your enemy? And‌ then adjust your opsec appropriately.

Are you perhaps worries about...
- someone logging into your‍ email and reading sensitive data
- someone sending you (or your colleagues) malicious links to⁠ spyware, ransomware etc.
- your email being abused for something like social engineering or CEO⁤ fraud
- government subpoeaning the email provider and getting your data
- reliability and accessibility⁣ of the service in all circumstances

Your questions
1) probably everything is better than SMS⁢ (physical token, Google Authenticator, bank app, Authy)

2) there are some desktop open-source ones if︀ you are paranoid

3) you can never be sure so use HTTPS always on and︁ also including DNS over TLS which can be biggest vulnerability. For VPN, always use anonymous︂ account details and pay anonymously. If you don't trust VPN, use Tor.
Unfortunately some countries︃ (think Kazakhstan, UAE...) possibly have access to certificate authorities so they can fake your connection︄ destination and do MITM attack even over HTTPS without you noticing. This is however very︅ high profile stuff, e.g. if you are a disident or enemy of the state.

4) use strong password and don't name your hotspot with a name that is connected to︆ you.

If you are paranoid, read e.g. the book from Edward Snowden, in one chapter︇ he writes about how he used the internet when his enemy was the NSA and︈ he couldn't afford to make a mistake.
 
Status
Not open for further replies.

JohnnyDoe.is is an uncensored discussion forum
focused on free speech,
independent thinking, and controversial ideas.
Everyone is responsible for their own words.

Quick Navigation

User Menu