Internet Security

Securing your digital life, part one: The basics

Enlarge / Artist’s impression of how to keep your digital stuff safe from all kinds of threats.Aurich Lawson | Getty Images reader comments 204 with 108 posters participating, including story author Share this story Share on Facebook Share on Twitter Share on Reddit Securing your digital life Securing your digital life, the finale: Debunking worthless…

Artist's impression of how to keep your digital stuff safe from all kinds of threats.
Enlarge / Artist’s impression of how to keep your digital stuff safe from all kinds of threats.
Aurich Lawson | Getty Images

reader comments

204 with 108 posters participating, including story author

Securing your digital life

  • Securing your digital life, the finale: Debunking worthless “security” practices
  • Securing your digital life, part three: How smartphones make us vulnerable
  • Securing your digital life, part two: The bigger picture—and special circumstances
  • Securing your digital life, part one: The basics

View more stories

I spend most of my time these days investigating the uglier side of digital life—examining the techniques, tools, and practices of cyber criminals to help people better defend against them. It’s not entirely different from my days at Ars Technica, but it has given me a greater appreciation for just how hard it is for normal folks to stay “safe” digitally.

Even those who consider themselves well educated about cyber crime and security threats—and who do everything they’ve been taught to do—can (and do!) still end up as victims. The truth is that, with enough time, resources, and skill, everything can be hacked.

The key to protecting your digital life is to make it as expensive and impractical as possible for someone bent on mischief to steal the things most important to your safety, financial security, and privacy. If attackers find it too difficult or expensive to get your stuff, there’s a good chance they’ll simply move on to an easier target. For that reason, it’s important to assess the ways that vital information can be stolen or leaked—and understand the limits to protecting that information.

Did you really think we were going to be able to get through a cybersecurity article without at least one guy-in-a-ski-mask-with-a-laptop stock photo?
Enlarge / Did you really think we were going to be able to get through a cybersecurity article without at least one guy-in-a-ski-mask-with-a-laptop stock photo?
Pinopic / Getty Images

In part one of our guide to securing your digital life, we’ll talk briefly about that process and about basic measures anyone can take to reduce risks to their devices. In part two, available here, we’ll address wider digital identity protection measures, along with some special measures for people who may face elevated risks. But if you’re looking for tips about peanut butter sandwich dead drops to anonymously transfer data cards in exchange for cryptocurrency payments… we can’t help you, sorry.

You are not Batman

A while back, we covered threat modeling—a practice that encompasses some of what is described above. One of the most important aspects of threat modeling is defining your acceptable level of risk.

Advertisement

We make risk-level assessments all the time, perhaps

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Internet Security

Trump administration officials say Secret Service is investigating Comey’s ’86 47′ social media post

Homeland Security Secretary Kristi Noem said Thursday that federal law enforcement is investigating a social media post made by former FBI Director James Comey that she and other Republicans claim is a call for violence against President Donald Trump…

Homeland Security Secretary Kristi Noem said Thursday that federal law enforcement is investigating a social media post made by former FBI Director James Comey that she and other Republicans claim is a call for violence against President Donald Trump…
Read More

Continue Reading
Internet Security

Oregon passes bill to establish legal control standards for digital assets

Key Takeaways Oregon passed Senate Bill 167 to update commercial laws and include digital assets in the UCC. The new law allows digital assets to be used as collateral and recognizes electronic records and signatures. Share this article Oregon has enacted Senate Bill 167, updating the state’s commercial laws to incorporate digital assets into the

Key Takeaways

  • Oregon passed Senate Bill 167 to update commercial laws and include digital assets in the UCC.
  • The new law allows digital assets to be used as collateral and recognizes electronic records and signatures.

Share this article

Oregon has enacted Senate Bill 167, updating the state’s commercial laws to incorporate digital assets into the Uniform Commercial Code (UCC).

The legislation, signed by Governor Tina Kotek on May 7, introduces UCC Article 12, which creates a legal framework for digital assets including crypto assets, tokenized records, and electronic money.

The bill amends Article 9 to allow digital assets to be used as collateral in secured transactions. It also updates several UCC articles to recognize electronic records, signatures, and hybrid transactions to support digital commerce.

The new law includes transitional provisions that maintain the validity of transactions made before the act’s effective date and provides a one-year period for existing security interests to comply with the new regulations.

Before these changes, there was legal uncertainty about how digital assets fit into existing commercial laws, especially when used as collateral or transferred between parties. The UCC amendments clarify how rights in these assets can be legally controlled, perfected, and enforced.

Apart from SB 167, House Bill 2071 is another crypto-related bill introduced in Oregon.

This proposed legislation focuses on blockchain and digital asset rights. It is aimed at protecting and promoting the use of Bitcoin and other digital assets in the state by limiting regulatory barriers and clarifying the legal framework for blockchain-based activities.

Some of the highlights of the bill include a prohibition on state and local governments from restricting or impairing a person’s ability to accept digital assets as payment for lawful goods and services, as well as the right to conduct peer-to-peer transactions via blockchain or digital asset networks.

The bill is still in the early stages of the legislative process and has not yet advanced to a vote in either the House or the Senate.

Unlike most US states, Oregon lawmakers have not proposed any bill to create a state Bitcoin reserve as of now.

Share this article

?xml>
Read More

Continue Reading
Internet Security

White House rejects parts of Trump advisers’ sovereign wealth fund proposal

Key Takeaways The White House has rejected parts of a sovereign wealth fund proposal created by Trump’s advisers. The details of the sovereign wealth fund are still under debate with no final decisions announced yet. Share this article The White House has opposed certain elements of a sovereign wealth fund proposal developed by Treasury Secretary

Key Takeaways

  • The White House has rejected parts of a sovereign wealth fund proposal created by Trump’s advisers.
  • The details of the sovereign wealth fund are still under debate with no final decisions announced yet.

Share this article

The White House has opposed certain elements of a sovereign wealth fund proposal developed by Treasury Secretary Scott Bessent and Commerce Secretary Howard Lutnick at President Trump’s request, according to a new report from CBS News.

The plan, reportedly delivered by early May, follows Trump’s February executive order directing the Treasury and Commerce departments to develop a framework for a US sovereign wealth fund within 90 days.

The order fueled speculation that the fund might be used to acquire Bitcoin on behalf of the US government.

However, at the time, Bessent and Lutnick said that the fund would indeed focus on warrants, equity, and other non-crypto investments. Still, David Sacks, Trump’s crypto czar, indicated that Bitcoin could be included in the fund’s portfolio.

That no longer appears to be the case after Trump signed a separate executive order establishing a strategic Bitcoin reserve and a digital asset stockpile on March 6, which suggests a standalone approach to crypto holdings.

There were also rumors that the fund might be financed through tariffs and other revenue sources despite ongoing budget deficits. But Lutnick later clarified that tariffs would not be used to support the sovereign wealth fund.

According to the CBS News report, White House spokesperson Kush Desai said the Treasury and Commerce Departments have developed plans in response to Trump’s directive, but no final decisions have been made.

The administration, Desai added, continues to view the initiative as part of its broader effort to safeguard national and economic security.

Details of the fund’s structure and purpose remain under discussion, with no formal announcement expected in the near term.

Sources say Trump has not yet decided how the fund’s proceeds would be used, though he has previously floated the idea of it taking a stake in TikTok, which faces a potential US ban unless ByteDance divests.

Regarding the US Strategic Bitcoin Reserve and the Digital Asset Stockpile, Bessent and Lutnick are also tasked with outlining operational guidelines, custody frameworks, and acquisition strategies. These plans are expected to remain separate from the sovereign wealth fund initiative and are designed to be budget-neutral.

Share this article

?xml>?xml>?xml>
Read More

Continue Reading
Internet Security

Crypto Security Breach at Lido DAO Triggers Governance Response

TLDR Lido DAO started an emergency vote to rotate a compromised Chorus One oracle The exploit drained ETH balance and likely resulted from a hot wallet private key leak The issue is restricted to one oracle and is not system-wide Cybersecurity remains a critical issue for cryptocurrency and DeFi Over $2 billion in crypto was

TLDR Lido DAO started an emergency vote to rotate a compromised Chorus One oracle The exploit drained ETH balance and likely resulted from a hot wallet private key leak The issue is restricted to one oracle and is not system-wide Cybersecurity remains a critical issue for cryptocurrency and DeFi Over $2 billion in crypto was […]
The post Crypto Security Breach at Lido DAO Triggers Governance Response appeared first on Blockonomi…
Read More

Continue Reading