<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Pragmatic Paranoia]]></title><description><![CDATA[Being paranoid doesn't mean they are not after you]]></description><link>https://pragmaticparanoia.com/</link><image><url>https://pragmaticparanoia.com/favicon.png</url><title>Pragmatic Paranoia</title><link>https://pragmaticparanoia.com/</link></image><generator>Ghost 5.38</generator><lastBuildDate>Thu, 26 Mar 2026 09:31:43 GMT</lastBuildDate><atom:link href="https://pragmaticparanoia.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Mastering ChatGPT: 8 Pro Tips for Developers]]></title><description><![CDATA[<p><em>Maximize your ChatGPT experience with our top 8 tips for effective AI communication. Discover how to reframe negatives, maintain a clear context, and ask precise questions to receive accurate, helpful responses. Learn how to troubleshoot code, rephrase queries, and set context for optimal results. Unlock the full potential of ChatGPT</em></p>]]></description><link>https://pragmaticparanoia.com/mastering-chatgpt-8-tips-for-developers/</link><guid isPermaLink="false">6412f6b0d4bce4da1c67745f</guid><category><![CDATA[ChatGPT]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Thu, 16 Mar 2023 11:12:39 GMT</pubDate><content:encoded><![CDATA[<p><em>Maximize your ChatGPT experience with our top 8 tips for effective AI communication. Discover how to reframe negatives, maintain a clear context, and ask precise questions to receive accurate, helpful responses. Learn how to troubleshoot code, rephrase queries, and set context for optimal results. Unlock the full potential of ChatGPT and enhance your AI interactions today.</em></p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>With the increasing prevalence of AI-powered language models, such as ChatGPT, it is essential to understand the best practices when engaging with them. These tips aim to help you optimize your interaction with ChatGPT, ensuring accurate and effective responses. In this blog post, we will discuss five useful tips and provide three additional ones for an even better experience.</p><h2 id="tip-1-reframe-negatives-as-inverse-positives">Tip 1: Reframe Negatives as Inverse Positives</h2><p>As large language models (LLMs) often struggle with understanding negatives, it&apos;s better to rephrase your queries using inverse positives. For example, instead of saying, &quot;Ensure no methods include the function except the third one,&quot; try phrasing it as, &quot;Ensure only the third method includes the function.&quot;</p><h2 id="tip-2-keep-the-context-clear-and-error-free">Tip 2: Keep the Context Clear and Error-Free</h2><p>ChatGPT&apos;s performance is heavily influenced by the context of your conversation. Typos or errors can lead to less accurate and less intelligent responses. To prevent this, always double-check your messages for clarity and start a new chat if previous errors have piled up.</p><h2 id="tip-3-ask-chatgpt-for-better-requests">Tip 3: Ask ChatGPT for Better Requests</h2><p>To improve the quality of your requests, ask ChatGPT to help you rephrase them. By requesting a more clearly worded version, you can start a new chat and provide that refined request to ChatGPT, which can lead to more accurate and helpful responses.</p><h2 id="tip-4-troubleshoot-bugs-one-at-a-time">Tip 4: Troubleshoot Bugs One at a Time</h2><p>When dealing with multiple instances of the same bug in your code, first ask ChatGPT to solve a specific instance of that bug. Once it provides a solution, ask how you can apply the same fix to the entire codebase. This approach is more effective than asking for a comprehensive solution right away, as it reduces the chances of introducing new bugs.</p><h2 id="tip-5-use-clear-and-specific-questions">Tip 5: Use Clear and Specific Questions</h2><p>The more precise your question, the better the response from ChatGPT. Vague or ambiguous questions may result in unclear or irrelevant answers. To maximize the effectiveness of your interactions, always ask specific, well-structured questions.</p><h2 id="tip-6-dont-hesitate-to-rephrase">Tip 6: Don&apos;t Hesitate to Rephrase</h2><p>If ChatGPT doesn&apos;t provide a satisfactory answer, try rephrasing your question or request. Different phrasing can sometimes yield better results, as it may better align with the model&apos;s understanding of the topic.</p><h2 id="tip-7-set-context-and-limitations">Tip 7: Set Context and Limitations</h2><p>When asking for information or suggestions, it can be helpful to provide context and set limitations. For example, if you need help with a coding problem, specify the programming language and any constraints or requirements. This will guide ChatGPT in generating more appropriate and targeted responses.</p><h2 id="bonus-tip-8-let-chatgpt-be-your-rubber-duck">Bonus Tip 8: Let ChatGPT Be Your Rubber Duck</h2><p>When you&apos;re stuck on a problem, consider using ChatGPT as your rubber duck for debugging. Sometimes, just explaining the issue to the AI in a clear and concise manner can help you gain new insights or reveal overlooked details. By treating ChatGPT as your rubber duck, you not only benefit from its potential solutions but also from the clarity that comes with articulating your thoughts.</p><h2 id="conclusion">Conclusion</h2><p>To get the most out of your interactions with ChatGPT, follow these 8 tips for effective AI communication. This will help you maximize your ChatGPT experience and unlock its full potential. By reframing negatives, maintaining a clear context, and asking precise questions, you can receive more accurate and helpful responses from ChatGPT. Don&apos;t forget to troubleshoot code step-by-step, rephrase queries when needed, and set context for optimal results. Embracing these best practices will greatly enhance your AI interactions and help you make the most of your ChatGPT experience. Happy chatting!</p>]]></content:encoded></item><item><title><![CDATA[Does Google Authenticator Work Offline?]]></title><description><![CDATA[Google authenticator is a great way to keep your email accounts secure. Can you use it when you're not connected to the internet? Yes!]]></description><link>https://pragmaticparanoia.com/does-google-authenticator-work-offline/</link><guid isPermaLink="false">620cae8a73978c062ba80619</guid><category><![CDATA[Security]]></category><category><![CDATA[Password Managers]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Wed, 16 Feb 2022 08:01:53 GMT</pubDate><content:encoded><![CDATA[<!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><h2 id="so-what-is-google-authenticator">So what is google authenticator?</h2><p>When a black-hat steals your password, you might be locked out and your sensitive information might be viewed or even deleted. The doxxers could also pretend to be you and send you unwanted or harmful emails to all of your contacts. They could even reset your other accounts&apos; passwords such as banking, shopping, etc. with your account.</p><h2 id="if-you-lose-access-to-your-account-and-everything-in-it-what-would-you-do">If you lose access to your account and everything in it, what would you do? </h2><p>With Google Authenticator, you can protect your accounts against password theft for free. Among the services that use it are Gmail, Facebook, Twitter, Instagram, and more. It is easy to set up and can be used as part of a process known as two-factor authentication (2FA). Two-factor authentication simply means authentication which is made up of two parts, so not only a login and password but an additional code request.</p><p>Google authenticator works slightly differently from the method of sms codes being sent directly to your mobile which you then later enter to be able to login (making it difficult for doxxers who also could potentially clone your phone). It&#x2019;s because it&#x2019;s also time based. Essentially, the Google authenticator goes with the common knowledge that it would be that your device and the code sent would only work if they were in-sync and were being used around the same time. </p><p>Instead, a random code is generated by the app (iOS/Android) for use when you log into various services. It is done through a QR code which uses an algorithm based on scanning and synchronising of time where the 6-digit passcode is made up of the time being sent and the secret key to form an original pass code. It is technically possible to receive the code via text message every time, but the Google Authenticator app provides an added layer of security asking you for this algorithmic code which rotates every time you try to login. </p><p>A devoted hacker can socially engineer an attack against your phone company using SMS-based 2FA. By generating codes on your phone using algorithms, Google Authenticator eliminates the possibility of SMS-based attacks.</p><p>You must enter a password and a unique verification code which is sent to your phone. This will keep the bad guys out because even if these black-hats have your password it won&#x2019;t be enough for them to hack into your account as you have the additional verification system now which requires your phone and time of verification. </p><h2 id="so-does-google-authenticator-work-offline">So does google authenticator work offline?</h2><p>The short answer is <strong>yes</strong>.</p><p>Mobile or internet connections are not required to use Authenticator. The secret key is an alphanumeric code of 16 or 32 characters generated by the system. The software generates the same code as Google with the help of <a href="https://en.wikipedia.org/wiki/Time-based_one-time_password?ref=pragmatic-paranoia">TOTP technology</a>, which does not require an internet connection.</p><p>The only thing it depends on is the current time and a shared secret (which is shared at the time of setup).</p><p>It can then simply combine the secret and the current time to generate the one-time password (OTP) (usually 6 or so digits). Using the same password on both servers, the remote server can compare them.</p><p>Based on previous codes, it is impossible to predict the next one for OTP. This means that as long as only two parties know the secret, each OTP will be secure.</p><p>We hope this guide has helped you. You may also be interested in our article <a href="https://pragmaticparanoia.com/do-password-managers-work-offline/"><em>Do Password Managers Work Offline?</em></a> or our other ways of keeping the black hats out of your personal details on our blog <a href="https://pragmaticparanoia.com/">Pragmatic Paranoia;</a> paranoia at its best!</p><p><br></p>]]></content:encoded></item><item><title><![CDATA[Should I Use My Real Name On Stack Overflow?]]></title><description><![CDATA[Are you a programmer? Having a Stack Overflow account can give a boost to your career, but should you use your real name for that? If you're battling the same confusion, this article is for you.]]></description><link>https://pragmaticparanoia.com/should-i-use-my-real-name-on-stack-overflow/</link><guid isPermaLink="false">6208020473978c062ba805fb</guid><category><![CDATA[Privacy]]></category><category><![CDATA[Stack Overflow]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Fri, 11 Feb 2022 18:52:00 GMT</pubDate><content:encoded><![CDATA[<p>Stack Overflow is one of the fastest-growing Q&amp;A websites. It has hundreds and thousands of programmers who all come together to share their questions and hang out together. It was created in 2008 by Jeff Atwood and Joel Spolsky. Since then, the platform has experienced a massive spike in the number of followers because of the flexibility they offer to their users.</p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>Out of all the benefits of using Stack Overflow, choosing any desired name to make a programmer account sits at the top.</p><p>It is an open-source public platform, all it requires is a simple membership and active participation to earn reputation points and badges, regardless of the name you choose.</p><p>Whether you&apos;re on Stack Overflow to find jobs or get answers to your questions, choosing the right name makes all the difference. And is a great way to find feet on this platform, even as a beginner.</p><h2 id="should-you-use-your-real-name-on-stack-overflow">Should You Use Your Real Name On Stack Overflow?</h2><p>Since Stack Overflow is more of a job forum, a good rule of thumb is to use your real name on Stack Overflow. It gives a professional impression to your prospects.</p><p>However, you have the option to either use your initials only or your full name. If you use your full name, anyone can easily find your Stack Overflow profile on Google.</p><h2 id="is-it-safe-to-use-your-real-name-as-a-username">Is It Safe To Use Your Real Name As A Username?</h2><p>Unlike many informal social media platforms, Stack Overflow is quite safe and professional. It allows its users to use their real name as a username without any doubt.</p><p>In case you&apos;re not comfortable using your real name for safety reasons, you can choose a screen name&apos;s effect. However, that must be easy to read, pronounce, and free of any offensive words. But, violating the platform&apos;s terms and policies may put you in serious consequences or even ban your account in the worst scenarios.</p><h2 id="can-i-change-the-name-on-stack-overflow">Can I Change The Name On Stack Overflow?</h2><p>The short answer is yes. Stack Overflow allows its users to change their name any time they want, but that should obey their policies.</p><p>In order to change the name on <a href="https://stackoverflow.com/?ref=pragmatic-paranoia">Stack Overflow</a>, follow the simple steps mentioned below.</p><ol><li>Log in to your Stack Overflow official account.</li><li>Go to your profile page, where all developers hang out.</li><li>Click on the option to edit profile &amp; settings.</li><li>Enter your login credentials again to ensure it&#x2019;s you.</li><li>Now, change your name by choosing another suitable name.</li><li>Click on Done.</li></ol><p>As of now, Stack Overflow is home to over <a href="https://en.wikipedia.org/wiki/Stack_Overflow?ref=pragmatic-paranoia">14 million registered users</a>. It has over 21 million questions and 31 million answers shared so far. This clearly shows that Stack Overflow is not only limited to questions and answers about programming. It also offers numerous opportunities to connect with ideal prospects and drive extra traffic to the desired website.</p><p>Keeping this in mind, the majority of users use Stack Overflow as a middle party to rank on search engines with multiple keywords.</p><h2 id="does-using-your-real-name-on-stack-overflow-help-with-your-career">Does Using Your Real Name On Stack Overflow Help With Your Career?</h2><p>As I said earlier, using your real name on Stack Overflow is beneficial to create an impressive profile and make you sound credible, which may not be the case with using any typical name.</p><p>The majority of users on Stack Overflow or its sibling platform - <a href="https://meta.stackexchange.com/?ref=pragmatic-paranoia">Meta Stack Exchange</a> - prefer using their real name while making their account held responsible for their opinions. Using your real name under the answers also allows you to own the questions and look reliable from the other crowds on the platform.</p><h2 id="is-stack-overflow-an-online-freelance-site">Is Stack Overflow An Online Freelance Site?</h2><p>Yes, Stack Overflow is one of the very few reliable freelance sites. And it&apos;s best for programmers who want to grow their network in as little time as possible because it&apos;s less saturated than other freelance sites.</p><p>As a respectable freelancer, I would recommend you to use your real name on the platform. It will generate a high percentage of happy clients and a greater satisfaction guarantee which is hard to get on other crowded freelance sites.</p><h2 id="is-stack-overflow-stack-exchange-the-same">Is Stack Overflow &amp; Stack Exchange The Same?</h2><p>The basic difference between Stack Exchange and Stack Overflow is their purpose for use. Though both of them are created by the same software, Stack Exchange is more of a Q&amp;A website, giving an open-source platform to let people interact.</p><p>On the other hand, Stack Overflow is owned by Prosus and comes under the flagship of MetaStack used for networking and finding or recruiting programming jobs online.</p><h2 id="can-i-use-pseudonyms-on-stack-overflow">Can I Use Pseudonyms On Stack Overflow?</h2><p>Using pseudonyms on Stack Overflow comes with its set of pros and cons. They are important to consider before you make your account on their official website.</p><p>However, using a pseudonym as your username would probably be different from the name on your CV. Chances are higher that your prospect may have doubts and turn down your CV because of this small mistake.</p><p>Because of this, I would not recommend using a pseudonym on the platform as your name. It may create confusion with the real name that you use in your professional documents, such as a CV.</p><h2 id="conclusion">Conclusion</h2><p>Stack Overflow is one of the largest programming Q&amp;A websites, with hundreds and thousands of questions posted every single day.</p><p>Mostly, the questions are related to a programming language but can also be on relevant topics. The more you answer on Stack Overflow, the more upvotes you get. And the more upvotes you get, the more you get the opportunity to find your ideal prospects.</p><p>However, when you answer a question, it&apos;s posted on the platform under the username of the account. So, whenever someone reaches for a relevant query, your answers have the maximum possibility to pop out on the search engine.</p><p>But what if you used a fake username that doesn&apos;t sound credible, which may hurt your audience&apos;s feelings? Therefore, I would recommend using your real name on this professional platform. You never know when your answers start ranking on the search engine, and you start getting traffic to your official website.</p><p>Now that you know if you should use your real name for a Stack Overflow or not, it would be a lot easier for you to make your official account and be on the safe side.</p>]]></content:encoded></item><item><title><![CDATA[Is Tor Safe Without VPN?]]></title><description><![CDATA[Tor is a private browsing tool that provides anonymity to its users. Is Tor sufficient enough on its own? Is it safe to use Tor without VPN? Let's find out.]]></description><link>https://pragmaticparanoia.com/is-tor-safe-without-vpn/</link><guid isPermaLink="false">6205299b73978c062ba805a5</guid><category><![CDATA[Security]]></category><category><![CDATA[VPN]]></category><category><![CDATA[Tor]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Wed, 09 Feb 2022 15:05:00 GMT</pubDate><content:encoded><![CDATA[<p>The technological world we live in today is not safe for anyone. One <a href="https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds?ref=pragmatic-paranoia">report </a>reveals that every thirty-nine seconds, a data breach happens online. This means that every day, almost thirty thousand websites are hacked worldwide. Because of these data breaches, people use several tools to protect their privacy and information. This tool can be Tor, VPN, or any proxy browser that ensures anonymity.</p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>Out of all these tools, one stands out like a glow stick in the dark. It acts as the primary defense against stalkers. That is Tor.</p><h2 id="what-is-tor">What Is Tor?</h2><p>The word Tor is short for The Onion Routing.</p><p>Naval Research Laboratory employees of the United States designed this software. Initially, the Tor browser served the naval force of the United States. Its primary aim was to conserve the privacy of government communication. Slowly, the browser gained popularity amongst common people. Today, Tor has over four million active users.</p><p>Tor is a private browsing tool that guarantees anonymous surfing. It does this by encrypting the connection many times. Then Tor passes this encrypted information to multiple relays. The relays are spread worldwide and act as layers of protection.</p><p>The best characteristic of Tor is that it is a private browsing tool. This means one organization does not control it. Volunteers sitting around the Globe control all these relays. Hence ensuring safety.</p><h2 id="nodes-that-make-the-tor-work">Nodes That Make The Tor Work:</h2><p>To understand how the Tor browser works, we need to have a good understanding of all of its protective layers.</p><h3 id="tor-guard-node">Tor Guard Node</h3><p>When you search for something on the Tor browser, they first connect you to the<a href="https://www.dan.me.uk/tornodes?ref=pragmatic-paranoia"> Tor guard node</a>. This node is like the main entrance to enter the world of Tor. For every Tor user, there is a set of guard nodes available. Every time you surf the Tor browser, it connects you to one of the Tor guard nodes.</p><p><a href="https://torstatus.blutmagie.de/?ref=pragmatic-paranoia">Tor guard node</a> gets your IP address, but there&apos;s nothing to worry about. This node is hard to crack into, so don&apos;t worry. No cyberpunk can see your IP address or use it to doxx you.</p><h3 id="tor-middle-node">Tor Middle Node</h3><p>Tor middle nodes are what makes the Tor network so big. These nodes/relays can not access the IP address of those surfing Tor. Nor do they know which website you are about to access. When you look something up on Tor, it goes from guard node to middle node in encrypted form. Tor passes the encrypted data from one middle node to another.</p><p>Tor middle nodes add a layer of security. Then your data is passed to the exit node.</p><h3 id="tor-exit-node">Tor Exit Node</h3><p>The final destination of any query entered into the Tor browser is the Tor exit node. Unlike guard nodes, exit nodes do not know your IP address. So, the website you have accessed doesn&apos;t get your real IP address. What it gets instead is the address of the Tor exit node.</p><p>So when people make illegal searches, exit nodes take all the burden. This means many exit nodes of Tor become victims of legal notices and get warnings about being taken down.</p><h2 id="what-are-the-advantages-of-using-tor">What Are The Advantages Of Using Tor?</h2><p>Tor is a private browsing tool that conceals your activity online. It has a feature that resets the cookies when you stop using it.</p><p>When you access a website through the Tor browser, it assures your anonymity. No hacker or government agency can get this information.</p><p>Tor hides the identity of its users as long as they surf on the Tor browser. It is because it promises to keep you anonymous 24/7 that it has become the favorite pick of news reporters and social workers. Tor doesn&apos;t require its users to register themselves or pay hefty fees. It is a private browser that anyone can enter through Firefox, etc.</p><h2 id="is-tor-safe-without-vpn">Is Tor Safe Without VPN?</h2><p>Now that we know all about Tor, let&apos;s throw light on a frequently asked question.<strong> Is Tor safe without VPN?</strong></p><p>To answer that, we must understand what VPN is. And how it differs from Tor.</p><p><strong>VPN</strong> is a virtual private network. It safeguards your identity online by assembling an encrypted network for your data. It is like a hidden tunnel built across a public network, helping you receive and share encrypted data, anonymously.</p><h2 id="what-are-the-advantages-of-using-a-vpn">What Are The Advantages Of Using A VPN?</h2><p>VPN hides your original IP address and allows you to surf unanimously.</p><p>VPN has its servers spread all across the globe. This eliminates the problem of regional limitations. So, you can access the websites of any country easily.</p><p>VPN helps you beat the censorship employed by the government on certain websites. VPN develops a safe connection when you connect your device to public Wi-Fi.</p><h2 id="virtual-private-network-vs-the-onion-routing">Virtual Private Network vs The Onion Routing</h2><p>Both VPN and Tor effectively protect your identity and have areas of expertise. Tor safeguards your privacy when you try to access the websites blocked by your country. VPN helps you surpass the regional restrictions, hence letting you stream your favorite shows.</p><p>Tor servers can not be detected and hence they can be used to access the dark web. In contrast, VPN offers no such service. Instead, it hides your identity from the traditional websites you are accessing. This stops the websites from accumulating your data and selling it.</p><p>Tor ensures no one can find a single trace of what you&apos;ve accessed. Whereas, VPN protects your data from getting hacked when using public Wi-Fi.</p><p>However, Tor and VPN both excel at protecting your identity in different ways. This proves that it is safe to use Tor without VPN. In fact, Tor&apos;s official website doesn&apos;t recommend the use of Tor with VPN. Tor asks its users to make no such attempt unless they are experts. You can jeopardize your safety by using the two tools together without adequate knowledge.</p><p>Though Tor is capable enough of protecting your identity online, know that nothing is hundred percent secure. Several security concerns have been raised in the past decades.</p><h3 id="anyone-can-become-a-tor-node-operator">Anyone Can Become A Tor Node Operator</h3><p>While this decentralization is an advantage, it can quickly turn into a major disadvantage. Since Tor node operators can see your IP address and data, they can easily steal it. One hacker named <a href="https://www.smh.com.au/technology/the-hack-of-the-year-20071113-gdrkxw.html?page=fullpage&amp;ref=pragmatic-paranoia#contentSwap1">Dan Egerstad</a> started operating Tor nodes. In a short period, he gathered a significant amount of personal information.</p><h3 id="you-are-easily-recognizable-when-using-tor-via-public-wi-fi">You Are Easily Recognizable When Using Tor Via Public Wi-fi</h3><p><a href="https://harvardpolitics.com/eldo-kim/?ref=pragmatic-paranoia">Eldo Kim</a>, a Harvard student, used Tor to send out bombing threats. When he accessed the Tor browser with the university&apos;s internet connection, he became easily traceable.</p><h3 id="government-agencies-can-regulate-tor-nodes">Government Agencies Can Regulate Tor Nodes</h3><p>One report reveals that some Tor nodes are run at hefty costs. Let&apos;s say thousands of dollars. No ordinary person would pay that much for nothing. So it is believed these Tor nodes are owned by the government. They use them to collect information about Tor users.</p><h3 id="existence-of-malicious-tor-nodes">Existence Of Malicious Tor Nodes</h3><p>A decentralized system of Tor works on the belief that every node volunteer is 100% true to the cause. That is to protect the identities of all its users. Unfortunately, the truth is quite contrary. In 2016, few researchers came up with their discoveries in a paper named &quot;<a href="https://cdn-resprivacy.pressidium.com/wp-content/uploads/2019/02/10_honions-sanatinia.pdf?ref=pragmatic-paranoia">HOnions: Towards Detection and Identification of Misbehaving Tor HSDirs</a>&#x201C;. The objective of this paper was to illustrate how the group identified 110 malicious Tor relays.</p><h2 id="conclusion">Conclusion</h2><p>Now that you know the good and bad of Tor, it is on you to decide whether it is a good browser for you.</p><p><br></p>]]></content:encoded></item><item><title><![CDATA[Should I Use My Real Name On Discord?]]></title><description><![CDATA[Discord is a great chat application that has a ton of features. But it's also extremely vulnerable to doxxing and hacking. So should you use your real name?]]></description><link>https://pragmaticparanoia.com/should-i-use-my-real-name-on-discord/</link><guid isPermaLink="false">6205185e73978c062ba80544</guid><category><![CDATA[Privacy]]></category><category><![CDATA[Discord]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Tue, 08 Feb 2022 13:51:00 GMT</pubDate><content:encoded><![CDATA[<p>What do <em>BetterThanYou</em>, <em>soldMomforRP</em> and <em>KissmyAxe</em> all have in common?</p><p>Yes- you guessed it, they&#x2019;re all Discord usernames. It&#x2019;s only common sense that dictates to us that we shouldn&#x2019;t be using our actual names on Discord for security reasons. We can also have fun and get creative with selecting our usernames along the way.</p><p>We will also outline how to change your name on Discord and discuss trending security threats currently on Discord and some ways to keep you safe from hackers and doxxers on Discord in this article. So read on to learn how to keep the black hats out from your channel!</p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>But first, in case you don&#x2019;t know about Discord is; it is a messaging platform with voice call abilities similar to programs like Skype or Slack. It&apos;s software which allows you to create channels to interact with others, share media, links and more. Its popularity has risen especially among gamers for sharing updates, features and media. It reportedly has over 250 million users with at least 14 million users logging in daily.</p><h2 id="discord-server-names">Discord Server Names</h2><p>So, we know you shouldn&#x2019;t use your real identity on Discord; but how do you change your name? Here are the steps to change your Discord server name.</p><p>There is a limit to the different ways you can change your nickname on Discord. Here are the main ways:</p><ul><li>The first is through the server settings. To change your username on a single server go ahead and login to discord on any server. Next, you can simply select the server you wish to change the name of. Then you can right click and open the drop-down-menu on the left-hand side of the server. You will see a drop-down arrow on the desktop and three vertical dots (or an ellipsis if you&#x2019;re using a smartphone). </li><li>You can then select a new nickname.</li><li>Click on the name on the left side of the screen. Next, click on &apos;Server Settings&apos; * &apos;Overview&apos;</li><li>By entering it in the textbox, you can change the name of the server. It&#x2019;s as simple as that.</li></ul><p>You may also wish to note that It is only possible to change this setting if you own or administer the server. If you want to change your name, but aren&apos;t sure what kind of name to use, you can learn about some great Discord server names for your battles between servers. Create a Discord server name by matching these words or game names with others.</p><p>But why go through all this trouble of selecting an alias name? Well to keep the hackers and hijackers out of our lives changing our name to an unidentifiable alias is always a good start.</p><p>Especially due to some of these doxxing and scamming trends that we are seeing recently. </p><h2 id="the-ways-black-hats-dox-you">The ways black hats dox you</h2><p>Discord is potentially being used in unforeseeable diabolical ways.This is not only for spreading malware but also as command and control servers. Essentially, Discord is being used as a base for operations led by black hats. The main intent being to steal your credentials (another reason why you shouldn&apos;t expose your true details). </p><p>Other cyber-security news to be aware of it that malware mobs have been using Discord.</p><p>In a devious attempt to spread their malicious programs. This does not mean the doxxers necessarily spread malware across Discord itself, but rather use Discord&#x2019;s CDN for the hosting of their indespicable files. They upload the host file to Discord where victims click a well disguised url.</p><p>This is convenient for doxxers as these links often have Discord&#x2019;s domain name right at the beginning of the url, leading to a great deal of credibility for trusting individuals who are oblivious to such deceptions. A great chunk of people will trust this link because of Discords credibility and happily click download and execute. </p><p>Whatever sneaky kinder-surprise is contained within these particular malevolent links awaiting their victims; we know it&apos;s going to be a bad egg. These links also often spread like wild-fire via forums, emails, etc. These downloadable files are often disguised as cracked versions of games, though are encapsulated by viruses. There may also be cunning mining bots attached. This becomes like an interminable game of Russian-roulette, with more and more malware and links attached in endless cycles of attacks.</p><p>Even if you delete a file you sent via Discord, it can still be found in every chamber with varying degrees of awfulness. Download links will still work in perpetuity for files that appear to stay on Discord servers indefinitely! They will still work even when deleted in Discord itself. As a response to such attacks Discord stated that they rely on a combination of pro-active scanning and reaction based reports to detect malware and viruses. They state that as soon as they are aware they try to eradicate such content immediately. </p><p>A lot of bold claims without many solutions presented by Discord, but in all fairness there is not much to be done except from banning the sharing of such executables or anything that could host them like ZIP and RAR files. Or ultimately if they get really bad they could ban the ability to extract them altogether. </p><p>The devilish deals don&apos;t end there. There have been countless other scams and hacks on Discord. For example, a few months ago researchers discovered that Discord was also being used as a common and control server. In other words, computers which were infected by malware would connect indirectly to a rogue Discord server being fed additional malicious commands.</p><p>The principle behind it is so that it is indistinguishable from all other regular Discord traffic. It would also make it extremely difficult for anti-virus software to discern whether it was a friend sending you ridiculously bad memes or the commands telling a victim computer to send over all of your saved passwords. It is very convenient for doxxers to use Discord for these purposes as it is quick and easy to set-up, compounded by the fact that these thieves need a system to act as a command control server anyway.</p><p>This malware is designed to also steal things like steam credentials and other saved passwords, cookies, and even PayPal and credit card information. The scary thing is that it&apos;s very early days and the devious scams and attacks we predict are only going to keep getting worse over time. We hope that Discord finds ways to mitigate these issues as they become more wide-spread but in the meantime there are precautions that you can take other than changing your name to protect yourself.</p><h2 id="how-to-stop-the-black-hats">How to stop the black hats?</h2><p>Of course do not blindly trust any url links that are shared with you. Also do not click on any files hosted on Discord. Ensure that you are wise about who you allow into your Discord circle. Ensure you take all additional security steps such as the 2 step authentication option which you can read more about here in our article discussing <a href="https://pragmaticparanoia.com/how-to-prevent-getting-doxed-on-discord/">How to prevent getting Doxxed on Discord</a>. </p><p>Here you will find a guide about all the additional security settings concerning Discord, such as how to create roles and rights, how to enable 2fa authentication, and covering topics such as using the right VPN to protect yourself and switching on the Explicit content filter. If you&#x2019;re still afraid and want to know more about avoiding these sharks from gobbling you right up; visit our <a href="https://pragmaticparanoia.com/">blog</a> which provides the latest Cybersecurity news; <a href="https://pragmaticparanoia.com/">Pragmatic Paranoia</a>, paranoia at its best!<br></p>]]></content:encoded></item><item><title><![CDATA[Why Is Java Insecure?]]></title><description><![CDATA[Do you face severe flaws in Java, or think of deploying Java over other languages? Here’s what you need to know about Java and it's insecurities?]]></description><link>https://pragmaticparanoia.com/why-is-java-insecure/</link><guid isPermaLink="false">6205286273978c062ba80576</guid><category><![CDATA[Security]]></category><category><![CDATA[Java]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Mon, 07 Feb 2022 14:59:00 GMT</pubDate><content:encoded><![CDATA[<p>Various programming languages like C, C++, and Python provide all that Java does. Virtual machines, such as the Java Virtual Machine (JVM), operate as a kind of mediator between the program code and the computer when running Java programs under a Runtime Environment (JRE).</p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>You may use Java to create a simple desktop calculator or a large-scale e-commerce website handling hundreds of requests per second. It&apos;s impossible to guarantee 100% security out of the box. When writing code, you must ensure that it can deal with attacks and misleading requests. </p><p>When it comes to software development, <a href="https://www.java.com/en/?ref=pragmatic-paranoia">Java</a> is an excellent choice. Depending on your needs, you can implement any degree of security. Insecure defaults are to blame for a large number of Java security flaws. Developers must now have extensive programming skills to design basic programs that anyone can&apos;t readily hack. The documentation for Java is appalling: it&apos;s not difficult to get things to work, but it&apos;s not always apparent how to do things correctly.</p><p>Your company&apos;s operations and message are more widely disseminated when it is featured in the media. The significance of positive media publicity in your marketing plan cannot be overstated. Getting good press coverage is a great way to build your reputation. Owned, compensated, and earned are the three categories of media coverage.</p><h2 id="why-is-java-insecure">Why Is Java Insecure?</h2><p>Design decisions such as generics, compulsory entity programming, the treatment of unsigned integers, and the inclusion of floating-point arithmetic have been criticized by the Java language and Java system software. </p><p>The performance of Java-written software has been compared to that of other programming languages, notably in its early versions. Complex Java applications that must function with all of the many Java implementations must consider their variations.</p><p>There are a slew of advantages to learning one language over others. In addition to being open-source, the documentation is readily accessible. The options are numerous in terms of third-party libraries. There is also a large community of developers currently using the program.</p><h2 id="what-are-some-major-java-insecurities">What Are Some Major Java Insecurities?</h2><p>When you type in &quot;java insecure&quot; or &quot;java vulnerabilities&quot; into Google, you get many articles recommending that you remove or deactivate Java. However, Java often publishes several security updates at once, and there are still many vulnerabilities to address.</p><p>There will always be problems in software, but the number of flaws Java has, does not seem typical. What&apos;s more perplexing is that if a single architectural choice is causing numerous flaws, why not replace that design? Multiple other programming languages do not have this issue, indicating that whatever Java is doing incorrectly can and should be improved upon. There must be a better answer.</p><h2 id="which-feature-makes-java-insecure">Which Feature Makes Java Insecure?</h2><h3 id="1-code-injections">1. Code Injections</h3><p>Code injections may be performed on any program that takes user input. Your program&apos;s performance may be adversely affected by a code injection if the supplied data has unexpected consequences.</p><h3 id="2-command-injections">2. Command Injections</h3><p>An attacker can execute <a href="https://www.firewalls.com/blog/security-terms/shellcode/?ref=pragmatic-paranoia#:~:text=Shellcode%20is%20a%20special%20type,control%20of%20the%20affected%20system.">shellcode</a> on the server that&apos;s running your application using a Command injection, more frequently known as a &quot;shell injection.&quot;</p><h3 id="3-connection-string-injection">3. Connection String Injection</h3><p>A collection of connection strings defines an application&apos;s connection to a data source. It can connect to your LDAP directories and files, as well as your relational databases.</p><h3 id="4-ldap-injection">4. LDAP Injection</h3><p>Any anonymous user may inject executable queries through an LDAP injection by exploiting input validations. LDAP is the Light Directory Access Standard (LDAP) for directory service authentication, an open and cross-platform protocol.</p><h3 id="5-reflected-xss">5. Reflected XSS</h3><p>&quot;Reflected XSS,&quot; also known as &quot;reflected cross-site scripting,&quot; is when malicious scripts are launched via links. </p><h3 id="6-resource-injection">6. Resource Injection</h3><p>When an attacker successfully alters the resource IDs utilized by the program to carry out harmful operations, it is known as a resource injection.</p><h3 id="7-sql-injection">7. SQL Injection</h3><p>The backend application is tricked into returning sensitive information or running malicious scripts on the database by inserting SQL code into data requests.</p><h3 id="8-second-order-sql-injection">8. Second Order SQL Injection</h3><p>It takes two steps to do a second-order SQL injection. Before executing anything, an attacker modifies the code of your program. They could be waiting for further information or for a particular event to occur.</p><h3 id="9-stored-xss">9. Stored XSS</h3><p>Script injection into the contents of a site or app results in a stored XSS attack, which is also known as persistent XSS.</p><h3 id="10-xpath-injection">10. XPath Injection</h3><p>XML documents remain popular and extensively used, despite the rise of JSON as a data structure star. The XPath syntax is used to identify specific elements in an XML document. Similar to SQL injections, anyone may exploit the concept of XPath injections.</p><h2 id="how-secure-is-java-as-compared-to-other-languages">How Secure Is Java As Compared To Other Languages?</h2><p>Because of the following factors, you may find Java secure:</p><ul><li>A virtual computer known as a sandbox is used to execute Java applications.</li><li>Explicit pointers are not supported in Java.</li><li>As the name suggests, a <a href="https://www.oracle.com/java/technologies/security-in-java.html?ref=pragmatic-paranoia#:~:text=The%20bytecode%20verifier%20acts%20as,of%20breaking%20the%20Java%20interpreter.&amp;text=The%20types%20of%20the%20parameters%20of%20all%20bytecode,known%20to%20always%20be%20correct">byte-code verifier</a> looks for potentially unlawful code that could violate the user&apos;s right of access to an object.</li><li>It includes a Java security package, which offers explicit security.</li><li>Safety at the level of a library is assured.</li><li>When we load new code, we do a runtime security check.</li><li>Additionally, several security-enhancing measures are included in Java.</li></ul><h2 id="is-python-more-secure-than-java">Is Python More Secure Than Java?</h2><p>Even though <a href="https://www.python.org/?ref=pragmatic-paranoia">Python</a> and Java are regarded as secure programming languages, Java is more secure. The web application is protected by Java&apos;s robust authentication and authorization control features. Every time the compiler generates the code, a class file is produced with byte-code, and the JVM tests it for malware and viruses. &#xA0;</p><p>Python is a straightforward programming language that&apos;s easy to troubleshoot. With minimal code, it is simpler to debug and prevent the code from becoming more difficult in the future. Python&apos;s security safeguards fall short compared to Java&apos;s robust security features.</p><h2 id="what-is-the-log4j-vulnerability">What Is The Log4j Vulnerability?</h2><p>Java applications, particularly those that capture log information, utilize Log4j as a standard logging library. An easy-to-use exploit that permits remote code execution and logs message manipulation to load and run malicious programs into the environment may be used to infiltrate the system.</p><h3 id="understanding-the-vulnerability">Understanding The Vulnerability?</h3><p>However, Log4j 2.0 provides &quot;lookups&quot; that include Java Name and Directory Interfaces (JNDI) lookups that were not limited and led to the vulnerability in the logging frameworks. Administrators may use the JNDI directory service API to find data and other resources to connect to LDAP or DNS. A Java class loaded by malicious people &#x2013; even those who aren&apos;t skilled hackers &#x2013; might theoretically allow the victim servers to run illegitimate code.</p><p>This vulnerability got massive media coverage because different tech giants such as Apple, Google, Amazon, etc configure most of their applications. Numerous hackers attempted to exploit the flaw. </p><p>The companies are concerned because hackers can get access to the central server of the computer and can locate other networks. The companies took some significant steps to fix the patches.</p><h2 id="conclusion">Conclusion</h2><p>The amount of programming language <a href="https://pragmaticparanoia.com/tag/security/">security</a>, like other areas of cyber security, relies on what we mean when we say &quot;secure.&quot; Compared to other widely used languages, Java has fewer known vulnerabilities. At first appearance, several modern languages seem to be more secure than Java.</p><p>Because of Java&apos;s widespread use, several security flaws have been discovered. Hundreds of bug hunters are looking for Java language vulnerabilities because of its general use, giving Java an unfair &quot;edge&quot; in this industry. It&apos;s also possible that newer languages like Ruby&apos;s supposed security are more a function of their specialized use than its inherent soundness.<br></p><p><br></p>]]></content:encoded></item><item><title><![CDATA[Why Is Network File System (NFS) Insecure?]]></title><description><![CDATA[NFS relies entirely on essentially insecure UDP protocol (sends datagram instead of client-server connection), makes unencrypted transactions, and lacks definite user authentication. ]]></description><link>https://pragmaticparanoia.com/why-is-nfs-insecure/</link><guid isPermaLink="false">6200038a73978c062ba80510</guid><category><![CDATA[Security]]></category><category><![CDATA[NFS]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Sun, 06 Feb 2022 17:24:58 GMT</pubDate><content:encoded><![CDATA[<p>Most of our societies insist on the power and significance of sharing. This motive led to the establishment of the Network File System (NFS). NFS has always been bound to change versions. The current standards like NFSv4 and NFSv4.1 are likely to perform poorly when data traffic increases. </p><p>This is what Ardash Chetan on <a href="https://www.linkedin.com/feed/update/urn:li:activity:6887268231711731712/?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A6887268231711731712%2C6892017940493856768%29&amp;3BreplyUrn=urn%3Ali%3Acomment%3A%28activity%3A6887268231711731712%2C6892023491776831488%29&amp;ref=pragmatic-paranoia">LinkedIn</a> had to say concerning NFS security, <em>&#x201C;NFSv4 designed to work on the internet. One of the main reasons to design NFSv4 was to provide strong security, with negotiation built into the protocol. The main security in V4 is mandatory Kerberos support and improvement in username/UID management. NFSv4 provides all security capabilities such as Server authentication, Client authentication, User Authentication, Data integrity, Data confidentiality.</em>&#x201D;</p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>NFS communication is based on request-response protocol (RPC). RPCs are essentially insecure unless performed in a firewalled network. These v4s also have restricted scalability and bandwidth. </p><figure class="kg-card kg-image-card"><img src="https://pragmaticparanoia.com/content/images/2022/02/image.png" class="kg-image" alt loading="lazy" width="1152" height="590" srcset="https://pragmaticparanoia.com/content/images/size/w600/2022/02/image.png 600w, https://pragmaticparanoia.com/content/images/size/w1000/2022/02/image.png 1000w, https://pragmaticparanoia.com/content/images/2022/02/image.png 1152w" sizes="(min-width: 720px) 720px"></figure><p>Before diving into how and why NFS is insecure, at least you should understand how it works. NFS is a primitive client/server protocol for remote file sharing, like <a href="https://pragmaticparanoia.com/why-is-telnet-insecure/">Telnet</a>. It allows the client computer to <strong>view, store, and update</strong> remote server files as though they were stored locally.</p><p>Communication occurs based on mount commands, with attributes and options, made in the server. The current versions are NFSv3, NFSv4, and NFSv4.1. </p><p>In this post, you will learn why and how NFS is insecure, and some NFS security best practices. </p><h2 id="nfs-security-issues">NFS security issues</h2><p>The lack of sophisticated encryption capabilities renders NFS vulnerable to cyberattacks. Any smart intruder can easily intercept and read your data in transit.</p><p>An eavesdropper gains unauthorized access to your data before reaching the host. An impostor will gain unauthorized access to the network. </p><p>Your NFS server cannot differentiate between daemon mountd filehandles and falsified ones. An attacker can configure its client computer to snoop the connection and make away with a filehandle, read and alter a server file the root does not own. </p><p>As aforementioned, NFS uses RPCs to communicate, such that client/server communication does not happen vice versa. NFS file system exports occur locally- hosts have a particular mount point. The mountd daemon enforces the host list. Isn&#x2019;t that a threatening vulnerability? </p><p>An attacker client may access the corresponding server portmap daemon to execute a mountd daemon request. The mountd will perceive the request as valid and obeys the command. </p><p>If you unrestrictedly export a file system, an attacker can remotely tamper with your file or the system files. The intruder wins and takes full control over your computer. </p><p>By default, the UNIX numeric groupid and userid (AUTH_UNIX) specifies your authentic identity for accessing a directory or a remote file. It&#x2019;s simple for any user to execute a program that generates a request to obtain file access for any user. </p><p>These security issues exist, but why do some of you still use this file sharing protocol?</p><p>You should probably understand the following general ways of securing NFS to <a href="https://www.ibm.com/docs/en/aix/7.1?topic=security-general-guidelines-securing-network-file-system&amp;ref=pragmatic-paranoia">minimize the insecurities</a>. </p><h2 id="nfs-security-best-practices">NFS security best practices</h2><ul><li><strong>Install the latest software application patches</strong>. If you don&#x2019;t have patches that address security matters, you will have given an attacker a run for their bucks and time. NFSv4 version has specific security mechanism improvements. It supports Kerberos 5 data protection and authentication to support the preexisting AUTH_SYS security. This security feature saves for future security mechanisms addition.</li><li><strong>Configure your NFS server to export the file systems with the least necessary privileges.</strong> Use SMIT or the /etc/exports file editing to specify your file privileges. If you want to only read from your file system, you should not write to it. So an attacker cannot overwrite data, alter config files, or even code executable bugs to your exported file system.</li><li><strong>Configure your NFS server to categorically export file systems for your allowed users</strong>. NFS will enable you to specify clients who access a particular file system. This will discourage unauthorized file systems access.</li><li><strong>Partition individual exported file systems.</strong> In the case of a system degradation attack, the attacker cannot write an exported file system. If they manage to write until it&#x2019;s complete, your other applications and users cannot avail the file systems.</li><li><strong>Configure your NFS implementations to map unknown or privileged to unprivileged user requests</strong>. The NFS clients will not allow file system access with root/ unknown user details. An attacker will not act/ operate as a privileged user to access the file system.</li><li><strong>Embrace Secure NFS. Secure NFS uses Data Encryption Standards (DES) for authenticating RPC transactions hosts</strong>. Secure NFS encrypts the RPC time stamp requests; hence an attacker cannot spoof them. The receiving end decrypts the time stamp and confirms the authenticity of the RPC requests. </li></ul><h2 id="does-nfs-have-authentication">Does NFS have authentication?</h2><p>NFS uses DES algorithms to encrypt a timestamp in RPC transactions. The timestamp then <a href="https://www.ibm.com/docs/en/aix/7.1?topic=security-network-file-system-authentication&amp;ref=pragmatic-paranoia">authenticates</a> your computers the moment the token does sender authentication. </p><p>Each file system is secured additionally and optionally because NFS authenticates all RPC transactions. You can easily specify a secure file system export option. It&#x2019;s possible because file systems are exported with the standard UNIX authentication by default. </p><h2 id="does-nfs-use-tls">Does NFS use TLS?</h2><figure class="kg-card kg-image-card"><img src="https://lh6.googleusercontent.com/GqHru5ffysJW8UGwE3SxR_fNcoiVmjU_rhFvwfggnGcW6nSx23IUOSge_12sz_BpOOaPrj01kRkkB2jqxHMi_ITusrJ5Q0qhTjcW1RyoXRqg_b3JyOn6jgzNEg5_ejUo4674EmxQ" class="kg-image" alt loading="lazy"></figure><p>NFS host connections are<strong> clear-text </strong>by default, making them incompatible with sensitive data. Transport Layer Security (TLS) can cover this protocol data security.</p><p>TLS 1.2 encrypts NFS traffic in transit when your file system is mounted. An <a href="https://docs.aws.amazon.com/whitepapers/latest/efs-encrypted-file-systems/encryption-of-data-in-transit.html?ref=pragmatic-paranoia">industry-standard</a> AES-256 cipher cryptographic element is responsible for this <strong>encryption</strong>.</p><p>Every file system that a client accesses in transit should have encryption. </p><h2 id="conclusion-is-nfs-secure">Conclusion: Is NFS secure?</h2><p>NFS is vulnerable to most streaming internet attacks. It is a primitive transfer protocol used for remote file sharing. Its use diminished as more secure and advanced technology transfer protocols were established.</p><p>NFS authenticates data handling through DES algorithms that encrypt RPC transactions. NFS lacks definite encryption mechanisms unless used with TLS. The latest version, NFSv4.1, has a relatively less susceptible level of security. If you can carefully configure specific settings and features, NFS can still serve your remote file sharing tasks.</p><p><br></p>]]></content:encoded></item><item><title><![CDATA[Can You Get Doxxed on Fortnite?]]></title><description><![CDATA[Fortnite, through Epic Games, collects data and information about you from your service providers and the third parties you interact with. The information includes your name, email id, region, and device information. But how will the information be used? What control do you have?]]></description><link>https://pragmaticparanoia.com/can-you-get-doxxed-on-fortnite/</link><guid isPermaLink="false">620000d173978c062ba804a8</guid><category><![CDATA[Doxxing]]></category><category><![CDATA[Fortnite]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Sat, 05 Feb 2022 17:09:00 GMT</pubDate><content:encoded><![CDATA[<p>Some <em>Fortnite </em>gamers&#x2019; accounts may be compromised. If you are charged for <a href="https://www.bleepingcomputer.com/news/security/new-malware-steals-steam-epic-games-store-and-ea-origin-accounts/?ref=pragmatic-paranoia">services and add-ons</a> you have not requested, that&#x2019;s an alarm. In fact, <em>Epic Games </em>are aware of the malice. If Epic Games asks you to use two-step verification (2FA), comply.</p><figure class="kg-card kg-image-card"><img src="https://lh4.googleusercontent.com/3yGmWssv3mlR_ABw0rh4BDlzsc6E5Tnq9i5VBKRjWySbKlDrFN5Jwkr5p_VQ8-Fg4L90Gl2zTxnwCERLcNhjrlbKGrcPIDamdS4L4ErOP1XOCz-SnUkdr9NTs_RgSYCMJvG8IiqE" class="kg-image" alt loading="lazy"></figure><p>Dark web forums take advantage of your gaming enthusiasm. It&#x2019;s addictive, and you are always in for an offer or loyalty program. When you sign in for Fortnite subscriptions, you give out <a href="https://www.epicgames.com/site/en-US/privacypolicy?ref=pragmatic-paranoia#:~:text=For%20instance%2C%20in,complete%20the%20transaction.">personal information</a>-name, email id, credit cards, location, etc. The doxxers send malware your way and collect the information. The tools and offers you get entice you to surrender the information they are mining. </p><p>Most of these issues arise due to your recklessness. Do you read to comprehend the privacy policies of the gaming platforms you subscribe to? How about your cookie settings? How long do you review them? Do you clear your browsing history? Have you been checking updates for your <em>Fortnite </em>series? </p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>You will learn whether you can get doxxed on <em>Fortnite</em> and the various ways to mitigate the threats, vulnerabilities, and risks in this post.<br></p><figure class="kg-card kg-image-card"><img src="https://lh3.googleusercontent.com/SunjjUXcwNn74DXMcX7LqHD3VzocEnoyGeGz1Q3rT1daZ29GMUEIDX98hHi8kfy1fX9jV6TUxefRvm-BSoIA8H7fqJRrKp0umv9Q_UcV25UqPxf9LxuHU93WDS-G7J-M6PHOVyiv" class="kg-image" alt loading="lazy"></figure><p>So that you may believe&#x2026; I have fallen victim to on-screen doxxing amid a war but severally. Yet last week, as I engaged the <em>Fortnite Battle Royale</em>, some random guy dropped my phone number and an old address. I had long forgotten the address. Crazy, right? It seems it&#x2019;s not just an IP search. This kept me wondering how the script kiddy doxxed me. And how could I avoid this?</p><p>Read on. </p><h2 id="what-is-doxxing-in-gaming">What is doxxing in gaming?</h2><p>You agree with me that gaming is <a href="https://www.statista.com/statistics/292056/video-game-market-value-worldwide/?ref=pragmatic-paranoia#:~:text=It%20is%20estimated,worldwide%20in%202025.">gaining popularity</a> every day. From gambling to <em>Xbox </em>consoles to e-sports, fans and gamers sign in for rewards, fun, offers, bonuses, and premium games. Every bit of information you give out on-and-offline displays who you are. No wonder doxxers dubbed gaming accounts as hotcakes. </p><p>Your <em>Fortnite </em>duo or squad partner can collate your credentials one by one as you interact. This happens across all the gaming platforms- <a href="https://pragmaticparanoia.com/can-you-get-doxxed-on-gta/"><em>GTA</em></a>, <a href="https://pragmaticparanoia.com/can-you-get-doxxed-on-cs-go/"><em>CS</em>: <em>GO</em></a>, etc. So your opponent or any other gamer who can log into the forum can do anything with your information. That&#x2019;s how <a href="https://www.reddit.com/r/teenagers/comments/c362wc/so_apparently_the_kid_that_talked_shit_about_the/?ref=pragmatic-paranoia">doxxing in gaming</a> occurs. </p><p>A <em>Redditor</em>, /<em>u</em>/<em>DestroyerDain</em>, once received a <a href="https://www.reddit.com/r/FORTnITE/comments/9eeltc/so_i_got_threatened_to_be_doxxed_by_someone_on/?ref=pragmatic-paranoia">doxxing threat on <em>Fortnite</em></a>, <em>&#x201C;So I got added by some random dude, and he said that my personal account was his friends (complete bs) and now after talking with him, he has threatened to doxx me. What should I do in this situation?&#x201D; </em></p><p>As you will learn later in this post, there are several ways in which your information is mined and processed ready for <strong>doxxing</strong>.</p><h2 id="how-can-you-get-doxxed-on-fortnite">How can you get doxxed on Fortnite?</h2><p>There are several ways in which doxxers can compromise your anonymity. Here are some of them;</p><h3 id="through-ip-and-isp-spoofing">Through IP and ISP spoofing</h3><p>In the anecdote above, you read how I got my old address dropped in my on-screen chat. The doxxer stole my IP address. Social engineering is their reasonable step when the doxxer has the address (stolen from the <a href="https://www.epicgames.com/site/en-US/privacypolicy?ref=pragmatic-paranoia#:~:text=access%20our%20services%2C-,such%20as%20IP%20address,-%2C%20device%20identifiers%2C%20your">Fortnite account</a>).</p><p>They can cun your internet service provider (ISP) to give them more of your information. A single masked call made to the ISP, pretending to belong to the Fortnite/Epic Games<a href="https://www.epicgames.com/help/en-US/technical-support-c90?ref=pragmatic-paranoia"> tech support team</a>, the doxxer requests your information;</p><ul><li>Real name</li><li>Phone numbers</li><li>Email address</li><li>Date of birth</li><li>Physical addresses</li></ul><h3 id="through-social-media">Through social media</h3><p>Here&#x2019;s an excerpt from the Epic Games, the Fortnite streaming platform, <em>&#x201C;And if you choose to link your Epic account with your account on a third-party social media (like Facebook), gaming (like Steam), or other similar website or service, or if you interact with an ad for one of the Epic Services on an external website or service, the company that operates that website or service may share some information with Epic in accordance with their privacy practices.&#x201D; </em></p><p>The information collected includes your place of work, location, visuals, friends, schools attended, family members, etc. Do you still think that your online privacy is okay? It&#x2019;s high time you create unique passwords and usernames for every social account you own. </p><h3 id="through-data-brokers">Through data brokers</h3><p>To get your information, a doxxer can spend their bucks on data brokers like PeopleFinder. These data brokers collect your publicly available repositories- e-citizen, voter registry, loan apps, e-commerce sites, and fellow data brokers. Fortnite clearly states, in its policy and privacy page, that they can share your information<em> &#x201C;publicly. For example, your display name, content you create or share, basic game statistics, and other similar data may generally be accessible to others.&#x201D; </em></p><h3 id="through-phishing">Through phishing</h3><p>The PC and console <em>Fortnite Battle Royale </em>versions allow for unmoderated, live chat between gamers. Phishing involves disguising interaction that lures you into giving out your credentials. Whatever information the doxxer acquires, they can use them against your reputation or further malice.</p><h2 id="how-to-avoid-getting-doxxed-on-fortnite"><strong>How to avoid getting doxxed on Fortnite</strong></h2><p>Here&apos;s to your anonymity at Fortnite or Epic Games and other gaming sites. It&apos;s so traumatizing to get doxxed. Worst still, you can&apos;t imagine how it hurts to get doxxed by a stranger. Read on to learn these tactics. </p><h3 id="1-use-a-vpn-or-proxy-to-safeguard-your-ip-address">1. Use a VPN or proxy to safeguard your IP address</h3><p>A VPN or proxy <a href="https://www.avast.com/c-hide-my-ip-address?ref=pragmatic-paranoia">hides your IP address</a> when you are online. You get connected to a secure server before your public streaming internet. Thus any doxxer spying on you when you&apos;re active on Fortnite sees the VPN or proxy server IP address instead. Yours remain hidden. You can get free or premium tools. These tools are even more helpful when you are using unsecured public WiFi. Others like <a href="https://www.avast.com/secureline-vpn?ref=pragmatic-paranoia">Avast SecureLine VPN</a> can make your visible online location virtual. &#xA0;</p><h3 id="2-run-away-from-third-party-logins">2. Run away from third-party logins</h3><p>Fortnite can request, not force, you to log into their account with Google, Facebook, etc. These platforms can share your details with Fortnite. That is another avenue for doxxers to collect more of your information. You may fall victim to <a href="https://www.avast.com/c-spear-phishing?ref=pragmatic-paranoia">data breaches</a>. Imagine what would happen if your passwords leaked. </p><h3 id="3-ensure-your-social-media-presence-is-private">3. Ensure your social media presence is private</h3><p>You share a lot of your information on social media, especially those that third parties require you to log in to their accounts. You are not intimidated to share; it&apos;s deliberate. You can use a burner username. Avoid adding details like date of birth, photos with addresses in the background, family members, workplaces, etc. </p><h3 id="4-request-your-online-information-removal">4. Request your online information removal</h3><p>Data brokers collate and sell your information. They have your browser history, online transactions, and much more. In case of fatal data breaches like <a href="https://blog.avast.com/equifax-website-hacked-now-what?_ga=2.155493883.1342011319.1636556463-1299167294.1636556463&amp;ref=pragmatic-paranoia">the Equifax data breach</a>, your information might leak. You can contact the brokers directly to remove your information though it will take longer. And you cannot identify all of them. <a href="https://www.avast.com/breachguard?ref=pragmatic-paranoia">Avast BreachGuard</a> can quickly help you monitor the dark web for any leaks. It also helps remove the information. </p><h2 id="conclusion">Conclusion</h2><p>Online gaming platforms are becoming hotcakes for the doxxers. Gamers share a lot about themselves. Doxxers can deploy such techniques as phishing to quickly gather your information on Fortnite. Yet you can stick to the above ways to avoid getting doxxed. For any information about doxxing, <a href="https://pragmaticparanoia.com/tag/doxxing/">visit our page here</a>.</p>]]></content:encoded></item><item><title><![CDATA[Can You Use Multiple Password Managers?]]></title><description><![CDATA[Can you use different password managers for different accounts? Here's how to decide whether it's worth the trouble.]]></description><link>https://pragmaticparanoia.com/can-you-use-multiple-password-managers/</link><guid isPermaLink="false">61ffed3173978c062ba8044d</guid><category><![CDATA[Security]]></category><category><![CDATA[Password Managers]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Fri, 04 Feb 2022 15:46:00 GMT</pubDate><content:encoded><![CDATA[<p>Go ahead; forget it because a password manager will remember it for you!? So what is a password manager anyway and what is the point of one? A password manager enables you to login to all your accounts from one master password without having to worry about not remembering them, as you only have a master password to remember. The password is usually encrypted for you so that you also don&#x2019;t have to worry about doxxers trying to steal it. A password manager is the most easy and effective way of having strong passwords stored across multiple devices without the dangers involved with traditional passwords. Password managers also often help you not only with logins, but with high-profile security account details being kept secure, life banking details, emails, pay-pal credentials and so on.</p><h2 id="how-do-password-managers-work">How do password managers work?</h2><p>There are three main types of password managers, one is the offline password manager which stores the passwords on your actual devices. There is secondly the web-based password manager which is stored on a cloud giving you a wide level of accessibility across various devices. Lastly, there are token-based or stateless password managers. This one involves a local piece of hardware which is usually either a usb stick or flash disk which contains a key to unlock a particular account. There is not a particular need for a list of passwords to recall as a password vault as the token generates a new one every time you login to a new account.</p><h2 id="can-you-use-multiple-password-managers">Can you use multiple password managers?</h2><p>You can but you shouldn&#x2019;t. You&apos;re effectively increasing the chance of your credentials being stolen if you use two or more password managers with identical credentials. This is due to the fact that there are now more entrance points. In general, password managers all have the same level of security; however there are issues when you try to use more than one at the same time.</p><p>Having more than one password manager only opens up the flood-gates to doxxers. Therefore, we recommend finding one well-secured manager; one with a quality cipher-system and with a strong encryption key. Also, having multiple password managers would only make the use of a password manager obsolete as the whole point of a password manager is convenience, that is to only use one master password, or to have less to remember. In other words, by adding more logins, you are adding alternative methods of accessing your account, which is only opening more entryways to your passwords.</p><p>Therefore, adding more methods of logins cannot reduce the risk of hostile hijack, but rather increases the risk since more passwords provide the attacker with additional entry points. If you use more than one login, then your &quot;security level&quot; is only as high as the weakest authentication system you are using.</p><p>We can suggest that if you must use a password manager, you may use a stateless or token-based password manager for sites which allow it. You can then use an offline or cloud-based alternative for the remaining ones.</p><p>Likewise, there are certain cases such as with offline password managers where you can use multiple password managers as you want, as long as they don&apos;t have the same entries. </p><p>There is also another alternative for people who have high-profile important passwords and less important accounts which they want to keep on different password managers. This is a little bit inspired by the don&#x2019;t put all your eggs in the same basket analogy. </p><p>This is called the 2-password manager method. This is when instead of using one password manager you use one password manager for all of your highly sensitive information and another on your device for non-important every-day passwords. But in general this is usually a less common practice as it can cause issues when importing and exporting passwords. <br><br>We hope that this guide has helped you. You may also be interested in our guide on <a href="https://pragmaticparanoia.com/do-password-managers-work-offline/">Do password managers work offline?</a> Or <a href="https://pragmaticparanoia.com/are-password-managers-a-single-point-of-failure/">Are password managers a single point of failure?</a> We are pragmatic paranoia, being paranoia at its best, bringing you the latest cybersecurity news!</p>]]></content:encoded></item><item><title><![CDATA[Should I Use My Real Name on WhatsApp?]]></title><description><![CDATA[It’s becoming acceptable to use burner usernames on online platforms. WhatsApp users may know each other. But with other alternative ways like data broking and third parties, your username can become a tool for malice.]]></description><link>https://pragmaticparanoia.com/should-i-use-my-real-name-on-whatsapp/</link><guid isPermaLink="false">61fffc3373978c062ba80468</guid><category><![CDATA[Privacy]]></category><category><![CDATA[WhatsApp]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Thu, 03 Feb 2022 16:50:00 GMT</pubDate><content:encoded><![CDATA[<p>WhatsApp is a popular online instant messaging social media platform. Its parent company is Meta-formerly Facebook. Meta has full control over WhatsApp Messenger and Business. There are more than 10 WhatsApp versions in the market. </p><p>Our primary focus will be on Meta&#x2019;s WhatsApp, WhatsApp Business, and WhatsApp Messenger. Actually, most of the features are modifications of the original WhatsApp messenger app. These are the versions available on <a href="https://play.google.com/store/search?q=whatsapp&amp;3Bc=apps&amp;ref=pragmatic-paranoia">Google Play</a> and verified by Play Protect. These versions are available for Android, MacOS, Windows, and the <a href="https://web.whatsapp.com/?ref=pragmatic-paranoia">web</a>. </p><p>Almost every smartphone user uses WhatsApp, as reported by <a href="https://www.statista.com/statistics/260819/number-of-monthly-active-whatsapp-users/?ref=pragmatic-paranoia">Statista</a>. Additionally, Facebook admits to accessing and using WhatsApp Messenger information. These figures raise concern for security and privacy.</p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p><a href="https://foundation.mozilla.org/en/privacynotincluded/whatsapp/?ref=pragmatic-paranoia#:~:text=In%20May%202021%2C%20WhatsApp%20found%20itself%20at%20the%20center%20of%20controversy%20regarding%20its%20privacy%20policy.%20The%20main%20change%20was%20regarding%20sharing%20data%2C%20including%20communication%20content%20with%20businesses%2C%20">Mozilla Foundation</a> has this report, <em>&#x201C;In May 2021, WhatsApp found itself at the center of controversy regarding its privacy policy. The main change was regarding sharing data, including communication content with businesses, with the larger Facebook Group.&#x201D; </em> </p><p>WhatsApp has privacy and security vulnerabilities, risks, and threats like any other app and platform. There&#x2019;s always a cause for worry on third parties. So should you use your real name as a username? Read on to learn why you should use it or not.</p><h2 id="should-i-use-my-real-name">Should I use my real name?</h2><figure class="kg-card kg-image-card"><img src="https://lh6.googleusercontent.com/aqXj3Y8YNR0N3YA8Mw9PxR7BcCmfcixgQctIENaVKJh6PP-m1VGhchKmdgMGC0wtDxQ0koiYgdAwDTRuY8qJtqoSwd9ITvFuHVLv2je-9675n3sC9QVYwbj9Q-7wdXz_BiaNBQJc" class="kg-image" alt loading="lazy"></figure><p>Your real name is the legal identity in your passport, national ID, birth certificate, and any other legal document. There&#x2019;s no way that WhatsApp intimidates you to use real names as usernames. In fact, WhatsApp messenger clearly states that the name you enter is not your username or pin. That&#x2019;s why you are allowed to use emoticons.</p><figure class="kg-card kg-image-card"><img src="https://lh5.googleusercontent.com/5uVe2dwzWjyHMe54jx6zj0V6ztCvlEOGKc-odMcT_I7LU79YXAlmdWSYDHdc74VKEmgO_SNbt-vb0p_dzXhT_9JcATwe6DReDsN1xdHsL0RuhWbEofT93lc5aFqJm4adPj9IriZf" class="kg-image" alt loading="lazy"></figure><p>But again, the Business version nomenclature varies. You cannot use your real or burner name unless you attach enterprise identification credentials, e.g., <em>John Doe Hardware</em>. You can read the rules <a href="https://faq.whatsapp.com/general/account-and-profile/about-creating-a-business-name/?lang=en&amp;ref=pragmatic-paranoia">here</a>. </p><p>Remember your friend, colleague, next of kin, and anybody else can turn out as an attacker. How many scenarios have you heard partners stalking each other on WhatsApp? The highest demographic of WhatsApp users are aged between 26-35. </p><p>Most of you are either dating, soul searching, engaged, or new in a marriage. Haven&#x2019;t you at some point been busted? The fact is, using real identity can put you in trouble. A brute force attacker can use your name to find perfect matches for your credentials, to mention but a few. </p><p>If you use WhatsApp payment methods, you should use your real name. Service providers will require you to use documents whose credentials match when signing in and transacting. </p><p>At least your circle of friends and WhatsApp group&#x2019;s participants can identify you with the name you use. Yet you don&#x2019;t owe anyone an explanation for using weird names. The choice is yours. What matters most is the number you used to sign into WhatsApp.</p><h2 id="what-if-i-don%E2%80%99t-use-my-real-name">What if I don&#x2019;t use my real name?</h2><figure class="kg-card kg-image-card"><img src="https://lh4.googleusercontent.com/Uz9TCMriqe_yRK12vt2TBiN1YB7MZ-k3p2VVUlIChmael8b_FGltatJF578CDShYcjWIHdnlyHb1wmM8w4vwuXkWbHFE6QblP5x9GrUs0Ix_URYXod-FxWuh32grWGCJYjB_9J3O" class="kg-image" alt loading="lazy"></figure><p>Avoiding the use of your real name is not a crime, unless in the future. Your classmates know you by name. Your colleagues know your name. It&#x2019;s often the people you know that contact you on WhatsApp. For WhatsApp Business, use your enterprise name.</p><p>You will likely reduce the chances of a tracker using your name compared with other usernames. Attackers countercheck your cross-platform usernames to find some actual data about you. You&#x2019;d rather use a unique one for each of them. You will likely reduce the chances of a tracker using your name compared with other usernames.</p><p>For online WhatsApp transactions, it&#x2019;s a different case. If you are in the select countries that support this, ensure your WhatsApp name matches the legal one.</p><h2 id="security-and-privacy-risks-of-using-real-name">Security and privacy risks of using real name</h2><h3 id="brute-force-cyberattacks">Brute force cyberattacks</h3><p>Your username can give a hint and an exit plan to a malicious doxxer or attacker. An attacker tries out the various username and password combinations until they find a perfect match.</p><p>In credential recycling, the attacker reuses passwords and usernames from, perhaps, data brokers to try cracking your systems.</p><p>Executing reverse brute force, the attacker uses a commonly used password, e.g., <em>john doe. </em>They make several trials until they hit it. </p><h3 id="third-party-identity-theft">Third-party identity theft</h3><p>Meta, formerly Facebook, is the WhatsApp parent company. According to their privacy policy, Meta disclaims any suspicious activity with your WhatsApp data. But they request you to access some system permissions on your smartphone. Yet <a href="https://www.huffingtonpost.co.uk/entry/facebook-users-data-trust-polling_n_5c267e13e4b08aaf7a904697?ref=pragmatic-paranoia">history and the internet do not forget</a>.</p><p>You should limit some of these permissions outside your app. I recommend you disable the location, camera, calendar, photos, contacts, and microphone permission access in Android and iOS. You should limit some of these permissions outside your app. Unless you do this, you will risk your data being stolen.</p><h3 id="data-broker-data-collation">Data broker data collation</h3><p>Data brokers collate and sell your data. They use various mechanisms, including data breadcrumbs like usernames, to do extensive data mining of a victim. Remember, your real name is your legal identity. This is why it makes it easy to use as a leader in data mining. </p><h3 id="social-engineering">Social engineering</h3><p>WhatsApp uses Novi and BHM UPI for instant transactions in special places. Your WhatsApp name should match your ID or bank account name to comply with the service providers. When an attacker or any malicious person gets the information, they can use it for social engineering.</p><p>They can use your name to send spammy emails and WhatsApp group links pretending to be you. Another can create an account in your name using a different number and commit the same offense. </p><h3 id="swatting">Swatting</h3><p>Swatting is common in the US. A malicious person can, for instance, prank call the police and use your name as an offender.</p><h2 id="what-does-whatsapp-do-to-protect-my-account">What does WhatsApp do to protect my account?</h2><h3 id="end-to-end-encryption">End-to-end encryption</h3><p>This method ensures that your messages, voice calls, video calls, and media are encrypted on transit. Any interceptor may not read the scrambled data. The sender and recipient are the only ones who can read the information. </p><h3 id="support-center">Support center</h3><p>There&#x2019;s no platform whose users have a monopoly of knowledge over it. Issues arise. That&#x2019;s why WhatsApp messenger has a <a href="https://faq.whatsapp.com/?ref=pragmatic-paranoia">help center</a> for all your problems and help.</p><h3 id="the-view-once-option">The view once option</h3><p>You can exchange media that disappear after receiving and opening <a href="https://faq.whatsapp.com/general/chats/about-view-once/?ref=pragmatic-paranoia">just once</a> to add to your privacy. If you use an older version, you should update it for this technique to take effect. </p><h3 id="two-step-verification-2fa">Two-step verification (2FA)</h3><p>2FA is optional but so necessary. Upon successful account sign-in, you can access the 2FA feature. You can use a secure PIN to log into your account on a different device when you enable it. This <a href="https://faq.whatsapp.com/general/verification/how-to-manage-two-step-verification-settings?ref=pragmatic-paranoia">article </a>covers a lot of this. </p><h3 id="choice-of-who-views-your-status-profile-picture-online-status-and-the-about-feature">Choice of who views your status, profile picture, online status, and the About feature</h3><p>You have control over who can read your statuses, see your profile picture, check your last seen update, and the information of your &#x2018;about&#x2019; feature. </p><h3 id="change-of-whatsapp-web-qr-code">Change of WhatsApp web QR code</h3><p>When you log into WhatsApp web on your PC, you will remain connected, whether your Android is online/offline. But you can log out or request to change your QR code for security reasons. </p><h3 id="group-privacy-settings">Group privacy settings</h3><p>The latest versions allow you to choose whoever should add you to their group(s). So whenever you dislike their ideas or suspect malice, you avoid accepting the invitation.</p><h2 id="conclusion">Conclusion</h2><p>WhatsApp is a powerful social media platform. It comes with a variety of genuine and counterfeit versions and types. Depending on how you use it, the information you share can benefit or destroy you.</p><p>Unless stated otherwise, you should not use your real name on WhatsApp. Attackers can use your WhatsApp identity to commit malicious intentions. Be careful when using WhatsApp web.</p><p>Visit the WhatsApp webpage or social media accounts for further reading and support.</p>]]></content:encoded></item><item><title><![CDATA[Can You Get Doxxed on League of Legends?]]></title><description><![CDATA[League of Legends (LoL) is as addictive as any other online gaming. Beware of doxxers who might misuse what you share as you play. You can get doxxed anytime.]]></description><link>https://pragmaticparanoia.com/can-you-get-doxxed-on-league-of-legends/</link><guid isPermaLink="false">6200024b73978c062ba804d5</guid><category><![CDATA[Doxxing]]></category><category><![CDATA[League of Legends]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Wed, 02 Feb 2022 17:16:00 GMT</pubDate><content:encoded><![CDATA[<p>Can you get doxxed on League of Legends (LoL)? Have you ever been doxxed elsewhere? Were you almost doxxed? Are you already a LoL doxxing victim? It feels so bad. </p><p>Doxxing, especially on online gaming platforms, is real. But there are ways you can place checks and balances to avoid getting doxxed. These techniques wholly depend on your vigilance. You will realize you always ensnare yourself in these online avenues. </p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>The world is a global village. You interact with the bad and good guys. It can be intentional or unknowingly. You fill in blank forms and submit them online to the world. </p><p>How many games have you signed in to? Do you ever wonder who checks your location, next of kin, addresses, among other personal information? </p><p>Read on to discover the League of Legends doxxing <em>turrets </em>and <em>inhibitors</em>.</p><figure class="kg-card kg-image-card"><img src="https://lh4.googleusercontent.com/K5CvB945WXU9nlVQ-42UbuUv4VBTWx2mUN7syXLicyXz36ce8lWxkQS9VI5BpWr5j7ksl7ksL4kzd-KC5Tq3rG6fnl0L3BClQtbU40xnxoG_IHsGaQv_NFfqxoUzbSBWfQjW65-8" class="kg-image" alt loading="lazy"></figure><h2 id="how-can-you-get-doxxed-on-league-of-legends">How can you get doxxed on League of Legends?</h2><p>&quot;<em>Hi, to the person who dox&apos;ed my wife in the League of Legends game, posting her name/location/personal information in the game, and then threatened to &quot;do something after the game&quot; - I have reported the game logs to</em><a href="https://twitter.com/riotgames?ref=pragmatic-paranoia"><em> @riotgames</em></a><em> /</em><a href="https://twitter.com/RiotSupport?ref=pragmatic-paranoia"><em> @RiotSupport</em></a><em> - also contacted police to follow up</em>,&quot; Nick Bunyun&apos;s <a href="https://twitter.com/nickbunyun/status/1275915027875323905?ref=pragmatic-paranoia">tweeted </a>on June 25, 2020. </p><p>Have you been wondering how doxxers get your information? Read on. </p><h3 id="using-a-legal-username">Using a legal username</h3><p>A legal username carries many of your details; physical address, family members, place of residence, financial records, etc. A doxxer can use your username to acquire more of your information from <a href="https://en.wikipedia.org/wiki/Information_broker?ref=pragmatic-paranoia">data brokers</a> and government agencies. The <a href="https://who.is/?ref=pragmatic-paranoia">WhoIs </a>lookup reveals a lot about most online enthusiasts too.</p><p>When the information is available, they use it for their malice. They can socially engineer others with it, swat you, hack your LoL account to claim rewards, and so on. </p><h3 id="fake-surveys-and-suspicious-links">Fake surveys and suspicious links</h3><p>A doxxer can create forms and online surveys with embedded links. These links usually redirect to malware and related sites. Filling in surveys is like unintentionally surrendering your details. You will realize at the eleventh hour. </p><p>Doxxers are smart enough to compile them and establish a pool of decisions on what they can do to you. A doxxer can hack your LoL account to participate in the game, guess passwords to your financial records, swatting, etc.</p><h3 id="ip-address-spoofing">IP address spoofing</h3><p>Usually, happen when you connect to an insecure public wifi network. You will log into LoL and play. But a malicious doxxer takes advantage to intercept and determine your location and much more.</p><p>By the way, a doxxer can be a fellow summoner in the UK, your girlfriend in the room, you understand? This <a href="https://www.reddit.com/user/PhlashPoint/?ref=pragmatic-paranoia">/u/Phlashpoint</a> Redditor was doxxed this way. </p><h3 id="social-engineering">Social engineering</h3><p>Online gaming street brilliant ninjas can trap you to their premium offers. Reportedly, some LoL <a href="https://www.pcgamesn.com/league-of-legends/riot-leaguesharp-lawsuit?ref=pragmatic-paranoia">account boosters</a> were recently unmasked. They used the L#, the LoL scripting site, to con gamers. Who doesn&apos;t accept an offer to inflate their skill rating? That&apos;s how the doxxers collected a considerable sum of money from gamers.</p><h2 id="instances-of-league-of-legends-doxxing">Instances of League of Legends Doxxing</h2><p>Doxxing happens to almost anyone unless you have learned how to avoid it. LoL, gamers are a global group of enthusiasts. Some have malicious intentions;</p><p><strong>1. &#xA0; </strong>This gamer reported how they were doxxed on Reddit.</p><p><a href="https://www.reddit.com/user/stuckontheeastcoast/?ref=pragmatic-paranoia">/u/stuckontheeastcoast</a>,<em> &#x201C;I was just successfully bullied off of league... my support was a troll and had a friend playing with them. They were stealing CS, and I asked if they could please stop, and then when our JG offered a FF I said &#x201C;yeah, my support is a troll,&#x201D; having taken a non-supp item and purchased two of the same base items. They literally went into ALL and started saying &#x201C;report bot, they&#x2019;re racist.&#x201D; I never said one damn thing other than that they were trolling and they proceeded to continue saying I was racist. I took all screencaps but with cancel culture, this isn&#x2019;t even funny. This can get someone fired in an instant. Please don&#x2019;t do this. I legitimately had to walk away from my game in tears scared I&#x2019;m going to get doxxed. I took screencaps to show I never said anything but still the panic attack wasn&#x2019;t worth it. Please don&#x2019;t do stuff like this. Please! Racism isn&#x2019;t a joke, to begin with, don&#x2019;t try and demean it by doing stupid stuff like this.&#x201D;</em></p><p><strong>2. &#xA0; </strong>A LoL player once <a href="https://www.reddit.com/r/leagueoflegends/comments/36r25y/league_of_legends_player_admits_to_stalking_and/?ref=pragmatic-paranoia">admitted </a>that they have been swatting gamers. They stalked and targeted the US and Canadian gamers. He also claimed to have shut down Space Mountain twice. &#xA0;</p><p><strong>3. </strong> &#xA0;A <a href="http://beta.na.leagueoflegends.com/en/news/riot-games/announcements/important-security-update-and-password-reset?ref=pragmatic-paranoia">data breach</a> that targeted North American LoL gamers hit hard. Riot Games confirmed the breach and admitted that many LoL enthusiasts&#x2019; details were stolen; salted and hashed passwords, transactional records, email ids, usernames, etc.</p><h2 id="how-to-avoid-getting-doxxed-on-league-of-legends">How to avoid getting doxxed on League of Legends</h2><h3 id="1-use-strong-passwords">1. Use strong passwords</h3><p>A brute force attack technique is used to crack passwords and other log-ins to an account. But it&#x2019;s based on trial and error. So with a strong password, you can make a doxxer climb up a slippery slope. You can opt to use a <a href="https://passwordsgenerator.net/?ref=pragmatic-paranoia">password generator</a>, and there are lots of them. Use alphanumeric passwords of at least eight characters. </p><h3 id="2-beware-of-social-engineering">2. Beware of social engineering</h3><p>Social engineering involves conning gamers. You are lured into buying discounted power-ups, loyalty bonuses, hacks, etc. Think twice when the deal is too good- it&#x2019;s common sense. Yet most gamers fall victim. Unless LoL and its partners announced in their official pages and email, you should not subscribe to random offers. &#xA0;</p><h3 id="3-use-a-strong-and-trusted-vpn">3. Use a strong and trusted VPN</h3><p>VPN protects and secures your account, transactions, and general online presence. What happens behind the screen as you play games is unknown until the malice is launched. You never expect a doxxer to send a memo.</p><p>With VPNs like <a href="https://nordvpn.com/?ref=pragmatic-paranoia">Nord Secure</a>, <a href="https://torguard.net/?ref=pragmatic-paranoia">Torguard</a>, etc., you can get rid of doxxers. Stream the games online at your pleasure while the tools take care of the protection. You can use free or premium tools. </p><h3 id="4-avoid-unfamiliar-links">4. Avoid unfamiliar links</h3><p>Malicious doxxers wrap <a href="https://www.pcrisk.com/removal-guides/14471-league-of-legends-virus?ref=pragmatic-paranoia">spamware links</a> in sweet messages and offers. They are used to collect your data, try finding passwords to your account, send Trojans to your PC, etc.; that&#x2019;s why you should normalize using unique passwords for every account apart from LoL. </p><h3 id="5-use-burner-usernames">5. Use burner usernames</h3><p>Your legal/real name is a virtual &#x2018;you.&#x2019; Your email does not necessarily have to bear any of your real names. LoL does not intimidate you into using any of your real names as your <a href="https://support-leagueoflegends.riotgames.com/hc/en-us/articles/201752814-Summoner-Name-FAQ?ref=pragmatic-paranoia">summoner</a>, either. Burner usernames and emails reduce the chances of identity theft that may eventually lead to doxxing. </p><h2 id="conclusion-can-you-get-doxxed-on-league-of-legends">Conclusion: Can you get doxxed on League of Legends?</h2><p>Doxxing is real as long as you&#x2019;re present online. League of Legends streamers is a group of good and bad guys. Some summoners have been doxxed before. Most of the ways of doxxing in gaming and elsewhere are almost similar. And still, there are simple ways to mitigate them, as detailed above. We&#x2019;ve covered most of them on <a href="https://pragmaticparanoia.com/how-to-avoid-getting-doxed-on-telegram/">our page</a>.</p>]]></content:encoded></item><item><title><![CDATA[What is Self Doxxing?]]></title><description><![CDATA[There are several measures you must take to protect your data. One of those is self doxxing. Everyone, including you, needs to self-dox.]]></description><link>https://pragmaticparanoia.com/what-is-self-doxxing/</link><guid isPermaLink="false">61f99192f4483c06061fb649</guid><category><![CDATA[Doxxing]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Tue, 01 Feb 2022 20:04:01 GMT</pubDate><content:encoded><![CDATA[<p>Over the last few decades, doxxing has established itself as a weapon of terror. From government analysts to the general population, everyone has taken advantage of it. A report reveals that up till 2020, more than 53 million Americans have been doxxed. The malicious act made them lose their jobs and loved ones. To solve this problem, experts have come up with a technique called <strong>self-doxxing. </strong></p><h2 id="what-is-self-doxxing">What Is Self Doxxing?</h2><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>As the term indicates, Self doxxing is an act of doxxing. The only difference is that instead of a hacker, you dox yourself. I know that&apos;s a bit confusing. Why would anyone doxx themselves? Isn&apos;t that dangerous?</p><p>Well, the answer is No. Self doxxing does not put you in danger. In fact, it does the exact opposite. When you dox yourself, you come across all the information that is available online. It can be anything, from your house address to your contact number. </p><p>Next, you can request the site to remove your personal information. Or if the information is present on your social media sites, you can hide it. This way you can effectively protect yourself from getting doxxed.</p><h2 id="why-should-you-consider-self-doxxing">Why Should You Consider Self Doxxing?</h2><p>Doxxing has resulted in a lot of unfortunate incidents. A teenager&apos;s life changed completely when <a href="https://www.reddit.com/r/TwoXChromosomes/comments/1ap0a0/i_was_doxxed_about_one_year_ago_and_i_am_losing/?ref=pragmatic-paranoia">nude pictures</a> were posted online. The pictures spread like wildfire. Before she could take any action, 24000 men had seen them. Her phone was full of unsolicited messages. Though time passed, to this day the poor girl suffers from Post-traumatic stress disorder (PTSD).</p><p>A twitch user took <a href="https://www-gamingbible-co-uk.cdn.ampproject.org/v/s/www.gamingbible.co.uk/news/games-xqc-forced-to-move-after-doxxing-had-him-fearing-for-his-life-20210629.amp.html?amp_js_v=a6&amp;3Bamp_gsa=1&amp;3Busqp=mq331AQKKAFQArABIIACAw%3D%3D&amp;ref=pragmatic-paranoia#aoh=16412377548967&amp;referrer=https%3A%2F%2Fwww.google.com&amp;amp_tf=From%20%251%24s&amp;ampshare=https%3A%2F%2Fwww.gamingbible.co.uk%2Fnews%2Fgames-xqc-forced-to-move-after-doxxing-had-him-fearing-for-his-life-20210629">extreme measures</a> after his house address got doxxed. According to 25 years old, several police raids were called to his home. All this traumatized him so much that he left his permanent residence and shifted elsewhere.</p><p>Another popular doxxing incident happened during <a href="https://en.wikipedia.org/wiki/2019%E2%80%932020_Hong_Kong_protests?ref=pragmatic-paranoia">Hong Kong protests</a> in 2019. From police officers to social workers, everyone&apos;s personal information was leaked. This resulted in defamation, house raids, and jobs being lost. </p><p>The purpose of telling you all these stories is that doxxing can happen to anyone. Anytime. So, if you love your privacy, you need to self-dox immediately. </p><h2 id="how-to-do-self-doxxing">How To Do Self Doxxing?</h2><p>If you think, doxxing is something only hackers can do, you&apos;re wrong. Most hackers do not use any special websites to doxx. In fact, most of those sites can easily be accessed by anyone. Including you. So protecting yourself with help of self doxxing, is easier than you think. </p><p>Let&apos;s take a look at all the tools you would be using when you self doxx. </p><h3 id="search-engines">Search Engines:</h3><p>Search engines are very popular amongst doxxers. So your self doxxing journey must begin with search engines. They give you basic information about yourself. Plus help you find sites where most of your information is stored. </p><p>Most common search engines include:</p><ol><li><strong>Google</strong></li><li><strong>DuckDuckGo</strong></li><li><strong>Bling</strong></li></ol><p>When Self doxxing, it is best to access google from the browser you don&apos;t use. For example, if you normally use Chrome, use Firefox instead.</p><p>Put your name/nickname into the search tab and see what comes up. You can also put your address and contact number in the tab, to see what pops up.</p><p>These targeted searches reveal a lot about a person. To make your self doxxing journey successful, you must use these <a href="https://www.lifehack.org/articles/technology/20-tips-use-google-search-efficiently.html?ref=pragmatic-paranoia">Google search tips.</a> </p><p>If you find any information on Google, you must request the removal of content. Just follow this <a href="https://support.google.com/legal/troubleshooter/1114905?rd=1%2Ftroubleshooter%2F1114905%3Frd%3D1&amp;ref=pragmatic-paranoia">link</a> to do that. </p><p>You can also turn out Google Alerts to get informed about any new information that is being indexed. </p><h3 id="data-brokers-and-people-search-sites">Data Brokers And People Search Sites:</h3><p>When you are target searching search engines, they often lead you to data brokers. Or people search sites. Such sites are all packed with sensitive data about countless internet users. Most often than not, these sites are free to use. Or let you access any sort of information after payment of a minimal fee. </p><p>These search sites usually collect all this data without people&apos;s consent. Most of it comes from public records of people. You may not see your current house address on such a website. But they will most definitely have your old address, phone numbers, and passwords. It may also have the names of your family members. </p><p>Scary, right? Well, that&apos;s the benefit of self doxxing. You find out what the internet knows about you and get it removed. Some of the most famous data broker sites that steal information are listed below. </p><ul><li><a href="https://checkthem.com/?ref=pragmatic-paranoia">Check Them</a></li><li><a href="https://voterrecords.com/?ref=pragmatic-paranoia">Voter Records</a></li><li><a href="https://persopo.com/?ref=pragmatic-paranoia"><strong>Persopo</strong></a></li><li><a href="https://www.fastpeoplesearch.com/?ref=pragmatic-paranoia">Fast people search</a></li><li><a href="https://radaris.com/?ref=pragmatic-paranoia">Radaris</a></li></ul><h3 id="what-to-do-if-you-find-your-information-on-any-website">What To Do If You Find Your Information On Any Website?</h3><p>In case you find your information on any of the above mentioned sites, it is best to opt out. To do that, you have to follow a few simple steps and tips.</p><ol><li>When requesting to opt out of data, these sites will ask you for your personal information. Never give them new information. Use what they already have.</li><li>It is best to create a burnout email address to access such sites. If that is not possible, use an email address that you use infrequently.</li><li>Instead of giving your real contact number, set up a <a href="https://voice.google.com/?ref=pragmatic-paranoia">Google voice</a> or other voice-over IP account. </li></ol><h3 id="reverse-image-search">Reverse Image Search:</h3><p>People upload pictures on their social media accounts without any hesitancy. These personal images are what doxxers love the most.</p><p>To make sure your social media images are not available on any suspicious site, you can perform a reverse image search.</p><p>To do this, right click on your image and then click on the &quot;<em>Copy image</em>&quot; location. This will give you the URL of your picture. You can then paste this URL into any search engine and check where your pictures are available. </p><p><a href="https://www.bellingcat.com/resources/how-tos/2019/12/26/guide-to-using-reverse-image-search-for-investigations/?ref=pragmatic-paranoia">Click on this link </a>if you want more guidance on how to use reverse image search for investigation.</p><h3 id="social-media">Social Media:</h3><p>Last on the list is Social Media. A place that stores personal information and images of billions of users. People usually end up sharing a lot more on social media than is required. This information is used by doxxers to destroy their peace. </p><p>Just like doxxers, you need to thoroughly go through every social media account. This includes your Facebook, Instagram, Twitter, LinkedIn, and any other site you use. </p><p>Make sure there are no posts that reveal information about your location. Or disclose the identity of your loved ones. In case you like posting pictures, update your privacy. It is best to keep your pictures available for those you know and trust. </p><p>You also need to search any previous accounts that you once used. Report them and ask the social media authorities to delete them.</p><h2 id="final-words">Final Words</h2><p>Here you go, we have listed all possible ways you can self doxx. It is best to carry out self doxxing every few months. Most of these sites are always collecting information. So don&apos;t be surprised if you find information about yourself on these sites again.</p><p>Remember that there is no way to completely erase your information from the internet. You can make it hard for trouble makers to access it though.<br></p>]]></content:encoded></item><item><title><![CDATA[Why is POP3 Insecure?]]></title><description><![CDATA[POP3 is an outdated email protocol and is insecure just like emails. Still, many people use it. Read this article to know which other protocols you can use to protect your emails. 
]]></description><link>https://pragmaticparanoia.com/why-is-pop3-insecure/</link><guid isPermaLink="false">61f98d15f4483c06061fb5f1</guid><category><![CDATA[Security]]></category><category><![CDATA[Email]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Tue, 01 Feb 2022 16:42:00 GMT</pubDate><content:encoded><![CDATA[<p>Not every feature included in your email server should be activated. For example, you shouldn&#x2019;t use POP3 for any email connection. Yes, that&#x2019;s because it is insecure. Just as <a href="https://pragmaticparanoia.com/why-is-email-insecure/">email itself is an insecure means of communication</a>; email protocols are the actual reasons why email is considered insecure.</p><p>POP3 is an old, outdated email protocol that is very much vulnerable and exposed. Using this protocol makes your emails easily manipulatable by anyone that has access to the servers used by your email client app.</p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>Microsoft had to stop support for POP3 starting from its Windows 8 OS version. Windows 8 arrived with IMAP and Exchange as the two protocols to choose from, for email transfer. What does that mean? It means that Microsoft also understands the vulnerability of POP3.</p><h2 id="what-is-pop3">What is POP3?</h2><p>POP - Post Office Protocol - is an email protocol used in the early days of email. Notwithstanding, some email clients still support this protocol, and it&#x2019;s just BAD. Just as SMTP and IMAP, the POP3 protocol provides a channel for an email to go through a sender&#x2019;s device to the receiver&#x2019;s device.</p><p>However, POP3 transfers emails as Plain Text. It means even the tiniest of your information is clear to anyone that has access to the servers the email needs to pass through, to get to the recipient&#x2019;s device.</p><p>Email frauds and scams keep increasing. Hence, individuals and organizations move from insecure POP3 protocol to IMAP. They also use other security protocols that support encryption (built-in). So, if by now, you still use POP3 on your email client, you&apos;re simply - almost - putting your data for sale.</p><h2 id="why-is-pop3-insecure">Why is POP3 Insecure?</h2><p>Let&apos;s analyze some of the crucial reasons why you should stop using POP3 now and switch to any other security protocol such as IMAP, Exchange, SMTPS, and others.</p><h3 id="your-emails-are-processed-locally">Your Emails are Processed Locally</h3><p>POP3 doesn&apos;t synchronize your data across devices. It simply downloads your data to the device you&apos;re currently logged in to and processes everything on that device. So, if anyone can access that device or your storage drive fails, you&apos;re DONE with it.</p><h3 id="it-is-simply-old">It is Simply Old</h3><p>POP3 is just an old email protocol that&#x2019;s gradually dying off and losing support. Newer protocols with extensive support for newer email security features and technologies are now available - for free. So, it&#x2019;s time to move from the old ways and embrace the new techs.</p><h2 id="can-you-secure-pop3">Can You Secure POP3?</h2><p>Well, you can add TLS/SSL to your POP3 server to encrypt the data you share across the server. But the major thing is, POP3 does not support synchronization, so it would still be difficult to access your emails across devices, easily. </p><p>Many people suggest using IMAP over POP3. Let&#x2019;s review a few reasons to discuss why they do that: :</p><ul><li>IMAP supports synchronization and processes all changes on the server-side, not on the storage of your device. </li><li>With IMAP, attachments on emails won&#x2019;t download automatically until you open them. </li><li>IMAP provides more flexibility for setting up your email on a computer, mobile device, tablet, or any other device.</li><li>Email clients like <a href="https://www.thunderbird.net/en-US/?ref=pragmatic-paranoia">Mozilla Thunderbird</a> and Microsoft Outlook support IMAP over POP3.</li></ul><h2 id="conclusion">Conclusion</h2><p>POP3 is insecure because it processes emails locally and downloads both attachments automatically. While you can add TLS/SSL to POP3 servers, the protocol does not support most modern features that make email transfer flexible and feasible for organizations.<br></p>]]></content:encoded></item><item><title><![CDATA[Why is SMTP Insecure?]]></title><description><![CDATA[SMTP is a widely used default email protocol. Like Emails, SMTP is also insecure. Read this article to find out ways to secure your emails. 
]]></description><link>https://pragmaticparanoia.com/why-is-smtp-insecure/</link><guid isPermaLink="false">61f98c4bf4483c06061fb5ce</guid><category><![CDATA[Security]]></category><category><![CDATA[Email]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Tue, 01 Feb 2022 13:38:00 GMT</pubDate><content:encoded><![CDATA[<p>Generally, <a href="https://pragmaticparanoia.com/why-is-email-insecure/">email is insecure</a> and not the best medium for sending confidential files. But, it remains the primary means of communication for most people, especially organizations. SMTP is the most common protocol for sending emails. Furthermore, SMTP is unencrypted. This makes it a vulnerable protocol.</p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>Most email clients use SMTP as the default email protocol. All the messages that we send through this protocol are unprotected because SMTP does not support encryption or authentication algorithms in its basic nature. </p><p>However, let&apos;s analyze SMTP and see how you can integrate security add-ons to protect your emails if your mail client uses this protocol. </p><h2 id="what-is-smtp">What is SMTP?</h2><p>SMTP stands for Simple Mail Transfer Protocol. It is the most common email transfer protocol used by most email clients. Its function is simple. It picks up your email and moves it through various servers to arrive at the recipient&#x2019;s device. </p><p>The transfer process takes seconds. But since the protocol does not support encryption, anyone can trap the email that you have sent while it&#x2019;s still on the way to the recipient&#x2019;s device. The person can also alter or extract the details of the email.</p><h2 id="why-is-smtp-insecure">Why is SMTP Insecure?</h2><p>As stated earlier, SMTP is insecure because it doesn&apos;t support encryption or authentication algorithms. This makes it very easy for scammers to send malicious emails with spoofed addresses. </p><p>But then, a lot of email clients use this protocol. Hence, in a bid to make it safer and secure for email transfers, new security/authentication methods are introduced. Authentication methods such as Sender Policy Framework (SPF) and <a href="https://mailtrap.io/blog/dkim/?ref=pragmatic-paranoia">DomainKeys Identified Mail</a> (DKIM) were all launched as a means of securing the SMTP protocol. </p><h3 id="threats-to-smtp-security">Threats To SMTP Security?</h3><p>There are several threats to SMTP when it is used in its ordinary state for email transfer. These threats include:</p><ul><li><strong>Spam and Phishing:</strong> Scammers can get into your SMTP server and use your server to send malicious emails to your contacts and organizations. This act is called Open Relay.</li><li><strong>Data Leaks:</strong> It is easy for scammers to hack into SMTP servers and extract information from the emails sent through the servers. </li><li><strong>Virus and Malware Spread:</strong> Hackers leverage the insecure nature of SMTP to spread malicious software through emails. </li><li><strong>DoS Attacks:</strong> It won&apos;t take serious technical skills for a hacker to get into an SMTP server and perform Denial-of-Service (DoS) attacks. This means flooding other email servers with lots of emails, which may lead to a server crash.</li></ul><h2 id="can-you-secure-smtp-how-to-secure-smtp">Can You Secure SMTP? How to Secure SMTP?</h2><p>Although SMTP is insecure, there are many ways that you can secure SMTP. Let&#x2019;s review a few of those. </p><h3 id="ssltsl">SSL/TSL</h3><p>Yes, you can secure SMTP using Secure Sockets Layer (SSL) encryption or Transport Layer Security (TLS) encryption. But, using SSL or TLS to protect your SMTP server requires a little tweak because SMTP servers use port 25, and SSL cannot connect to that port. So, you need to select port 465 for the setup to work.</p><h3 id="client-side-solutions">Client-Side Solutions</h3><p>Email clients deploy client-side solutions such as Pretty Good Privacy (PGP) and Secure MIME (S/MIME) to secure SMTP traffic and ensure that their users&#x2019; emails are sent through a secure network throughout the servers. </p><h3 id="smtps-simple-mail-transfer-protocol-secure">SMTPS (Simple Mail Transfer Protocol Secure)</h3><p>SMTPS is a newer, secure version of SMTP that uses TLS encryption to ensure that emails are securely sent across servers to the recipient&#x2019;s device. Put simply, it is a way of securing SMTP at the transport layer, by wrapping SMTP inside TLS.</p><h2 id="conclusion">Conclusion</h2><p>The best thing you can do is integrate security features and add-ons to your SMTP server to protect the emails you send/receive. By encrypting SMTP servers, it becomes more difficult for hackers to decode and extract the data or information embedded in an email. </p><p>The email itself is insecure. It is left for you to secure your important data by leveraging newer email security technologies and solutions.</p>]]></content:encoded></item><item><title><![CDATA[Why is Email Insecure?]]></title><description><![CDATA[Emails are a widely used medium of communication in the professional world today. However, emails are insecure. Let’s go deep into how it is insecure and what can be done about it.]]></description><link>https://pragmaticparanoia.com/why-is-email-insecure/</link><guid isPermaLink="false">61f98b23f4483c06061fb5ad</guid><category><![CDATA[Security]]></category><category><![CDATA[Email]]></category><dc:creator><![CDATA[Mischa Untaga]]></dc:creator><pubDate>Tue, 01 Feb 2022 10:33:00 GMT</pubDate><content:encoded><![CDATA[<p>While this is not to scare you - you have to know it. Every email you send is &#x201C;Insecure&#x201D; by default even though your email client or Service Provider may assure you of 100% security.<br></p><p>Well, email is here to stay. It remains, up to this day, the most ubiquitous means of communication between individuals and organizations. Companies prefer Emails even after the widespread acceptance of social media networks and Instant Messengers (IMs). Email is the &quot;Ideal&quot; communication medium for corporations, enterprises, SMEs, and even individuals. Don&apos;t you use an email address for all professional communication? Yes, you do.</p><!--kg-card-begin: html--><aside class="toc"></aside><!--kg-card-end: html--><p>Today, email apps are embedded everywhere. They are built into mobile devices, computer OSes, gaming consoles, and almost every device out there. In fact, you need to have an email address to be on the internet. Yes, that&apos;s because you need an email for many functions. You need an email to sign up for offers, streaming services, deals, giveaways, online registrations, etc.</p><p>You need to enter your email address when setting up your iPhone, or your Android device. That&apos;s how important email is.</p><p>No doubt, email is here to stay, but you should understand that every data or file you share through email is liable to fall to sniffers and hackers. Now, let&#x2019;s get to the details.</p><h2 id="why-is-email-insecure">Why is Email Insecure?</h2><p>There are quite many reasons why we say that email is insecure. Reports have it that people send billions of emails daily. But, a very big percentage of those emails are &#x201C;Spam.&#x201D; If you don&apos;t believe me, go check out the spam folder of your email account.</p><p>Also, it is easy to alter the addresses in an email&apos;s &quot;From&quot; and &quot;To&quot; address bars. Hence, scammers try to impersonate reputable individuals and organizations. They send sensitive emails with the intention of gaining access to the &quot;Target&quot; company database or financial records.</p><p>According to<a href="https://www.helpnetsecurity.com/2018/08/03/email-impersonation-attacks/?ref=pragmatic-paranoia"> Help Net Security</a>, most companies suffer data breaches due to email impersonation attacks. Also, the<a href="https://www.itproportal.com/news/spam-still-a-popular-choice-for-online-criminals/?ref=pragmatic-paranoia"> IT Pro Portal</a> clarifies that &#x201C;Spam Emails&#x201D; are the commonest way to spread malware, viruses, and malicious URLs.</p><p>From different sources, it is clear that email is very much vulnerable and insecure.</p><p>Highly-touted email services like<a href="https://lavabit.com/?ref=pragmatic-paranoia"> Lavabit</a> and<a href="https://www.silentcircle.com/?ref=pragmatic-paranoia"> Silent Circle</a> have shut down due to email insecurity concerns. Nevertheless, people aren&apos;t giving up on using emails. It is the primary - and probably the most reliable - medium for personal and business communications.</p><p>Well, some new technologies and algorithms can help email clients to checkmate spam. Here, we have let out the reasons and &quot;facts&quot; why email is an insecure platform for sharing sensitive data.</p><h3 id="email-wasn%E2%80%99t-built-with-security-in-mind-no-encryption">Email Wasn&#x2019;t Built With Security In Mind (No Encryption)</h3><p>As crazy as it seems, this is the truth about email. It launched when the internet wasn&apos;t too exposed and versatile as it is at the moment. At first, you could only send emails using a computer. All emails sent were transparent and open. So, anyone could read the content because there was no encryption.</p><p>Earlier, emails went through open protocols and methods. Most of those methods are still existing to this date. Today, people can send emails through various devices, networks, and platforms. While many people view it as flexibility - the ability to send and read emails from any device - the real truth is that those devices can be compromised.</p><h3 id="how-emails-can-be-altered">How Emails Can Be Altered</h3><p>There are three places where sniffers can intercept and compromise any email. It is very easy to compromise emails on devices; how?</p><h3 id="on-the-senders-or-recipients-devices">On the Sender(s) or Recipient(s) device(s)</h3><p>If someone finds their way to access your PC, smartphone, smartwatch, or tablet, the person can read your emails without restriction. Well, except when you locked your email app with a password or two-factor authentication (2FA) security.</p><p>Hence, it is easy for an authorized person to read emails from both the sender&apos;s and recipient&apos;s devices. More so, when malware gets into a device, one of the things it does is to search for email files and data in the device&apos;s local storage - that&apos;s where the concern is.</p><h3 id="network-connections">Network Connections</h3><p>When it comes to networks and servers, it&apos;s a bit tougher. A scammer needs to be technically intelligent to understand how to temper emails while on transit to a recipient&apos;s device.</p><p>For someone to have access to your sent email while it&#x2019;s still on transit, the person must have access to:</p><ul><li>Your email provider (your ISP, Outlook, Hotmail, Google, Yahoo, etc.).</li><li>Your network connections.</li><li>And the recipient&#x2019;s network connection with their email provider.</li></ul><p>For someone to access your emails when you send to someone using the same email service as you do (e.g. sending email from a Gmail account to another Gmail account), the person only needs to temper with your network connection (as the sender) or that of the recipient&apos;s.</p><p>Once either of the connections is vulnerable, your email content can fall to the scammer. Similarly, if you&apos;re sending to an email address hosted by a different service (a Gmail account to an Outlook account or company account), there are several third-party channels the email needs to go through to get to the recipient.</p><p>Most times, those third-party channels are not safe and built with the latest security algorithms. That gives a technical scammer easy access to what&apos;s transmitted on the network.</p><p>You may be sure that your connection is secure, but what about the connection of the recipient?</p><h3 id="server-connections">Server Connections</h3><p>Sadly, most servers are vulnerable and easy to penetrate by scammers. Also, some email servers store email messages as &#x201C;Plain Text.&quot; This makes it very easy for anyone who has access to the server to read every detail of an email message.</p><p>So to say, most email servers are not end-to-end encrypted, and that&apos;s a huge security concern. Well, they leave it unencrypted for advertising purposes. Also, that helps to search for emails - using keywords - easier for the users.</p><h2 id="what-can-you-do">What Can You Do?</h2><p>Fine, emails are insecure, but are there any better alternatives? One can&#x2019;t say there are any better alternative communication channels out there.</p><p>Yes, IMs like <a href="https://faq.whatsapp.com/general/security-and-privacy/end-to-end-encryption/?lang=en&amp;ref=pragmatic-paranoia">WhatsApp offer end-to-end encryption.</a> This means no other person can read or access the files you send, even if they hack into your network or WhatsApp&apos;s servers. But still, many people prefer email for corporate communications. Here are some tips on how to use emails securely:</p><ul><li>Ensure an email service provider uses strong encryption and security technologies. That should be your first lookout before hosting your email with them. Mainly, most email clients and services use <a href="https://www.cloudflare.com/en-gb/learning/ssl/transport-layer-security-tls/?ref=pragmatic-paranoia">Transport Layer Security (TLS).</a> This encryption tech (TLS) is to ensure a secure connection between your device (the email sender) and the service.</li><li>If an email is no longer needed, delete it and also clear it from &#x201C;Trash.&#x201D;</li><li>Corporate and business emails should not be active elsewhere. Except on authorized, well-secured devices and systems used within the organization&apos;s premises.</li><li>Use end-to-end encrypted channels to send sensitive details and files.</li><li>Only use highly-reputable email services such as Outlook, Gmail, and Yahoo Mail. When setting up an email on your company&#x2019;s server, ensure to integrate security add-on features. That would help verify incoming and outgoing emails on the server.</li></ul><h2 id="conclusion">Conclusion</h2><p>Yes, email is not secure by default, but you can manually make it secure for yourself or your company. Not all links sent to your mailbox are genuine. Some are spam links that contain malware and viruses to phish your device.</p><p>Actually, it is still impossible to get 100% security with email. But, if you adhere to precautions and integrate security features, you can protect your data - to an extent.</p><p>Moreover, if you are just starting out on email and are confused whether you should use your real name or not, <a href="https://pragmaticparanoia.com/should-i-use-my-real-name-on-email/">read our article</a> to better find out if you should or not.</p>]]></content:encoded></item></channel></rss>