Proton Profile picture
May 7, 2020 4 tweets 2 min read Read on X
Happy #WorldPasswordDay! Don't forget your security is only as strong as the weakest link. We have several resources to help you understand how passwords can be compromised and what you should do to protect them. Image
First of all, should you use a "password" or a "passphrase"? The answer is that it depends. Learn about the password vs. passphrase debate: protonmail.com/blog/protonmai…
Next, explore the considerations behind how long your password should be. It turns out, even some long passwords can be hacked, so "length" is not synonymous with "secure." protonmail.com/blog/how-long-…
And finally, here are our three steps to create a strong password:
1. Use a password manager.
2. Generate unique, random passwords for all your accounts.
3. Use a long passphrase for passwords you must memorize.
More details: protonmail.com/blog/how-to-cr…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Proton

Proton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ProtonPrivacy

Mar 28
How we use the internet is largely shaped by a handful of US-based tech giants.

US gov't surveillance laws allow them to demand access to your data without your knowledge or a warrant.

Read the thread below for the list of European alternatives that put your privacy 1st.

1/16
We founded Proton in 2014 specifically to resist mass surveillance and abuses by Big Tech.

Google’s Gmail, Drive, Docs, Password Manager and Calendar can now be replaced with @ProtonMail, @ProtonDrive, Proton Docs, @Proton_Pass and Proton Calendar.

2/16
🔍 When it comes to search engines there are:

🇫🇷 @Qwant_FR, a privacy-first search engine based on Bing;
🇩🇪 @ecosia, a search engine that funds planting trees with ad revenue; and
🇬🇧 @mojeek, an independent search engine with strict privacy policies.

3/16
Read 17 tweets
Mar 27
Think this is a fun trend? Think again.

While some don't have an issue sharing selfies on social media, the trend of creating a "Ghibli-style" image has seen many people feeding OpenAI photos of themselves and their families.

Here's why that's a problem:

1/4 Image
Aside from the risks of data breaches, once you share personal photos with AI, you lose control over how they are used, since those photos are then used to train AI.

For instance, they could be used to generate content that may be defaming or used as harassment.

2/4
Many AI models, particularly those used in image generation, rely on large training datasets. In some cases, photos of you, or with your likeness, might be used without your consent.

Lastly, your data could be used for personalized ads and/or sold to third parties.

3/4
Read 4 tweets
Mar 26
None of your business (noyb), a privacy non-profit based in Austria and Proton Lifetime Fundraiser beneficiary, is helping a Norwegian ChatGPT user in a complaint against OpenAI.

This complaint has come as a result of fake information being generated by their LLM.

1/6
The user tried to find out if OpenAI had information about him, and so asked it to tell him who he was, using his full name.

ChatGPT confidently made up a story where he was a convicted child murderer, citing the right city and correctly stating that he has three kids.

2/6
Noyb undertook research in order to try and understand why this fabricated information had made it into the output, but there was no explanation or similar stories which could've been mixed in.

LLMs work by predicting the next word in a sequence in response to user input.

3/6
Read 6 tweets
Mar 21
Mark Klein, a former AT&T technician and whistleblower, passed away on March 8 2025.

Although not as well-known as figures such as Edward Snowden, he was responsible for uncovering a web of expansive government surveillance, publicizing this through whistleblowing. 🧵

1/6
Mark Klein always had a strong moral compass and a commitment to privacy.

When he saw coverage in the New York Times about increased surveillance brought in by President George W. Bush after 9/11, he realized that he had been a part of building out this infrastructure.

2/6
Mark linked this coverage to a secret & secure room that he had installed in AT&T's central San Francisco office - Room 641A.

He had been assigned to connect circuits carrying Internet data to optical "splitters" that sat just outside of this room & were hardwired into it.

3/6
Read 6 tweets
Mar 19
This year, researchers from George Mason University published a paper on a way in which Apple's Find My network could be used to maliciously track Bluetooth devices without root access. This method works across multiple operating systems and device types.

1/6 Image
When an AirTag goes missing, it sends out signals over Bluetooth Low Energy (BLE) to nearby iPhones. These in turn send the location of this AirTag back to Apple's cloud in order to help its owner find it again.

2/6
AirTags rely on these networks to locate lost devices rather than GPS. Apple’s Find My network is the largest, leveraging over a billion active iPhones and other Apple devices. This scale is also a weakness if someone has a way to exploit the network.

3/6
Read 6 tweets
Feb 4
Une proposition de loi votée par le Sénat aujourd’hui suscite de sérieuses inquiétudes pour la sécurité numérique des citoyens et des entreprises en France. Image
Cette loi forcerait les fournisseurs de services chiffrés, tels que Proton, à introduire des portes dérobées dans leurs applications, dans le but de lutter contre le narcotrafic.
Comme cela a déjà été précisé par l'ANSSI, ce serait porter atteinte à la sécurité de millions d’entreprises et citoyens français. Il est impossible de créer une porte dérobée qui ne laisserait entrer que les acteurs autorisés à le faire.
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(