Happy #WorldPasswordDay! Don't forget your security is only as strong as the weakest link. We have several resources to help you understand how passwords can be compromised and what you should do to protect them.
First of all, should you use a "password" or a "passphrase"? The answer is that it depends. Learn about the password vs. passphrase debate: protonmail.com/blog/protonmai…
Next, explore the considerations behind how long your password should be. It turns out, even some long passwords can be hacked, so "length" is not synonymous with "secure." protonmail.com/blog/how-long-…
And finally, here are our three steps to create a strong password: 1. Use a password manager. 2. Generate unique, random passwords for all your accounts. 3. Use a long passphrase for passwords you must memorize.
More details: protonmail.com/blog/how-to-cr…
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Une proposition de loi votée par le Sénat aujourd’hui suscite de sérieuses inquiétudes pour la sécurité numérique des citoyens et des entreprises en France.
Cette loi forcerait les fournisseurs de services chiffrés, tels que Proton, à introduire des portes dérobées dans leurs applications, dans le but de lutter contre le narcotrafic.
Comme cela a déjà été précisé par l'ANSSI, ce serait porter atteinte à la sécurité de millions d’entreprises et citoyens français. Il est impossible de créer une porte dérobée qui ne laisserait entrer que les acteurs autorisés à le faire.
Having a hard time picking what to watch? 🎬 Here are 5 films about privacy to watch this weekend 🧵
🔽
We Live In Public - A dot-com millionaire, Josh Harris, explores the impact of media and technology on personal identity through radical social experiments. His project "Quiet: We Live in Public" placed over 100 artists in a surveilled terrarium in NYC, where their every move was captured. Harris later, live streams his own life with his girlfriend.
🔽
Kimi - In pandemic-era Seattle, Angela (Zoë Kravitz), a reclusive tech worker for a smart speaker company, discovers a murder while analyzing user recordings. Haunted by past trauma, her solitary world is upended as she uncovers dark secrets involving the company's CEO. Tension mounts as Angela becomes entangled in a dangerous conspiracy.
Our research into cybersecurity practices of politicians around the world continues with Denmark, Luxembourg, and the Netherlands. We found more than just emails and passwords - DOB, addresses, & social media accounts were also linked to these politicians’ email addresses.
⬇️1/6
Denmark 🇩🇰
Despite a recent uptick in cyber security threat levels, 41% of Danish politicians had email addresses leaked. One in particular had their email exposed in 25 breaches. Overall, 93 passwords were exposed 69 of which were in plaintext.
⬇️2/6
Netherlands 🇳🇱
The Netherlands fared better, with 18% of politicians having had their email addresses leaked. Overall, 35 passwords were exposed, 32 of them being in plaintext. The lower house of parliament had 3x more breaches than the upper house.
Our research into the #cybersecurity practices of #politicians around the world continues with Italy and Spain. Working alongside Constella Intelligence, we’ve found out how they stack up against other European politicians.
⬇️1/5
Spain 🇪🇸
Spanish politicians outperformed all other countries researched, with just 6.3% of politicians having data exposed. This included 9 plaintext passwords and 39 emails identified in leaks.
⬇️2/5
Italy 🇮🇹
Italy had a 14.9% exposure rate with 73 members of Assembly and 18 members of the Senate exposed. In total 195 passwords, 188 of them in plaintext, and 91 emails were leaked.
After the unexpected mention in last night's @joerogan podcast, people are wondering if Google is still suppressing Proton.
It's complicated, but probably.
Here's a bit more info. 🧵
1/7 Being suppressed in Google search is often fatal and Proton experienced a serious incident in 2015 (since then resolved, and no, we did not sue Google):
Google’s #DMA compliance plan is a sham, and here’s why.
⬇️ 1/6
What is the DMA?
Under the new European Union’s Digital Markets Act #DMA, the practice of ‘tying and bundling’ is now prohibited, meaning @Google must stop preferencing its own key services on @Android.
⬇️ 2/6
Dark patterns push you to use a Google Identity
If you don't have a Google Account, you will need to create one to sign in to your Android smartphone. Using dark patterns, #Google makes it very hard to use outside emails to create an account on #Android.