John Opdenakker Profile picture
Aug 25, 2020 3 tweets 1 min read Read on X
How Gmail aliases work:

Email+<anything>[at]gmail[.]com

Everything after the + is ignored by gmail, thus 1 mailbox gives unlimited aliases.

Use service specific aliases to track the source of a data breach and services that share your data.

#Infosec #tip
If a site doesn't support the + sign in a mail address you can use dots instead to have a different email address as the dots before the at sign are optional.

MyEmail[at]gmail[.]com = My[.]Email[at]gmail[.]com
This is only for gmail but other mail providers have similar options. And of course if you have your own domain you can create seperate mail aliases for your online accounts

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Opdenakker

John Opdenakker Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @j_opdenakker

Mar 29, 2021
Interesting research by Trinity College Dublin about which data iOS (on iPhone) and Android (on Pixel) send to Apple and Google.

Even idle devices share telemetry data (also when user explicitely opted out) with Apple/Google on average every 4.5 mins.

scss.tcd.ie/doug.leith/app…
"phone IMEI, hardware serial number, SIM serial number and IMSI, handset phone number etc are shared with Apple and Google."

"iOS sends the MAC addresses of nearby devices, e.g. other handsets and the home gateway, to Apple together with their GPS location."
"Google collects around 20 times more handset data
than Apple"
Read 4 tweets
Aug 7, 2020
Well, let me elaborate a bit on this one. Pentests are only one of the crucial parts of a secure software development lifecycle. I like to think about it as the ultimate quality gate. a short thread

#infosec
If a pentest is the only security test you do that's still much better than nothing. It can result in a lot of high vulnerabilities to fix and fixing them for sure will improve the security of your applications. While your developers will (have to) learn how to fix these issues..
and improve their secure coding skills you should go a lot further. Ensure the dev teams threat model applications, train them if necessary. A secure application starts with a secure architecture. Added benefit of threat modeling with your team is mutual understanding of the app
Read 8 tweets
Aug 3, 2020
A thread with observations about #infosec professionals on Twitter. Probably won't make friends by saying this but anyway...
- A lot of infosec professionals live in utopia and are so far disconnected from avg users' reality
- Still SO MUCH user blaming instead of helping
- A lot give recommendations without having or taking into account the full picture. Ex: yes password cracking is a concern but there are other password related risks you should also be concerned about. Can't take into account what you don't know but please be open to learn.
- A lot fail/refuse to talk the language of the avg user. Failing is not the problem, but at least try. Come from your cloud and speak human language.

Ex: "just use MFA"
1) Avg user doesn't know what MFA is
2) For them it's not simple to use
3) Not available for all services
Read 7 tweets
Jul 3, 2020
A thread (rant) about this article and why telling people how to delay/block automatic updates is just a shit thing to do. It already starts with the title: "How to Block Windows 10 Updates for As Long As You Want".

#infosec
There's a very good reason why Windows and other vendors foresee auto-update features. To protect people that otherwise would never patch. This article is also read by average non-tech/security aware users, most of them don't understand the security risks and even if they do...
they're most likely not able to properly assess their own threat model and base their conclusion on existing threat intelligence. So things like recommending apps to circumvent the maximum delay of patching (which is already a poor advice for non tech/security savvy users) is bad Image
Read 6 tweets
Jun 28, 2020
So for the newcomers in #infosec a thread with some useful resources and people that are worth following in my opinion.
Check out my blog. I haven't been active recently but for instance last year I did a series for cybersecurity awareness month (October)
For people into appsec in particular, here's a blog with application security resources. johnopdenakker.com/some-useful-ap…
Read 9 tweets
Jun 21, 2020
Trying to reach TUI is harder than explaining how to use 2fa to a non techie
25 minutes in wait already and counting
39 minutes and counting.
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(