Shivam Shankar Singh Profile picture
Sep 26, 2020 11 tweets 2 min read Read on X
I’ve been following some data security hygiene since 2012 and some might have thought it was paranoid, but suddenly everyone thinks it’s really smart... so sharing it for your information:

1. If you don’t want your internet search known, incognito mode isn’t enough...
Good VPN + incognito of a separate browser is an okay practice.

DuckDuckGo + TOR is the best!

2. Online backups aren’t really secure unfortunately. iCloud, Google Drive have all been compromised in the past. Encrypted local storage (external HD/SSD) still wins in my book.
3. Keep 2 Factor Authentication on for everything! External token is ideal. Authenticator apps are good. SMS OTP is good enough.

4. Nostalgia is great, but don’t keep content. I stopped hoarding chat backups and documents long ago. If you stop using a device, wipe it.
5. Signal’s great. WhatsApp is good too. Issue is chat backups or local device. Securely wipe your phone and it truly is gone!

6. Nothing’s deleted till the sectors are written over. If you delete a file, do it with something that writes on top of it. Better yet...
7. To keep stuff truly secure, keep it all in Veracrypt (formerly TrueCrypt). You delete it in there, it isn’t coming back.

8. The person you talk to / chat with is likely doing none of this, so when their device is compromised your cyber hygiene is essentially meaningless.
9. It’s luck too. Your habits protect your data, but in the end it comes down to who’s after you and how each of your luck is operating.

There will always be points of weakness, but very likely if you do this much your adversary won’t be able to find that weak spot.
10. You can go all crazy with bootable USB sticks with Linux distros but then you might have bigger problems than simple data security. This thread likely isn’t what you need.
Realise that it isn’t about hiding illegal things. What started as a murder conspiracy is now about drugs. If that had failed it’d be about relationship gossip.

How your cyber trail will be used to discredit and destroy you isn’t yet known...
It depends on the story that sounds good at the time. Why you’d have someone who wants to do this?

Most likely you won’t. But then someone might be after your uncle’s best friend’s cousin in law, and they might reach you regardless.
You can be 100% legally in the clear but is living through a national TV embarrassment and an image destruction campaign worth it?

Take 5 mins, secure yourself. And especially secure yourself if we’ve ever talked! :p
Also do check out the Blacklight Project! You’d be surprised what websites track you, and to what extent.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Shivam Shankar Singh

Shivam Shankar Singh Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ShivamShankarS

Jun 13
A thread on what's coming next for the nation!

How to Win an Indian Election (Penguin, '19) is an intro to politics and how it works. How parties, citizens, and other stakeholders operate in the political realm.

The Art of Conjuring Alternate Realities (HarperCollins, '21)
explains how parties and nation states shape your information environment, and in effect shape your reality.

Anything you "know" and who you are is a product of the information you consume... shaping that shapes your thoughts. The book explains how that is done.
TACAR, as @iam_anandv loves to point out, also predicted a LOT of things years ago - including providing a roadmap for how an... ahem... authoritarian leader's control over information can be broken, and what such a leader would do to prevent his grip over reality from breaking.
Read 19 tweets
May 28
Looking into city planning and real estate in Delhi is a different sort of hellhole!

So much of Delhi is illegal. Even legal areas have all sorts of illegal construction. Municipality sends notice, people get court stays for decades! So bad, most builders just build illegally!
Image
Image
Even more crazy... people advise other to encroach! And people are like itna toh chalta hai while building totally illegally extended structures.

Areas with crores of people living don't have proper water and sanitation! No trash collection is super common. This is the capital!
Parking? You have to be insane to think there will be any! Everyone parks on the roads, leaving just enough space for one car at a time to pass.

Most illegal areas are two wheelers only, this is the posh Delhi - no parking. Just enough space to crawl through.
Read 6 tweets
May 25
I now have a working theory on ECI reluctance to disclose form 17C and voter turnout data.

There will be no mismatch. If there are more votes in EVMs than votes polled, all hell would break lose. It'd be the end of India's democracy tag and no one would risk losing the tag...
Instead, what we would see is voting is down in very specific, targeted booths.

Granular turnout data would have told us how opposition votes are being suppressed!

This'll still come out, but now after results, and no one would be able to do anything or care as much.
If the pattern was figured out now, there would be huge outcry. Instead all we see is few complaints of voter suppression. Machines not working. Police and goons causing disruptions... And overall decline in voting percent.

The narrative was voter apathy, lack of enthusiasm...
Read 8 tweets
Apr 23
Everything about EVMs is a secret. But what's out is super worrying.

1 - ECI lies about it. EVM are not standalone, all get connected to computers.

2 - Experts giving certificates of them being safe are same people who invented VVPAT...🧵

@NeelMadhav_ and @parthpunter report. Image
3 - ECI has no technical capabilities. It relied on a Technical Expert Committee to ensure EVMs are safe.

This committee was 4 IIT Professors. All 4 are also listed as inventors of the VVPAT. So they certify their own invention as safe.

This is where the weirdness starts...
4 - One of these professors is so sick, he can't even sign his name since 2019. He puts his thumb print on official documents.

Image
Image
Image
Read 12 tweets
Apr 18
Listened to arguments in the Supreme Court over #EVM #VVPAT, people were terrible at explaining the issues.

We know for a fact the EVM is not standalone. Each one gets connected to a computer! It's a windows software to load candidate names and symbols! A thread. Image
ECI keeps saying standalone as a reason for it being unhackable, except it isn't. It's connected to computers - all EVMs have to be, for them to have the candidate name and symbol to print.

Then claim EVM has had the same glass, and it's not been made black and totally opaque...
This is demonstrably false. The different glass versions can be seen on the ECI YouTube channel itself!

Translucent to completely black!

Read 15 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(