Recycling your passwords is a bad security practice ❌

Why not use a password manager to help with generating and maintaining passwords?

In this episode of the #OSINT show, host @IntelTechniques revisits password managers and #2FA 👇
Recommendations For Password Managers

Previously

🔹 Have always recommended @KeePassXC or @Bitwarden:
🔸 KeePassXC: A completely offline tool. Reserved for extreme scenarios
🔸 Bitwarden: A secure password manager that synchronizes your password database across multiple devices
Now

🔹 Online password managers have advanced quite a bit
🔹 Every reputable password manager encrypts everything on your machine before it goes into the database
🔹 Does not recommend LastPass, 1Password, Dashlane
🔹 For people new to password managers, he recommends Bitwarden
Usage Of A Password Manager

🔹 A password manager is used to:
🔸 Generate all your passwords
🔸 Maintain all of these passwords

🔹 If you have a weak password policy, this is a bad practice. At some point, you are going to get breached
🔹 Some people have passwords that are 250 characters long. This is overkill
🔹 For him, his passwords have a minimum of 20 characters
🔹 A lot of those older financial legacy websites ignore everything over X number of characters
🔹 When these websites make a change and look at the first X number of characters of your password against what they have on file, it could cause issues
🔹 He doesn’t use special characters on a lot of his passwords. Bank accounts might not be able to read special characters
🔹 The only thing you need to remember is the master password for the password manager
Benefits Of @Bitwarden

🔹 Their free package suits most new users
🔹 It has multi device sync
🔹 Works on multiple devices such as Mac, Linux, Windows, Android, etc.
🔹 It is completely open source — people are able to scrutinize their code 🧐
🔹 Audits from third party auditors
🔹 Their paid plan costs $10 a year. Needing a paid plan comes down to whether you need hardware token two-factor authentication
“I don't trust any of the companies. I trust the encryption, I trust the audits, I trust the security.”

- Michael Bazzell
Two-Factor Authentication (#2FA)

🔹 In the past, he said that your 2FA provider has to be separate from your password manager
🔹 The order of 2FA are still the same:
🔸 If an online service allows you to use a hardware token, then use the hardware token first
🔸 If not, then use a software-based token that is not SMS
Authy

🔹 @Authy is still a good product even though it’s not open source
🔹 They require a phone number
🔹 Can use a #VoIP phone number to synchronize your stuff
🔹 If you don’t like Authy, you could consider @StandardNotes
Bitwarden

🔹 Bitwarden can handle 2FA codes within the application itself
🔹 If someone gains access to your Bitwarden account, they gain access to both your passwords and your codes. So there’s a need to properly secure it
🔹 First, have a paid plan so that you can secure your Bitwarden account with a hardware token
🔹 Next, you have to be picky about the accounts which are not stored (e.g. primary email account) in the password manager. Could use a hardware token to secure your primary email account instead
🔹 Finally, you have to export your seed code offline
Should You Use Browser Plugins?

🔹 Not a big fan of browser extensions
🔹 Recommends people to install the desktop application on their device instead of relying on the website version of the password manager
Sharing Account Data

🔹 Bitwarden has the advantage over other providers
🔹 Can be split into 2 camps:
🔸 Families
🔸 Companies
🔹 For families: If it’s just 2 people, the free plan should work fine. If you need the family plan, it would cost more
🔹 For companies: Can have an entire team needing certain passwords
🔹 He has helped elderly clients to set up their Bitwarden accounts to automatically release their credentials X days after their death
🔹 Both parties have to have a Bitwarden account. One party has to send the other a request to be their emergency contact, with the other party approving that request
🔹 When the former dies, the latter could submit a request from their Bitwarden account to the former’s Bitwarden account to get the data
Conclusion

🔹 You have to identify the best path for yourself to take
🔹 You do not need to take the most extreme method
I hope you've found this thread helpful.

Follow us @The_ReadingApe for more.

Like/Retweet the first tweet below if you can:

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with The Reading Ape | Podcasts to Notes

The Reading Ape | Podcasts to Notes Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @The_ReadingApe

Dec 22, 2022
Are yield farms really dead? 💀

Are there lush green fields where people could put their money to work for them? 🌲🌲🌲

Let's dive into @OKCNetwork's recently launched liquid staking product 👇
First, what is @OKCNetwork (OKX Chain)?

🔹 An EVM- and IBC-compatible L1 built on @cosmos and is backed by @okx. It is:
🔸 Interoperable
🔸 Has high performance
🔸 Is scalable with low gas fees

💪 The blockchain is powered by the #OKT Token
The #OKT token is...

🔹 A hard-capped, scarce asset that is used to pay gas fees
🔹 Secures the #blockchain through dPoS staking
🔹 Has a similar halving model like #BTC
🔹 Staking generates rewards for users 💰

However...
Read 13 tweets
Dec 21, 2022
This year, we have experienced plenty of market crashes, ranging from LUNA, 3AC, Celsius, to FTX. 📉

In this episode of the @ChainLinkGod podcast, he and @Crypto___Oracle reflects on these crashes and the possible solutions to the problem

Read on 👇
The Collapse In The Crypto Markets

🔹 Lots of people got rekt
🔹 This was contagion from the $LUNA collapse
🔹 CeFi institutions did no due diligence and used massive leverage
🔹 Things unfolded on Twitter:
🔸 Digging through on-chain addresses
🔸 Hearing firsthand accounts from FTX employees
Read 33 tweets
Dec 20, 2022
Today, we have the charming @alexpoon_hk of @CharmVerse on the @CryptoSapiens_ podcast

Was @humptycalderon charmed?

We think so! 👇 Image
Background

🔹 Co-Founder of Charmverse, his third startup
🔹 Started off as a software developer
🔹 When he was 10 years old, he started selling gears from track cars to other kids
🔹 In 2010, he started his first company, a B2B AI/big data company that is targeted at publishers
🔹 After getting acquired, he started his second AI company helping people to schedule meetings over email
🔹 Started a redeemable NFT project in 2020
🔹 Spoke to various communities. Started building Charmverse to help organizations scale with smart contracts
Read 18 tweets
Dec 19, 2022
. @arbitrum started out as a class project at @Princeton

How did it grow and become what it is today?

In this episode of @investinalts, host @benlakoff speaks to @sgoldfed of @OffchainLabs 👇 Image
Background

🔹 Got into crypto in 2013 while doing his PhD in cryptography and computer science at Princeton
🔹 Was fascinated by the intersection of cryptography and #blockchain technology
🔹 Did a bunch of work on MPC wallets and threshold signatures at Princeton
🔹 Arbitrum dates back to 2013. His Co-Founder, @EdFelten, was a professor at Princeton at that time
🔹 Arbitrum was a class project at Princeton
🔹 They built a research paper out of the project. In 2018, they published the paper and founded the company
Read 30 tweets
Dec 13, 2022
Today I'm going to share the main highlights of the book The Willpower Instinct by @kellymcgonigal. I think willpower is like a muscle that needs to be trained so that you can tap on it when you need to. Want to know 11 ways to train & build up your willpower muscles?

Read on 👇 Image
Willpower is the ability to do what matters most, even when it’s difficult or some part of you doesn’t want to.

It's a competition between two conflicting selves - the long-term self and the short-term maximize pleasure/minimize pain self.
Remember the Cherokee story of 2 wolves inside you fighting? Which wolf - the dark or light one - will win?

The answer? The one that you feed the most wins.
Read 24 tweets
Dec 12, 2022
Breached data with login credentials is a huge problem. In this episode of the #OSINT show, @IntelTechniques shares how to find 3rd party services that provide these data and how to remove them from the web. Pretty important stuff.

Read on 👇
Update On Apple Devices

• Paul Asadoorian (@securityweekly) came on the show and viewers asked about Apple devices, which Paul was not familiar with. So here's the update:
• Apple computers e.g. MacBook Pro were made using the Apple M1 and M2 chips
• Old Apple laptops used Intel-based processors that have the Intel ME on the chip. However, it does not have remote access and network management
• Apple updates firmware when there are major OS updates
• A fully patched modern Mac is more secure than most other options
Read 17 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(