🔹 Have always recommended @KeePassXC or @Bitwarden:
🔸 KeePassXC: A completely offline tool. Reserved for extreme scenarios
🔸 Bitwarden: A secure password manager that synchronizes your password database across multiple devices
Now
🔹 Online password managers have advanced quite a bit
🔹 Every reputable password manager encrypts everything on your machine before it goes into the database
🔹 Does not recommend LastPass, 1Password, Dashlane
🔹 For people new to password managers, he recommends Bitwarden
Usage Of A Password Manager
🔹 A password manager is used to:
🔸 Generate all your passwords
🔸 Maintain all of these passwords
🔹 If you have a weak password policy, this is a bad practice. At some point, you are going to get breached
🔹 Some people have passwords that are 250 characters long. This is overkill
🔹 For him, his passwords have a minimum of 20 characters
🔹 A lot of those older financial legacy websites ignore everything over X number of characters
🔹 When these websites make a change and look at the first X number of characters of your password against what they have on file, it could cause issues
🔹 He doesn’t use special characters on a lot of his passwords. Bank accounts might not be able to read special characters
🔹 The only thing you need to remember is the master password for the password manager
🔹 Their free package suits most new users
🔹 It has multi device sync
🔹 Works on multiple devices such as Mac, Linux, Windows, Android, etc.
🔹 It is completely open source — people are able to scrutinize their code 🧐
🔹 Audits from third party auditors
🔹 Their paid plan costs $10 a year. Needing a paid plan comes down to whether you need hardware token two-factor authentication
“I don't trust any of the companies. I trust the encryption, I trust the audits, I trust the security.”
🔹 In the past, he said that your 2FA provider has to be separate from your password manager
🔹 The order of 2FA are still the same:
🔸 If an online service allows you to use a hardware token, then use the hardware token first
🔸 If not, then use a software-based token that is not SMS
Authy
🔹 @Authy is still a good product even though it’s not open source
🔹 They require a phone number
🔹 Can use a #VoIP phone number to synchronize your stuff
🔹 If you don’t like Authy, you could consider @StandardNotes
Bitwarden
🔹 Bitwarden can handle 2FA codes within the application itself
🔹 If someone gains access to your Bitwarden account, they gain access to both your passwords and your codes. So there’s a need to properly secure it
🔹 First, have a paid plan so that you can secure your Bitwarden account with a hardware token
🔹 Next, you have to be picky about the accounts which are not stored (e.g. primary email account) in the password manager. Could use a hardware token to secure your primary email account instead
🔹 Finally, you have to export your seed code offline
Should You Use Browser Plugins?
🔹 Not a big fan of browser extensions
🔹 Recommends people to install the desktop application on their device instead of relying on the website version of the password manager
Sharing Account Data
🔹 Bitwarden has the advantage over other providers
🔹 Can be split into 2 camps:
🔸 Families
🔸 Companies
🔹 For families: If it’s just 2 people, the free plan should work fine. If you need the family plan, it would cost more
🔹 For companies: Can have an entire team needing certain passwords
🔹 He has helped elderly clients to set up their Bitwarden accounts to automatically release their credentials X days after their death
🔹 Both parties have to have a Bitwarden account. One party has to send the other a request to be their emergency contact, with the other party approving that request
🔹 When the former dies, the latter could submit a request from their Bitwarden account to the former’s Bitwarden account to get the data
Conclusion
🔹 You have to identify the best path for yourself to take
🔹 You do not need to take the most extreme method
🔹 A hard-capped, scarce asset that is used to pay gas fees
🔹 Secures the #blockchain through dPoS staking
🔹 Has a similar halving model like #BTC
🔹 Staking generates rewards for users 💰
🔹 Co-Founder of Charmverse, his third startup
🔹 Started off as a software developer
🔹 When he was 10 years old, he started selling gears from track cars to other kids
🔹 In 2010, he started his first company, a B2B AI/big data company that is targeted at publishers
🔹 After getting acquired, he started his second AI company helping people to schedule meetings over email
🔹 Started a redeemable NFT project in 2020
🔹 Spoke to various communities. Started building Charmverse to help organizations scale with smart contracts
🔹 Got into crypto in 2013 while doing his PhD in cryptography and computer science at Princeton
🔹 Was fascinated by the intersection of cryptography and #blockchain technology
🔹 Did a bunch of work on MPC wallets and threshold signatures at Princeton
🔹 Arbitrum dates back to 2013. His Co-Founder, @EdFelten, was a professor at Princeton at that time
🔹 Arbitrum was a class project at Princeton
🔹 They built a research paper out of the project. In 2018, they published the paper and founded the company
Today I'm going to share the main highlights of the book The Willpower Instinct by @kellymcgonigal. I think willpower is like a muscle that needs to be trained so that you can tap on it when you need to. Want to know 11 ways to train & build up your willpower muscles?
Read on 👇
Willpower is the ability to do what matters most, even when it’s difficult or some part of you doesn’t want to.
It's a competition between two conflicting selves - the long-term self and the short-term maximize pleasure/minimize pain self.
Remember the Cherokee story of 2 wolves inside you fighting? Which wolf - the dark or light one - will win?
Breached data with login credentials is a huge problem. In this episode of the #OSINT show, @IntelTechniques shares how to find 3rd party services that provide these data and how to remove them from the web. Pretty important stuff.
Read on 👇
Update On Apple Devices
• Paul Asadoorian (@securityweekly) came on the show and viewers asked about Apple devices, which Paul was not familiar with. So here's the update:
• Apple computers e.g. MacBook Pro were made using the Apple M1 and M2 chips
• Old Apple laptops used Intel-based processors that have the Intel ME on the chip. However, it does not have remote access and network management
• Apple updates firmware when there are major OS updates
• A fully patched modern Mac is more secure than most other options