A Defensive Computing Checklist     by Michael Horowitz

This is a list of both things to be aware of and specific defensive steps that we can take in response to the common threats of 2019. No list like this can ever be complete, nor would anyone want it to be complete as that list would never end. I tried to limit this to the most important issues, still its long (6,000 words). Techies will find some of this obvious but they are likely to learn something nonetheless. Non techies may find some of it too advanced, if so let me know (see bottom of page).

SECTIONS: Email, Understanding Domain Names, Verified Website Identity, Secure Websites, Passwords, Phone calls, Identity Theft, Web Browsers, Public Wi-Fi, Amazon Alexa, Location Tracking, Networking, Desktop Operating System, Encryption, Facebook, Mobile OS, Search Engines, Extra Credit
  1. EMAIL

    Many times, perhaps most of the time, the first step in a company getting hacked is an email message.

    • You never know who sent an email message, so think carefully before taking action based on a single message. It is fairly easy to forge the FROM address of an email. Techies can look at the hidden email headers to get an idea who really sent a given message, but this is not a skill taught in nerd school. Be especially careful about doing anything involving money, passwords or personal information based on one lousy email message.
    • In light of the above, we might be tempted to trust that an email was legit, if it knew something about us. However, our personal information has leaked time and time again, so including information about you, specifically, is no indication that the sender is who they claim to be or that the message is legit. For example, Starwood was hacked, so an email about the time you stayed at the Westin hotel in Cleveland in the summer of 2018, may not be from Starwood. Bad guys know you stayed there too.
    • The use of official logos and images in an email message also does not indicate legitimacy. See How to spot suspicious emails and Dealing with Fake 'Ask Leo' which examines a scam email message for telltale signs.
    • The more urgent the plea for you to take action, the more likely it is to be a scam. Bad guys don't want you to have a chance to think about the issue or check with others.
    • Email attachments: Word documents and PDF files are often hacked to install a virus on a Windows computer. It is best to open any file sent to you by email in a safe environment such as a Chromebook (more below). Or, if you know a techie, have them review it first. Or, download the attached file and go to VirusTotal.com to scan it with many different anti-virus programs before opening it. Excel and PowerPoint files can also be dangerous. While those are the most common, any type of attached file can be dangerous.
    • Attachment defense: The only safe way to open a file attached to an email message is on a Chromebook running in Guest mode. There is more on Chromebooks below. An email with a password protected attachment, that has the password in the body of the email message, is surely malicious. This is a trick bad guys use to prevent anti-virus programs from detecting malicious software. If you try to open an attached file and it fails to open, you can still get infected with a virus (except on a Chromebook in Guest mode).
    • Taking a step back, it seems to me like we are living in a time much like the one before seat belts were required in cars. The current risky behavior is reading email on a computer with sensitive or important files (or LAN based access to such files). Everyone does it, yet everyone is wrong. Too risky.

    Fake websites are a common scam. To identify the fakes, you need to understand the rules for domain names. Some domain names are: google.com, columbia.edu, irs.gov and RouterSecurity.org. Many website names look legit to someone who does not know the rules. Here are the rules.

    • A domain name usually consists of two parts separated by a period. Sometimes a domain with a country code, such as UK for the United Kingdom, consists of three parts. An example is the British newspaper the Daily Mirror at mirror.co.uk.
    • Domain names are not case sensitive. GOOGLE.com and Google.com and google.com are the same thing.
    • The full web page identifier (URL to techies) consists of sub-domains on the left, a domain name in the middle, a slash, and finally, the unique name of the web page on the website. For example, if you visit the IRS website and want to work for them, you end up at
      www.jobs.irs.gov/application-process/application-process/how-apply  where
      www.jobs  is the subdomain
      irs.gov  is the domain name, and
      application-process/application-process/how-apply is the specific web page at the IRS website.
      Some web browsers, such as the desktop version of Firefox, help you identify the domain name by highlighting it in the address bar.
    • Sub-domains help a big organization logically chop themselves into smaller pieces. Technically speaking, the classic three Ws to the left of the domain name is a sub-domain. Any string of letters, dashes and numbers can be at the left of the domain name. No matter what's there, it is all part of the same domain. Sub-domains are optional. Two examples:
      1. The math department at Columbia University might be math.columbia.edu or www.math.columbia.edu or nerds.math.columbia.edu. They are all part of the Columbia.edu domain, so they all belong to Columbia University.
      2. The domain citi.com belongs to Citibank. Anything that ends with ".citi.com" (note the leading period) is also Citibank. For example: secure.citi.com, jobs.citi.com, online.citi.com, a.b.c.d.e.citi.com, some-thing-else.citi.com, any.thing.at.all.citi.com.
    • The flip side of the last example is that just having "citi" in a domain name means nothing. For example, these domain names have no relationship to Citibank: citionlinebanking.com, citi-online-banking.com, citi.onlinebanking.com, citi-thebank.com, citibank-online.com, citibankingonline.com, secureciti.com and TrustUsWeAreCitibank.com. When I go to citi.com, I end up at online.citi.com. Perhaps the best fraudulent domain is onlineciti.com. If you ignore the one missing period, it looks legit. Sadly, this domain is available today (April 3, 2019) for bad guys to buy. Oh, and citibankonline.com is really Citibank.
    • Another way people are fooled is by using a legitimate domain name as a sub-domain. For example: citi.com.badguy.com is part of the badguy.com domain, and citi.com.securebanking.com is part of the securebanking.com domain. See, it's important to know the rules. In spatial terms, "citi.com" on the far left is a scam, "citi.com" on the far right (just before the first slash), is Citibank. And, repeating myself, the domain name ends at the first slash.
    • Some real life domain name scams:
    • And, of course, dot com is not the only thing that website/domain names end with. Sure, apple.com is the company that makes iPhones, what about apple.net, apple.org, apple.gov, apple.me, apple.us, apple.cn, apple.jobs, apple.app, apple.site, apple.edu, apple.biz, apple.name, apple.theater, apple.talk, apple.tv and apple.movie? Assume nothing. They may belong to the iPhone vendor, they may not. Some of these do, some do not. Citibank customers, accustomed to online banking at citi.com, should not assume that citi.somethingelse also belongs to their bank. That's not he way the system works.
    • Finally, some good news. Companies that register domains are called "Registrars" and they are required to make information about domains public. This database is referred to as "Whois" and, in the Whois system, the domain owner is referred to as the "Registrant." Other useful information is the technical contact, the administrative contact, the name of the Registrar and for techies, the authoritative DNS servers. Some Registrars offering a Whois lookup are: Namecheap, Gandi, pair Domains, eNom and Tucows Domains. DomainTools also offers a Whois lookup. That said, a domain owner may not want their contact information public. If you look up this domain (DefensiveComputingChecklist.com) for example, you will not find my home address. While people may want to hide, legitimate companies have no reason to do so. Needless to say, the bad guys behind the internal-message.app domain hide their identity. However, if law enforcement cared, they would knock on the door of their registrar NameCheap.com to see who paid for the domain.

    Everyone is told there are two types of websites: secure (HTTPS) and not secure (HTTP). In fact there are three types of websites. The third type is a "secure" site that has gone the extra mile and offers proof of its identity.

    • In another type of attack, a web browser may display the correct something.citi.com, and yet, the website could still be a fake. To prevent this, companies that take this stuff seriously pay extra to have their identities verified. You can see this extra identity validation at, for example, citi.com which says "Citigroup Inc. (US)" just to left of online.citi.com in the address bar (see example). Bank of America does the same thing as you would expect any financial company to do. In contrast, my dinky websites, such as this one and my personal site (michaelhorowitz.com) do not have identity verification (see contrast). If the website of your financial institution has this extra identity protection, get in the habit of looking for it. If this information is not provided, take that as a bad sign about the company and its website. In techie terms, my websites are Domain Validated (DV), the Citigroup and Bank of America websites have Extended Validation (EV). The home office of incompetence, Equifax, does not offer identity verification. Not a surprise. What is surprising is that neither does Amazon.com (shown in the screen shots). Sadly, there is a trend in web browsers to suppress the visual indication of sites offering identity verification. If your browser does not show the difference, use a different browser.
    • As with email messages, the content of a fake website can look exactly like the real thing. Anyone can copy images and text and fonts from the real site and use them to make a fake site.

    • The concept of secure websites, indicated by HTTPS or a lock icon, is, in many ways, a scam. The security that people tout refers to a small piece of a large pie. Specifically, it refers to in-flight data; data being transmitted back and forth between your computer and a website. If, while traveling over the Internet, the data/web page is encrypted, then the entire site is said to be secure. Fact is, dozens of things can still leak your sensitive data. Take the just-discussed EV/DV validation of websites. Without real identity verification (EV), you could "securely" send passwords to bad guys. Another scam is that encryption is a binary thing, that it is either on or off. In reality, it is quite complicated. So much so, that there are security rating websites (next topic). Perfect Forward Secrecy (PFS) is another factor, one that is hardly every discussed. Without PFS spy agencies can very likely (no one knows for sure) decrypt the encrypted data traveling over the Internet. Another factor is keeping private encryption keys private. If they leak (its just a string of bits), encrypted data can, again, be decrypted. No one knows how well any website protects its private keys. Then too, many websites continue to support older security/encryption protocols with know flaws (TLS 1.0 and 1.1). And, websites have different sections, each section has its own security profile; one section may be more secure than another. For example, in 2016, I blogged about how www.ssa.gov was secure while secure.ssa.gov was not (since fixed). And, nothing about encryption in transit tells you anything about the strength of the security on the back end (think Facebook storing passwords in plain text) or whether software running on the back end is being updated with bug fixes (think Equifax), how good their defenses are against attacks, who they share your data with or whether the data is left publicly available to anyone who knows where to look, no attacking needed (this happens a lot). I could go on. Anyone who tells you to trust a website because it is secure, is either un-informed or lying on purpose because it serves their needs.
    • A great website for evaluating the encryption used by a website is the Qualys SSL Server Test. Ironically, it does not have extended identity protection. Still, it offers both a ton of technical information about encryption and a simple letter grade at the top. I suggest testing your most important sites: banking, email and any website holding your sensitive information. Every site should get either and A or A+. Anything else is a failure. The orange horizontal stripes under the letter grade are security failures. To be thorough, you need to check each section of a website. For example, at the US Social Security Administration, you would check both www.ssa.gov and secure.ssa.gov. To put this in perspective, again, encryption is a small piece of a large pie. Nothing about the strength of the encryption used to send/receive data tells you anything about whether passwords are stored in plain text, or whether bug fixes are applied to the software running the website, or any other aspect of security.
    • Any website that you can access with just a userid/password is not really secure. There are many ways companies can increase the security of websites by making it harder to logon. The official term for this is two factor authentication (2FA). One approach is that the company sends customers an email message with a temporary code that the customer has to enter, after, they already entered a userid/password. Another common technique is to send a temporary code as a text to a phone. Or, a normal phone call with some type of response that proves a human answered the call. Or a normal phone call where a computer tells you the temporary code. There are also mobile apps (such as Authy and Google Authenticator) that can generate temporary secondary codes. The most secure option involves a physical thingy you connect to a computer/tablet/phone that verifies your identity. Most systems, however, do not support this. Two factor authentication is overkill for many websites, but it is something you really want to have on any banking or financial sites you use. Perhaps for email too. To see if the companies you deal with offer this, go to twofactorauth.org. This is also known as MFA, Multi-Factor Authentication. More: Two-Factor Authentication Keeps the Hackers Out by Leo Notenboom (June 2016).
    • Some websites use secret questions as a way to identify you should you forget your password. Never answer these truthfully. You don't want the answer to be anything that someone could either guess or learn about you. In fact, don't even give reasonable answers. If it asks for the name of a person, make the answer the name of a place instead. You never know if the answers are case sensitive or not, so it is safer to only use lower case. In my opinion, it is also safer to avoid spaces and special characters too. Just like passwords, these questions and answers need to saved somewhere that you can find them later. Nothing wrong with paper and pencil.

    • Never re-use passwords. We all need dozens or hundreds of passwords, yet we can remember just a few. Nonetheless, this is a very important rule. Companies are hacked all the time, leaking passwords that bad guys then try at other systems/websites.
    • Almost every computer nerd recommends password management software. I disagree. Techies that say this are thinking inside the box and over valuing the need for randomness in passwords. They also underestimate the hassle of new software for non techies.
    • Try using a formula to generate your passwords. A simple formula is to start every password with the same string of characters. Then, you can chose very simple passwords to append to the constant beginning. For example, a baseball fan might start every password with "BaseballRules!" Then, if "jungle" was their password for Amazon.com, the actual password is "BaseballRules!jungle" And, all you would have to remember would be that your Amazon password is "jungle". Pretty easy. Amazon. Jungle. And, the miserable password "book" for Barnes and Noble, becomes a good password ("BaseballRules!book") when run through the formula. Perhaps the worst password is the word password. But, as Leo Notenboom points out, "1234 password 1234" is a pretty good password. It's also easy to remember. There's a formula: start and end every password with "1234". Love your dog? Start your passwords with "rover-" or "fido/"
    • Storing passwords: Using a formula lets you write down just the easy/right part of the password and still be secure. If someone saw your password list and read that "book" was your Barnes and Noble password, it would be useless without the formula. Passwords written on paper can not be hacked; just be sure to xerox the list every now and then in case you lose it.
    • Traveling passwords: Paper passwords work everywhere, no matter the device, the Operating System or the software being used. I use a password manager and its useless on a Chromebook running in Guest mode which is where I do my sensitive transactions.
    • All that said, no single approach is appropriate for everyone. And, some passwords are much more important than others.

    You never know who calls you on the phone. Callerid can be spoofed just like the FROM address in email, so the same advice holds: think carefully before taking action based on a single phone call, especially any action involving money, passwords or personal information.


    Considering the many data breaches of personal information, along with the legal sharing of it, ID theft is all too likely. Here are some things to do to in preparation.

    • Bad guys might try to open a credit card in your name. To prevent this, you can get a credit freeze with TransUnion and Experian and Equifax.
    • Bad guys might use your credit card to buy themselves stuff. You can be alerted to this by having your credit card company notify you, in real time, about charges on your account.
    • Americans should open an account with the IRS (irs.gov) to prevent bad guys from opening an account in your name and getting your tax refund. Even if you never use this account, it is safer to have it. Brian Krebs: has more (January 2018).
    • Americans should also open an account with the Social Security Administration (ssa.gov) regardless of their age. This prevents bad guys with your stolen information from opening an account as you, and, for many people, is the only way to verify that their earnings are correctly reported.
    • Bad guys may try to impersonate you to get your cellphone number assigned to their telephone, a process known as a SIM swap. They do this because a phone number is often used to prove identity, with things like forgotten passwords. To defend against this, you can create a security code with your cellphone provider. This code needs to be provided over the phone, or in person at a store, before account changes are made. T-Mobile calls it an Account PIN. Verizon calls it both an Account PIN and a Billing Password. AT&T calls it a Security Passcode. The defense, however, is far from perfect. Brian Krebs wrote in Nov. 2018 that there is no defense against malicious employees of the cellphone company. He also wrote about lazy employees who ignore the system. More: Why Phone Numbers Stink As Identity Proof by Brian Krebs March 2019.
    • A free annual credit report, available at annualcreditreport.com can't hurt. However, two things about the site are a sham. For one, it says that you can order reports online. When I last tried this in December 2018, it was not true, reports had to be ordered via postal mail, and, I was not told this until after I entered all my personal information. Also, the site has not opted for extra identity validation for itself (see topic on VERIFIED WEBSITE IDENTITY). Requests on paper are the way to go.
    • Identity Theft info from the FTC
    • The Identity Theft Resource Center (idtheftcenter.org) offers free assistance for ID theft. They may be well-meaning, but their computer advice, is shamefully ancient and lame.

    • Choosing: Web browsers are one area where the wisdom of the crowd does not apply. In the old days, the crowd used Internet Explorer, now it's Google's Chrome browser. Don't use either one. Or Edge. I am not a big Apple user, so I don't have an opinion on Safari. I suggest using either Firefox or the Brave browser. Brave has ad blocking and tracker blocking built in. It is based on Chrome, supports all Chrome extensions and runs on Windows, macOS, Linux, Android and iOS. See I protected my privacy by ditching Chrome for Brave‚Äďand so should you (Michael Grothaus March 2019) and How I'm locking down my cyber-life (Larry Sanger Jan. 2019). The HTML pingback feature is but one of hundreds of features in a web browser. But, we can use it to judge which browsers care about our privacy (Firefox, Brave) and which do not (all the rest). See this article by Lawrence Abrams for details.
    • Track me not: If the websites you visit are determined to track you it is all but impossible to prevent it. Still, you can fight back. One approach is to use private/incognito mode in your web browser. For background, see What Does Private Browsing Mode Do? by Martin Shelton July 2018. Another option is to manually delete cookies and other tracking data in your browser. In Chrome and Brave, enter chrome://settings/siteData in the address bar, then click the Remove All button. In Firefox, enter about:preferences#privacy and click on the Clear Data button. Perhaps bookmark these URLs. Firefox can automatically delete cookies when the browser shuts down, something Chrome and Brave do not support. Using the same Firefox URL, turn on the checkbox for "Delete cookies and site data when Firefox is closed". The biggest hammer in the toolbox to avoid being tracked is Guest mode on a Chromebook.
    • Install an ad blocker in your web browser. I say this not because it makes web pages load faster (it does) but because ads have been abused too many times to install malicious software or take you to scam websites. Even Chromebook users can be scammed at websites (no malware though). I realize that this prevents sites from earning revenue to which I can only say that the ad blocker can be disabled on sites you wish to support. However, no website can be trusted to only show non-malicious ads because the website itself does not choose the ads. It's a mess.
    • Web browser extensions can, if you let them, read and modify the contents of every displayed page. This is necessary, for example, with an ad blocking extension. However, it can be abused to, so when installing extensions pay close attention to the permissions it requests. It is a good idea to periodically review the extensions installed in your browser and remove any you really don't need. I have seen non-techies be tricked into installing malicious extensions. To display the installed extensions, use these address bar URLs (perhaps bookmark them): In chrome chrome://extensions, in Brave brave://extensions, in Firefox about:addons. I blogged about potentially dangerous extensions here and here and here.

    Public Wi-Fi is always dangerous, whether a password is required or not. It is best to keep your main/regular computing devices away from public networks. If possible, use a Chromebook on public networks. Regardless of the computing device:

    1. Anyone can name a Wi-Fi network anything. As a result, bad guys can create wireless networks with the same name (SSID) as a legitimate network. The official term for this is an Evil Twin network. Non techies can not distinguish an Evil Twin from the legit network it is pretending to be. Neither can a computer/phone/tablet which will happily connect to the evil network. Techies can look at the MAC address of a wireless network, but even that can be spoofed if the bad guy knows how.
    2. Use either a VPN (not a free one) or Tor on a public network. Both hide your activity from the router creating the public network which is a good thing whether the network is an Evil Twin or not. More in the Networking topic below. If this is too much, then on mobile devices, use the Cloudflare app available on Android and iOS.
    3. After connecting to the network, and starting the VPN or Tor or Cloudflare, check the DNS servers actually in effect. If using a VPN, the DNS servers should be from the VPN provider. It is very dangerous to use unknown DNS servers.
    4. Even with all the protection in the world, there are some things best avoided on any public network. You never know who is watching over your shoulder.
    5. Disable Wi-Fi when not using it. It is not sufficient to simply disconnect from the public network.

    If you must use your regular devices on a public network, then have a techie check them for open TCP/IP ports. This probably will be done with the nmap utility. Check for all 65,500 TCP ports, looking especially for file sharing ports. If file sharing is enabled, then learn how to disable it and verify that its ports get closed when its disabled.

    One way to avoid public Wi-Fi with a laptop, is to use the 4G/LTE connection on a phone for Internet access. That is, make the phone into a hotspot and connect the laptop to the phone's Wi-Fi network. One, or both, of the devices should be connected to a VPN.


    Bloomberg reported in April 2019 that Amazon Workers Are Listening to What You Tell Alexa. There are options in the app to disable this (Settings -> Alexa Account -> Alexa Privacy -> Manage How Your Data Improves Alexa) but they may not be honored. Expect the same with Apple's Siri and Google's Assistant. Another privacy issue with Alexa is that the devices phone home to Amazon and to others, even when they are not being used. No one knows why.


    The standard advice here is poor. Basically, the advice is to play whack-a-mole. That is, to configure access to location data on an app-by-app basis. Still other bad advice, on Android, was to disable location history. This did not actually disable location tracking. My advice is prevent iOS and Android from knowing your location in the first place. To do this:

    1. Turn off 4G/LTE Internet
    2. Turn off Wi-Fi
    3. Turn off Bluetooth
    4. Turn off GPS by disabling "Location" (Android) or "Location Services" (iOS)
    With these four things disabled, a phone can still make/receive calls and text messages. However, your location can be still tracked by the cell tower the phone is talking to, but, this only provides a general idea of where you are rather than a precise location. The next step would be to enable airplane mode and the step after that is to turn the phone off. A dedicated GPS app can be used to confirm the status of GPS. If a weather app wants to know your current location, give it a couple zip codes of where you normally are instead. A side benefit of having this stuff disabled is better battery life. This December 2018 article in the NY Times, documents the tracking, but not defense. Same for this article.

    • Networking equipment (router or combination modem/router) provided by Internet Service Providers is typically insecure and low quality. Anything you buy at retail is likely to be more secure. It may also be cheaper in the long run and makes you a lesser target (a million people are not using the same router model). I have a whole website devoted to Router Security. At the least, try to make the router configuration changes in the short list on the home page. Comcast customers see this.
    • Ethernet is more secure than Wi-Fi, so whenever possible connect via Ethernet for sensitive work. It's also faster. USB to Ethernet adapters cost about $15.
    • Use a Guest Wi-Fi network both for visiting humans and for IoT devices. Better yet, if your router supports it, use VLANs to further segregate devices (requires a techie). More here.
    • At this point, it is common knowledge that Wi-Fi encryption should use WPA2 rather than the ancient WPA or WEP. If given a choice, WPA2 AES is more secure than WPA2 TKIP. Note that the length of the Wi-Fi password is critical for security; passwords should be 14 characters or longer. More here.
    • By the way, Google knows nearly every Wi-Fi password in the world. And if Google knows them, what are the odds that Apple (via iOS) does not?
    • A VPN prevents spying on your online activity by anyone you an see (anyone on the same local network) and by the ISP connecting you to the Internet. In the US, ISPs are allowed to spy on their customers and sell that data. A "secure" website prevents others on your LAN and your ISP from reading the content of web pages. However, they can still tell which websites you visited. In some cases, just the website name gives away too much information. VPNs hide everything. Picking a VPN provider is mind bogglingly difficult. Even agreeing on the criteria to judge them with is impossible. See one attempt and another. I have my opinions on good/trustworthy VPN providers, email me for my suggestions.

    The most secure Operating Systems in widespread use are iOS and ChromeOS (the system on Chromebooks).

    • Do not use Windows. Windows is a cesspool of hacking, ransomware, bugs and vulnerabilities. Has been for decades. With Windows 8 Microsoft lost all credibility. With Windows 10 Microsoft spies on you and has taken control of installing bug fixes. Their corporate mind set has changed, such that they view Windows 10 as their computer, not yours. It is also crammed full of junky software that very few people care about, much of which can not be removed. Techies can mitigate this somewhat but only the largest of corporations can fully opt out of the spying, junky software and forced "updates" in Windows 10. Microsoft has a clean version of Windows 10 called LTSC or LTSB that millions of us want, but can't get. See screen shot
    • Everyone knows that an Apple Mac computer (macOS) is safer than Windows. This is true, but not drastically so. Both are ancient and the world has changed dramatically since they were designed.
    • On both Windows and macOS, it is safer to logon to the computer as a restricted (a.k.a. limited, standard) user rather than an unrestricted (i.e. administrator, admin or root) user. In each system, restricted users are limited in the changes they can make to the system without approval from an unrestricted user. This limits the damage that malicious software, that makes its way onto your computer can do. Any computer with a single userid is just asking for trouble. On a new Windows or macOS computer, consider creating two users based on your first name: MichaelAdmin and MichaelRestricted, for example. On an existing computer, create a new admin user, logon to it and then modify the existing userid to be restricted. This does not apply on a Chromebook.
    • Start using a Chromebook. Chromebook laptop computer are drastically safer than Windows and macOS. Their operating system, ChromeOS, is the newest available system and the most advanced. It was designed, by Google, with security in mind. They are a revolution in computing in that they don't need any care and feeding. No viruses. End users (you) can not screw them up. Chromebooks are not for everyone and not for every purpose. They are perfect for kids, seniors and non techies. More people should be using them, they are the home office of Defensive Computing. You normally use a Google account to logon to a Chromebook, but there is also a Guest mode that anyone can use without logging on.
    • Linux: Linux on a desktop/laptop computer is pretty safe, but, nonetheless, not a realistic option. For one, getting it installed is too difficult for non-techies. And, the few laptops that ship with Linux pre-installed are fairly expensive. Also, where does a non techie go with their inevitable questions and problems? And, the many distros and package managers make almost every Linux install unique, which makes it even harder to get help when needed.
    • FYI: We can see the progression of Operating Systems in how they handle software updates. On ChromeOS all software is updated automatically. It is king of the hill in this regard. On Android and iOS, the apps can update automatically, but not the OS itself. On Windows, macOS and Linux, it's chaos.

    • Use Windows? Use the OneDrive feature? Then Microsoft can read the files you store there. Likewise, Apple can read anything stored in iCloud. And Google can read files stored on Google Drive (used by Android and ChromeOS), Dropbox can read your files too, and Amazon can read files stored on their Drive offering. And, if they can read your files, think what the US Government can compel them to do. To evaluate any file storage/backup service ask what happens if you lose/forget the password/key? If the answer is that they can't help you, and you have lost access to your data, then the vendor can not read your files. Me? I encrypt my files before sending them off-site.
    • There are at least a dozen or more software programs that claim to offer secure communication. Amongst techies, Signal is worshiped like a religion despite its using phone numbers, which obviously identify you, as userids. Nerds seemed focused on encryption while ignoring anonymity. My suggestion for secure communication is to use email from one ProtonMail user to another. ProtonMail can not read your messages. They offer free limited accounts. And, for the Proton Mail webmail system (which is where anyone should start) you can use your web browser to verify the encrypted connection between your computer and protonmail.com. Their website is usable on a Chromebook running in Guest mode - you are much safer if the operating system can not leak any information about you because it does not have any information about you. I am out of step here with every techie in the world, yet, they are wrong.

    No doubt there are many defensive strategies for Facebook, with the strongest one being avoidance. That's what I do, so all I can offer are these links.


    • It is common knowledge that Apple iOS devices are safer than Android. For example, read this.
    • My advice for iOS users is to hold off installing new versions of iOS for a few weeks. However, do not wait to install the inevitable bug fixes. Also, see This ingenious new iPhone app is a powerful way to foil data snoops (by Glenn Fleishman March 2019) about the upcoming Guardian Mobile Firewall which combines a VPN and tracking protection. Seems like a unique product.
    • The main reason for Android's security problems are the lack of bug fixes. Most Android devices are shamefully vulnerable both because fixes are late in being issued (if they are ever issued) and then late in being installed. Here's an idea: before buying an Android phone try to find out when bug fixes for it will be released. Lotsa luck. The correct answer is once a month. Better still, try to find out when the last bug fixes for the phone will be issued, that is, when the software will be abandoned. You probably won't get an answer to either question. The only Android phones that I am aware of, for which bug fixes are issued monthly, is the Pixel line from Google.

    • Two search engines that do not record your search history are DuckDuckGo and Startpage
    • If you use Google, then minimize the tracking it does by not being signed in to Google when making queries. You can tell if you are signed in by checking the upper right corner of the screen (see screen shots). A single letter in a circle means you are signed in, a blue "Sign in" button means you are not.

    • Use multiple email addresses. This is not to cut down on spam (although it would) but to avoid putting all your eggs in one basket. Far too many systems use an email address as their unique identifier, so when one such system gets hacked, bad guys are halfway to hacking into other accounts of yours. At the very least, use one for business and one for personal messages. The next step would be to create a sacrificial email address for things you don't really care about. Email forwarding allows multiple email addresses to end up in one inbox. Gmail offers email forwarding as a free service. The ultimate goal is to use a different email address with every service that requires one, yet have them all funnel to one inbox. This is an achievable goal, but requires a nerd to set up. It can be done in two ways: own a domain that allows email forwarding or use an email provider that offers aliases. In July 2016, I wrote Defending yourself from Amazon.com which makes the case for having a dedicated Amazon email address.
    • There is a chance that the camera on a computing device could be activated without your being aware of it. The defense is old school: cover the camera lens with something opaque (band-aid, tape). Try to avoid adhesive directly over the lens.
    • Can you tell if a website is legit?

Whew! Seems like a lot, it is a lot.

All the credit/blame for this site falls on me, Michael Horowitz. If I left out anything let me know at defensivecomputing -at- michaelhorowitz dot com.

There are no ads here, if you see any ads, either your computer, browser or router has been hacked.

March 2019
Last Updated
April 22, 2019
Total Page Views:    3,796
Last Page View: April 23, 8:45 PM ET
web site by    
Michael Horowitz