meta data for this page
  •  

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
pub:online_protection [2024/07/29 22:03] Gene Hughpub:online_protection [2025/07/04 12:34] (current) Gene Hugh
Line 1: Line 1:
 ====== Online Protection ====== ====== Online Protection ======
 +Also see [[pub:social_networking_doxxing|]] and [[pub:online_privacy|]].
 ===== Reference ===== ===== Reference =====
   * [[https://www.cisa.gov/secure-our-world|https://www.cisa.gov/secure-our-world]]   * [[https://www.cisa.gov/secure-our-world|https://www.cisa.gov/secure-our-world]]
Line 11: Line 12:
         * Can be "frozen and unfrozen" immediately at anytime.         * Can be "frozen and unfrozen" immediately at anytime.
         * [[https://www.usa.gov/credit-freeze|https://www.usa.gov/credit-freeze]]         * [[https://www.usa.gov/credit-freeze|https://www.usa.gov/credit-freeze]]
 +
 +===== Deleting Online Accounts =====
 +  * Manually delete everything, such as photos, messages, orders, etc
 +  * Change your name, email, and all personal information to an alias not connected to your real identity.
 +  * Wait 30 days then verify your account is empty of all information. (This may allow company backups to be rewritten with your changed information.)
 +  * Delete account.
  
 ===== Passwords ===== ===== Passwords =====
 +  * **Use a strong password**
 +     * [[https://www.cisa.gov/secure-our-world/use-strong-passwords|https://www.cisa.gov/secure-our-world/use-strong-passwords]]
 +
   * **Use a password manager**   * **Use a password manager**
       * Bitwarden - [[https://bitwarden.com|https://bitwarden.com]] (cloud-based)       * Bitwarden - [[https://bitwarden.com|https://bitwarden.com]] (cloud-based)
Line 19: Line 29:
   * **Use a different password for each account**   * **Use a different password for each account**
       * If a hacker gets one password, they can try the same password for other accounts.       * If a hacker gets one password, they can try the same password for other accounts.
- 
-  * **Use a strong password** 
-     * [[https://www.cisa.gov/secure-our-world/use-strong-passwords|https://www.cisa.gov/secure-our-world/use-strong-passwords]] 
  
   * **Use Multifactor authentication (MFA) or Two factor authentication (2FA)**   * **Use Multifactor authentication (MFA) or Two factor authentication (2FA)**
Line 27: Line 34:
       * Text message (SMS) method is not recommended and less secure       * Text message (SMS) method is not recommended and less secure
  
 +===== Quantum-Resilient Password Lengths ===== 
 +As of May 2025 
 +^Password Use Case^Recommended Length (Post-Quantum)^Notes^ 
 +|Standard login password (hashed with bcrypt/scrypt/Argon2)|16+ characters|Include upper/lowercase, numbers, symbols. Use a passphrase (e.g., "CorrectHorseBatteryStaple").| 
 +|High-security systems (admin, financial, sensitive data)|20–24+ characters|Use passphrases or random strings from a password manager.| 
 +|Encryption passphrases (e.g., PGP, file encryption)|32+ characters|Quantum attacks may eventually brute-force shorter keys; longer passwords help mitigate risk.| 
 +|Wi-Fi passwords (WPA3)|16–24 characters|Use maximum supported length to reduce offline cracking potential.|