Everything online gets leaked, lost, sold or stolen eventually. This is a fundamental reality that catches up with everyone. BTW this is not a recently acquired conviction: https://web.archive.org/web/20190216141214/https://twitter.com/briankrebs/status/1045091640480804864

But please, convince me I'm wrong if you can!

I know that over the years I've radically overhauled how I interact with companies I chose to do business with. For starters, I assume breach, which means that any information I share with them is likely going to be on the Internet at some point.

E.g., I no longer sign up for a new account somewhere without also doing it in a local, hardened VM and VPN.

I assume that the IP address I used to sign up there will be leaked in connection with my other account details, and probably the last IP I used. I assume records of what I'm doing or buying there will also be leaked.

Hell, I do pretty much all of my news reading now in the same kind of (separate) setup. No way I'm agreeing to run 97 pieces of Javascript from 22 uncertain destinations on the web. I know a lot of my readers unfortunately swear by ad blockers and rarely make exceptions (I'm not a big user of them myself for a variety of reasons), but being able to reset your system after a weekend of wantonly browsing the web is also nice.

Those are just a few basic examples. But I'm curious to hear from others -- How have the folks here altered the way they live and work online in response to the incessant reminders that everyone gets pwned?

Some food for thought over the, er...food coma the next few days :) Cheers!

briankrebs on Twitter

“Being in infosec for so long takes its toll. I've come to the conclusion that if you give a data point to a company, they will eventually sell it, leak it, lose it or get hacked and relieved of it. There really don't seem to be any exceptions, and it gets depressing.”

Twitter
@briankrebs Enjoyed these thoughts, catalyzed some of my own. Have a good holiday Brian!

@briankrebs Had to testify at #maine legislature not long ago against a proposal to put all Maine prescriptions into a searchable online database (not just controlled meds like we do now). 🙄

#privacy

@briankrebs well now I learned a thing or two I should be doing :-)

@briankrebs

In all honesty, I just expect that everything is out there. I figure that tying together enough info to get a reasonable amount of PII is so easy that’s practically worthless, as an average Joe, to protect too much against.

That said, I do try very hard to segregate my work life from my personal life. At no point does anything work related touch my home network, which is fully segregated and VPNd. I never log into personal stuff on a work machine and vice versa, cell phone included.

@briankrebs what password manager do you recommend?
@briankrebs I think "everything online" is understating it. What is there offline that stays offline? Not much. Go to Target, pay with a credit card, and that purchase and card number still ends up online. Fill out a paper form and submit it to a government agency, still ends up leaked online. See a doctor and discuss something sensitive, the electronic chart ends up leaked online. Stay off social media, but go outside and a friend posts your photo and name on Instagram.
@briankrebs After finding out that a bunch of my personal info was made (semi-)public due to a data breach, I kinda stopped caring to some degree. Obviously I don't voluntarily publicize my personal info everywhere, but knowing that it's already out there *somewhere* has actually made me feel better about not being super paranoid about everything I do online. It's strangely freeing.

@briankrebs This is precisely the reason I have been exploring the use of threshold cryptography to secure data for the past ten years. People demanded proof so I wrote a Threshold Key Infrastructure. Now they complain I am just pushing my code.

Threshold means that I can encrypt data such that a cloud service can control decryption but cannot decrypt. That is powerful.

There is a genuinely end-to-end secure credential manager that does not rely on passwords at all. But that is only a small part of what the Mesh does.

http://mathmesh.com/

The Mathematical Mesh

The Mathematical Mesh
@hallam @briankrebs
https://datatracker.ietf.org/doc/draft-richardson-t2trg-idevid-considerations/ is under adoption review by T2TRG. It should get some text on threshold methods to the generation list, and I'd sure like a better name for symmetric-seed method. https://mailarchive.ietf.org/arch/msg/t2trg/9PgBN_aUc3W6_87OnP9YWTRLt88/
A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors

This document provides a taxonomy of methods used by manufacturers of silicon and devices to secure private keys and public trust anchors. This deals with two related activities: how trust anchors and private keys are installed into devices during manufacturing, and how the related manufacturer held private keys are secured against disclosure. This document does not evaluate the different mechanisms, but rather just serves to name them in a consistent manner in order to aid in communication. RFCEDITOR: please remove this paragraph. This work is occurring in https://github.com/mcr/idevid-security-considerations

IETF Datatracker
Hello Future Pastebin Readers - The Message - Medium

When I was 12 I begged for, and got, the Time-Life Enchanted World Series. The first book on ghosts had a line that tickled not only my fantasy-novel-addled brain, but also my budding writerly…

The Message
@briankrebs I think applying a risk based approach to this is how I go about it. In general I have 3 tiers of things that get logged into, generally it’s stuff with money, stuff with PII I care about, and then everything else. That last category I use basically no protections against (active ones at least) then I scale up the privacy/security with the risk level of the system I’m logging into. The 3 tiered approach is just how I keep the mental model relatively simple to navigate for myself.

@briankrebs signing up for websites makes no sense to me in a vm. That honestly just sounds like you're looking for additional points to make.

Nowhere did I see you mention that you then re-access those websites through that specifically created VM, thusly obviating the need for it in the first place.

I want to think that this is all meant in good honest intentions but I mean it really sounds a little bit like fear mongering.

Maybe that's just what you have to do these days, and I don't mean that a shot at you, I mean generally, just to earn eyeballs.

I fully understand that the threat models are different for you and myself, but I don't understand the holes in yours as you laid them out.

@stoXe @briankrebs Yes, exactly. At this point I assume everything ends up online or in the wrong hands so I mitigate risk where I can. I’ve had former employers’ external payroll services get breached with my entire identity and bank account information. I mitigate my risk with virtual credit cards and browser extensions. You can’t live offline so no point in “security theater”.
@stoXe That's probably because I'm not going to talk in extreme detail about what I'm doing for hopefully obvious reasons. But it was a question meant in earnest, because it's a subject that is frequently on my mind, and so I assume it is also on the minds of like-minded folk.
@stoXe @briankrebs Krebs is a case study in how far bad actors can go in targeting someone. The amount of retaliation he's gotten for his cybercrime reporting over the years is insane. He's basically a honeypot, for what those of us in the fraud space will see targeting regular people, but 2 years in advance.
@nixonnixoff @stoXe @briankrebs
Brian Krebs is such a honeypot that when our NSF program manager for our cybercrime work (the one that killed the Viagra spammers) asked how we worry about our personal safety, and our reply is "Brian Krebs is our canary. IF something happens to him, then we will worry"
@ncweaver @stoXe @briankrebs Brian Krebs is such a honeypot that it's defined my entire career direction as a researcher. He is a dragnet for the worst people. Anyone who harasses Brian Krebs is a threat researcher's intel piñata and I have not encountered a single exception.
@nixonnixoff @stoXe @briankrebs krebs has had several attempts on his life. Idiots have swatted him multiple times in attempts to silence him. I respect that he refuses to be intimidated and continues to fight.

@D0xter @stoXe @briankrebs The first guy that swatted him was destined for great things. He's now in a Phillipines prison for murdering a girl.

A later guy that tried to swat him grew up to become the latest hosting provider for Kiw*farms.

Threat intel people should always pay special attention to threat actors that harass Krebs, because they tend to be more dangerous than usual.

Also because it's wrong to let attacks on journalists slide.

@nixonnixoff @stoXe @briankrebs wow! That’s….that is horrible. I mean the starters both don’t care about human life. Swatting is lower than low, someone can easily die at the hands of police because of it.
@nixonnixoff @D0xter @stoXe @briankrebs Whitepacket swatted me.. like he isn't getting caught lol
@JShafer817 @nixonnixoff @stoXe @briankrebs they always get caught. That is horrible that you had to experience that.

@nixonnixoff @D0xter @stoXe @briankrebs

"Also because it's wrong to let attacks on journalists slide."

So is getting doxxed by journalists because you disagree with them.

@mrgl @D0xter @stoXe @briankrebs sometimes I see this refrain among bitter cyber criminals many of whom got arrested later on as a direct result of his reporting.
@nixonnixoff @mrgl @D0xter @briankrebs do you know what the word refrain is? Not sure you're using it in the right contacts because I have no idea what you're saying no one refrained from anything
@stoXe @nixonnixoff @mrgl @D0xter @briankrebs in the right CONTACTS lmao
@luneellise21 @nixonnixoff @mrgl @D0xter @briankrebs that's what happens when you use voice to text and don't check it oh well you know exactly what I meant
@stoXe @nixonnixoff @mrgl @D0xter @briankrebs
See, I just thought it was in this context: “phrase or verse recurring at intervals in a song or poem, especially at the end of each stanza; chorus.”

@D0xter @stoXe @nixonnixoff @mrgl @briankrebs Krebs isn’t doxxing randos who disagree with him, he’s reporting on crime.

This is like complaining that a journalist referred to a mobster by his name instead of “clamps” or whatever his nickname is.

@tcb @D0xter @stoXe @mrgl @briankrebs Here's a screenshot of some comments we captured from a specific user in a hosting provider's Discord server, username removed. This person was the same swatter that Krebs reported on years ago. The swatter seems to think the real crime was associating his name to his acts.
@nixonnixoff @tcb @D0xter @mrgl @briankrebs what is that supposed to show? A lot of people dislike the fact that he dox people. Just because he's disliked by some doesn't mean anything

@tcb @D0xter @nixonnixoff @mrgl @briankrebs this is actually not true. If it were crime wouldn't there be a court case following it. Or if he was publishing some information that was unknown to authorities wouldn't there be a court case following?

You just have to Google it and you can find out who he has doxed without criminal charges.

Regardless, I don't feel, it's the right way to do things generally.

@stoXe @tcb @D0xter @mrgl @briankrebs There's pretty much always a court case following it so you're going to have to cite some specific example to support what you're saying. The major exceptions I can think of are the Russians who are hiding in RU.

Krebs is a huge outlet for whistleblowers seeking to motivate the authorities to do an investigation. I don't know what country you are in, but in America law enforcement is almost entirely media driven. Without the media constantly pushing them, almost no cybercrime would be prosecuted, ever.

Krebs' reporting is quite often a very blatant showcase of "look how easy it was, what are you doing?" directly at law enforcement. It's not immediately obvious but what you think of as "dox" is a massive shaming exercise some of the time.

And if you've ever looked at any real "doxes", they look vastly different than a journalist's article. "dox" in reference to journalists is just a term thrown around by shady people bitter about having to face accountability. Real doxes are a list of the person's home address, PII, and their family's PII, and clearly for an intimidation or extortion purpose.

@D0xter @nixonnixoff @briankrebs but his actions do nothing to prevent it is what I'm saying

@briankrebs
We're not far from using burner VMs the way people used burner phones for the past decade.

I'm a pedestrian, don't pull back the curtain on the darker side of security issues; but on a critical work machine, I only go online from there within a sacrificial burner VM. It get's nuked after certain sessions – wipe it, restore, and start over fresh. For the same reasons.

As an extra layer of obfuscation, the VM runs a different OS, emulating different hardware, than the host.

@briankrebs Hi, that's interesting to read and I do share some of the concern. I'm just wondering about the sustainability of it. It's perfectly fine (even laudable) to proceed like this and in a way it's part of your job.
But would you recommend the same strong approach to protect other aspects of one's life, let's say health? E.g. only leaving the house with N95, avoiding cars, no skiing or such, etc.? There's always a (very personal) balance to be struck I guess.
@briankrebs I came to the same conclusion in my own life too. After getting doxxed on a gaming forum when I was younger and it leading to IRL harassment I decided from then on to put my real name on everything and not do anything I wouldn't want associated with my IRL identity. More of a general life philosophy than a tech one.
@briankrebs some interesting options. I guess it depends on what type of exposure you can absorb. I struggle the most with how much to implement with family members. They just want to get on the site do their business and not be bothered with the rest.

@briankrebs Enjoyed the thoughts, one thing in particular that has alarmed me recently is the amount of healthcare providers I'm finding myself having to register online with to access doc email/test results.

Most online services seem to be run by SaaS companies founded in the last decade and are meant to be administered by folks without a lot of technical experience (doc office staff). Always makes me loosen my tie in nervousness.

@briankrebs "Online" is used a few different ways, and as the lines become increasingly blurry, I am reminded that "everything gets hacked, eventually" means that there is no distinction.

If something being recorded, it will be public. If something s being created, it will be public. So I don't really have secrets/private information recorded, I have temporarily harder-to-get information.

This doesn't just change the way I relate to companies, it changes the way I relate to all documenting/recording and collecting of data, on all devices, on all paper notes, etc.

@briankrebs Oh boy, so I'm a bit overly cautious than most, based on the stuff I have seen, but this is what I do:

I color code everything based on security zones. Networks, PCs, VMs, browser profiles, passwords, folders, and even command prompts. Yes, many people do this, but I take it to the extreme. I colorize everything, including network cables, browser themes, windows wallpaper, command prompt backgrounds, etc. Anything that lets me colorize gets colorized. Every color zone has very specific security levels, rules, etc. that I follow religiously. Nothing ever crosses a zone without going through some security barrier. My passwords managers for each zone are color encoded as well. Some zones I have to store offline. Oh and in Windows, I have a list of (orange and red) apps/commands blocked from my regular non-privileged account and some (crimson) that will only run on a secure desktop isolated from everything.

Every zone has it's own online accounts/personas and uses a different browser or browser profile. On my browser profiles, I use uBlock Origin heavily loaded with my own custom rules and filter lists, some I have been building for years. Some browser profiles are allowlist only, some I treat as if they were at an internet cafe.

I must admit I have given up on trying to maintain privacy, but I do isolate different personas for types of online activities or interests. None of them ever cross paths and the most isolated run in their own VMs and have different VPN providers. Some of my personas I have maintained for 15 years or more, so they have well-established histories. One persona I even had set up as a DBA once so I could get a bank account and run a business with it.

Of course there are limits on how effective this all can be--my personal information is still in innumerable databases--but it does also have its benefits.

I have spent many years building this all, but now the biggest fear at this point in my life, is what happens when I die. I have it somewhat documented, but I can't even imagine my wife--or even an expert in the field--trying to make sense of it all. I may have to pay an estate lawyer to document it.

What a nightmare.

@briankrebs Different browser colors, with a colorized desktop in the background.
@briankrebs Colorized command prompts.
@briankrebs Some folders in my password manager.
@briankrebs Oh yeah and colorized file system.

@briankrebs Oh on this topic, I dug up this article I wrote almost twenty years ago on theregister.com:
https://www.theregister.com/2005/04/27/security_for_the_paranoid/

Kind of funny actually reading things from a 2005 perspective but the commentary still stands.

Security for the paranoid

Even a paranoid can have enemies

The Register
@m8urnett @briankrebs I have to laugh, this reminds me of a quote from Peter Norton back in the 80’s, opining there was no real need for color monitors. I couldn’t understand his rejection of the most basic utility of color.
@briankrebs This is exactly how I interact with companies as well. I use an email that isn’t tied to my more personal stuff, I have a Google voice number I give out, make purchases with virtual credit cards where I can, and I even use a sort of “alias” when I make orders or new accounts that isn’t my real name. Our home network even utilizes proxies, adblockers, a well-configured firewall, endpoint protection, and a VPN where it makes sense. The list goes on.
Having worked for, alongside, and/or with various companies from a security perspective has made me realize how fragile everything is.
@briankrebs Not to mention, there are times when I “bully” companies into being more secure. (I use that word jokingly.) I’ll provide my own Egnyte account, read-only no downloadable access configurations for files, or utilize encryption and password protections where they fail to. (Sometimes I tell them I won’t give them that information if they’re not operating securely where applicable.)
Yeah, I can be THAT person.