1. Patterns and predictive behavior.
From reading group comments it’s easy to predict who will comment on which type of content.
While this itself isn’t necessarily an issue, it can give others an idea of your patterns and behaviors online & IRL as well.
The fix?
Observe & be aware of your patterns and behaviors so you have an understanding of your vulnerabilities, its risks and have the ability to implement countermeasures if necessary.
Some patterns are harmless and can stay put-others need to be reconsidered.
Don’t follow the same patterns: Be unpredictable!
Don’t let your “playbook” be transparent online or IRL.
If you have to use same routes and places...be aware of people and cars you might often see. Can anyone be tracking you? Is anything feeling off?
From reading group comments it’s easy to predict who will comment on which type of content.
While this itself isn’t necessarily an issue, it can give others an idea of your patterns and behaviors online & IRL as well.
The fix?
Observe & be aware of your patterns and behaviors so you have an understanding of your vulnerabilities, its risks and have the ability to implement countermeasures if necessary.
Some patterns are harmless and can stay put-others need to be reconsidered.
Don’t follow the same patterns: Be unpredictable!
Don’t let your “playbook” be transparent online or IRL.
If you have to use same routes and places...be aware of people and cars you might often see. Can anyone be tracking you? Is anything feeling off?
2. Collecting data from social media sites.
This is where some of you fail.
Using the same username for telegram, instagram and X?!
How hard do you think it would be to connect your dots?? No bueno😬
Another big one:
NEVER post pics or videos of yourself or your children on social media.
Additionally, do not post current locations or your plans especially while you are there.
It is not too difficult to map out a persons patterns and behaviors using a simple glance thru social media.
This is where some of you fail.
Using the same username for telegram, instagram and X?!
How hard do you think it would be to connect your dots?? No bueno😬
Another big one:
NEVER post pics or videos of yourself or your children on social media.
Additionally, do not post current locations or your plans especially while you are there.
It is not too difficult to map out a persons patterns and behaviors using a simple glance thru social media.
Media is too big
VIEW IN TELEGRAM
There have been multiple instances where woman or kids were tracked and kidnapped through social media accounts using location pattern tracking or other critical information.
In 2020, the National Center for Missing and Exploited Children reported 3,000 cases of social media-related kidnapping."
https://wifitalents.com/statistic/social-media-kidnapping/
https://wifitalents.com/statistic/social-media-kidnapping/
3. Interception of communications.
Be a digital ghost:
• Have several email accounts for different purposes.
• Have several phone / phone #’s.
•Turn cookies off
•use Brave browser or VPN.
•Trim tracking links after “?”
•Don’t mention sensitive information over phone conversations or in front of Alexa or smartwatch lol
For starters, this means you'll have several digital me's, every single one is different, incomplete, and can’t be easily connected to real you.
Signs of phone being listened to:
•sudden low battery life,
•antivirus stopped working,
•weird noise while talking,
•overheating,
•data upload suddenly huge
(More on this later)
Be a digital ghost:
• Have several email accounts for different purposes.
• Have several phone / phone #’s.
•Turn cookies off
•use Brave browser or VPN.
•Trim tracking links after “?”
•Don’t mention sensitive information over phone conversations or in front of Alexa or smartwatch lol
For starters, this means you'll have several digital me's, every single one is different, incomplete, and can’t be easily connected to real you.
Signs of phone being listened to:
•sudden low battery life,
•antivirus stopped working,
•weird noise while talking,
•overheating,
•data upload suddenly huge
4. Using people to collect information.
This why we do not encourage side chats with unknown members.
💥ESPECIALLY FAKE AZAZEL SCAMMERS💥
This is why your children do not talk to strangers.
You can glean a shitload of info in a simple 2 minute conversation if you know what to look for and are good at noticing things.
(More on this below)
This why we do not encourage side chats with unknown members.
💥ESPECIALLY FAKE AZAZEL SCAMMERS💥
This is why your children do not talk to strangers.
You can glean a shitload of info in a simple 2 minute conversation if you know what to look for and are good at noticing things.
While it is very useful for photographers, it is not good having all those information turned on in your phone camera app. Go into settings and turn it off (please be advised different phones have different settings). And while some apps like telegram usualy scrub it for you upon photo upload, other apps don't. Also if you loss your phone or get hacked, it would be so easy to track your moves.
Go check your phone camera app settings, as well as details of photo taken and details of screenshot taken, it shouldn't include any more that in this examples below ⬇️
https://www.persnicketyprints.com/how-to-read-digital-photo-metadata-on-a-phone/
Go check your phone camera app settings, as well as details of photo taken and details of screenshot taken, it shouldn't include any more that in this examples below ⬇️
https://www.persnicketyprints.com/how-to-read-digital-photo-metadata-on-a-phone/
Persnickety Prints
How to Read Photo Metadata on Your Phone • Persnickety Prints
Our #1 question- How Big Will This Print? Learn how to read digital photo metadata and pixels on your smart phone.
6. Location sharing devices:
Your electronic devices, the one where you use location services, where you have Ebank, fitness trackers, smart watch, IOT home devices installed, should not be the one you use your telegram (or work / family photos) on.
It is very hard to turn off something that runs in the background all the time, but there is an option on some phones to turn location trackers off.
Email services like gmail and Google all have options where you can find location options to turn them off.
If you must use your phone to use telegram then TURN LOCATION SERVICES OFF!
Your electronic devices, the one where you use location services, where you have Ebank, fitness trackers, smart watch, IOT home devices installed, should not be the one you use your telegram (or work / family photos) on.
It is very hard to turn off something that runs in the background all the time, but there is an option on some phones to turn location trackers off.
Email services like gmail and Google all have options where you can find location options to turn them off.
If you must use your phone to use telegram then TURN LOCATION SERVICES OFF!
❤3
Computer protection:
To protect data on your computer, it would be good that after reinstalling your system, hard drive gets split into 2 partitions:
One partition system automatically starts using for windows files and program files, the second one you encrypt and protect with a password.
It is a lot easier if you have more than one hard drives in your computer, that way one of them is to be encrypted and password protected.
The best option is to keep your computer clean, and keep everything on external drive.
Pro tip: you can use several external hard drives, so your family photos do not mix with Alexandria and such.
👉Internet cable/wifi connection is to be disabled before password is typed in and you start using your data.
👉 faraday cage for your hdds (and all electronics)
To protect data on your computer, it would be good that after reinstalling your system, hard drive gets split into 2 partitions:
One partition system automatically starts using for windows files and program files, the second one you encrypt and protect with a password.
It is a lot easier if you have more than one hard drives in your computer, that way one of them is to be encrypted and password protected.
The best option is to keep your computer clean, and keep everything on external drive.
Pro tip: you can use several external hard drives, so your family photos do not mix with Alexandria and such.
👉Internet cable/wifi connection is to be disabled before password is typed in and you start using your data.
👉 faraday cage for your hdds (and all electronics)
Phone protection:
To protect data on your phone, it is best to have several phones.
Moving files from one phone to another is done via SD memory card only, encrypted and password protected if possible, with sensors off, wifi off, location off, sim card pulled out.
So make sure your phones have SD slot.
To protect data on your phone, it is best to have several phones.
Moving files from one phone to another is done via SD memory card only, encrypted and password protected if possible, with sensors off, wifi off, location off, sim card pulled out.
So make sure your phones have SD slot.
WhatsApp protection:
If you use WhatsApp..it’s easy for malicious actors to cause mayhem if they get access via hacking or stolen phones
Turn on two-step verification
• Open WhatsApp Settings.
• Tap Account > Two-step verification > Turn on or Set up PIN..
• Enter a six-digit PIN of your choice and confirm it.
•Provide an email address you can access or tap Skip if you don't want to add an email address. ...
• Tap Next.
• Confirm the email address and tap Save or Done.
The same can be done for Telegram and other apps
If you use WhatsApp..it’s easy for malicious actors to cause mayhem if they get access via hacking or stolen phones
Turn on two-step verification
• Open WhatsApp Settings.
• Tap Account > Two-step verification > Turn on or Set up PIN..
• Enter a six-digit PIN of your choice and confirm it.
•Provide an email address you can access or tap Skip if you don't want to add an email address. ...
• Tap Next.
• Confirm the email address and tap Save or Done.
The same can be done for Telegram and other apps
Location + additional protection:
For example:
⭐️screenshots can often provide unintended information even if logged out:
👉Google uses IP location tracking and will show the nearby zip code and vicinity if it’s not cropped.
⭐️The top part of the screen can expose time zone and cell carrier.
⭐️At times a simple Twitter post can show the persons profile and/or name in the comment section on bottom.
The fix?
• Crop photos!!
• Disable locations in camera
• Disable locations in Google
• only post screenshots
For example:
⭐️screenshots can often provide unintended information even if logged out:
👉Google uses IP location tracking and will show the nearby zip code and vicinity if it’s not cropped.
⭐️The top part of the screen can expose time zone and cell carrier.
⭐️At times a simple Twitter post can show the persons profile and/or name in the comment section on bottom.
The fix?
• Crop photos!!
• Disable locations in camera
• Disable locations in Google
• only post screenshots