Don’t Get Hacked Too Hard; or, Cheerful Advice for the Security Minded
Do not install things that have not been installed by other users, do not be the first, do not install software that has only been around for weeks.
Do not use your normal phone for internet browsing and app installation, get a second phone, or use your old phone via the internet hotspot feature.
Get ready to own multiple devices, some meant for general internet, some just for billing, some just for government stuff like medical insurance.
Backup your photos to memory sticks, get a USB hub for your phone, so that you can stick memory sticks in there good luck figuring out the UI.
Use generated passwords, and save passwords in such a way, that you can reset your phone and still mostly log back in to everything.
Don’t get attached to online services, they are not attached to you, you may trigger security alerts and your account maybe banned.
Your online accounts are not a safe place to store data, you may get banned before you get hacked.
I repeat, save your data, because you must be able to reset your devices.
Not reboot, but actually factory reset your phone, because you will not know what is infected where.
This is especially true, for phones that chose to close their operating systems, and there are usually a couple there.
Reset, isn’t even guaranteed to work, obviously, powerful AI is working hard to write viruses that survive resets.
Remember: multiple devices, so that once you get hacked in one place, you go to a machine that you are reasonably sure isn’t infected.
Use virtual machines, this is the path I chose for whoever needs a login, I never do anything on there, I never look something up on there.
It helps that a full viral machine is a little bit slower, and I use VirtualBox, as a bonus you rarely have to log into everything.
If you are a more advanced user, Containerize everything, give yourself a combustion sandbox where you can freely run npm if you must.
Now, for the hard part, you are going to build a business out of security, this is especially important if you are young.
Your finest, and best feature will be an online e-mail services, that you can vibe code over the weekend.
Here you can sign up your relatives, and begin monitoring access, this is a honey pot.
If you find grandma has checked her email, that means she got hacked, credentials got leaked, and she needs to reset.
Your most challenging service, will be most useful.
It is a set-top box, a small router, that filters things so hard, almost nothing works – and forget about logging in anywhere.
When you configure a computer to use it, you will only get text, images, video, audio, and maybe downloads.
It is basically internet in reader more, it is a markdown internet.
This will be a starting point for your company, and here you will add services.
You can login via API somewhere extract raw data, convert it to text, and present that instead of the real website.
There are no ads, no third party content, just text, just simplicity, and you should definitely offer no JavaScript mode.
My own website is JavaScript free, and there are very few limiting factors when creating apps like that.
Please, invest most of your development in logging tools that use AI, that help to catch infections, either on a dashboard or via AI.
Imagine a dentist’s office getting hacked, their private room just turns read, from alerts on a large screen.
There they see honey pot access alerts, deep packet inspection, revealing at least unusual traffic or downright password transfer.
I will close, with a prediction of how I will get hacked.
Encrypted JavaScript will be stored and executed from an icon, that my ad blocker uses, nobody will notice for days.
But I am ready, I have nothing worth stealing, even outside of my computers, and the few passwords I have to get email and access to AI are on a memory stick.
And that is my final series advice for to you, delete everything you are not using, sign up for the gym.
And for the love of Lizard People, don’t install their app.
This is not the end of this text, because I saved the best for last, I will close with the following question and app idea:
Why should Grandma only leak her social security and boring old 401K plan, when you can help her leak quote her real IDENTITY! unquote.
Was your grand ma a classy hussy in the 80s, is she interested in becoming one, back then (not today)?
Because that should be a checkbox in your killer app, she just need to upload picture of her face, and boom, in-deed.
Was grandpa a secret agent in the 60s, yeah baby.
Was dad involved in the moon-lading cover ups in the 70s, is that why he so weird and seemingly from Mars?
Was uncle, working hard, to provide for his family in the 80s, yup nothing to see there?
Was your aunt a famous belly dancer, in Bolivia in the 90s, does she still practice today?
Has 2020 took a toal on you, when you discovered that the governments, have been in really-weird contact with lizard people?
Checkbox, checkbook, checkbox, please keep grandmas’ photos from the 80s, private, but do remind her, that it does not take an actual hack to leak them.