Skip to content

Instantly share code, notes, and snippets.

@changemewtf
Last active December 8, 2015 23:19
Show Gist options
  • Save changemewtf/2c64903d5469437d8609 to your computer and use it in GitHub Desktop.
Save changemewtf/2c64903d5469437d8609 to your computer and use it in GitHub Desktop.
Defending against online abuse and identity theft

Speak Up & Stay Safe on FeministFrequency is another good resource.

STEP ONE: PASSWORDS

These steps will prevent people from breaking into your accounts by exploiting weak passwords or weak storage.

Remember that even if you have good passwords, most people re-use passwords. So if you use the same password for your e-mail and some random website, and the random website gets hacked, the hacker now has your e-mail and the password.

  1. Download 1Password or something like it
  2. Come up with a good master pass-phrase that can be typed like an English sentence (like "This is my password.")
  3. Use 1Password's "Password Generator" to create long, complex, unique passwords for all social media accounts. This will probably take anywhere from a few hours to a few days depending on how many accounts you want to secure.
  4. If your accounts support "Two-Factor Authentication", use it. It means you have to get a text on your mobile phone to log in to an account. You can also use Two-Factor Authentication (or "2FA") mobile apps that let you authenticate even if you don't have a mobile data connection for text messages.

STEP TWO: IDENTITY SCRUBBING

Now you want to make it more difficult for stalkers, identity thieves and trolls to collect your information. In this step, you have to think like a stalker so you can stay a step ahead of them by removing as much information about yourself from the internet as possible.

  1. Make a list of every e-mail and username you've ever had. Try searching through your e-mail history if you're having trouble remembering.
  2. Set up Google Alerts for your name, your e-mail, your phone number, and all of the usernames: https://www.google.com/alerts This way you'll be notified if your personal information is posted online, or if someone re-publishes something that you missed.
  3. Do searches for your e-mail, your usernames, all variations of your real name, and your phone number. Try to delete old accounts. Contact webmasters and ask them to remove you.
  4. Once you've removed your information from a site, re-do the search that located it. If the old information is still appearing, submit a removal request to Google: https://www.google.com/webmasters/tools/removals?pli=1
  5. Remove your birth date and location from all social media.
  6. Deactive geolocation on all social media sites.

STEP THREE: DEVICE PROTECTION

  1. Set a five-minute screen timeout on all of your devices, with password protection. Otherwise, any stranger who recognizes you could easily pick up your phone when you walk away for a few minutes and grant themselves access to your accounts.
  2. Install Prey or similar applications on all of your devices so they can be remotely disabled and tracked if stolen.
  3. If you use Internet Explorer, switch to Firefox or Chrome instead. IE is built-in to Windows, so it's easier to exploit than other browsers.

STEP FOUR: ACTIVE DUTY

  1. Don't trust phone numbers that aren't in your phone memory. If your credit card calls you and asks you to verify your credit card number, ask them for a reference number and then call them back using the number on your credit card.
  2. Consider switching to a "Voice-over-IP" service like Google Voice, which allows you more fine-grained control over blocking numbers.
  3. Create anonymous burner accounts when you ask questions about company-specific issues online. For example, if you want to post a question about your Chase bank account, don't do it under a name that can be traced back to your identity. If a hacker knows your name and knows that you use Chase, they can call Chase customer service and trick them using other publicly available information about you.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment