mirror of
https://github.com/davegallant/davegallant.github.io.git
synced 2025-08-07 00:58:13 +00:00
deploy: dffc71f1a80eff16c8ebb3076f07002cf8320006
This commit is contained in:
@@ -3,7 +3,7 @@
|
||||
Understanding Data Breaches# Data breaches occur when individuals gain access to sensitive information and then share it for public consumption. This sensitive information is dumped on hacker forums and other sites that comprise the dark web.
|
||||
Check if you have been impacted# There are a number of services that can be used to check if you have been impacted by any data breaches, including Mozilla monitor, Google Dark web report, and HIBP. Password managers often also offer features that scan your saved credentials against known breaches. These services can also be configured to send you notifications when a breach occurs. It is a good idea to become aware of these breaches as soon as you can, so that you can protect yourself from malicious behaviour such as phishing.
|
||||
If you have been an email or phone number for any length of time, there is a high probability that some of your data has been exposed. You can easily check by querying HIBP. Many of the tools that offer breach detection, query the HIBP database. Although I believe this is service is a public good, it also opens the door for anyone who may be looking to gain more information about your present and past usages of various platforms.
|
||||
Opting out# If you have an email that you’d like to protect, I’d suggest opting out of public searchability. This of course does not undo the data breach that happened, but does it make it more challenging for someone to quickly search for an affected email address. This does not impact the ability for you to be subscribe to breach notifications, but it does force you to validate that you have access to the email, before receiving breach notifications.
|
||||
Opting out# If you have an email that you’d like to protect, I’d suggest opting out of public searchability. This of course does not undo the data breach that happened, but does it make it more challenging for someone to quickly search for an affected email address. This does not impact the ability for you to subscribe to breach notifications, but it does require you to validate that you have access to the email, before receiving breach notifications.
|
||||
Email aliases# A more proactive method of reducing the likelihood of future exposures is to use an email aliasing service such as Firefox Relay, DuckDuckGo Email Protection, or if you use Proton Mail, hide-my-email aliases. This will allow you sign up for services using an alias instead of revealing your email address. The service then forwards all emails to your real address that you configure when setting up the alias.
|
||||
`}).add({id:1,href:"/blog/amazon-ebs-csi-driver-terraform/",title:"Amazon EBS CSI driver with terraform",description:`I recently configured the Amazon EBS CSI driver and found the setup with terraform to be more effort than expected. I wanted to avoid third-party modules and keep it as simple as possible, while remaining least privilege.
|
||||
UPDATE: This approach can also be used for the aws-efs-csi-driver
|
Reference in New Issue
Block a user