This commit is contained in:
davegallant
2025-02-18 03:19:18 +00:00
parent eca9dd733a
commit 2ba6c8868a
79 changed files with 79 additions and 79 deletions

View File

@@ -3,7 +3,7 @@
Understanding Data Breaches# Data breaches occur when individuals gain access to sensitive information and then share it for public consumption. This sensitive information is dumped on hacker forums and other sites that comprise the dark web.
Check if you have been impacted# There are a number of services that can be used to check if you have been impacted by any data breaches, including Mozilla monitor, Google Dark web report, and haveibeenpwned.com. Password managers often also offer features that scan your saved credentials against known breaches. These services can also be configured to send you notifications when a breach occurs. It is a good idea to become aware of these breaches as soon as you can, so that you can protect yourself from malicious behaviour such as phishing.
If you have been an email or phone number for any length of time, there is a high probability that some of your data has been exposed. You can easily check by querying haveibeenpwned.com. Many of the tools that offer breach detection, query the haveibeenpwned database. Although I believe this is service is a public good, it also opens the door for anyone who may be looking to gain more information about your present and past usages of various platforms.
Opting out# If you have an email that you’d like to protect, I’d suggest opting out of public searchability. This of course does not undo the data breach that happened, but does it make it more challenging for someone to quickly search for an impacted email address. Even by opting out, you can still subscribe to breach notifications, as long as you can validate that you have access to the email.
Opting out# If you have an email that you’d like to protect, I’d suggest opting out of public searchability. This of course does not undo the data breach that happened, but does it make it more challenging for someone to quickly search for an impacted email address. Even after opting out, you can still subscribe to breach notifications, as long as you can validate that you have access to the email.
There are other websites that offer similar style lookups, but many of them are either paywalled or require account registration.
Email aliases# A more proactive method of reducing the likelihood of future exposures is to use an email aliasing service such as Firefox Relay, DuckDuckGo Email Protection, or if you use Proton Mail, hide-my-email aliases. This will allow you sign up for services using an alias instead of revealing your email address. The service then forwards all emails to your real address that you configure when setting up the alias.
`}).add({id:1,href:"/blog/amazon-ebs-csi-driver-terraform/",title:"Amazon EBS CSI driver with terraform",description:`I recently configured the Amazon EBS CSI driver and found the setup with terraform to be more effort than expected. I wanted to avoid third-party modules and keep it as simple as possible, while remaining least privilege.