4. Do not use an Internet access point if at least one other (your) device, home IOT devices, is connected to this access point).
good point as anything with access to other machines on the network can sniff packets and otherwise wreak damage to machines on it.
i have several access points for the various stuff.. one for ip cams systems, one for stuff like TVs, one for google/alexa stuff, one for other IoT (washer/dryer etc), one for guests, and one for my wireless computers and such.
none of the items on those access points can see the others. but stuff on the same AP can (usually) see each other as they usually need to.
EDIT: forgot to mention the obvious takeaway.. plus a separate AP for the rig you use the wallet on.
-------------------------------------------
Are you writing this seriously, or is this a joke on the subject?
It's good from a security point of view, but it's too deliberate.
For example, why make a separate point "one for things like google/alexa" when this service already transmits everything it hears to servers, even when you don't use it? All that this service hears is the same thing that anyone who attacks you will catch on the network.
sniped a bit out but the short answer is no not joking. btw google mini has a hard switch to turn the mike off. and its usually off as i rarely use it.
yes there are a couple routers. along with straight wireless APs that (usually) do not allow connected devices to see each other. im not concerned about the main ip addy from the modem being shared among the various routers and such as i know they can be linked together. im not trying to hide from the government, just script kiddies, IoT crap with little to no security etc.
however your knowledge obviously exceeds mine. any suggestions to improve this? i mean this in all seriousness. im not super paranoid but since most I0T stuff never gets security updates what are my options?
------------------------
I am pleasantly surprised by your approach to your own information security. It's nice for me, because the vast majority of people don't deal with this issue. Everyone thinks, "I'm not gonna get caught up in this, there are a lot of people like me..."
What you're doing is respected, and not because your protection is holeless. It's because if everybody else did what you did, it wouldn't be as easy for crooks as it is now. Unfortunately, all people who carelessly about their own information security, whether they want it or not, play on the same side as the scammers. People like you are one in a million, and on my part, your actions are only respected!
Everyone else is becoming a donor to cybercrime. It is very rare that you are attacked as one person, all at once. Often this happens automatically, with special programs that are constantly growing in quality and can be used by YOUNG MACHINES! This is the reason why news like this appears:
(my post Re: How long will existing encryption last? January 18, 2020, 09:32:13 PM -
https://bitcointalk.org/index.php?topic=5209297.new#new).
- access to you or your data happens regardless of your desire or importance!
This is a fully automatic data collection. The program collects everything and for everyone!
It is done by both government and scammers (usually almost the same).
- On January 14th the FBI confiscated the domain WeLeakInfo.com for providing paid users with access to data leaked to the network as a result of a hack. The operation was conducted jointly with the National Crime Agency (NCA), the Netherlands National Police Corps, the German Federal Criminal Police Office (Bundeskriminalamt) and the Police Service of Northern Ireland.
"The website gave users access to a search engine to view confidential information illegally obtained from more than 10,000 data leaks, including more than 12 billion indexed records, including names, email addresses, logins, phone numbers and passwords," said the U.S. Department of Justice.
Excuse me, but that's on one site alone - 12 billion! More than we live at this time!
And the worst part is that all major corporations are doing it, without exception. I don't want to give all the information here, but I'll give you one fresh example:
- Facebook tried to buy Pegasus software from Israeli spyware manufacturer NSO Group Technologies in order to monitor the activity of iOS device users.
According to court documents published by NSO Group, Facebook intended to buy the spy software Pegasus, which can extract user data from cloud storage of Apple, Google, Facebook, Amazon and Microsoft. The data is being exported, giving software operators access to confidential user data. The data collected includes all messages and photos, login credentials, and device location information.
NSO Group has a very mixed reputation for selling its products not only to law enforcement agencies, but also to authoritarian governments that persecute human rights defenders and journalists. But according to the CEO of NSO Group Shalev Hulio, two representatives of Facebook contacted the company in October 2017 and intended to acquire the right to use certain features of Pegasus.
And if you still have illusions about the methods of protection offered to us by "our defenders", for example, 2FA, then it is not true, they are easy to do, read my post: "Re: Keyless encryption and passwordless authentication March 09, 2020, 11:46:56 AM":
https://bitcointalk.org/index.php?topic=5204368.40.
All protection is an illusion of security.
Your main defense is not to arouse interest in professional attackers. From this point of view, I would advise you to reduce the number of access points, especially if they are via a wi-fi.
I'm not a professional, I'm just keeping a close eye on the news on cyber security...