- Joined
- Nov 24, 2025
- Posts
- 1,671
- Reputation
- 2,276
what does he even put as his join reason
probs abo or something like thatwhat does he even put as his join reason
DNR i have 0 worthSURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence
DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.
I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.
- Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
- Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.
II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:// SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?
- Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
- Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.
III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.
- Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).
IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.
- The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
- Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.
V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.
- Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
- Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.
VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.
- Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.
Made by Child Of Shadows© 2026 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
Lol. Nice knowledge brotherSURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence
DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.
I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.
- Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
- Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.
II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:// SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?
- Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
- Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.
III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.
- Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).
IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.
- The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
- Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.
V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.
- Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
- Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.
VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.
- Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.
Made by Child Of Shadows© 2026 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
thanksSURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence
DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.
I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.
- Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
- Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.
II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:// SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?
- Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
- Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.
III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.
- Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).
IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.
- The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
- Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.
V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.
- Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
- Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.
VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.
- Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.
Made by Child Of Shadows© 2026 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
Lovely Guide. Treat your data like a liability. If you do not strictly need a service to store your personal information (like an ID scan or home address), do not give it to them. The less data you give to third parties, the less there is to lose during a server side breach.SURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence
DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.
I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.
- Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
- Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.
II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:// SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?
- Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
- Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.
III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.
- Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).
IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.
- The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
- Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.
V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.
- Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
- Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.
VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.
- Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.
Made by Child Of Shadows© 2026 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
syslog is misunderstood, deep down hes one of usLovely Guide. Treat your data like a liability. If you do not strictly need a service to store your personal information (like an ID scan or home address), do not give it to them. The less data you give to third parties, the less there is to lose during a server side breach.
I wasn't telling you specifically, I was putting that there for others who may be intrigued and go onto the website.
Also:
View attachment 35924View attachment 35925View attachment 35928
kinda waterSURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence
DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.
I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.
- Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
- Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.
II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:// SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?
- Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
- Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.
III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.
- Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).
IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.
- The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
- Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.
V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.
- Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
- Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.
VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.
- Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.
Made by Child Of Shadows© 2026 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
Already failed the first step cheers (the same password has been with me since I was 10)SURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence
DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.
I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.
- Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
- Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.
II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:// SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?
- Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
- Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.
III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.
- Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).
IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.
- The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
- Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.
V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.
- Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
- Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.
VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.
- Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.
Made by Child Of Shadows© 2026 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
N1 hater ofBum guide bum poster
I also suggest using GrapheneOS for your Google Pixel device for extra privacy on your phone.This post will add on everything that I thinkChild of Shadows may have missed, although its a good thread besides some spotty bits in the information. Kudos to you Child of Shadows.
I agree with the first bit with never reuse passwords, but the MFA part has me on the fence. I'd rather trust a Hardware Key than Google Authenticator or Authy, they could easily be breached or lost. Recovery email SHOULD be a fake email address such as altaddress.org.
If you are really keen on updating your OS, switch your OS to Tails or a Linux OS. Windows updates are known for adding more backdoors to your device, further compromising your privacy. I agree with the permissions, try and restrict app permissions as much as you can, if you need to use camera then enable and disable it immediately after, same goes for mic, location, etc.
Surely we've all seen that one clip from Mr Robot where Elliot finds that pajeet runs a website for 400k people which is just CP, that was hosted by a Public Wi-Fi. NEVER trust a public wi-fi for anything that may be considered "illegal", or anything private. Use a VPN such as Mullvad, it is the best as they are known for their policy on keeping logs (they don't keep them, google it). Use a browser such as Brave, Mullvad Browser, or TOR Browser when doing stuff you want private. Other browsers may be DuckDuckGo - it has a feature to wipe the browser of all data (search history, cookies, passwords, etc), Firefox Focus - it doesn't save anything except for stuff you want to save, you will be given an option for that.
There are 3 types of backup's, full, incremental and differential. Here's a graph on the three over a week.
View attachment 35932
Full backups should occur once a week, I suggest looking up a YouTube video to understand it better.
NEVER post your ID or email on social media. Only a business email should be posted if you are a famous person. You can pay services to remove your information from data broker sites as stated above, some will also tell you where your information has been leaked or how and what was compromised. They can be a bit pricey sometimes.
If you were compromised by a virus, then unplugging from the internet is the first thing you should do. Unplug all your external hard drives, passwords should be saved on a different device like a USB stick with Kleopatra/TailsOS encryption. You should monitor everything that may have been compromised, bank statements, credit reports, website activity, etc.
Despite this being mostly written by AI and/or paraphrased by AI, it 's a pretty good guide. I can find links to PDF files that will further inform you on how to keep yourself safe online, if you are curious then DM me. Other than that, good thread. I recommend taking some of this information on board such as the encryption, browsers, VPNs, etc.
Never trust anyone online with your personal details, no matter who they are.
ExactlyI also suggest using GrapheneOS for your Google Pixel device for extra privacy on your phone.
Website: https://grapheneos.org/
VIdeo to help install:View: https://www.youtube.com/watch?v=XwWD-BgV3UQ
For the Authenticator stuff and 2FA, I'd look towards Proton Authenticator. Proton are known for their privacy based policy, and are protected by Swiss privacy laws.
Use Proton for your general accounts, but use YubiKey for high value accounts.I also suggest using GrapheneOS for your Google Pixel device for extra privacy on your phone.
Website: https://grapheneos.org/
VIdeo to help install:View: https://www.youtube.com/watch?v=XwWD-BgV3UQ
For the Authenticator stuff and 2FA, I'd look towards Proton Authenticator. Proton are known for their privacy based policy, and are protected by Swiss privacy laws.
DNR this shit is actually shameless. straight gpt slop. this is an inslut to the intelligence of incelsSURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence
DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.
I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.
- Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
- Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.
II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:// SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?
- Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
- Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.
III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.
- Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).
IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.
- The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
- Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.
V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.
- Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
- Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.
VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.
- Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.
Made by Child Of Shadows© 2026 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
i mean photos/PDFs) carry hidden metadata. People should use tools like EXIFCleaner before uploading files.SURVIVAL PROTOCOL: CYBERSECURITY A Practical Guide to Protecting Your Digital Existence
DISCLAIMER: DEFENSIVE USE ONLY This guide is for educational purposes. Protecting your systems is your right. Attacking others is a crime. Do not cross the line.
I. THE FIRST LINE OF DEFENSE: IDENTITY Your accounts are your digital life. If they fall, you fall. Secure them now.
- Password Hygiene: Never reuse passwords. If one site leaks, all your accounts are at risk. Action: Use a Password Manager (Bitwarden, 1Password, KeePass). Generate 16+ character random strings. Multi-Factor Authentication (MFA): This is non-negotiable. SMS is okay, but an Authenticator App (Authy, Google Authenticator) or Hardware Key (YubiKey) is better. Action: Enable MFA on Email, Banking, and Social Media immediately.
- Recovery Options: Ensure your recovery email and phone number are secure. If an attacker changes these, they own you.
II. HARDENING THE DEVICE Your computer and phone are your gates. Keep them locked.
Code:// SECURITY CHECKLIST [ ] OS Updated? [ ] Antivirus Active? [ ] Firewall On? [ ] Unknown Apps Removed?
- Updates: When an update comes, install it. It patches holes attackers use. Action: Enable Automatic Updates for OS and Browser. Antivirus/Anti-malware: You need a sentinel. Windows Defender is sufficient for most, but third-party tools exist. Action: Run a full scan weekly. Do not download "cracked" software.
- Permissions: Apps don't need access to everything. Action: Revoke camera, mic, and location access for apps that don't need it.
III. NAVIGATING THE WEB SAFELY The internet is a minefield. Walk carefully.
- Phishing Awareness: Emails asking for urgency are lies. Action: Hover over links to see the real URL. Check the sender address carefully. Downloads: Only get software from official stores or vendor sites. Action: Avoid torrent sites and "free" premium software. Public Wi-Fi: Coffee shops and airports are dangerous. Action: Use a VPN or Mobile Hotspot for sensitive tasks. Never log into banking on public Wi-Fi. Browser Hygiene: Clear cookies. Use privacy-focused extensions (uBlock Origin, Privacy Badger).
IV. DATA BACKUP & RECOVERY If the worst happens, you need a way back. Ransomware doesn't care about your feelings.
- The 3-2-1 Rule: 3 copies of data, 2 different media types, 1 offsite. Action: External Hard Drive + Cloud Storage (Backblaze, Google Drive, OneDrive). Offline Backups: Keep one backup disconnected from the network. Action: Unplug your backup drive after syncing. Ransomware can't reach it if it's offline.
- Test Your Backups: A backup you can't restore is useless. Action: Try restoring a file once a month to ensure it works.
V. PRIVACY & DIGITAL FOOTPRINT The more you reveal, the more you can be targeted. Minimize your exposure.
- Social Media: Don't post your location in real-time. Don't post photos of your ID or mail. Action: Lock down profiles. Limit who can see your friends list and posts. Data Brokers: Companies sell your info. You can opt-out. Action: Use services like DeleteMe or manually request removal from data broker sites.
- Email Security: Use aliases for sign-ups. Action: Use services like SimpleLogin or AnonAddy to hide your real email address.
VI. WHAT TO DO IF COMPROMISED If you suspect a breach, act fast. Time is the enemy.
- Disconnect: Unplug from the internet immediately to stop data exfiltration. Change Passwords: Start with email and banking. Use a clean device if possible. Scan: Run a full malware scan. Monitor: Check bank statements and credit reports for suspicious activity.
Made by Child Of Shadows© 2026 Cybersecurity Education Initiative. Stay Vigilant. Stay Safe.
encrypted DNS (DNS-over-HTTPS or DNS-over-TLS) tools like NextDNS or Cloudflare is a good privacy upgrade. bc sites u vist are most likely leaked to ISPsbro since I posted that thread yesterday he's already made 4 more accounts![]()


