John is vision-impaired and uses Linux in order to go online. He uses ORCA, a graphical user interface in order to go online. He also uses a screen reader called "Speak up." But what can he use to encrypt his data? Leo recommends BitWarden (TWiT sponsor), though he isn't sure how the accessibility is.
Jeff is getting a warning about his WPA2 WiFi encryption. Should he move to a new router? Leo says that WPA2 was cracked, but he'd really have to have someone targeting him to really worry about it. WPA3 is the new standard and routers are starting to include it, but Leo doesn't think there's anything to worry about. He could check the router's firmware update to see if they offer it now. How about separating the SSID for the 2.4Ghz and 5.0Ghz bands? Leo says he can do that, but won't really have to.
First of all, get a password manager such as Lastpass (TWiT sponsor), 1Password, or Apple's Keychain. Any password manager is better than no password manager. Secondly, it might be a good idea to create a backup (like your important computer files) of those strong passwords in case something goes wrong with accessing your vault of account information. Maybe make a USB key of passwords and store it in a super safe and secretive location at home just for worst-case scenarios regarding your master password.
Troy has been working with his church to stream services every week. What they need is a live stream audio solution that they can lock down and protect. A password that grants people access to the stream when invited. Leo says that in reality, there's no solution that can be used that can't be cracked. One good solution would be to require listeners to visit a portal or website first. But even that can be bypassed with a link. Byta can encrypt a stream. You could try them.
Mario works at a government agency that has stiff security. He uses LastPass (a sponsor of the TWiT network) on his devices and wants to know if the government can see his data or his passwords? Leo says it's possible. They may have key loggers or screen readers that can see your activity and certainly monitor your online activity. He wouldn't be surprised if they have custom certificates that allow them to snoop, even if you're using encrypted security. But LastPass probably keeps Mario's activity safe.
Dan wants to encrypt all his data, so nobody can ever see it once he's gone. He already uses VeriCrypt and BitLocker. But he also has DVDs with image files and he wants to encrypt them. ISOs? Leo says that Dan can create ISOs of his DVD data. You import the data onto your hard drive and then destroy the DVD. Then you can encrypt the files using VeriCrypt or BitLocker the hard drive.
Melissa has an LG Stylo 5 mobile phone and the phone has been locked down after she inputs a pin code into it. Now she has forgotten the pin and only has 30 tries to get back in. Leo says that worst case, the phone will erase back to factory defaults. So she won't lose the phone itself. But there's data she doesn't want to lose. Can LG get the data off?
Wifi router setup: Change the password. Turn off WAN Administration (so bad guys can't log into your router). Turn off UPnP (an Xbox technology that is less useful on most routers). Turn On WPA2 encryption (or WPA3 if present) for a password requirement. Turn on automatic firmware updates, or check up monthly for the latest firmware. A security flaw in your router would be a big problem!
Joe wants to know if the personal vault feature of OneDrive is easier to use. He's copied and pasted folders into it and finds now that there are duplicates. Leo says that Microsoft apps save things to backup by default. Also, personal vault is encrypted for your security. It won't automatically sync from multiple places, just that my documents folder. Plus, you'd have to unlock it every time you need access.
Charles wants to encrypt his email communications. How can he do that? Leo says that your email can go through dozens of servers before getting to the person you addressed it to. And everyone along the way can read it unless it's encrypted. It's more like a postcard, but without federal privacy protection. PGP (Pretty Good Protection) uses public-key cryptography, which has two different keys. One public, and one private. Only you can encrypt with the private key, while the public key is used to verify and open the email. You can give the public key to anyone.