@ Mike Walsh: Government issued plastic. Great idea. On this side of the pond there's a substantial number of people who believe change --other than retrogression-- is the work of demons and shouldn't be facilitated; that incantations and wishful thinking will make bad things go away.
rufwoof: "Many sites use google name servers (8.8.8.8), and google records/retains everything. So they have the capacity to see what site(s) you intended visiting, and any encrypted data flows. If for instance Mr Goggle . . a google employee or someone that hacked into their systems retrieved such data, then for any given communication they might deduce a lot. Often the front page of a site will be relatively static, so a dns request that indicated you were bound towards that site together with the clear text content returned, as well as your encrypted data stream - makes 'cracking' trivial. Given the encrypted content and key, or clear text and encrypted text, or key and encrypted text ... and deducing the missing element (clear text, key, clear text ... respectively) - and google (and the NSA type entities google feeds into), or anyone stealing googles data ... have considerable power."
Wondered what anyone's thoughts are regarding the following:
For online banking and purchases using Paypal I employ firefox run-as-spot (clear everything on shutdown). That browser isn't used for any other purpose and no other web-browser is running while it's in use.
[If I were to conduct searches, Startpage acts as an intermediary for google-searches: Startpage claims that google only knows that Startpage made the inquiry; and that it doesn’t keep records of who asked].
The banking account which funds Paypal is a debit account [which never has more funds than I expect to need] distinct from my regular account. [I know: a different bank would be preferable but the system was set up long before online banking when physical withdrawals and deposits would have eaten into my then precious time. To now set up new Paypal & associated banking accounts is not only a hassle, but involves using a now much riskier internet].
The Login User-Names on these bank accounts, while easy for me to remember, are not quite the name by which I'm generally known. Passwords for these accounts are 16 random symbols generated by a program employing Chacha20 (256-bit key operating on 512-bit blocks). Since not even I can remember them, passwords are on an (albeit plain text) file buried among by now many thousand of files. When needed, with only firefox running, I open the file and use copy-paste to fill in the password box.
[How does copy/paste compare to using an a virtual keyboard? From "home" copy/paste should be preferable as it avoids typing errors. But what about when you’re in a less secure location?]
I have considered using lastpass. But frankly, other than regarding online financial matters, I don't care who knows what I'm doing. And employing lastpass means I'm storing my credentials online and depending on lastpass to be more vigilant than hackers trying to access the records it maintains.
Keypass (Linux version KeypassXC) seems a worthwhile addition to this system. Credentials are locally maintained in an encrypted database. You only have to remember the master password. And where you placed its database. Like my plain text file, you can bury it someplace. You can also copy and transport it to a different computer or USB-Key. It creates databases as hidden (./”dot”) files.
Just read the continuation of the discussion on the Beginner's Thread which inspired me to start this one. s243a has suggested a good reason to use (Chromium & Clones) incognito / (Mozilla etc) Private Window. It affords some protection against XSS attacks. For details read his post viewtopic.php?p=10107#p10107