The document discusses various methods for protecting personal security. It focuses on protecting bank cards by keeping PINs private, covering information on cards, and being aware of wireless payment risks like PayPass and relay attacks. It also recommends protecting personal documents, limiting sharing of personal information, and using encryption and passwords to secure phones, laptops, and data from theft or unauthorized access. The document concludes by offering to answer any other questions about personal security protections.
4. Bank cardsBank cards
➢ How to protect our PIN
➢ cover your hand, when typing it
➢ do not share it
➢ do not write it on a note and keep it in your wallet
15. Personal information
What to do
➢ Do not share unnecessary your personal details
➢ Combining separately provided data can
compromise your identity
➢ Assume that you are being watched all the time
18. RFID/NFC cards
➢ Easy proximity reads
➢ Very easy forging
➢ Cheap devices for forging
19.
20. Phone protection
➢Encrypt your phone
➢Encrypt your SD card
➢Set a password, not a PIN
➢Setup a remote lock and wipe
➢Be very careful what apps you install and what
permissions they require
21. Laptop Protections
➢BIOS password
➢do not allow external devices to be used for boot
➢disable network boot
➢Power-On password
➢HDD password from BIOS
➢Encrypt your data (Linux LUKS and ecryptfs)
➢separate browser profile for banking
➢password manager for storing passwords
22. Laptop Protections
➢ Firewall your system
➢ Protecting your data from government
searches
➢ double encrpt
➢ cripple your second encrypted volume
➢ make sure you do not have access to the fix for
your data