Yes!
Kali even provide some documentation on how to approach this - https://www.kali.org/docs/usb/live-usb-install-with-windows/
You could also get a cloud machine running Kali, they even detail for you how this would be possible with DigitalOcean here, handy if you don't have a PC up to spec but can afford $10/mo - https://www.kali.org/docs/cloud/digitalocean/
Check out Bitwarden. This is what I use for my password management. It's open source, free with $10 a year unlocking premium features, and has apps and browser extensions across virtually everything. I swear by it.
Edit: It is never a good idea to store passwords in plain text on anything, especially password cheat sheet.
u/walderf has the answer on what you want.
Other options for future: Mullvad VPN and Wireguard. Super easy setup. Should cost you about $6 for a month. There is no subscription. I use it when I travel, since in normal life, I don't need any.
When you punch hole in your router for RDP ports, be aware that is the #1 port being scanned.
Pretty sure the ATT Fibre ONTs don't allow you to change DNS on the devices themselves-- you'd have to change DNS on each of your devices manually. This is a pain as it makes it harder to use ad blocking platforms like PiHole, but it is doable. Ad blocking is something I would put into place that would make you more secure
Unless you host and own the VPN are mostly corporate cash grabs with great marketing behind them. If a state actor wants to find you and needs to subpoena a VPN host to get access to you, they will do so. If a VPN service gets bought, the logs they maintain may put you at some level of risk. Just look at ExpressVPN for example. If you really need an intense level of privacy, maybe go to your local library and use the wifi there instead.
I would worry less about network security as an average user and more about account security (making sure 2FA is enabled on all your accounts, using a password manager, making sure your passwords are all unique)
Get something that doesn't require any wireless configuration to work (in my opinion.)
Here's a brand I have used for 6 years without issue: https://smile.amazon.com/gp/product/B0040FJ27S/
If you root your device with Magisk, you can install this app to prevent it from fully charging: https://play.google.com/store/apps/details?id=com.slash.batterychargelimit&hl=en&gl=US&pli=1
Like every panic post on this sub the answer to “is it possible” is “with money all things are possible.” A much better questions is “is it likely”. Understanding how these things work can help here.
First, even on an unsecured network, the information you pass between websites, especially the bank, should be encrypted. So while a network admin might be able to see that you are connecting to the bank website, and if they are especially pernicious they might be able to intercept the encrypted data, they likely can’t do much with it without being able to decrypt it. And that alone is not trivial.
Second, adding a VPN just kind of complicates the picture even further. The hypothetical attacker can only see the server your VPN connects to, not the actual website. Again, with all data being encrypted, including instructions to connect to the actual website.
So they would have to either decrypt two different types of data passage or just one and serve you a fake bank landing page to harvest your credentials.
The likelihood of either option is very low.
I can’t speak to ExpressVPN specifically, but more and more I am seeing the advice to not even worry about VPNs because so many websites require encrypted data passage, and browsers are getting very good at knowing when something is wrong. Using something like a password manager help because they won’t natively fill a pw if the domain (landing page) is wrong.
I am not an expert. Just an enthusiast, so others may fill in some missing details (or correct wrong ones) here.
>They told me there was nothing they could do to override the flag on my account until I had my computer scanned and the malware removed.
You should be able to just call them back and say "I've scanned my computer, it's clean."
>I occasionally use a VPN (ProtonVPN) so my IP address may vary from one visit to the next and may not be unique to me. Using a VPN seems mundane enough that their systems should be able to handle it without freaking out.
Correct, it really should be a mundane thing. I'd be surprised if the VPN was the issue; I frequently access TD via web using a VPN. The only thing TD has done has said "You're accessing this from a new computer" and then they send a code over SMS to confirm the new location.
>How do they propose I prove that my computer has no malware?
Usually in these types of situations you just tell them "I don't have any malware, I've scanned my computer". I've never had a case of a bank (or ISP, they do similar things sometimes regarding "detecting malware") where they need proof. They just need you to say "It's clean".
Bitwarden and ProtonVPN are both solid choices, much better than whatever "Hotspot Shield" is.
In my professional opinion, the Apple ecosystem is secure enough for most users.
If you have millions in cryptocurrency, are a investigative journalist, or something else that carries a lot of risk... then you may need some alternatives and additional protections.
But, again, for most people, you just need to use good/unique passwords and be mindful of what websites you visit and what you download/install. It wont be Apple that gets you -- it'll be some lapse of judgment that leads you to download a sketchy file or click a sketchy link.
>Hello, I’m a nonprofessional mac user. I found Apple is not that safe and is a part of a surveillance program.
As a non-professional, how did you find this out? Or did you read it somewhere and assume its truth?
​
>A vpn (hotspot shield)
A free VPN is... Not a good choice. I would put money on this being less safe and having more surveillance than Apple. You are funnelling all of your traffic to this company now, and they very well could be tracking that.
Most users are probably better off from a privacy standpoint to not use a VPN. If you understand what VPNs do and why, you can make a better decision regarding using one. If you are going to use one, don't use some random free VPN -- look at the industry leaders that have published 3rd-party audits (e.g. Mullvad).
​
> I’m worrying too much? Should I go back to Icloud Photos app and non encrypted notes uploaded on Icloud drive?
Maybe? You haven't said what you're worried about (other than "privacy", which is not specific). You need to figure out which threats you want to protect against first. Then figure out the best ways of protecting against those threats.
I got my acc banned for bs, used another one with the same number also banned, found out about google voice number and used that. Worked, I also reset my iPhone settings to default and use NordVPN as well so far so good
Thanks, but my experience with using TunnelBear or Windscribe, or most VPNs as a trial before deciding to buy, is that they actually slow-down the speed of the internet. How can I get better speed in VPNs?
I recommend reading Kevin Mitnick's book The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data https://www.amazon.com/dp/B01NC39SM6/
Wow, I appreciate you looking that up. Makes me feel less paranoid that I’m not the only one. Definitely gonna change VPN’s. Supper sketchy. I just heard a lot of good things about Mullvad so I thought I would give it a try. Instead it just made me paranoid.
Nord is fine, but you must not have been around the industry long if you aren't familiar with Mullvad which has been a gold standard for VPNs for awhile.
Do what you want, but you should probably familiarize yourself with the industry leaders if you're going to be going around making recommendations.
Nord are the only ones who have self-requested PWC audit.. twice
Nord is only an issue if you are using their business servers in the USA
Read their ToS
Why do you say Mullvad is so good?
What are their policies specifically that are better than Nord?
cnet articles are notoriously full of shit
Your best bet is to use a VPN service when on public WiFi. But to answer your question, most websites utilize SSL certificates with will encrypt your communication to those websites which means your traffic is mostly OK to traverse those networks. I recommend using NordVPN or even better, Mullvad VPN when you're connected to non trusted networks.
PDF is a vector format, and allows multiple layers of images/text on top of each other. What you're seeing might be different objects loading in with a delay. Scammer probably took a real PDF a real bank sent, and the added new information on top of old text objects.
You can edit PDF files to verify that is the case. If it has edit protection, you can remove that with https://smallpdf.com/unlock-pdf
I would recommend against PIA ever since they were obtained by Kape Technologies in November 2019. This company has a history of being involved with malware distribution.
They also purchased ExpressVPN earlier this year, as well as owning multiple "VPN-review" websites. They seem to seriously push to become the main VPN provider, which is quite worrying giving their history.
If your sole goal is to mask your IP, I would highly recommend someone who has a reputation or goal to just be private and anonymous, like ProtonVPN and Mullvad.
ProtonVPN, whos entire business model is built upon privacy, even has a decent FREE tier for their VPN, which should be sufficient for most.
Should also mention that VPNs for most users is just "snake oil", and is more critical for possibly oppressed people in oppressed countries, for instance journalists and politicians.
For normal users, more or less all your online activities are already encrypted.
You usually use a VPN to mask your activities from your ISP, but you are still transferring that trust to the VPN provider.
VPN:
VPN's in general are a result of marketing. You don't need a VPN for normal use, as more or less everything you do online is already encrypted and secure. If you do however look at masking your IP, or your activities from your ISP, then a VPN is a fine solution. You do however move your trust from the ISP to the VPN, so you should get something which is built upon privacy and security (and anonymity if needed), like Mullvad or ProtonVPN. ProtonVPN has a free tier too which is sufficient (depending on required speeds). I would stay away from commercial VPNs in general, like NordVPN (has a history of not disclosing breaches), Private Internet Access and ExpressVPN (owned by a super shady company, Kape Technologies).
For password managers, stay away from integrated password managers into other apps, like web browsers. They have a larger attack surface in general.
I would also recommend against LastPass, as they have a history of poor security, which they seem uneager to disclose. Not just talking about the very recent one, but another one a few years prior.
If it's convenient enough for you, you can simply have a local one like Bitwarden and KeePass.
If you want full functionality with cloud support, multiple platforms etc, then I highly recommend 1Password.
Some people would say that implementing a cloud storage for your database is an elevated risk, which is partially correct. Companies like 1Password do however say they store encrypted databases, such that your database isn't exposed even if the company was to be breached.
And I personally think that a company whos entire business is secure password storage, probably has better security in place than most users (although the company would be more prone to attacks).
What the other guy said, but also, please buy a webcam cover. They are cheap and easy, and will buy you some peace of mind. I don't have a UK link, sorry, but just so you can see what they are. I even have one on my cell phone.
They probably didn’t know you were out of the country, but made. Reasonable guess.
As for how they knew you were on a VPN, that is easy. You connected to them via IP X (ExpressVPN IP) and they looked up who owns X IP (which would show ExpressVPN).
Netflix can detect VPN use, so does your company. Connecting to a company VPN server from the likes of ExpressVPN naturally triggers a security alert. Hackers usually do that to hide themselves.
You'd be safer hosting your own VPN server from home. C.f. _vpn_setup_for_remote_work/?utm_medium=android_app&utm_source=share
Michael Bazzell has a book about how to delete yourself from the internet. That could be a good start. Extreme Privacy. You would likely be better off looking into several different sources, although I don't have any other specific ones to suggest. This will probably be an ongoing project.
I agree that it's unlikely, but if it bothers you to have the camera uncovered, there are these cool little sliders you can buy.
Infact if you go to your Router settings you'll find a VPN section. This is where you set it up. It's no different than NordVPN or other services you just pay for connecting to an already established server.
>VPN are more meant to reduce online footprints, rather than provide extra security.
Very, very, very, VERY incorrect. That's the rhetoric that marketing departments at NordVPN tell people. A VPN, when configured with something like IPSEC, absolutely provides more security than not using one.
Source: I build custom VPN's from scratch for billion dollar companies.
Yeah but not using a VPN is worse than using one. I don't know why people even bother arguing whether or not VPNs are useful. They are. Especially when connecting to public Networks. Of course it's not a one trick tool to ultimate security/privacy, nothing is, however it very much should be on the list of tools utilized especially when it comes to Network Security at the gateway/router level. Subnetting, DNS, etc all are important and VPNs provide a preconfiguration of it all and you even realize the importance of using a VPN in your last sentences so it does make browsing SAFER. What was even the point of pointing that out in the beginning.. Anyone who looks deeper than some NordVPN shill ad will realize it's not the end all be all to privacy/security..
TL:DR Betternet = Trash
Betternet is the worst VPN ever, they literally use your device to mine crypto or something else horrible plus they track you like google. Use a recommended VPN:MullvadVPN, OrchidVPN, IVPN, or ProtonVPN. I know because I learned from other people online because honestly there was a point where even I used that proprietary trash.
Iphones are encrypted by default, so unless your teachers purchased an apple 0 day exploit (worth millions) there's absolutely nothing they can do.
However they could use something spooky like a WiFi pineapple to pretend to be that network and do something although teachers are usually never this smart. Or a traffic analyzer (ex: Wireshark) to do some potentially automatic filtering, such as finding out which device connections are VPN connections by filtering the VPN IP through a database to see if it uses any publicly identifiable VPN IPs, and kick off the VPN connected devices that way or automating that process by creating a script for it.
But in general if you are using a good VPN ex: MullvadVPN, ProtonVPN, IVPN, OrchidVPN. Not many people in the world can brute force their way through it.
Thank you for your response. I don't want to be a total ghost, because I still want to maintain a social life. What I'm thinking of doing is just using different tiers of anonymity. Maybe something like this....
Tier 0: Usernames/pws not linked to me. only access through a second computer with vpn, private browser, etc. Never login to these accounts on my phone or personal computer. examples would be for like crypto assets, etc.
Tier 1: Very secure. I'll use the pw tricks you mentioned. For financial stuff. Can't bank anon unfortunately. Use for personal accounts that have sensitive info.
Tier 2: Things like social media, video game accounts, etc. Obviously any accounts getting hacked wouldn't be ideal, but someone having access to my game achievements/trophies wouldn't be the end of the world. I don't post/message private info on my socials anyway.
Also, doesn't it matter how a VPN is managed? I saw recently that NordVPN will comply with law enforcement.
The best VPNS like everybody else in the universe is saying are as follows:
•Mullvad VPN-Based in Sweden, No logs, Paid (Trustworthy)
•ProtonVPN-Based in Switzerland, No logs, Free (Trustworthy?)
•NordVPN-Based in Panama, No logs, Paid (Trustworthy?) (OFFERS TOR OVER VPN SERVERS)
•Orchid-Based in California, No logs, Paid, Decentralized (Trustworthy)
•IVPN-Based in Gibraltar, No logs, Paid,(Trustworthy)
Personally I don't know what Orchid VPN really does and a lot of people have this internal hated towards proton to be honest they probably are letting the NSA scan emails but idc its not google or sold.
Also NordVPN got into a scandal-deal recently so use them only if you don't lose anything by being compromised by
FWIW, people frequently wardrive/scan blocks of IP addresses looking for open ports to leverage.
Also there's services that do the same thing to save the hassle of running the initial scan.
In this case I would think Tenable's free offering might be of value. There are restrictions compared to the paid ones but for a small home network it is often more than enough.
I was hearing that Rumble.run is doing vuln scanning now which is agent based asset management. They also have a home free offering.
Obviously OpenVAS (http://www.openvas.org/) is the open source version of Greenbone (which might explain why you are seeing a "sale price).
Hopefully that helps.
I don't know if this counts as something happening, but when I looked again in the old PC, I saw that I downloaded and installed a shady CPU thermometer just 11 days before someone used my email address to register to that crypto site. I'd like to think someone just mistakenly used my email (like theirs were spelled close to mine), but that would mean the confirmation email should have been stuck in my inbox since they can't delete it without accessing my email, but there's no trace of that and it is unlikely I accidentally deleted it since I neglect to delete emails often. I ran the CPU thermometer installation executable on VirusTotal and Hybrid Analysis and the results are below if you're willing to take a gander:
Well, for one, your ISP is absolutely keeping track of your logs- but they don't need you to use their DNS to do that.
Two: Does it have access to your apps? Short answer is, that's not what DNS is. DNS is essentially a phonebook that resolves an IP address to a URL. But any app that uses an internet connection (all of them, even if it's only to check for updates) do communicate with a DNS server, so sure. I wouldn't say they have access to your apps per se, but they will use a DNS server to resolve any IP address.
But to answer your actual question? It's about as safe as using it on your home network for any device. If DNS spoofing happens or the like, it'll affect everything using that DNS server, not just your mobile devices. Other options are OpenDNS' server or google's, but you can use 1.1.1.1 without about as much concern as you would for anything else.
Here's an article straight from cloudflare about DNSSEC, which may be of interest to you: https://www.cloudflare.com/dns/dnssec/how-dnssec-works/
well, so it loaded, but wasn't able to execute JS code.
if it was a specifically targeted to you type of phishing link then there could be any number of data collected just from the page load. (check out https://browserleaks.com/ for more information.) if it was just a broad attempt that required further execution for whatever reason then you're probably fine. without knowing what the intention was then there's no way to know what the level of concern should be. you could go back and forth about it all day being paranoid and worried. basically, if your OS was up-to-date and this wasn't a 0-day, specifically targeted attempt then you're probably alright.
hope that helps, don't know what else to tell ya.
Yeah always do full scans, and glad you found the trojan. I also like to use https://privacy.com/ for all my online card purchases. I don't know if it would have helped in this situation but it keeps your real card from being leaked if a companies database is compromised.
I did turn 2FA off for Binance so I could disconnect my number from it and because I locked the account anyway.
Removing your banking information from it is probably the most important part there.
My phone carrier says 2FA for phones is impermeable but I have my doubts.
Boy, I would love to know which phone carrier told you this-- this is absolutely false. Not just for SMS based 2FA but any security implementation really. There is no such thing as absolute security, just more secure and less secure.
One of my concerns with Google’s 2FA is what happens when you switch phones. I hold onto an old phone because it has a 2FA on it that I don’t know how to transfer.
You just need access to both phones. Google has a guide here
https://support.google.com/accounts/answer/1066447?hl=en&co=GENIE.Platform%3DiOS#zippy=%2Ctransfer-authenticator-codes-to-a-new-phone
I don’t think I can unlock my crypto to add this since I didn’t provide them with enough verification info, but I am absolutely willing to spend $40 to protect my Gmail accounts.
Same. I use Security Keys to protect as many accounts as they support.
I’m mostly freaking out over individual stories on Reddit and Quora
You really gotta be more specific-- many of these stories are also of folks not understanding what's going on under the hood. 🙂
Honestly, I would stay away from Tor if possible. There is a reason law enforcement uses programs such as Authentic8 to search the dark web. If you are looking to remain more secure and fairly private (not 100%), then I recommend Puffin Incognito Browser for Android users only. The web browser operates in the cloud and doesn’t allow access to any mechanisms on the device.
Both Kaspersky and Bitdefender VPN services are just relabeled Hotspot Shield products. All three of them boast "military-grade encryption" which is pretty much like saying "our taxi comes with wheels". This very Reddit website is also protected by "military-grade" encryption, so do your bank websites and pretty much any other websites with HTTPS. VPN doesn't add extra security for them.
All of them also don't have built-in tracker protection, which means over a hundred advertising networks still can track you across websites even with their VPN enabled. Blocking them can be done with browser-side adblockers, which works without requiring a VPN.
Unless you want to watch geo-blocked content (when streaming services proactively find and block/neuter VPN users anyway), hide what domain you visit (ie , the full address and what you're reading already covered by HTTPS) from your ISP/network admin or hiding your IP (which doesn't translate to your full address, mostly just city level, only law enforcement and DMCA letter from copyright company can reach you through it) you don't need a VPN.
You can also change you email address on your accounts, that way they can't try to login.
You can keep the same email but use an email aliase for your accounts.
Yes and no. With your email, they now know 50% of what they need to log into most websites with your info. That other 50% will be easier or harder depending on your password and if you have things like multifactor authentication enabled. They can do a credential stuffing attack where they parse through breached databases for your email and find passwords you've used before. I assume your email is in some leaked database since you've had it for years, but you can check on a site like https://monitor.firefox.com/ . Let's say that's not the case and they just have your email, they can still do a dictionary attack or maybe even a more sophisticated attack if you're really worth it.
The bottom line is you need to change all passwords that the email is attached to. Run your email through that site I linked to check for sites where your email has been potentially exposed before and change those first. Once those are changed, you need to change the rest of your accounts that are tied to that address. An easy way to find a lot of the important ones is by searching your inbox for "Account Verification" or something similar and changing those. Definitely use a password manager to create and store complex passwords to make dictionary attacks next to impossible.
TLDR: Change passwords on everything that email address is used for.
Ignoring the actual implementation for a sec it will, at the least, be more secure than all the idiots with passwords in an excel file.
Second, everything should be stored in the manager and then every password should be changed to something no one knows nor can remember. This is a second level of better-than-before because people are bad at making secure passwords, you’ll reset them during the transition just in case anything was compromised before, and it gets people going to the manager as the source of truth. No more GoPatriots2021 passwords.
Third, since all passwords are now managed, you know exactly who had access to what and what passwords should be changed (for posterity, since they were unrememberable anyway, see step 2) when someone leaves or gets fired.
Thus, almost regardless of encryption implementation you are already more secure than before.
The actual math of how stuff is encrypted will vary wildly from program to program.
Here’s a whitepaper on how 1Password does it https://1password.com/files/1Password-White-Paper.pdf
I just started getting this same warning by Bitdefender.
For me, it only happens when entering gitlab:https://about.gitlab.com/Other sites seem to be fine.
I tried edge and chrome browsers, they give the same warning.
It warns about: https ://r.lr-in.com/
Suspicious web page detected
now
Feature:
Online Threat Prevention
The webpage https ://r.lr-in.com/ has been detected as suspicious. Although the page is not blocked, it is not recommended to continue browsing this page.
Then you need to run Express on a router. Connect your computer to the router and start PritUnl on the computer. Make sure the router doesn't silently fallback to your ISP connection when the VPN connection is down.
The pcWRT router supports ExpressVPN with OpenVPN protocol. The top speed is about 25Mbps. Here's a howto:
​
If you need faster speed, you need to switch to IKEv2 or WireGuard (and switch to a VPN service that supports these protocols on the router). Or, buy a more powerful router that provides faster OpenVPN speed.
OK — quick explanation: NordVPN is, well, a VPN; that means all data you pass through the VPN is encrypted from your device to the VPN's servers, i.e. what websites you visited, what domains and IPs you connected to, and unencrypted network traffic like HTTP (s stands for secure - encrypted. If it lacks s, the ISP or VPN can see what you do in the website). Your employer can theoretically still see what you connect to if he installed spyware on your device. But that's a different issue, and is illegal without your consent in most places. Maybe you consented to something like that in your contract, but it's unlikely.
Nope, it only works when you're not using VPN. Nord had HTTP proxies but it was removed early this year. SSL cert inspection merely means they can see what domain you're visiting, in this case when you're not using VPN, say "", but not the full URL or content. With VPN, they only see you're connecting to NordVPN.
NordVPN can't stop them from seeing who's browsing. Your device MAC address is still visible which can be correlated to your device model or at least the network adapter vendor. This, when correlated to your other activities and timing will reveal that the device belongs to you.
What happen is NordVPN would encrypt all traffic generated by your laptop, on layer 3 are covered by the VPN.
Nope just forgot it was in the list. We’ve never used it but it does appear to be zero-knowledge - meeting the “no one else can access it” requirement.
https://www.dashlane.com/download/Dashlane_SecurityWhitePaper_March2021.pdf
I wouldn't rely on anything Google's implemented for what appears to be a temporary transfer to be permanent here. If you're familiar with how Discord logs on, seems like a similar system - the QR code is a temporary token, and scanning it from another device provides authentication.
While it's a pain, to be certain you have backups you will need to back up each account's QR code somehow. I would recommend taking that as an opportunity to put the codes into another TOTP app, such as Aegis (100% free/open source/I'm not affiliated), which allows you to back up your codes.
That largely depends on the router you purchase and what features it supports.
The simplest way to make it "more private" is to buy a router that supports OpenVPN and then buy access to a commercial VPN like Private Internet Access. Add the PIA ovpn cert to your router and now all your traffic will be going to PIA instead of your ISP.
I put the phrase "more private" in quotes because all you're doing is changing who gets your data. In this case PIA would get it instead of your ISP. The good news is that PIA has been subpoenad twice by the FBI and both times the FBI has been quoted in court saying that they could not obtain any usable information from PIA.
I use apple devices for work.
Visiting the Mullvad RTC check site with all Safari advanced experimental features with ‘RTC’ in the name passes the check. This applies to using a VPN and regular traffic.
It leaks using the Private Relay, a headline article circulating and causing some confusion.
Encrypted DNS would help you here for the domain requests:
AdGuard • NextDNS • ControlD
Or a VPN like Mullvad or AdGuard to tunnel all your traffic through. Good procedural advice from others here
Mr Bazzell is one of the best known osint authorities. If you followed everything he say you are pretty much a ghost.
Extreme Privacy: What It Takes to Disappear https://www.amazon.com/dp/B094LDWKGZ/ref=cm_sw_r_cp_api_glt_fabc_XRY3T1BQB3QTCCKN1SCS
I can’t speak for cables but I know there are usb condoms that block data transfer. Basically make the USB port power only. I use them in airports and on travel.
PortaPow USB Data Blocker (Red 2 Pack) - Protect Against Juice Jacking
https://www.amazon.com/dp/B00T0DW3F8/ref=cm_sw_r_cp_api_glt_fabc_H87W39EE5HXRXGCQW003
Great suggestion for me, the more I am gathering information by understanding a little bit of everything from the various points of view of more people like I know that Kaspersky Cloud Personal is the best only ExpressVPN vs NordVPN and 1Password vs Dashlane so I'll try to wait for more answers so you know a bit of everything I like I know that ExpressVPN does not have the killSwitch and therefore it already makes me choose NordVPN instead for Deeplane it has the control function in the darkweb which 1Password does not have but both do not have 2-factor authentication only in the verification for the teams and companies so I will wait for other responses from other people
In practice these are all the needs that I am going to cover and that I am looking for advice and ideas on the net to understand well so that Dashlene has control over the darkweb and the password generator which 1Password does not have, NordVPN has many more features unlike ExpressVPN, however, the latter uses the latest technologies
I use Firefox with Disconnect, UBlock Origin, Https Everywhere and I use Firefox Relay emails where I don't put my email, Firefox and the Developer Edition version convenient for those who do Web Design by putting settings on purpose to avoid tracing and collecting data and when it is closed the passwords are removed I do not save them etc. in practice everything is perfect for security only that a VPN would make me comfortable even if I do not know which is the best between NordVPN and Express VPN in terms of security, and as for the passwordmanager what a difference there is between 1Password and Dashlane so some say that 1Password is good, others say Dashlane who has more functionality and security both for the password manager and for the VPN for the Kaspersky Cloud Personal antivirus only on the PC because on mobile devices it makes no sense so I'm about to switch to IPhone and in general, however, it makes no sense I know that there is a lot of marketing for both password managers and VPNs and antivirus only that kaspersky h to the safest database in the world from what I know and most up to date in fact it is very safe even if I use Windows and soon I will also buy a MacBook Pro M1 the new ones that will come out if they come out and make sense to scan the files because as a security it makes no sense so and secure the MacOS system, the vulnerabilities fix them quickly from what I know
I know a lot of cyber professionals who use Lenovo laptops. I don't know your price point, but I would investigate this one 2020 Lenovo ThinkPad E15 15.6":
https://www.amazon.com/Lenovo-ThinkPad-E15-1920x1080-i5-10210U/dp/B086MTSCLQ/
Thank you very much for a beefy explanation and a link to github.
I just wanted to point out that NetGuard app I've mentioned before isn't VPN app of any sort. This app blocks all internet communications in your phone. Literally you need to white-list/give permission to every app or service(I guess) to connect to internet - which is very easy. Theoretically when you turn the app on you stop your phone communicating with internet.
https://play.google.com/store/apps/details?id=eu.faircode.netguard
So, clarifying that is your argument staying?
Regards