Digital Security, Privacy and Hygiene — a Practical View

Digital Security, Privacy and Hygiene — a Practical View

Published {{ post.published_at|date:"j F Y" }}

[[PHOTO: macro shot of a combination lock dial, softly lit, evoking precision and mindfulness]]

Most people don’t think much about their digital hygiene until something breaks. Security feels like a background process, quietly humming until it doesn’t. Yet the habits that protect our data are no different from the ones that protect our health: small, routine, and often invisible.

Understanding Multi-Factor Authentication (MFA / 3FA)

When you sign in here, you can use up to three factors to prove who you are:

  • Something you know – your password
  • Something you have – a time-based one-time password (OTP) from an app like Aegis, Authy or FreeOTP
  • Something you are – an optional biometric check on your device

Each factor is independent, so even if your password were stolen, an attacker would still need your phone and your physical presence to get in. The OTP itself is a six-digit code that changes every 30 seconds. Your phone and the server share a secret key; both generate the same number at the same time. No SMS, no lookup — just maths and time. Quietly elegant and private.

[[PHOTO: laptop and phone on a wooden desk, phone showing 2FA code]]

End-to-End Encryption (PGP / GPG)

Email is still a weak link for privacy. This site supports PGP/GPG encryption for anyone who adds a public key to their profile. When you send a message, the system encrypts it automatically. Only the matching private key on your device can open it.

Think of it as sealing a note inside a locked box and handing it over. The postal workers can see the box, but not what’s inside. It takes one setup step, then protects everything silently after that.

[[PHOTO: small safe box half-open, warm light inside symbolising confidentiality]]

Password Managers: Tools, Not Crutches

Remembering one or two strong passwords is fine. Remembering fifty isn’t. Password managers such as KeePass, Bitwarden or 1Password store and encrypt your credentials in a vault protected by a single master password — ideally a long passphrase you can actually say aloud.

If you sync that vault through a cloud service, it stays safe even if the cloud provider is breached: without your key, the contents remain unreadable. Managers also make it easy to rotate passwords regularly, which is what most people claim they do but rarely manage manually.

Strong, Pronounceable Passwords

Good passwords don’t need to look like static noise. Our memory works through rhythm and association, so combine words that sound right but make no obvious sense together. For example:

melon-vortex-silent-shore

The logic behind this was captured neatly in xkcd #936: “Password Strength”. Length and randomness beat weird punctuation every time.

A couple of personal tricks: add an = sign somewhere unexpected or drop in a familiar maths operator such as +, ÷ or . Engineers and scientists are good at recalling formulae, so turning a password into something gently algebraic can make it stick. Avoid real-life references — if a stranger could guess it by reading your social profile, start over.

[[PHOTO: vintage slide rule or engineering notebook beside a modern keyboard]]

Passwords as Self-Training Aphorisms

Rotating passwords can double as quiet self-training. A passphrase like keep-breathing-deeply-2025! is both a key and a reminder. Change it when the lesson changes. Used well, it becomes a small mantra system — a private way to reinforce focus while staying secure.

Digital Hygiene and Message Expiry

The longer a message exists, the more chances it has to betray you. Apps like Signal and WhatsApp now support disappearing messages. Use them. Not everything deserves to live forever in a chat archive or email thread. Set old emails to auto-delete or use expiring links for sensitive files.

There have been plenty of recent cases where people lost jobs, relationships, or even faced criminal charges because of messages, images or videos received months or even years earlier that were never meant to persist. Some of those moments, if they had simply expired, would have saved careers and families. Deletion isn’t paranoia; it’s hygiene.

[[PHOTO: tide washing away writing in sand or footprints fading from a beach]]

Ephemerality is healthy. It keeps data light, minds calm, and the inevitable breaches smaller.

In Closing

Security isn’t a lifestyle; it’s a set of small habits that work best when you stop noticing them. Enable MFA. Use a password manager. Encrypt whenever you can. Treat your digital footprint like your kitchen: keep it tidy, throw out old stuff, and don’t leave anything valuable on the counter.