1
00:00:00,080 --> 00:00:08,800
odds are that the keys to your car or your house are never too far from your

2
00:00:05,920 --> 00:00:14,599
site since having them stolen would mean breaking a window to get back in or

3
00:00:10,719 --> 00:00:16,480
calling a lockout service at best or I

4
00:00:14,599 --> 00:00:20,199
guess there's the worst case scenario of having someone be able to go into your

5
00:00:18,560 --> 00:00:24,680
house rifle through all your stuff and drive off in your VW bus or whatever it

6
00:00:22,279 --> 00:00:30,039
is you use to get around fortunately keeping track of a single physical key

7
00:00:27,359 --> 00:00:34,800
or a few on a keychain isn't too hard hard but online passwords can be a

8
00:00:32,599 --> 00:00:39,559
little bit trickier to manage as the fact that many users have tons of them

9
00:00:37,440 --> 00:00:43,320
to keep track of and the fact that they're stored on a bunch of servers

10
00:00:41,200 --> 00:00:47,480
somewhere instead of being a physical thing you carry around in your pocket

11
00:00:45,120 --> 00:00:54,960
gives Mis creant more opportunities to pry into your online life but how

12
00:00:51,120 --> 00:00:58,320
exactly do passwords get stolen I mean

13
00:00:54,960 --> 00:01:01,079
they're supposed to be encrypted right

14
00:00:58,320 --> 00:01:07,280
well yes but you might be surprised to know that many times passwords aren't

15
00:01:03,920 --> 00:01:09,960
stolen by some crack group of cyber

16
00:01:07,280 --> 00:01:15,320
criminals using super fancy hacking techniques but are instead harvested

17
00:01:12,840 --> 00:01:20,960
through social engineering methods where the bad guys will straight up ask for

18
00:01:18,320 --> 00:01:25,720
someone else's password this usually takes the form of a fishing attempt

19
00:01:23,840 --> 00:01:32,280
where some Mal content will send you an email or a steam message that claims to

20
00:01:28,360 --> 00:01:33,759
be from your ISP or your bank or valve

21
00:01:32,280 --> 00:01:39,320
asking you to send your login credentials for some vague security

22
00:01:36,640 --> 00:01:44,439
related reason there's a similar concept too called tab napping where you will

23
00:01:41,960 --> 00:01:50,280
actually get redirected to a fake website that's built to look as much

24
00:01:47,119 --> 00:01:52,759
like the real thing as possible where

25
00:01:50,280 --> 00:01:57,920
you well enter your login information because the page looks official even if

26
00:01:56,039 --> 00:02:02,119
you're techsavvy or smart enough to realize what's going on when you see a

27
00:01:59,920 --> 00:02:08,160
fishing attempt it's actually still quite easy to inadvertently click links

28
00:02:05,119 --> 00:02:11,039
in scam emails or dodgy websites that

29
00:02:08,160 --> 00:02:16,280
install key loggers onto your system and send everything you type including

30
00:02:13,720 --> 00:02:22,319
passwords back to an attacker that's how I got nabbed key loggers don't require a

31
00:02:19,760 --> 00:02:28,200
whole lot of technical expertise to use making them a popular choice for amateur

32
00:02:24,879 --> 00:02:30,480
online thieves and then once someone

33
00:02:28,200 --> 00:02:35,599
unscrupulous has your usern name and password combo it's quite easy for them

34
00:02:33,400 --> 00:02:41,239
to use automated tools that will try your credentials on lots of different

35
00:02:38,360 --> 00:02:47,800
websites and since statistics have shown us that over half of all internet users

36
00:02:45,080 --> 00:02:52,200
reuse the same password on multiple sites there is a distinct possibility

37
00:02:50,280 --> 00:02:57,200
that if your password for one site is stolen your other accounts could be

38
00:02:54,440 --> 00:03:02,120
compromised as well but let's suppose you're quite careful about fishing and

39
00:02:59,440 --> 00:03:08,959
susp icious links and you use a unique password for every site exactly how safe

40
00:03:05,640 --> 00:03:11,480
are you well if an attacker exploits

41
00:03:08,959 --> 00:03:16,360
vulnerabilities in a server security and is able to find encrypted passwords they

42
00:03:13,959 --> 00:03:22,599
could break the encryption if it's not sufficiently strong or if the password

43
00:03:19,440 --> 00:03:24,840
themselves aren't very long a common way

44
00:03:22,599 --> 00:03:30,280
that password dumps that leak your credentials to the entire internet can

45
00:03:27,239 --> 00:03:32,840
happen even a mid-range modern home

46
00:03:30,280 --> 00:03:37,560
computer can guess millions of passwords per second and billions if it uses a

47
00:03:35,560 --> 00:03:42,640
discrete graphics card meaning that many passwords can be cracked within just a

48
00:03:39,760 --> 00:03:48,200
few days or even hours if you're using commonly used words or phrases but you

49
00:03:45,519 --> 00:03:53,040
obviously don't have much control over how the sites that you use store your

50
00:03:50,680 --> 00:03:58,280
passwords so we're planning a follow-up video coming soon on what you can do to

51
00:03:55,959 --> 00:04:03,799
make your own passwords as secure as possible and keep PR eyes away from your

52
00:04:01,159 --> 00:04:10,439
stuff spoiler alert passwords like querty and 1 2 3 4 56 are terrible ideas

53
00:04:08,200 --> 00:04:15,879
and yet they're used all too often and are very easy for attackers to guess so

54
00:04:13,280 --> 00:04:21,959
maybe don't put those questionable conversations you had with your ex

55
00:04:18,120 --> 00:04:24,360
behind a password that week and with all

56
00:04:21,959 --> 00:04:29,199
this talk of encryption tunnel bear seems like an appropriate thing to bring

57
00:04:26,360 --> 00:04:32,880
up tunnel bear VPN lets you tunnel to up to 20 20 different countries allowing

58
00:04:31,160 --> 00:04:38,160
you to browse the internet and use online services privately as though you

59
00:04:35,560 --> 00:04:42,759
are in a different country they have easy to use apps for iOS Android PC and

60
00:04:40,639 --> 00:04:46,960
Mac they also have a Chrome extension and it's as simple as just hitting a

61
00:04:45,120 --> 00:04:52,639
switch telling tunnel bear what country you want to Tunnel through and boom with

62
00:04:49,360 --> 00:04:54,759
no Tom Foolery or technical DNS blah

63
00:04:52,639 --> 00:05:00,160
blah blah your connection gets encrypted and your public IP address gets switched

64
00:04:57,759 --> 00:05:04,199
you can bypass all that different ult to use stuff they've got a top rated

65
00:05:02,160 --> 00:05:08,919
privacy policy they do not log user activity and you can try it out for free

66
00:05:06,759 --> 00:05:12,720
with 500 Megs of data and no credit card required at the link in the video

67
00:05:10,880 --> 00:05:18,560
description also at that link you can save 10% if you upgrade to an unlimited

68
00:05:16,639 --> 00:05:22,440
account thanks for watching guys if you likeed this video like it if you disliked it dislike it if you want to

69
00:05:20,639 --> 00:05:24,919
check out our other channels boom up there if you want to comment with a

70
00:05:23,720 --> 00:05:31,639
suggestion for a feuture fastest possible it's down there and if you want to subscribe and follow we' really

71
00:05:27,840 --> 00:05:31,639
appreciate that an awful lot
