Frequent Hacks - How to Ensure 'Digital Hygiene' Implementation?
Original Author: @karpathy, Co-Founder of @EurekaLabsAI
Translation: zhouzhou, BlockBeats
Editor's Note: This article introduces some basic techniques to improve computer privacy and security, covering topics such as password managers, hardware security keys, disk encryption, biometrics, and other security measures. It recommends using security tools like 1Password, YubiKey, Signal, while emphasizing avoiding insecure smart devices, using privacy-focused browsers and search engines, and adopting VPNs and ad blockers. The article also suggests protecting personal information through virtual credit cards, email management, and network monitoring to achieve digital security.
The following is the original content (reorganized for readability):
Essentially, you can take some simple steps to improve your computer's privacy and security, and this article covers some of these.
From time to time, I am reminded of the vast fraud machinery of the internet, which reignites my pursuit of basic digital hygiene for everyday computer privacy/security. The problem starts with some major tech companies, which have the motivation to build a comprehensive profile of you to either monetize directly through ads or sell to professional data brokers who further enrich, de-anonymize, cross-reference, and resell the data.
Inevitable and frequent data breaches eventually aggregate your information into black-market archives, nurturing a vast underground spam/scam industry, including hacks, phishing attacks, ransomware, credit card fraud, identity theft, etc. This guide is a collection of some of the most fundamental digital hygiene tips, starting from the simplest and progressing to some slightly more nuanced suggestions.
Password Manager
Your password is your "first factor," i.e., "something you know." Do not foolishly set new, unique, complex passwords for every registered website or service. Combined with a browser extension, you can quickly create and autofill them. For example, I use and love 1Password. This helps prevent your passwords from being: 1) easy to guess or crack, and 2) once leaked, opening the doors to many other services. In return, we now have a central repository for all first factors (passwords), so it must be thoroughly protected, leading to...
Hardware Security Key
Your most critical services in life (e.g., Google or 1Password) must be further fortified with a "second factor," i.e., "something you have." Attackers must possess both of these factors to access these services. The most common second factor implemented by many services is a phone number, where theoretically, you receive an SMS with a PIN, entering which verifies you in addition to the password.
Obviously, this is much better than having no second factor, but using a phone number is known to be very insecure due to SIM card swap attacks. Basically, an attacker finds out that they can easily call your phone company, pretend to be you, and request them to switch your phone number to a new phone controlled by them. I know this sounds completely crazy, but it's true, and I have many friends who have been victims of this attack.
Therefore, buy and set up a hardware security key—an industrial-grade security standard. Specifically, I like and use YubiKey. These devices generate and store private keys on a secure element, so the private key never touches a general computing device like a laptop. Once you set up these devices, attackers not only need to know your password, but they also need to physically have your security key to log in to services.
Your risk is reduced by about 1000 times. Purchase and set up 2 to 3 keys and store them in different physical locations in case you lose one. Security keys support various authentication methods. Look for "U2F" in the second factor settings of your service for the strongest protection. For example, Google and 1Password support it. If you have to use "TOTP," note that your YubiKey can store TOTP private keys, so you can easily get the PIN code for login through NFC contact with your phone using the YubiKey Authenticator app.
This is much better than storing TOTP private keys in other (software) authentication apps because you should not trust general computing devices. This article is not intended to delve deep, but basically, I strongly recommend using 2-3 YubiKeys to significantly enhance your digital security.
Biometrics
Biometrics is the third common authentication factor ("who you are"). For example, if you are an iOS user, I suggest setting up Face ID almost everywhere, such as accessing apps like 1Password.
Security Questions. Dinosaur companies are obsessed with security questions (e.g., "What is your mother's maiden name?") and occasionally force you to set up these questions. Obviously, these questions fall into the "something you know" category, so essentially, they are passwords, but for scammers, these questions can be easily found on the internet, and you should refrain from participating in this absurd "security" practice. Instead, treat security questions like passwords, generate random answers for each question, and store them along with your password in your 1Password.
Disk Encryption. Always ensure that your computer uses disk encryption. For example, on Mac, this brain-dead simple feature is called "FileVault." This feature ensures that if your computer is stolen, attackers cannot access your data by taking out the hard drive.
Internet of Things
More like @internetofshit. Try to avoid using "smart" devices, which are essentially highly insecure, internet-connected computers that collect vast amounts of data, are frequently targeted by hackers, and yet people willingly place them in their homes. These devices have microphones, regularly send data back to the parent company for analysis to "improve customer experience," haha, yeah right. For example, in my young and naive days, I purchased a CO2 monitor from China that, before telling me the CO2 levels in the room, requested all my personal information and precise location. These devices are a massive privacy and security vulnerability and should be avoided.
Messaging. I recommend Signal over SMS because it encrypts all communications end-to-end. Additionally, it does not store metadata like many other apps (e.g., iMessage, WhatsApp). Turning on message disappearing (e.g., default 90 days is a good choice). In my experience, message disappearing is a privacy placebo with no significant benefit.
Browser. I recommend using the Brave browser, a privacy-first browser based on Chromium. This means almost all Chrome extensions work out of the box, the browsing experience is similar to Chrome, but without Google having a full grasp of your entire digital life.
Search Engine
I recommend Brave Search, which you can set as the default search engine in your browser settings. Brave Search is a privacy-focused search engine with its index, unlike DuckDuckGo, which is essentially a Bing skin and has to make some odd compromises with Microsoft compromising user privacy. Like all services on this list, I pay $3 a month for Brave Premium because I prefer to be a customer rather than the product in my digital life. By experience, I find that 95% of search engine queries are straightforward website searches. Search engines essentially act as a small-scale DNS. If you can't find what you're looking for, just add "!g" before your search query to be redirected to Google.
Credit Card
Fabricate a new, unique credit card for each merchant. There is no need to use the same credit card across multiple services, which would allow them to "associate" your purchasing behavior across different services, plus it increases the risk of credit card fraud as service providers might expose your credit card number. I like and use privacy.com to fabricate a new credit card for every transaction or merchant.
You can view all your expenses through a great interface and receive notifications for each card swipe. You can also set spending limits for each credit card (e.g., $50 per month), greatly reducing the risk of being charged unexpected fees. In addition, with privacy.com's cards, you can enter completely random names and addresses when filling out billing information. This is crucial because there is no need for those random online merchants to know your actual address. Next, let's talk about...
Address
Most random services and merchants do not need to know your actual address. Use a virtual mailbox service. I currently use Earth Class Mail, but to be honest, I am a bit hesitant, so I plan to switch to Virtual Post Mail because of its stronger commitment to privacy, security, ownership structure, and reputation. In any case, you can provide an address, they will scan and digitize the mail once received, and you can quickly view it through the application and decide how to handle it (e.g., destroy, forward, etc.). This way, you not only get security and privacy protection but also enjoy a considerable level of convenience.
I still use Gmail because it is just too convenient, but I have also started using ProtonMail partially. Also, there are some thoughts on email. Never click on any links in the emails you receive. Email addresses are very easy to spoof, and you can never be sure if the email you received is a scam phishing email. Instead, I will manually enter any services of interest and log in from there.
Additionally, it is recommended to disable image loading in email settings. If you receive an email that requires viewing images, you can click "Display images" to view them, which is completely fine. This is important because many services track you by embedding images—they hide information in the image's URL, so when your email client loads the image, they can see if you opened the email. There is absolutely no need for this. Moreover, scammers often use obfuscated images to hide information and avoid being filtered as spam by email servers.
VPN
If you want to hide your IP or location, you can do so indirectly through a VPN. I recommend Mullvad VPN. I keep my VPN turned off by default, but I choose to turn it on when dealing with less trusted services to get more protection.
DNS-based ad blocker. You can block ads by intercepting entire domain names at the DNS level. I like and use NextDNS, which can block various ads and trackers. For advanced users who like to tinker, pi-hole is a physical alternative solution.
Network Monitoring
I like and use The Little Snitch, which is installed on my MacBook. This tool allows you to see which applications are communicating, the amount of data transferred, and when the transfers occur, helping you track which apps are "calling home" and understanding their frequency. If an app has excessive communication, that's suspicious, and it may need to be uninstalled unless you expect that kind of traffic.
I only aim for a secure digital life and seek to establish a harmonious relationship with products and services that only disclose necessary information. I am willing to pay for the software I use to motivate and align interests, ensuring that I am always a customer. It's not a small feat, but with determination and discipline, it can be achieved.
Original post link: Original Post Link
You may also like

Why a Million-Follower Crypto KOL Chooses WEEX VIP?
Discover why top crypto KOL Carl Moon partnered with WEEX. Explore the WEEX VIP ecosystem, 1,000 BTC protection fund, and exclusive rewards for serious traders.

CoinEx Founder: The Crypto Endgame in My Eyes

Spark Coin (SPK): Explodes 73% as Aave Bleeds $15B, A Good Investment Now?
Spark coin (SPK) surged 73% as $15 billion fled Aave after the KelpDAO hack. This article explains what Spark is, why it’s pumping, and whether it is a good investment right now.

As Aave's building collapses, Spark's high-rise is rising

RootData: Q1 2026 Cryptocurrency Exchange Transparency Research Report

What Is Memecoin Trading? A Beginner's Guide to How It Works, the Risks, and 2026's Hottest Tokens
Memecoins surged 30%+ at the start of 2026 while Bitcoin was flat. RAVE spiked 4,500% then crashed 90% in days. MAGA jumped 350% overnight. This guide explains exactly how memecoin trading works — and how to not blow up your account doing it.

Trump Extends Ceasefire: Bitcoin Hits $79K — What Crypto Traders Need to Know Right Now
Bitcoin surged past $79,000 after Trump extended the ceasefire indefinitely. We break down exactly what happened, how every major crypto reacted, and what traders should watch next — including the one level that could unlock an $85,000 BTC rally.

CHIP Crypto Price Prediction 2026: Can USD.AI's GPU Lending Token Reach $1?
CHIP's 24-hour trading volume hit $1.87 billion on a $236 million market cap — an 8x ratio that almost never happens on legitimate tokens. We explain what's driving it, what USD.AI actually does for GPU tokenization, and whether CHIP belongs in your AI crypto portfolio.

RootData: Q1 2026 Web3 Industry Investment Research Report

USDC is the only AI token

The voice of a senior Polymarket user: In fact, we have already been surpassed by our competitors

Transcript of Dr. Han, founder of Gate, speaking at the University of Hong Kong: Breaking the Matthew Effect and Winning in Asymmetric Competition

Who will replace AAVE as the new king?

Fu Peng 2026 First Public Speech: What Exactly Are Crypto Assets? Why Did I Join the Crypto Asset Industry?

Lattice Capital Founder: Crypto VC, Seeing is Believing Because of Faith

The Pitch Is Set. So Is the Trade: CHZ, SportFi, and the UCL Window That Won't Wait
CHZ is gaining momentum as SportFi narratives accelerate alongside the UEFA Champions League(UCL) and global football cycles. This article explores how CHZ, fan tokens, and the broader SportFi ecosystem are driven by real-world events, market narratives, and capital flows—offering insights into why SportFi is emerging as one of the most dynamic sectors in crypto.

Morning Report | SpaceX acquires Cursor for $60 billion; Kalshi and Polymarket launch perpetual contract trading; NeoCognition completes $40 million financing

IMF | The Future of Stablecoins and Payments: Evidence from Financial Markets
Why a Million-Follower Crypto KOL Chooses WEEX VIP?
Discover why top crypto KOL Carl Moon partnered with WEEX. Explore the WEEX VIP ecosystem, 1,000 BTC protection fund, and exclusive rewards for serious traders.
CoinEx Founder: The Crypto Endgame in My Eyes
Spark Coin (SPK): Explodes 73% as Aave Bleeds $15B, A Good Investment Now?
Spark coin (SPK) surged 73% as $15 billion fled Aave after the KelpDAO hack. This article explains what Spark is, why it’s pumping, and whether it is a good investment right now.
As Aave's building collapses, Spark's high-rise is rising
RootData: Q1 2026 Cryptocurrency Exchange Transparency Research Report
What Is Memecoin Trading? A Beginner's Guide to How It Works, the Risks, and 2026's Hottest Tokens
Memecoins surged 30%+ at the start of 2026 while Bitcoin was flat. RAVE spiked 4,500% then crashed 90% in days. MAGA jumped 350% overnight. This guide explains exactly how memecoin trading works — and how to not blow up your account doing it.





