article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

For example, here's Jordan's go at deflecting his role in the ecosystem and yes, this was the entire terms of service: I particularly like this clause: You may only use this tool for your own personal security and data research. You may only search information about yourself, or those you are authorized in writing to do so.

article thumbnail

MY TAKE: How consumer-grade VPNs are enabling individuals to do DIY security

The Last Watchdog

I’ve written this countless times: keep your antivirus updated, click judiciously, practice good password hygiene. The top B2C VPNs proved to be very clever and effective at differentiating themselves from one another and very successful at marketing their services. Surfshark has other security-related services under development.

B2C 214
article thumbnail

CLEANING UP THE CLUTTER (Pt. 5 of “Why Don’t You Go Dox Yourself?”)

Cisco Security

The first pass of your delete list might well be longer than a CVS receipt, because these days the average person has 100 password-protected accounts to manage, but don’t worry! TAKING YOUR DATA OFF THE MARKET. TruePeopleSearch : Phone, name, and email based searches.