Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page
  • How To Create A Strong Password
  • Two-factor authentication

Authentification

PreviousSecure internet browsingNextEncryption

Last updated 7 years ago

How To Create A Strong Password

NEVER RE-USE PASSWORDS ACROSS MULTIPLE SITES.

  1. Most Password Managers offer password generators and sites like can help create strong random passwords.

  2. Alternatively, if you must manually create a human-readable password, then see . For any password consider the following:

    1. The longer, the better. Aim for 12 characters or more!

    2. Think passphrase instead of password.

    3. A mixture of random upper- and lower-case letters, numbers, and special characters is important.

    4. Dictionary or pop culture words are bad.

    5. Avoid personal information such as email address, username, date of birth

Two-factor authentication

Certain online accounts, such as e-mail and Facebook, offer additional protection when (2FA), also known as two-step verification is enabled. This means that instead of signing into your accounts using one step (your password), you enter a second piece of data as well. This is typically a short code sent to you in an email, or text, or generated by an app on your phone. It can also be a physical (similar to a USB drive) that you insert into your computer. 2FA is a wonderful piece of security because it means that even if your password is compromised, a hacker would still need access to your email, phone, or app in order to get into your account.

You should definitely enable 2FA for any of your crucial accounts that offer it. Most big tech services like Google, Facebook, Dropbox, and Twitter have this option available, as do popular password managers like LastPass. Typically you just need to dig around in your account settings on a given site to find the instructions on how to enable it. is a useful guide from Google if you would like to know more about how 2FA works.

An app you can use is. This will automatically generate your 2FA codes offline, anywhere you have the app installed. Authy can be used on any phone or desktop, with all your 2FA code-generating accounts backed-up on a single Authy account. This means that if you were to lose a phone, or get a new laptop, all you have to do is install Authy and login with your Authy account info (have a very strong password!) and your 2FA codes will still be there. Your 2FA accounts are encrypted in the cloud too, meaning that if Authy’s servers were ever hacked, your Authy data would be unusable. And because these codes can be generated offline, you do not need internet or mobile phone service to access them.

See also

Strong Password Generator
How To Create Strong Passwords That You Can Remember Easily
two-factor authentication
key
Here
Authy
More on 2FA
Securing Your Digital Life Like a Normal Person