Password Breach? Digital privacy compromised?

Stealth Agents

Tools To Protect Yourself


First Step

Understand the scope of the assault on your privacy.


Second Step

Determine the tools best for your situation


Third Step


password breachA serious part protecting your digital privacy is managing your passwords and resolving a password breach.  I manage literally hundreds as I care not only for my own but also those of a number of clients.  I do this the old fashion way with writing them down on a piece of paper.  Not is a spreadsheet, not produced by a service.  Kind of a hassle but the password is often the frontline of your privacy protection.

Here is an interesting service that attempts to tell you if your password has been revealed in a breach.  Pwned Passwords.  Interesting application.  I think I will not use it, but change some passwords of the most critical services I use.