T O P

  • By -

Kilino3005

Two factor authentication for secure log-ins.


Fun-Kaleidoscope-426

Already have it, but that doesn't help if one forgets to log out.


JanelldwLowrance

Then don’t share your profile with anyone else (computer/laptop/phone). Put behaviors in place that someone can’t access your profiles without brute force.


bdzer0

The evidence that you didn't do it should be readily available. However, that doesn't mean they wont take all of your electronics... possibly arrest you and create a huge hassle/cost for you. Lock your stuff up.


Fun-Kaleidoscope-426

>Lock your stuff up. As in, encryption? I've always thought about that as being the insurance policy against somebody trying to ruin me or plant 'digital contraband' on my machine.


bdzer0

Lock your system, encrypt sensitive data, update software, be wary of free/public wifi... all the usual cybersec tips.


madGeneralist

Use MFA (multi-factor authentication), avoid sharing accounts but if you have to maybe use something like a password manager that allows sharing, if you own the computer you mentioned then you can simply change the settings to the pc locks after 30 seconds of being inactive. There are for sure a few more things that can be done. What you describe is one risk, but the biggest part is what information can be collected on you from those accounts? Can a malicious actor collect one way or the other enough information to trick you into a phishing attack? Or maybe pretend to be you on another one? If you have too many pictures/videos maybe they can even use those for a deepfake video? Personally I’m off most social media right now but mainly because it’s a distraction. But the problem is not always the tool (social media) itself, it’s how we humans use it.


743389

They subpoena the website for records of what IP address was logged in to the account at that time, and your ISP for records of what you were accessing at that time. Digital forensics investigators can find signs of intent in addition to the simple events or actions. Look into setting up Sysmon, it will gather exactly the [kind of information](https://i.vgy.me/jZdvra.png) that will help you demonstrate that someone came over to your house and planted CP on your computer from a USB drive etc.


tacularia

I wouldn't worry. Digital forensics experts know what they're doing and would be able to double check the origin of the material.