Replying to Avatar Ava

People act precious about sharing email addresses, as if we don't already have battle-tested solutions like disposable emails/anonymous email aliases.

Practice good OPSEC. Using easily generated, disposable emails and long, unique passwords—through tools like SimpleLogin and a password manager like ProtonPass or BitWarden—is far more secure than carelessly plugging your one and only NSEC into random alpha/beta/stable apps that haven't passed a single independent security audit.

Using event signers like Amber or extensions like nos2x is better, as it reduces your dependency on 3rd party app security, but all the key/event signers we have have never been subjected to or passed an independent security audit.

Just because something's built on or compatible with Nostr doesn't make it secure, and just because someone is an outstanding developer does not make them a security professional. 99% of app developers are unqualified to audit their own apps—that's why proper security audits cost ~$15K+ and require a team of dedicated specialists.

The reality is: if you your nsec gets doxxed, everything attached to it is doxxed—period. There's no fallback, no way to keep your account and just change compromised login info. This is even more critical for businesses on Nostr and those outsourcing social media management—incompetent/disgruntled ex-employees are a very real threat.

Myself and many others have said time and time again: we need a parent/child key system—with the ability to generate, pause, and deactivate child keys—to match the basic privacy and security that we already have with disposable emails and lengthy unique passwords. The clock is ticking.

#IKITAO #OPSEC #Privacy #Tech

So if you’ve already been a dummy, would changing your email help?

Reply to this note

Please Login to reply.

Discussion

If your email has been widely shared, it's likely already available on the dark web. The real security risk isn't just email exposure and spam—it's the common practice of reusing the same email-password combination across multiple services.

When a single service is breached (like a retailer or streaming platform), threat actors combine your exposed credentials with other leaked data, creating comprehensive profiles. One breach now compromises all accounts sharing those credentials.

Best practice is maintaining dedicated front-facing emails for official business (some sites don't allow alias emails), while using unique email aliases and high-entropy passwords for every other service. Services like SimpleLogin (included with Proton) allow you to easily generate a unique email alias for each individual account.

This compartmentalizes risk—if one service is compromised, others remain secure, and if an alias service fails, your primary email remains functional for critical communications. All of this can be stored in an open-source, independently security audited password manager that is either local on an air-gapped device (one that never connects to the Internet) like KeePass, or that uses cloud sync for greater convenience like Proton Pass/Bitwarden.

2FA or a physical key helps with this

Indeed it does.

I use surfshark alt ID for my online logins!!! It provides me a email address and name and address. All those linked to my email address.

If any better one available shill me please 🙏

#Asknostr

So hard to make some people understand this risk.. Have had people (friends) complain when sites ask for (more than just letters) in their password.. "But I remember it, and use it everywhere!"..

High entropy email alias should be available on all email services.

I've been using long phrase passwords, 4 or 5 words long. How does that compaire to the high entropy number/letter/symbol passwords?

5+ words is generally better than 4, but it's not all about length; it's also about entropy, complexity, and not using common words that are used in Dictionary Attacks.

Truly random, high-entropy passphrases are a valid option to unlock your password manager, as they can easily be remembered if you create a mnemonic like an absurd story using the random words as a recall technique. They can also be valid for full-disk encryption on your laptop, or as a passphrase for an encryption key like PGP or SSH, etc. It is best practice to not reuse passphrases.

I recommend using KeePassXC to generate this high-entropy passphrase for most people, or if you follow the instructions to the letter, this is a very good offline method:

https://www.eff.org/dice

However, I highly recommend using high-entropy random passwords that include:

• Length (in characters)

• Use of uppercase and lowercase letters

• Use of numeric characters

• Use of special symbols

...for pretty much everything else.

Here is some good info on passphrases vs passwords:

"If you compare a passphrase to a truly random password, the password is the better, more secure option."

https://proton.me/blog/what-is-passphrase

Here is some more good info on password entropy, including the math used to calculate it:

https://proton.me/blog/what-is-password-entropy

While ProtonPass/Bitwarden will tell you if a password/passphrase is strong, KeePassXC shows you the entropy of your passwords in bits—both internally generated, or by pasting your current password into the password generator. I suggest using it as an easy way to check your exact password entropy.

You want an entropy score of at least 75 bits (72 is reasonably easy to crack).

I like the idea of throwing a few emojis into the mix

Thanks a lot for this, especially using KeePassXC to check the entropy level of password and phrases. Super helpful.

SimpleLogin is amazing.