The pattern of one year one post is still repeated. Yep, now on the last day of 2024, this post also appeared. The year 2024 has a lot of targets to pursue. Hopefully in 2025 it will be even better, amin....insya Allah 😉
Is our information and data secure?
Do you recall the incident in mid-2022 in which public electronic data and information were leaked on the internet as a result of hackers? The public was enthralled at the time because the allegedly leaked data came from a legitimate company, which, of course, adheres to strict data management and information security standards and is supported by cutting-edge technology. But how come it can leak despite being so well secured? There are several factors in my analysis:
- Data users are less educated about the security of their own data, particularly confidential data. Typically, users enter data carelessly on sites that are not clear or fake. In addition to websites, many mobile applications currently ask users for personal information such as phone numbers. handphone, date of birth, education, banking information, and so on. Worse, if you find an online loan application, more personal information, such as KTP numbers, KK numbers, birth mother's names, and others, is requested. So, if our personal information is leaked on the internet, we won't be surprised because we provided it. These sites or applications, though not all of them and there is already an agreement on the use of personal data, occasionally trade our data on the free market to make a profit. Have you ever received an advertisement via SMS or WhatsApp from an unknown number? That could be one of the consequences of irresponsible parties disseminating personal information.
- Sites or online applications that are not in charge of managing their users' personal data. As I mentioned in number one, many online sites and applications have a bad reputation, but users continue to use them. In this case, the user should at least know which site or application can be trusted, particularly when it comes to managing our personal data. There are numerous methods for determining the reputation of an online site or application, including:
- Certified sites are generally more secure for data transmission. The https protocol is used to identify certified websites. With a https certificate, data exchange between data users to and from the data center is encrypted, making it difficult for outsiders to read. The use of the https protocol does not guarantee that the site can be trusted completely in managing personal data, because standard data security procedures may be insufficient.
- Sites that appear on the first page of search engines like Google and Yahoo are more trustworthy, especially when it comes to handling our data. Be cautious of sites with suspicious names, which are usually quite long and do not use a common domain such as .com,.id.
- We can check the Play Store or App Store respectively for online applications in devices such as Android and iOS applications. The number of times the application has been downloaded, the application'srating (1 to 5 stars), and user reviews are all criteria that can be checked. If something is missing from these criteria, we can suspect the application's reputation is poor and switch to another application with a better reputation.
- This third factor is more of a conspiracy theory: insiders are leaking user data. This issue is no longer hidden, possibly because the person is dissatisfied with the company's current state or wishes to increase profits. In this case, the scapegoat is frequently the DBA (Database Administrator) because he is the one who deals directly with data, but this does not rule out other parties doing the same thing.
Looking at the above conditions and situations, I'm also considering a more effective way to protect our data, particularly personal data. If I dig deeper, I discover that the information I disseminated in cyberspace is spread across several locations, including:
- E-mail. Gmail, Yahoo, and work email are all services I use. Because the data storage center is in the office, work email can be relied on in terms of data security and reliability. What about Yahoo and Gmail? Who are these two behemoth corporations that are skeptical of their technology and the dependability of data management, particularly for email processing? However, we cannot deny that emails managed by Google, Yahoo, and other email service providers leave us in the dark about where our data is and whether they can be certain that we will keep data secure from outsiders. Again, there is a Terms of Service in data handling, but we cannot be certain that our data is not being used to benefit these companies.
- Storage in the cloud (Cloud Storage). I use Google Drive and Microsoft One Drive. Back to number one, the same issue exists for cloud-based storage in terms of the privacy of the data that we store in the data center of the service provider.
- Social media platforms such as Facebook, Instagram, LinkedIn, and Tiktok. Date of birth, mobile number, email address, and home address are examples of personal data that we frequently write on social media. But, as time passes, is this data still classified as personal information that we must keep private? This data, in my opinion, is now classified as public data and is no longer a secret.
I finally decided to migrate my data to a storage location that I can fully control and not rely on third-party service providers after researching various issues related to data privacy, reliability, and security. Renting private hosting is one option. In the following article, I'd like to share my experience with creating a cloud-based email and storage service using private hosting. Of course, we have complete control over all aspects, including security, speed, reliability, granting access rights, and so on. I currently have a personal email with the address [email protected] and cloud storage with the address https://cloud.setyaji.com, which I manage independently and without the involvement of third parties. Keep an eye out for the next article.
End of 2022
And, once again, 2022 does not have time to post something on the blog. So, while there are still a few minutes left, I'll try to scribble something. This doodle is more of a goal for 2023, especially in terms of where you want to take this blog.
At the end of 2022, I attempted web optimization, not only for blogging but also for installing a fileserver application so that all files on the laptop could be fully synced to this server. Cloud computing will be enhanced. Aside from that, I try to use less of the Google ecosystem, such as personal email with my own domain, filesharing on my own server, and so on.
My hope is that by 2023, I will have written so much that the blog will be overflowing. All of the tools are ready; all that remains is the content to be reproduced.
Even better is the spirit of welcoming 2023.
End of 2021
I can't believe 2021 is almost over. I just realized that my last post on the blog was on March 6, 2020. Wow, it's December 2021, and I haven't written in over a year. Is there nothing interesting to look forward to in 2021? It's not like that either; there were many events that occurred in 2021. So, why don't you write more often? The classic answer is that you don't have time!
Writing requires a high level of intention, aside from having something interesting to inspire the spirit to write itself. It takes the right momentum to start writing, as mentioned in the previous post on this blog. It's difficult to type if the timing is off.
This time, I won't go into detail about my motivation for writing; I've already covered that ground. I just want to recap what you might have missed in 2021. While it's still 2021, I've left traces of at least one or two posts here. Let's get started...
Seeking momentum to complete the task
Have you ever had a situation where it was extremely difficult to begin doing something, whether it was office work or simply cleaning the house? When I want to start working in an office, I frequently encounter situations like this. When I started typing, I felt really lazy and out of sorts; I wanted to do other things, like browse or play games. I frequently say that the momentum has not been gained.
This momentum refers to the intention to do so. But don't ask if the momentum is already there; the work won't feel right; it'll feel like you're working all the time and can't stop until you're exhausted. It's like a small child using a slingshot; the momentum is right when he pulls the slingshot. The stronger the pull, the more powerful and farther the throw. Similarly, if our intention when doing something is only half-measured, what we want from what we do will not be achieved or will take a long time to achieve.
Of course, the next question is how to generate that momentum. This is a difficult question to answer; only time will tell hehe... because it's difficult for me to get going. Typically, we gain momentum when there are other things we are still thinking about or work that has not been completed; in other words, what we are going to do is not our primary focus or priority at this time. My advice is to finish whatever is still standing in the way first, so that our work is prioritized. When we have nothing else to think about, we can concentrate more on our current task. It appears simple, but in practice it is difficult. You can't help but think about debt if you can't pay it :p
As I previously stated, once momentum has been established, it will be difficult to reverse. Try not to be like this; instead, allow some time for our brains and bodies to rest. When we use the forced labor model, we can complete the work faster, but the effect on our bodies is noticeable. Sure, you're tired, but keep in mind that tomorrow will bring another job. Don't get excited about working today because you'll fall the next day because you're tired.
Finally, forget about your work and enjoy your weekend ^^