Monday, January 22, 2024

How To Pass Your Online Accounts After Death – 3 Methods

The topic of DEATH is not one that most people care to talk about, but the truth is that we are all going to die at some point and everything that we did online is going to end up in limbo if we don't make sure that someone we trust is going to be able to gain access to this information. This is going to be extremely important in order to close it down, or have your loved one do whatever you want them to do with your information. There are many things to take into consideration for this kind of situation. If you are like the average modern person, you probably have at least one email account, a couple of social media accounts in places like Facebook and Twitter. Perhaps you also have a website that you run or a blog. These are all very common things that people will usually do at some point and if you have anything that you consider valuable, you should have a way to leave it in the hands of someone you trust when you pass away.

Pass Accounts and Passwords After Death
Pass Accounts and Passwords After Death

Maybe you have an online platform that has a lot of content that you find useful and important. Perhaps you have even been able to turn some of that content into monetizable material and you don't want this to end when you pass away. This is more than enough of a reason to make sure that your information can be given to someone when you are no longer around.
There have been many cases when all the information has ended up being impossible to recover when a person has died, at least not without the need for the family members to do all kinds of things in order to prove a person is deceased. So here are some ways, you can passyour online accounts/data after death:

1) Making a Safe 'WILL' (or Locker) containing master password.

  1. Make an inventory of all your online accounts and list them on a piece of paper one by one and give it to your loved one. For eg:– Your primary email address
    – Your Facebook ID/email
    – The Bank account or Internet banking ID
    – etc. To clarify, it will be only a list of the accounts you want your loved one to be able to access after you're dead. Just the list of accounts, nothing else (no passwords).
  2. Set up a brand new e-mail address (Possibly Gmail account). Lets say youraccountsinfo@gmail.com
  3. Now from your usual email account, Send an e-mail to youraccountsinfo@gmail.com, with the following content:– dd349r4yt9dfj
    – sd456pu3t9p4
    – s2398sds4938523540
    – djfsf4p These are, of course, the passwords and account numbers that you want your loved one to have once you're dead.
  4. Tell your loved one that you did these things, and while you're at it, send him/her an e-mail from youraccountsinfo@gmail.com, so he/she will have the address handy in some special folder in his/her inbox.
  5. Put the password for youraccountsinfo@gmail.com in your will or write it down on paper and keep it safe in your bank locker. Don't include the e-mail address as well, just put something like "The password is: loveyourhoney432d".
And its done! Your loved one will only have the password once you're dead, and the info is also secure, since it's split in two places that cannot be easily connected, so if the e-mail address happens to be hacked, the perpetrator won't be able to use it to steal anything that you're going to leave for your loved one.

2) Preparing a Future email (SWITCH) containing login information

This method is very similar to the first one except in this case we will not be using a WILL or Locker. Instead we will be using a Service called "Dead Mans Switch" that creates a switch (Future email) and sends it to your recipients after a particular time interval. Here is how it works.
  1. Create a list of accounts as discussed in the first method and give it to your loved one.
  2. Register on "Dead mans switch" and create a switch containing all the corresponding passwords and enter the recipients email (Your loved one).
  3. Your switch will email you every so often, asking you to show that you are fine by clicking a link. If something happens to you, your switch would then send the email you wrote to the recipient you specified. Sort of an "electronic will", one could say.

3) Using password managers that have emergency access feature

Password managers like LastPass and Dashlane have a feature called as "emergency access".  It functions as a dead man's switch. You just have to add your loved one to your password manager, with emergency access rights. he/She does not see any of your information, nor can he/she log into your accounts normally.
But if the worst happens, your loved one can invoke the emergency access option. Next your password manager sends an email to you and starts a timer. If, after a certain amount of time interval, you have not refused the request, then your loved one gets full access to your password manager.
You can always decide what they can potentially gain access to, and you set the time delay.

Why should i bother about passing my digital legacy?

Of all the major online platforms, only Google and Facebook have provisions for Inactiveaccounts (in case of death). Google lets you plan for the inevitable ahead of time. Using the "Inactive Account Manager", you can designate a beneficiary who will inherit access to any or all of your Google accounts after a specified period of inactivity (the default is 3 months).
Facebook on the other hand will either delete your inactive account or turn it into a memorial page when their family can provide any proof of their death, but there is also a large number of platforms that don't have any specific way for people to be able to verify the death of a loved one in order to gain access to the accounts. In either case, you wouldn't want your family to have to suffer through any hassles and complications after you have passed away.
You should also consider the importance of being able to allow your loved ones to collect all the data you left behind. This means photos and experiences that can be used to show other generations the way that you lived and the kind of things you enjoyed doing.
Those memories are now easier to keep and the best photos can be downloaded for the purpose of printing them for photo albums or frames. Allowing them to have the chance to do this in a practical way is going to be a great gesture and securing any profitable information is going to be essential if you want a business or idea to keep moving forward with the help of those you trust.
This is the reason why you need to be able to pass your online account information after death, but no one wants to give access to this kind of information to their loved ones because it's of a private nature and we would feel uneasy knowing that others can access our private conversations or message.
Continue reading

Hackerhubb.blogspot.com

Hackerhubb.blogspot.com

Read more


  1. Hack Tools Github
  2. Hacker Hardware Tools
  3. Hacking Tools Github
  4. Hacker Tools Apk Download
  5. Pentest Reporting Tools
  6. Hacking Apps
  7. Blackhat Hacker Tools
  8. Pentest Tools Free
  9. Hacker Tools
  10. Hacking Tools
  11. Hacking Tools For Games
  12. World No 1 Hacker Software
  13. Physical Pentest Tools
  14. Hacker Tools Online
  15. Hacking Tools Github
  16. Hacking Tools
  17. Hack Tools
  18. New Hack Tools
  19. Game Hacking
  20. What Is Hacking Tools
  21. What Is Hacking Tools
  22. Hacker Search Tools
  23. Hackers Toolbox
  24. Nsa Hack Tools
  25. Install Pentest Tools Ubuntu
  26. Growth Hacker Tools
  27. Hacking Tools For Windows
  28. Tools Used For Hacking
  29. Hacking Tools 2019
  30. Pentest Tools Find Subdomains
  31. Hacking Apps
  32. Hacking Tools For Beginners
  33. Pentest Tools Nmap
  34. How To Hack
  35. Pentest Tools Github
  36. Physical Pentest Tools
  37. Hacker Tools Apk
  38. Nsa Hack Tools
  39. Pentest Tools Open Source
  40. Hacking Tools 2019
  41. Pentest Tools For Ubuntu
  42. Pentest Tools For Mac
  43. Hacking Tools Kit
  44. Hacker Tools 2020
  45. Hacker Tools Free Download
  46. Github Hacking Tools
  47. Pentest Tools Apk
  48. Free Pentest Tools For Windows
  49. Hacking Tools Usb
  50. Hack Tools Mac
  51. Hack Tools Github
  52. Hacker Tools Apk Download
  53. Hacker Tools Online
  54. Pentest Tools Kali Linux
  55. Game Hacking
  56. Hacking Tools Online
  57. Top Pentest Tools
  58. Best Hacking Tools 2020
  59. What Are Hacking Tools
  60. Hacker Tools Free Download
  61. Pentest Tools Online
  62. Blackhat Hacker Tools
  63. Hacking Tools Windows 10
  64. Pentest Recon Tools
  65. Hacking Tools For Beginners
  66. Hacking Tools Download
  67. Hacking Tools
  68. Android Hack Tools Github
  69. Hack And Tools
  70. Bluetooth Hacking Tools Kali
  71. Hack Tool Apk
  72. Pentest Reporting Tools
  73. Pentest Reporting Tools
  74. Hack Tools
  75. Hacker Tools Hardware
  76. What Is Hacking Tools
  77. Hacker Tools For Ios
  78. Pentest Tools Linux
  79. Best Hacking Tools 2019
  80. Nsa Hacker Tools
  81. Pentest Tools Linux
  82. Physical Pentest Tools
  83. Pentest Tools Android
  84. Hack Tools Online
  85. Usb Pentest Tools

$$$ Bug Bounty $$$

What is Bug Bounty ?



A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.




Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.


Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1.  In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorized iCloud access.


While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.
More articles