Related Reads
This a short post about what you can do to protect your privacy in today’s world. Though nothing is 100% safe and as long as people are using technology, their privacy can be threatened. Yet, without technology – life’s just no good.
1. Stop Using GOOGLE and FACEBOOK
They are collecting mountains of data on you, selling it to advertisers and loaning it to government agencies. Seriously, limit or stop all use of these services. Instead of using Google search I’d suggest checking out DuckDuckGo.com, a free software project that doesn’t profile or track its users search queries.
2. Use FIREFOX
There’s not much choice between browsers, but Firefox is the most open in the main gang. It is open source, which is a plus, and it’s not owned by a giant corp that’s part of the PRISM surveillance program like Apple (Safari) and Google (Chrome).
3. Get a Few Browser EXTENSIONS
There are various ways you’re tracked on the internet, including the browser version you use, your OS, the fonts on your system, your browsing patterns, as well as things like JavaScript and other plugins. Here are a few Firefox extensions that will, hopefully, mitigate some of that:
4. Remove your INTERNAL WiFi CARD and Replace it with a REMOVABLE ONE
This simply allows you to have physical control over when you want to be connected to the Internet. If your system is compromised, even if it appears that your computer is not connected, it could still be sending packets. Being able to pull the plug at a moments notice is valuable.
5. Install a Software FIREWALL
This will simply allow you to decide what connects in and out of your system. There are a ton out there, so have a look for yourself. One thing to note is if you torrent a firewall app, there’s a chance it could compromise your entire system. It’s probably best to be legit here. You’ll be amazed at the amount of apps which constantly try to “phone home” to their servers.
6. Don’t install RANDOM Software
This item is linked to a point in the above section about torrenting software. I’m not going to tell you what to do in regards to torrenting, but be aware when you’re downloading and installing random software, there’s a chance it’s either completely backdoored or contains some level of spyware. If you don’t NEED it, go without.
7. Use OFF-THE-RECORD(OTR) Chat Encryption
Find out whether the chat apps you use have OTR compatibility, and if so turn it on. This enables end to end encryption between you and to whomever you’re talking, so passive snooping cannot take place.
8. Turn OFF Your Computer When Not in Use
When you’re not using your computer, turn it off completely (and remove that new external WiFi card). Aside from being better for security (in terms of getting passwords from RAM), you can guarantee no apps will secretly be “phoning home.”
9. Learn About PGP/GPG for Email and Use it
PGP (pretty good privacy) for email allows you to send and receive encrypted emails. You need to generate your own public key signature and share it with your friends. The catch is that they need to do the same (which can be frustrating). Be aware that your email content is the only thing encrypted, and anyone looking in will still be able to see other meta data.
10. Get a PASSWORD Manager
Password managers are great for generating and storing long complicated passwords so you don’t have to memorize them all. The idea is that you can generate a brand new password for every single service or account you use, compartmentalizing any risk, so if one of those services is breached, everything else you use isn’t automatically too. Make sure that you have a strong, memorable master password.
11. Encrypt Important FILES
If your system is ever lost, compromised or stolen, it’ll be more likely that your files will remain untouched if they’re encrypted. Same goes for sending important files over the Internet. Think about sending them as encrypted files. Also, look into full disk encryption for your computer. There are plenty of tutorials online to suit your particular set up.
12. COVER Your Webcam
This used to be the reserve of hyper paranoid individuals, but the Snowden revelations (and others) have shown that there are many operations secretly recording peoples webcam feeds. Yes, even ordinary people like you with “nothing to hide.”
13. Remove your Laptops Internal MICROPHONE
This may seem a little paranoid, but if you don’t ever use it, you may as well get rid of it. There is still a chance that your microphone is being listened in on. It’s another way of mitigating the data that can be collected on you. You can always plug in headphones with a built-in mic when you need one.
14. Try BITMESSAGE
If you’re working on sensitive material, you might consider using the Tor browser bundle. It automatically obfuscates your IP address and provides a decent level of protection. There are some theories that it may have been broken, but they haven’t been proven (yet), so be aware.
15. Use MULTIHOP VPN
A VPN or virtual private network encrypts your network data through a server (or servers) and makes web requests on your behalf. This means when you visit websites, your IP address will appear as wherever the VPN’s server is making the request from. They’re good for stopping automatic ISP snooping, but they are not a magic bullet. Remember you are placing your trust in the VPN service and some may not deserve it.
Bonus Point: Stop Using your PHONE
Seriously. This is not something most people would be willing to do but if you really care about your privacy, you should ditch the phone (aka George Orwell’s worst nightmare). Think about it, this thing tracks your location in realtime, your movement habits, it knows who you are in contact with, it knows the exact relationship with each person and what you say to them. It knows what apps you use, what you browse for, how you browse, what you buy, what you don’t buy, what people in your life look like and their location (with photos and geo tagging).
I mean for god sake that’s insane. Phones are much less configurable than computers so you have even less control of your data. If you’re not willing to do that, then at least remove the battery from your phone (if you can), when you’re not using it.
Thanks and be safe!
Did You Know?
Cybrary has tons of FREE training resources!
For lifetime access simply CREATE A FREE ACCOUNT.
Already a member? login here.
We recommend always using caution when following any link
Are you sure you want to continue?
Important info
nice good info
Welcome you all.. Any extra information ,if you know, then please share.
I found it informative. Thanks guys.
Excellent you gave exact info for being secure .
Thanks!