This a short post about what you can do to protect your privacy in today's world. Though nothing is 100% safe and as long as people are using technology, their privacy can be threatened. Yet, without technology - life's just no good. 1. Stop Using GOOGLE and FACEBOOK
They are collecting mountains of data on you, selling it to advertisers and loaning it to government agencies. Seriously, limit or stop all use of these services. Instead of using Google search I’d suggest checking out DuckDuckGo.com
, a free software project that doesn’t profile or track its users search queries. 2. Use FIREFOX
There’s not much choice between browsers, but Firefox
is the most open in the main gang. It is open source, which is a plus, and it's not owned by a giant corp that’s part of the PRISM surveillance program like Apple (Safari) and Google (Chrome). 3. Get a Few Browser EXTENSIONS
4. Remove your INTERNAL WiFi CARD and Replace it with a REMOVABLE ONE
- Ghostery. Free but proprietary. Wikipedia describes it as enabling “its users to easily detect and control web bugs which are objects embedded in a web page, invisible to the user, that allow the collection of data on the user’s browsing habits.” This means it stops the various servers owned by large corps such as Google, Facebook, Twitter from automatically tracking when you visit a website with their embedded code in it.
- HTTPS Everywhere. From Wikipedia “HTTPS Everywhere is a free web browser extension for Google Chrome, Mozilla Firefox and Opera, a collaboration by The Tor Project and the Electronic Frontier Foundation. Its purpose is to automatically make websites use the more secure HTTPS connection instead of HTTP.”
- AdBlock Plus. This is another free and open source extension similar to Ghostery, but aimed at automatically blocking ads. Apart from being useful to stop annoying intrusions, it blocks ad servers from tracking you.
This simply allows you to have physical control over when you want to be connected to the Internet. If your system is compromised, even if it appears that your computer is not connected, it could still be sending packets. Being able to pull the plug at a moments notice is valuable. 5. Install a Software FIREWALL
This will simply allow you to decide what connects in and out of your system. There are a ton out there, so have a look for yourself. One thing to note is if you torrent a firewall app, there’s a chance it could compromise your entire system. It’s probably best to be legit here. You'll be amazed at the amount of apps which constantly try to "phone home" to their servers. 6. Don't install RANDOM Software
This item is linked to a point in the above section about torrenting software. I’m not going to tell you what to do in regards to torrenting, but be aware when you’re downloading and installing random software, there’s a chance it’s either completely backdoored or contains some level of spyware. If you don’t NEED it, go without. 7. Use OFF-THE-RECORD(OTR) Chat Encryption
Find out whether the chat apps you use have OTR compatibility, and if so turn it on. This enables end to end encryption between you and to whomever you’re talking, so passive snooping cannot take place. 8. Turn OFF Your Computer When Not in Use
When you’re not using your computer, turn it off completely (and remove that new external WiFi card). Aside from being better for security (in terms of getting passwords from RAM), you can guarantee no apps will secretly be "phoning home." 9. Learn About PGP/GPG for Email and Use it
PGP (pretty good privacy) for email allows you to send and receive encrypted emails. You need to generate your own public key signature and share it with your friends. The catch is that they need to do the same (which can be frustrating). Be aware that your email content is the only thing encrypted, and anyone looking in will still be able to see other meta data. 10. Get a PASSWORD Manager
Password managers are great for generating and storing long complicated passwords so you don’t have to memorize them all. The idea is that you can generate a brand new password for every single service or account you use, compartmentalizing any risk, so if one of those services is breached, everything else you use isn’t automatically too. Make sure that you have a strong, memorable master password. 11. Encrypt Important FILES
If your system is ever lost, compromised or stolen, it’ll be more likely that your files will remain untouched if they're encrypted. Same goes for sending important files over the Internet. Think about sending them as encrypted files. Also, look into full disk encryption for your computer. There are plenty of tutorials online to suit your particular set up. 12. COVER Your Webcam
This used to be the reserve of hyper paranoid individuals, but the Snowden revelations (and others) have shown that there are many operations secretly recording peoples webcam feeds. Yes, even ordinary people like you with "nothing to hide." 13. Remove your Laptops Internal MICROPHONE
This may seem a little paranoid, but if you don’t ever use it, you may as well get rid of it. There is still a chance that your microphone is being listened in on. It’s another way of mitigating the data that can be collected on you. You can always plug in headphones with a built-in mic when you need one. 14. Try BITMESSAGE
If you're working on sensitive material, you might consider using the Tor browser bundle
. It automatically obfuscates your IP address and provides a decent level of protection. There are some theories that it may have been broken, but they haven’t been proven (yet), so be aware. 15. Use MULTIHOP VPN
A VPN or virtual private network encrypts your network data through a server (or servers) and makes web requests on your behalf. This means when you visit websites, your IP address will appear as wherever the VPN’s server is making the request from. They’re good for stopping automatic ISP snooping, but they are not a magic bullet. Remember you are placing your trust in the VPN service and some may not deserve it. Bonus Point: Stop Using your PHONE
Seriously. This is not something most people would be willing to do but if you really care about your privacy, you should ditch the phone (aka George Orwell’s worst nightmare). Think about it, this thing tracks your location in realtime, your movement habits, it knows who you are in contact with, it knows the exact relationship with each person and what you say to them. It knows what apps you use, what you browse for, how you browse, what you buy, what you don’t buy, what people in your life look like and their location (with photos and geo tagging).I mean for god sake that’s insane. Phones are much less configurable than computers so you have even less control of your data. If you’re not willing to do that, then at least remove the battery from your phone (if you can), when you’re not using it. Thanks and be safe!