Atticusblog
Internet Tips
Internet security: 10 ways to keep your personal data safe from online snoopers

When Tim Berners-Lee turned into designing the technology that has converted our international, he looked for a noun that might describe what he had in thoughts. He eventually settled on turned into a “net,” which is how the sector extensive…

When Tim Berners-Lee turned into designing the technology that has converted our international, he looked for a noun that might describe what he had in thoughts. He eventually settled on turned into a “net,” which is how the sector extensive net got its name.

The noun should have seemed perfectly apposite to its inventor: it described the problematic, natural linking of sites and pages that he had in mind. However, “web” has other, metaphorical connotations. Webs are things that spiders weave intending to shoot prey. And if you need a metaphor for thinking about where we are now with the networked generation, here’s one to contemplate Our Planetary.

internet

Imagine a colossal, worldwide net in which can be trapped upwards of billion flies. Most of those unfortunate creatures don’t know – yet – that they may be trapped. In any case, they wandered cheerfully, willingly, into the internet. A number of them even consider that they may get away if they wanted to.

We’re those insects. The most effective way of escaping our catch 22 situations is to renounce the world within the way that Trappist monks once did. In view that we are now not going to do that, we ought to face reality: we are trapped in a machine wherein the entirety we do is monitored and logged and in which privacy is an aspect of the beyond. The whole lot which you do with current communications equipment leaves a digital path. And this trail is observed assiduously no longer just with the aid of large companies, but also by using governments and their protection offerings – as vividly illustrated by using the revelations of Edward Snowden.Protests in Berlin against surveillance

What’s stunning is how unconcerned many people appear like approximately this. Is it due to the fact they’re ignorant of the volume and comprehensiveness of the surveillance? Or is it a few weird manifestations of Stockholm syndrome – that particular situation in which prisoners exhibit high-quality feelings toward their captors? We’ve discovered specifically from the Snowden leaks that the scale and functionality of the NSA surveillance are much greater than all and sundry imagined. The public had assumed that most non-encrypted communications have been prone, and a few speculated that a few encrypted communications (e.g., Skype) had a hidden backdoor for the NSA. But nobody realized that, because today’s revelations confirmed, all the encryption technology robotically used to guard on-line transactions (HTTPS, SSL, VPN, and 4G encryption), plus something going via Google, Microsoft, FB, and Yahoo, have been cracked.

What this indicates is that no form of digital communique dealt with through commercial businesses can now be assumed to be comfortable. In that feel, the NSA has absolutely fouled the nest of the American internet enterprise. And it’s miles even suspected that about 90% of communications routed thru the TOR community are the use of encryption, which could also be hacked with the NSA’s aid. What can you do if you’re a person who feels uneasy approximately being caught on this internet? The sincere solution is that there is no complete answer: if you are going to use phones (mobile or landline) and the net, you will definitely go away a trail. However, you may do things to make your communications less insecure and your path harder to comply with. Right here are 10 thoughts you may remember.

RELATED ARTICLES :

1 email

reconsider your email setup. Expect that each one unfastened e-mail and webmail services (Gmail etc.) are suspect. Be organized to pay for a provider, which includes Fastmail that isn’t always based totally within the US – although a number of its servers are in new york with backups in Norway. (My hunch is that more non-US email offerings will appear as entrepreneurs spot the business possibility created via the Snowden revelations.) it’d additionally be well worth checking that your company has now not quietly outsourced its e-mail and IT systems to Google or Microsoft – as many UK companies (consisting of newspapers and universities) have.

The real problem with electronic mail is that even as there are ways of keeping the content of messages non-public (see encryption), the “metadata” that goes with the message (the “envelope,” because it was) may be very revealing. There may be no way of encrypting that because it is needed through the internet routing device and is to bemustto most security services without a warrant.

2 Encryption

Encryption was the sole province of geeks and mathematicians, but many have changed in the latest years. particularly, various publicly to be had tools have taken the rocket science out of encrypting (and decrypting) electronic mail and files. GPG for Mail, for instance, is an open-source plug-in for the Apple Mail software that makes it easy to encrypt, decrypt, signal, and verify emails the usage of the OpenPGP fashionable. And for protective files, newer variations of Apple’s OS X operating device come with FileVault, a software that encrypts the hard power. Those walking Microsoft home windows have a similar application. This software program will scramble your information. However, it may not defend you from government authorities annoying your encryption key beneath the regulation of Investigatory Powers Act (2000); that’s why some aficionados suggest TrueCrypt, a software with some exciting facilities, which might have been beneficial to David Miranda.

3web surfing

since surfing might be what internet customers do maximum, it’s worth taking browser security and privacy significantly. If you’re sad that your clickstream (the log of the sites you visit) is in effect public assets as far as the security offerings are involved, you might do not forget the usage of freely to be had gear together with Tor Browser to obscure your clickstream. And to guard yourself towards the amazingly brazen efforts with the aid of commercial businesses to tune your on-line behavior, you need to, at the very minimum, configure your browser so that it repels a lot of those could-be boarders.

4Cloud offerings

The Snowden revelations message is that you ought to avoid all cloud offerings (Dropbox, iCloud, Evernote, etc.), which can be primarily based within the US, the United Kingdom, France, and different jurisdictions acknowledged being tolerant of NSA-style snooping. Your operating assumption should be that something stored on such systems is potentially accessible by way of others. And if you ought to entrust data to them, ensure it is encrypted.

5report storage and archives

An option that increasing numbers of people are exploring is strolling their very own private cloud provider using the merchandise, which includes PogoPlug and Transporter that provide Dropbox-type facilities, but on net related drives that you own and control. And if you deliver around personal records on a USB stick, make certain it’s encrypted with the use of TrueCrypt.

6 Social networking

Delete your Facebook account. Why do the CIA’s paintings for it? And if you need to use it, do not put your date of birth on your profile. Why deliver identity thieves a good break? And remember the fact that, no matter what your privateness settings, you don’t have manipulated over information about you this is published by way of your “buddies.”

7 place data

avoid the use of services inclusive of FourSquare that require area records.

8 wireless services

Have Bluetooth off with the aid of default in all your mobile devices. The simplest transfer it on when you explicitly need to use it. In any other case, you will discover that even a dustbin can snoop on it. Further, beware of using open wifi in public locations. At the very minimum, ensure that any site you interact with uses HTTPS instead of unencrypted HTTP connections. If you don’t, then anyone nearby can use Firesheep to look at the entirety you are doing.

9non-public protection

forget the password, suppose passphrasei.e., a meaningless sentence that you’ll consider – and do some alterations on it (first and third letters of every word maybe) so that you can generate a stronger password from it every time. Or use a password-control app like LastPass or 1Password. And if a service gives multi-factor authentication, make use of it.

10 search engines

all the massive search engines tune your search history and build profiles to serve you personalized results based on your seek records. If you want to get away from this “clear out bubble,” you need to replace it with a seek engine that doesn’t track your inquiries. The most obvious one is the bizarrely named but quite powerful DuckDuckGo.

About the author

Related Posts