You have nothing to hide? Then you will never worry about in online privacy. That's unreasonable reasons that people say when talking about how you should evaluate your online privacy. Even if you have just below 0 friends on Facebook, you can in the circle of the five million people in the extended network of friends of friends of friends. Find? It is not all about everything the government monitors your online activities, but there are also advertisers, courier companies and social networks that collect data for their own purposes.
When you talk in privacy online, the first person who will do better will be Edward Snowden . He is a former NSA contractor who turned to be a whistleblower regularly and talk about issues of confidentiality and advice for Internet users. If you have not heard some of his greatest advice, here are a few of them for your reference.
Encrypt your communications online chat and email.
must protect your online communications such as phone calls with encryption services. You can use a VPN service so that you can stay when sending sensitive data over email and cats without worry. You can also use to encrypt your e-mails in Microsoft Outlook or you can use a messaging service based on the Web with built-in encryption. An example of this is Hushmail . For your cats use ChatCrypt that encrypts messages before leaving the browser makes them visible to the end user only with the opposite password. Since WhatsApp have gone through encryption, you can use it as Viber .
Maintain a strategic distance from following web with program modules.
Sponsors and brands gather a staggering measure of customer information, keeping in mind the ultimate goal of personalizing the shopping meetings and better target people encounters with promotions.
Whichever option you welcome distance races innate REDID that information detailing the collection, you need to remember that others can probably see your action, as well .
Programs like Chrome and Internet Explorer 10 now offer does not follow the parameters, however, including a program module includes an additional layer of insurance and secrecy. Ghostery is one of the most popular choice and is available for Chrome, Opera, Firefox, Safari, Android and versatile executives, iOS and Android Firefox. It will show you the amount of trackers distinguished and give you the alternative of reconstituting them as before huge crowds.
Using Tor for web search.
Once the best quality for mysterious web skimming awareness Tor has been tainted this past summer, when its leaders were forced to let him out was not insensitive.
Tor rest for 'The Onion Router "and was named in light of its different security layers. Essentially, it bounces your match around a transfer system, which makes it problematic (and even unimaginable) for anyone to track your movements online. The websites you visit are not prepared to gather information that would uncover your physical area, for example, and you can get to the substance that can somehow or another be inaccessible to people in your area.
Tor manufacturers concede quickly, "Tor can not take care of all matters relating to secrecy. She just focuses on vehicle warranty information" Yet it is an open-source tool useful for those who fear for their safety.
We as a whole have something to store - perhaps not of the implementation of the law, but rather sponsors, programmers, robots and even your cordial retailers the most beloved. How to ensure your online protection is not a magic projectile device, but a mixture of online security tools that meet your online proclivities.
Encrypt your disk drive.
You can now use the word secret files on your insurance, but that is only the initial phase to ensure the substance of your hard drive. SXSW 2014 in Austin last March, Snowden again spoke by videoconference Protection Online and security of personal information. Encryption , he said, is "protection against dull phrases" for the advanced world. Encoding your entire hard drive provides insurance in case your PC is lost or stolen (or type). you do not have to be a techie to do it. a little update frameworks have worked in circle encryption equipment, for example, BitLocker , which is standard with Windows 7 Ultimate and Enterprise , plus 8.1 Pro and Enterprise. OS X clients can use the inherent device FileVault 2 encryption, while Linux customers can choose a distribution like Ubuntu, with Unified Key Setup implied Linux (LUKS). an external device is right Endpoint Encryption Symantec, which also offers safety misfortune information and run you around $ 111 each year. It also ensures your removable media.
Stay away consumer services leading online like Google, Facebook and Dropbox.
Random want to spend preferably a week without food than a day without Facebook, you're not alone. Anyway, in a video meeting October for The New Yorker Festival, Snowden registered Facebook and Google as "dangerous government" customers must maintain a strategic distance for their safety online. Google and Facebook have each had their offer of protection of outrage throughout the years and have found a way to improve, he noted. However, it is insufficient. Their information security and protection checks are still not up, for Snowden. Another part guilty important? Dropbox, an online storage arrangement Snowden drilled for its lack of nearby encryption. Rather, it requires the administrations SpiderOak , the neighborhood encryption involves the server never at any time knows the plaintext substance of the information he put away
Source:. inc.com
0 Komentar