<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dw="https://www.dreamwidth.org">
  <id>tag:dreamwidth.org,2016-11-22:2563090</id>
  <title>Cybersecurity for the Trumped</title>
  <subtitle>Tips and tricks to improve your online privacy and security</subtitle>
  <author>
    <name>cybersecurity</name>
  </author>
  <link rel="alternate" type="text/html" href="https://cybersecurity.dreamwidth.org/"/>
  <link rel="self" type="text/xml" href="https://cybersecurity.dreamwidth.org/data/atom"/>
  <updated>2017-05-25T10:18:08Z</updated>
  <dw:journal username="cybersecurity" type="personal"/>
  <entry>
    <id>tag:dreamwidth.org,2016-11-22:2563090:2781</id>
    <link rel="alternate" type="text/html" href="https://cybersecurity.dreamwidth.org/2781.html"/>
    <link rel="self" type="text/xml" href="https://cybersecurity.dreamwidth.org/data/atom/?itemid=2781"/>
    <title>9. VPNs</title>
    <published>2016-12-22T13:29:15Z</published>
    <updated>2016-12-23T09:48:51Z</updated>
    <category term="smartphone"/>
    <category term="encryption"/>
    <category term="wifi"/>
    <category term="vpn"/>
    <category term="cybersecurity"/>
    <category term="providers"/>
    <dw:security>public</dw:security>
    <dw:reply-count>0</dw:reply-count>
    <content type="html">&lt;p&gt;Time to write about VPNs. VPN&amp;nbsp;means Virtual Private Network. Using a VPN is one of the best ways to improve your online privacy and security. There are many tutorials out there on how to get started with that, but most of them are trying to steer you towards a certain provider; there are also good and neutral articles. I will provide links to them later. &lt;br /&gt;But first, since I'm writing this for people like my mother, who is plenty smart but not super well versed in technical stuff  (hi mom!), I will explain how VPNs do what they do.&lt;/p&gt;&lt;br /&gt;&lt;span style="font-size: larger;"&gt;&lt;strong&gt;How it works&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Let's imagine the internet like a village. It has streets, houses and stores. Just like in any village, people in your neighbourhood can see what goes on there.&lt;br /&gt;Let's say that one fine day, I want to go out for a stroll and visit the sex shop at the other end of the village. This is something I probably don't want everyone to know! Because when I return with a big bag of none of your business, printed in bold bright letters that say 'Ye Olde Sexy Shoppe', my neighbours will probably see me. &lt;br /&gt;&lt;br /&gt;One of them is the janitor (my ISP), who, when asked, reports my comings and goings to the mayor... who may very well have strong opinions on what the villagers should and should not be buying.&lt;br /&gt;Another is a store owner, who would probably start shouting at me: &amp;quot;Wouldn't you like a bottle of wine to go with that? Maybe these candles, or some chocolate? How about these flowers? Perfume? Lingerie?&amp;quot;&lt;br /&gt;A third one might be a burglar, who notes down where and when I shop, in order to mug me or rob my house later.&lt;br /&gt;&lt;br /&gt;So I sign up with the VPN&amp;nbsp;store. I pay them, and they dig a tunnel from my house to their store. I leave my house through the tunnel. This is great! The neighbours can't see who is walking there. I'm strolling along through the tunnel without a care. The only problem is, I'm underground and I want to visit stores that are on street level. So I need to come up.&lt;br /&gt;&lt;br /&gt;For that reason, I walk straight to the VPN store. The greeter says: &amp;quot;Welcome! You gave me the secret handshake, so I know that you are one of our customers. Here's a coat. Right this way, please!&amp;quot; &lt;br /&gt;I enter the store and put the coat on. I walk out the back door onto the street and to the sex shop, and to all the other places in the village where I may want to go! No one, not even the janitor, saw me leave my house: I popped up from out of nowhere behind the VPN store, and I'm wearing a coat with my VPN provider's name printed on it, so I have more privacy. You'd have to take my fingerprints to recognise me. The greeter doesn't care what I do, and ideally does not keep a log.&lt;br /&gt;&lt;br /&gt;When I walk back home, I go back through the tunnel, for the distance from the VPN store to my house, carrying all my bags full of none of your business. (I should probably draw some pictures of all of this, it won't make things clearer, but it might be fun.)&lt;br /&gt;&lt;br /&gt;Translated back to the internet, this means:&lt;ul&gt;&lt;li&gt;Your VPN&amp;nbsp;service accepts encrypted traffic from your computer to their servers (we call them endpoint), because you're their customer. You'll need some kind of software in order to do this encryption; they will generally provide this and make it easy to use.&lt;/li&gt;&lt;li&gt;Your connection to the internet will then go through their servers and be shielded.&lt;/li&gt;&lt;li&gt;This is especially great when you are using public WiFi, because in that case you may not even know who is acting as your ISP by providing you with internet access. Using a VPN here is a big deal and makes your browsing much more secure!&lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;&lt;span style="font-size: larger;"&gt;&lt;br /&gt;What it does... and doesn't do&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Using a VPN&amp;nbsp;does not make you fully anonymous. Of course, when you log in somewhere, you are then known by that identity. But your system can also be recognised by its &lt;a href="https://en.wikipedia.org/wiki/Device_fingerprint"&gt;fingerprint&lt;/a&gt;. Still, a VPN&amp;nbsp;does hide your &lt;a href="https://en.wikipedia.org/wiki/IP_address"&gt;IP address&lt;/a&gt; and also your physical location and this adds a layer of privacy and security to your browsing.&lt;/li&gt;&lt;li&gt;Using a VPN&amp;nbsp;does not protect you from fake websites or malware. But it does protect you from &lt;a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack"&gt;man-in-the-middle attacks&lt;/a&gt; that happen 'in your neighbourhood': if you are connecting to a free WiFi that's not actually run by who you think is running it, or if someone is listening in on your WiFi connection, they get only encrypted data from you.&lt;/li&gt;&lt;li&gt;Using a VPN can make it possible to use websites that are otherwise blocked to you because of your location (geoblocking). If that's what you're after, choose a provider that has endpoints in the location where you wish to access content,  or at least a 'friendly' location that has this access.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style="font-size: larger;"&gt;&lt;strong&gt;How to get started&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You get started by picking a provider. They'll tell you what to do. They want to make this stuff easy for you, because they want you as a customer. &lt;br /&gt;&lt;span style="font-size: larger;"&gt;&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;How to choose a VPN&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Most VPNs are probably better than none at all. Still, you usually get what you pay for. While there are some free VPN providers, they are generally not reliable. And since it's not easy to check how well they do what they say they do, it's probably better to pay a few dollars and have more peace of mind. Some things to look out for:&lt;ul&gt;&lt;li&gt;Make sure they offer support for the OS(ses) that you are using! Don't forget your mobile devices.&lt;/li&gt;&lt;li&gt;Make sure they do not keep logs. Read their statements on this.&lt;/li&gt;&lt;li&gt;Make sure they are using up-to-date technology. Find out whether they support &lt;a href="https://en.wikipedia.org/wiki/OpenVPN"&gt;OpenVPN&lt;/a&gt;. This is software that runs on your end and handles the encryption, and it's open source and probably the best option that is currently available. It runs on multiple platforms.&lt;/li&gt;&lt;/ul&gt;Here are some articles to help you choose.&lt;br /&gt;&lt;a href="https://thatoneprivacysite.net/choosing-the-best-vpn-for-you/"&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you"&gt;EFF&lt;/a&gt; makes no recommendations but has a great outline on the basics. I would start here.&lt;a href="https://thatoneprivacysite.net/choosing-the-best-vpn-for-you/"&gt;&lt;br /&gt;Choosing the best VPN for you&lt;/a&gt; goes into great detail... for some of us, too much detail. But it's good stuff, so give it a try.&lt;br /&gt;&lt;a href="http://www.howtogeek.com/221929/how-to-choose-the-best-vpn-service-for-your-needs/"&gt;How To Geek&lt;/a&gt; is very thorough on this, as well.&lt;br /&gt;&lt;a href="http://www.pcmag.com/article2/0,2817,2403388,00.asp"&gt;PC&amp;nbsp;Mag&lt;/a&gt; has a nice table and a decent looking article.&lt;br /&gt;&lt;a href="https://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228/"&gt;Torrentfreak&lt;/a&gt;: Which VPN providers take your anonimity seriously?&lt;br /&gt;If you're really picky (and why shouldn't you be?) check out this list on &lt;a href="https://www.privacytools.io/#vpn"&gt;privacytools.io&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;This blog post was edited on December 23 based on feedback from savvy friends. Thank you, KdB and Stoneshop!&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;a href="https://cybersecurity.dreamwidth.org/431.html"&gt;&lt;img border="2" alt="Go back to the index of Cybersecurity for the Trumped." src="https://v.dreamwidth.org/10853719/2563090" /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src="https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=2781" width="30" height="12" alt="comment count unavailable" style="vertical-align: middle;"/&gt; comments</content>
  </entry>
  <entry>
    <id>tag:dreamwidth.org,2016-11-22:2563090:1276</id>
    <link rel="alternate" type="text/html" href="https://cybersecurity.dreamwidth.org/1276.html"/>
    <link rel="self" type="text/xml" href="https://cybersecurity.dreamwidth.org/data/atom/?itemid=1276"/>
    <title>3. Email providers</title>
    <published>2016-11-22T12:12:55Z</published>
    <updated>2017-05-25T10:18:08Z</updated>
    <category term="google"/>
    <category term="encryption"/>
    <category term="providers"/>
    <category term="email"/>
    <category term="cybersecurity"/>
    <dw:security>public</dw:security>
    <dw:reply-count>0</dw:reply-count>
    <content type="html">&lt;p&gt;Let's start off with something fairly easy: getting your email off of  US soil. If you're using a Europe based provider, they can't be  subpoenaed into handing over your data. That is exactly the result we  are after.&amp;nbsp; A US company, like Google, can be forced to hand over your data even if that data is not stored in the US, according to &lt;a href="http://www.reuters.com/article/us-google-usa-warrant-idUSKBN15J0ON"&gt;this article&lt;/a&gt;. Just another reason to avoid them like the plague.&lt;br /&gt;&lt;br /&gt;Here are some good and mostly free options; keep in mind  that a good, reliable and secure email provider is in my view well worth  a few dollars. Most of the free providers also offer a paid option with  more features, more storage, and so on.&lt;br /&gt;These providers generally offer an English-language interface; one less thing to worry about.&lt;br /&gt;&lt;br /&gt;All  of those listed below offer built-in encryption, that you don't have to  know anything about in order to use. You may feel that you do not  actually need that, but it's a valuable layer of security. Then again,  if your goal is just to get away from Google and/or get your email into a  place where the US government can't easily reach, you have a lot more  options (see links below).&lt;/p&gt;&lt;table width="600" cellspacing="1" cellpadding="0" border="0"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.openmailbox.org/"&gt;OpenMailbox&lt;/a&gt; (FR)&lt;/td&gt;&lt;td&gt;&amp;nbsp;Free&lt;/td&gt;&lt;td&gt;Encryption, POPmail, IMAP&lt;/td&gt;&lt;td&gt;&amp;nbsp;1 GB storage&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.protonmail.ch/"&gt;ProtonMail&lt;/a&gt; (CH)&lt;/td&gt;&lt;td&gt;&amp;nbsp;Free&lt;/td&gt;&lt;td&gt;Encryption, webmail&lt;/td&gt;&lt;td&gt;&amp;nbsp;0.5 GB storage&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.tutanota.com/"&gt;Tutanota&lt;/a&gt; (DE)&lt;/td&gt;&lt;td&gt;&amp;nbsp;Free&lt;/td&gt;&lt;td&gt;Encryption, webmail&lt;/td&gt; &lt;td&gt;&amp;nbsp;1 GB storage&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.mailfence.com/"&gt;Mailfence&lt;/a&gt; (BE)&lt;/td&gt;&lt;td&gt;&amp;nbsp;Free&lt;/td&gt;&lt;td&gt;Encryption, webmail, POPmail, IMAP&lt;/td&gt; &lt;td&gt;&amp;nbsp;0.2 GB storage&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href="https://www.startmail.com/"&gt;StartMail&lt;/a&gt; (NL)&lt;/td&gt;&lt;td&gt;&amp;nbsp;&amp;euro; 49,50/year&lt;/td&gt;&lt;td&gt;Encryption, webmail, IMAP&lt;/td&gt; &lt;td&gt;&amp;nbsp;10 GB storage&lt;/td&gt; &lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;You'll find more options listed &lt;a href="https://www.privacytools.io/#email"&gt;&lt;u&gt;here&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://www.vegard.net/archives/11906/"&gt;&lt;u&gt;here&lt;/u&gt;&lt;/a&gt;. These lists also show providers that do not offer built-in encryption.&lt;br /&gt;&lt;br /&gt;Some of you are probably familiar with Lavabit. That is a privacy-concious provider whom the US government tried to force into giving up their data (and its encryption keys) in 2013 because they had an account that belonged to Snowden. The owner responded by pulling the plug and did not give up the data. &lt;a href="https://lavabit.com"&gt;Now they are (soon to be) back&lt;/a&gt;. I would trust these people but their service is on the geeky/techy side. They are preparing to offer 5GB of storage for $30 a year and they are quite serious about security. Not bad!&lt;/p&gt;If  you have your own domain name, another option to get e-mail service is  by using the service offered by your domain hosting provider, if they  offer that; of course, they may be using servers in the US, so you'd  need to check that first. But for some of us, that's a good option, with  the added advantage that your email address never needs to change for  the rest of your life if you don't want it to.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-size: larger;"&gt;Bonus!&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Need a free throwaway email address for one hour only, with no records kept? &lt;a href="https://fade.email/"&gt;Here you go&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style="font-size: larger;"&gt;Protection level and limitations&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-size: larger;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size: medium;"&gt;How  much does having a EU provider protect you? That's hard to say. If you  have a provider that you trust, the chance that they will hand your data  over to the US government is definitely smaller, because they can't be  forced to do that as easily as a US-based company can. So that is a  certain level of security.&lt;br /&gt;&lt;br /&gt;However, there are some reasons why 'they' can still get your data:&lt;br /&gt;- The receiver may use a US provider, who may be forced to hand its data over. &lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="margin-left: 40px;"&gt;&lt;span style="font-size: medium;"&gt;This  would of course give them only a access to segment of your sent emails.  Sure, they can probably puzzle all your email traffic together this  way, but it's harder and more expensive than just asking Gmail to give  them the whole batch.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-size: medium;"&gt;- Data has to travel somehow. It needs to travel through US servers to reach you, and can be read on the way.&lt;/span&gt;&lt;/div&gt;&lt;div style="margin-left: 40px;"&gt;&lt;span style="font-size: medium;"&gt;If  your provider uses secure POP, secure IMAP and secure SMTP (usually  done through something called TLS) then your data is encrypted on the  way from your computer to your email provider's server and back. That  helps, for sure. Pay attention to whether your provider of choice offers  TLS or its predecessor, SSL. You don't need to know how they work, just  make sure that they offer them so you can use them. It's generally a  server setting in your email program.&lt;br /&gt;Webmail is generally protected by the HTTPS protocol (S for Secure).&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;It's  good to realise that you are by definition leaving a trail when you're  sending email. Anything you can do to obfuscate that trail helps keep  you a little bit more secure. But using a non-US email provider is not a  panacaea. &lt;br /&gt;End-to-end encryption offers a lot more protection, but  for most of us, that's just not feasible, at least not all the time. If  you're interested, &lt;a href="https://www.enigmail.net/index.php/en/"&gt;Enigmail&lt;/a&gt; combined with &lt;a href="http://www.pgpi.org/"&gt;PGP&lt;/a&gt; (Pretty Good Privacy) is a good option for POP and IMAP, and runs as an add-on in Thunderbird and SeaMonkey Mail.&lt;br /&gt;&lt;span style="font-size: larger;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style="font-size: larger;"&gt;What are POPmail, IMAP&amp;nbsp;and webmail?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Webmail  is email that you read and write on a webpage, as shown by your browser  of choice (such as Firefox). Can be useful to those who want to use  email on the go, on computers that aren't their own. No e-mail software  is needed.&lt;/li&gt;&lt;li&gt;POPmail is email that you download into your own  computer, using e-mail software such as Thunderbird (or Outlook, but  let's not go there). Can be useful to those who want to keep control  over their stored emails. Be sure to make backups now and then.&lt;/li&gt;&lt;li&gt;IMAP&amp;nbsp;is  email that you view through e-mail software but that lives on your  provider's server, not yours. Can be useful to those who use several  computers for their email and want to keep things synched, yet prefer  email software over webmail.&lt;/li&gt;&lt;/ul&gt;Using e-mail software (also  called an e-mail client) has the advantage that you can add a digital  signature as well as encryption.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;This blog post has been edited on November 13 and 16, based on feedback from readers. Thank you!&lt;br /&gt;New links have been added on December 3.&lt;br /&gt;More links added on February 8 2017.&lt;br /&gt;&lt;/em&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;a href="https://cybersecurity.dreamwidth.org/431.html"&gt;&lt;img border="2" src="https://v.dreamwidth.org/10853719/2563090" alt="Go back to the index of Cybersecurity for the Trumped." /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src="https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=1276" width="30" height="12" alt="comment count unavailable" style="vertical-align: middle;"/&gt; comments</content>
  </entry>
  <entry>
    <id>tag:dreamwidth.org,2016-11-22:2563090:788</id>
    <link rel="alternate" type="text/html" href="https://cybersecurity.dreamwidth.org/788.html"/>
    <link rel="self" type="text/xml" href="https://cybersecurity.dreamwidth.org/data/atom/?itemid=788"/>
    <title>2. A list of things you can do</title>
    <published>2016-11-22T11:52:42Z</published>
    <updated>2016-12-23T09:16:15Z</updated>
    <category term="social media"/>
    <category term="passwords"/>
    <category term="list"/>
    <category term="providers"/>
    <category term="email"/>
    <category term="encryption"/>
    <category term="cybersecurity"/>
    <category term="messengers"/>
    <category term="facebook"/>
    <category term="browsers"/>
    <category term="google"/>
    <category term="addons"/>
    <dw:security>public</dw:security>
    <dw:reply-count>0</dw:reply-count>
    <content type="html">&lt;p&gt;A lot of people are worried about their level of online privacy and  safety lately, for reasons that shouldn't be too hard to understand. The  big thing here is that US companies collect data, and the US   government can grab hold of that data if they feel there's a need; if   you are now under a government that you distrust, it makes sense to   reduce the amount of data that you hand over to US-based companies.  &lt;br /&gt;Here's  a list of things you can do. Some are easy and some are hard, but   every one of them can help. Even if you can only do one of these things,  it's worth doing.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Here's the hardest one,  for many of you:  Get off of Facebook. Facebook collects a LOT of data,  even when you're  not on it. It's not just what you post on Facebook,  it's also about  your surfing habits on other sites, and a lot more. All  this data is  under the control of a man who called his users 'dumb  fucks' for  trusting him. If that offends you, good! It should. If you  feel you  cannot do without Facebook, consider abandoning your account  and  setting up a new one, using an altered version of your name, and   reconnecting with your friends on that. Changes like that help obfuscate   your digital trail.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Get away from Google. I will post  in  more details about this later, because Google is an ecosystem that   consists of a lot of services. Most of them have good replacements! The   very fact that Google has all these services is also why it's so   potentially dangerous: they collect a LOT of different data from all   those sources and combine it all into a very detailed profile. Need a   good search engine? Try &lt;a href="http://startpage.com"&gt;StartPage&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Get   your e-mail off of US soil. Use an e-mail provider that's hosted in   Europe and offers encryption. There are plenty of them and some of the  good ones are free.  More information on that is now posted &lt;a href="http://moem.dreamwidth.org/339431.html"&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Compartimentalize.   Use different browsers for different purposes. Use different providers   for different services, so that your data is split up and therefore  less  meaningful. Keep your profiles on social media and other websites   separate. (I know, I don't always do that either. But I do have a few   online hangouts that you probably don't know about.)&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Here's   another hard one. Don't use a smartphone. If you must, be very wary of   the apps you install. Review and think about the permissions your apps   ask to use. Can they also operate with less? Switch it off when it's  not  in use. If you can make do with a nonsmart cellphone, or use that  for  phone calls and use your smartphone for data only, do that. That's   compartimentalizing too.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Here's some easy stuff! Use   adblockers and other browser add-ons that improve privacy. Your surfing   experience will be safer and faster and the sites you visit will look   nicer! This is another good topic for a &lt;a href="http://moem.dreamwidth.org/340185.html"&gt;separate post,&lt;/a&gt;  but for  now I'll throw out some names: UBlock Origin, Ghostery,  BetterPrivacy,  PrivacyBadger, DecentralEyes, SelfDestructing Cookies.  If you use Ghostery, be sure to check the settings carefully, as the  default is not great.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Also easy: if a service you are using  offers two-factor authentication, set that up. It makes your accounts a  lot harder to  break into. This is especially important for webmail  accounts, since they are often the key to a lot of other things, because  many services use email to reset passwords.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Another fairly  easy one, and we should all be doing this already: use good, strong  passwords and be smart about using them. Read more on that &lt;a href="http://moem.dreamwidth.org/340412.html"&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Learn   to use an e-mail client that supports encryption. You may not need it   now, but it's a good option to have. Thunderbird is just fine for this;   with the add-ons Enigmail and GPG installed, it works well. It's also  an all-around good e-mail program. And if more people use encryption,   those who use it won't stand out anymore. Remember when mail used to be   private? E-mail should be private, too.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;If you haven't yet,  consider getting away from Apple and Microsoft. Linux  isn't just for   geeks anymore. There are several good looking, easy to use Linux based  OSses nowadays, they can run on most of the hardware that you are using,  and they are free. Ask your friendly local nerd or  cybersmart  cousin  to show you Linux Mint. Bonus: your computer will  probably run  faster,  and will not need to be replaced as rapidly!&lt;/li&gt;&lt;br /&gt;&lt;li&gt;One of the best  things you  could do would be to attend a cryptoparty: an interactive  workshop  about cybersecurity, often aimed at beginners. Find out &lt;a href="https://www.cryptoparty.in/"&gt;here&lt;/a&gt; when and where they are happening. A good place to ask about this would also be your local &lt;a href="http://hackerspaces.org/"&gt;hackerspace&lt;/a&gt;;   hackerspaces are physical spaces (as in, buildings/rooms) where people   get together to tinker and to share knowledge about many things,   cybersecurity being one of them. Don't worry about the bad reputations   of hackers; there are good reasons why malicious hackers generally stay   away from hackerspaces (they don't need them, they aren't welcome, and   they don't want the extra visibility).&lt;/li&gt; &lt;br /&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: center;"&gt;&lt;a href="https://cybersecurity.dreamwidth.org/431.html"&gt;&lt;img border="2" src="https://v.dreamwidth.org/10853719/2563090" alt="Go back to the index of Cybersecurity for the Trumped." /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src="https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=788" width="30" height="12" alt="comment count unavailable" style="vertical-align: middle;"/&gt; comments</content>
  </entry>
</feed>
