<?xml version='1.0' encoding='utf-8' ?>

<rss version='2.0' xmlns:lj='http://www.livejournal.org/rss/lj/1.0/' xmlns:atom10='http://www.w3.org/2005/Atom'>
<channel>
  <title>Cybersecurity for the Trumped</title>
  <link>https://cybersecurity.dreamwidth.org/</link>
  <description>Cybersecurity for the Trumped - Dreamwidth Studios</description>
  <lastBuildDate>Thu, 16 Feb 2017 21:06:04 GMT</lastBuildDate>
  <generator>LiveJournal / Dreamwidth Studios</generator>
  <lj:journal>cybersecurity</lj:journal>
  <lj:journaltype>personal</lj:journaltype>
  <image>
    <url>https://v2.dreamwidth.org/10778356/2563090</url>
    <title>Cybersecurity for the Trumped</title>
    <link>https://cybersecurity.dreamwidth.org/</link>
    <width>100</width>
    <height>100</height>
  </image>

<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/3677.html</guid>
  <pubDate>Thu, 16 Feb 2017 21:06:04 GMT</pubDate>
  <title>11. Carrying devices and data across borders</title>
  <link>https://cybersecurity.dreamwidth.org/3677.html</link>
  <description>This is not an article. That&apos;s because I haven&apos;t written the article yet. It may be the hardest thing for me to write about so far, because things are changing so rapidly and so much is currently unknown. What is known, however, is that crossing the US border in either direction can result in unprecedented attacks on your privacy.&lt;br /&gt;&lt;br /&gt;US border agents get to ask you a lot of things. You get to refuse to answer. But then they get to detain you for an unlimited time, or simply block you from crossing the border. They may ask you to give the names of your social media accounts; they may also ask you for the passwords. They can ask you to unlock your phone or computer so they can look through it. And they have software that can extract a whole lot of data in a short time. &lt;br /&gt;In other words, they can get a very intimate snapshot of your contacts, your conversations, your interests, your friends, your job, your love life, your past... in short, your life. They can also get a lot of information about the people you know, who aren&apos;t even present.&lt;br /&gt;&lt;br /&gt;I&apos;ve not written the article but I&apos;ve started gathering information. And this is too important to wait. So I&apos;ll just go ahead and give you the links I&apos;ve found so far, and add more as I find it.&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://www.nytimes.com/2017/02/14/business/border-enforcement-airport-phones.html&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;What Are Your Rights if Border Agents Want to Search Your Phone?&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://medium.freecodecamp.com/ill-never-bring-my-phone-on-an-international-flight-again-neither-should-you-e9289cde0e5f&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;I&amp;rsquo;ll never bring my phone on an international flight again. Neither should&amp;nbsp;you.&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.wired.com/2017/02/guide-getting-past-customs-digital-privacy-intact/&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;A Guide to Getting Past Customs With Your Digital Privacy Intact&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.theregister.co.uk/2017/02/14/reg_guide_to_data_security_when_entering_us/&quot;&gt;The Register&apos;s guide to protecting your data when visiting the US&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.dailyxtra.com/canada/news-and-ideas/news/us-customs-block-canadian-man-reading-scruff-profile-215531&quot;&gt;US Customs block Canadian man after reading his Scruff profile: What non-Americans can do to protect their privacy at the border &lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.aclu.org/other/constitution-100-mile-border-zone&quot;&gt;Information from the ACLU about the constitutional rights of Americans within the 100-mile border zone&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.eff.org/document/defending-privacy-us-border-guide-travelers-carrying-digital-devices&quot;&gt;Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices&lt;/a&gt; (EFF, very good)&lt;/li&gt;&lt;/ul&gt;New, and probably the most reliable information out there:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://www.eff.org/press/releases/digital-privacy-us-border-new-how-guide-eff&quot;&gt;&lt;strong&gt;Digital Privacy at the U.S Border: A New How-To Guide from EFF    &lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;em&gt;Updated with more links on February 25, 2017.&lt;/em&gt;&lt;br /&gt;&lt;em&gt;Added the new EFF guide on March 9.&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;ContextualPopup-trigger&quot; href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=3677&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/3677.html</comments>
  <category>laptop</category>
  <category>travelling</category>
  <category>cybersecurity</category>
  <category>social media</category>
  <category>smartphone</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/3347.html</guid>
  <pubDate>Wed, 08 Feb 2017 14:54:26 GMT</pubDate>
  <title>10. Instant messaging and chat</title>
  <link>https://cybersecurity.dreamwidth.org/3347.html</link>
  <description>Many of us like to stay in touch with others in real time. For that purpose, we have a lot of tools that we can use. Some of them are safer than others. Let&apos;s look at some popular ones...&lt;br /&gt;&lt;a href=&quot;http://twitter.com&quot;&gt;&lt;br /&gt;Twitter&lt;/a&gt; is very popular and not private/secure in any way. Assume that anything you tweet is public.&lt;br /&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Internet_Relay_Chat&quot;&gt;IRC&lt;/a&gt; has been around for a long time. It&apos;s still used by many. It&apos;s not secure unless you use &lt;a href=&quot;https://null-byte.wonderhowto.com/how-to/hack-like-pro-install-use-secure-irc-client-with-otr-0163318/&quot;&gt;OTR&lt;/a&gt; (Off The Record).&lt;br /&gt;Facebook Messenger... well, it&apos;s Facebook. Not secure in any way.&lt;br /&gt;WhatsApp is encrypted, but the metadata is still logged, and says more than the actual conversations; also, it&apos;s owned by Facebook.&lt;br /&gt;Google+, Google Hangouts, Gchat... it&apos;s Google. Avoid.&lt;br /&gt;ICQ and Yahoo chat? &lt;a href=&quot;https://www.cnet.com/news/yahoo-icq-chats-still-vulnerable-to-government-snoops/&quot;&gt;Not secure&lt;/a&gt;.&lt;br /&gt;Skype is popular for voice and video chat. But it&apos;s owned by Microsoft nowadays. The calls are encrypted, but there&apos;s that pesky metadata thing again. So it&apos;s &lt;a href=&quot;https://www.comparitech.com/blog/information-security/is-skype-safe-and-secure-what-are-the-alternatives/&quot;&gt;not really secure&lt;/a&gt;.&lt;br /&gt;SMS (text messages) are not secure at all.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;So what are the better options?&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://whispersystems.org/&quot;&gt;Signal&lt;/a&gt; is well-known for being recommended by Snowden. It does &lt;strong&gt;voice chat&lt;/strong&gt; as well as &lt;strong&gt;instant messaging&lt;/strong&gt;. Can be used on smartphones and desktops.&lt;br /&gt;&lt;a href=&quot;https://telegram.org/&quot;&gt;Telegram&lt;/a&gt; is a cloud-based mobile and desktop &lt;strong&gt;messaging&lt;/strong&gt; app with a focus on security and speed. It works on many platforms and also in your browser. I like this one.&lt;br /&gt;&lt;a href=&quot;https://hoccer.com/&quot;&gt;Hoccer&lt;/a&gt; is a privacy-conscious &lt;strong&gt;messaging&lt;/strong&gt; and file sharing app for smartphones.&lt;br /&gt;&lt;a href=&quot;https://getconfide.com/&quot;&gt;Confide&lt;/a&gt; is a &lt;strong&gt;messaging app&lt;/strong&gt; for smartphones and Windows and OSX computers; it&apos;s hyped to be very secure (messages cannot be kept). But it&apos;s closed source, so who knows, and some experts say it&apos;s &lt;a href=&quot;https://www.theregister.co.uk/2017/02/15/white_house_drama_and_confide_app/&quot;&gt;not great&lt;/a&gt;.&lt;br /&gt;&lt;a href=&quot;https://tox.chat/&quot;&gt;Tox&lt;/a&gt; is another good option that works for &lt;strong&gt;messaging, voice and video chat&lt;/strong&gt;. There are &lt;a href=&quot;https://tox.chat/clients.html&quot;&gt;clients&lt;/a&gt; (= software) available for all platforms.&lt;br /&gt;&lt;a href=&quot;https://ring.cx/&quot;&gt;Ring&lt;/a&gt; serves a similar function. It also allows &lt;strong&gt;group chats&lt;/strong&gt; (teleconferencing)&lt;br /&gt;&lt;a href=&quot;https://www.linphone.org/&quot;&gt;Linphone&lt;/a&gt;: same same.&lt;br /&gt;And if you do not want to download or install anything or get an account, there is always &lt;a href=&quot;https://talky.io/&quot;&gt;Talky&lt;/a&gt; &lt;strong&gt;video chat&lt;/strong&gt; which can simply be used on the web. Set up a &apos;room&apos; by choosing a room name, send the other person the URL for your room, and you&apos;re off.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;So which one do I use?&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The one you can get your friends or family to use.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;&lt;br /&gt;A note on the technical side of all of this&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;We need to distinguish between two things when talking about chat/messaging software: there&apos;s the software and there&apos;s the &lt;a href=&quot;https://techterms.com/definition/protocol&quot;&gt;protocol&lt;/a&gt;. &lt;br /&gt;Just like PDF documents can be opened with Adobe Reader, and many people assume that this is the only option... but in reality, there are lots of different programs that can open PDFs. Likewise, there are different programs that can handle different protocols, and even programs that can handle a whole lot of them!&lt;br /&gt;For example, I use IRC, ICQ and Telegram, but I don&apos;t want three programs running on my laptop all the time. So I use multi-protocol messenger software, that can handle all three of these and more.&lt;br /&gt;&lt;br /&gt;Some good multi-protocol programs are:&lt;br /&gt;&lt;a href=&quot;https://pidgin.im/&quot;&gt;Pidgin&lt;/a&gt; (for Linux, Windows, OSX)&lt;br /&gt;&lt;a href=&quot;http://www.miranda-im.org/&quot;&gt;Miranda IM&lt;/a&gt; (for Windows)&lt;br /&gt;&lt;a href=&quot;https://adium.im/&quot;&gt;Adium&lt;/a&gt; (for OSX)&lt;br /&gt;These are mainly meant for laptops and desktop computers. On a smartphone, a dedicated app is generally the better option.&lt;br /&gt;&lt;br /&gt;Some instant messaging protocols are:&lt;br /&gt;ICQ, IRC, Gadugadu, AIM, AOL, XMPP, Bonjour, Telegram (has OTR feature built in).&lt;br /&gt;&lt;br /&gt;If you want secure instant messaging on a protocol that&apos;s not inherently encrypted, look into adding an &lt;a href=&quot;http://www.howtogeek.com/190811/how-and-why-to-use-otr-for-private-instant-messaging/&quot;&gt;OTR plugin&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Further reading (and even more apps) in &lt;a href=&quot;https://bits.blogs.nytimes.com/2014/03/19/can-you-trust-secure-messaging-apps/&quot;&gt;this article&lt;/a&gt; in the New York Times.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a class=&quot;ContextualPopup-trigger&quot; href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=3347&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/3347.html</comments>
  <category>signal</category>
  <category>smartphone</category>
  <category>pidgin</category>
  <category>cybersecurity</category>
  <category>facebook</category>
  <category>messengers</category>
  <category>voicechat</category>
  <category>chat. videochat</category>
  <category>google</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/3262.html</guid>
  <pubDate>Mon, 16 Jan 2017 19:58:33 GMT</pubDate>
  <title>FamilytreeNow: doxxing made easy</title>
  <link>https://cybersecurity.dreamwidth.org/3262.html</link>
  <description>A reader of my other blog (thank you!) recently brought this article to my attention: &lt;br /&gt;&lt;a href=&quot;https://www.washingtonpost.com/news/the-intersect/wp/2017/01/12/youve-probably-never-heard-of-this-creepy-genealogy-site-but-its-heard-all-about-you/&quot;&gt;You&amp;rsquo;ve probably never heard of this creepy genealogy site. But it knows a lot about you.&lt;/a&gt; I&apos;ll just chill here for a while and give you the time to read it...&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;...&lt;br /&gt;... Done? Good. Creepy, isn&apos;t it? I&apos;d say so. As the article points out, the FamilytreeNow website lists information that&apos;s already public, but it makes it a whole lot easier to access; it effectively makes it child&apos;s play to doxx someone. Doxing or doxxing means to make information, especially about someone&apos;s true identity, home address, phone number and so on, available against that person&apos;s wishes, so that they are now more vulnerable to harassment, violence and other nasty stuff.&lt;br /&gt;&lt;br /&gt;This site only seems to have records about people who live in the US. If you do, you are probably listed. This is an inherent risk to your privacy and personal safety. So my advice is: go to &lt;a href=&quot;http://familytreenow.com&quot;&gt;the site&lt;/a&gt; and find your own listing, and once you do, opt out. &lt;a href=&quot;http://www.familytreenow.com/optout&quot;&gt;This&lt;/a&gt; is where you go to do that.&lt;br /&gt;&lt;br /&gt;This is not the only site of its kind but it&apos;s unique in that anyone can look up anyone&apos;s info without even registering. But if you find similar sites, let me know so I can add their links too.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=3262&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/3262.html</comments>
  <category>internet</category>
  <category>doxxing</category>
  <category>cybersecurity</category>
  <lj:security>public</lj:security>
  <lj:reply-count>2</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/3020.html</guid>
  <pubDate>Fri, 06 Jan 2017 14:06:27 GMT</pubDate>
  <title>Some good articles on cybersecurity (in progress)</title>
  <link>https://cybersecurity.dreamwidth.org/3020.html</link>
  <description>Here are some good and relevant articles that I found. In fact, for now it&apos;s just one but I&apos;ll be adding more.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.salimvirani.com/facebook/&quot;&gt;Salim Virani: Get your loved ones off Facebook&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=3020&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/3020.html</comments>
  <category>internet</category>
  <category>cybersecurity</category>
  <category>facebook</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/2781.html</guid>
  <pubDate>Thu, 22 Dec 2016 13:29:15 GMT</pubDate>
  <title>9. VPNs</title>
  <link>https://cybersecurity.dreamwidth.org/2781.html</link>
  <description>&lt;p&gt;Time to write about VPNs. VPN&amp;nbsp;means Virtual Private Network. Using a VPN is one of the best ways to improve your online privacy and security. There are many tutorials out there on how to get started with that, but most of them are trying to steer you towards a certain provider; there are also good and neutral articles. I will provide links to them later. &lt;br /&gt;But first, since I&apos;m writing this for people like my mother, who is plenty smart but not super well versed in technical stuff  (hi mom!), I will explain how VPNs do what they do.&lt;/p&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;How it works&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Let&apos;s imagine the internet like a village. It has streets, houses and stores. Just like in any village, people in your neighbourhood can see what goes on there.&lt;br /&gt;Let&apos;s say that one fine day, I want to go out for a stroll and visit the sex shop at the other end of the village. This is something I probably don&apos;t want everyone to know! Because when I return with a big bag of none of your business, printed in bold bright letters that say &apos;Ye Olde Sexy Shoppe&apos;, my neighbours will probably see me. &lt;br /&gt;&lt;br /&gt;One of them is the janitor (my ISP), who, when asked, reports my comings and goings to the mayor... who may very well have strong opinions on what the villagers should and should not be buying.&lt;br /&gt;Another is a store owner, who would probably start shouting at me: &amp;quot;Wouldn&apos;t you like a bottle of wine to go with that? Maybe these candles, or some chocolate? How about these flowers? Perfume? Lingerie?&amp;quot;&lt;br /&gt;A third one might be a burglar, who notes down where and when I shop, in order to mug me or rob my house later.&lt;br /&gt;&lt;br /&gt;So I sign up with the VPN&amp;nbsp;store. I pay them, and they dig a tunnel from my house to their store. I leave my house through the tunnel. This is great! The neighbours can&apos;t see who is walking there. I&apos;m strolling along through the tunnel without a care. The only problem is, I&apos;m underground and I want to visit stores that are on street level. So I need to come up.&lt;br /&gt;&lt;br /&gt;For that reason, I walk straight to the VPN store. The greeter says: &amp;quot;Welcome! You gave me the secret handshake, so I know that you are one of our customers. Here&apos;s a coat. Right this way, please!&amp;quot; &lt;br /&gt;I enter the store and put the coat on. I walk out the back door onto the street and to the sex shop, and to all the other places in the village where I may want to go! No one, not even the janitor, saw me leave my house: I popped up from out of nowhere behind the VPN store, and I&apos;m wearing a coat with my VPN provider&apos;s name printed on it, so I have more privacy. You&apos;d have to take my fingerprints to recognise me. The greeter doesn&apos;t care what I do, and ideally does not keep a log.&lt;br /&gt;&lt;br /&gt;When I walk back home, I go back through the tunnel, for the distance from the VPN store to my house, carrying all my bags full of none of your business. (I should probably draw some pictures of all of this, it won&apos;t make things clearer, but it might be fun.)&lt;br /&gt;&lt;br /&gt;Translated back to the internet, this means:&lt;ul&gt;&lt;li&gt;Your VPN&amp;nbsp;service accepts encrypted traffic from your computer to their servers (we call them endpoint), because you&apos;re their customer. You&apos;ll need some kind of software in order to do this encryption; they will generally provide this and make it easy to use.&lt;/li&gt;&lt;li&gt;Your connection to the internet will then go through their servers and be shielded.&lt;/li&gt;&lt;li&gt;This is especially great when you are using public WiFi, because in that case you may not even know who is acting as your ISP by providing you with internet access. Using a VPN here is a big deal and makes your browsing much more secure!&lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;What it does... and doesn&apos;t do&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Using a VPN&amp;nbsp;does not make you fully anonymous. Of course, when you log in somewhere, you are then known by that identity. But your system can also be recognised by its &lt;a href=&quot;https://en.wikipedia.org/wiki/Device_fingerprint&quot;&gt;fingerprint&lt;/a&gt;. Still, a VPN&amp;nbsp;does hide your &lt;a href=&quot;https://en.wikipedia.org/wiki/IP_address&quot;&gt;IP address&lt;/a&gt; and also your physical location and this adds a layer of privacy and security to your browsing.&lt;/li&gt;&lt;li&gt;Using a VPN&amp;nbsp;does not protect you from fake websites or malware. But it does protect you from &lt;a href=&quot;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&quot;&gt;man-in-the-middle attacks&lt;/a&gt; that happen &apos;in your neighbourhood&apos;: if you are connecting to a free WiFi that&apos;s not actually run by who you think is running it, or if someone is listening in on your WiFi connection, they get only encrypted data from you.&lt;/li&gt;&lt;li&gt;Using a VPN can make it possible to use websites that are otherwise blocked to you because of your location (geoblocking). If that&apos;s what you&apos;re after, choose a provider that has endpoints in the location where you wish to access content,  or at least a &apos;friendly&apos; location that has this access.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;How to get started&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You get started by picking a provider. They&apos;ll tell you what to do. They want to make this stuff easy for you, because they want you as a customer. &lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;How to choose a VPN&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Most VPNs are probably better than none at all. Still, you usually get what you pay for. While there are some free VPN providers, they are generally not reliable. And since it&apos;s not easy to check how well they do what they say they do, it&apos;s probably better to pay a few dollars and have more peace of mind. Some things to look out for:&lt;ul&gt;&lt;li&gt;Make sure they offer support for the OS(ses) that you are using! Don&apos;t forget your mobile devices.&lt;/li&gt;&lt;li&gt;Make sure they do not keep logs. Read their statements on this.&lt;/li&gt;&lt;li&gt;Make sure they are using up-to-date technology. Find out whether they support &lt;a href=&quot;https://en.wikipedia.org/wiki/OpenVPN&quot;&gt;OpenVPN&lt;/a&gt;. This is software that runs on your end and handles the encryption, and it&apos;s open source and probably the best option that is currently available. It runs on multiple platforms.&lt;/li&gt;&lt;/ul&gt;Here are some articles to help you choose.&lt;br /&gt;&lt;a href=&quot;https://thatoneprivacysite.net/choosing-the-best-vpn-for-you/&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;https://ssd.eff.org/en/module/choosing-vpn-thats-right-you&quot;&gt;EFF&lt;/a&gt; makes no recommendations but has a great outline on the basics. I would start here.&lt;a href=&quot;https://thatoneprivacysite.net/choosing-the-best-vpn-for-you/&quot;&gt;&lt;br /&gt;Choosing the best VPN for you&lt;/a&gt; goes into great detail... for some of us, too much detail. But it&apos;s good stuff, so give it a try.&lt;br /&gt;&lt;a href=&quot;http://www.howtogeek.com/221929/how-to-choose-the-best-vpn-service-for-your-needs/&quot;&gt;How To Geek&lt;/a&gt; is very thorough on this, as well.&lt;br /&gt;&lt;a href=&quot;http://www.pcmag.com/article2/0,2817,2403388,00.asp&quot;&gt;PC&amp;nbsp;Mag&lt;/a&gt; has a nice table and a decent looking article.&lt;br /&gt;&lt;a href=&quot;https://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228/&quot;&gt;Torrentfreak&lt;/a&gt;: Which VPN providers take your anonimity seriously?&lt;br /&gt;If you&apos;re really picky (and why shouldn&apos;t you be?) check out this list on &lt;a href=&quot;https://www.privacytools.io/#vpn&quot;&gt;privacytools.io&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;This blog post was edited on December 23 based on feedback from savvy friends. Thank you, KdB and Stoneshop!&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=2781&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/2781.html</comments>
  <category>wifi</category>
  <category>smartphone</category>
  <category>vpn</category>
  <category>providers</category>
  <category>encryption</category>
  <category>cybersecurity</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/2499.html</guid>
  <pubDate>Thu, 08 Dec 2016 21:20:14 GMT</pubDate>
  <title>8. Smartphones</title>
  <link>https://cybersecurity.dreamwidth.org/2499.html</link>
  <description>I&apos;m about the least likely person to write about this, because I do not own a smartphone. But someone has to do it, so I&apos;ll go ahead and do it. I&apos;ll be doing research as I go along, and cite my sources for you to peruse if you want to. As always, keep in mind that corrections and additions are welcomed.&lt;br /&gt;&lt;br /&gt;So. &lt;a href=&quot;https://www.privacyrights.org/consumer-guides/privacy-age-smartphone&quot;&gt;Smartphones&lt;/a&gt;. Almost everyone in the industrialized world now carries one of these palm-sized computers with them. And they are a great way to keep track of people. It&apos;s a lot like Orwell&apos;s vision of the surveillance state of the future, with one big difference: we don&apos;t have to be forced to wear a tracking device. We do it by ourselves, because it&apos;s convenient and fun and offers a lot of options that we really want. Here&apos;s what your smartphone can reveal about you.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;What kind of information is being collected? By who?&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Your telecom provider is, at the very least, keeping tabs on the following:&lt;br /&gt;    &lt;ul&gt;&lt;li&gt;Incoming and outgoing calls: the phone numbers you call, the numbers that you receive calls from, and the duration of the call;&lt;/li&gt;&lt;li&gt;Incoming and outgoing text messages: the phone numbers you send texts to and receive texts from;&lt;/li&gt;&lt;li&gt;How often you check your e-mail or access the Internet;&lt;/li&gt;&lt;li&gt;Your location.&lt;/li&gt;&lt;/ul&gt;Not all providers keep your data for the same amount of time. Check this &lt;a href=&quot;http://www.usnews.com/news/articles/2015/05/22/how-long-cellphone-companies-store-your-call-records&quot;&gt;article&lt;/a&gt;. Oh, and if you&apos;re not excited about the Trump presidency, &lt;a href=&quot;http://arstechnica.com/tech-policy/2016/12/t-mobile-excited-about-life-under-trump-reversal-of-net-neutrality-rules/&quot;&gt;T-Mobile&lt;/a&gt; may not be your provider of choice.&lt;br /&gt;Other parties who may be privvy to your information:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Retailers can nowadays follow you through cameras, using face recognition, and combine that information with the MAC address of your smartphone which can, in many cases, be linked to a specific individual. The difference between Bluetooth-tracking beacons and Wi-Fi tracking  systems is that the modern smartphone leaves Wi-Fi on, even when  manually switched off for data connectivity, as a way of pinpointing its  location. &lt;a href=&quot;https://www.theguardian.com/technology/2016/jan/21/shops-track-smartphone-uk-privacy-watchdog-warns&quot;&gt;Source&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;If you&apos;re using the Facebook app, Facebook has access to:  &lt;ul&gt;&lt;li&gt;Your contacts, including modification and adding or changing  calendar events. They know who is in your phone and can contact them.&lt;/li&gt;&lt;li&gt;Your exact location. They know where you are at any time.&lt;/li&gt;&lt;li&gt;Your camera, including taking pictures and videos at any time, as  well as recording from the microphone. They can get at anything you&amp;rsquo;re  saying or looking at.&lt;/li&gt;&lt;li&gt;Your text messages, your calls, and can call phone numbers. They can see who you&amp;rsquo;ve contacted recently.&lt;/li&gt;&lt;li&gt;Your internal storage, including permission to delete anything. They can see the files on your phone.&lt;/li&gt;&lt;li&gt;Full Internet access anytime, changing your wallpaper, opening up  over other apps, and downloading files. They can make little tweaks  without your knowledge.&lt;/li&gt;&lt;li&gt;When posting a status, the app can determine what song you&amp;rsquo;re listening  to or what TV show is on in the background, and tag your status  with this information. &lt;a href=&quot;http://www.makeuseof.com/tag/use-facebook-android-without-invasive-permissions/&quot;&gt;Source&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Many different apps send location information and other data to third parties. That includes things like games and flashlight apps.&lt;/li&gt;&lt;li&gt;If you&apos;re using Chrome as your mobile browser, Google has access to your browser history, open tabs, passwords and more.&lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;Settings&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Lock down your phone&apos;s security settings. &lt;a href=&quot;http://www.makeuseof.com/tag/smartphone-privacy-settings-need-activate-today/&quot;&gt;Here&apos;s how&lt;/a&gt;.&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Apps&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Apps are what makes a smartphone a smartphone: it can run software, programs, applications, in one word: apps. These apps need permissions to do things; a browser, for example, needs permission to use the internet. Permissions are the only layer of defense between your phone and an app.  If an application has malicious intent, all you have to do is allow it  on your phone with invasive permissions to create problems. &lt;br /&gt;Never give permissions to an app without at least reading what they are, and thinking about what that means. Try to understand the permissions required by the app: is there some  legitimate reason or is something malicious happening in the background?  To give an example, a calculator or torchlight application shouldn&amp;rsquo;t be  requesting access to your contacts. Likewise, many applications  shouldn&amp;rsquo;t be requesting your GPS location: it could potentially give  away when you&amp;rsquo;re not currently at home (useful information for anyone  breaking into your house).  If you&amp;rsquo;re not comfortable with the  permissions being requested, it&amp;rsquo;s always best to cancel the  installation. &lt;a href=&quot;https://community.giffgaff.com/t5/Blog/Smartphone-App-Permissions-Secure-Your-Privacy-amp-Keep-Your/ba-p/11811901&quot;&gt;Source&lt;/a&gt;.&lt;br /&gt;Here&apos;s a guide for &lt;a href=&quot;https://thehackernews.com/2015/06/android-permission-manager.html&quot;&gt;Android&lt;/a&gt;. Here&apos;s one for &lt;a href=&quot;http://www.howtogeek.com/211623/how-to-manage-app-permissions-on-your-iphone-or-ipad/&quot;&gt;iPhone&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;The risks of free WiFi&lt;/span&gt; &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Using public WiFi isn&apos;t unlike having a conversation in a public  place: Others can overhear you. If you don&apos;t take precautions,  information your devices send over a public WiFi network goes out in  clear text &amp;mdash; and anyone else on the network could easily take a look at  what you&apos;re doing with just a few simple software tools.&lt;br /&gt; Someone spying could easily pick up your passwords or other private  information. If you use the same password on multiple sites, that could  be a big problem. (But you should not be doing that anyway.)&lt;br /&gt; The next potential problem is what is called a honeypot. Thieves  might set up their own WiFi hotspot with an unassuming name like &amp;quot;Public  WiFi&amp;quot; to tempt you to connect so they can grab up any data you send.  These are easy to set up without any kind of special equipment &amp;mdash; it  could be done just using a laptop or smartphone &amp;mdash; so you could run into  them anywhere.&lt;br /&gt; Finally, using public WiFi puts you at risk for session hijacking, in  which a malicious hacker who&apos;s monitoring your WiFi traffic attempts to take over  an open session you have with an online service (like a social media  site or an email client) by stealing the browser cookies the service  uses to recognize who you are. Once hackers have that cookie, they can  pretend to be you on these sites or even find your login and password  information stored inside the cookie. &lt;a href=&quot;http://www.techlicious.com/tip/how-to-protect-your-privacy-on-public-wifi-networks/&quot;&gt;Source.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;When you&apos;re using a public WiFi:&lt;ul&gt;&lt;li&gt;Make sure you know that you are connecting to the right WiFi hotspot and not one that has a similar or generic-sounding name. And read the terms and conditions.&lt;/li&gt;&lt;li&gt;Check that you are using HTTPS by looking at the URL of the site you are connecting to. Also check the spelling of the URL itself.&lt;/li&gt;&lt;li&gt;it&amp;rsquo;s better to use a mobile browser than an app, because &lt;a rel=&quot;noopener&quot; target=&quot;_blank&quot; href=&quot;https://nakedsecurity.sophos.com/2014/01/10/just-how-secure-is-that-mobile-banking-app/&quot;&gt;browsers are more fussy&lt;/a&gt;  when it comes to checking and verifying these HTTPS connections.  Essentially, apps can be accepting bogus security credentials without  your knowledge, and that&amp;rsquo;s a problem if you&amp;rsquo;re doing something important  like online banking or buying stuff online. &lt;a href=&quot;https://fieldguide.gizmodo.com/how-to-stay-safe-on-public-wifi-1779464400&quot;&gt;Source&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Use a VPN. More about that &lt;a href=&quot;https://cybersecurity.dreamwidth.org/2781.html&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Use two-factor authentication wherever possible.&lt;/li&gt;&lt;li&gt;If you want to be extra careful, avoid doing anything over public WiFi that needs you to enter a password.&lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;Avoid the Facebook app&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;From a viewpoint of privacy, Facebook is one of the worst offenders. The Facebook app, doubly so. So if you cannot live without Facebook, at least don&apos;t use it through the app; instead, view it inside your browser of choice. Or for a nice compromise: use a wrapper app like Tinfoil or Metal (Android).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;&lt;br /&gt;Messenger apps&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Whatsapp is a very popular messenger app for smartphones. The good news is that it&apos;s lately been made to use encryption; the bad news is that it&apos;s &lt;a href=&quot;https://www.theguardian.com/technology/2014/feb/19/facebook-buys-whatsapp-16bn-deal&quot;&gt;owned by Facebook&lt;/a&gt;, who of course still gets the metadata (who are you talking to, when and how often?)&lt;br /&gt;A good alternative that&apos;s been getting a lot of attention is &lt;a href=&quot;https://whispersystems.org/&quot;&gt;Signal&lt;/a&gt;. And another good option is &lt;a href=&quot;https://telegram.org/&quot;&gt;Telegram&lt;/a&gt;. Both of these offer encryption and are free, as well as ad-free!&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;Going off-grid&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;If it makes you uncomfortable to be tracked so closely all the time, go off-grid now and then. It&apos;s a good idea to switch your smartphone off when you&apos;re not using it; unfortunately, that&apos;s not always enough anymore. Modern smartphones never turn off completely and you can&apos;t always take the battery out anymore, either. A good way to cut off all information to and from the device is to put inside a signal blocking pouch! &lt;a href=&quot;http://killyourphone.com/&quot;&gt;Complete how-to here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;It&apos;s also a smart option to split your phone use off from your smartphone use. You could get an old-fashioned &apos;dumbphone&apos; and use that to make calls, while reserving your smartphone for browsing on the go. Compartimentalization again. Non-smartphones are often sold as prepaid phones in bigger electronics stores; make sure you are getting a simlockfree phone. Bonus: many of them have really long standby times!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;&lt;br /&gt;Phones and OSses&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Which smartphones are the most private and secure? &lt;a href=&quot;http://www.zdnet.com/article/want-a-secure-privacy-smartphone-the-experts-suggest/&quot;&gt;Read more here.&lt;/a&gt;&lt;br /&gt;It seems pretty clear that Androids are the least secure, since you&apos;re always giving a lot of data to Google and cheaper Chinese Androids may also send data home to the manufacturer. Older versions of Android are worse than up to date ones.&lt;br /&gt;iPhones may be slightly better since Apple is mostly in the hardware business, advertising: not so much. iPhones are also fairly hard to hack.&lt;br /&gt;Windows phones are not too bad either, for similar reasons.&lt;br /&gt;Alternative OSses are probably a step up: &lt;a href=&quot;https://www.mozilla.org/en-US/firefox/os/&quot;&gt;Firefox OS&lt;/a&gt; (but as a phone OS, that project is dead in the water), &lt;a href=&quot;https://sailfishos.org/&quot;&gt;Sailfish&lt;/a&gt;, &lt;a href=&quot;https://www.cyanogenmod.org/&quot;&gt;Cyanogenmod&lt;/a&gt; if you like to tinker. If you&apos;re really, really serious about all of this, get a &lt;a href=&quot;https://www.silentcircle.com/&quot;&gt;Blackphone&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=2499&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/2499.html</comments>
  <category>wifi</category>
  <category>cell phone</category>
  <category>smartphone</category>
  <category>apps</category>
  <category>facebook</category>
  <category>messengers</category>
  <category>cybersecurity</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/2248.html</guid>
  <pubDate>Thu, 24 Nov 2016 11:24:11 GMT</pubDate>
  <title>7. Facebook</title>
  <link>https://cybersecurity.dreamwidth.org/2248.html</link>
  <description>Facebook is a problem. Privacy-wise, it&apos;s riddled with concerns, but it&apos;s so embedded in many people&apos;s lives that it&apos;s hard to uproot. I have never used Facebook, so everything I&apos;m going to write below is second-hand; please correct me where needed.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;Why worry about Facebook?&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Here are some reasons why many people feel that Facebook should not be trusted with the details of your daily life.&lt;ul&gt;&lt;li&gt;First off: Mark Zuckerberg is a jerk. He does not respect his users; their privacy, even less so. He&apos;s called his users &lt;a href=&quot;http://gawker.com/5636765/facebook-ceo-admits-to-calling-users-dumb-fucks&quot;&gt;&apos;dumb fucks&apos;&lt;/a&gt; for trusting him. Does that offend you? It probably should.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Secondly, privacy settings on Facebook &lt;a href=&quot;https://www.theguardian.com/technology/2016/jun/29/facebook-privacy-secret-profile-exposed&quot;&gt;change all the time&lt;/a&gt;. They can&apos;t be relied upon. If there is something you&apos;re not ready to share with the entire world (under your real name,no less), you should not be sharing it with anyone through Facebook.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Facebook is not designed to show you what you want to see. It&apos;s designed to keep you clicking around within the Facebook walled garden for as long as possible. It is, in fact, designed to be &lt;a href=&quot;http://www.livescience.com/49585-facebook-addiction-viewed-brain.html&quot;&gt;addictive&lt;/a&gt;. That shouldn&apos;t be a surprise, since many websites are.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Facebook tinkers with your &lt;a href=&quot;http://www.nytimes.com/2014/06/30/technology/facebook-tinkers-with-users-emotions-in-news-feed-experiment-stirring-outcry.html&quot;&gt;emotions&lt;/a&gt; in ways that aren&apos;t good for you. It actively makes people &lt;a href=&quot;http://www.newyorker.com/tech/elements/how-facebook-makes-us-unhappy&quot;&gt;unhappier&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Facebook stores &lt;a href=&quot;http://www.geek.com/geek-pick/facebook-stores-up-to-800-pages-of-personal-data-per-user-account-1424807/&quot;&gt;ridiculous amounts of data&lt;/a&gt; about its users and probably &lt;a href=&quot;http://www.informationliberation.com/?id=28581&quot;&gt;never deletes it&lt;/a&gt;, even after you close your account.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Facebook builds a &lt;a href=&quot;https://www.thesun.co.uk/news/1664178/here-are-the-alarming-98-facts-and-secrets-facebook-knows-about-you/&quot;&gt;very detailed profile&lt;/a&gt; of you, based on your behaviour both on the site itself and on other sites, and uses that for targeted advertising. It also sells this information.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;That&apos;s right: Facebook &lt;a href=&quot;http://www.businessinsider.com/this-is-how-facebook-is-tracking-your-internet-activity-2012-9&quot;&gt;tracks your surfing&lt;/a&gt; even when you&apos;re not on Facebook. If you click a &apos;like&apos; button anywhere on the web, that is of course recorded; if you don&apos;t click it, that&apos;s fine too. The fact that it&apos;s shown in your browser at all is enough to track your online behaviour.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Facebook gets information from Google searches that lead you to specific companies&apos; websites. Those companies don&apos;t just know you visited their website, &lt;a href=&quot;http://mashable.com/2014/06/04/google-facebook-ads-search/#X8wEEuHCEkqA&quot;&gt;they know what you  searched&lt;/a&gt; for that led you there. And now they can follow up with you on  Facebook. All for your own convenience, mind you.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Facebook is &lt;a href=&quot;http://blog.higg.im/2015/05/28/facebook-are-keylogging-followup-screen-capture-by-aral-balkan/&quot;&gt;keylogging your status updates&lt;/a&gt; as you type them. So even if you decide never to post them, they&apos;re being stored.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;All this data is in the hands of a US based company. The US government, or any random cybercriminal, can certainly gain access to it. If you don&apos;t want to be spied on, &lt;a href=&quot;https://www.theguardian.com/technology/2015/mar/26/leave-facebook-snooped-on-warns-eu-safe-harbour-privacy-us&quot;&gt;don&apos;t use Facebook&lt;/a&gt;, not even if you&apos;re in Europe. EU laws don&apos;t protect you.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Getting away&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;So if you don&apos;t want to use Facebook, what other options are there? No worries, it&apos;s a wide, wide Web out there. Here are some options, depending on what you use Facebook for. Whether these options work for you, also depends on why you want to get away from Facebook. &lt;strong&gt;Always check who owns the platform you&apos;re considering joining&lt;/strong&gt;. This can change rapidly and dramatically!&lt;br /&gt;&lt;br /&gt;Part of this information comes from &lt;a href=&quot;https://turbofuture.com/internet/Not-Facebook-Alternative-Social-Networking-Sites&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;div style=&quot;margin-left: 40px;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;https://linkedin.com&quot;&gt;&lt;strong&gt;LinkedIn&lt;/strong&gt;&lt;/a&gt;: A professional social networking site with  approximately 347 million users worldwide. Good for maintaining  professional contacts with colleagues, clients, and others, LinkedIn can  also be used for finding jobs and recruiting employees. Now owned by Microsoft.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://twitter.com&quot;&gt;Twitter&lt;/a&gt;:&lt;/strong&gt; While smaller and more narrow in focus,  Twitter is hardly an also-ran. At last count, it boasted over 284  million active users and 500 million tweets a day. It is growing at  least as fast as Facebook and is causing quite a lot of waves with a  well-publicised role in revolutionary movements in Egypt, Iran, and  other countries. &lt;a href=&quot;https://medium.com/@thegrugq/twitter-activist-security-7c806bae9cb0#.crnj2syyw&quot;&gt;Here&lt;/a&gt; is information about staying safe as an activist on Twitter.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://pinterest.com&quot;&gt;Pinterest&lt;/a&gt;:&lt;/strong&gt; This platform revolves around the concept  of &amp;quot;pinning&amp;quot; interesting photos, web pages, articles, and other content  onto virtual noticeboards, then sharing them with people. You can  create different pinboards for different interests, events, collections,  or whatever you want. You can view things on other people&apos;s pinboards  and repin them on your own. Pinterest has over 72.8 million users and is  growing rapidly.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://instagram.com&quot;&gt;Instagram&lt;/a&gt;:&lt;/strong&gt; This isn&apos;t just a social network, but it  is being used as one by many. It&apos;s an online mobile photo-sharing,  video-sharing, and social networking service that lets users to share  images, videos, and words. Instagram says 300 million people use its  photo app every month, with 70% of them coming from outside the US.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://tumblr.com&quot;&gt;Tumblr&lt;/a&gt;:&lt;/strong&gt; Tumblr is part blog and part social  networking site. Users can create their own blogs and follow others&apos; in a  similar way to social networks. Last I checked, it had 420 million  users, probably 30-50 of which are active, and 217 million blogs.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://myspace.com&quot;&gt;MySpace&lt;/a&gt;:&lt;/strong&gt; Originally the big name in social  networking, it is most popular with young people and has 50.6 million  monthly active members. Following a re-branding, it is now a  music-orientated site targeted at young people.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://tagged.com&quot;&gt;Tagged&lt;/a&gt;:&lt;/strong&gt; A social networking site with approximately  100 million users (but no clear data on how many are active), it is now  also known as if(we). It was the subject of significant controversy in  2009 for allegedly using member&apos;s email accounts to repeatedly send  invites to all of their email contacts.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://livejournal.com&quot;&gt;&lt;strong&gt;LiveJournal&lt;/strong&gt;&lt;/a&gt;: Used to be a very popular blogging/networking site, that is still used by many groups in fandom. Currently in Russian hands, and not advertising-free. Faded glory, but still quite usable. But: hosted in Moscow, so don&apos;t consider it private or safe.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://dreamwidth.org&quot;&gt;&lt;strong&gt;DreamWidth&lt;/strong&gt;&lt;/a&gt;: Forked from LiveJournal years ago, and the better alternative if you ask me. Popular with fandom, but also good for keeping an online diary that can be as public or restricted as you want it to be. Ad-free, free to use and founded in &lt;a href=&quot;https://www.dreamwidth.org/legal/principles&quot;&gt;high ideals&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://www.joindiaspora.com/&quot;&gt;Diaspora&lt;/a&gt;:&lt;/strong&gt; This is a nonprofit, user-owned and  distributed social network that gives you full ownership and control of  all the data, photos, writing, etc. that you post. This is in direct  contrast to Facebook, whose policy is to use your data and posts however  it likes.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://ello.co&quot;&gt;Ello&lt;/a&gt;:&lt;/strong&gt; Created by a small group of artists who&apos;d  grown tired of clutter, negativity, data mining, and ads. You won&apos;t be  forced to watch videos or see ads. Instead of being the intended facebook killer, it found its niche as a thriving, supportive portfolio service for digital artists.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href=&quot;https://path.com&quot;&gt;Path&lt;/a&gt;:&lt;/strong&gt; A social network that limits you to 50  friends. The idea of this is to allow you to interact with and share  your photos, thoughts, and your life, really, with only the people you  are closest to.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://metafilter.com&quot;&gt;&lt;strong&gt;MetaFilter&lt;/strong&gt;&lt;/a&gt;: Metafilter is a weblog  that anyone can contribute a link or a comment to. This website exists to break down the barriers between people, to  extend a weblog beyond just one person, and to foster discussion among  its members. Also has subsites like AskMefi and FanFare (discussion of popular media like films and books). Good moderation. Good place to find activists.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://reddit.com&quot;&gt;&lt;strong&gt;Reddit&lt;/strong&gt;&lt;/a&gt;: A social news aggregation, web content rating, and discussion  website. Reddit&apos;s registered community members can submit content, such  as text posts or direct links. Registered users can then vote  submissions up or down to organize the posts and determine their  position on the site&apos;s pages. Beware of the dark corners, not all of this site is safe/pleasant.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://medium.com&quot;&gt;&lt;strong&gt;Medium&lt;/strong&gt;&lt;/a&gt;: in its own words, a place where everyone has a story to share and the best ones are delivered right to you.              Every day, thousands of people turn to Medium to publish their ideas and perspectives. Leaders. Artists. Thinkers.                And ordinary citizens who have a story to tell. &lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://bookcrossing.com&quot;&gt;&lt;strong&gt;BookCrossing&lt;/strong&gt;&lt;/a&gt;: a worldwide community of book lovers, who want to make the world into a library by leaving books behind in public places, for others to find.&lt;br /&gt;&amp;nbsp;&lt;/div&gt; &lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Sticking around&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;If you feel that Facebook is something you can&apos;t do without, there are still ways to cut down on the tracking and the data gathering. As always, the more of these you can do, the better it is. But even doing just one of them is already an inprovement. &lt;br /&gt;&lt;ul&gt;&lt;li&gt;Go through your privacy settings with a fine-toothed comb. Some tips &lt;a href=&quot;http://www.welivesecurity.com/2016/02/09/stay-safe-facebook-cheat-sheet/&quot;&gt;here&lt;/a&gt;, &lt;a href=&quot;https://nakedsecurity.sophos.com/2016/06/24/3-ways-to-better-secure-your-facebook-account/&quot;&gt;here&lt;/a&gt; and especially &lt;a href=&quot;https://heimdalsecurity.com/blog/facebook-security-privacy-guide/&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Harden your browser. Install NoScript (or &lt;a href=&quot;http://www.huffingtonpost.com/nate-hanson/how-to-stop-facebook-from_b_8160400.html&quot;&gt;a different blocker&lt;/a&gt;) and disallow Facebook scripts.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Have a separate browser (or browser profile) for all your Facebook activity. Allow Facebook scripts only in that one.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Don&apos;t use the Facebook app on your phone. If you must use Facebook on your phone, do it through a browser. The app is &lt;a href=&quot;https://www.hackread.com/facebook-listening-user-conversation/&quot;&gt;notorious&lt;/a&gt; for &lt;a href=&quot;http://thefreethoughtproject.com/facebook-silently-listening-stop/&quot;&gt;spying&lt;/a&gt; on &lt;a href=&quot;http://dailycaller.com/2014/09/11/facebooks-messenger-app-has-more-spyware-than-products-designed-specifically-for-surveillance/&quot;&gt;you&lt;/a&gt;. Keep in mind that your smartphone knows exactly where you are&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Follow the guidelines posted &lt;a href=&quot;http://lifehacker.com/5813990/the-always-up-to-date-guide-to-managing-your-facebook-privacy&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Bonus link!&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;This browser add-on probably doesn&apos;t make Facebook safer, as such, but it seems like it could make it more pleasant and at least better for your mental health: &lt;a href=&quot;http://www.fbpurity.com/&quot;&gt;FB Purity&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=2248&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/2248.html</comments>
  <category>facebook</category>
  <category>messengers</category>
  <category>cybersecurity</category>
  <category>social media</category>
  <category>browsers</category>
  <category>smartphone</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/1946.html</guid>
  <pubDate>Tue, 22 Nov 2016 13:32:05 GMT</pubDate>
  <title>6. Getting away from Google</title>
  <link>https://cybersecurity.dreamwidth.org/1946.html</link>
  <description>&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Why?&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;First of all, why would you want to avoid Google? Well, there are several reasons...&lt;ul&gt;&lt;li&gt;Google offers a lot of services, so they collect a lot of different data from different sources.&lt;/li&gt;&lt;li&gt;Google  connects all the data from these services into a very detailed profile,  meant to advertise at you with more precision. This is their whole  business model and they&apos;re very good at it.&lt;/li&gt;&lt;li&gt;Google is quite willing to share this profile with the US government. They only need to ask.&lt;/li&gt;&lt;li&gt;Google has been known to break promises about privacy and data retaining policy. Here&apos;s the &lt;a href=&quot;http://indiatoday.intoday.in/technology/story/google-breaks-privacy-promise-with-allo-slammed-by-snowden/1/770738.html&quot;&gt;most recent case&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;They also are known never to delete any data.&lt;/li&gt;&lt;/ul&gt;Need more reasons? I sure don&apos;t.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;How?&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;p&gt;How  can you get away from Google? There are lots of things you can do. Any  of the items listed below will decrease the stream of data that flows  from you to Google. The more you can do, the smaller it gets.&lt;br /&gt;Most of  their services have decent alternatives; some are so good you&apos;ll  be  happy you jumped ship. But before you do, clean out all that you  can.&lt;/p&gt;Check to see if your &lt;a href=&quot;https://history.google.com/history&quot;&gt;web history&lt;/a&gt; has been recorded by Google. If so, you need to wipe all of it. Do the same with your location, which Google &lt;a href=&quot;https://maps.google.com/locationhistory/b/0&quot;&gt;very kindly keeps a record of&lt;/a&gt; just for us. &lt;br /&gt;Next up: YouTube. Go to YouTube and click both &lt;strong&gt;Clear all watch history&lt;/strong&gt;, and &lt;strong&gt;Pause watch history&lt;/strong&gt;.  From now on, when watching YouTube, do it when logged out of Google, as  with all your browsing. If you need to log into your Google account for  some reason, do that in a separate browser, and log out after use.&lt;br /&gt; &lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;Stop using Google for searches&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;This  is easy. Start using a different search engine, and set your browser to  use the new one as the default. Google listens in  on your searches,  doubly so when you are logged into a Google account  (so don&apos;t do that  in your normal browser). Here are some privacy-conscious search engines.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://duckduckgo.com/&quot;&gt;DuckDuckGo&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.startpage.com/&quot;&gt;StartPage&lt;/a&gt; &amp;lt;--- my personal favourite&lt;br /&gt;&lt;a href=&quot;https://ixquick.com/&quot;&gt;Ixquick&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.qwant.com/&quot;&gt;Qwant&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://blekko.com/&quot;&gt;Blekko&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Stop using Google Docs&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Google  Docs is pretty great, which makes it seem like it&apos;s hard to quit. But  here are some alternatives. Some of them are hosted outside of the US:  always a plus.&lt;br /&gt;What we&apos;re looking for: online collaborative  document editing and sharing, with the possibility  of keeping documents  hidden from those who aren&apos;t logged in. It needs to  have some  formatting options, and to have some kind of protection  against data  loss through accidental simultaneous editing. It would be great if it  were something that can be viewed and used inside a webbrowser. It would  be nice if it were free!&lt;br /&gt;&lt;a href=&quot;http://etherpad.org/&quot;&gt;Etherpad&lt;/a&gt; is great for quick editing of simple documents in groups, in real time and with no editing conflicts.&lt;br /&gt;Here&apos;s &lt;a href=&quot;https://www.zoho.com/docs/&quot;&gt;Zoho&lt;/a&gt;. Here&apos;s &lt;a href=&quot;https://evernote.com&quot;&gt;Evernote&lt;/a&gt;. Here&apos;s &lt;a href=&quot;http://www.thinkfree.com/thinkfree/thinkfreeMain.jsp&quot;&gt;ThinkFree&lt;/a&gt;.&lt;br /&gt;&lt;a href=&quot;https://mailfence.com/&quot;&gt;Mailfence&lt;/a&gt; is in Belgium, privacy-oriented, and may be your one stop shop for docs and email.&lt;br /&gt;You could also possibly make do with &lt;a href=&quot;http://www.libreoffice.org/&quot;&gt;LibreOffice&lt;/a&gt; documents saved in &lt;a href=&quot;https://www.dropbox.com/&quot;&gt;Dropbox&lt;/a&gt; or elsewhere.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;Stop using Google Maps&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Easy-peasy. Use &lt;a href=&quot;https://wego.here.com&quot;&gt;Here,&lt;/a&gt; &lt;a href=&quot;http://www.mapquest.com/&quot;&gt;Mapquest&lt;/a&gt;, or another one of &lt;a href=&quot;http://www.brit.co/google-map-alternatives-no-wifi/&quot;&gt;several&lt;/a&gt; &lt;a href=&quot;http://beebom.com/google-maps-alternatives/&quot;&gt;sites and apps&lt;/a&gt;. Plenty of options here!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;Stop using Google Talk&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Google  Talk is Google&apos;s instant messenger. We have to make the distinction  between the service (the protocol) and the software here. Google Talk is  generally used through your browser, so many people do not use any  specific software when they are using this service (and Google&apos;s  servers). There are other protocols, as well as other software; some  well-known services are ICQ (remember? It still exists), MSN, Facebook  messenger, Jabber, and nowadays Signal and Telegram. Most services offer  their own software but can also be used through third-party software.&lt;br /&gt;&lt;br /&gt;There are a lot of options out there. The world is full of options for instant messengers. &lt;a href=&quot;https://whispersystems.org/&quot;&gt;Signal&lt;/a&gt; is said to be great for privacy; &lt;a href=&quot;https://telegram.org/&quot;&gt;Telegram&lt;/a&gt; is good too. These can be used on your desktop, laptop and smartphone. I&apos;ll write more about chat and messengers later.&lt;br /&gt;&lt;br /&gt;The  hard part with this one: getting your friends and other contacts to  join you on a different service. Usually, users of one service cannot  talk to users on another one. If this is a problem for now, you could  start using Gtalk through a third-party application for now, so you  don&apos;t have to log in into your Google account in your browser. There&apos;s  that compartimentalizing thing again!&lt;br /&gt;Good clients for desktops and laptops include &lt;a href=&quot;http://www.miranda-im.org/&quot;&gt;Miranda IM&lt;/a&gt; for Windows, &lt;a href=&quot;https://pidgin.im/&quot;&gt;Pidgin&lt;/a&gt; for Linux and &lt;a href=&quot;https://adium.im/&quot;&gt;Adium&lt;/a&gt; for OS X.&lt;br /&gt;&lt;a href=&quot;http://meetfranz.com/&quot;&gt;Franz&lt;/a&gt; is multi-platform, and in fact so is Pidgin. But there are others out there.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Stop using Google Translate&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;This is tough. Google is probably just the best option here.Try &lt;a href=&quot;http://www.bing.com/translator/&quot;&gt;Bing&lt;/a&gt;, or install some &lt;a href=&quot;http://alternativeto.net/software/google-translate/&quot;&gt;translation software&lt;/a&gt;. &lt;br /&gt;Then  again, they are certainly storing the content of the text that you are  translating, but probably not a whole lot else, as long as you&apos;re logged  out of any Google accounts. You&apos;re logged out, right?&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;&lt;br /&gt;Stop using Blogger&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Move your Blogger blog over to &lt;a href=&quot;http://www.creativebloq.com/web-design/best-blogging-platforms-121413634&quot;&gt;a different service&lt;/a&gt;.  Yes, it&apos;ll hurt a bit. But there are tons of good options. You could  clear it out and leave a link to your new home behind, if you want  people to be able to find it easily. You may lose some readers and  commenters, but you&apos;ll gain new ones.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Stop using Google+&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;Just stop. No need for a replacement.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;Stop using Google Chrome&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Start using &lt;a href=&quot;http://moem.dreamwidth.org/340185.html&quot;&gt;a different browser&lt;/a&gt;. If you&apos;re a creature of habit, Chromium is for you. &lt;br /&gt;Install it, and let it import your bookmarks. Then, in Chrome, go to &lt;strong&gt;Settings &amp;gt; Advanced Settings &amp;gt; Privacy &amp;gt; Clear Browsing Data&lt;/strong&gt;. Tick all the boxes, so it all gets deleted. &lt;br /&gt;Finally, delete your Google Chrome profile from your computer. In Windows it&apos;s generally stored in &lt;strong&gt;C:/Users/[yourusername]/AppData/Local/Go&lt;wbr&gt;&lt;/wbr&gt;ogle/Chrome/User Data&lt;/strong&gt;. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Stop using Google Mail&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;I   know this is a big step! It&apos;s fine not to do this straight away. It is  a  step that has a lot of positive impact on your privacy, so it&apos;s a  great thing to do, but save it  for last if you&apos;re finding it scary.&lt;br /&gt;Before  you switch to another  email provider, which is something I strongly  recommend, go into your  Gmail account and clean out all email that you  don&apos;t care about; then  set up Thunderbird (or a different email client  of your choice) and  download all the email you want to keep. &lt;a href=&quot;https://www.lifewire.com/gmail-access-thunderbird-1173150&quot;&gt;Here&apos;s how&lt;/a&gt;. Also download your address book: &lt;a href=&quot;https://www.lifewire.com/import-gmail-contacts-to-thunderbird-1173152&quot;&gt;here&apos;s how&lt;/a&gt;.&lt;br /&gt;Go   back into your Gmail account and delete everything. All emails and all   addresses. We don&apos;t know how deleted they really are. But it may help.&lt;br /&gt;Now you&apos;re ready to sign up with a &lt;a href=&quot;http://moem.dreamwidth.org/339431.html&quot;&gt;non-US email provider that offers encryption&lt;/a&gt;. Congratulations!&lt;br /&gt;&lt;br /&gt;Now, the ultimate step is to delete your Google account. If and when you&apos;re ready.&lt;br /&gt;&lt;br /&gt;Further reading on getting away from Google:&lt;br /&gt;&lt;a href=&quot;http://lifehacker.com/5876794/going-google-free-the-best-alternatives-to-google-services-on-the-web&quot;&gt;Going Google-Free: The Best Alternatives to Google Services on the Web&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://impossiblehq.com/complete-guide-leaving-google/&quot;&gt;How To De-Google-ify Your Life: The Complete Guide To Leaving Google&lt;/a&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;a href=&quot;https://raventools.com/blog/google-alternatives/&quot;&gt;The Best Google Alternatives For Email, Search, Docs and Everything Else&lt;/a&gt;&lt;em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;As always: if I&apos;m in the wrong, please set me straight and steer me to decent sources. Thank you!&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=1946&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/1946.html</comments>
  <category>email</category>
  <category>messengers</category>
  <category>cybersecurity</category>
  <category>google</category>
  <category>chrome</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/1589.html</guid>
  <pubDate>Tue, 22 Nov 2016 13:26:07 GMT</pubDate>
  <title>5. Password policy</title>
  <link>https://cybersecurity.dreamwidth.org/1589.html</link>
  <description>Passwords are the keys to our online lives. With our passwords, people  can read our email, post on our social media accounts, see our banking  data... and lock us out of our own accounts. So it&apos;s important to treat  them with great care. But how? Here are a few hints on a good password  policy.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Do not reuse passwords, ever. Reusing passwords means  that breaking into one of your accounts also compromises others. At the  very least, add some letters that differ for each site.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Switch to two-factor authentication wherever you can.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Do not keep the same passwords forever. It&apos;s good practice to change them every year, especially the important ones.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Do  not use passwords such as your date of birth, partner&apos;s first name, or  pet&apos;s name. People can find those easily by looking at social media or  even talking to you or your friends.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Do not rely too much on  often-used substitutions of letters by numbers. A zero instead of the  letter o is not exactly hard to guess.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;If you have trouble remembering your passwords, use a password manager. Read more about that &lt;a href=&quot;http://thehackernews.com/2016/07/best-password-manager.html&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;It&apos;s  not a horrible solution to write important passwords down, as long as  you make sure you&apos;re not leaving them in places where others can find  them.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;An option could be to create them in the form of fake  &apos;people&apos;, stored in an address book (either digital or physical), whose  made-up names help you remember what they belong to, and whose address  or telephone numbers are the password. If you saw &apos;Amalia 035-3445899&apos;  written down in my little black book, would you think that was a  password hint for my Amazon password? It&apos;s not, but it could have been.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Another  way to make a decent password that&apos;s easy to remember is to make a  sentence that&apos;s meaningful to you, and use the first letters of each  word to form your password. For example: the sentence &apos;My old aunt Emmy  has 3 pretty cute Greyhounds&apos; stands for the password MoaEh3pcG but is a  lot easier to remember, especially if you use it for your account on  the website where you buy your dog food, or the social network where  your aunt always posts pictures of her dogs.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;If it&apos;s  allowed, you could also use four (or more) random words that you can  easily remember by drawing a picture of them in your mind, instead of a  hard to remember and much shorter &apos;normal&apos; password. Let &lt;a href=&quot;https://xkcd.com/936/&quot;&gt;XKCD&lt;/a&gt; guide you here (just do not reuse his example).&lt;/li&gt;&lt;/ul&gt;Further reading on good password practices:&lt;br /&gt;&lt;a href=&quot;https://www.cnet.com/how-to/the-guide-to-password-security-and-why-you-should-care/&quot;&gt;Cnet&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/&quot;&gt;HowToGeek&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=1589&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/1589.html</comments>
  <category>passwords</category>
  <category>cybersecurity</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/1518.html</guid>
  <pubDate>Tue, 22 Nov 2016 13:22:49 GMT</pubDate>
  <title>4. Browser hardening</title>
  <link>https://cybersecurity.dreamwidth.org/1518.html</link>
  <description>As we&apos;ve established, we&apos;re not going to give up the internet. It&apos;s  informative and it&apos;s full of cats. But we do want to be safer while  doing it, and less trackable. So how can we make this happen? Let&apos;s take  a good look at the tool we use to look at the web: our browser.&lt;br /&gt;&lt;br /&gt;Browsers  help us view a lot of information. But the information stream goes both  ways. Websites that we visit gather a lot of information about us, if  we let them. For example, the fact that we&apos;ve visited a website is  generally logged. But also whether or not an individual picture has been  shown in our browser, and that picture may very well be hosted on a  different server (so we don&apos;t even know who is getting that  information). Previous browsing history is collected, too. Our searches  are logged, and also specific information about our computer (such as  installed fonts and plugins) and location. All of this makes it quite  possible to pinpoint a specific computer user, and follow them around  from one website to another. &lt;a href=&quot;http://venturebeat.com/2013/03/04/online-tracking/&quot;&gt;Here&lt;/a&gt; and &lt;a href=&quot;http://www.online-tech-tips.com/computer-tips/what-type-of-data-do-websites-collect-about-you/&quot;&gt;here&lt;/a&gt; is some information on how that works.&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;&lt;br /&gt;Browsers&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;There are more browsers than you can shake a stick at, even if you&apos;re very good at shaking sticks. &lt;br /&gt;I  would recommend not using anything made by or in cooperation with any  of the big corporations: Google, Microsoft, Apple. So that means: it&apos;s  best to avoid Chrome, Internet Explorer / Edge, and Safari. Here are  some options:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://www.mozilla.org/en-US/firefox&quot;&gt;Firefox&lt;/a&gt;. A good old standard that used to be innovative. Has a LOT of good privacy enhancing add-ons available. &lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Win, Linux, OS X, Android.&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;http://www.seamonkey-project.org/&quot;&gt;Seamonkey&lt;/a&gt;.  My personal favourite. Classic looks, robust features. Comes as a  suite, bundled with (good!) software for email, HTML editing and IRC (=  Internet Relay Chat). &lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Win, Linux, OS X&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;.&lt;br /&gt;&lt;a href=&quot;http://www.palemoon.org/&quot;&gt;Pale Moon&lt;/a&gt;. A Firefox fork. Like Firefox before they got the Chrome-like interface. &lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Win, Linux.&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;a href=&quot;https://www.chromium.org/Home&quot;&gt;Chromium&lt;/a&gt;. Like Chrome, but not linked to Google. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Open source. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Win, Linux, OS X, Android&lt;/span&gt;&lt;/span&gt;.&lt;br /&gt;&lt;a href=&quot;http://www.srware.net/en/software_srware_iron.php&quot;&gt;Iron&lt;/a&gt;. Based on Chromium, but the makers claim it&apos;s fully anonymized. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Win, Linux, OS X, Android&lt;/span&gt;&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://www.slimjet.com/&quot;&gt;SlimJet&lt;/a&gt;. &lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Another Chromium fork. &lt;/span&gt;A newcomer. I heard good things, seems pretty privacy-centered. Win, Linux.&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href=&quot;https://vivaldi.com/&quot;&gt;Vivaldi&lt;/a&gt;. Technically similar to Chrome. A newcomer. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Win, Linux, OS X&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;.&lt;br /&gt;&lt;a href=&quot;http://www.opera.com/&quot;&gt;Opera&lt;/a&gt;. Now uses the same rendering engine as Chrome. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Win, Linux, OS X, Android&lt;/span&gt;&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;This  list is by no means exhaustive. Some others are listed &lt;a href=&quot;http://www.techworld.com/security/best-8-secure-browsers-2016-3246550/&quot;&gt;here&lt;/a&gt;. &lt;br /&gt;Browsers are a personal preference.  Pick your favourite... then pick another one and another one. Why?  Because:&lt;/p&gt;- Not all browsers are compatible with all websites.&lt;br /&gt;-  It&apos;s good to have separate browsers for specific activities. Google and  Facebook come to mind. If you need to use these, and especially if you  use them in such a way that requires you to log in, then it&apos;s a whole  lot safer to run them in a browser that&apos;s just for those activities.  Compartimentalize!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Add-ons&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Add-ons  are small pieces of helper software that add functionality to your  browser. There are a lot of add-ons that can increase privacy and  security. Most of them can be installed through a feature inside the  browser (add-on manager) or on a specific webpage that lists all of them  for your specific browser. Here are some good ones.&lt;br /&gt;&lt;br /&gt;Adblockers:&lt;br /&gt;&lt;strong&gt;AdBlock Plus&lt;/strong&gt;  used to be good. Nowadays it&apos;s not the best option anymore. Will allow  some &apos;non-intrusive&apos; ads unless you tell it not to; if you&apos;re running  this, check the settings carefully.&lt;br /&gt;&lt;strong&gt;UBlock Origin&lt;/strong&gt; is a better replacement for AdBlock Plus. Blocks adds really well and can hide stuff you don&apos;t want to see.&lt;br /&gt;&lt;br /&gt;Tracker blockers: &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;strong&gt;Ghostery&lt;/strong&gt; used to be very good, but now needs it settings checked carefully, and &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;a user account in order to see full tracker info.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Disconnect&lt;/strong&gt; does much the same thing and is said to be good.&lt;br /&gt;&lt;strong&gt;Privacy Badger &lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;protects your privacy by blocking spying ads and invisible trackers.&lt;br /&gt;&lt;br /&gt;Other:&lt;br /&gt;&lt;strong&gt;DecentralEyes&lt;/strong&gt; &lt;/span&gt;&lt;/span&gt;protects  you against tracking through &amp;quot;free&amp;quot;, centralized, content  delivery. It  prevents a lot of requests from reaching networks like  Google Hosted  Libraries, and serves local files to keep sites from  breaking.  Complements regular content blockers.&lt;br /&gt;&lt;strong&gt;Selfdestructing Cookies&lt;/strong&gt; allows you to accept cookies, and then gets rid of them automatically when you&apos;re done with them.&lt;br /&gt;&lt;strong&gt;NoScript &lt;/strong&gt;keeps sites from executing Javascript on a case by case basis. Lets you whitelist and blacklist sites.&lt;br /&gt;&lt;br /&gt;My advice would be:&lt;br /&gt;- For starters: run an adblocker because it makes the web so much safer, faster and more pleasant.&lt;br /&gt;-  Add a way to deal with cookies. Can be a browser setting or an add-on.  Accept them selectively or accept them but do not keep them. &lt;br /&gt;- Add DecentralEyes just because you can, if you can.&lt;br /&gt;-  Finally add NoScript. It&apos;s a bit of a pain but it works very well. You  can allow Facebook-scripts in your dedicated FB-browser and not anywhere  else. Same with Google.&lt;br /&gt;You&apos;ll have to adjust this recipe for your OS, browser and personal preferences.&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;Search engines&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt; &lt;br /&gt;Step  away from the Google. Google is not your friend. Google listens in on  your searches, doubly so when you are logged into a Google account (so  don&apos;t do that). Here are some privacy-conscious search engines.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://duckduckgo.com/&quot;&gt;DuckDuckGo&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.startpage.com/&quot;&gt;StartPage&lt;/a&gt; &amp;lt;--- my personal favourite&lt;br /&gt;&lt;a href=&quot;https://ixquick.com/&quot;&gt;Ixquick&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://www.qwant.com/&quot;&gt;Qwant&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://blekko.com/&quot;&gt;Blekko&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;What about Private Browsing /Incognito Mode?&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;That only limits what gets saved to your own computer. It has no influence on what gets sent to others.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&apos;Safe&apos; Browsing&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Mozilla-based browsers (Firefox, SeaMonkey, and others but apparently &lt;em&gt;not&lt;/em&gt; Pale Moon), and also Chrome and Safari, have an option called Safe Browsing. If that is switched on, pages get checked against a blacklist hosted by... Google. It&apos;s a useful feature in principle, but it means that Google gets to keep tabs on your browsing, which is one of the things we&apos;re trying to avoid! &lt;br /&gt;Once you have add-ons installed that block ads, scripts and other potential security risks, it&apos;s better for your privacy to switch the Safe Browsing feature off. More information &lt;a href=&quot;http://www.sitepronews.com/2014/10/01/googles-safe-browsing-service-killing-privacy/&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;Another way to compartimentalize (slightly more advanced)&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/strong&gt;If you really really &lt;em&gt;really&lt;/em&gt;  like Firefox (for example), and can&apos;t get to grips with any other  browser, there&apos;s another way to make separate &apos;sandboxes&apos; for things  like Facebook and Google: you can set up different profiles, and make  icons on your desktop that start an instance of Firefox working in each  of these profiles. Name them after what you&apos;re going to use them for and  set the settings accordingly in each of them. &lt;br /&gt;Hey presto, separate  browser profiles for your different activities. That means data from  your surfing behaviour in one instance will not bleed over into the  Facebook usage in another instance, even when they&apos;re running at the  same time.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;strong&gt;Bonus!&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Firefox settings, including tracking prevention settings, made easy: &lt;a href=&quot;https://ffprofile.com/&quot;&gt;FF Profile Maker&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;If you want to go further...&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Want more anonymity? There&apos;s the &lt;a href=&quot;https://www.torproject.org/projects/torbrowser.html.en&quot;&gt;Tor browser&lt;/a&gt;,  a modified Firefox with extra security features for fully anonymous  surfing. I don&apos;t use it, but you might want to, so here&apos;s a &lt;a href=&quot;http://www.pcworld.com/article/2686467/how-to-use-the-tor-browser-to-surf-the-web-anonymously.html&quot;&gt;how-to&lt;/a&gt; or &lt;a href=&quot;http://www.makeuseof.com/tag/really-private-browsing-an-unofficial-users-guide-to-tor/&quot;&gt;two&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=1518&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/1518.html</comments>
  <category>google</category>
  <category>cybersecurity</category>
  <category>firefox</category>
  <category>addons</category>
  <category>browsers</category>
  <category>tor</category>
  <lj:security>public</lj:security>
  <lj:reply-count>2</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/1276.html</guid>
  <pubDate>Tue, 22 Nov 2016 12:12:55 GMT</pubDate>
  <title>3. Email providers</title>
  <link>https://cybersecurity.dreamwidth.org/1276.html</link>
  <description>&lt;p&gt;Let&apos;s start off with something fairly easy: getting your email off of  US soil. If you&apos;re using a Europe based provider, they can&apos;t be  subpoenaed into handing over your data. That is exactly the result we  are after.&amp;nbsp; A US company, like Google, can be forced to hand over your data even if that data is not stored in the US, according to &lt;a href=&quot;http://www.reuters.com/article/us-google-usa-warrant-idUSKBN15J0ON&quot;&gt;this article&lt;/a&gt;. Just another reason to avoid them like the plague.&lt;br /&gt;&lt;br /&gt;Here are some good and mostly free options; keep in mind  that a good, reliable and secure email provider is in my view well worth  a few dollars. Most of the free providers also offer a paid option with  more features, more storage, and so on.&lt;br /&gt;These providers generally offer an English-language interface; one less thing to worry about.&lt;br /&gt;&lt;br /&gt;All  of those listed below offer built-in encryption, that you don&apos;t have to  know anything about in order to use. You may feel that you do not  actually need that, but it&apos;s a valuable layer of security. Then again,  if your goal is just to get away from Google and/or get your email into a  place where the US government can&apos;t easily reach, you have a lot more  options (see links below).&lt;/p&gt;&lt;table width=&quot;600&quot; cellspacing=&quot;1&quot; cellpadding=&quot;0&quot; border=&quot;0&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;https://www.openmailbox.org/&quot;&gt;OpenMailbox&lt;/a&gt; (FR)&lt;/td&gt;&lt;td&gt;&amp;nbsp;Free&lt;/td&gt;&lt;td&gt;Encryption, POPmail, IMAP&lt;/td&gt;&lt;td&gt;&amp;nbsp;1 GB storage&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;https://www.protonmail.ch/&quot;&gt;ProtonMail&lt;/a&gt; (CH)&lt;/td&gt;&lt;td&gt;&amp;nbsp;Free&lt;/td&gt;&lt;td&gt;Encryption, webmail&lt;/td&gt;&lt;td&gt;&amp;nbsp;0.5 GB storage&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;https://www.tutanota.com/&quot;&gt;Tutanota&lt;/a&gt; (DE)&lt;/td&gt;&lt;td&gt;&amp;nbsp;Free&lt;/td&gt;&lt;td&gt;Encryption, webmail&lt;/td&gt; &lt;td&gt;&amp;nbsp;1 GB storage&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;https://www.mailfence.com/&quot;&gt;Mailfence&lt;/a&gt; (BE)&lt;/td&gt;&lt;td&gt;&amp;nbsp;Free&lt;/td&gt;&lt;td&gt;Encryption, webmail, POPmail, IMAP&lt;/td&gt; &lt;td&gt;&amp;nbsp;0.2 GB storage&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;a href=&quot;https://www.startmail.com/&quot;&gt;StartMail&lt;/a&gt; (NL)&lt;/td&gt;&lt;td&gt;&amp;nbsp;&amp;euro; 49,50/year&lt;/td&gt;&lt;td&gt;Encryption, webmail, IMAP&lt;/td&gt; &lt;td&gt;&amp;nbsp;10 GB storage&lt;/td&gt; &lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;You&apos;ll find more options listed &lt;a href=&quot;https://www.privacytools.io/#email&quot;&gt;&lt;u&gt;here&lt;/u&gt;&lt;/a&gt; and &lt;a href=&quot;https://www.vegard.net/archives/11906/&quot;&gt;&lt;u&gt;here&lt;/u&gt;&lt;/a&gt;. These lists also show providers that do not offer built-in encryption.&lt;br /&gt;&lt;br /&gt;Some of you are probably familiar with Lavabit. That is a privacy-concious provider whom the US government tried to force into giving up their data (and its encryption keys) in 2013 because they had an account that belonged to Snowden. The owner responded by pulling the plug and did not give up the data. &lt;a href=&quot;https://lavabit.com&quot;&gt;Now they are (soon to be) back&lt;/a&gt;. I would trust these people but their service is on the geeky/techy side. They are preparing to offer 5GB of storage for $30 a year and they are quite serious about security. Not bad!&lt;/p&gt;If  you have your own domain name, another option to get e-mail service is  by using the service offered by your domain hosting provider, if they  offer that; of course, they may be using servers in the US, so you&apos;d  need to check that first. But for some of us, that&apos;s a good option, with  the added advantage that your email address never needs to change for  the rest of your life if you don&apos;t want it to.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Bonus!&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Need a free throwaway email address for one hour only, with no records kept? &lt;a href=&quot;https://fade.email/&quot;&gt;Here you go&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Protection level and limitations&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;How  much does having a EU provider protect you? That&apos;s hard to say. If you  have a provider that you trust, the chance that they will hand your data  over to the US government is definitely smaller, because they can&apos;t be  forced to do that as easily as a US-based company can. So that is a  certain level of security.&lt;br /&gt;&lt;br /&gt;However, there are some reasons why &apos;they&apos; can still get your data:&lt;br /&gt;- The receiver may use a US provider, who may be forced to hand its data over. &lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-left: 40px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;This  would of course give them only a access to segment of your sent emails.  Sure, they can probably puzzle all your email traffic together this  way, but it&apos;s harder and more expensive than just asking Gmail to give  them the whole batch.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;- Data has to travel somehow. It needs to travel through US servers to reach you, and can be read on the way.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-left: 40px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;If  your provider uses secure POP, secure IMAP and secure SMTP (usually  done through something called TLS) then your data is encrypted on the  way from your computer to your email provider&apos;s server and back. That  helps, for sure. Pay attention to whether your provider of choice offers  TLS or its predecessor, SSL. You don&apos;t need to know how they work, just  make sure that they offer them so you can use them. It&apos;s generally a  server setting in your email program.&lt;br /&gt;Webmail is generally protected by the HTTPS protocol (S for Secure).&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;It&apos;s  good to realise that you are by definition leaving a trail when you&apos;re  sending email. Anything you can do to obfuscate that trail helps keep  you a little bit more secure. But using a non-US email provider is not a  panacaea. &lt;br /&gt;End-to-end encryption offers a lot more protection, but  for most of us, that&apos;s just not feasible, at least not all the time. If  you&apos;re interested, &lt;a href=&quot;https://www.enigmail.net/index.php/en/&quot;&gt;Enigmail&lt;/a&gt; combined with &lt;a href=&quot;http://www.pgpi.org/&quot;&gt;PGP&lt;/a&gt; (Pretty Good Privacy) is a good option for POP and IMAP, and runs as an add-on in Thunderbird and SeaMonkey Mail.&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;What are POPmail, IMAP&amp;nbsp;and webmail?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Webmail  is email that you read and write on a webpage, as shown by your browser  of choice (such as Firefox). Can be useful to those who want to use  email on the go, on computers that aren&apos;t their own. No e-mail software  is needed.&lt;/li&gt;&lt;li&gt;POPmail is email that you download into your own  computer, using e-mail software such as Thunderbird (or Outlook, but  let&apos;s not go there). Can be useful to those who want to keep control  over their stored emails. Be sure to make backups now and then.&lt;/li&gt;&lt;li&gt;IMAP&amp;nbsp;is  email that you view through e-mail software but that lives on your  provider&apos;s server, not yours. Can be useful to those who use several  computers for their email and want to keep things synched, yet prefer  email software over webmail.&lt;/li&gt;&lt;/ul&gt;Using e-mail software (also  called an e-mail client) has the advantage that you can add a digital  signature as well as encryption.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;This blog post has been edited on November 13 and 16, based on feedback from readers. Thank you!&lt;br /&gt;New links have been added on December 3.&lt;br /&gt;More links added on February 8 2017.&lt;br /&gt;&lt;/em&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=1276&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/1276.html</comments>
  <category>google</category>
  <category>encryption</category>
  <category>providers</category>
  <category>cybersecurity</category>
  <category>email</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/788.html</guid>
  <pubDate>Tue, 22 Nov 2016 11:52:42 GMT</pubDate>
  <title>2. A list of things you can do</title>
  <link>https://cybersecurity.dreamwidth.org/788.html</link>
  <description>&lt;p&gt;A lot of people are worried about their level of online privacy and  safety lately, for reasons that shouldn&apos;t be too hard to understand. The  big thing here is that US companies collect data, and the US   government can grab hold of that data if they feel there&apos;s a need; if   you are now under a government that you distrust, it makes sense to   reduce the amount of data that you hand over to US-based companies.  &lt;br /&gt;Here&apos;s  a list of things you can do. Some are easy and some are hard, but   every one of them can help. Even if you can only do one of these things,  it&apos;s worth doing.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Here&apos;s the hardest one,  for many of you:  Get off of Facebook. Facebook collects a LOT of data,  even when you&apos;re  not on it. It&apos;s not just what you post on Facebook,  it&apos;s also about  your surfing habits on other sites, and a lot more. All  this data is  under the control of a man who called his users &apos;dumb  fucks&apos; for  trusting him. If that offends you, good! It should. If you  feel you  cannot do without Facebook, consider abandoning your account  and  setting up a new one, using an altered version of your name, and   reconnecting with your friends on that. Changes like that help obfuscate   your digital trail.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Get away from Google. I will post  in  more details about this later, because Google is an ecosystem that   consists of a lot of services. Most of them have good replacements! The   very fact that Google has all these services is also why it&apos;s so   potentially dangerous: they collect a LOT of different data from all   those sources and combine it all into a very detailed profile. Need a   good search engine? Try &lt;a href=&quot;http://startpage.com&quot;&gt;StartPage&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Get   your e-mail off of US soil. Use an e-mail provider that&apos;s hosted in   Europe and offers encryption. There are plenty of them and some of the  good ones are free.  More information on that is now posted &lt;a href=&quot;http://moem.dreamwidth.org/339431.html&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Compartimentalize.   Use different browsers for different purposes. Use different providers   for different services, so that your data is split up and therefore  less  meaningful. Keep your profiles on social media and other websites   separate. (I know, I don&apos;t always do that either. But I do have a few   online hangouts that you probably don&apos;t know about.)&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Here&apos;s   another hard one. Don&apos;t use a smartphone. If you must, be very wary of   the apps you install. Review and think about the permissions your apps   ask to use. Can they also operate with less? Switch it off when it&apos;s  not  in use. If you can make do with a nonsmart cellphone, or use that  for  phone calls and use your smartphone for data only, do that. That&apos;s   compartimentalizing too.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Here&apos;s some easy stuff! Use   adblockers and other browser add-ons that improve privacy. Your surfing   experience will be safer and faster and the sites you visit will look   nicer! This is another good topic for a &lt;a href=&quot;http://moem.dreamwidth.org/340185.html&quot;&gt;separate post,&lt;/a&gt;  but for  now I&apos;ll throw out some names: UBlock Origin, Ghostery,  BetterPrivacy,  PrivacyBadger, DecentralEyes, SelfDestructing Cookies.  If you use Ghostery, be sure to check the settings carefully, as the  default is not great.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Also easy: if a service you are using  offers two-factor authentication, set that up. It makes your accounts a  lot harder to  break into. This is especially important for webmail  accounts, since they are often the key to a lot of other things, because  many services use email to reset passwords.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Another fairly  easy one, and we should all be doing this already: use good, strong  passwords and be smart about using them. Read more on that &lt;a href=&quot;http://moem.dreamwidth.org/340412.html&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;Learn   to use an e-mail client that supports encryption. You may not need it   now, but it&apos;s a good option to have. Thunderbird is just fine for this;   with the add-ons Enigmail and GPG installed, it works well. It&apos;s also  an all-around good e-mail program. And if more people use encryption,   those who use it won&apos;t stand out anymore. Remember when mail used to be   private? E-mail should be private, too.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;If you haven&apos;t yet,  consider getting away from Apple and Microsoft. Linux  isn&apos;t just for   geeks anymore. There are several good looking, easy to use Linux based  OSses nowadays, they can run on most of the hardware that you are using,  and they are free. Ask your friendly local nerd or  cybersmart  cousin  to show you Linux Mint. Bonus: your computer will  probably run  faster,  and will not need to be replaced as rapidly!&lt;/li&gt;&lt;br /&gt;&lt;li&gt;One of the best  things you  could do would be to attend a cryptoparty: an interactive  workshop  about cybersecurity, often aimed at beginners. Find out &lt;a href=&quot;https://www.cryptoparty.in/&quot;&gt;here&lt;/a&gt; when and where they are happening. A good place to ask about this would also be your local &lt;a href=&quot;http://hackerspaces.org/&quot;&gt;hackerspace&lt;/a&gt;;   hackerspaces are physical spaces (as in, buildings/rooms) where people   get together to tinker and to share knowledge about many things,   cybersecurity being one of them. Don&apos;t worry about the bad reputations   of hackers; there are good reasons why malicious hackers generally stay   away from hackerspaces (they don&apos;t need them, they aren&apos;t welcome, and   they don&apos;t want the extra visibility).&lt;/li&gt; &lt;br /&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=788&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/788.html</comments>
  <category>browsers</category>
  <category>addons</category>
  <category>providers</category>
  <category>passwords</category>
  <category>list</category>
  <category>social media</category>
  <category>facebook</category>
  <category>email</category>
  <category>messengers</category>
  <category>encryption</category>
  <category>cybersecurity</category>
  <category>google</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/763.html</guid>
  <pubDate>Tue, 22 Nov 2016 11:27:21 GMT</pubDate>
  <title>1. Some general notes</title>
  <link>https://cybersecurity.dreamwidth.org/763.html</link>
  <description>&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;The tradeoff&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Cybersecurity  always comes at a price: most often, the price is convenience. This is  no coincidence. The parties who want your data need to bribe you into  handing it over, and convenience is one of the best things they have to  offer. So they make all these nifty tools, that make your life so much  easier; who wouldn&apos;t want that? And the easiest, most default mode is  always, always the mode in which you end up exposing yourself more.&lt;br /&gt;&lt;br /&gt;Yes,  it&apos;s inconvenient to avoid Google (more on that later!), to stay off of  Facebook and Twitter, to use more different providers to keep your  stuff compartimentalized. It&apos;s mighty convenient to just use your Google  or Facebook login everywhere, to stay logged in to all these services,  and not to have to enter passwords all the time. And it&apos;s just so  convenient to reuse the same password everywhere, and not change it  ever.&lt;br /&gt;&lt;br /&gt;But convenience, too, comes at a price. All these nifty  free tools and services aren&apos;t free: you pay with your data. You might  say that you don&apos;t care and they can have it, and who is interested in  you anyway? You are not that important after all. (And out comes the  dreaded &apos;I don&apos;t have anything to hide&apos;. But more about that later.)&lt;br /&gt;But  you are important. You&apos;re oh so very important and interesting. Because  you are a consumer, and you buy stuff; building a profile of you that&apos;s  as detailed as possible allows you to be advertised at in a very  precise way. Now you are probably thinking: But I don&apos;t respond to  advertising, I never buy the stuff I see in ads. I&apos;m afraid that&apos;s  probably not true. We all respond to advertising; it can&apos;t be helped.&lt;br /&gt;&lt;br /&gt;You  might also say: cool, so they have a profile of me for targeted  advertising. That&apos;s not so bad, is it? It means I&apos;ll see less ads for  stuff that I don&apos;t care about.&lt;br /&gt;Well, of course that is up to you. But  who has access to your profile? You don&apos;t know that. It&apos;s certainly not  you: you don&apos;t get to see it. But your government might. Your employer,  or a potential future employer, might. Your insurance provider might.  Other parties might, and they might not have your best interest in mind.  Data can be sold, and it can be stolen. Who gets access to your  information, now or in a year or in ten years?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;What we can do&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;So if that makes us uncomfortable, what can we do? Some people say: &lt;em&gt;Nothing.  You&apos;re on the internet, stop worrying about it because there is nothing  you can do. They already know all there is to know about you.&lt;/em&gt; But I don&apos;t buy that, and here&apos;s why.&lt;br /&gt;1) It&apos;s fatalistic and we don&apos;t know whether it&apos;s actually true. Why pick the most depressing option if you have a choice?&lt;br /&gt;2)  There is actually a lot that the internet doesn&apos;t know about me and I&apos;m  sure the same goes for you. I intend to keep it that way if I can help  it.&lt;br /&gt;3) Data rots. It gets outdated. We don&apos;t stay the same all of our  lives; not even our bodies stay the same. We grow thinner, fatter,  older, sicker, healthier. Some of us get pregnant, some of us gain  disabilities, some of us get surgery of all kinds. We all change all the  time and so the best data is fresh data. Even if they knew all about  you right now, it would still make sense to stop leaking data now.&lt;br /&gt;4)  It&apos;s not a matter of all or nothing. There is a whole spectrum between a  wide open empty doorframe and a solid steel vault door with ten  different locks on it. Just because we can&apos;t hide everything from view,  that&apos;s no reason to give up and not attempt to keep anything to  ourselves. Even if there are conveniences we don&apos;t want to give up on,  there are probably things we can do that make a difference.&lt;br /&gt;&lt;br /&gt;So what &lt;em&gt;can&lt;/em&gt;  we do? Here&apos;s a thing we can&apos;t do: we can&apos;t make ourselves invisible on  the internet, not if we intend to keep using it (which I do, and you  probably do too). It&apos;s not about vanishing from the web. It&apos;s about  making your tracks  vaguer, fewer, more fragmented and harder to follow.  And harder to follow means: &lt;em&gt;more expensive&lt;/em&gt; to follow.  Investigating people is, after all, not free: there are costs involved.  There is a limited budget reserved  for following us non-notorious  folks; what we&apos;re trying to do here is  becoming more expensive to  track. We want to strain the budget, making it impossible to follow  everyone, and make  ourselves less worth the trouble&lt;strong&gt; &lt;/strong&gt;(= money).&lt;strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;What we&apos;ll get in return&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;As  we&apos;ve seen, there is always a price to be paid, generally a larger or  smaller loss of convenience. I feel better about this when I think about  it as a choice: a small price that I&apos;m gladly paying in exchange for  personal freedom. That&apos;s s small mind hack that not everyone may be able  to pull off, but it&apos;s worth a try.&lt;br /&gt;An example... Since I dumped  Windows and switched to Linux, I need to enter my password every time I  download updates for my computer. Newcomers to Linux often find this  unnecessary and annoying, and ask in the forums how they can get around  that. But it&apos;s such a small thing really. And it&apos;s not that hard to see  it as a good thing: I&apos;m entering my password because that helps keep my  computer safe. Yay password that keeps my system safe and happy!&lt;br /&gt;&lt;br /&gt;The  problem with this kind of thing is that there is no tangible reward.  Google will never knock on your door saying &apos;What happened? We never  hear from you anymore.&apos; Bill Gates isn&apos;t going to send you a Hallmark  card that says &apos;I miss you, let&apos;s get back together&apos;.&lt;br /&gt;So that can be  frustrating. If we want to improve our cybersecurity, we&apos;ll be giving up  on certain things that are convenient or fun, and we&apos;ll never get any  feedback. That&apos;s not entirely true because there are some tests you can  run... but that&apos;s about it.&lt;br /&gt;&lt;br /&gt;What we can gain in the short term is  peace of mind, and not much else. So if you&apos;re not worried, there&apos;s not  a lot of reason for you to be reading this. But if you are, keep  reading, because there&apos;s a lot more coming up. And in the long term, you  may be saving your own ass.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=763&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/763.html</comments>
  <category>cybersecurity</category>
  <lj:security>public</lj:security>
  <lj:reply-count>0</lj:reply-count>
</item>
<item>
  <guid isPermaLink='true'>https://cybersecurity.dreamwidth.org/431.html</guid>
  <pubDate>Tue, 22 Nov 2016 11:15:27 GMT</pubDate>
  <title>Index</title>
  <link>https://cybersecurity.dreamwidth.org/431.html</link>
  <description>&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;Index&lt;/span&gt;&lt;/strong&gt;&lt;ul&gt;&lt;li&gt;Part 1 is about &lt;a href=&quot;https://cybersecurity.dreamwidth.org/763.html&quot;&gt;&lt;strong&gt;cybersecurity in general&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 2 is a list of &lt;a href=&quot;https://cybersecurity.dreamwidth.org/788.html&quot;&gt;&lt;strong&gt;things you can do&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 3 is about &lt;a href=&quot;https://cybersecurity.dreamwidth.org/1276.html&quot;&gt;&lt;strong&gt;e-mail providers&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 4 is about &lt;a href=&quot;https://cybersecurity.dreamwidth.org/1518.html&quot;&gt;&lt;strong&gt;browsers&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 5 deals with &lt;a href=&quot;https://cybersecurity.dreamwidth.org/1589.html&quot;&gt;&lt;strong&gt;password policy&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 6 is about &lt;a href=&quot;https://cybersecurity.dreamwidth.org/1946.html&quot;&gt;&lt;strong&gt;getting away from Google&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 7 is about &lt;a href=&quot;https://cybersecurity.dreamwidth.org/2248.html&quot;&gt;&lt;strong&gt;Facebook&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 8 deals with &lt;a href=&quot;https://cybersecurity.dreamwidth.org/2499.html&quot;&gt;&lt;strong&gt;smartphones&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 9 is about &lt;a href=&quot;https://cybersecurity.dreamwidth.org/2781.html&quot;&gt;&lt;strong&gt;VPNs&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 10 is about &lt;a href=&quot;https://cybersecurity.dreamwidth.org/3347.html&quot;&gt;&lt;strong&gt;Instant Messaging and Chat&lt;/strong&gt;&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Part 11: &lt;a href=&quot;https://cybersecurity.dreamwidth.org/3677.html&quot;&gt;&lt;strong&gt;Carrying data and devices across US borders&lt;/strong&gt;&lt;/a&gt; &amp;lt;--- in progress&lt;/li&gt;&lt;/ul&gt;Other stuff:&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/3262.html&quot;&gt;&lt;strong&gt;A warning&lt;/strong&gt;&lt;/a&gt; about the FamilyTree website.&lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;Upcoming subjects&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Making the switch to Linux&lt;/li&gt;&lt;/ul&gt;&lt;strong&gt;&lt;span style=&quot;font-size: larger;&quot;&gt;&lt;br /&gt;What&apos;s this? What is it for? Who is it for? Who is it by?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span class=&quot;cut-wrapper&quot;&gt;&lt;span style=&quot;display: none;&quot; id=&quot;span-cuttag___1&quot; class=&quot;cuttag&quot;&gt;&lt;/span&gt;&lt;b class=&quot;cut-open&quot;&gt;(&amp;nbsp;&lt;/b&gt;&lt;b class=&quot;cut-text&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html#cutid1&quot;&gt;Click to read...&lt;/a&gt;&lt;/b&gt;&lt;b class=&quot;cut-close&quot;&gt;&amp;nbsp;)&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;display: none;&quot; id=&quot;div-cuttag___1&quot; aria-live=&quot;assertive&quot;&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Clicking this icon at the bottom of every post will always take you back here:&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://cybersecurity.dreamwidth.org/431.html&quot;&gt;&lt;img border=&quot;2&quot; src=&quot;https://v.dreamwidth.org/10853719/2563090&quot; alt=&quot;Go back to the index of Cybersecurity for the Trumped.&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Back to Index&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;https://www.dreamwidth.org/tools/commentcount?user=cybersecurity&amp;ditemid=431&quot; width=&quot;30&quot; height=&quot;12&quot; alt=&quot;comment count unavailable&quot; style=&quot;vertical-align: middle;&quot;/&gt; comments</description>
  <comments>https://cybersecurity.dreamwidth.org/431.html</comments>
  <category>cybersecurity</category>
  <category>index</category>
  <lj:security>public</lj:security>
  <lj:reply-count>2</lj:reply-count>
</item>
</channel>
</rss>
