#it's between me browsing with ublock or not going to their site at all
Explore tagged Tumblr posts
Text
You ever glance over at Ublock while you're on youtube, and see 824 and somehow literally growing like 3 at a time (probably trackers) just chilling on the front page... and you think... yeah... that's too many ads to be seeing in one day, Ublock stays on?
#we always talk about what would kill medieval peasants; but what about things that would send them on a rampage#I feel like if you showed some monk a news page with no adblock that he'd go crush someone to death with his bare hands#I'm just saying I think the human brain wasn't made to see that many ads#like to be clear I basically reblog ads... but the ads I reblog are 'look at pretty thing; you can also buy it from me'#no one cares when there's an etsy link in the bottom#but endless yammering and movement and dumb shit designed to try and grab your attention... no more I think#and these sites don't get that it's not between me browsing with ublock or browsing raw#it's between me browsing with ublock or not going to their site at all#I don't care for twitch personally; but I extra don't care for it cause sometimes they crack my adblock#and all that does is piss me off and makes me leave
4 notes
·
View notes
Text
I like the list, but uh. that's a lot of adblockers. You usually only need one browser-wide one (the YouTube ones are fine because they're more particular, though I'd exercise caution as they seem to be cracking down on folks who block ads). There's also at least one add-on that I know is unsupported here. I'm putting this under a read more because this got way longer than I thought:
A decent bare minimum, "get started" set has the following, you're more than welcome to add more (incl. from your list op) but the basics are:
- ublock origin. Functionally an ad blocker, but is technically a generic content blocker - I use it to remove suggested windows on Twitter for example. Pretty powerful and expansive, gets updates often and lists can easily be shared (though don't just accept anyone's ad block list). AdNauseam *also* runs on ublock origin, but basically "clicks" on every ad that it blocks, with the goal being to generate a ton of useless data to work with while also costing the ad provider money. Whether that works as intended idk, but it's there if you want it instead. Do not run more than one ad block at a time - find a different one that's more extensive to use instead.
- Privacy Badger. Privacy Possum, while imo being more useful (purposely sends junk data in place of any unique trackers instead of just blocking them) hasn't been updated in too long, so I personally don't trust it to work as expected. Blocks trackers to help cut down on the random sites sharing with whoever or whatnot. Ghostery fits a similar role, but I've never used it and either way you might not need both - idk if there's gaps one has that the other closes. Firefox "Strict Browsing Mode" may also help either of these, but strict tracker blocking can muck things up if you aren't careful.
- Facebook Container if you want that auto filter, but Multi Account Containers are just great in general. Firefox keeps cookies site-dependent now, but what if you wanna go a step further and isolate even more? MA Containers can effectively let you appear as a totally separate browser to a website without leaving your current one - open a tab in a different container and enjoy as Tumblr thinks you're not signed in, because it can't tell that you are!
From that list, the following add-ons have been abandoned - either because they were shut down or just no updates lately (being within the last year or two).
- HTTPS Everywhere was started by the Electronic Freedom Foundation (EFF) while HTTPS was still getting rolled out. With Let's Encrypt & similar certificate authorities managing SSL stuff, https is very common and thus, the extension has little purpose anymore. Plus, many browsers let you do this anyways!
- Privacy Possum. As mentioned already, it was last updated years ago, and it's out of date. I do not know what all has changed between then and now with Privacy Badger or Ghostery, but the main benefit of Possum was the same as AdNauseam - generate junk data. Again, idk how useful that ends up being, but being four years out of date makes it hard to say "install it." Pick either Badger or Ghostery.
- TrackMeNot. They're the same team as AdNauseam, but the Firefox version of TMN has not been officially updated since 2019. Again, it's probably fine but I cannot suggest you install an old, unsupported extension anyways. If only for any potential security reason. Plus, we're assuming that search engines that do track in the way this tries to make useless haven't caught on to it.
I don't think the following are strictly needed, but idk I'm not your dad unless you want me to be:
- "Don't track me Google" - just use DuckDuckGo instead, and maybe use Google in a dedicated container if you care that much. They have like five billion other ways to track, if you're signed in on Google Dot Com idk what good that extension does (it's hyperspecific in what it does, and again they have so many other ways to do so).
- SponsorBlock is, IMO, debatable from a safety/security standpoint. It is solely up to you if you want to use it, but it is (IMO) purely a convenience thing to have YouTube skip around sponsored ads in a video. Note: these are not the YouTube ads that "Adblocker for YouTube" handles - use that one for sure. I'm just mixed on SponsorBlock but you don't have to be.
- DDG Privacy Essentials, purely because I don't know what benefit it provides or could provide beyond my personal "absolute basics" collection. Maybe it does something functionally useful but idk. There likely isn't harm is using it, but idk about it being needed with all the other blockers.
hello google chrome refugees
don't use any of these browsers, they're also chrome
Here are my favorite firefox plugins for security/anti-tracking/anti-ad that I recommend you get
please get off chrome google is currently being investigated for being an Illegal Monopoly so get outta there okay love you bye
145K notes
·
View notes
Text
Digital privacy at stake? 10 Tips to avoid leaving tracks around internet
Google and Facebook collect information about us and then sell that data to advertisers. Websites deposit invisible âcookiesâ onto our computers and then record where we go online. Even our own government has been known to track us.
When it comes to digital privacy, itâs easy to feel hopeless. Weâre mere mortals! Weâre minuscule molecules in their machines! What power do we possibly have to fight back?
That was the question I posed to you, dear readers, in the previous âCrowdwise.â
Many of you responded with valuable but frequently repeated suggestions: Use a program that memorizes your passwords, and make every password different. Install an ad blocker in your web browser, like uBlock Origin. Read up on the latest internet scams. If you must use Facebook, visit its Privacy Settings page and limit its freedom to target ads to you.
What I sought, though, was non-obvious ideas.
It turns out that âdigital privacyâ means different things to different people.
âEveryone has different concerns,â wrote Jamie Winterton, a cybersecurity researcher at Arizona State University. âAre you worried about private messaging? Government surveillance? Third-party trackers on the web?â Addressing each of these concerns, she noted, requires different tools and techniques.
Duck Google
âThe number one thing that people can do is to stop using Google,â wrote privacy consultant Bob Gellman. âIf you use Gmail and use Google to search the web, Google know more about you than any other institution. And that goes double if you use other Google services like Google Maps, Waze, Google Docs, etc.â
Like many other readers, he recommended DuckDuckGo, a rival web search engine. Its search results often arenât as useful as Googleâs, but itâs advertised not to track you or your searches.
And if you donât use Gmail for email, what should you use? âI am a huge advocate for paying for your email account,â wrote Russian journalist Yuri Litvinenko. âItâs not about turning off ads, but giving your email providers as little incentive to peek into your inbox as possible.â ProtonMail, for example, costs $4 a month and offers a host of privacy features, including anonymous sign-up and end-to-end encryption.
Jam Google
The ads you see online are based on the sites, searches, or and Facebook posts that get your interest. Some rebels therefore throw a wrench into the machinery â by demonstrating phony interests.
âEvery once in a while, I Google something completely nutty just to mess with their algorithm,â wrote Shaun Breidbart. âYouâd be surprised what sort of coupons CVS prints for me on the bottom of my receipt. They are clearly confused about both my age and my gender.â
Itâs âakin to radio jamming,â noted Frank Paiano. âIt does make for some interesting browsing, as ads for items we searched for follow us around like puppy dogs (including on The New York Times, by the way.)â
Barry Joseph uses a similar tactic when registering for an account on a new website. âI often switch my gender (I am a cisgender male), which delivers ads less relevant to me â although I must admit, the bra advertising can be distracting.â
He notes that there are side effects. âMy friends occasionally get gendered notifications about me, such as âWish her a happy birthday.ââ But even that is a plus, leading to âinteresting conversations about gender norms and expectations (so killing two birds with one digital stone here).â
Avoid unnecessary web tracking
Itâs perfectly legitimate, by the way, to enjoy seeing ads that align with your interests. You could argue that theyâre actually more useful than irrelevant ones.
But millions of others are creeped out by the tracking that produces those targeted ads.
If youâre in that category, Ms. Winterton recommended Ghostery, a free plug-in for most web browsers that âblocks the trackers and lists them by category,â she wrote. âSome sites have an amazing number of trackers whose only purpose is to record your behavior (sometimes across multiple sites) and pitch better advertisements.â
Careful on public Wi-Fi
Most public Wi-Fi networks â in hotels, airports, coffee shops, and so on â are eavesdroppable, even if they require a password to connect. Nearby patrons, using their phones or laptops, can easily see everything youâre sending or receiving â email and website contents, for example â using free âsnifferâ programs.
You donât have to worry about Social, WhatsApp and Appleâs iMessages, all of which encrypt your messages before they even leave your phone or laptop. Using websites whose addresses begin with https are also safe; they, too, encrypt their data before itâs sent to your browser (and vice versa).
(Caution: Even if the siteâs address begins with https, the bad guys can still see which sites you visit â say, https://www.NoseHairBraiding.com. They just canât see what you do there once youâre connected.)
The solution, as recommended by Lauren Taubman and others: a Virtual Private Network program. These phone and computer apps encrypt everything you send or receive â and, as a bonus, mask your location. Wirecutterâs favorite VPN, TunnelBear, is available for Windows, Mac, Android and iOS. Itâs free for up to 500 megabytes a month, or $60 a year for up to five devices.
Use Apple
âI donât like Appleâs phones, their operating systems, or their looks,â wrote Aaron Soice, âbut the one thing Apple gets right is valuing your data security. Purely in terms of data, Apple serves you; Google serves you to the sharks.â
Appleâs privacy website reveals many examples: You donât sign into Apple Maps or Safari (Appleâs web browser), so your searches and trips arenât linked to you. Safariâs âdonât track meâ features are turned on as the factory setting. When you buy something with Apple Pay, Apple receives no information about the item, the store, or the price.
Apple can afford to tout these features, explained software developer Joel Potischman, because itâs a hardware company. âIts business model depends on us giving them our money. Google and Facebook make their money by selling our info to other people.â
Donât âSign in with Facebookâ
Mr. Potischman never registers with a new website using the âSign in with Facebookâ or âSign in with Googleâ shortcut buttons. âThey allow those companies to track you on other sites,â he wrote. Instead, he registers the long way, with an email address and password.
(And hereâs Apple again: The âSign in with Appleâ button, new and not yet incorporated by many websites, is designed to offer the same one-click convenience â but with a promise not to track or profile you.)
Identity theft, from a pro
My call for submissions drew some tips from a surprising respondent: Frank Abagnale, the former teenage con artist who was the subject of the 2002 movie âCatch Me if You Can.â
After his prison time, he went began working for the F.B.I., giving talks on scam protection, and writing books. Heâs donating all earnings from his latest book, âScam Me If You Can,â to the AARP, in support of its efforts to educate older Americans about internet rip-offs.
His advice: âYou never want to tell Facebook where you were born and your date of birth. Thatâs 98 percent of someone stealing your identity! And donât use a straight-on photo of yourself â like a passport photo, driverâs license, graduation photo â that someone can use on a fake ID.â
Mr. Abagnale also notes that you should avoid sharing your personal data offline, too. âWe give a lot of information away, not just on social media, but places we go where people automatically ask us all of these questions. âWhat magazines do you read?â âWhatâs your job?â âDo you earn between this and that amount of money?ââ
Why answer if you donât have to?
The lightning round
A few more suggestions:
âCreate a different email address for every service you use,â wrote Matt McHenry. âThen you can tell which one has shared your info, and create filters to silence them if necessary.â
âApps like Privacy and Token Virtual generate a disposable credit-card number with each purchase â so in case of a breach, your actual card isnât compromised,â suggested Juan Garrido. (Bill Barnes agreed, pointing out the similar Shopsafe service offered by from Bank of Americaâs Visa cards. âThe number is dollar and time limited.â)
âYour advertisers wonât like to see this, so perhaps you wonât print it,â predicted Betsy Peto, âbut I avoid using apps on my cellphone as much as possible. Instead, I go to the associated website in my phoneâs browser: for example, www.dailybeast.com. My data is still tracked there, but not as much as it would be by the app.â
There is some good news: Tech companies are beginning to feel some pressure.
In 2017, the European Union passed the General Data Protection Regulation (G.D.P.R.), which requires companies to explain what data theyâre collecting â and to offer the option to edit or delete it. China, India, Japan, Brazil, South Korea and Thailand have passed, or are considering, similar laws, and Californiaâs Consumer Privacy Act takes effect on January 1.
In the meantime, enjoy these suggestions, as well as this bonus tip from privacy researcher Jamie Winterton:
âOh yeah â and donât use Facebook.â
For the next âCrowdwiseâ: We all know that itâs unclassy and cruel to break up with a romantic partner in a text message â or, worse, a tweet. (Well, we used to know that.) Yet requesting an unusual meeting at a sidewalk cafe might strike your partner as distressingly ominous.
!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';n.queue=[];t=b.createElement(e);t.async=!0;t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,document,'script','https://connect.facebook.net/en_US/fbevents.js');fbq('init','550264998751686');fbq('track','PageView');
from CVR News Direct https://cvrnewsdirect.com/digital-privacy-at-stake-10-tips-to-avoid-leaving-tracks-around-internet/
0 notes
Link
Another week, another massive privacy scandal. When itâs not Facebook admitting it allowed data on as many as 87 million users to be sucked out by a developer on its platform who sold it to a political consultancy working for the Trump campaign, or dating app Grindr âfessing up to sharing its usersïżœïżœïżœ HIV status with third party A/B testers, some other ugly facet of the tech industryâs love affair with tracking everything its users do slides into view.
Suddenly, Android users discover to their horror that Googleâs mobile platform tells the company where they are all the time â thanks to baked-in location tracking bundled with Google services like Maps and Photos. Or Amazon Echo users realize Jeff Bezosâ ecommerce empire has amassed audio recordings of every single interaction theyâve had with their cute little smart speaker.
The problem, as ever with the tech industryâs teeny-weeny greyscaled legalise, is that the people it refers to as âusersâ arenât genuinely consenting to having their information sucked into the cloud for goodness knows what. Because they havenât been given a clear picture of what agreeing to share their data will really mean.
Instead one or two select features, with a mote of user benefit, tend to be presented at the point of sign up â to socially engineer âconsentâ. Then the company can walk away with a defacto license to perpetually harvest that personâs data by claiming that a consent box was once ticked.
A great example of that is Facebookâs Nearby Friends. The feature lets you share your position with your friends so â and hereâs that shiny promise â you can more easily hang out with them. But do you know anyone who is actively using this feature? Yet millions of people started sharing their exact location with Facebook for a feature thatâs now buried and mostly unused. Meanwhile Facebook is actively using your location to track your offline habits so it can make money targeting you with adverts.
Terms & Conditions are the biggest lie in the tech industry, as weâve written before. (And more recently: It was not consent, it was concealment.)
Senator Kennedy of Louisiana also made the point succinctly to Facebook founder Mark Zuckerberg this week, telling him to his face:Â âYour user agreement sucks.â We couldnât agree more.
Happily disingenuous T&Cs are on borrowed time â at least for European tech users, thanks to a new European Union data protection framework that will come into force next month. The GDPR tightens consent requirements â mandating clear and accurate information be provided to users at the point of sign up. Data collection is also more tightly tied to specific function.
From next month, holding onto personal data without a very good reason to do so will be far more risky â because GDPR is also backed up with a regime of supersized fines that are intended to make privacy rules much harder to ignore.
Of course U.S. tech users canât bank on benefiting from European privacy regulations. And while there are now growing calls in the country for legislation to protect peopleâs data â in a bid to steer off the next democracy-denting Cambridge Analytica scandal, at very least â any such process will take a lot of political will.
It certainly will not happen overnight. And you can expect tech giants to fight tooth and nail against laws being drafted and passed â as indeed Facebook, Google and others lobbied fiercely to try to get GDPR watered down.
Facebook has already revealed it will not be universally applying the European regulation â which means people in North America are likely to get a degree of lower privacy than Facebook users everywhere else in the world. Which doesnât exactly sound fair.
When it comes to privacy, some of you may think you have nothing to hide. But thatâs a straw man. Itâs especially hard to defend this line of thinking now that big tech companies have attracted so much soft power they can influence elections, inflame conflicts and divide people in general. Itâs time to think about the bigger impact of technology on the fabric of society, and not just your personal case.
Shifting the balance
So what can Internet users do right now to stop tech giants, advertisers and unknown entities tracking everything you do online â and trying to join the dots of your digital activity to paint a picture of who they think you are? At least, everything short of moving to Europe, where privacy is a fundamental right.
There are some practical steps you can take to limit day-to-day online privacy risks by reducing third party access to your information and shielding more of your digital activity from prying eyes.
Not all these measures are appropriate for every person. Itâs up to you to determine how much effort you want (or need) to put in to shield your privacy.
You may be happy to share a certain amount of personal data in exchange for access to a certain service, for example. But even then itâs unlikely that the full trade-off has been made clear to you. So itâs worth asking yourself if youâre really getting a good deal.
Once peopleâs eyes are opened to the fine-grained detail and depth of personal information being harvested, even some very seasoned tech users have reacted with shock â saying they had no idea, for example, that Facebook Messenger was continuously uploading their phone book and logging their calls and SMS metadata.
This is one of the reasons why the U.K.âs information commissioner has been calling for increased transparency about how and why data flows. Because for far too long tech savvy entities have been able to apply privacy hostile actions in the dark. And it hasnât really been possible for the average person to know whatâs being done with their information. Or even what data they are giving up when they click âI agreeâ.
Why does an A/B testing firm need to know a personâs HIV status? Why does a social network app need continuous access to your call history? Why should an ad giant be able to continuously pin your movements on a map?
Are you really getting so much value from an app that youâre happy for the company behind it and anyone else they partner with to know everywhere you go, everyone you talk to, the stuff you like and look at â even to have a pretty good idea what youâre thinking?
Every data misuse scandal shines a bit more light on some very murky practices â which will hopefully generate momentum for rule changes to disinfect data handling processes and strengthen individualsâ privacy by spotlighting trade-offs that have zero justification.
With some effort â and good online security practices (which weâre taking as a given for the purposes of this article, but one quick tip: Enable 2FA everywhere you can) â you can also make it harder for the webâs lurking watchers to dine out on your data.
Just donât expect the lengths you have to go to protect your privacy to feel fair or just â the horrible truth is this fight sucks.
But whatever you do, donât give up.
How to hide on the internet
Action: Tape over all your webcams Who is this for: Everyone â even Mark Zuckerberg! How difficult is it: Easy peasy lemon squeezy Tell me more: You can get fancy removable stickers for this purpose (noyb has some nice ones). Or you can go DIY and use a bit of masking tape â on your laptop, your smartphone, even your smart TV⊠If your job requires you to be on camera, such as for some conference calls, and you want to look a bit more pro you can buy a webcam cover. Sadly locking down privacy is rarely this easy.
Action: Install HTTPS Everywhere Who is this for: Everyone â seriously do it How difficult is it: Mild effort Tell me more: Many websites offer encryption. With HTTPS, people running the network between your device and the server hosting the website youâre browsing canât see your requests and your internet traffic. But some websites still load unencrypted pages by default (HTTP), which also causes a security risk. The EFF has developed a browser extension that makes sure that you access all websites that offer HTTPS using⊠HTTPS.
Action: Use tracker blockers Who is this for: Everyone â except people who like being ad-stalked online How difficult is it: Mild effort Tell me more: Trackers refers to a whole category of privacy-hostile technologies designed to follow and record what web users are doing as they move from site to site, and even across different devices. Trackers come in a range of forms these days. And there are some pretty sophisticated ways of being tracked (some definitely harder to thwart than others). But to combat trackers being deployed on popular websites â which are probably also making the pages slower to load than they otherwise would be â thereâs now a range of decent, user-friendly tracker blockers to choose from. Pro-privacy search engine DuckDuckGo recently added a tracker blocker to their browser extensions, for example. Disconnect.me is also a popular extension to block trackers from third-party websites. Firefox also has a built-in tracker blocker, which is now enabled by default in the mobile apps. If youâre curious and want to see the list of trackers on popular website, you can also install Kimetrak to understand that itâs a widespread issue.
Action: Use an ad blocker Who is this for: Everyone who can support the moral burden How difficult is it: Fairly easy these days but you might be locked out of the content on some news websites as a result Tell me more: If youâve tried using a tracker blocker, you may have noticed that many ads have been blocked in the process. Thatâs because most ads load from third-party servers that track you across multiple sites. So if you want to go one step further and block all ads, you should install an ad blocker. Some browsers like Opera come with an ad blocker. Otherwise, we recommend uBlock Origin on macOS, Windows, Linux and Android. 1Blocker is a solid option on iOS. But letâs be honest, TechCrunch makes some money with online ads. If 100% of web users install an ad blocker many websites you know and love would simply go bankrupt. While your individual choice wonât have a material impact on the bottom line, consider whitelisting the sites you like. And if youâre angry at how many trackers your favorite news site is running try emailing them to ask (politely) if they can at least reduce the number of trackers they use.
Action: Make a private search engine your default Who is this for: Most people How difficult is it: A bit of effort because your search results might become slightly less relevant Tell me more: Google probably knows more about you than even Facebook does, thanks to the things you tell it when you type queries into its search engine. Though thatâs just the tip of how it tracks you â if you use Android it will keep running tabs on everywhere you go unless you opt out of location services. It also has its tracking infrastructure embedded on three-quarters of the top million websites. So chances are itâs following what youâre browsing online â unless you also take steps to lock down your browsing (see below). But one major way to limit what Google knows about you is to switch to using an alternative search engine when you need to look something up on the Internet. This isnât as hard as it used to be as there are some pretty decent alternatives now â such as DuckDuckGo which Apple will let you set as the default browser on iOS â or Qwant for French-speaking users. German users can check out Cliqz. You will also need to remember to be careful about any voice assistants you use as they often default to using Google to look stuff up on the web.
Action: Use private browser sessions Who is this for: Most people How difficult is it: Not at all if you understand what a private session is Tell me more: All browsers on desktop and mobile now let you open a private window. While this can be a powerful tool, it is often misunderstood. By default, private sessions donât make you more invisible â youâll get tracked from one tab to another. But private sessions let you start with a clean slate. Every time you close your private session, all your cookies are erased. Itâs like you disappear from everyoneâs radar. You can then reopen another private session and pretend that nobody knows who you are. Thatâs why using a private session for weeks or months doesnât do much, but short private sessions can be helpful.
Action: Use multiple browsers and/or browser containers Who is this for: People who donât want to stop using social media entirely How difficult is it: Some effort to not get in a muddle Tell me more: Using different browsers for different online activities can be a good way of separating portions of your browsing activity. You could, for example, use one browser on your desktop computer for your online banking, say, and a different browser for your social networking or ecommerce activity. Taking this approach further, you could use different mobile devices when you want to access different apps. The point of dividing your browsing across different browsers/devices is to try to make it harder to link all your online activity to you. That said, lots of adtech effort has been put into developing cross-device tracking techniques â so itâs not clear that fragmenting your browsing sessions will successful beat all the trackers. In a similar vein, in 2016 Mozilla added a feature to its Firefox browser thatâs intended to help web users segregate online identities within the same browser â called multi container extensions. This approach gives users some control but it does not stop their browser being fingerprinted and all their web activity in it linked and tracked. It may help reduce some cookie-based tracking, though. Last month Mozilla also updated the container feature to add one that specifically isolates a Facebook userâs identity from the rest of the web. This limits how Facebook can track a userâs non-Facebook web browsing â which yes Facebook does do, whatever Zuckerberg tried to claim in Congress â so again itâs a way to reduce what the social network giant knows about you. (Though it should also be noted that clicking on any Facebook social plug-ins you encounter on other websites will still send Facebook your personal data.)
Action: Get acquainted with Tor Who is this for: Activists, people with high risks attached to being tracked online, committed privacy advocates who want to help grow the Tor network How difficult is it: Patience is needed to use Tor. Also some effort to ensure you donât accidentally do something that compromises your anonymity Tell me more: For the most robust form of anonymous web browsing thereâs Tor. Torâs onion network works by encrypting and routing your Internet traffic randomly through a series of relay servers to make it harder to link a specific device with a specific online destination. This does mean itâs definitely not the fastest form of web browsing around. Some sites can also try to block Tor users so the Internet experience you get when browsing in this way may suffer. But itâs the best chance of truly preserving your online anonymity. Youâll need to download the relevant Tor browser bundle to use it. Itâs pretty straightforward to install and get going. But expect very frequent security updates which will also slow you down.
Action: Switch to another DNS Who is this for: People who donât trust their ISP How difficult is it: Moderately Tell me more: When you type an address in the address bar (such as techcrunch.com), your device asks a Domain Name Server to translate that address into an IP address (a unique combination of numbers and dots). By default, your ISP or your mobile carrier runs a DNS for their users. It means that they can see all your web history. Big telecom companies are going to take advantage of that to ramp up their advertising efforts. By default, your DNS query is also unencrypted and can be intercepted by people running the network. Some governments also ask telecom companies to block some websites on their DNS servers â some countries block Facebook for censorship reasons, others block The Pirate Bay for online piracy reasons. You can configure each of your device to use another public DNS. But donât use Googleâs public DNS! Itâs an ad company, so they really want to see your web history. Both Quad9Â and Cloudflareâs 1.1.1.1Â have strong privacy policies. But Quad9 is a not-for-profit organization, so itâs easier to trust them.
Action: Disable location services Who is this for: Anyone who feels uncomfortable with the idea of being kept under surveillance How difficult is it: A bit of effort finding and changing settings, and a bit of commitment to stay on top of any âupdatesâ to privacy policies which might try to revive location tracking. You also need to be prepared to accept some reduction in the utility and/or convenience of the service because it wonât be able to automatically customize what it shows you based on your location Tell me more: The tech industry is especially keen to keep tabs on where its users are at any given moment. And thanks to the smash hit success of smartphones with embedded sensors itâs never been easier to pervasively track where people are going â and therefore to infer what theyâre doing. For ad targeting purposes location data is highly valuable of course. But itâs also hugely intrusive. Did you just visit a certain type of health clinic? Were you carrying your phone loaded with location-sucking apps? Why then itâs trivially easy for the likes of Google and Facebook to connect your identity to that trip â and link all that intel to their ad networks. And if the social networkâs platform isnât adequately âlocked downâ â as Zuckerberg would put it â your private information might leak and end up elsewhere. It could even get passed around between all sorts of unknown entities â as the up to 87M Facebook profiles in the Cambridge Analytica scandal appear to have been. (Whistleblower Chris Wylie has said that Facebook data-set went âeverywhereâ.) There are other potential risks too. Insurance premiums being assessed based on covertly collected data inputs. Companies that work for government agencies using social media info to try to remove benefits or even have people deported. Location data can also influence the types of adverts you see or donât see. And on that front thereâs a risk of discrimination if certain types of ads â jobs or housing, for example â donât get served to you because you happen to be a person of color, say, or a Muslim. Excluding certain protected groups of people from adverts can be illegal â but that hasnât stopped it happening multiple times on Facebookâs platform. And location can be a key signal that underpins this kind of prejudicial discrimination. Even the prices you are offered online can depend on what is being inferred about you via your movements. The bottom line is that everyoneâs personal data is being made to carry a lot of baggage these days â and most of the time itâs almost impossible to figure out exactly what that unasked for baggage might entail when you consent to letting a particular app or service track where you go. Pervasive tracking of location at very least risks putting you at a disadvantage as a consumer. Certainly if you live somewhere without a proper regulatory framework for privacy. Itâs also worth bearing in mind how lax tech giants can be where location privacy is concerned â whether itâs Uberâs infamous âgod viewâ tool or Snapchat leaking schoolkidsâ location or Strava accidentally revealing the locations of military bases. Their record is pretty terrible. If you really canât be bothered to go and hunt down and switch off every location setting one fairly crude action you can take is to buy a faraday cage carry case â Silent Pocket makes an extensive line of carry cases with embedded wireless shielding tech, for instance â which you can pop your smartphone into when youâre on the move to isolate it from the network. Of course once you take it out it will instantly reconnect and location data will be passed again so this is not going to do very much on its own. Nixing location tracking in the settings is much more effective.
Action: Approach VPNs with extreme caution Who is this for: All web users â unless free Internet access is not available in your country How difficult is it: No additional effort Tell me more: While there may be times when you feel tempted to sign up and use a VPN service â say, to try to circumvent geoblocks so you can stream video content thatâs not otherwise available in your country â if you do this you should assume that the service provider will at very least be recording everything youâre doing online. They may choose to sell that info or even steal your identity. Many of them promise you perfect privacy and great terms of service. But you can never know for sure if theyâre actually doing what they say. So the rule of thumb about all VPNs is: Assume zero privacy â and avoid if at all possible. Facebook even has its own VPN â which itâs been aggressively pushing to users of its main app by badging it as a security service, with the friendly-sounding name âProtectâ. In reality the company wants you to use this so it can track what other apps youâre using â for its own business intelligence purposes. So a more accurate name for this âserviceâ would be: âProtect Facebookâs stranglehold on the social webâ.
Action: Build your own VPN server Who is this for: Developers How difficult is it: You need to be comfortable with the Terminal Tell me more: The only VPN server you can trust is the one you built yourself! In that case, VPN servers can be a great tool if youâre on a network you donât trust (a hotel, a conference or an office). We recommend using Algo VPNÂ and a hosting provider you trust.
Action: Take care with third-party keyboard apps Who is this for: All touchscreen device users How difficult is it: No additional effort Tell me more: Keyboard apps are a potential privacy minefield given that, if you allow cloud-enabled features, they can be in a position to suck out all the information youâre typing into your device â from passwords to credit card numbers to the private contents of your messages. Thatâs not to say that all third-party keyboards are keylogging everything you type. But the risk is there â so you need to be very careful about what you choose to use. Security is also key. Last year, sensitive personal data from 31M+ users of one third-party keyboard, AI.type, leaked online after the company had failed to properly secure its database server, as one illustrative example of the potential risks. Google knows how powerful keyboards can be as a data-sucker â which is why it got into the third-party keyboard game, outing its own Gboard keyboard app first for Appleâs iOS in 2016 and later bringing it to Android. If you use Gboard you should know you are handing the adtech giant another firehose of your private information â though it claims that only search queries and âusage statisticsâ are sent by Gboard to Google (The privacy policy further specifies: âAnything you type other than your searches, like passwords or chats with friends, isnât sent. Saved words on your device arenât sent.â). So if you believe that Gboard is not literally a keylogger. But it is watching what you search for and how you use your phone. Also worth remembering: Data will still be passed by Gboard to Google if youâre using an e2e encrypted messenger like Signal. So third party keyboards can erode the protection afforded by robust e2e encryption â so again: Be very careful what you use.
Action: Use end-to-end encrypted messengers Who is this for: Everyone who can How difficult is it: Mild effort unless all your friends are using other messaging apps Tell me more: Choosing friends based on their choice of messaging app isnât a great option so real world network effects can often work against privacy. Indeed, Facebook uses the fuzzy feelings you have about your friends to manipulate Messenger users to consent to continuously uploading their phone contacts, by suggesting you have to if you want to talk to your contacts. (Which is, by the by, entirely bogus.) But if all your friends use a messaging app that does not have end-to-end encryption chances are youâll feel forced to use that same non-privacy-safe app too. Given that the other option is to exclude yourself from the digital chatter of your friend group. Which would clearly suck. Facebook-owned WhatsApp does at least have end-to-end encryption â and is widely used (certainly internationally). Though you still need to be careful to opt out of any privacy-eroding terms the company tries to push. In summer 2016, for example, a major T&Cs change sought to link WhatsApp usersâ accounts with their Facebook profiles (and thus with all the data Facebook holds on them) â as well as sharing sensitive stuff like your last seen status, your address book, your BFFs in Whatsapp and all sorts of metadata with Zuckâs âfamilyâ of companies. Thankfully most of this privacy-hostile data sharing has been suspended in Europe, after Facebook got in trouble with local data protection agencies.Â
Action: Use end-to-end encryption if you use cloud storage Who is this for: Dedicated privacy practitioners, anyone worried about third parties accessing their stuff How difficult is it: Some effort, especially if you have lots of content stored in another service that you need to migrate Tell me more: Dropbox IPOâd last month â and the markets signalled their approval of its business. But someone who doesnât approve of the cloud storage giant is Edward Snowden â who in 2014 advised: âGet rid of Dropboxâ, arguing the company is hostile to privacy. The problem is that Dropbox does not offer zero access encryption â because it retains encryption keys, meaning it can technically decrypt and read the data you store with it if it decides it needs to or is served with a warrant. Cloud storage alternatives that do offer local encryption with no access to the encryption keys are available, such as Spideroak. And if youâre looking for a cloud backup service, Backblaze also offers the option to let you manage the encryption key. Another workaround if you do still want to use a service like Dropbox is to locally encrypt the stuff you want to store before you upload it â using another third party service such as Boxcryptor.
Action: Use an end-to-end encrypted email service Who is this for: Anyone who wants to be sure their email isnât being data mined How difficult is it: Some effort â largely around migrating data and/or contacts from another email service Tell me more: In the middle of last year Google finally announced it would no longer be data-mining the emails inside its Gmail free email service. (For a little perspective on how long it took to give up data-mining your emails, Gmail launched all the way back in 2004.) The company probably feels it has more than enough alternative data points feeding its user profiling at this point. Plus data-mining email with the rise of end-to-end encrypted messaging apps risks pushing the company over the âcreepy lineâ itâs been so keen to avoid to try to stave off the kind of privacy backlash currently engulfing Facebook. So does it mean that Gmail is now 100% privacy safe? No, because the service is not end-to-end encrypted. But there are now some great webmail clients that do offer robust end-to-end encryption â most notably the Swiss service Protonmail. Really itâs never been easier to access a reliable, user-friendly, pro-privacy email service. If you want to go one step further, you should set up PGP encryption keys and share them with your contacts. This is a lot more difficult though.
Action: Choose iOS over Android Who is this for: Mainstream consumers, Apple fans How difficult is it: Depends on the person. Apple hardware is generally more expensive so thereâs a cost premium Tell me more:Â No connected technology is 100% privacy safe but Appleâs hardware-focused business model means the companyâs devices are not engineered to try to harvest user data by default. Apple does also invest in developing pro-privacy technologies. Whereas thereâs no getting around the fact Android-maker Google is an adtech giant whose revenues depend on profiling users in order to target web users with adverts. Basically the company needs to suck your data to make a fat profit. Thatâs why Google asks you to share all your web and app activity and location history if you want to use Google Assistant, for instance. Android is a more open platform than iOS, though, and itâs possible to configure it in many different ways â some of which can be more locked down as regards privacy than others (the Android Open Source Project can be customized and used without Google services as default preloads, for example). But doing that kind of configuration is not going to be within reach of the average person. So iOS is the obvious choice for mainstream consumers.
Action: Delete your social media accounts Who is this for: Committed privacy lovers, anyone bored with public sharing How difficult is it: Some effort â mostly feeling like youâre going to miss out. But third party services can sometimes require a Facebook login (a workaround for that would be to create a dummy Facebook account purely for login purposes â using a name and email you donât use for anything else, and not linking it to your usual mobile phone number or adding anyone you actually know IRL) Tell me more: Deleting Facebook clearly isnât for everyone. But ask yourself how much you use it these days anyway? You might find yourself realizing itâs not really that central to what you do on the Internet after all. The center of gravity in social networking has shifted away from mass public sharing into more tightly curated friend groups anyway, thanks to the popularity of messaging apps. But of course Facebook owns Messenger, Instagram and WhatsApp too. So ducking out of its surveillance dragnet entirely is especially hard. Ideally you would also need to run tracker blockers (see above) as the company tracks non-Facebook users around the Internet via the pixels it has embedded on lots of popular websites. While getting rid of your social media accounts is not a privacy panacea, removing yourself from mainstream social network platforms at least reduces the risk of a chunk of your personal info being scraped and used without your say so. Though itâs still not absolutely guaranteed that when you delete an account the company in question will faithfully remove all your information from their servers â or indeed from the servers of any third party they shared your data with. If you really canât bring yourself to ditch Facebook (et al) entirely, at least dive into the settings and make sure you lock down as much access to your data as you can â including checking which apps have been connected to your account and removing any that arenât relevant or useful to you anymore.
Action: Say no to always-on voice assistants Who is this for: Anyone who values privacy more than gimmickry How difficult is it: No real effort Tell me more: Thereâs a rash of smart speaker voice assistants on shop shelves these days, marketed in a way that suggests theyâre a whole lot smarter and more useful than they actually are. In reality theyâre most likely to be used for playing music (albeit, audio quality can be very poor) or as very expensive egg timers. Something else the PR for gadgets like Amazonâs (many) Echos or Google Home doesnât mention is the massive privacy trade off involved with installing an always-on listening device inside your home. Essentially these devices function by streaming whatever you ask to the cloud and will typically store recordings of things youâve said in perpetuity on the companiesâ servers. Some do offer a delete option for stored audio but you would have to stay on top of deleting your data as long as you keep using the device. So itâs a tediously Sisyphean task. Smart speakers have also been caught listening to and recording things their owner didnât actually want them to â because they got triggered by accident. Or when someone on the TV used the trigger word. The privacy risks around smart speakers are clearly very large indeed. Not least because this type of personal data is of obvious and inevitable interest to law enforcement agencies. So ask yourself whether that fake fart dispenser gizmo youâre giggling about is really worth the trade off of inviting all sorts of outsiders to snoop on the goings on inside your home.
Action: Block some network requests Who is this for: Paranoid people How difficult is it: Need to be tech savvy Tell me more: On macOS, you can install something called Little Snitch to get an alert every time an app tries to talk with a server. You can approve or reject each request and create rules. If you donât want Microsoft Word to talk with Microsoftâs servers all the time for instance, itâs a good solution â but is not really user friendly.
Action: Use a privacy-focused operating system Who is this for: Edward Snowden How difficult is it: Need to be tech savvy Tell me more: If you really want to lock everything down, you should consider using Tails as your desktop operating system. Itâs a Linux distribution that leaves no trace by default, uses the Tor network for all network requests by default. But itâs not exactly user friendly, and itâs quite complicated to install on a USB drive. One for those whose threat model really is âbleeding edgeâ.
Action: Write to your political reps to demand stronger privacy laws Who is this for: Anyone who cares about privacy, and especially Internet users in North America right now How difficult is it: A bit of effort Tell me more:Â There appears to be bipartisan appetite among U.S. lawmakers to bring in some form of regulation for Internet companies. And with new tougher rules coming in in Europe next month itâs an especially opportune moment to push for change in the U.S. where web users are facing reduced standards vs international users after May 25. So itâs a great time to write to your reps reminding them youâre far more interested in your privacy being protected than Facebook winning some kind of surveillance arms race with the Chinese. Tell them itâs past time for the U.S. to draft laws that prioritize the protection of personal data.Â
Action: Throw away all your connected devices â and choose your friends wisely Who is this for: Fugitives and whistleblowers How difficult is it: Privacy doesnât get harder than this Tell me more:Â Last month the former Catalan president, Carles Puigdemont â who, in October, dodged arrest by the Spanish authorities by fleeing to Brussels after the regionâs abortive attempt to declare independence â was arrested by German police, after crossing the border from Denmark in a car. Spanish intelligence agents had reportedly tracked his movements via the GPS on the mobile device of one or more of his friends. The car had also been fitted with a tracker. Trusting anything not to snitch on you is a massive risk if your threat model is this high. The problem is you also need trustworthy friends to help you stay ahead of the surveillance dragnet thatâs out to get you.
Action: Ditch the Internet entirely Who is this for: Fugitives and whistleblowers How difficult is it: Privacy doesnât get harder than this Tell me more: Public administrations can ask you to do pretty much everything online these days â and even if itâs not mandatory to use their Internet service it can be incentivized in various ways. The direction of travel for government services is clearly digital. So eschewing the Internet entirely is getting harder and harder to do. One wild card option â thatâs still not a full Internet alternative (yet) â is to use a different type of network thatâs being engineered with privacy in mind. The experimental, decentralized MaidSafe network fits that bill. This majorly ambitious project has already clocked up a decadeâs worth of R&D on the foundersâ mission to rethink digital connectivity without compromising privacy and security by doing away with servers â and decentralizing and encrypting everything. Itâs a fascinating project. Just sadly not yet a fully-fledged Internet alternative.
from Social â TechCrunch https://ift.tt/2HrWU5w Original Content From: https://techcrunch.com
0 notes
Text
How to save your privacy from the Internetâs clutches
How to save your privacy from the Internetâs clutches
Another week, another massive privacy scandal. When itâs not Facebook admitting it allowed data on as many as 87 million users to be sucked out by a developer on its platform who sold it to a political consultancy working for the Trump campaign, or dating app Grindr âfessing up to sharing its usersâ HIV status with third party A/B testers, some other ugly facet of the tech industryâs love affair with tracking everything its users do slides into view.
Suddenly, Android users discover to their horror that Googleâs mobile platform tells the company where they are all the time â thanks to baked-in location tracking bundled with Google services like Maps and Photos. Or Amazon Echo users realize Jeff Bezosâ ecommerce empire has amassed audio recordings of every single interaction theyâve had with their cute little smart speaker.
The problem, as ever with the tech industryâs teeny-weeny greyscaled legalise, is that the people it refers to as âusersâ arenât genuinely consenting to having their information sucked into the cloud for goodness knows what. Because they havenât been given a clear picture of what agreeing to share their data will really mean.
Instead one or two select features, with a mote of user benefit, tend to be presented at the point of sign up â to socially engineer âconsentâ. Then the company can walk away with a defacto license to perpetually harvest that personâs data by claiming that a consent box was once ticked.
A great example of that is Facebookâs Nearby Friends. The feature lets you share your position with your friends so â and hereâs that shiny promise â you can more easily hang out with them. But do you know anyone who is actively using this feature? Yet millions of people started sharing their exact location with Facebook for a feature thatâs now buried and mostly unused. Meanwhile Facebook is actively using your location to track your offline habits so it can make money targeting you with adverts.
Terms & Conditions are the biggest lie in the tech industry, as weâve written before. (And more recently: It was not consent, it was concealment.)
Senator Kennedy of Louisiana also made the point succinctly to Facebook founder Mark Zuckerberg this week, telling him to his face:Â âYour user agreement sucks.â We couldnât agree more.
Happily disingenuous T&Cs are on borrowed time â at least for European tech users, thanks to a new European Union data protection framework that will come into force next month. The GDPR tightens consent requirements â mandating clear and accurate information be provided to users at the point of sign up. Data collection is also more tightly tied to specific function.
From next month, holding onto personal data without a very good reason to do so will be far more risky â because GDPR is also backed up with a regime of supersized fines that are intended to make privacy rules much harder to ignore.
Of course U.S. tech users canât bank on benefiting from European privacy regulations. And while there are now growing calls in the country for legislation to protect peopleâs data â in a bid to steer off the next democracy-denting Cambridge Analytica scandal, at very least â any such process will take a lot of political will.
It certainly will not happen overnight. And you can expect tech giants to fight tooth and nail against laws being drafted and passed â as indeed Facebook, Google and others lobbied fiercely to try to get GDPR watered down.
Facebook has already revealed it will not be universally applying the European regulation â which means people in North America are likely to get a degree of lower privacy than Facebook users everywhere else in the world. Which doesnât exactly sound fair.
When it comes to privacy, some of you may think you have nothing to hide. But thatâs a straw man. Itâs especially hard to defend this line of thinking now that big tech companies have attracted so much soft power they can influence elections, inflame conflicts and divide people in general. Itâs time to think about the bigger impact of technology on the fabric of society, and not just your personal case.
Shifting the balance
So what can Internet users do right now to stop tech giants, advertisers and unknown entities tracking everything you do online â and trying to join the dots of your digital activity to paint a picture of who they think you are? At least, everything short of moving to Europe, where privacy is a fundamental right.
There are some practical steps you can take to limit day-to-day online privacy risks by reducing third party access to your information and shielding more of your digital activity from prying eyes.
Not all these measures are appropriate for every person. Itâs up to you to determine how much effort you want (or need) to put in to shield your privacy.
You may be happy to share a certain amount of personal data in exchange for access to a certain service, for example. But even then itâs unlikely that the full trade-off has been made clear to you. So itâs worth asking yourself if youâre really getting a good deal.
Once peopleâs eyes are opened to the fine-grained detail and depth of personal information being harvested, even some very seasoned tech users have reacted with shock â saying they had no idea, for example, that Facebook Messenger was continuously uploading their phone book and logging their calls and SMS metadata.
This is one of the reasons why the U.K.âs information commissioner has been calling for increased transparency about how and why data flows. Because for far too long tech savvy entities have been able to apply privacy hostile actions in the dark. And it hasnât really been possible for the average person to know whatâs being done with their information. Or even what data they are giving up when they click âI agreeâ.
Why does an A/B testing firm need to know a personâs HIV status? Why does a social network app need continuous access to your call history? Why should an ad giant be able to continuously pin your movements on a map?
Are you really getting so much value from an app that youâre happy for the company behind it and anyone else they partner with to know everywhere you go, everyone you talk to, the stuff you like and look at â even to have a pretty good idea what youâre thinking?
Every data misuse scandal shines a bit more light on some very murky practices â which will hopefully generate momentum for rule changes to disinfect data handling processes and strengthen individualsâ privacy by spotlighting trade-offs that have zero justification.
With some effort â and good online security practices (which weâre taking as a given for the purposes of this article, but one quick tip: Enable 2FA everywhere you can) â you can also make it harder for the webâs lurking watchers to dine out on your data.
Just donât expect the lengths you have to go to protect your privacy to feel fair or just â the horrible truth is this fight sucks.
But whatever you do, donât give up.
How to hide on the internet
Action: Tape over all your webcams Who is this for: Everyone â even Mark Zuckerberg! How difficult is it: Easy peasy lemon squeezy Tell me more: You can get fancy removable stickers for this purpose (noyb has some nice ones). Or you can go DIY and use a bit of masking tape â on your laptop, your smartphone, even your smart TV⊠If your job requires you to be on camera, such as for some conference calls, and you want to look a bit more pro you can buy a webcam cover. Sadly locking down privacy is rarely this easy.
Action: Install HTTPS Everywhere Who is this for: Everyone â seriously do it How difficult is it: Mild effort Tell me more: Many websites offer encryption. With HTTPS, people running the network between your device and the server hosting the website youâre browsing canât see your requests and your internet traffic. But some websites still load unencrypted pages by default (HTTP), which also causes a security risk. The EFF has developed a browser extension that makes sure that you access all websites that offer HTTPS using⊠HTTPS.
Action: Use tracker blockers Who is this for: Everyone â except people who like being ad-stalked online How difficult is it: Mild effort Tell me more: Trackers refers to a whole category of privacy-hostile technologies designed to follow and record what web users are doing as they move from site to site, and even across different devices. Trackers come in a range of forms these days. And there are some pretty sophisticated ways of being tracked (some definitely harder to thwart than others). But to combat trackers being deployed on popular websites â which are probably also making the pages slower to load than they otherwise would be â thereâs now a range of decent, user-friendly tracker blockers to choose from. Pro-privacy search engine DuckDuckGo recently added a tracker blocker to their browser extensions, for example. Disconnect.me is also a popular extension to block trackers from third-party websites. Firefox also has a built-in tracker blocker, which is now enabled by default in the mobile apps. If youâre curious and want to see the list of trackers on popular website, you can also install Kimetrak to understand that itâs a widespread issue.
Action: Use an ad blocker Who is this for: Everyone who can support the moral burden How difficult is it: Fairly easy these days but you might be locked out of the content on some news websites as a result Tell me more: If youâve tried using a tracker blocker, you may have noticed that many ads have been blocked in the process. Thatâs because most ads load from third-party servers that track you across multiple sites. So if you want to go one step further and block all ads, you should install an ad blocker. Some browsers like Opera come with an ad blocker. Otherwise, we recommend uBlock Origin on macOS, Windows, Linux and Android. 1Blocker is a solid option on iOS. But letâs be honest, TechCrunch makes some money with online ads. If 100% of web users install an ad blocker many websites you know and love would simply go bankrupt. While your individual choice wonât have a material impact on the bottom line, consider whitelisting the sites you like. And if youâre angry at how many trackers your favorite news site is running try emailing them to ask (politely) if they can at least reduce the number of trackers they use.
Action: Make a private search engine your default Who is this for: Most people How difficult is it: A bit of effort because your search results might become slightly less relevant Tell me more: Google probably knows more about you than even Facebook does, thanks to the things you tell it when you type queries into its search engine. Though thatâs just the tip of how it tracks you â if you use Android it will keep running tabs on everywhere you go unless you opt out of location services. It also has its tracking infrastructure embedded on three-quarters of the top million websites. So chances are itâs following what youâre browsing online â unless you also take steps to lock down your browsing (see below). But one major way to limit what Google knows about you is to switch to using an alternative search engine when you need to look something up on the Internet. This isnât as hard as it used to be as there are some pretty decent alternatives now â such as DuckDuckGo which Apple will let you set as the default browser on iOS â or Qwant for French-speaking users. German users can check out Cliqz. You will also need to remember to be careful about any voice assistants you use as they often default to using Google to look stuff up on the web.
Action: Use private browser sessions Who is this for: Most people How difficult is it: Not at all if you understand what a private session is Tell me more: All browsers on desktop and mobile now let you open a private window. While this can be a powerful tool, it is often misunderstood. By default, private sessions donât make you more invisible â youâll get tracked from one tab to another. But private sessions let you start with a clean slate. Every time you close your private session, all your cookies are erased. Itâs like you disappear from everyoneâs radar. You can then reopen another private session and pretend that nobody knows who you are. Thatâs why using a private session for weeks or months doesnât do much, but short private sessions can be helpful.
Action: Use multiple browsers and/or browser containers Who is this for: People who donât want to stop using social media entirely How difficult is it: Some effort to not get in a muddle Tell me more: Using different browsers for different online activities can be a good way of separating portions of your browsing activity. You could, for example, use one browser on your desktop computer for your online banking, say, and a different browser for your social networking or ecommerce activity. Taking this approach further, you could use different mobile devices when you want to access different apps. The point of dividing your browsing across different browsers/devices is to try to make it harder to link all your online activity to you. That said, lots of adtech effort has been put into developing cross-device tracking techniques â so itâs not clear that fragmenting your browsing sessions will successful beat all the trackers. In a similar vein, in 2016 Mozilla added a feature to its Firefox browser thatâs intended to help web users segregate online identities within the same browser â called multi container extensions. This approach gives users some control but it does not stop their browser being fingerprinted and all their web activity in it linked and tracked. It may help reduce some cookie-based tracking, though. Last month Mozilla also updated the container feature to add one that specifically isolates a Facebook userâs identity from the rest of the web. This limits how Facebook can track a userâs non-Facebook web browsing â which yes Facebook does do, whatever Zuckerberg tried to claim in Congress â so again itâs a way to reduce what the social network giant knows about you. (Though it should also be noted that clicking on any Facebook social plug-ins you encounter on other websites will still send Facebook your personal data.)
Action: Get acquainted with Tor Who is this for: Activists, people with high risks attached to being tracked online, committed privacy advocates who want to help grow the Tor network How difficult is it: Patience is needed to use Tor. Also some effort to ensure you donât accidentally do something that compromises your anonymity Tell me more: For the most robust form of anonymous web browsing thereâs Tor. Torâs onion network works by encrypting and routing your Internet traffic randomly through a series of relay servers to make it harder to link a specific device with a specific online destination. This does mean itâs definitely not the fastest form of web browsing around. Some sites can also try to block Tor users so the Internet experience you get when browsing in this way may suffer. But itâs the best chance of truly preserving your online anonymity. Youâll need to download the relevant Tor browser bundle to use it. Itâs pretty straightforward to install and get going. But expect very frequent security updates which will also slow you down.
Action: Switch to another DNS Who is this for: People who donât trust their ISP How difficult is it: Moderately Tell me more: When you type an address in the address bar (such as techcrunch.com), your device asks a Domain Name Server to translate that address into an IP address (a unique combination of numbers and dots). By default, your ISP or your mobile carrier runs a DNS for their users. It means that they can see all your web history. Big telecom companies are going to take advantage of that to ramp up their advertising efforts. By default, your DNS query is also unencrypted and can be intercepted by people running the network. Some governments also ask telecom companies to block some websites on their DNS servers â some countries block Facebook for censorship reasons, others block The Pirate Bay for online piracy reasons. You can configure each of your device to use another public DNS. But donât use Googleâs public DNS! Itâs an ad company, so they really want to see your web history. Both Quad9Â and Cloudflareâs 1.1.1.1Â have strong privacy policies. But Quad9 is a not-for-profit organization, so itâs easier to trust them.
Action: Disable location services Who is this for: Anyone who feels uncomfortable with the idea of being kept under surveillance How difficult is it: A bit of effort finding and changing settings, and a bit of commitment to stay on top of any âupdatesâ to privacy policies which might try to revive location tracking. You also need to be prepared to accept some reduction in the utility and/or convenience of the service because it wonât be able to automatically customize what it shows you based on your location Tell me more: The tech industry is especially keen to keep tabs on where its users are at any given moment. And thanks to the smash hit success of smartphones with embedded sensors itâs never been easier to pervasively track where people are going â and therefore to infer what theyâre doing. For ad targeting purposes location data is highly valuable of course. But itâs also hugely intrusive. Did you just visit a certain type of health clinic? Were you carrying your phone loaded with location-sucking apps? Why then itâs trivially easy for the likes of Google and Facebook to connect your identity to that trip â and link all that intel to their ad networks. And if the social networkâs platform isnât adequately âlocked downâ â as Zuckerberg would put it â your private information might leak and end up elsewhere. It could even get passed around between all sorts of unknown entities â as the up to 87M Facebook profiles in the Cambridge Analytica scandal appear to have been. (Whistleblower Chris Wylie has said that Facebook data-set went âeverywhereâ.) There are other potential risks too. Insurance premiums being assessed based on covertly collected data inputs. Companies that work for government agencies using social media info to try to remove benefits or even have people deported. Location data can also influence the types of adverts you see or donât see. And on that front thereâs a risk of discrimination if certain types of ads â jobs or housing, for example â donât get served to you because you happen to be a person of color, say, or a Muslim. Excluding certain protected groups of people from adverts can be illegal â but that hasnât stopped it happening multiple times on Facebookâs platform. And location can be a key signal that underpins this kind of prejudicial discrimination. Even the prices you are offered online can depend on what is being inferred about you via your movements. The bottom line is that everyoneâs personal data is being made to carry a lot of baggage these days â and most of the time itâs almost impossible to figure out exactly what that unasked for baggage might entail when you consent to letting a particular app or service track where you go. Pervasive tracking of location at very least risks putting you at a disadvantage as a consumer. Certainly if you live somewhere without a proper regulatory framework for privacy. Itâs also worth bearing in mind how lax tech giants can be where location privacy is concerned â whether itâs Uberâs infamous âgod viewâ tool or Snapchat leaking schoolkidsâ location or Strava accidentally revealing the locations of military bases. Their record is pretty terrible. If you really canât be bothered to go and hunt down and switch off every location setting one fairly crude action you can take is to buy a faraday cage carry case â Silent Pocket makes an extensive line of carry cases with embedded wireless shielding tech, for instance â which you can pop your smartphone into when youâre on the move to isolate it from the network. Of course once you take it out it will instantly reconnect and location data will be passed again so this is not going to do very much on its own. Nixing location tracking in the settings is much more effective.
Action: Approach VPNs with extreme caution Who is this for: All web users â unless free Internet access is not available in your country How difficult is it: No additional effort Tell me more: While there may be times when you feel tempted to sign up and use a VPN service â say, to try to circumvent geoblocks so you can stream video content thatâs not otherwise available in your country â if you do this you should assume that the service provider will at very least be recording everything youâre doing online. They may choose to sell that info or even steal your identity. Many of them promise you perfect privacy and great terms of service. But you can never know for sure if theyâre actually doing what they say. So the rule of thumb about all VPNs is: Assume zero privacy â and avoid if at all possible. Facebook even has its own VPN â which itâs been aggressively pushing to users of its main app by badging it as a security service, with the friendly-sounding name âProtectâ. In reality the company wants you to use this so it can track what other apps youâre using â for its own business intelligence purposes. So a more accurate name for this âserviceâ would be: âProtect Facebookâs stranglehold on the social webâ.
Action: Build your own VPN server Who is this for: Developers How difficult is it: You need to be comfortable with the Terminal Tell me more: The only VPN server you can trust is the one you built yourself! In that case, VPN servers can be a great tool if youâre on a network you donât trust (a hotel, a conference or an office). We recommend using Algo VPNÂ and a hosting provider you trust.
Action: Take care with third-party keyboard apps Who is this for: All touchscreen device users How difficult is it: No additional effort Tell me more: Keyboard apps are a potential privacy minefield given that, if you allow cloud-enabled features, they can be in a position to suck out all the information youâre typing into your device â from passwords to credit card numbers to the private contents of your messages. Thatâs not to say that all third-party keyboards are keylogging everything you type. But the risk is there â so you need to be very careful about what you choose to use. Security is also key. Last year, sensitive personal data from 31M+ users of one third-party keyboard, AI.type, leaked online after the company had failed to properly secure its database server, as one illustrative example of the potential risks. Google knows how powerful keyboards can be as a data-sucker â which is why it got into the third-party keyboard game, outing its own Gboard keyboard app first for Appleâs iOS in 2016 and later bringing it to Android. If you use Gboard you should know you are handing the adtech giant another firehose of your private information â though it claims that only search queries and âusage statisticsâ are sent by Gboard to Google (The privacy policy further specifies: âAnything you type other than your searches, like passwords or chats with friends, isnât sent. Saved words on your device arenât sent.â). So if you believe that Gboard is not literally a keylogger. But it is watching what you search for and how you use your phone. Also worth remembering: Data will still be passed by Gboard to Google if youâre using an e2e encrypted messenger like Signal. So third party keyboards can erode the protection afforded by robust e2e encryption â so again: Be very careful what you use.
Action: Use end-to-end encrypted messengers Who is this for: Everyone who can How difficult is it: Mild effort unless all your friends are using other messaging apps Tell me more: Choosing friends based on their choice of messaging app isnât a great option so real world network effects can often work against privacy. Indeed, Facebook uses the fuzzy feelings you have about your friends to manipulate Messenger users to consent to continuously uploading their phone contacts, by suggesting you have to if you want to talk to your contacts. (Which is, by the by, entirely bogus.) But if all your friends use a messaging app that does not have end-to-end encryption chances are youâll feel forced to use that same non-privacy-safe app too. Given that the other option is to exclude yourself from the digital chatter of your friend group. Which would clearly suck. Facebook-owned WhatsApp does at least have end-to-end encryption â and is widely used (certainly internationally). Though you still need to be careful to opt out of any privacy-eroding terms the company tries to push. In summer 2016, for example, a major T&Cs change sought to link WhatsApp usersâ accounts with their Facebook profiles (and thus with all the data Facebook holds on them) â as well as sharing sensitive stuff like your last seen status, your address book, your BFFs in Whatsapp and all sorts of metadata with Zuckâs âfamilyâ of companies. Thankfully most of this privacy-hostile data sharing has been suspended in Europe, after Facebook got in trouble with local data protection agencies.Â
Action: Use end-to-end encryption if you use cloud storage Who is this for: Dedicated privacy practitioners, anyone worried about third parties accessing their stuff How difficult is it: Some effort, especially if you have lots of content stored in another service that you need to migrate Tell me more: Dropbox IPOâd last month â and the markets signalled their approval of its business. But someone who doesnât approve of the cloud storage giant is Edward Snowden â who in 2014 advised: âGet rid of Dropboxâ, arguing the company is hostile to privacy. The problem is that Dropbox does not offer zero access encryption â because it retains encryption keys, meaning it can technically decrypt and read the data you store with it if it decides it needs to or is served with a warrant. Cloud storage alternatives that do offer local encryption with no access to the encryption keys are available, such as Spideroak. And if youâre looking for a cloud backup service, Backblaze also offers the option to let you manage the encryption key. Another workaround if you do still want to use a service like Dropbox is to locally encrypt the stuff you want to store before you upload it â using another third party service such as Boxcryptor.
Action: Use an end-to-end encrypted email service Who is this for: Anyone who wants to be sure their email isnât being data mined How difficult is it: Some effort â largely around migrating data and/or contacts from another email service Tell me more: In the middle of last year Google finally announced it would no longer be data-mining the emails inside its Gmail free email service. (For a little perspective on how long it took to give up data-mining your emails, Gmail launched all the way back in 2004.) The company probably feels it has more than enough alternative data points feeding its user profiling at this point. Plus data-mining email with the rise of end-to-end encrypted messaging apps risks pushing the company over the âcreepy lineâ itâs been so keen to avoid to try to stave off the kind of privacy backlash currently engulfing Facebook. So does it mean that Gmail is now 100% privacy safe? No, because the service is not end-to-end encrypted. But there are now some great webmail clients that do offer robust end-to-end encryption â most notably the Swiss service Protonmail. Really itâs never been easier to access a reliable, user-friendly, pro-privacy email service. If you want to go one step further, you should set up PGP encryption keys and share them with your contacts. This is a lot more difficult though.
Action: Choose iOS over Android Who is this for: Mainstream consumers, Apple fans How difficult is it: Depends on the person. Apple hardware is generally more expensive so thereâs a cost premium Tell me more:Â No connected technology is 100% privacy safe but Appleâs hardware-focused business model means the companyâs devices are not engineered to try to harvest user data by default. Apple does also invest in developing pro-privacy technologies. Whereas thereâs no getting around the fact Android-maker Google is an adtech giant whose revenues depend on profiling users in order to target web users with adverts. Basically the company needs to suck your data to make a fat profit. Thatâs why Google asks you to share all your web and app activity and location history if you want to use Google Assistant, for instance. Android is a more open platform than iOS, though, and itâs possible to configure it in many different ways â some of which can be more locked down as regards privacy than others (the Android Open Source Project can be customized and used without Google services as default preloads, for example). But doing that kind of configuration is not going to be within reach of the average person. So iOS is the obvious choice for mainstream consumers.
Action: Delete your social media accounts Who is this for: Committed privacy lovers, anyone bored with public sharing How difficult is it: Some effort â mostly feeling like youâre going to miss out. But third party services can sometimes require a Facebook login (a workaround for that would be to create a dummy Facebook account purely for login purposes â using a name and email you donât use for anything else, and not linking it to your usual mobile phone number or adding anyone you actually know IRL) Tell me more: Deleting Facebook clearly isnât for everyone. But ask yourself how much you use it these days anyway? You might find yourself realizing itâs not really that central to what you do on the Internet after all. The center of gravity in social networking has shifted away from mass public sharing into more tightly curated friend groups anyway, thanks to the popularity of messaging apps. But of course Facebook owns Messenger, Instagram and WhatsApp too. So ducking out of its surveillance dragnet entirely is especially hard. Ideally you would also need to run tracker blockers (see above) as the company tracks non-Facebook users around the Internet via the pixels it has embedded on lots of popular websites. While getting rid of your social media accounts is not a privacy panacea, removing yourself from mainstream social network platforms at least reduces the risk of a chunk of your personal info being scraped and used without your say so. Though itâs still not absolutely guaranteed that when you delete an account the company in question will faithfully remove all your information from their servers â or indeed from the servers of any third party they shared your data with. If you really canât bring yourself to ditch Facebook (et al) entirely, at least dive into the settings and make sure you lock down as much access to your data as you can â including checking which apps have been connected to your account and removing any that arenât relevant or useful to you anymore.
Action: Say no to always-on voice assistants Who is this for: Anyone who values privacy more than gimmickry How difficult is it: No real effort Tell me more: Thereâs a rash of smart speaker voice assistants on shop shelves these days, marketed in a way that suggests theyâre a whole lot smarter and more useful than they actually are. In reality theyâre most likely to be used for playing music (albeit, audio quality can be very poor) or as very expensive egg timers. Something else the PR for gadgets like Amazonâs (many) Echos or Google Home doesnât mention is the massive privacy trade off involved with installing an always-on listening device inside your home. Essentially these devices function by streaming whatever you ask to the cloud and will typically store recordings of things youâve said in perpetuity on the companiesâ servers. Some do offer a delete option for stored audio but you would have to stay on top of deleting your data as long as you keep using the device. So itâs a tediously Sisyphean task. Smart speakers have also been caught listening to and recording things their owner didnât actually want them to â because they got triggered by accident. Or when someone on the TV used the trigger word. The privacy risks around smart speakers are clearly very large indeed. Not least because this type of personal data is of obvious and inevitable interest to law enforcement agencies. So ask yourself whether that fake fart dispenser gizmo youâre giggling about is really worth the trade off of inviting all sorts of outsiders to snoop on the goings on inside your home.
Action: Block some network requests Who is this for: Paranoid people How difficult is it: Need to be tech savvy Tell me more: On macOS, you can install something called Little Snitch to get an alert every time an app tries to talk with a server. You can approve or reject each request and create rules. If you donât want Microsoft Word to talk with Microsoftâs servers all the time for instance, itâs a good solution â but is not really user friendly.
Action: Use a privacy-focused operating system Who is this for: Edward Snowden How difficult is it: Need to be tech savvy Tell me more: If you really want to lock everything down, you should consider using Tails as your desktop operating system. Itâs a Linux distribution that leaves no trace by default, uses the Tor network for all network requests by default. But itâs not exactly user friendly, and itâs quite complicated to install on a USB drive. One for those whose threat model really is âbleeding edgeâ.
Action: Write to your political reps to demand stronger privacy laws Who is this for: Anyone who cares about privacy, and especially Internet users in North America right now How difficult is it: A bit of effort Tell me more:Â There appears to be bipartisan appetite among U.S. lawmakers to bring in some form of regulation for Internet companies. And with new tougher rules coming in in Europe next month itâs an especially opportune moment to push for change in the U.S. where web users are facing reduced standards vs international users after May 25. So itâs a great time to write to your reps reminding them youâre far more interested in your privacy being protected than Facebook winning some kind of surveillance arms race with the Chinese. Tell them itâs past time for the U.S. to draft laws that prioritize the protection of personal data.Â
Action: Throw away all your connected devices â and choose your friends wisely Who is this for: Fugitives and whistleblowers How difficult is it: Privacy doesnât get harder than this Tell me more:Â Last month the former Catalan president, Carles Puigdemont â who, in October, dodged arrest by the Spanish authorities by fleeing to Brussels after the regionâs abortive attempt to declare independence â was arrested by German police, after crossing the border from Denmark in a car. Spanish intelligence agents had reportedly tracked his movements via the GPS on the mobile device of one or more of his friends. The car had also been fitted with a tracker. Trusting anything not to snitch on you is a massive risk if your threat model is this high. The problem is you also need trustworthy friends to help you stay ahead of the surveillance dragnet thatâs out to get you.
Action: Ditch the Internet entirely Who is this for: Fugitives and whistleblowers How difficult is it: Privacy doesnât get harder than this Tell me more: Public administrations can ask you to do pretty much everything online these days â and even if itâs not mandatory to use their Internet service it can be incentivized in various ways. The direction of travel for government services is clearly digital. So eschewing the Internet entirely is getting harder and harder to do. One wild card option â thatâs still not a full Internet alternative (yet) â is to use a different type of network thatâs being engineered with privacy in mind. The experimental, decentralized MaidSafe network fits that bill. This majorly ambitious project has already clocked up a decadeâs worth of R&D on the foundersâ mission to rethink digital connectivity without compromising privacy and security by doing away with servers â and decentralizing and encrypting everything. Itâs a fascinating project. Just sadly not yet a fully-fledged Internet alternative.
0 notes
Text
How to save your privacy from the Internetâs clutches
Another week, another massive privacy scandal. When itâs not Facebook admitting it allowed data on as many as 87 million users to be sucked out by a developer on its platform who sold it to a political consultancy working for the Trump campaign, or dating app Grindr âfessing up to sharing its usersâ HIV status with third party A/B testers, some other ugly facet of the tech industryâs love affair with tracking everything its users do slides into view.
Suddenly, Android users discover to their horror that Googleâs mobile platform tells the company where they are all the time â thanks to baked-in location tracking bundled with Google services like Maps and Photos. Or Amazon Echo users realize Jeff Bezosâ ecommerce empire has amassed audio recordings of every single interaction theyâve had with their cute little smart speaker.
The problem, as ever with the tech industryâs teeny-weeny greyscaled legalise, is that the people it refers to as âusersâ arenât genuinely consenting to having their information sucked into the cloud for goodness knows what. Because they havenât been given a clear picture of what agreeing to share their data will really mean.
Instead one or two select features, with a mote of user benefit, tend to be presented at the point of sign up â to socially engineer âconsentâ. Then the company can walk away with a defacto license to perpetually harvest that personâs data by claiming that a consent box was once ticked.
A great example of that is Facebookâs Nearby Friends. The feature lets you share your position with your friends so â and hereâs that shiny promise â you can more easily hang out with them. But do you know anyone who is actively using this feature? Yet millions of people started sharing their exact location with Facebook for a feature thatâs now buried and mostly unused. Meanwhile Facebook is actively using your location to track your offline habits so it can make money targeting you with adverts.
Terms & Conditions are the biggest lie in the tech industry, as weâve written before. (And more recently: It was not consent, it was concealment.)
Senator Kennedy of Louisiana also made the point succinctly to Facebook founder Mark Zuckerberg this week, telling him to his face:Â âYour user agreement sucks.â We couldnât agree more.
Happily disingenuous T&Cs are on borrowed time â at least for European tech users, thanks to a new European Union data protection framework that will come into force next month. The GDPR tightens consent requirements â mandating clear and accurate information be provided to users at the point of sign up. Data collection is also more tightly tied to specific function.
From next month, holding onto personal data without a very good reason to do so will be far more risky â because GDPR is also backed up with a regime of supersized fines that are intended to make privacy rules much harder to ignore.
Of course U.S. tech users canât bank on benefiting from European privacy regulations. And while there are now growing calls in the country for legislation to protect peopleâs data â in a bid to steer off the next democracy-denting Cambridge Analytica scandal, at very least â any such process will take a lot of political will.
It certainly will not happen overnight. And you can expect tech giants to fight tooth and nail against laws being drafted and passed â as indeed Facebook, Google and others lobbied fiercely to try to get GDPR watered down.
Facebook has already revealed it will not be universally applying the European regulation â which means people in North America are likely to get a degree of lower privacy than Facebook users everywhere else in the world. Which doesnât exactly sound fair.
When it comes to privacy, some of you may think you have nothing to hide. But thatâs a straw man. Itâs especially hard to defend this line of thinking now that big tech companies have attracted so much soft power they can influence elections, inflame conflicts and divide people in general. Itâs time to think about the bigger impact of technology on the fabric of society, and not just your personal case.
Shifting the balance
So what can Internet users do right now to stop tech giants, advertisers and unknown entities tracking everything you do online â and trying to join the dots of your digital activity to paint a picture of who they think you are? At least, everything short of moving to Europe, where privacy is a fundamental right.
There are some practical steps you can take to limit day-to-day online privacy risks by reducing third party access to your information and shielding more of your digital activity from prying eyes.
Not all these measures are appropriate for every person. Itâs up to you to determine how much effort you want (or need) to put in to shield your privacy.
You may be happy to share a certain amount of personal data in exchange for access to a certain service, for example. But even then itâs unlikely that the full trade-off has been made clear to you. So itâs worth asking yourself if youâre really getting a good deal.
Once peopleâs eyes are opened to the fine-grained detail and depth of personal information being harvested, even some very seasoned tech users have reacted with shock â saying they had no idea, for example, that Facebook Messenger was continuously uploading their phone book and logging their calls and SMS metadata.
This is one of the reasons why the U.K.âs information commissioner has been calling for increased transparency about how and why data flows. Because for far too long tech savvy entities have been able to apply privacy hostile actions in the dark. And it hasnât really been possible for the average person to know whatâs being done with their information. Or even what data they are giving up when they click âI agreeâ.
Why does an A/B testing firm need to know a personâs HIV status? Why does a social network app need continuous access to your call history? Why should an ad giant be able to continuously pin your movements on a map?
Are you really getting so much value from an app that youâre happy for the company behind it and anyone else they partner with to know everywhere you go, everyone you talk to, the stuff you like and look at â even to have a pretty good idea what youâre thinking?
Every data misuse scandal shines a bit more light on some very murky practices â which will hopefully generate momentum for rule changes to disinfect data handling processes and strengthen individualsâ privacy by spotlighting trade-offs that have zero justification.
With some effort â and good online security practices (which weâre taking as a given for the purposes of this article, but one quick tip: Enable 2FA everywhere you can) â you can also make it harder for the webâs lurking watchers to dine out on your data.
Just donât expect the lengths you have to go to protect your privacy to feel fair or just â the horrible truth is this fight sucks.
But whatever you do, donât give up.
How to hide on the internet
Action: Tape over all your webcams Who is this for: Everyone â even Mark Zuckerberg! How difficult is it: Easy peasy lemon squeezy Tell me more: You can get fancy removable stickers for this purpose (noyb has some nice ones). Or you can go DIY and use a bit of masking tape â on your laptop, your smartphone, even your smart TV⊠If your job requires you to be on camera, such as for some conference calls, and you want to look a bit more pro you can buy a webcam cover. Sadly locking down privacy is rarely this easy.
Action: Install HTTPS Everywhere Who is this for: Everyone â seriously do it How difficult is it: Mild effort Tell me more: Many websites offer encryption. With HTTPS, people running the network between your device and the server hosting the website youâre browsing canât see your requests and your internet traffic. But some websites still load unencrypted pages by default (HTTP), which also causes a security risk. The EFF has developed a browser extension that makes sure that you access all websites that offer HTTPS using⊠HTTPS.
Action: Use tracker blockers Who is this for: Everyone â except people who like being ad-stalked online How difficult is it: Mild effort Tell me more: Trackers refers to a whole category of privacy-hostile technologies designed to follow and record what web users are doing as they move from site to site, and even across different devices. Trackers come in a range of forms these days. And there are some pretty sophisticated ways of being tracked (some definitely harder to thwart than others). But to combat trackers being deployed on popular websites â which are probably also making the pages slower to load than they otherwise would be â thereâs now a range of decent, user-friendly tracker blockers to choose from. Pro-privacy search engine DuckDuckGo recently added a tracker blocker to their browser extensions, for example. Disconnect.me is also a popular extension to block trackers from third-party websites. Firefox also has a built-in tracker blocker, which is now enabled by default in the mobile apps. If youâre curious and want to see the list of trackers on popular website, you can also install Kimetrak to understand that itâs a widespread issue.
Action: Use an ad blocker Who is this for: Everyone who can support the moral burden How difficult is it: Fairly easy these days but you might be locked out of the content on some news websites as a result Tell me more: If youâve tried using a tracker blocker, you may have noticed that many ads have been blocked in the process. Thatâs because most ads load from third-party servers that track you across multiple sites. So if you want to go one step further and block all ads, you should install an ad blocker. Some browsers like Opera come with an ad blocker. Otherwise, we recommend uBlock Origin on macOS, Windows, Linux and Android. 1Blocker is a solid option on iOS. But letâs be honest, TechCrunch makes some money with online ads. If 100% of web users install an ad blocker many websites you know and love would simply go bankrupt. While your individual choice wonât have a material impact on the bottom line, consider whitelisting the sites you like. And if youâre angry at how many trackers your favorite news site is running try emailing them to ask (politely) if they can at least reduce the number of trackers they use.
Action: Make a private search engine your default Who is this for: Most people How difficult is it: A bit of effort because your search results might become slightly less relevant Tell me more: Google probably knows more about you than even Facebook does, thanks to the things you tell it when you type queries into its search engine. Though thatâs just the tip of how it tracks you â if you use Android it will keep running tabs on everywhere you go unless you opt out of location services. It also has its tracking infrastructure embedded on three-quarters of the top million websites. So chances are itâs following what youâre browsing online â unless you also take steps to lock down your browsing (see below). But one major way to limit what Google knows about you is to switch to using an alternative search engine when you need to look something up on the Internet. This isnât as hard as it used to be as there are some pretty decent alternatives now â such as DuckDuckGo which Apple will let you set as the default browser on iOS â or Qwant for French-speaking users. German users can check out Cliqz. You will also need to remember to be careful about any voice assistants you use as they often default to using Google to look stuff up on the web.
Action: Use private browser sessions Who is this for: Most people How difficult is it: Not at all if you understand what a private session is Tell me more: All browsers on desktop and mobile now let you open a private window. While this can be a powerful tool, it is often misunderstood. By default, private sessions donât make you more invisible â youâll get tracked from one tab to another. But private sessions let you start with a clean slate. Every time you close your private session, all your cookies are erased. Itâs like you disappear from everyoneâs radar. You can then reopen another private session and pretend that nobody knows who you are. Thatâs why using a private session for weeks or months doesnât do much, but short private sessions can be helpful.
Action: Use multiple browsers and/or browser containers Who is this for: People who donât want to stop using social media entirely How difficult is it: Some effort to not get in a muddle Tell me more: Using different browsers for different online activities can be a good way of separating portions of your browsing activity. You could, for example, use one browser on your desktop computer for your online banking, say, and a different browser for your social networking or ecommerce activity. Taking this approach further, you could use different mobile devices when you want to access different apps. The point of dividing your browsing across different browsers/devices is to try to make it harder to link all your online activity to you. That said, lots of adtech effort has been put into developing cross-device tracking techniques â so itâs not clear that fragmenting your browsing sessions will successful beat all the trackers. In a similar vein, in 2016 Mozilla added a feature to its Firefox browser thatâs intended to help web users segregate online identities within the same browser â called multi container extensions. This approach gives users some control but it does not stop their browser being fingerprinted and all their web activity in it linked and tracked. It may help reduce some cookie-based tracking, though. Last month Mozilla also updated the container feature to add one that specifically isolates a Facebook userâs identity from the rest of the web. This limits how Facebook can track a userâs non-Facebook web browsing â which yes Facebook does do, whatever Zuckerberg tried to claim in Congress â so again itâs a way to reduce what the social network giant knows about you. (Though it should also be noted that clicking on any Facebook social plug-ins you encounter on other websites will still send Facebook your personal data.)
Action: Get acquainted with Tor Who is this for: Activists, people with high risks attached to being tracked online, committed privacy advocates who want to help grow the Tor network How difficult is it: Patience is needed to use Tor. Also some effort to ensure you donât accidentally do something that compromises your anonymity Tell me more: For the most robust form of anonymous web browsing thereâs Tor. Torâs onion network works by encrypting and routing your Internet traffic randomly through a series of relay servers to make it harder to link a specific device with a specific online destination. This does mean itâs definitely not the fastest form of web browsing around. Some sites can also try to block Tor users so the Internet experience you get when browsing in this way may suffer. But itâs the best chance of truly preserving your online anonymity. Youâll need to download the relevant Tor browser bundle to use it. Itâs pretty straightforward to install and get going. But expect very frequent security updates which will also slow you down.
Action: Switch to another DNS Who is this for: People who donât trust their ISP How difficult is it: Moderately Tell me more: When you type an address in the address bar (such as techcrunch.com), your device asks a Domain Name Server to translate that address into an IP address (a unique combination of numbers and dots). By default, your ISP or your mobile carrier runs a DNS for their users. It means that they can see all your web history. Big telecom companies are going to take advantage of that to ramp up their advertising efforts. By default, your DNS query is also unencrypted and can be intercepted by people running the network. Some governments also ask telecom companies to block some websites on their DNS servers â some countries block Facebook for censorship reasons, others block The Pirate Bay for online piracy reasons. You can configure each of your device to use another public DNS. But donât use Googleâs public DNS! Itâs an ad company, so they really want to see your web history. Both Quad9Â and Cloudflareâs 1.1.1.1Â have strong privacy policies. But Quad9 is a not-for-profit organization, so itâs easier to trust them.
Action: Disable location services Who is this for: Anyone who feels uncomfortable with the idea of being kept under surveillance How difficult is it: A bit of effort finding and changing settings, and a bit of commitment to stay on top of any âupdatesâ to privacy policies which might try to revive location tracking. You also need to be prepared to accept some reduction in the utility and/or convenience of the service because it wonât be able to automatically customize what it shows you based on your location Tell me more: The tech industry is especially keen to keep tabs on where its users are at any given moment. And thanks to the smash hit success of smartphones with embedded sensors itâs never been easier to pervasively track where people are going â and therefore to infer what theyâre doing. For ad targeting purposes location data is highly valuable of course. But itâs also hugely intrusive. Did you just visit a certain type of health clinic? Were you carrying your phone loaded with location-sucking apps? Why then itâs trivially easy for the likes of Google and Facebook to connect your identity to that trip â and link all that intel to their ad networks. And if the social networkâs platform isnât adequately âlocked downâ â as Zuckerberg would put it â your private information might leak and end up elsewhere. It could even get passed around between all sorts of unknown entities â as the up to 87M Facebook profiles in the Cambridge Analytica scandal appear to have been. (Whistleblower Chris Wylie has said that Facebook data-set went âeverywhereâ.) There are other potential risks too. Insurance premiums being assessed based on covertly collected data inputs. Companies that work for government agencies using social media info to try to remove benefits or even have people deported. Location data can also influence the types of adverts you see or donât see. And on that front thereâs a risk of discrimination if certain types of ads â jobs or housing, for example â donât get served to you because you happen to be a person of color, say, or a Muslim. Excluding certain protected groups of people from adverts can be illegal â but that hasnât stopped it happening multiple times on Facebookâs platform. And location can be a key signal that underpins this kind of prejudicial discrimination. Even the prices you are offered online can depend on what is being inferred about you via your movements. The bottom line is that everyoneâs personal data is being made to carry a lot of baggage these days â and most of the time itâs almost impossible to figure out exactly what that unasked for baggage might entail when you consent to letting a particular app or service track where you go. Pervasive tracking of location at very least risks putting you at a disadvantage as a consumer. Certainly if you live somewhere without a proper regulatory framework for privacy. Itâs also worth bearing in mind how lax tech giants can be where location privacy is concerned â whether itâs Uberâs infamous âgod viewâ tool or Snapchat leaking schoolkidsâ location or Strava accidentally revealing the locations of military bases. Their record is pretty terrible. If you really canât be bothered to go and hunt down and switch off every location setting one fairly crude action you can take is to buy a faraday cage carry case â Silent Pocket makes an extensive line of carry cases with embedded wireless shielding tech, for instance â which you can pop your smartphone into when youâre on the move to isolate it from the network. Of course once you take it out it will instantly reconnect and location data will be passed again so this is not going to do very much on its own. Nixing location tracking in the settings is much more effective.
Action: Approach VPNs with extreme caution Who is this for: All web users â unless free Internet access is not available in your country How difficult is it: No additional effort Tell me more: While there may be times when you feel tempted to sign up and use a VPN service â say, to try to circumvent geoblocks so you can stream video content thatâs not otherwise available in your country â if you do this you should assume that the service provider will at very least be recording everything youâre doing online. They may choose to sell that info or even steal your identity. Many of them promise you perfect privacy and great terms of service. But you can never know for sure if theyâre actually doing what they say. So the rule of thumb about all VPNs is: Assume zero privacy â and avoid if at all possible. Facebook even has its own VPN â which itâs been aggressively pushing to users of its main app by badging it as a security service, with the friendly-sounding name âProtectâ. In reality the company wants you to use this so it can track what other apps youâre using â for its own business intelligence purposes. So a more accurate name for this âserviceâ would be: âProtect Facebookâs stranglehold on the social webâ.
Action: Build your own VPN server Who is this for: Developers How difficult is it: You need to be comfortable with the Terminal Tell me more: The only VPN server you can trust is the one you built yourself! In that case, VPN servers can be a great tool if youâre on a network you donât trust (a hotel, a conference or an office). We recommend using Algo VPNÂ and a hosting provider you trust.
Action: Take care with third-party keyboard apps Who is this for: All touchscreen device users How difficult is it: No additional effort Tell me more: Keyboard apps are a potential privacy minefield given that, if you allow cloud-enabled features, they can be in a position to suck out all the information youâre typing into your device â from passwords to credit card numbers to the private contents of your messages. Thatâs not to say that all third-party keyboards are keylogging everything you type. But the risk is there â so you need to be very careful about what you choose to use. Security is also key. Last year, sensitive personal data from 31M+ users of one third-party keyboard, AI.type, leaked online after the company had failed to properly secure its database server, as one illustrative example of the potential risks. Google knows how powerful keyboards can be as a data-sucker â which is why it got into the third-party keyboard game, outing its own Gboard keyboard app first for Appleâs iOS in 2016 and later bringing it to Android. If you use Gboard you should know you are handing the adtech giant another firehose of your private information â though it claims that only search queries and âusage statisticsâ are sent by Gboard to Google (The privacy policy further specifies: âAnything you type other than your searches, like passwords or chats with friends, isnât sent. Saved words on your device arenât sent.â). So if you believe that Gboard is not literally a keylogger. But it is watching what you search for and how you use your phone. Also worth remembering: Data will still be passed by Gboard to Google if youâre using an e2e encrypted messenger like Signal. So third party keyboards can erode the protection afforded by robust e2e encryption â so again: Be very careful what you use.
Action: Use end-to-end encrypted messengers Who is this for: Everyone who can How difficult is it: Mild effort unless all your friends are using other messaging apps Tell me more: Choosing friends based on their choice of messaging app isnât a great option so real world network effects can often work against privacy. Indeed, Facebook uses the fuzzy feelings you have about your friends to manipulate Messenger users to consent to continuously uploading their phone contacts, by suggesting you have to if you want to talk to your contacts. (Which is, by the by, entirely bogus.) But if all your friends use a messaging app that does not have end-to-end encryption chances are youâll feel forced to use that same non-privacy-safe app too. Given that the other option is to exclude yourself from the digital chatter of your friend group. Which would clearly suck. Facebook-owned WhatsApp does at least have end-to-end encryption â and is widely used (certainly internationally). Though you still need to be careful to opt out of any privacy-eroding terms the company tries to push. In summer 2016, for example, a major T&Cs change sought to link WhatsApp usersâ accounts with their Facebook profiles (and thus with all the data Facebook holds on them) â as well as sharing sensitive stuff like your last seen status, your address book, your BFFs in Whatsapp and all sorts of metadata with Zuckâs âfamilyâ of companies. Thankfully most of this privacy-hostile data sharing has been suspended in Europe, after Facebook got in trouble with local data protection agencies.Â
Action: Use end-to-end encryption if you use cloud storage Who is this for: Dedicated privacy practitioners, anyone worried about third parties accessing their stuff How difficult is it: Some effort, especially if you have lots of content stored in another service that you need to migrate Tell me more: Dropbox IPOâd last month â and the markets signalled their approval of its business. But someone who doesnât approve of the cloud storage giant is Edward Snowden â who in 2014 advised: âGet rid of Dropboxâ, arguing the company is hostile to privacy. The problem is that Dropbox does not offer zero access encryption â because it retains encryption keys, meaning it can technically decrypt and read the data you store with it if it decides it needs to or is served with a warrant. Cloud storage alternatives that do offer local encryption with no access to the encryption keys are available, such as Spideroak. And if youâre looking for a cloud backup service, Backblaze also offers the option to let you manage the encryption key. Another workaround if you do still want to use a service like Dropbox is to locally encrypt the stuff you want to store before you upload it â using another third party service such as Boxcryptor.
Action: Use an end-to-end encrypted email service Who is this for: Anyone who wants to be sure their email isnât being data mined How difficult is it: Some effort â largely around migrating data and/or contacts from another email service Tell me more: In the middle of last year Google finally announced it would no longer be data-mining the emails inside its Gmail free email service. (For a little perspective on how long it took to give up data-mining your emails, Gmail launched all the way back in 2004.) The company probably feels it has more than enough alternative data points feeding its user profiling at this point. Plus data-mining email with the rise of end-to-end encrypted messaging apps risks pushing the company over the âcreepy lineâ itâs been so keen to avoid to try to stave off the kind of privacy backlash currently engulfing Facebook. So does it mean that Gmail is now 100% privacy safe? No, because the service is not end-to-end encrypted. But there are now some great webmail clients that do offer robust end-to-end encryption â most notably the Swiss service Protonmail. Really itâs never been easier to access a reliable, user-friendly, pro-privacy email service. If you want to go one step further, you should set up PGP encryption keys and share them with your contacts. This is a lot more difficult though.
Action: Choose iOS over Android Who is this for: Mainstream consumers, Apple fans How difficult is it: Depends on the person. Apple hardware is generally more expensive so thereâs a cost premium Tell me more:Â No connected technology is 100% privacy safe but Appleâs hardware-focused business model means the companyâs devices are not engineered to try to harvest user data by default. Apple does also invest in developing pro-privacy technologies. Whereas thereâs no getting around the fact Android-maker Google is an adtech giant whose revenues depend on profiling users in order to target web users with adverts. Basically the company needs to suck your data to make a fat profit. Thatâs why Google asks you to share all your web and app activity and location history if you want to use Google Assistant, for instance. Android is a more open platform than iOS, though, and itâs possible to configure it in many different ways â some of which can be more locked down as regards privacy than others (the Android Open Source Project can be customized and used without Google services as default preloads, for example). But doing that kind of configuration is not going to be within reach of the average person. So iOS is the obvious choice for mainstream consumers.
Action: Delete your social media accounts Who is this for: Committed privacy lovers, anyone bored with public sharing How difficult is it: Some effort â mostly feeling like youâre going to miss out. But third party services can sometimes require a Facebook login (a workaround for that would be to create a dummy Facebook account purely for login purposes â using a name and email you donât use for anything else, and not linking it to your usual mobile phone number or adding anyone you actually know IRL) Tell me more: Deleting Facebook clearly isnât for everyone. But ask yourself how much you use it these days anyway? You might find yourself realizing itâs not really that central to what you do on the Internet after all. The center of gravity in social networking has shifted away from mass public sharing into more tightly curated friend groups anyway, thanks to the popularity of messaging apps. But of course Facebook owns Messenger, Instagram and WhatsApp too. So ducking out of its surveillance dragnet entirely is especially hard. Ideally you would also need to run tracker blockers (see above) as the company tracks non-Facebook users around the Internet via the pixels it has embedded on lots of popular websites. While getting rid of your social media accounts is not a privacy panacea, removing yourself from mainstream social network platforms at least reduces the risk of a chunk of your personal info being scraped and used without your say so. Though itâs still not absolutely guaranteed that when you delete an account the company in question will faithfully remove all your information from their servers â or indeed from the servers of any third party they shared your data with. If you really canât bring yourself to ditch Facebook (et al) entirely, at least dive into the settings and make sure you lock down as much access to your data as you can â including checking which apps have been connected to your account and removing any that arenât relevant or useful to you anymore.
Action: Say no to always-on voice assistants Who is this for: Anyone who values privacy more than gimmickry How difficult is it: No real effort Tell me more: Thereâs a rash of smart speaker voice assistants on shop shelves these days, marketed in a way that suggests theyâre a whole lot smarter and more useful than they actually are. In reality theyâre most likely to be used for playing music (albeit, audio quality can be very poor) or as very expensive egg timers. Something else the PR for gadgets like Amazonâs (many) Echos or Google Home doesnât mention is the massive privacy trade off involved with installing an always-on listening device inside your home. Essentially these devices function by streaming whatever you ask to the cloud and will typically store recordings of things youâve said in perpetuity on the companiesâ servers. Some do offer a delete option for stored audio but you would have to stay on top of deleting your data as long as you keep using the device. So itâs a tediously Sisyphean task. Smart speakers have also been caught listening to and recording things their owner didnât actually want them to â because they got triggered by accident. Or when someone on the TV used the trigger word. The privacy risks around smart speakers are clearly very large indeed. Not least because this type of personal data is of obvious and inevitable interest to law enforcement agencies. So ask yourself whether that fake fart dispenser gizmo youâre giggling about is really worth the trade off of inviting all sorts of outsiders to snoop on the goings on inside your home.
Action: Block some network requests Who is this for: Paranoid people How difficult is it: Need to be tech savvy Tell me more: On macOS, you can install something called Little Snitch to get an alert every time an app tries to talk with a server. You can approve or reject each request and create rules. If you donât want Microsoft Word to talk with Microsoftâs servers all the time for instance, itâs a good solution â but is not really user friendly.
Action: Use a privacy-focused operating system Who is this for: Edward Snowden How difficult is it: Need to be tech savvy Tell me more: If you really want to lock everything down, you should consider using Tails as your desktop operating system. Itâs a Linux distribution that leaves no trace by default, uses the Tor network for all network requests by default. But itâs not exactly user friendly, and itâs quite complicated to install on a USB drive. One for those whose threat model really is âbleeding edgeâ.
Action: Write to your political reps to demand stronger privacy laws Who is this for: Anyone who cares about privacy, and especially Internet users in North America right now How difficult is it: A bit of effort Tell me more:Â There appears to be bipartisan appetite among U.S. lawmakers to bring in some form of regulation for Internet companies. And with new tougher rules coming in in Europe next month itâs an especially opportune moment to push for change in the U.S. where web users are facing reduced standards vs international users after May 25. So itâs a great time to write to your reps reminding them youâre far more interested in your privacy being protected than Facebook winning some kind of surveillance arms race with the Chinese. Tell them itâs past time for the U.S. to draft laws that prioritize the protection of personal data.Â
Action: Throw away all your connected devices â and choose your friends wisely Who is this for: Fugitives and whistleblowers How difficult is it: Privacy doesnât get harder than this Tell me more:Â Last month the former Catalan president, Carles Puigdemont â who, in October, dodged arrest by the Spanish authorities by fleeing to Brussels after the regionâs abortive attempt to declare independence â was arrested by German police, after crossing the border from Denmark in a car. Spanish intelligence agents had reportedly tracked his movements via the GPS on the mobile device of one or more of his friends. The car had also been fitted with a tracker. Trusting anything not to snitch on you is a massive risk if your threat model is this high. The problem is you also need trustworthy friends to help you stay ahead of the surveillance dragnet thatâs out to get you.
Action: Ditch the Internet entirely Who is this for: Fugitives and whistleblowers How difficult is it: Privacy doesnât get harder than this Tell me more: Public administrations can ask you to do pretty much everything online these days â and even if itâs not mandatory to use their Internet service it can be incentivized in various ways. The direction of travel for government services is clearly digital. So eschewing the Internet entirely is getting harder and harder to do. One wild card option â thatâs still not a full Internet alternative (yet) â is to use a different type of network thatâs being engineered with privacy in mind. The experimental, decentralized MaidSafe network fits that bill. This majorly ambitious project has already clocked up a decadeâs worth of R&D on the foundersâ mission to rethink digital connectivity without compromising privacy and security by doing away with servers â and decentralizing and encrypting everything. Itâs a fascinating project. Just sadly not yet a fully-fledged Internet alternative.
from iraidajzsmmwtv https://ift.tt/2HrWU5w via IFTTT
0 notes
Text
How to save your privacy from the Internetâs clutches
Buy some great High Tech products from WithCharity.org #All Profits go to Charity
Another week, another massive privacy scandal. When itâs not Facebook admitting it allowed data on as many as 87 million users to be sucked out by a developer on its platform who sold it to a political consultancy working for the Trump campaign, or dating app Grindr âfessing up to sharing its usersâ HIV status with third party A/B testers, some other ugly facet of the tech industryâs love affair with tracking everything its users do slides into view.
Suddenly, Android users discover to their horror that Googleâs mobile platform tells the company where they are all the time â thanks to baked-in location tracking bundled with Google services like Maps and Photos. Or Amazon Echo users realize Jeff Bezosâ ecommerce empire has amassed audio recordings of every single interaction theyâve had with their cute little smart speaker.
The problem, as ever with the tech industryâs teeny-weeny greyscaled legalise, is that the people it refers to as âusersâ arenât genuinely consenting to having their information sucked into the cloud for goodness knows what. Because they havenât been given a clear picture of what agreeing to share their data will really mean.
Instead one or two select features, with a mote of user benefit, tend to be presented at the point of sign up â to socially engineer âconsentâ. Then the company can walk away with a defacto license to perpetually harvest that personâs data by claiming that a consent box was once ticked.
A great example of that is Facebookâs Nearby Friends. The feature lets you share your position with your friends so â and hereâs that shiny promise â you can more easily hang out with them. But do you know anyone who is actively using this feature? Yet millions of people started sharing their exact location with Facebook for a feature thatâs now buried and mostly unused. Meanwhile Facebook is actively using your location to track your offline habits so it can make money targeting you with adverts.
Terms & Conditions are the biggest lie in the tech industry, as weâve written before. (And more recently: It was not consent, it was concealment.)
Senator Kennedy of Louisiana also made the point succinctly to Facebook founder Mark Zuckerberg this week, telling him to his face:Â âYour user agreement sucks.â We couldnât agree more.
Happily disingenuous T&Cs are on borrowed time â at least for European tech users, thanks to a new European Union data protection framework that will come into force next month. The GDPR tightens consent requirements â mandating clear and accurate information be provided to users at the point of sign up. Data collection is also more tightly tied to specific function.
From next month, holding onto personal data without a very good reason to do so will be far more risky â because GDPR is also backed up with a regime of supersized fines that are intended to make privacy rules much harder to ignore.
Of course U.S. tech users canât bank on benefiting from European privacy regulations. And while there are now growing calls in the country for legislation to protect peopleâs data â in a bid to steer off the next democracy-denting Cambridge Analytica scandal, at very least â any such process will take a lot of political will.
It certainly will not happen overnight. And you can expect tech giants to fight tooth and nail against laws being drafted and passed â as indeed Facebook, Google and others lobbied fiercely to try to get GDPR watered down.
Facebook has already revealed it will not be universally applying the European regulation â which means people in North America are likely to get a degree of lower privacy than Facebook users everywhere else in the world. Which doesnât exactly sound fair.
When it comes to privacy, some of you may think you have nothing to hide. But thatâs a straw man. Itâs especially hard to defend this line of thinking now that big tech companies have attracted so much soft power they can influence elections, inflame conflicts and divide people in general. Itâs time to think about the bigger impact of technology on the fabric of society, and not just your personal case.
Shifting the balance
So what can Internet users do right now to stop tech giants, advertisers and unknown entities tracking everything you do online â and trying to join the dots of your digital activity to paint a picture of who they think you are? At least, everything short of moving to Europe, where privacy is a fundamental right.
There are some practical steps you can take to limit day-to-day online privacy risks by reducing third party access to your information and shielding more of your digital activity from prying eyes.
Not all these measures are appropriate for every person. Itâs up to you to determine how much effort you want (or need) to put in to shield your privacy.
You may be happy to share a certain amount of personal data in exchange for access to a certain service, for example. But even then itâs unlikely that the full trade-off has been made clear to you. So itâs worth asking yourself if youâre really getting a good deal.
Once peopleâs eyes are opened to the fine-grained detail and depth of personal information being harvested, even some very seasoned tech users have reacted with shock â saying they had no idea, for example, that Facebook Messenger was continuously uploading their phone book and logging their calls and SMS metadata.
This is one of the reasons why the U.K.âs information commissioner has been calling for increased transparency about how and why data flows. Because for far too long tech savvy entities have been able to apply privacy hostile actions in the dark. And it hasnât really been possible for the average person to know whatâs being done with their information. Or even what data they are giving up when they click âI agreeâ.
Why does an A/B testing firm need to know a personâs HIV status? Why does a social network app need continuous access to your call history? Why should an ad giant be able to continuously pin your movements on a map?
Are you really getting so much value from an app that youâre happy for the company behind it and anyone else they partner with to know everywhere you go, everyone you talk to, the stuff you like and look at â even to have a pretty good idea what youâre thinking?
Every data misuse scandal shines a bit more light on some very murky practices â which will hopefully generate momentum for rule changes to disinfect data handling processes and strengthen individualsâ privacy by spotlighting trade-offs that have zero justification.
With some effort â and good online security practices (which weâre taking as a given for the purposes of this article, but one quick tip: Enable 2FA everywhere you can) â you can also make it harder for the webâs lurking watchers to dine out on your data.
Just donât expect the lengths you have to go to protect your privacy to feel fair or just â the horrible truth is this fight sucks.
But whatever you do, donât give up.
How to hide on the internet
Action: Tape over all your webcams Who is this for: Everyone â even Mark Zuckerberg! How difficult is it: Easy peasy lemon squeezy Tell me more: You can get fancy removable stickers for this purpose (noyb has some nice ones). Or you can go DIY and use a bit of masking tape â on your laptop, your smartphone, even your smart TV⊠If your job requires you to be on camera, such as for some conference calls, and you want to look a bit more pro you can buy a webcam cover. Sadly locking down privacy is rarely this easy.
Action: Install HTTPS Everywhere Who is this for: Everyone â seriously do it How difficult is it: Mild effort Tell me more: Many websites offer encryption. With HTTPS, people running the network between your device and the server hosting the website youâre browsing canât see your requests and your internet traffic. But some websites still load unencrypted pages by default (HTTP), which also causes a security risk. The EFF has developed a browser extension that makes sure that you access all websites that offer HTTPS using⊠HTTPS.
Action: Use tracker blockers Who is this for: Everyone â except people who like being ad-stalked online How difficult is it: Mild effort Tell me more: Trackers refers to a whole category of privacy-hostile technologies designed to follow and record what web users are doing as they move from site to site, and even across different devices. Trackers come in a range of forms these days. And there are some pretty sophisticated ways of being tracked (some definitely harder to thwart than others). But to combat trackers being deployed on popular websites â which are probably also making the pages slower to load than they otherwise would be â thereâs now a range of decent, user-friendly tracker blockers to choose from. Pro-privacy search engine DuckDuckGo recently added a tracker blocker to their browser extensions, for example. Disconnect.me is also a popular extension to block trackers from third-party websites. Firefox also has a built-in tracker blocker, which is now enabled by default in the mobile apps. If youâre curious and want to see the list of trackers on popular website, you can also install Kimetrak to understand that itâs a widespread issue.
Action: Use an ad blocker Who is this for: Everyone who can support the moral burden How difficult is it: Fairly easy these days but you might be locked out of the content on some news websites as a result Tell me more: If youâve tried using a tracker blocker, you may have noticed that many ads have been blocked in the process. Thatâs because most ads load from third-party servers that track you across multiple sites. So if you want to go one step further and block all ads, you should install an ad blocker. Some browsers like Opera come with an ad blocker. Otherwise, we recommend uBlock Origin on macOS, Windows, Linux and Android. 1Blocker is a solid option on iOS. But letâs be honest, TechCrunch makes some money with online ads. If 100% of web users install an ad blocker many websites you know and love would simply go bankrupt. While your individual choice wonât have a material impact on the bottom line, consider whitelisting the sites you like. And if youâre angry at how many trackers your favorite news site is running try emailing them to ask (politely) if they can at least reduce the number of trackers they use.
Action: Make a private search engine your default Who is this for: Most people How difficult is it: A bit of effort because your search results might become slightly less relevant Tell me more: Google probably knows more about you than even Facebook does, thanks to the things you tell it when you type queries into its search engine. Though thatâs just the tip of how it tracks you â if you use Android it will keep running tabs on everywhere you go unless you opt out of location services. It also has its tracking infrastructure embedded on three-quarters of the top million websites. So chances are itâs following what youâre browsing online â unless you also take steps to lock down your browsing (see below). But one major way to limit what Google knows about you is to switch to using an alternative search engine when you need to look something up on the Internet. This isnât as hard as it used to be as there are some pretty decent alternatives now â such as DuckDuckGo which Apple will let you set as the default browser on iOS â or Qwant for French-speaking users. German users can check out Cliqz. You will also need to remember to be careful about any voice assistants you use as they often default to using Google to look stuff up on the web.
Action: Use private browser sessions Who is this for: Most people How difficult is it: Not at all if you understand what a private session is Tell me more: All browsers on desktop and mobile now let you open a private window. While this can be a powerful tool, it is often misunderstood. By default, private sessions donât make you more invisible â youâll get tracked from one tab to another. But private sessions let you start with a clean slate. Every time you close your private session, all your cookies are erased. Itâs like you disappear from everyoneâs radar. You can then reopen another private session and pretend that nobody knows who you are. Thatâs why using a private session for weeks or months doesnât do much, but short private sessions can be helpful.
Action: Use multiple browsers and/or browser containers Who is this for: People who donât want to stop using social media entirely How difficult is it: Some effort to not get in a muddle Tell me more: Using different browsers for different online activities can be a good way of separating portions of your browsing activity. You could, for example, use one browser on your desktop computer for your online banking, say, and a different browser for your social networking or ecommerce activity. Taking this approach further, you could use different mobile devices when you want to access different apps. The point of dividing your browsing across different browsers/devices is to try to make it harder to link all your online activity to you. That said, lots of adtech effort has been put into developing cross-device tracking techniques â so itâs not clear that fragmenting your browsing sessions will successful beat all the trackers. In a similar vein, in 2016 Mozilla added a feature to its Firefox browser thatâs intended to help web users segregate online identities within the same browser â called multi container extensions. This approach gives users some control but it does not stop their browser being fingerprinted and all their web activity in it linked and tracked. It may help reduce some cookie-based tracking, though. Last month Mozilla also updated the container feature to add one that specifically isolates a Facebook userâs identity from the rest of the web. This limits how Facebook can track a userâs non-Facebook web browsing â which yes Facebook does do, whatever Zuckerberg tried to claim in Congress â so again itâs a way to reduce what the social network giant knows about you. (Though it should also be noted that clicking on any Facebook social plug-ins you encounter on other websites will still send Facebook your personal data.)
Action: Get acquainted with Tor Who is this for: Activists, people with high risks attached to being tracked online, committed privacy advocates who want to help grow the Tor network How difficult is it: Patience is needed to use Tor. Also some effort to ensure you donât accidentally do something that compromises your anonymity Tell me more: For the most robust form of anonymous web browsing thereâs Tor. Torâs onion network works by encrypting and routing your Internet traffic randomly through a series of relay servers to make it harder to link a specific device with a specific online destination. This does mean itâs definitely not the fastest form of web browsing around. Some sites can also try to block Tor users so the Internet experience you get when browsing in this way may suffer. But itâs the best chance of truly preserving your online anonymity. Youâll need to download the relevant Tor browser bundle to use it. Itâs pretty straightforward to install and get going. But expect very frequent security updates which will also slow you down.
Action: Switch to another DNS Who is this for: People who donât trust their ISP How difficult is it: Moderately Tell me more: When you type an address in the address bar (such as techcrunch.com), your device asks a Domain Name Server to translate that address into an IP address (a unique combination of numbers and dots). By default, your ISP or your mobile carrier runs a DNS for their users. It means that they can see all your web history. Big telecom companies are going to take advantage of that to ramp up their advertising efforts. By default, your DNS query is also unencrypted and can be intercepted by people running the network. Some governments also ask telecom companies to block some websites on their DNS servers â some countries block Facebook for censorship reasons, others block The Pirate Bay for online piracy reasons. You can configure each of your device to use another public DNS. But donât use Googleâs public DNS! Itâs an ad company, so they really want to see your web history. Both Quad9Â and Cloudflareâs 1.1.1.1Â have strong privacy policies. But Quad9 is a not-for-profit organization, so itâs easier to trust them.
Action: Disable location services Who is this for: Anyone who feels uncomfortable with the idea of being kept under surveillance How difficult is it: A bit of effort finding and changing settings, and a bit of commitment to stay on top of any âupdatesâ to privacy policies which might try to revive location tracking. You also need to be prepared to accept some reduction in the utility and/or convenience of the service because it wonât be able to automatically customize what it shows you based on your location Tell me more: The tech industry is especially keen to keep tabs on where its users are at any given moment. And thanks to the smash hit success of smartphones with embedded sensors itâs never been easier to pervasively track where people are going â and therefore to infer what theyâre doing. For ad targeting purposes location data is highly valuable of course. But itâs also hugely intrusive. Did you just visit a certain type of health clinic? Were you carrying your phone loaded with location-sucking apps? Why then itâs trivially easy for the likes of Google and Facebook to connect your identity to that trip â and link all that intel to their ad networks. And if the social networkâs platform isnât adequately âlocked downâ â as Zuckerberg would put it â your private information might leak and end up elsewhere. It could even get passed around between all sorts of unknown entities â as the up to 87M Facebook profiles in the Cambridge Analytica scandal appear to have been. (Whistleblower Chris Wylie has said that Facebook data-set went âeverywhereâ.) There are other potential risks too. Insurance premiums being assessed based on covertly collected data inputs. Companies that work for government agencies using social media info to try to remove benefits or even have people deported. Location data can also influence the types of adverts you see or donât see. And on that front thereâs a risk of discrimination if certain types of ads â jobs or housing, for example â donât get served to you because you happen to be a person of color, say, or a Muslim. Excluding certain protected groups of people from adverts can be illegal â but that hasnât stopped it happening multiple times on Facebookâs platform. And location can be a key signal that underpins this kind of prejudicial discrimination. Even the prices you are offered online can depend on what is being inferred about you via your movements. The bottom line is that everyoneâs personal data is being made to carry a lot of baggage these days â and most of the time itâs almost impossible to figure out exactly what that unasked for baggage might entail when you consent to letting a particular app or service track where you go. Pervasive tracking of location at very least risks putting you at a disadvantage as a consumer. Certainly if you live somewhere without a proper regulatory framework for privacy. Itâs also worth bearing in mind how lax tech giants can be where location privacy is concerned â whether itâs Uberâs infamous âgod viewâ tool or Snapchat leaking schoolkidsâ location or Strava accidentally revealing the locations of military bases. Their record is pretty terrible. If you really canât be bothered to go and hunt down and switch off every location setting one fairly crude action you can take is to buy a faraday cage carry case â Silent Pocket makes an extensive line of carry cases with embedded wireless shielding tech, for instance â which you can pop your smartphone into when youâre on the move to isolate it from the network. Of course once you take it out it will instantly reconnect and location data will be passed again so this is not going to do very much on its own. Nixing location tracking in the settings is much more effective.
Action: Approach VPNs with extreme caution Who is this for: All web users â unless free Internet access is not available in your country How difficult is it: No additional effort Tell me more: While there may be times when you feel tempted to sign up and use a VPN service â say, to try to circumvent geoblocks so you can stream video content thatâs not otherwise available in your country â if you do this you should assume that the service provider will at very least be recording everything youâre doing online. They may choose to sell that info or even steal your identity. Many of them promise you perfect privacy and great terms of service. But you can never know for sure if theyâre actually doing what they say. So the rule of thumb about all VPNs is: Assume zero privacy â and avoid if at all possible. Facebook even has its own VPN â which itâs been aggressively pushing to users of its main app by badging it as a security service, with the friendly-sounding name âProtectâ. In reality the company wants you to use this so it can track what other apps youâre using â for its own business intelligence purposes. So a more accurate name for this âserviceâ would be: âProtect Facebookâs stranglehold on the social webâ.
Action: Build your own VPN server Who is this for: Developers How difficult is it: You need to be comfortable with the Terminal Tell me more: The only VPN server you can trust is the one you built yourself! In that case, VPN servers can be a great tool if youâre on a network you donât trust (a hotel, a conference or an office). We recommend using Algo VPNÂ and a hosting provider you trust.
Action: Take care with third-party keyboard apps Who is this for: All touchscreen device users How difficult is it: No additional effort Tell me more: Keyboard apps are a potential privacy minefield given that, if you allow cloud-enabled features, they can be in a position to suck out all the information youâre typing into your device â from passwords to credit card numbers to the private contents of your messages. Thatâs not to say that all third-party keyboards are keylogging everything you type. But the risk is there â so you need to be very careful about what you choose to use. Security is also key. Last year, sensitive personal data from 31M+ users of one third-party keyboard, AI.type, leaked online after the company had failed to properly secure its database server, as one illustrative example of the potential risks. Google knows how powerful keyboards can be as a data-sucker â which is why it got into the third-party keyboard game, outing its own Gboard keyboard app first for Appleâs iOS in 2016 and later bringing it to Android. If you use Gboard you should know you are handing the adtech giant another firehose of your private information â though it claims that only search queries and âusage statisticsâ are sent by Gboard to Google (The privacy policy further specifies: âAnything you type other than your searches, like passwords or chats with friends, isnât sent. Saved words on your device arenât sent.â). So if you believe that Gboard is not literally a keylogger. But it is watching what you search for and how you use your phone. Also worth remembering: Data will still be passed by Gboard to Google if youâre using an e2e encrypted messenger like Signal. So third party keyboards can erode the protection afforded by robust e2e encryption â so again: Be very careful what you use.
Action: Use end-to-end encrypted messengers Who is this for: Everyone who can How difficult is it: Mild effort unless all your friends are using other messaging apps Tell me more: Choosing friends based on their choice of messaging app isnât a great option so real world network effects can often work against privacy. Indeed, Facebook uses the fuzzy feelings you have about your friends to manipulate Messenger users to consent to continuously uploading their phone contacts, by suggesting you have to if you want to talk to your contacts. (Which is, by the by, entirely bogus.) But if all your friends use a messaging app that does not have end-to-end encryption chances are youâll feel forced to use that same non-privacy-safe app too. Given that the other option is to exclude yourself from the digital chatter of your friend group. Which would clearly suck. Facebook-owned WhatsApp does at least have end-to-end encryption â and is widely used (certainly internationally). Though you still need to be careful to opt out of any privacy-eroding terms the company tries to push. In summer 2016, for example, a major T&Cs change sought to link WhatsApp usersâ accounts with their Facebook profiles (and thus with all the data Facebook holds on them) â as well as sharing sensitive stuff like your last seen status, your address book, your BFFs in Whatsapp and all sorts of metadata with Zuckâs âfamilyâ of companies. Thankfully most of this privacy-hostile data sharing has been suspended in Europe, after Facebook got in trouble with local data protection agencies.Â
Action: Use end-to-end encryption if you use cloud storage Who is this for: Dedicated privacy practitioners, anyone worried about third parties accessing their stuff How difficult is it: Some effort, especially if you have lots of content stored in another service that you need to migrate Tell me more: Dropbox IPOâd last month â and the markets signalled their approval of its business. But someone who doesnât approve of the cloud storage giant is Edward Snowden â who in 2014 advised: âGet rid of Dropboxâ, arguing the company is hostile to privacy. The problem is that Dropbox does not offer zero access encryption â because it retains encryption keys, meaning it can technically decrypt and read the data you store with it if it decides it needs to or is served with a warrant. Cloud storage alternatives that do offer local encryption with no access to the encryption keys are available, such as Spideroak. And if youâre looking for a cloud backup service, Backblaze also offers the option to let you manage the encryption key. Another workaround if you do still want to use a service like Dropbox is to locally encrypt the stuff you want to store before you upload it â using another third party service such as Boxcryptor.
Action: Use an end-to-end encrypted email service Who is this for: Anyone who wants to be sure their email isnât being data mined How difficult is it: Some effort â largely around migrating data and/or contacts from another email service Tell me more: In the middle of last year Google finally announced it would no longer be data-mining the emails inside its Gmail free email service. (For a little perspective on how long it took to give up data-mining your emails, Gmail launched all the way back in 2004.) The company probably feels it has more than enough alternative data points feeding its user profiling at this point. Plus data-mining email with the rise of end-to-end encrypted messaging apps risks pushing the company over the âcreepy lineâ itâs been so keen to avoid to try to stave off the kind of privacy backlash currently engulfing Facebook. So does it mean that Gmail is now 100% privacy safe? No, because the service is not end-to-end encrypted. But there are now some great webmail clients that do offer robust end-to-end encryption â most notably the Swiss service Protonmail. Really itâs never been easier to access a reliable, user-friendly, pro-privacy email service. If you want to go one step further, you should set up PGP encryption keys and share them with your contacts. This is a lot more difficult though.
Action: Choose iOS over Android Who is this for: Mainstream consumers, Apple fans How difficult is it: Depends on the person. Apple hardware is generally more expensive so thereâs a cost premium Tell me more:Â No connected technology is 100% privacy safe but Appleâs hardware-focused business model means the companyâs devices are not engineered to try to harvest user data by default. Apple does also invest in developing pro-privacy technologies. Whereas thereâs no getting around the fact Android-maker Google is an adtech giant whose revenues depend on profiling users in order to target web users with adverts. Basically the company needs to suck your data to make a fat profit. Thatâs why Google asks you to share all your web and app activity and location history if you want to use Google Assistant, for instance. Android is a more open platform than iOS, though, and itâs possible to configure it in many different ways â some of which can be more locked down as regards privacy than others (the Android Open Source Project can be customized and used without Google services as default preloads, for example). But doing that kind of configuration is not going to be within reach of the average person. So iOS is the obvious choice for mainstream consumers.
Action: Delete your social media accounts Who is this for: Committed privacy lovers, anyone bored with public sharing How difficult is it: Some effort â mostly feeling like youâre going to miss out. But third party services can sometimes require a Facebook login (a workaround for that would be to create a dummy Facebook account purely for login purposes â using a name and email you donât use for anything else, and not linking it to your usual mobile phone number or adding anyone you actually know IRL) Tell me more: Deleting Facebook clearly isnât for everyone. But ask yourself how much you use it these days anyway? You might find yourself realizing itâs not really that central to what you do on the Internet after all. The center of gravity in social networking has shifted away from mass public sharing into more tightly curated friend groups anyway, thanks to the popularity of messaging apps. But of course Facebook owns Messenger, Instagram and WhatsApp too. So ducking out of its surveillance dragnet entirely is especially hard. Ideally you would also need to run tracker blockers (see above) as the company tracks non-Facebook users around the Internet via the pixels it has embedded on lots of popular websites. While getting rid of your social media accounts is not a privacy panacea, removing yourself from mainstream social network platforms at least reduces the risk of a chunk of your personal info being scraped and used without your say so. Though itâs still not absolutely guaranteed that when you delete an account the company in question will faithfully remove all your information from their servers â or indeed from the servers of any third party they shared your data with. If you really canât bring yourself to ditch Facebook (et al) entirely, at least dive into the settings and make sure you lock down as much access to your data as you can â including checking which apps have been connected to your account and removing any that arenât relevant or useful to you anymore.
Action: Say no to always-on voice assistants Who is this for: Anyone who values privacy more than gimmickry How difficult is it: No real effort Tell me more: Thereâs a rash of smart speaker voice assistants on shop shelves these days, marketed in a way that suggests theyâre a whole lot smarter and more useful than they actually are. In reality theyâre most likely to be used for playing music (albeit, audio quality can be very poor) or as very expensive egg timers. Something else the PR for gadgets like Amazonâs (many) Echos or Google Home doesnât mention is the massive privacy trade off involved with installing an always-on listening device inside your home. Essentially these devices function by streaming whatever you ask to the cloud and will typically store recordings of things youâve said in perpetuity on the companiesâ servers. Some do offer a delete option for stored audio but you would have to stay on top of deleting your data as long as you keep using the device. So itâs a tediously Sisyphean task. Smart speakers have also been caught listening to and recording things their owner didnât actually want them to â because they got triggered by accident. Or when someone on the TV used the trigger word. The privacy risks around smart speakers are clearly very large indeed. Not least because this type of personal data is of obvious and inevitable interest to law enforcement agencies. So ask yourself whether that fake fart dispenser gizmo youâre giggling about is really worth the trade off of inviting all sorts of outsiders to snoop on the goings on inside your home.
Action: Block some network requests Who is this for: Paranoid people How difficult is it: Need to be tech savvy Tell me more: On macOS, you can install something called Little Snitch to get an alert every time an app tries to talk with a server. You can approve or reject each request and create rules. If you donât want Microsoft Word to talk with Microsoftâs servers all the time for instance, itâs a good solution â but is not really user friendly.
Action: Use a privacy-focused operating system Who is this for: Edward Snowden How difficult is it: Need to be tech savvy Tell me more: If you really want to lock everything down, you should consider using Tails as your desktop operating system. Itâs a Linux distribution that leaves no trace by default, uses the Tor network for all network requests by default. But itâs not exactly user friendly, and itâs quite complicated to install on a USB drive. One for those whose threat model really is âbleeding edgeâ.
Action: Write to your political reps to demand stronger privacy laws Who is this for: Anyone who cares about privacy, and especially Internet users in North America right now How difficult is it: A bit of effort Tell me more:Â There appears to be bipartisan appetite among U.S. lawmakers to bring in some form of regulation for Internet companies. And with new tougher rules coming in in Europe next month itâs an especially opportune moment to push for change in the U.S. where web users are facing reduced standards vs international users after May 25. So itâs a great time to write to your reps reminding them youâre far more interested in your privacy being protected than Facebook winning some kind of surveillance arms race with the Chinese. Tell them itâs past time for the U.S. to draft laws that prioritize the protection of personal data.Â
Action: Throw away all your connected devices â and choose your friends wisely Who is this for: Fugitives and whistleblowers How difficult is it: Privacy doesnât get harder than this Tell me more:Â Last month the former Catalan president, Carles Puigdemont â who, in October, dodged arrest by the Spanish authorities by fleeing to Brussels after the regionâs abortive attempt to declare independence â was arrested by German police, after crossing the border from Denmark in a car. Spanish intelligence agents had reportedly tracked his movements via the GPS on the mobile device of one or more of his friends. The car had also been fitted with a tracker. Trusting anything not to snitch on you is a massive risk if your threat model is this high. The problem is you also need trustworthy friends to help you stay ahead of the surveillance dragnet thatâs out to get you.
Action: Ditch the Internet entirely Who is this for: Fugitives and whistleblowers How difficult is it: Privacy doesnât get harder than this Tell me more: Public administrations can ask you to do pretty much everything online these days â and even if itâs not mandatory to use their Internet service it can be incentivized in various ways. The direction of travel for government services is clearly digital. So eschewing the Internet entirely is getting harder and harder to do. One wild card option â thatâs still not a full Internet alternative (yet) â is to use a different type of network thatâs being engineered with privacy in mind. The experimental, decentralized MaidSafe network fits that bill. This majorly ambitious project has already clocked up a decadeâs worth of R&D on the foundersâ mission to rethink digital connectivity without compromising privacy and security by doing away with servers â and decentralizing and encrypting everything. Itâs a fascinating project. Just sadly not yet a fully-fledged Internet alternative.
[Read More âŠ]
How to save your privacy from the Internetâs clutches
0 notes
Photo
New Post has been published on http://www.lifehacker.guru/the-biggest-misconceptions-about-vpns/
The Biggest Misconceptions About VPNs
Have you heard? Internet service providers want to sell your data and a virtual private network (VPN) is the best way to tell them to shove off. Thereâs a problem though. VPNs are notoriously shady, are more complicated than they look, theyâre unregulated, and can be more of a security risk than theyâre worth if you donât set them up correctly.
Weâve talked about what a VPN is plenty of times before, but letâs take a second for a quick refresher. A VPN encrypts your data before it leaves your device, and that data stays encrypted while it travels through your local network and internet service provider (ISP) until it reaches the VPN providerâs servers. This process is referred to as âtunneling.â When the traffic reaches the VPNâs servers, itâs decrypted and sent off to the internet at large. This is generally useful if youâre using the internet in a public place, like a coffee shop Wi-Fi network where someone might be trying to spy on your traffic. Itâs also useful if you want to hide your traffic from your ISP or get around a government firewall, since they wonât be able to see what websites you visit.
âVPNs Protect You From Ad Trackingâ
VPNs will mask your IP address and make you relatively invisible to your ISP, but they will not block the millions of other ad trackers on the internet. Ad networks generally use cookies instead of an IP address to identify you, so if youâre using a VPN to get away from ad tracking, youâll be sorely disappointed. Worse, some VPN providers actually serve up their own ads or sell your browsing data. The most notorious example of this was Hola Better Internet, which users caught injecting its own ads.
If you want to block ad trackers, you should use privacy-focused browser extensions like uBlock Origin and Privacy Badger. These will prevent ad-trackers from following you around and wonât slow down your web browsing like a VPN does.
âYou Wonât Even Notice a Difference Using a VPNâ
Security comes at the cost of speed, and using a VPN will almost always slow down your internet connection a little bit. Between the security protocols and the encryption, thereâs no way around this.
How much this matters depends on what you do on the internet, the speed of your VPN provider, and where youâre tunneling into. If youâre tunneling into a VPN outside of your country, that will add latency no matter what, so expect a slower connection. If you stay within your country, this wonât have the same effect, but it will still be a bit slower than usual. For general browsing this wonât make a huge difference, but youâll notice slowdown for large file downloads or uploads and video streaming.
Some services and web sites block VPNs altogether because they donât want you to circumvent region restrictions. Netflix is the most notorious for this, but Hulu tried as well. This might have a different effect depending on where in the world youâre located.
âUsing a VPN Makes You Automatically Secure and Privateâ
The entire purpose of a VPN is security, but if you set it up wrong (or a provider sets it up wrong), then you might lose that security. Likewise, your VPN provider can see all your traffic, which means it can potentially log everything you do or even modify that traffic.
Research published by High-Tech Bridge found that many VPNs used one of several different outdated encryption methods, including the very outdated Point-To-Point Tunneling Protocol (PPTP). Thatâs assuming theyâre encrypting data at all, VPNs can do whatever they want until someone calls out their BS. Donât believe me? Earlier this year, security researchers found that 18 percent of VPN apps on Android donât do the one basic thing VPNs are made to do: encrypt traffic. 84 percent also leaked user data. Thatâs just on Android.
If a VPN isnât set up properly, it could also leak your IP address, which links all your data back to you and is problematic if youâre using a VPN for privacy. After you set up a VPN, test it to make sure itâs not leaking your IP address. Leaking can happen due to an old web exploit, or because of a basic security flaw when itâs improperly set up.
Logs are also a crucial issue when it comes to privacy. Some VPN providers keep a log of all your traffic, which defeats the purpose of using a VPN for privacy purposes. If you search for a VPN provider and âloggingâ in a Google query, you should pull up their privacy policy. There, youâll find if they keep logs of all your traffic, your access logs, or âwhatever law enforcement requires,â which is a bit of a cop out because that could encompass a wide range of things. For true privacy and anonymity, Tor is a better bet than a VPN, because it makes it much harder to trace any data back to you.
âThereâs a Best VPNâ
It would make everyoneâs lives easier if someone could compile a list of the best VPNs, right? But it turns out picking a trustworthy and reliable VPN is next to impossible. On the most basic level, why youâre using a VPN affects your search for a reliable one. Some are more about security, some are about getting around regional blocks, while others are more about privacy. Some are in the United States, many are not. All those factors alter how the service works.
Unlike a lot of services we all use, VPNs arenât regulated and arenât pushed through security audits. A VPN can say basically anything they want about privacy and security, but nobody is holding them accountable. The only public liability they have comes from users unearthing shady practices.
Which is all to say, you have to do your research. Security takes homework beyond a quick search on Google. Weâve walked through this a bit before: youâll need to search for a VPN providers logging rules, take a look at forum posts to see if anyoneâs talking about them, and test your VPN after youâve set it up. If you canât find anything about a VPN provider online, or if a deal sounds âtoo good to be true,â it probably is. Thankfully, the more popular a service is, the more people hold that service accountable.
VPNs might be in the public eye today, but that doesnât make them any easier to understand than they were two weeks ago. Theyâre complicated, nerdy things, and while setting one up is trivial, finding one thatâs legit requires the same amount of effort any other $50-$100/year purchase does, so treat it like one.
For our part, weâve long recommended Private Internet Access, SlickVPN, NordVPN, Hideman, and Tunnelbear because theyâve been reputable over the years, but thatâs not an all-inclusive list, nor is it one we can consistently update. The Privacy Site attempts to catalog VPNs based on where theyâre located, their logging rules, and more, but even thatâs such a complex undertaking that itâs never completely up to date.
Whichever service you go with, make sure you do the required research ahead of time, then take a few extra moments to make sure everything is set up and properly working.
Private Eyes
This Massive VPN Comparison Spreadsheet Helps You Choose the Best for You
How Do I Know If My VPN Is Trustworthy?
Do I Really Need to Worry About Security When Iâm Using Public Wi-Fi?
©
0 notes