Staying Hidden Online, by Z.M.

We’re being monitored, online. That’s nothing new though. We all know that. In a world that increasingly grows to rely upon technology, and where your individual data points can mean big money for some advertiser somewhere, it should come as no surprise that just about everything that we do online has been recorded and stored on some server somewhere.

I’ve grown quite alarmed over this the past few years, but I have never really known where to even start. I just thought “Incognito” mode on Chrome was enough to hide me from all that was happening. I was wrong. After doing quite a bit of research on the subject over the past few years, I’ve learned quite a bit that is not only beneficial but easy to use as well. Here are just a few of the many tips I’ve found that can help you to retain some level of anonymity while online. This is by no means a comprehensive list. There’s a ton of other things that you can do to protect your information online. However, this should give you a decent place to start.


Facebook has gained quite a bit of notoriety of late for the amount of data it collects from each user. Not only does Facebook know what you post, like, and send messages about while using Facebook, but it can often discover more about you based on other sites you visit.


Facebook adds trackers that will request information from other sites, even after you’ve already logged out of Facebook. These trackers will find out your geographic location, monitor which sites you visit, and what you click on while on those sites.

Facebook Disconnect

Facebook Disconnect is an extension that you can get for Chrome that allows you to determine just what knowledge Facebook actually gets about you.1 Obviously, the best recourse would be to just delete Facebook altogether (and I’m not far away from doing that), but for many of us Facebook is one of the key ways that we are able to keep tabs on friends and family far away.

HTTPS Everywhere

When you search for a subject or site via a search engine (Google, Yahoo, et cetera), what you search for is recorded. Let’s say someday in the future anybody associated with an AR-15 is deemed a terrorist and to be followed. If you search for videos on AR-15s, then somebody somewhere will know.

HTTPS Everywhere to Disguise Web Page Content

HTTPS Everywhere disguises the web page content of what it is that you’re looking at. This means that theoretically nobody can see the content of the web page itself. They can still see the URL (the web address, which in itself can be pretty revealing), but they can’t actively see the content of your page. Your ISP (Internet service provider) can see every website that you visit, if you don’t use encryption.


“Https” is a type of encryption. You may have seen it at the beginning of a website URL when you click on their link. It’d look like That means that the site has been encrypted. You may see just “http” on some sites. This isn’t as secure as “https”. HTTPS Everywhere ensures that you are using a more secure means of encrypting your data than solely relying upon “http”.2

Log Out of Email Accounts

Log out of your email accounts once you’re done using them. If you don’t and you stay logged in, your Web traffic can be recorded by your email provider. This enables your email provider to gradually build a profile on who you are, what you do, and what you are interested in. What they do with the profile they create on you is really left up to them.

Tape Over Your Webcam

Put tape over your webcam. There are entire sites out there devoted to feeds of webcams that have been hacked. Sites where anybody in the world can log on and view what is happening in the world visible from hacked computers. I’ve had plenty of friends who have been notified by their firewall/antivirus that a foreign entity is trying to access their webcam.

Layers of Security

Obviously a good security service, such as McAffee, Norton, Kaspersky, or the like, can help prevent some of this, but layers of security are always a good idea. Putting non-transparent tape over your webcam is a sure-fire way to ensure that nobody is peeking at you through your computer.


Ghostery is a Chrome extension that allows you to see all of the sites that are tracking you, and it allows you to control which sites actually do. If it’s a site that you really like and want to support (ads are how a lot of sites make money), you can keep the analytics and trackers on still. I permit tracking for a few sites I really appreciate.


ScriptBlock is another Chrome extension. This one cuts down on the number of third party sites that track your web searches/activity. Let’s say you’re in the market for a new computer. If you do a lot of research online for best models and then go to a shopping site (Amazon, eBay, et cetera), those sites may literally be able to see the last sites that you visited and then use that information to create appropriate advertisements for you (computers, keyboards, cases, et cetera).

This usually happens when you click links on websites that will take you to other websites. Small amounts of script hidden in the code are what provide this information. ScriptBlock hides these scripts from the next website.2


DuckDuckGo is actually a search engine. The more news I read and hear, the less I like the big search engines. They track everything, know a lot about you already, and tend to be pretty statist minded. DuckDuckGo is a fantastic search engine that doesn’t track what you’re looking at. It hides your IP address, which is one of the key ways that it can be determined who you are and when you’re online.

Canvas Defender

Canvas Defender is yet another Chrome extension. It keeps your web searches from being tracked via canvas fingerprinting. Canvas fingerprinting is basically a quick image that is drawn within your browser invisible to you when you click on particular web pages.

This image is then converted into a unique number. It is matched to prior instances where that unique number has been found on other websites. As a result, a profile of the type of sites that you like can be gradually built up, giving a pretty good picture of who you are.


Do you want people intercepting and reading your emails? Me neither. FlowCrypt utilizes a very secure means of encryption known as PGP (Pretty Good Privacy) to encrypt the emails that you send. Just know that messages sent via FlowCrypt expire after a few days. This makes it harder for bad guys to intercept your emails, but it can be inconvenient if you need to refer back to a particular email. Thankfully though, you can choose which emails to encrypt and which ones not to with FlowCrypt.


In conclusion, thankfully it is pretty straightforward to install any of these add-ons to Chrome. They essentially install themselves. I’ve focused on Chrome with this piece, as it’s one of the most popular search engines out there. However, there are similar extensions that can be found for Firefox. You’ve undoubtedly heard about the Dark Web and Tor browsers. These most certainly help to add another layer of security to your online presence, but they tend to be a bit more difficult to access for the average user than Chrome or DuckDuckGo. They’re still great tools to use but outside of the scope of this article.

Multiple Layers of Security Online

Just like with any type of prep, layers of security is one of the best ways to ensure that you are as protected as possible. If something slips through the first layer of defense, then you have backups that will hopefully catch it. That’s why I recommend doing the same thing with your computer presence. Multiple layers of security online only serves to benefit you and can actually be done within the span of about 20 minutes.

If you really want to delve deeper into the nuts and bolts of cybersecurity in an easy to read format, I highly recommend purchasing Kevin Mitnick’s The Art of Invisibility. To date, it is the best source on cybersecurity written for the average person that I have found. It’s actually where I learned about ScriptBlock and HTTPS Everywhere. Anyway, it’s a fantastic piece, and it deserves to be on every prepper’s bookshelf.

Reference Resources:

  2. Mitnick K. The Art of Invisibiliity: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data.

SurvivalBlog Writing Contest

This has been another entry for Round 76 of the SurvivalBlog non-fiction writing contest. The nearly $11,000 worth of prizes for this round include:

First Prize:

  1. A $3000 gift certificate towards a Sol-Ark Solar Generator from Veteran owned Portable Solar LLC. The only EMP Hardened Solar Generator System available to the public.
  2. A Gunsite Academy Three Day Course Certificate. This can be used for any one, two, or three day course (a $1,095 value),
  3. A course certificate from onPoint Tactical for the prize winner’s choice of three-day civilian courses, excluding those restricted for military or government teams. Three day onPoint courses normally cost $795,
  4. DRD Tactical is providing a 5.56 NATO QD Billet upper. These have hammer forged, chrome-lined barrels and a hard case, to go with your own AR lower. It will allow any standard AR-type rifle to have a quick change barrel. This can be assembled in less than one minute without the use of any tools. It also provides a compact carry capability in a hard case or in 3-day pack (an $1,100 value),
  5. Two cases of Mountain House freeze-dried assorted entrees in #10 cans, courtesy of Ready Made Resources (a $350 value),
  6. A $250 gift certificate good for any product from Sunflower Ammo,
  7. Two cases of Meals, Ready to Eat (MREs), courtesy of (a $180 value), and
  8. American Gunsmithing Institute (AGI) is providing a $300 certificate good towards any of their DVD training courses.

Second Prize:

  1. A Model 175 Series Solar Generator provided by Quantum Harvest LLC (a $439 value),
  2. A Glock form factor SIRT laser training pistol and a SIRT AR-15/M4 Laser Training Bolt, courtesy of Next Level Training, which have a combined retail value of $589,
  3. A gift certificate for any two or three-day class from Max Velocity Tactical (a $600 value),
  4. A transferable certificate for a two-day Ultimate Bug Out Course from Florida Firearms Training (a $400 value),
  5. A Three-Day Deluxe Emergency Kit from Emergency Essentials (a $190 value),
  6. A $200 gift certificate good towards any books published by,
  7. RepackBox is providing a $300 gift certificate to their site.

Third Prize:

  1. A Royal Berkey water filter, courtesy of Directive 21 (a $275 value),
  2. A large handmade clothes drying rack, a washboard, and a Homesteading for Beginners DVD, all courtesy of The Homestead Store, with a combined value of $206,
  3. Expanded sets of both washable feminine pads and liners, donated by Naturally Cozy (a $185 retail value),
  4. Two Super Survival Pack seed collections, a $150 value, courtesy of Seed for Security, LLC,
  5. Mayflower Trading is donating a $200 gift certificate for homesteading appliances, and
  6. Two 1,000-foot spools of full mil-spec U.S.-made 750 paracord (in-stock colors only) from (a $240 value).

Round 76 ends on May 31st, so get busy writing and e-mail us your entry. Remember that there is a 1,500-word minimum, and that articles on practical “how to” skills for survival have an advantage in the judging.


  1. All these references to Chrome, but that’s the biggest problem. Get rid of anything Google, including Chrome, that should be step one. Use a different browser that isn’t developed by a company which makes money selling personal data.

    Personally I’d look into the Brave browser, it’s geared towards blocking trackers and ads.

  2. Can’t believe anyone would use “security” and “anything Google” in a positive way in the same sentence. Just read Google’s security and privacy statement, which basically translates into “we don’t believe in it”, if that doesn’t scare you away from anything Google (which is almost impossible) you can’t be serious about security or privacy.

  3. Facebook claims that it has the “right” to collect data not only on members, but also anyone you (as a member) contact via any device. So you can be tracked by Facebook even if you are not a member. Zukerberg was very evasive in his testimony to congress about how far that extends, i.e. can they only collect the meta data (location) and address? or does it go deeper, like your physical address and your search activities. Personally, I’ve never been on Facebook or been a member, but my brother and sister are, so if they send me an e-mail, can Facebook track everything I do as if I was a member?

  4. I downloaded and used Brave for awhile, but have been having more and more problems with trying to open it. Finally this weekend it just quit, and would not open at all. I’m not sure if it’s my (elderly) laptop using Win10, or a problem with the browser itself.
    I looked through their website, and can’t find a Contact Us.

    I will try to re-load it, hopefully tonight, and see what happens.

  5. I’ve used DuckDuckGo for years and love it. I’m very basic about computers; I know how to find what I want, but I have no idea what gears and wheels turn to get me there. However, I do a few little things that I hope will irritate the powers that be.

    I never use my real name. Currently, I have about ten aliases and it’s so confusing to me that I keep them written in a notebook. Of course I have different accounts for all these names.

    Just to confuse whoever is watching, I deliberately go to sites and look up things in which I have absolutely no interest at all. I explore bizarre diseases, look up hotels in assorted countries, explore real estate in places I would never live, etc. If anyone is watching, I hope they’ll conclude that I’m totally nuts and give up. At any rate, it will be impossible to find a pattern in what I do. There isn’t one, except to be strange.

    1. Don’t be mislead. First point is that 99.9999999% of actual “people” are never looked at in any depth. Unless you break certain laws no one will know your name or care. Almost all of what is collected is general statistical information like 50% of people click on ads with pretty girls in them or 40% of people like guns or Chevy’s or McDonalds. This could change one day, Maybe they will decide that anyone who looked at how to make explosives should be arrested. If that happens they can track back to you even if you used a false name or duck go bye bye or anything. The bottom line is that If you go on the internet you cannot hide BUT with 3 billion people on the internet making 100 trillion inquiries a day it is literally impossible to track everyone. But do not think you can hide, you cannot.

  6. During the Christmas Season with the houses all decorated with lights, music and, celebration, it is pretty easy to see the dead-light-bulb with absolutely no online social presence at all. If you want to hide in plain site consider if you need to look like all the other happy light bulbs: not too bright and certainly not dark.

  7. Try for their email service. They don’t sell any information to anyone. It costs $40 per year. I have been using it for years and have never once had any spam or advertising related to the content, and you support a great cause.

  8. Google and Facebook seem to have some version the the FBI/NSA software that they developed in the 1990s called Carnivore. It reads emails looking for whatever keywords it has been programmed to search for, and then collects them for future use. That is how you end up seeing ads that you never clicked on previously, showing up because you used a keyword in an email that is associated with that product. So, it isn’t always the Internet searches that identify you, sometimes it is your emails as well. That is why you should never use gmail, yahoo email, and some others as well.
    If you are on Facebook, it searches for keywords in your posts, and then does the same thing by associating ads with your posts.
    Big Brother is doing more than just watching…

  9. Use encrypted email account like for free. Never use Google or Gmail. Get off Facebook…… (oh, not convenient for you? Then don’t complain). Turn off your location and microphone on your computer. ……and get a good VPN. Oh, and use your smartphone as a phone, only.

Comments are closed.