Editor’s Introductory Notes: This article was authored by the teenage son of a long-time SurvivalBlog reader. It is humbling to see that a second-generation of SurvivalBlog readers is now reaching adulthood. (SurvivalBlog was launched in August of 2005.)
Properly, the term internet (with a lower case “I”) generally refers to all interconnected computer networks, whereas Internet (with a upper case “I”) refers to the global network associated with the world wide web (WWW). The dark web refers to dead or abandoned web sites. (That is, sites that have “gone dark.”) The deep web refers to sites that are invisible to search engines. The deep web is mostly behind corporate firewalls and is much larger than the sites cataloged by search engines on the mundane public Internet. Also note that some web addresses are only visible and accessible with Tor (The onion router) or other similar deep web browsers, rather than standard browsers.
This article is geared toward users of the mundane public Internet using standard browsers, but who desire greater privacy. That is probably 98% of SurvivalBlog readers. Note that this article is just a primer rather than a comprehensive guide to Internet privacy. It is an article meant for new users, people new to open source, and the Privacy Mindset.
—
Internet privacy is a relatively new concept. The definition and interpretation of Internet privacy can often be up to the individual. For some, it means to be digitally forgotten and to live in anonymity, whereas others it means complete ownership of your devices and your data. It does not matter what your personal definition is. It all comes down to one thing, you as the user need to be in control. Many corporations and especially the government would be happy to take this responsibility off your shoulders. Yet this leaves you open to being exploited. We see this with Google and Microsoft’s targeted advertising. This exploitation also happens through browser fingerprinting and cross-site tracking. Data has become digital gold. With this newly-valuable resource, companies have been trying ruthlessly to acquire your data.
It is not only companies and governments who want to take advantage of your data, but hackers as well. Many times, we as individuals put ourselves in dangerous situations online without even realizing we are doing so. Hackers love nothing more than our ignorance. We are going to cover three basic steps to take back your privacy from these corporations and to keep yourself secure from hackers and snooping 3-letter government organizations. These are simple and often free or inexpensive.
With Internet privacy and especially security come dozens of buzzwords and false claims. Nothing ever makes you 100 percent secure or can guarantee total anonymity. There is some vocabulary that needs to be gone over.
- Encryption – The process of making once readable data seemingly random. Encryption can be used in almost everything. When executed correctly is always a good thing.
- Open-Source – When the source code of the application is readable to the public. This allows the code to be audited by regular people. To make sure there is nothing undesired going on in the background. Open source is often free and more secure than proprietary software. Always go for open source when practical and available.
Get a password Manager:
If you are like most people, you use the same password for as many sites as possible and probably also save your usernames and passwords to auto-fill when logging in on your phone and your computer. When a hacker gains access to one of your passwords, she will immediately use the same information to attempt logins of all major email providers, social media apps, and major online retailers. From there the hacker will determine what banks you use and attempt to gain access to your bank accounts and to make purchases from any sites or apps you use for shopping. In short, it can be disastrous. Saving your passwords within a browser (Google Chrome, Microsoft Edge, Internet Explorer, Safari) or on your phone (whether an apple device or android) is effectively giving your login information to the company that created the browser or the device.
A Password Manager is an application that stores all your passwords for every site and app that you use in an encrypted vault. This may sound a lot like what you are doing when saving your passwords in your browser or on your devices, but one key fact makes all the difference. You have to use a password manager that is “open source” (see definition above). With an open-source password manager we know that the owners of the password manager cannot gain access to your password vault or to your login information for the password manager itself. This also means that the password manager company cannot reset your password if you forget it.Continue reading“Internet Privacy Basics, by Petr”