Recommendations, hints and shortcuts to help you stay nameless online
Avoiding being tracked online is sort of impossible, however right here are a few approaches to lessen the threat
How to gain online lockdown.
1. SECURE WEBMAIL WITH EXTENSIONS
If you’re the usage of a popular webmail provider, which includes Gmail or Yahoo Mail, and also you don’t or can’t make the transfer to a more secure service, then don’t forget to install Mailvelope. Mailvelope is a browser extension for Google Chrome or Mozilla Firefox that brings OpenPGP encryption for your web mail service. Similar extensions exist, consisting of SecureGmail, which encrypts and decrypts emails you send through Gmail. Using this extension way the unencrypted text have to by no means reach Google servers. Recipients will want to put in the extension so as to decrypt and read the encrypted electronic mail.
This is perhaps one of the most fundamental privacy alternatives that pretty much anybody can take benefit of. The top 4 maximum famous browsers – Google Chrome, Internet Explorer, Mozilla Firefox, and Safari – have a non-public browsing mode, which can be located in their respective settings menus. With non-public surfing activated, your browser will not shop cookies or internet records in your pc. This has very restrained uses and is perhaps really best effective at hiding your surfing history from your sizeable other, siblings or mother and father. Private surfing does no longer securely conceal your identity or surfing activities beyond your local device as your IP address can still be tracked.
Photograph: Kimihiro Hoshino/AFP/Getty Images
three. don’t USE SOCIAL MEDIA
The amount of personal information that social networking web sites like Facebook, Google Plus, and Twitter have harvested from their billions of customers is shocking. Head to facebook.Com/settings and click on ‘Download a replica of your Facebook information’ and also you might be surprised to look simply how much statistics is on the report. Everything from who you have got poked, what occasions you’ve got or have no longer attended and when and in which you’ve got logged into your account is logged and stored. Similar stages of statistics harvesting take place on all important social media websites. This is the rate you pay for using a ‘loose’ provider. The most effective positive-fireplace way to keep away from giving up this statistics is to delete your debts absolutely. A phrase of warning, ‘deactivating’ your account is not similar to deleting it. Deactivating your account is the type of like setting it into hibernation – all your statistics is saved and can be re-activated when you have the second mind. Always delete in preference to deactivate an account if you want to completely wipe it.
RELATED ARTICLES :
four. BLOCK AND MANAGE TRACKERS
A big quantity of websites song and accumulate the browsing conduct of the customers that visit them. These trackers are invisible and the general public isn’t aware that they’re being tracked. Ghostery is a unfastened browser extension – to be had on all important web browsers – as a way to reveal these trackers, additionally known as web bugs. You can then decide which internet insects you’re comfy with tracking you and which of them you’d like to dam. In general, Ghostery keeps track of over 1,900 companies. Each employee has a profile inside the Ghostery Knowledge Library, allowing you to better recognize who and why a person is maintaining tabs on you and what action you would love to take.
5. ENCRYPTED EMAIL
Most of the widely known and popular email offerings – Gmail, Hotmail, Yahoo Mail, Outlook – are not mainly privateness-pleasant. For complete Pretty Good Privacy (PGP) encrypted emails, take into account signing as much as a greater comfy issuer. Hushmail is presently very popular, it affords a personal email account with no commercials, built-in encryption, and limitless email aliases. A confined free service is offered, with greater capabilities available for a monthly subscription price. However, Hushmail is not above the law and within the past, it has been pressured to expose consumer records to U.S. Authorities following a courtroom order. The enterprise additionally logs consumer IP addresses. MyKolab is a similar carrier that has not revealed any user facts within the beyond, but, they’re additionally obliged to offer access to lawful interception requests so this nevertheless stays a possibility.
6. TEMPORARY EMAIL
Disposable Email Addresses (DEAs) are anonymous and temporary. They allow users to quickly create new e-mail addresses as-and-after they’re needed, which can then be disposed of after use. This is mainly useful for avoiding junk mail while filling in forms on web sites that require an e-mail deal with to proceed. Keeping your actual e mail cope with far from spammers is essential to shielding your identity on line and DEAs are an extraordinary solution. Popular companies of this carrier encompass Guerrilla Mail and Mailinator, even though there are hundreds out there to pick from. Most DEAs are not specifically comfortable, so it isn’t always recommended to use those offerings to ship touchy facts – rather, use them as a manner to keep away from freely giving your own data in conditions where you are obliged to accomplish that.
“Dropbox…Could be very antagonistic to privateness”
14. DITCH DROPBOX
Edward Snowden has called Dropbox – a cloud storage carrier – ‘adversarial to privacy’. That’s quite damning. If you’re concerned approximately sharing your documents thru this gadget, there are a number of property options obtainable which give better privacy. Snowden himself recommends Spideroak, which describes itself as a 0-information encrypted information backup, proportion, sync, get admission to and storage provider. You can use a restrained version of this as a part of their unfastened trial, which may be determined on their internet site. An absolutely featured subscription is to be had for $12 a month. However, if you’re simply looking to speedy proportion small or huge files anonymously for free, deliver OnionShare a move. It doesn’t have as many capabilities as Spideroak, however, it receives the task carried out.