Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

10 practical privacy tips for the post-privacy internet
Network World ^ | 3/31/17 | Tom Henderson

Posted on 03/31/2017 7:39:38 PM PDT by markomalley

ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad you couldn’t pay the legislators as much as the data wolves.

You should have been doing these things all along, but now it’s time to decide just how much dignity you have. Most of you won’t bother. This isn’t for you. Click away, and go surf.

For those remaining, take these privacy tips seriously.

1. Educate yourself about cookies and clean them out regularly

For some of you, this means a daily cleanout. What you DO NOT clean out (will cause you hassles) are cookies associated with financial institutions. They will put you through a drill when they don’t find the cookie that they like. Scrape them. Every browser has the ability to do this, with Chrome being the most difficult. But we’re not surprised because it’s from Google—the company whose very life depends on knowing information about you.

2. Use two, or even three, browsers 

You can divide your cookies up this way. I use Firefox for business. Chrome for Facebook and, when I absolutely must, for gmail—as I volunteer for an organization that uses it extensively because they’re dirt poor. You still have to clean each browser. Add the EFF’s Privacy Badger to each. For fun, run Ghostery and Privacy Badger to catch it all.

3. Disable Flash or option it 

Use Flash only when you must. When you use a Flash blocker, you can often run web pages without it. Examples include United Airlines and PayPal. The only time you should use Flash is if a page refuses to load without it. Flash can suck enormous amounts of historical data from your browser in a heartbeat. 

4. Change your DNS server 

When you type https://www.facebook.com, the first thing that happens is your browser asks a DNS server for Facebook’s current IP address. Every request you make of a browser is looked up in this way. And most cable broadband services and ISPs use DNS servers that log your every search. Surprise! 

Everywhere you go, the time and your personally identifiable IP address become logged to serve up as tasty data for those that would abuse it. Change it. Every operating system does this differently. Look up how to do it. DO NOT USE GOOGLE’S DNS server. Use one that doesn’t log you. The DNS.Watch servers do not log requests. They’re not especially fast or slow, in my experience. Comcast, by contrast, will eat your DNS request information up to seven times before giving your browser the actual answer in my experience. There are DNS servers. Stop the DNS logging; one more garden hose you put your heel into. 

5. Lose search engines that track you. Now

Yep, Google, Bing and Yahoo track you. Instead use DuckDuckGo.com. They don’t track. You can proxy requests that aren’t tracked to each of these from DuckDuckGo. Stop feeding the demons.

The biggie search engines have a business model built upon serving you pimped/paid-for results, and noting exactly what you searched for so that you can be served up ads—and eventually your IP address and browsing habits can be correlated into dossiers on you and your search history. Often these can also be used to conflate “things” or characteristics about you, and you have no redress when they make mistakes. You built Google’s billions. It wasn’t because Google was benign. 

6. Use the Tor browser(s) 

The Onion Router/TOR uses a network within a network to obscure the origin of requests made of the network. It puts you on radar because it behaves differently, but it does provide a degree of anonymity. It’s not perfect, and I suspect it’s been cracked, but only by the governmental spooks who don’t sell your data. At least I hope they don’t. 

7. Remove your information on websites

Some sites will allow you to delete your personally identifiable information and search histories. Looking at you, Google. Go to these sites. Carefully follow the instructions regarding deleting your history. Then return later, and make sure it’s gone. Unfortunately, this is a rinse-repeat item, as sometimes histories magically return. Oh, gosh! That shouldn’t happen. 

8. If you have the luxury, change ISPs

You may be captive to Charter, AT&T, Google, Comcast, etc. But if you live in an area with multiple providers, change. Why? You get a good deal for being a new subscriber (watch contract details). And the ISP you currently have is no longer able to vacuum all of the details you generate in using internet services. Their data has gaps and isn’t as valuable.

9. Use virtual machines

Yes, running a virtual machine for the sole purpose of disguising a browser works. It’s a different browser and is typified from an analytics perspective as possibly a different user. Clean each VM’s history just like you would above, and use the same techniques mentioned above as well. It makes life more difficult for the data grazers.

10. Modify your browser as little as possible

Browsers are typified into single individuals by weird things such as font mix, add-ins and extensions. The less a browser is messed with, the less unique it is. Uniqueness helps personal identification and correlation of analytical data captured at websites about the browser. Be generic.

Finally, use https log-ons only. There are so many reasons to do this. Freedom and dignity are important. Exercise them.


TOPICS: Computers/Internet
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-62 next last
To: markomalley; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; ...
Ten excellent suggestions for the post-Privacy Internet World. These are platform agnostic as they have to do with the way the Internet works, Cookies, and your browser's propensity to leave breadcrumbs around where ever your trail has taken you. — PING!

Thanks to Freeper markomalley for posting this thread. I also agree with his extensions caveats found in Reply #1. Take them to heart.


Internet Browsing Privacy and Security
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

21 posted on 03/31/2017 8:45:05 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: tbw2; shibumi
* Your paper diary is private. Your blog and social media is not.

Yes, private. Of course. But, just hypothetically, how will people be able to click on my private diary, which I emphasize is private, and is most assuredly not clickbait, so that they can see WHAT HAPPENS NEXT in my private diary?

/s

22 posted on 03/31/2017 8:47:13 PM PDT by Larry Lucido
[ Post Reply | Private Reply | To 18 | View Replies]

To: markomalley

I worry about private companies far less than I worry about government spooks.

We live in 1984, in terms of privacy.


23 posted on 03/31/2017 8:50:08 PM PDT by marktwain (President Trump and his supporters are the Resistance. His opponents are the Reactionaries.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: crusher2013

Thanks


24 posted on 03/31/2017 8:53:15 PM PDT by Cold Heart
[ Post Reply | Private Reply | To 17 | View Replies]

To: mass55th

My laptop has window and Linux installed in a dual boot configuration.

Sometimes I use Windows for work, but when it comes to personal surfing, banking or Business I use Linux.

Truthfully Linux is no harder to use than Windows.


25 posted on 03/31/2017 9:11:40 PM PDT by crusher2013
[ Post Reply | Private Reply | To 19 | View Replies]

To: Inyo-Mono

Bttt.


26 posted on 03/31/2017 9:40:36 PM PDT by WhirlwindAttack (We need to start drinking out of the skulls of our enemies again. Dims, Slimes, Rinos, F em all)
[ Post Reply | Private Reply | To 6 | View Replies]

To: TXDuke; call meVeronica

Bump 4 l8r


27 posted on 03/31/2017 10:00:04 PM PDT by call meVeronica
[ Post Reply | Private Reply | To 1 | View Replies]

To: Larry Lucido
You must name your private diary.

For example, I named my diary !!!BOMBSHELL!!!

Then I posted to Facebook telling people that they
wouldn't believe what I was going to put in my diary.

28 posted on 03/31/2017 10:13:52 PM PDT by shibumi (Cover it with gas and set it on fire.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: markomalley

TOR browser is liek a big red flag for gubmint officials- They CAN track you when using TOR- (There’s a yuotube video proving it- ) So basically you are just attractign more sophisticated surveillance folks when you wave the TOR flag o nthje net


29 posted on 03/31/2017 10:23:04 PM PDT by Bob434
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cold Heart; All

for receivign emails only- mailinator.com- totally temporary- and no sign up needed- when you need to give a site an addy- just type soemthign you will remember, like “Bobsyeruncle@mailinator.com” Then simply go to mailinator.com and type bobsyeruncle in the search bar- and htere’s the email- easy peasy

They delete after a certain number of hours- and you can manually delete too if you need to get rid of say something like login info for new site-


30 posted on 03/31/2017 10:28:03 PM PDT by Bob434
[ Post Reply | Private Reply | To 15 | View Replies]

To: All

.....

The simple use of VPN + Tor + Tails + Proton Email , all free shy of maybe your choice of a VPN are good security “IF USED PROPERLY”.......

My 2 cents .....Stay Safe !!


31 posted on 03/31/2017 11:50:21 PM PDT by Squantos (Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

#9 virtual machines

I’d like to be able to do this on Ubuntu, but could never figure out how to do it.

Any good tutorials?

I tried using the one in the Ubuntu help site, but no luck...


32 posted on 04/01/2017 12:23:51 AM PDT by WildHighlander57 ((WildHighlander57, returning after lurking since 2000)
[ Post Reply | Private Reply | To 1 | View Replies]

To: posterchild
Most of these may prohibit *websites* from tracking you but your ISP still knows where you go unless you use a VPN.

The law should be that ISPs can't keep logs.

As for VPNs, they are ISPs once removed.

If you send a nastygram or out an archive of some rat's email via a VPN, you can't be caught unless both the VPN and the ISP cooperate.

It starts with where you went. They'll have the IP address to which you uploaded.

The next step in any investigation will be to get the owner of that IP address to cough up. If they are an honest VPN, they will not have a record. If they are an honest ISP, they will not have a record.

If they are a compromised ISP, game over. You are unmasked!

If they are a compromised VPN, they will cough up which incoming IP originated the connection. Then the process moves to the ISP of the originating connection. Which of their subscribers had that IP address at that time?

Do you trust Comcast? Do you trust Verizon?

33 posted on 04/01/2017 1:08:36 AM PDT by cynwoody
[ Post Reply | Private Reply | To 2 | View Replies]

To: WildHighlander57
Any good tutorials?

Oracle Virtualbox is extremely easy to use (IMHO).

You can install the version that's on the Software Manager (which is just point and click as you know) or you can get the latest version (5.1.x) by using a terminal (instructions here.

There are a couple of key things that I've found that help:

  1. The right "Ctrl" button on your keyboard is your friend. That allows you to easily get out of the virtual system and back to your host system.
  2. When you're creating a virtual machine, make sure to make it "beefy" enough. Go in the settings and make sure enough RAM is dedicated to it, make sure you've given it as many processor cores as possible, make sure the video memory is available for it, and make sure you have given it a big enough hard disk. (Yes, this implies that if you're running a really low-end, underspec'd physical [bare metal] machine, virtualization may overtax it).
  3. You can't run a 64 bit virtual machine through Virtualbox if you're running a 32 bit physical machine. Keep that in mind.
  4. However, you can run a 32 bit virtual machine on a 64 bit physical machine.
  5. If it's at all possible, install Virtualbox Guest Additions onto your guest (virtual) operating system. Specific instructions for Ubuntu are here

Hope that helps.

34 posted on 04/01/2017 3:48:01 AM PDT by markomalley (Nothing emboldens the wicked so greatly as the lack of courage on the part of the good -- Leo XIII)
[ Post Reply | Private Reply | To 32 | View Replies]

To: mass55th

Give “Ghostery” a try .... its free. Blocks google and other search engine analytics. Duck Duck Go (DDG) does not track or sponsor trackers . Now that said the new threat is our ISP selling our data.

Wonder why my ISP selling my personal legal use of a “product” I pay for is any different than my doctor or insurance company violating the Health Insurance Portability and Accountability Act (HIPAA) or a Lawyer Client Confidentially privilege .....?

GOP-E ..... doom on em !


35 posted on 04/01/2017 3:57:27 AM PDT by Squantos (Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 3 | View Replies]

To: cynwoody; posterchild
The next step in any investigation will be to get the owner of that IP address to cough up. If they are an honest VPN, they will not have a record. If they are an honest ISP, they will not have a record.

That's a really good point.

What you want to look for is a VPN provider who has a "no logs" policy.

Or if you really want to go full bore, you can create your own personal VPN provider through openvpn.net. (Part of this is creating a virtual machine in the cloud, loading the openvpn server software on that virtual machine, and then connecting to the Internet via that virtual machine)

(Of course, that assumes that the cloud provider -- AWS, Rackspace, or whoever doesn't track what the activity your virtual server has either)

36 posted on 04/01/2017 3:57:37 AM PDT by markomalley (Nothing emboldens the wicked so greatly as the lack of courage on the part of the good -- Leo XIII)
[ Post Reply | Private Reply | To 33 | View Replies]

To: markomalley

Bookmark


37 posted on 04/01/2017 4:08:21 AM PDT by jimmyray (there is no problem so bad that you can't make it worse)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Bookmark


38 posted on 04/01/2017 4:56:37 AM PDT by JubJub
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I occasionally use Private browsing with Safari on my mac. It lets me into paid sites after I have used up my free uses.

I also use DuckDuckGo as my browser.

How safe am i?


39 posted on 04/01/2017 7:07:20 AM PDT by Not gonna take it anymore (Now that Trump has won, I don't have to post about halfwit anymore)
[ Post Reply | Private Reply | To 21 | View Replies]

To: markomalley

Bookmarking


40 posted on 04/01/2017 7:25:07 AM PDT by Wasichu
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-62 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson