Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

10 practical privacy tips for the post-privacy internet
Network World ^ | 3/31/17 | Tom Henderson

Posted on 03/31/2017 7:39:38 PM PDT by markomalley

ISPs and providers can now sell your data and browser histories. The U.S. Congress sold you out. If you had any browsing dignity, you don’t now. Too bad you couldn’t pay the legislators as much as the data wolves.

You should have been doing these things all along, but now it’s time to decide just how much dignity you have. Most of you won’t bother. This isn’t for you. Click away, and go surf.

For those remaining, take these privacy tips seriously.

1. Educate yourself about cookies and clean them out regularly

For some of you, this means a daily cleanout. What you DO NOT clean out (will cause you hassles) are cookies associated with financial institutions. They will put you through a drill when they don’t find the cookie that they like. Scrape them. Every browser has the ability to do this, with Chrome being the most difficult. But we’re not surprised because it’s from Google—the company whose very life depends on knowing information about you.

2. Use two, or even three, browsers 

You can divide your cookies up this way. I use Firefox for business. Chrome for Facebook and, when I absolutely must, for gmail—as I volunteer for an organization that uses it extensively because they’re dirt poor. You still have to clean each browser. Add the EFF’s Privacy Badger to each. For fun, run Ghostery and Privacy Badger to catch it all.

3. Disable Flash or option it 

Use Flash only when you must. When you use a Flash blocker, you can often run web pages without it. Examples include United Airlines and PayPal. The only time you should use Flash is if a page refuses to load without it. Flash can suck enormous amounts of historical data from your browser in a heartbeat. 

4. Change your DNS server 

When you type https://www.facebook.com, the first thing that happens is your browser asks a DNS server for Facebook’s current IP address. Every request you make of a browser is looked up in this way. And most cable broadband services and ISPs use DNS servers that log your every search. Surprise! 

Everywhere you go, the time and your personally identifiable IP address become logged to serve up as tasty data for those that would abuse it. Change it. Every operating system does this differently. Look up how to do it. DO NOT USE GOOGLE’S DNS server. Use one that doesn’t log you. The DNS.Watch servers do not log requests. They’re not especially fast or slow, in my experience. Comcast, by contrast, will eat your DNS request information up to seven times before giving your browser the actual answer in my experience. There are DNS servers. Stop the DNS logging; one more garden hose you put your heel into. 

5. Lose search engines that track you. Now

Yep, Google, Bing and Yahoo track you. Instead use DuckDuckGo.com. They don’t track. You can proxy requests that aren’t tracked to each of these from DuckDuckGo. Stop feeding the demons.

The biggie search engines have a business model built upon serving you pimped/paid-for results, and noting exactly what you searched for so that you can be served up ads—and eventually your IP address and browsing habits can be correlated into dossiers on you and your search history. Often these can also be used to conflate “things” or characteristics about you, and you have no redress when they make mistakes. You built Google’s billions. It wasn’t because Google was benign. 

6. Use the Tor browser(s) 

The Onion Router/TOR uses a network within a network to obscure the origin of requests made of the network. It puts you on radar because it behaves differently, but it does provide a degree of anonymity. It’s not perfect, and I suspect it’s been cracked, but only by the governmental spooks who don’t sell your data. At least I hope they don’t. 

7. Remove your information on websites

Some sites will allow you to delete your personally identifiable information and search histories. Looking at you, Google. Go to these sites. Carefully follow the instructions regarding deleting your history. Then return later, and make sure it’s gone. Unfortunately, this is a rinse-repeat item, as sometimes histories magically return. Oh, gosh! That shouldn’t happen. 

8. If you have the luxury, change ISPs

You may be captive to Charter, AT&T, Google, Comcast, etc. But if you live in an area with multiple providers, change. Why? You get a good deal for being a new subscriber (watch contract details). And the ISP you currently have is no longer able to vacuum all of the details you generate in using internet services. Their data has gaps and isn’t as valuable.

9. Use virtual machines

Yes, running a virtual machine for the sole purpose of disguising a browser works. It’s a different browser and is typified from an analytics perspective as possibly a different user. Clean each VM’s history just like you would above, and use the same techniques mentioned above as well. It makes life more difficult for the data grazers.

10. Modify your browser as little as possible

Browsers are typified into single individuals by weird things such as font mix, add-ins and extensions. The less a browser is messed with, the less unique it is. Uniqueness helps personal identification and correlation of analytical data captured at websites about the browser. Be generic.

Finally, use https log-ons only. There are so many reasons to do this. Freedom and dignity are important. Exercise them.


TOPICS: Computers/Internet
KEYWORDS:
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-62 next last
To: markomalley

One thing we do that’s not super high-tech is this: We have two separate PCs so infected emails can’t invade our financial information.

On one, we surf the net and have our email account. We do nothing related to finances or anything personal. No passwords or credit card info. (It’s our FR device!)

On the other we handle financial business — shopping, banking, investments etc. NO email for any reason.

For example, if we order from Amazon it’s done on the financial system. The confirmation emails come to the other system.

It may have helped; we don’t know for sure. But about two weeks ago ransomware took over the non-financial PC but we didn’t care, since nothing private was being kidnapped. Still, it pissed us off. We had bought a Geek Squad support contract with the laptop. I know GS isn’t always the best and there are a lot of haters, but they were on it immediately and restored everything. Then they bumped it up to a higher level that deals with fraud. Worked out well for us.

We believe the hit came through an email with subject line that some UPS- or FedEx-type company couldn’t deliver something.


41 posted on 04/01/2017 7:41:55 AM PDT by MayflowerMadam (“Great spirits have always encountered opposition from mediocre minds." A. Einstein)
[ Post Reply | Private Reply | To 1 | View Replies]

bookmark


42 posted on 04/01/2017 7:50:00 AM PDT by freds6girlies (many that are first shall be last; and the last shall be first. Mt. 19:30. R.I.P. G & J)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Anyone have an opinion on password manager software? I am thinking of trying Sticky Password. I did a little research and this one bubbled to the top of my list.


43 posted on 04/01/2017 8:04:48 AM PDT by Semper911 (When you want to rob Peter to pay Paul, you'll always have the support of Paul.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Newer editions of the Opera browser have built-in VPN. The VPN can access servers in 5 world locations.

FYI

https://www.opera.com/computer/features/free-vpn


44 posted on 04/01/2017 8:11:44 AM PDT by TomGuy
[ Post Reply | Private Reply | To 1 | View Replies]

To: Semper911

As far as software and password management, I’m sure it’s beneficial against all but the most persistent and ingenious private sector hacking. But, stop and think about software of any kind and the cloud. What a treasure trove, and we’re seeing that it does get used on high level actors. I guess the answer is keep your head down and don’t get yourself noticed in order to be “safe.”


45 posted on 04/01/2017 8:14:18 AM PDT by RegulatorCountry
[ Post Reply | Private Reply | To 43 | View Replies]

To: MayflowerMadam

This is close to the method that I use. When I advise them to do the same I usually get rolled eyes and “That takes too much time” responses. I reply “How much time is all your data worth?” and then let it go.

Speaking of which, you say GS was able to restore your data? May I ask - do you know which variation of ransomware you were plagued with? Did GS actually decrypt your stuff or did they have access to an external backup? I have a relative that I am working with to try to recover his stuff (I warned him!) and looking for any angle that might get him there. Thanks!


46 posted on 04/01/2017 8:18:28 AM PDT by rockrr (Everything is different now...)
[ Post Reply | Private Reply | To 41 | View Replies]

To: rockrr

Re your questions, I don’t know the answers to any of them except that GS did NOT have access to external backup because we don’t do external backup. Every couple of weeks, my husband backs up files to an external hard drive so we weren’t panicked about this invasion. If on the other one... oy!!

I don’t know the variation, or decryption, etc. Sorry. :(


47 posted on 04/01/2017 8:26:24 AM PDT by MayflowerMadam (“Great spirits have always encountered opposition from mediocre minds." A. Einstein)
[ Post Reply | Private Reply | To 46 | View Replies]

To: RegulatorCountry
think about software of any kind and the cloud.

I hear you -- that's why I asked. I am looking at Sticky Password specifically because it does not use cloud storage. All on local hardware only. And it is not free, which gives it at least some credibility (compared to others.) But there is still a level of trust required.

It is becoming impossible to have a strong unique password for every login in my life, and rotate them regularly. Most people use the same password for everything, or at least a similar one. The hacker bastards are on to us, and its only a matter of time.

I am much more concerned about intrusion from criminals than from government entities. But that's just me.

48 posted on 04/01/2017 8:36:13 AM PDT by Semper911 (When you want to rob Peter to pay Paul, you'll always have the support of Paul.)
[ Post Reply | Private Reply | To 45 | View Replies]

To: TomGuy
Newer editions of the Opera browser have built-in VPN.

This is a good solution if your only concern is what goes through your web browser. It won't help those who download torrents or use Kodi; a free entertainment software that's the next best thing to the Internet.

A person could use the Projectfreetv.x (it changes domains sometimes) website to watch tv without commercials but some kind of script and ad blocking software like Noscript (in Firefox) or adblock plus is highly recommended when using that site. As always an up to date anti-virus program should always be running. I like the free version of Avast but AVG and possibly others are likely okay.

49 posted on 04/01/2017 9:04:33 AM PDT by Boomer (The modern day leftist dems are the party of criminally insane propagandists.)
[ Post Reply | Private Reply | To 44 | View Replies]

To: cynwoody

True, nothing is foolproof, but it would likely be easier to find a VPN with a business model to protect privacy than find one amongst whatever few local choices for ISP a person might have.


50 posted on 04/01/2017 9:34:27 AM PDT by posterchild (Treade a worme on the tayle, and it must turne agayne.)
[ Post Reply | Private Reply | To 33 | View Replies]

To: Not gonna take it anymore
I also use DuckDuckGo as my browser.

Forgot to mention, DuckDuckGo is your best bet to not be watched and tracked when you do searches. Also your first page results are more likely not to be forced on you by paid advertising which means they may be more pertinent to your search criteria than Google or Bing.

51 posted on 04/01/2017 10:23:49 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Not gonna take it anymore
I occasionally use Private browsing with Safari on my Mac. It lets me into paid sites after I have used up my free uses.

I also use DuckDuckGo as my browser.

How safe am I?

Apparently this did not get posted. . . strange.

You are pretty safe. Nothing will be sent to the website showing your address or any personal data about you. No cookies, history, or cache will be retained on your personal computer for future use or discovery once you close the Private browsing session. However, if the website you are visiting demands your location, Internet address, or personal data or previous cookies, it may not allow you access if you are using Private Browsing mode.

52 posted on 04/01/2017 10:57:08 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 39 | View Replies]

To: Fungi

“Get an offshore VPN”

I hear CyberGhost (Romania) and NordVPN (Panama) are good.


53 posted on 04/01/2017 1:01:05 PM PDT by howlinhound (Live your life so that, when you get up in the morning, Satan says, "Oh Crap!..He's awake" - Unknown)
[ Post Reply | Private Reply | To 4 | View Replies]

To: markomalley

bump


54 posted on 04/01/2017 10:49:09 PM PDT by Albion Wilde ("We will be one people, under one God, saluting one American flag." --Donald Trump)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Not gonna take it anymore; Swordmaker
N: How safe am i?

S: Nothing will be sent to the website showing your address or any personal data about you.

While the answer is 90% correct, it's not 100% correct.

First of all, as Swordmaker says, private search engines (such as DuckDuckGo and StartPage) are good options as far as being able to do searches without the host site tracking you.

However, Private Browsing is NOT a Panacea. Private Browsing basically sets up a separate "cookie jar" that stores that browser history and cookies created until you end that browsing session (then dumps the cookies and crumbs in the garbage). Sure, private browsing will not permanently store will keep it so your spouse and your boss can't see the porn sites you visit (just kidding about the porn sites) by viewing your browser history or saved cookies, and, yes, they can allow you to bypass sites that use cookies to meter your visits (like the Washington Compost), but that's largely it. There are a few more nefarious methods that can be used.

First of all, there is a tremendous amount of information that a browser (even in "private mode") sends to a website. This information can be collated into a "fingerprint" that pretty uniquely identifies the specific browser. To see what information can be collected about you, please go to the EFF Panopticlick website and test your browser. You can test it both in regular mode and private mode...while I'm not 100% familiar with Safari, it's likely that the "fingerprint" on both modes will be the same. If a website stores that fingerprint, it will know if a computer with the same fingerprint (i.e., yours) comes back to visit.

There is also something known as a "Supercookie" (read about it here). Essentially, it's a misapplication of a security protocol known as "HSTS" that forces you to go to HTTPS mode for a site even if you attempt to access it using HTTP (with no "S"). Not sure how Safari deals with Supercookies in private mode, but in a lot of browsers, if a supercookie is set in regular browsing mode, you can access that same supercookie in private mode. And, oh, by the way, those supercookies can be shared across domains. The way to get rid of those is to delete your browsing history and cache as well as your cookies.

Note that if you pick up a supercookie in private mode, it will be dumped when you end that browsing session. The danger is that if you pick up a supercookie while in regular mode, it's readable in private mode.

Bottom line is that private mode does some good, but it's not a panacea. Yes, it makes you safER, but don't kid yourself that it makes you SAFE.

55 posted on 04/02/2017 3:16:08 AM PDT by markomalley (Nothing emboldens the wicked so greatly as the lack of courage on the part of the good -- Leo XIII)
[ Post Reply | Private Reply | To 39 | View Replies]

Comment #56 Removed by Moderator

To: Swordmaker

I had set up two factor authentication but I just now canceled it. It is more trouble than it’s worth I always have to have another Apple device with me in order to get the verification code in order to get into my phone and wow it’s way more complicated than I want my life to be.


57 posted on 04/05/2017 11:21:19 AM PDT by Not gonna take it anymore (Now that Trump has won, I don't have to post about halfwit anymore)
[ Post Reply | Private Reply | To 51 | View Replies]

To: Swordmaker
I had heard you need to clear history/cache twice on Apple devices. And thought Private Mode still retains your cookies even if it doesn't remember your history. I make a habit of manually clearing Safari's history or Ghostery’s trackers. And even though Duck Duck Go doesn't track you, it opens into a browser which may track you. I don't understand VPNs, though I'm learning. Is it really worth trying to retain privacy when in the end your credit cards, your tax return/Medical Record, etc., bank accounts pretty much know all about you?
58 posted on 04/05/2017 11:29:40 AM PDT by The Westerner (Protect the most vulnerable: get the government out of medicine and education!)
[ Post Reply | Private Reply | To 52 | View Replies]

To: Not gonna take it anymore
I had set up two factor authentication but I just now canceled it. It is more trouble than it’s worth I always have to have another Apple device with me in order to get the verification code in order to get into my phone and wow it’s way more complicated than I want my life to be.

That's a point, but you probably should not be trying anything that requires accessing a need to use the Two factor authentication when you don't have a means of confirming it. Out on the road away from your other devices is not a time to be doing it. I usually have both my iPhone and iPad with me, however, so for me it is not a problem.

But it you have information on your devices or iCloud account that has be kept secure, don't risk it.

59 posted on 04/05/2017 11:43:06 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 57 | View Replies]

To: Semper911
Anyone have an opinion on password manager software? I am thinking of trying Sticky Password. I did a little research and this one bubbled to the top of my list.

Apple's Keychain system is actually quite good. It manages passwords across devices very well. . . and over the iCloud so that if you have multiple devices, they share the same keychain.

60 posted on 04/05/2017 11:46:12 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 43 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-62 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson