How to Protect Your Online Privacy

1. Basic Strategies

A) Make Sure Site Is Safe Before Sharing Information

The truth about the internet is that often you can’t be sure who people really are or who’s actually running the site you’re on. A general rule of thumb is that if you don’t trust the site don’t give them any personally identifiable information. This includes your real name, email address, credit card number, etc… To make sure the site you’re considering visiting isn’t a security or privacy risk you should read my article about How to Tell If A Website Is Dangerous.

B) Make Sure Any Online Accounts Are Properly Configured For Optimum Privacy

Also, please see this page for a list of tutorials about how to lock down numerous online accounts. It includes tutorials for facebook, Gmail, and many other online accounts. Clicking on one will lead you to a tutorial which will walk you through exactly what you need to do in order to make sure that your account is locked down tight.

C) Protect Your Wireless Connection From Dangers

Also, if you’re connecting to the internet via a wireless connection you need to make sure that the connection is password protected. If possible use WPA type encryption, as this is very strong, and choose a password that would be very difficult for anyone else to guess. This will help prevent your browsing data from being spied on and, even more importantly, will help to protect your computer from being hacked. Once a hacker has breached your network defenses it becomes much easier for them to now try to get into your computer. Also, a further concern is that if you don’t encrypt your wireless connection, and someone else uses it to do something illegal, it’s possible for you to be held responsible for their actions.

D) Follow This Advice To Remove Your Information From Most People Search Databases

In addition, if you want to remove your information from most of the people search databases on the internet, you can follow the advice given on this page. The information on how to do this is actually provided by a company which offers to do it for you for a fee, but if you like you can also do it yourself for free. The problem is that it will take a good amount of time.

2. Increase Privacy Of Your Browser

Nearly all privacy threats enter your computer through your browser. Thus, protecting your browser from these privacy threats is a very important part of protecting your online privacy. To protect your browser from these types of threats please read the article I wrote about How to Harden Your Browser Against Malware and Privacy Concerns. Pay special attention to the parts which are concerned mainly with protecting your online privacy, but also remember that securing your computer against malware and other threats also plays a large role in protecting your privacy. Thus, I would really recommend that you read the entire article.

3. Use A Privacy Oriented Email Service

If privacy is really important to you then I would advise you to also consider using an email service which cares about privacy as much as you do. A very good list of free webmail services, which offer very good privacy, can be found on this page. Please read through it and figure out which email service is right for you.

However, if you instead need a service which can allow you to send emails anonymously, with no worries about receiving anything back, then there are some other services you should consider. For this sort of situation I would advise that you use either Send-Email or AnoneMail. Both are quite anonymous, although AnoneMail is slightly more anonymous. One aspect of AnoneMail is that it will even wait up to 12 hours to send the email, so it definitely can’t be traced back to you. However, this may be too much of a disadvantage if you really want the other party to receive the email immediately.

4. Use a Virtual Private Network To Hide Your IP Address

A Virtual Private Network, or VPN, securely tunnels all of the connections from your computer to the secure servers of the service you are using. From there it is sent out to the site you’re communicating with. However, the site sees only the IP address of the server, and has no idea what your real IP address is. Even better, because your connection is encrypted until it reaches their servers, nobody can spy on what you are doing. Thus, for the most part, nobody should be able to associate what you’re doing with who you really are. Using a VPN is one of the most important steps in attaining true online privacy. Also, they are so easy to set up and use that anyone can use one.

In addition, some VPN’s will allow you to choose servers which will make it appear that you are in a different country than you really are. This can help you to avoid censorship and even access content that may be restricted in your country. A review of some of the best free VPN’s can be found on this page.

For ordinary surfing my top recommendation would be SecurityKISS. This program does store your IP address, but this is only associated with the total amount of data sent tunneled through SecurityKISS. No other personally identifiable information is logged. Therefore I do not consider this to be a threat to your privacy. Also, this service does limit free users to 300MB of data per day. However, they do allow you to choose the country you would like to appear to be in. Sadly, SecurityKISS also does not work with torrents.

If you require a VPN which will also anonymize torrents you should check out CyberGhost. In fact, when compared with an un-anonymized connection, the torrent speed is not even slowed down significantly. This VPN does require registration, but you are not required to supply them with personally identifiable information. Also, this VPN only allows free users to use it to tunnel 1GB of information per month. That said, that amount should be sufficient for most users. Also, you cannot choose the country you would like to appear to be in.

A further restriction to this program is that free users can only use this service for 6 hours at a time before it will automatically disconnect. That said, the default action for this program is to block all internet connections in the case of a loss of connection. Thus, this should not be a large problem. Also, this service will not anonymize any emails sent via SMTP. Note that this service will anonymize https connections.

5. Use Peerblock To Prevent Known Risks From Even Seeing Your Computer

Peerblock can be downloaded from this site. It monitors all IP connections and blocks any connection which is in any of its lists of known unwanted IP addresses. It comes with default block lists and allows you to easily download more lists. It even comes with a list of known anti-P2P IP addresses, which you can select so that your computer will not communicate with them. All of these lists will be automatically updated each time you open the program. Additional lists can be found on this page. However, using this program does take a lot of getting used to. Thus I would really only recommend this program for advanced users.

You can also create custom lists, either for blocking or allowing sites. As long as you don’t use too many lists your connection speed shouldn’t decrease noticeably when it’s enabled. Peerblock can greatly increase your level of privacy, but this comes at a price. Using certain lists may cause many of the sites you regularly visit to not work correctly. Thus, you will need to either temporarily disable Peerblock, when privacy concerns are not as critical, or create a whitelist of allowed sites.

Personally, I create a whitelist. The way I would recommend creating this is by first clearing the log. Then go to a site you visit regularly and see if important aspects of the site are blocked. If they are, and you trust the site, you can select the option to allow the connection for 15 minutes. I always start with the one at the bottom of the list. After temporarily allowing the single connection, and waiting for about 5 seconds, reload the page. If the site now loads fine then you can select the option to allow that connection permanently. This way the site will always work, even when Peerblock is active. Repeat this for each site you would like to whitelist.

6. Check Out These Sites For Further Reading

Priveazy is a very good website which covers the basics of online privacy and safety. It contains quizzes in different categories to see how informed you actually are and then provides lessons which can guide you towards a better understanding of privacy threats in today’s world. It’s a very good place to go in order to learn a lot about online privacy. However, after taking a few of these quizzes it will require you to create an account with them. This account is free and I would strongly recommend you doing this. I have found it to be very useful.

Prism-Break is a site which is geared towards moderate to advanced users. The information provided on that site is comprehensive to the extent that the site claims that if you follow their advice you will be able to avoid data surveilance programs like Prism, XKeyscore, and Tempora. Advice, and links to programs, are provided for nearly all aspects of internet privacy. Thus, for those who are very serious about protecting your online privacy, I would strongly suggest that you check out that site. There is some very useful information provided. However, please be aware that I do not agree with all of their suggestions, and believe they have left some other very good alternatives out. Thus, I would recommend that you first follow the advice I give above. Also, before you decide to change the applications, and services, you currently use I would recommend that you first make sure that there is a problem with what you are currently using.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s