Using strong passwords and well-known antivirus software are not enough to prevent an intrusion into your computer. Most people think since they have nothing to hide, there’s no reason for them to bother about their online privacy. Well, we’ll visit that subject in another article, but for now, here are a number of suggestions to be considered by those who intend to be invisible while online.
Enjoy the read!
1. Signal
Signal is an easy to use app that enables encrypted chat, phone calls, and video messages within a system that helps verify the identity of your contacts.
It allows you to send high-quality files including voice, video, document, and picture messages from, and to anywhere in the world without the SMS or MMS charges.
Neither the developers nor any other person can read your messages or track your calls—as Signal is end-to-end encrypted and deliberately engineered to keep your communication safe.
Kindly subscribe to our YouTube channel
2. HTTPS Everywhere
SSL connections are important as they keep packet sniffers away from your web traffic. However, it’s not all websites that support SSL, and those that do support SSL somehow still default to unencrypted connections.
The Electronic Frontier Foundation’s HTTPS Everywhere is a free browser extension that forces SSL connections on websites to keep the traffic secure and private. Supported browsers are Chrome, Opera, and Firefox.
3. GnuPG
Emails are sadly insecure, even when you’re connecting to your email server over an SSL connection, your messages can be intercepted on the way to their intended recipient. So sending private messages over email, will require you to add a layer of encryption.
GnuPG is a command line tool that features a versatile key management system, along with access modules for all kinds of public key directories, allowing you to encrypt and sign your data and communications. GnuPG also provides support for S/MIME and Secure Shell (ssh).
4. Tor Browser
Tor uses a network of computers to route your Web traffic through a number of encrypted layers to obscure its origin, enabling you to browse anonymously. In order to truly surf the web anonymously, you must adhere to the Tor warnings and modify your browsing habits so as not to get snooped on.
5. Virtual Machines
Although browsers are commonly used in snooping, they aren’t the only place that third parties will attempt attackPDF files and other regular files which seem harmless can become homing beacons, and potentially alert government entities or whoever it may concern. In order to prevent such breaches of privacy, use a virtual machine (VM) when opening files suspected to be infected.
Load the VM with your preferred Linux distribution, configure it to your liking, and then save a snapshot of your VM. Next up, you download the file you wish to view and after shutting off your virtual machine’s access to the internet, you can open the file safely and go ahead to read what you need and make notes, after which you shut down the virtual machine. This is not everything there is on the subject. But for now, it should get you going and curious.
Worth sharing? Please share on Facebook or Twitter. It helps more people see it.
Comments 1