ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Your Online Security, Anonymity, And Privacy

Updated on March 31, 2013

Why Online Privacy Matters

Online privacy and anonymity are very important if you wish to have any security related to your online browsing...

Websites can track you using various methods, such as by IP address, cookies, tracking scripts, user agent, browser fingerprinting, and more. Websites collect all of this information, and compile it and offer it to the highest bidder making you an easy target for their ads, or other nefarious goals.

With the worry over SOPA and other legislation that seeks to stifle free expression and censor the Internet, it is important to be able to maintain anonymity online.

Some of the ways you are being tracked

IP Address
Information you voluntarily divulge
Browser Fingerprinting
Cookies
User Agent
Tracking Scripts
Browser History
Other Software on Your Computer
Websites and hackers collect your personal information, be careful what you do online. You are being watched!

Tips From The TOR Project:

  • Use the Tor Browser
  • Don't enable or install browser plugins
  • Use HTTPS versions of websites
  • Don't open documents downloaded through Tor while online
  • Use bridges and/or find company

Read More

TOR Network

What It Is

TOR (The Onion Router) is an open network that encrypts and anonymizes your Internet traffic to thwart various means of surveillance. The developers have created a download called the browser bundle that includes a stripped down and secure implementation of FIreFox, and software called Vidalia which allows you to control and tweak your TOR connection.

How It Works

Tor bounces your Internet traffic through its anonymous network as fully encrypted packets before finally reaching its destination on the open Internet. This provides a means of privacy and anonymity as no router in the tor network knows your location, nor can they read any of the encrypted data.

Why It's Useful

TOR is a very useful tool to maintain Internet anonymity. Using the browser bundle, you can browse the Internet without worrying about websites tracking your activity, or malicious toolbars and plug-ins bypassing your anonymity checks.

Limitations

TOR can only protect what it can control. If you use the TOR browser and end up divulging personally identifiable information, TOR can't help you. You must always think about what the app you are using will divulge about you in the first place, and then decide if you want to give any more information than what you have to give. TOR can't protect you from every online tracking threat, it can only help to make tracking you much more difficult. The bottom line is, if you need complete, 100% absolute privacy, unplug your computer from the network.

Warnings From TAILS Developers

  1. Tor exit nodes can eavesdrop on communications
  2. Tails makes it clear that you are using Tor and probably Tails
  3. Man-in-the-middle attacks
  4. Confirmation attacks
  5. Tails doesn't encrypt your documents by default
  6. Tails doesn't clear the metadata of your documents for you and doesn't encrypt the Subject: and other headers of your encrypted e-mail messages
  7. Tor doesn't protect you from a global adversary
  8. Tails doesn't magically separate your different contextual identities
  9. Tails doesn't make your crappy passwords stronger
  10. Tails is a work in progress

Read More

TAILS

What it is

TAILS is a live Linux distribution, which aims to increase not only your online anonymity, but the privacy of your entire computing experience. A live Linux distribution means you burn it to CD/DVD or install it on a USB drive and boot your computer from that. This means you can take it with you and use it on nearly any computer to protect your online activity.

How It Works

What if the computer you are using isn't trusted, or has keylogging software installed? Your experience wouldn't be anonymous, and all of your effort would be thwarted without your knowledge. This would also be true if the computer was infected with a Trojan, or a Virus.

TAILS forces all network traffic through the TOR network, mentioned above. This provides the network transport anonymity and security to maintain your online privacy.

TAILS leaves no trace on the computer you are using, unless you directly instruct it to. This provides an even greater level of security. The system is encrypted, and swap is wiped upon reboot or removal of the boot media for an even greater level of security for the paranoid out there.

The encryption levels allow you to safely send encrypted email and other forms of online communication such as IM. All around TAILS increases your privacy and anonymity to a great degree.

Why It's Useful

TAILS is useful for computer users who want a greater level of privacy so their online activity is much harder to monitor and track. Like all other security methods, TAILS can only protect so much. The rest is up to you.

Limitations

The developers of TAILS are quite aware of its limitations and they want you to be too. Here is a link to their warning page, outlining what TAILS cannot do. All in all, they warn you to never rely on any software to keep you completely secure, and to be aware of ways you can be identified, even if you are using TAILS.


Dreamstime Stock Photos & Stock Free Images
Dreamstime Stock Photos & Stock Free Images | Source

Anti-Virus

What It Is

A computer virus is any form of malicious software meant to cause harm to a computer or its contents, or a form of malware. Anti-Virus software seeks to protect your computer from various malware threats that can ruin any anonymity protections you may have in place. They check you entire computer for known threats from a list of "definitions" or fingerprints of different virus frameworks.

There are some limitations, and anti-virus software is a rudimentary protective element in your battle for privacy.

How It Works

Most, if not all, anti-virus software will start at boot time and watch your computer for known suspicious activity. The software usually updates its definitions on a regular basis to keep you protected. The software also will schedule regular scans of your computer for any malicious software that got past its real time scan.

Why It's Useful

Anti-Virus software is useful to a degree, but usually it is a reactive tool Rarely does anti-virus software stop unknown threats. It is very useful to find out if a machine is already infected.

Limitations

Due to the nature of anti-virus software, the reactive approach is really the only one that this software is useful for. There is also a performance hit to consider, but this is a small inconvenience when balanced with the potential safety anti-virus brings. Like was said earlier, anti-virus is a rudimentary tool in your quest to increase your privacy, but it is always better to have as many tools as possible.

According to ZDNet

Whichever way you slice it, spyware and adware still fall into an application category where information is collected and reported back to base.

Read More

Anti-Spyware

What It Is

Spyware is any software that collects information about you and transmits it back to a central location (phones home); another form of malware. Anti-spyware tools attempt to discover and remove these pieces of software. Some software comes bundled with tons of spyware, typically free tools and games.

How It Works

Similar to anti-virus, anti-spyware tries to stop malicious tracking software from getting a foothold into your computer by running real time scans of running processes. It also watches software you may happen to install for any hidden or embedded software that could potentially track your computer activity.

Why It's Useful

Anti-spyware is another level of protection that is important to consider because some spyware software is "legitimate" and anti-virus won't quarantine it. Anti-spyware tools allow you to scan you computer at regular intervals the same as ant-virus to pick up any threats it may have missed.

Limitations

The limitations to ant-spyware are similar to those of anti-virus software. This software also uses definitions to trigger detection. If spyware isn't detected via these definitions, you could still be at risk. Again, it is useful, but shouldn't be relied on as anything more than a supplement or addition to your overall security plan.

Dreamstime Stock Photos & Stock Free Images
Dreamstime Stock Photos & Stock Free Images | Source

Maintenance Tools

CleanMyMac is software for Mac that helps to clean up the system, and give it a performance boost

CCleaner is a great tool for PCs and Macs and has a host of features, including the ability to securely wipe a hard drive

Routine Maintenance

What It Is

Routine maintenance on a computer involves running scheduled tasks run such as full system scans of your anti-virus and anti-spyware. It also involves taking manual steps to make your system slightly more secure, but also perform a little better.

How It Works

There are tools out there, like CCleaner, that help to automate the process as much as possible. Routine maintenance tasks involve a broad spectrum of tasks. Disk cleanup (removing old, unwanted, or temporary files), Registry cleanup (on Windows computers), and so on. Many maintenance tools like CCleaner also provide the ability to securely wipe the free space on your computer. This is a great way to increase your privacy. Just because you delete a file from your computer, doesn't mean it can't be retrieved with forensic tools. Securely wiping the free space prevents recovery of any deleted file.

Why It's Useful

It is important to clean your computer on a regular basis. It is one more step in the ongoing process of keeping anonymous and secure online. It has the added benefit of keeping your computer performance and response times high.

Limitations

Like all of the various methods listed in this article, this is one more method you can use to increase your level of security, but is by no means an all inclusive security mechanism. There will nearly always be some fingerprint of your activity on a computer in some way, but this method makes it slightly more difficult to track you.


Dreamstime Stock Photos & Stock Free Images
Dreamstime Stock Photos & Stock Free Images | Source

What do you think?

Are you concerned about your online privacy?

See results

Your Behavior Defines Your Security

There is nothing you can do to remain completely anonymous and secure while connected to the Internet. You must accept some degree of risk, and some degree of exposure. These tools can do nothing to help you if you use them without thinking, or divulge unnecessary information about yourself online.

There are some limitations and sacrifices to be made when gaining more control over your identity and privacy. Whether you have to reboot into a live Linux system to maintain your privacy, or not, expect your computing behaviors to change if you want to have any benefit from the tools you're using.

Be very careful about what you download and install on your computer. Ask yourself if you really need the functionality the software claims. Also be careful about what online games you play. Many games come pre bundled with all kinds of nasty spyware; which is why they can give you the game for free. Don't think online games are safe either. Flash and Silverlight games can be just as nasty too, so be very careful.

The same caution must be taken when downloading anything from the Internet, not just games. Email is still the primary way to spread malware. Be cautious about opening attachments from unknown email addresses, and be even more cautious about opening email from known email addresses. If you weren't expecting an attachment, treat it like a virus. Verify its authenticity and always, always, always, run a virus scan on any email or file you download from the Internet.

Even documents such as Word files or Adobe PDFs can wreak havoc on your system and compromise your security and anonymity. Be very very cautious with these!

You must learn to change your mindset about what information you leave online, and what that information reveals about you. Most of all think about who that information is revealed to. By being conscious of the trail of information you leave every time you get online, you'll have a greater level of anonymity and security, but it is ultimately up to you.

Feedback

Thank you for taking the time to read this article. Please leave feedback in the comments section below.

Are you using any of the methods mentioned above?

Are you concerned with your Internet privacy?

Did you like the article? What could I have done better?

Let me know what you think!

© 2013 davidwhoward

Comments

    0 of 8192 characters used
    Post Comment

    • profile image

      Marty 4 years ago

      Good article, thanks. I usualy take proxy from http://www.proxybridge.com/ and put it in my browser setings. Works great.

    Click to Rate This Article