Tagged: security Toggle Comment Threads | Keyboard Shortcuts

  • Earthling 7:07 am on March 7, 2019 Permalink | Reply
    Tags: adblocker plugins, autodelete cookies plugin for firefox, Bloody vikings, decrease productivity, , , plugin to produce misleading browser data, plugins for firefox, , protection against deanonyimzation of browser data, protection against surveillance while browsing, secure internet browsing, security, temporary email address plugin, tracker blockers   

    12 Browser Plugins That Enhance Your Privacy And Security 

    NOSCRIPT

    “Allow active content to run only from sites you trust, and protect yourself against XSS and Clickjacking attacks, “Spectre”, “Meltdown” and other JavaScript exploits.”

    This plugin disables scripts by default, and lets you choose which ones to activate. This feature is crucial for browsing the web securely. Webpages with javascript are like computer programs– opening random webpages with javascript is almost like installing random software without an antivirus.

    https://addons.mozilla.org/en-US/firefox/addon/noscript/

    SCRIPTSAFE

    This is an alternative to NoScript that is also available for Chrome.

    https://addons.mozilla.org/en-US/firefox/addon/script-safe/

    UMATRIX

    This is like a hardcore version of NoScript. By default it blocks all sorts of content, and only allows what you enable. You can choose the exact types of content to block and the exact web addresses, all displayed on a handy grid. Highly customizable.

    https://addons.mozilla.org/en-US/firefox/addon/umatrix/

    PRIVACY BADGER

    This plugin blocks trackers and also learns to detect new trackers, unlike other adblockers which only block content from a list.

    https://addons.mozilla.org/en-US/firefox/addon/privacy-badger17/

    UBLOCK ORIGIN

    This plugin blocks ads, trackers, and malicious content. Highly configurable. May not work optimally in combination with Privacy Badger.

    https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/

    HTTPS EVERYWHERE

    This plugin ensures that webpages are always loaded with secure (encrypted) connections when possible. This feature is also an option in Ublock Origin.

    https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/

    CHAMELEON

    This plugin anonymizes your browser data (data about your browser and location, etc. that is sent to websites), making you less susceptible to de-anonymization.

    https://addons.mozilla.org/en-US/firefox/addon/chameleon-ext/

    COOKIE AUTODELETE

    This plugin automatically deletes old cookies and cookies from pages that are no longer open.

    https://addons.mozilla.org/en-US/firefox/addon/cookie-autodelete/

    DECENTRALEYES

    “Protects you against tracking through “free”, centralized, content delivery. It prevents a lot of requests from reaching networks like Google Hosted Libraries, and serves local files to keep sites from breaking. Complements regular content blockers.”

    https://addons.mozilla.org/en-US/firefox/addon/decentraleyes/

    MULTI-ACCOUNT CONTAINERS

    “Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs that preserve your privacy. Cookies are separated by container, allowing you to use the web with multiple identities or accounts simultaneously.”

    https://addons.mozilla.org/en-US/firefox/addon/multi-account-containers/

    DECREASE PRODUCTIVITY

    This plugin helps you browse anonymously in the physical proximity of other people. It will dim images and make every webpage look the same, so you can read anything while at work, until your boss finds out you have this plugin. It’s also useful if you find the diverse images and colors around the internet annoying.

    https://addons.mozilla.org/en-US/firefox/addon/decreased-productivity-andryou/

    BLOODY VIKINGS!

    “Simplifies the use of temporary e-mail addresses in order to protect your real address from spam. Supports inter alia 10minutemail.com and anonbox.net.”

    https://addons.mozilla.org/en-US/firefox/addon/bloody-vikings

     
  • Earthling 7:37 am on November 11, 2018 Permalink | Reply
    Tags: abuse, corrupt governments, cybersecurity, firewall, founding fathers, , gafam, , healthy living, , , linux, malware, , private life, qubes, security, spyware, , tor, trojan, tyranny, US constitution, virus, vpn, windows 10   

    How to use the internet securely and privately 

    On the internet, security is a prerequisite for privacy.

    A life with privacy is the normal, natural, healthy way of living. Perhaps this is why the Founding Fathers of America put protection of privacy in the constitution. With the advent of the internet and the large-scale usage of electronics that can spy on us, forces of evil such as governments and corporations want to deprive people of this natural human right in order to more effectively control and exploit us.

    There is a trade-off between security and convenience: the more secure and private your life is, the less convenient it will be and the more time it will take to do things. Nevertheless, those who love Liberty should take the trouble to implement at least some of the following measures:

    • Use a secure operating system if possible (Qubes, Linux, etc.). Especially avoid Windows 10, which is designed to spy on you and send your data to Microsoft even if you tell it not to. In case you can’t avoid using Windows 10, harden it for maximum security, and do what you can to circumvent the telemetry.

    • Encrypt your hard drives.

    • Go through all your phone’s settings and make sure nothing is accessing or transferring data you don’t want it to.

    • For maximum mobile security, do not root your phone; for maximum privacy, do root your phone and install a custom ROM with microG instead of Google apps and services. Google does not respect your privacy.

    • On Android, use Privacy Guard and an isolating app such as Shelter to minimize the amount of data apps can access.

    • Use encrypted communication when possible.

    • Use privacy-respecting services to communicate (Messengers: Telegram, Signal; Email: Protonmail, Tutanota)

    • Use a secure browser with plugins such as NoScript, Scriptsafe, uBlock Origin, AdBlock Plus, etc. that block ads, trackers, and unnecessary scripts. Chrome is secure but does not respect your privacy; use Firefox.

    • Use a VPN for secure browsing (ProtonVPN is free), or Tor for anonymity. Tor is anonymous but not secure, so don’t enter any personal information when using it.

    • Don’t use public wifi connections. If you do, use a VPN.

    • Browse securely, being vigilant. Browse in private mode. Have your browser delete your history when closing. Use secure connections (https). If you get a warning that a site has a bad or out of date certificate, close your browser and don’t visit the site. Javascript can do all kinds of things on your computer, so when you open a webpage with Javascript you should think of it as running a program on your computer: do you trust this program, do you trust its source, do you know what it does?

    • Use a firewall on your computer and phone to control which applications use the internet.

    • Use a firewall on your router to filter out bad content as it’s coming in.

    • Use a family internet filter on your computer to block malicious sites (porn, gambling).

    • Keep everything updated regularly.

    • Don’t click on links in emails. If you must open any, copy and paste the link into the browser and verify that it is a safe site.

    • Don’t download email or messenger attachments unless necessary. Open documents in Google Drive, Yandex Drive or a similar service in your browser.

    • Use virtual machines to browse the internet and open attachments, so when you get a virus it won’t infect your whole system.

    • Use Whonix or Tails OS to browse the internet anonymously. These operating systems use Tor, so don’t enter any personal information.

    • Don’t illegally download things. If you do, find things from reliable sources that have been downloaded many times and have positive feedback.

    • Use an antivirus on Windows or OS X, but don’t rely on it.

    • Beware of any links or documents coming from anyone, because even if you trust someone 100%, their device could be hacked, virus-ridden, or someone could be impersonating them.

    • Don’t let anyone use your devices, because they might be less security-aware than you. Lock the screen when you leave the computer. Use a good password. Set a BIOS password for your computer. Factory reset your devices before traveling or visiting police, if you don’t want them to look at or copy all your data.

    • For true online anonymity, use Tails OS on a disposable device at a cafe somewhere far from where you usually go, then break and throw out the device afterwards.

    • Avoid doing terrorism or other illegal activities, or associating with people doing them, because this may give governments a legitimate reason to invade your privacy, and they have extensive resources at their disposal.

    Be diligent about what you share online, and know that whatever you share with one person might be seen by many if they disclose your content or their privacy is invaded. Don’t share personal information with random people or websites. Use a separate email account for signing up for random websites.

    • Don’t use the same password everywhere. Use strong passwords.

    • Check if your personal information has been compromised in any data breaches using Have I Been Pwned.

    • There is deanonymization technology that can identify you solely based on your online behavior and browsing patterns. To avoid this, don’t use consistent patterns: develop several styles of typing and moving your cursor, don’t visit the same sites all the time (and especially not in the same order or from the same IP or VPN), don’t use the same software and hardware all the time to do the same things.

    SERVICES TO AVOID IF YOU WANT PRIVACY

    Google, Facebook, Microsoft, Apple, Amazon, and other big names are notorious for spying on people and sending their information to the US government. Avoid services of these companies if you want privacy. Since many can’t avoid using these services, make sure to go to the settings and configure them to minimize the spying.

    Assume that a company may not value your privacy at all, unless you personally know its CEO and can vouch for their decency. Also assume that your data is not safe with any company, since there are data breaches even in big companies with the financial resources to implement extensive security.

    HOW TO TELL IF YOUR DEVICE HAS BEEN COMPROMISED

    There are obvious signs of malware infection, such as your device being slow, behaving erratically, showing ads, installing things you never told it to, using lots of bandwidth, and so on. Your antivirus may indicate if you have malware. On the other hand, a well-done hack or subtle kind of malware will not be easy to detect. Many forms of malware require expertise to detect, so in order to be sure your device is clean you need to have an expert examine it, or study cybersecurity yourself. The terms to search are “deep packet inspection” and “intrusion detection”.

    WHAT TO DO WHEN YOUR PRIVACY IS INVADED

    If someone has invaded your privacy, often it will be impossible to identify them, or they will be “legally untouchable” corporations or government agencies. In case there is the possibility of justice, you should sue them and could receive a good compensation.

    If your device has been infected or hacked, disconnect it from the internet. Reinstall the operating system. Don’t download the installation media from a compromised machine. Be aware that any files copied, backed up or uploaded from the compromised device may contain hidden malware. Other devices of yours may also be infected, such as computers, phones, printers or routers (with the IoT the list is growing), as well as other people’s devices that came into contact with yours physically or online.

    RELIABLE PRIVACY

    Most devices do not have hardware switches to turn the camera and microphone off, so you can’t be sure they aren’t spying on you. When purchasing devices keep things like this in mind. For certain privacy, stay away from all electronics with the capacity to record and transfer data.

    Further information on surveillance: https://ssd.eff.org/en#index

    Article by Anonymous Man

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel
Bitnami