The services below will increase your security and reduce your surveillance by governments and advertisers.
Here are my tips for maintaining on-line privacy:
Use A Search Engine That Doesn’t Track You
Many popular search engines like Google and Bing save your search history. Typically, your searches are saved along with some information about your computer (e.g. your IP address, User Agent and often a unique identifier stored in a browser cookie), and if you are logged in, your name and email address as also recorded. With this information, your searches can be tied together. This means someone can see everything you’ve been searching, not just one isolated search. You can usually find out a lot about a person from their search history.
StartPage is a search engine that removes all identifying information from your query and submits it anonymously to Google.
See my article How To Make Your Searches Private, Ad-Free And Uncluttered for more details.
Move Away From Email Providers That Scan Your Email
- we use encrypted SMTP for sending your mail when the receiving server supports it
- we mandate encrypted access for webmail, IMAP and POP
- we use Perfect Forward Secrecy where possible for all encrypted connections
- we encrypt all email while at rest on our servers
- we encrypt communications between our data centers
FastMail‘s prices start at $10 per year.
If you need end-to-end email encryption, I recommend ProtonMail — a reliable encrypted email provider based in Switzerland.
See my article A List Of Email Providers That Don’t Track You for more information.
Use A Privacy-Friendly Browser
Tips on web browser privacy:
- Turn off third-party cookies — these are cookies that are sent to advertising firms. Turning off these cookies just means you’ll be tracked less — it won’t affect your browsing ability.
- I prefer to turn off cookies completely, and use the Cookie Whitelist add-on to only accept cookies from specific sites where I login
- You can install a extension like uBlock Origin (Firefox, Chrome) to block ads, thereby reducing the amount of information collected by advertisers
- The HTTPs Everywhere is an extension for the Firefox and Chrome browsers, made by the Electronic Frontiers Foundation. It encrypts your communications with many major websites, giving you a basic level of web browsing privacy.
- You can turn off Java and Flash in your browser (both can be a security risk — see an explanation here)
- If you want to browse anonymously, use the Tor Browser Bundle. It is a free application that is available for Windows, Macs and Linux. See my article on Tor for more details.
Keep Your Personal Information Private
Today, many companies want to collect your personal information in databases. Here are some tools to avoid this process:
- The Fake Name Generator is a free tool that instantly creates a set of fake credentials, for dealing with companies that request unnecessary personal information. It will create a completely fictitious identity that includes a fake name, telephone number, email address, street address and credit card number.
- SpamGourmet is a free service that allows you to create an unlimited number of disposal email addresses. See my article where I explain how to use this service.
- Safe Shepard is a free service that removes your name from various “people search” databases (e.g. PeekYou).
- The Account Killer websites gives your instruction about deleting yourself from sites like Facebook and Twitter. See also Permanently Deleting Accounts on Popular Websites.
You can read about other ways to opt-out here.
Use A Password Manager
Password managers allow you create strong, unique passwords for all your websites accounts. They will then automatically log you into websites, thus preventing key-logging (attempts to capture your keystrokes and hence your passwords).
An excellent password manager is Bitwarden.
Use A VPN To Avoid Snoopers
See my article The Best VPNs for a list of all my recommended VPN providers.
You may wish to get a VPN-capable router. The router will provides a VPN connections to all your computers and mobile devices. You won’t have to install a VPN client on each device, all those connected devices count as one connection with your VPN provider.
Use Privacy-Friendly Forums
Retroshare is a free, open source messaging system for encrypted “friend-to-friend” communication.
WordPress is a free and open source blogging system.
Use Encrypted Voice and SMS
Wire is an app that allows you send encrypted text messages.
Use Computers and Mobile Devices That Don’t Track You
Currently, your best choice for a private mobile device is one that runs Android which is technically open source. However, the Android operating system provided with phones and tablets is often modified with the addition of proprietary applications from Google or others and may compromise your privacy.
The Blackphone is a privacy-friendly smart phone produced by Silent Circle. The phone features encrypted phone service, secure messaging and many other security-oriented features. See my article on Blackphone for more details.
You can also “jailbreak” an Android device, and replace the OS with Replicant (a free Android distribution) or CyanogenMod. See The Unlockr website for more information on how to unlock/root your device (or go directly to Cyanogenmod or F-Droid).
Secure Your Computers
Use a strong passwords for your user accounts.
Set your computer to log you out after 15 minutes.
Keep your systems and application updated, to avoid malware.
Encrypt your hard drives where possible. Some Mac and Linux installations have drive encryption built into the operating system — you just have to turn it on.
Secure Your Home Network
When setting up a wireless network use WPA2 encryption, use MAC address identification, set you network to not announce itself.
Set up you your router’s firewall — only open necessary ports. PeerGuardian is a privacy-oriented firewall application
Use A Private Operating System If You Need To Be Anonymous
Tails is a free operating-system designed to be used from a DVD or a USB stick independently of the computer’s original operating system. Tails can be run in “read-only” installation, meaning it does not write any files to disk. This provides a high level of privacy because the operating system leave no traces of the user’s activities, and there’s little chance of the user being monitored by key-loggers and other tracking software.
You can also run an OS inside a Virtual VM — see my article Running A Virtual Machine for more details.