Low-tech ways you can use to protect your privacy online

Many individuals and countries are powerless against hackers. Hackers can disrupt a government’s security making it vulnerable to attacks. A report suggested that hackers can cause a cyber war and North Korea is believed to have the best hackers in the world. Prof Kim Heung-Kwang said the country had around 6,000 trained military hackers. Despite the seemingly endless hack attacks Americans feel powerless to protect themselves against intrusions on their online privacy, few Americans do much in the way of adopting privacy enhancing measures. America has been hit by a number of cyber related attacks including the US Government Agency Hack and the hacked Army website.

The majority of Americans believe it is important – often “very important” – that they be able to maintain privacy and confidentiality in commonplace activities of their lives. Most strikingly, these views are especially pronounced when it comes to knowing what information about them is being collected and who is doing the collecting. These feelings also extend to their wishes that they be able to maintain privacy in their homes, at work, during social gatherings, at times when they want to be alone and when they are moving around in public.

“Resistance is not futile if you are not aiming for 100-percent perfection,” says Nico Sell, co-founder of encrypted messaging service Wickr and organizer of hacker conference Def Con. Here are some low-tech tips to reduce your digital footprint and exposure.

Self Censor: Search

The problem: Search engines such as Google have built their business models on selling keywords from user searches to advertisers, so searches are never private.

The solution: Don’t ask Google anything you would not be comfortable sharing publicly—with your boss, lover or worst enemy. By self-censoring, you limit the information Google can sell advertisers. For highly sensitive searches, for example, health queries, go offline and ask your doctor. Another option? Avoid searching on Google altogether, says Adi Kamdar, an activist with the non-profit Electronic Frontier Foundation.

“You could also use search tools that don’t collect data about you, such as DuckDuckGo.” Looking for an alternative to Gmail? Protonmail is a freemium service offering end-to-end encryption so all your info is converted into code and protected from intruders, from when you hit send to when the email is read. It can’t access your emails, so it cannot sell your data to advertisers or turn emails over to the government.

Mess with the System: Your Data

The problem: Data brokers are building a digital profile on you to sell you targeted ads.

The solution: Send mixed messages to search engines and the data brokers who harvest information from those searches. For example, when you pull up Google Maps to find the nearest hipster coffee shop, search for something out of character. Also, limit the amount of personal information you share online including birthdays, phone numbers and addresses. If your birthday is already on Facebook, make up a fake birthday and spread it around to make it harder for thieves to steal your identity.

Eye Spy: Cameras

The problem: Cameras embedded in phones, tablets, smart TVs and security systems can be hijacked by hackers and turned into spy-cams.

The solution: Cover all your inner-facing cameras with electrical tape or a sticker, easily removable for when you want to snap a pic or FaceTime with grandma.

Wifi Is Hostile: Avoid Unknown Public Networks

The problem: People think they’re safe when logging on to a password-protected network, but public wifi is easily hacked.

The solution: Travelers beware! Only connect to public wifi if you know it is secure. For an added layer of security when connecting to wifi in a hotel, restaurant, cafe or airport, Kamdar has this advice: “Use things like Virtual Public Networks and be aware of what connections are encrypted and what are not.” Alternatively, use a personal hot spot, such as a Mifi device.

New Devices?

The problem: Smartphones, laptops and computers contain a portable goldmine of valuable personal information, catnip for identity thieves and data brokers.

The solution: When getting rid of a device, wipe it properly so personal photos and data are permanently removed. Using the built-in delete function is usually not enough, because most of the time hard drives can be reconstructed using readily available software. Use specialized services to properly delete information. Sell recommends Wickr’s file shredder for mobile devices. Of course if you want to be super safe, you can smash up your hard drive.

Decrease Your Digital Footprint

The problem: Data has become so valuable to businesses, many are asking for information they do not strictly need, such as date of birth and Social Security numbers.

The solution: Always question why you are being asked to hand over that information. Do not give it up unless absolutely necessary. As Sell says, it’s about “not being the low hanging fruit, not being the sucker.” Reports NBC

Related: The Kenya Defence Force Twitter Account hacked again.


Erick Vateta564 Posts

--- Erick Vateta is a lawyer by training, poet, script and creative writer by talent, a model, and tech enthusiast. He covers International tech trends, data security and cyber attacks.


Welcome! Login in to your account

Remember me Lost your password?

Lost Password