Tips Tricks & Hacks

8 Online Privacy Steps You Need To Take Now

With the many advancements in technology, online privacy has been a big problem over the years.  Many people still have no idea the extent to which governments and corporations are able to gather information about our online activities.  Many believe that this problem will continue to get worse under the Trump administration.

As you may realize, advertising firms are collecting as much data as possible about your online behavior.  They are the ones that have taken most of the heat from privacy critics. But Rick Jackson, once a marketer and now CEO of privacy technology firm Privada Inc., thinks ad firms like DoubleClick are serving as an unwitting smokescreen for the real privacy problems.

“There are a lot more people tracking you than you think,” Jackson said. “The data world is a very powerful and lucrative marketplace with a lot of players involved.” For evidence, he points to a Washington Post story that revealed that 11 pharmaceutical companies – including Pfizer Inc., SmithKline Beecham PLC, Glaxo Wellcome PLC – had formed an alliance and were tracking every click consumers made across their sites, then comparing notes. Consumers were never told.

“Everybody points to advertising. That’s just the tip of the iceberg,” Jackson said. “We as consumers don’t have any knowledge of what really goes on out there.”

Whats even scarier than what is happening in the advertising world is how the government is invading our privacy. For example, the Justice Department is monitoring our emails and phone calls. Back when snail mail was king, courts ruled that any information on the outside of a letter — addressee, return address, place of posting — was in the public domain, and therefore available to government investigators. That’s why the post office scans and records every single piece of mail in the U.S. … every day.

That logic now applies to the metadata of every call you make and every email you send. Soon it may apply to your Web browsing history as well.  Pretty crazy right?

Well if you are anything like me and you don’t like the idea of all your communications being monitored, expert Ted Bauman of Bayan Hill recommends :

  • Get Signal and/or WhatsApp for mobile messages: Signal is a sophisticated Swiss messaging app that fully encrypts all your text messages. It requires both parties to use it, so it isn’t ideal for everything. Nevertheless, Moxie Marlinspike, the founder of Open Whisper Systems, Signal’s developer, says there has been a huge expansion in their user base since the election. So you’ll probably find more Signalers on your contact list as time goes on.WhatsApp is an alternative that encrypts your messaging and VoIP calls. It isn’t as secure as Signal because it’s owned by Facebook, whose approach to court orders is uncertain, but for ordinary purposes it will prevent real-time monitoring of your communications.
  • Encrypt your computer’s hard drive: As I describe in Privacy Code 2.0, full disk encryption makes the contents of your computer totally unintelligible to anyone without the password. For example, if you are stopped by Homeland Security upon return to the U.S., your laptop can be searched before you officially enter the U.S. But if it’s encrypted, no law says you must divulge the password.Both Apple and Windows computers have automatic encryption built in if you activate it. That’s fine for most purposes, but if you want added security, a free, easy to use open-source encryption utility can be found here.
  • Get a password manager: Using secure apps and utilities like those above means having passwords — lots of them. Don’t write them on your palm. Get a password manager that stores them (encrypted, of course) in one place and generates and even changes passwords for you.Personally, I use Dashlane. Other good password managers are 1Password and KeePass. I don’t recommend LastPass, another popular one, because they allowed themselves to be hacked last year. That’s just not good enough.
  • Use two-factor authentication: Most email programs, cloud storage utilities, banking apps, social media and other sensitive applications these days offer two-factor authentication (TFA). TFA requires that every time you sign in, you go through a secondary layer of security: a code to enter at login that is sent to your phone via text message. Some offer such codes via email, but don’t use it. If hackers gain access to your email, they can get access to your accounts by having TFA codes sent to them.
  • Use HTTPS Everywhere: My friends at the Electronic Frontier Foundation developed a browser plug-in for Firefox and Chrome that forces websites you visit to use the most secure connection protocol. If encryption is available on the site you visit, your connection to the site will be encrypted, and you will be protected from various forms of surveillance and hacking during that session.
  • Don’t rely on your browser’s “incognito mode” to do things it wasn’t meant to do: Browsers like Chrome, Safari, Opera, Firefox and Microsoft Edge allow you to start a browsing session that doesn’t record anything you do during that session. Any websites visited, cookies downloaded or other connection stats will be wiped clean when you end the session.“Private” browsing modes thus protect you from searches of your computer. But unless you’re connecting to an encrypted site (via HTTPS Everywhere, for example), whoever operates the site can collect all your browsing data anyway since it is recorded by the site’s server.
  • Use DuckDuckGo for sensitive searches: If you’re not convinced that Google’s motto “do no evil” is anything more than a marketing ploy, use DuckDuckGo, an alternative search engine that doesn’t record your searches or anything else about you. It produces great results, so you won’t really lose much by using it instead of Google.
  • Use a virtual private network (VPN): As my privacy report explains, a VPN is the best all-around protection you can get on the Internet, because it encrypts everything you do, including your identity and location. VPNs can be used on both your computers and your phones. That’s important, because as Eva Galperin, global-policy analyst at the Electronic Frontier Foundation, says, “Logging into airport Wi-Fi without using a VPN is the unprotected sex of the Internet.”As a bonus, you can also use a VPN to spoof your location and gain access to region-locked streaming content, like Amazon Prime, when you are abroad. The only downside is that they slow your connection a bit. VPNs are provided by specialized hosting companies that charge about $5 a month for the service.

Although there is even more that can be done to protect your privacy…  these steps are a good start.  We will continue to add more information to this section in the future.

There is some great information over at Bayan Hill if you have not been there in the past.  I highly recommend checking out the site.  You can also read the entire article at the link below:


Banyan Hill

1 Comment

1 Comment

  1. Luckie

    August 6, 2018 at 2:10 am

    Wow, that’s a really clever way of thnkinig about it!

Leave a Reply

Your email address will not be published. Required fields are marked *

Most Popular

To Top