Advertisement
Guest User

Privacy

a guest
Apr 23rd, 2019
11,844
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.24 KB | None | 0 0
  1. Introduction
  2.  
  3. To myself is very important to maintain privacy and security in every aspects of my life, and if you are
  4. like me spending a lot of your time on the internet it is important that you know how to remain as much secure as you can.
  5.  
  6. When you are being watched it is more likely you to change your behavior, the way you talk and act.
  7. Imagine every search, every video, everything you ever did on the internet was watched by someone, or a organization,
  8. you would feel uncomfortable and scared.
  9. It fact there is no way to remain 100% anonymous, but there is ways to be very secure.
  10. So that's why i made this simple guide to help you.
  11.  
  12. Browser Choice
  13. ----------------------------------------------------------------------------------------------------------------------------
  14. First, i don't recommend you using Google Chrome.
  15.  
  16. Recommended browsers.
  17.  
  18. Tor
  19.  
  20. Should be your choice if you need more anonymity. It's a modified version of Firefox, has pretty good security add-ons and encryption.
  21. By default, the Tor browser may not be the best alternative for everyone. Because it uses the Tor network,
  22. which routes traffic over three different hops, download speeds are quite slow.
  23. I recommend you researching a little about it before starting using it.
  24.  
  25. Firefox
  26.  
  27. Fast, reliable, open source and respects your privacy, easier to switch from other browsers like Chrome, Opera etc.
  28.  
  29. Out of the box, Firefox is not the best for privacy, but it can be customized and hardened,
  30. as explained in the Firefox privacy guide.
  31. Be sure to disable telemetry in Firefox, which is a feature that will collect
  32. “technical and interaction data” and also “install and run studies” within your browser.
  33.  
  34. Privacy add-ons for firefox:
  35.  
  36. uBlock origin
  37. Decentral Eyes
  38. HTTPS Everywhere
  39. Privacy Badger
  40. uMatrix
  41. NoScript
  42. User-Agent Switcher
  43. Ghostery
  44.  
  45. Brave
  46.  
  47. Brave is a Chromium-based browser that is fast, clean, secure and very
  48. privacy-focused by default with a built-in ad blocker.
  49. The main developer behind Brave is Brandon Eich, who formally worked for Mozilla.
  50. For out-of-the-box privacy and security, Brave is a great option.
  51. ----------------------------------------------------------------------------------------------------------------------------
  52. Privacy focused email Providers
  53.  
  54. ProtonMail
  55. Mailfence
  56. Disroot
  57. Countermail
  58. NeoMailbox
  59.  
  60. Protecting personal information
  61.  
  62. Start by removing old accounts you had on any social-media or service.
  63. Check any personal info that can be public, and remove it.
  64.  
  65. Avoid using personal pictures. If you do, keep them private to only people you trust.
  66. Don't use public WiFi!
  67.  
  68. Create a fake identity, it is important to make people confused about who you are,
  69. if you make some of your info "mixed" with fake one
  70. it can be hard to doxers or other people
  71. find you. Ask someone to do this for you, or do it yourself, try to search every
  72. info you could have posted online before.
  73.  
  74. You can check if you email was leaked here:
  75. Haveibeenpwned.com
  76. Here you can check your passwords:
  77. Haveibeenpwned Passwords
  78. ----------------------------------------------------------------------------------------------------------------------------
  79. Virtual Private Networks (VPNs)
  80.  
  81. These are the VPNs that i personally recommend,
  82. all providers listed here are outside the US, use encryption, accept Bitcoin, support OpenVPN and have a no logging policy.
  83.  
  84. Using a VPN provider will not make you 100% anonymous. But it will give you a better privacy.
  85. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.
  86.  
  87. Mullvad
  88. BlackVPN
  89. ExpressVPN
  90. AirVPN
  91.  
  92. And others...
  93.  
  94. Password Managers
  95.  
  96. If you are currently using a password manager software like 1Password, LastPass, Roboform or iCloud Keychain, you should pick an alternative here.
  97.  
  98. Bitwarden
  99.  
  100. Bitwarden is among the easiest and safest solutions to store all of your logins and passwords while
  101. conveniently keeping them synced between all of your devices.
  102. If you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden server.
  103.  
  104. KeePass
  105.  
  106. KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. All passwords in one database,
  107. which is locked with one master key or a key file. The databases are encrypted using the best and
  108. most secure encryption algorithms currently known: AES and Twofish. See also: KeePassX.
  109. ----------------------------------------------------------------------------------------------------------------------------
  110. Encryption of data
  111.  
  112. I use VeraCrypt full disk encryption for all of my drives and partitions.
  113. VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in attacks.
  114.  
  115. it also solves many vulnerabilities and security issues found in TrueCrypt, the old industry standard for full disk encryption.
  116.  
  117. Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file
  118. and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove
  119. that the information they are after exists (for example, one password may decrypt benign
  120. data and another password, used on the same file, could decrypt sensitive data).
  121.  
  122. Privacy Respecting search engines
  123.  
  124. SearX
  125.  
  126. An open source metasearch engine, aggregating the results of other search engines while not storing information
  127. about its users. No logs, no ads and no tracking.
  128.  
  129. StartPage
  130.  
  131. Google search results, with complete privacy protection. Behind StartPage is
  132. a European company that has been obsessive about privacy since 2006.
  133.  
  134. DuckDuckGo
  135.  
  136. The search engine that doesn't track you. Some of DuckDuckGo's code is free software hosted at GitHub,
  137. but the core is proprietary. Based in USA.
  138.  
  139. Domain Name System (DNS)
  140.  
  141. DnsCrypt - Tool
  142.  
  143. DNSCrypt is a protocol for securing communications between a client and a DNS resolver.
  144. The DNSCrypt protocol uses high-speed high-security elliptic-curve cryptography and is very similar to DNSCurve,
  145. but focuses on securing communications between a client and its first-level resolver.
  146.  
  147. CloudNS - Service
  148.  
  149. An Australian based security focused DNS provider. Features: DNSCrypt Support to provide confidentially and message integrity,
  150. complete trust validation of DNSSEC enabled names, namecoin resolution of
  151. .bit domain names and no domain manipulation or logging.
  152.  
  153. Notrack
  154.  
  155. A network-wide DNS server which blocks Tracking sites. Currently works in Debian and Ubuntu.
  156.  
  157. Text and Video Messaging
  158.  
  159. Secure your text messages.
  160.  
  161.  
  162. Pidgin (windows)
  163.  
  164. Pidgin is a popular free and open source IM client that lets you chat to users on AIM, Google Talk, MSN, Yahoo and many more. OTR (Off-the-record)
  165. is a plugin that combines AES encryption, perfect forward secrecy, and the SHA-1 hash
  166. function to ensure strong encryption for IM sessions.
  167. As with GnuPG for emails, initial setup is a bit of a pain, but once done operation is seamless.
  168.  
  169. Keybase
  170.  
  171. Keybase is a key directory that maps social media identities to encryption keys (including, but not limited to PGP keys) in a publicly
  172. auditable manner. Keybase offers an end-to-end encrypted chat and cloud storage system, called Keybase Chat and the Keybase
  173. filesystem respectively. Files placed in the public portion of the filesystem are served from a public endpoint, as well as locally from a filesystem mounted by the Keybase client.
  174. Anti malware / Anti virus software / Others
  175.  
  176. Malware Bytes
  177. Bitdefender
  178. CCleaner
  179.  
  180. Email clients
  181.  
  182. It is always good to be updated on emails and not have to log in in every of them to check new notifications
  183. that's why i recommend these safe email clients that you can download to your pc
  184.  
  185. Mozilla Thunderbird
  186.  
  187. Mozilla Thunderbird is a free, open source, cross-platform email, news,
  188. and chat client developed by the Mozilla Foundation.
  189.  
  190. Claws Mail
  191.  
  192. Claws Mail is a free and open source, GTK+ based email and news client.
  193. It offers easy configuration and an abundance of features.
  194.  
  195. Enigmail
  196.  
  197. A security extension to Thunderbird and Seamonkey. It enables you to write and receive
  198. email messages signed and/or encrypted with the OpenPGP standard.
  199. ----------------------------------------------------------------------------------------------------------------------------
  200. Encrypted Messengers
  201. Are you currently using a Messenger like WhatsApp, Viber, LINE, Telegram or Threema?
  202. You should consider picking an alternative here.
  203.  
  204. Signal
  205.  
  206. Signal is a mobile app developed by Open Whisper Systems. The app provides instant messaging,
  207. as well as voice and video calling. All communications are end-to-end encrypted
  208. Edward Snowden recommends using softwares by Open Whisper Systems like this one.
  209.  
  210. Riot.im
  211.  
  212. Riot.im is a decentralized free-software chatting application based on the Matrix protocol,
  213. a recent open protocol for real-time communication offering E2E encryption.
  214. ----------------------------------------------------------------------------------------------------------------------------
  215. PC Operating Systems
  216.  
  217. I recommend you switching to Linux based OS, you can always dual boot your system with Windows and Linux up to your choice
  218. You can also run your fav Linux system from a USB or a CD,
  219.  
  220. Debian
  221. Tails
  222. Ubuntu
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement