Last updated: 01 August 2017
Whether you're just worried about Facebook settings or you want to hide all your online movements, you need a privacy audit.
In an age of mandatory data retentionit's crucial to understand your privacy settings. What are you really sharing and with whom? And how do you hide what you want to hide online? Review the online services you use and work out how much of your personal information is getting out into the online world.
In this article:
So just how worried are you about online privacy? You need some level of concern because not everyone can be trusted online. Young people may not appreciate that what goes online stays online, and older people may have concerns about exposing themselves on the web.
To help guide you, we've created an easy ready reckoner for finding your paranoia level and then understanding what you could be sharing and how to protect yourself whether you're the next Snowden or just a little wary.
The thing to understand with any platform or service is that if it's free, your personal data is the currency. That goes for Facebook, Gmail and other free email services, Google and all its tentacles that follow you from a search all around the web, free public Wi-Fi, the list could go on.
The first place to start is Facebook, but the platform itself will always have dibs on your personal details. It's just the price of doing business with the social media giant. The only way around it is to avoid using it altogether or severely limit how much personal information you put into your profile, such as your school, workplace and country of residence.
If you can't kick the habit altogether, it might be worth reviewing your privacy settings. Log in and go to Settings > Privacy. Here you can restrict who sees your posts, who can contact you for a friend request and who can look up your profile. If you're worried about securing your login, under Security and Login choose two-factor authentication such as password and code, alerts for unrecognised logins and encrypted email notifications.
If you're prone to turning to 140 characters to express yourself, you might want to check your Twitter, particularly given the social media platform's changes to privacy settings. What a surprise, it's taking more of your information in the name of 'personalised' content (read: advertising and marketing using your social life as raw material) and data collection is automatically opted-in on your behalf.
Log in to Twitter, then go to Settings and privacy, then Privacy and safety. Here you can review how much of your personal details are revealed, such as your location, and set up tweet protection so you can approve who sees your tweets. To see how Twitter personalises content and collects and shares your data, go to Personalization and Data. This will tell you what personal information will be used to show you ads and even tap into the apps you have on your mobile device for targeting content.
Paranoia rating: X
If you're conducting a lot of your life online, a password manager will help securely store your passwords and potentially prevent accounts with simple passwords from being hacked. Simple passwords such as your child's name are easy to create and easy to remember, but they can leave you vulnerable to hacking. Our password manager reviews can help you find a program that will create unique, complex passwords that are securely stored so you don't have to remember or worse, write down all these passwords.
If you use Google to search the web a lot and you have one or more Google accounts such as Gmail, you're potentially gifting the search giant a lot of your private details. One way to see how much you've exposed is to review your footprint in Google MyActivity. Click on the Activity Controls tab to review your activity and see how your personal information is handled.
Paranoia rating: XX
If you think that governments around the world are giving themselves a little too much licence to access your personal movements online, it could be time to use a VPN. Virtual private networks (VPNs) help shield your web browsing, identity and location, creating a secure 'digital tunnel' between you and your online destinations. A VPN can also protect you from online identity theft while using a public Wi-Fi connection and is essential if you're doing any kind of shopping, financial or other sensitive transaction on public internet.
Not sure where to start? Our VPN reviewswill show you which services we recommend when it comes to protecting your privacy online.
A messaging app with good security is another way to protect private conversations via the net. Depending on the level of privacy you're looking for, you may want to go with a dedicated security-focused app such as Wickr, Confide or Tunnel, or perhaps one of the more popular apps such as WhatsApp, Facebook Messenger and iOS Messages.
Paranoia rating: XXX
You might be plotting espionage, or you might just want to prevent government and business, as much as possible, from prying into your life online. If you fit this description, then there are a few things you won't want to go online without.
Your privacy toolkit won't be complete without email encryption. Emails aren't usually encrypted, which means that messages and attachments in your inbox and in transit can potentially be read. Luckily there are free email encryption programs that you can use without too much trouble that will protect your messages from prying eyes. Mailvelope works with Chrome and Firefox as a plugin and can work with Gmail, Yahoo Mail and Outlook.com.
Next up in your privacy toolkit will be Tor and the Tor browser. Tor, which is short for The Onion Router, is a network of secure computers provided by individuals to help others stay secure online. It's often used by dissidents, journalists, whistleblowers and activists in countries with hostile governments to hide their activity and communications online. Tor hides the 'header' or metadata that can reveal details such as the source, destination, size and timing of web traffic. There are mobile versions for Android, Orbot, and Onion Browser for iOS. If you need to send large files securely, the Onionshare uses the Tor network for anonymity.
If you would rather leave no trace of your web activity on the computer you're using, you can go one step further with Tails. It's a secure operating system that can run from a USB drive, storage cards or DVD that encrypts all of your files, emails and instant messaging traffic using the Tor network and can just plug in and then be removed after use.
Paranoia rating: XXXX
If after all of these measures you still think your privacy isn't fully protected, you might want to consult a higher source by reading The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, by Kevin D. Mitnick. He was once a hacker, but has been a long-time security consultant and public speaker on issues of security.
- Tor Browser download | SourceForge.net - December 2nd, 2019
- Teejayx6 Will Steal Your Identityand Rap About It - WIRED - December 2nd, 2019
- Such as the struggle of the Venezuelan economy, some residents turn to a lucrative gig: Cybercrime - Herald Journalism 24 - December 2nd, 2019
- Smart users guide to the snooping game - Livemint - November 17th, 2019
- Privacy on your smartphone: how to protect your data - AndroidPIT - November 17th, 2019
- BBC News heads to the dark web with new Tor mirror - The Verge - October 27th, 2019
- The Tor Project releases Tor Browser 9.0 with several UX improvements - Neowin - October 27th, 2019
- Fraudulent Tor Browser Spies and Has Been Stealing The Bitcoins - GoodTime Nation - October 27th, 2019
- OnionShare Lets Anyone Host Anonymous Sites on the Dark Web - BleepingComputer - October 16th, 2019
- #SecTorCa: Millions of Phones Leaking Information Via Tor - Infosecurity Magazine - October 16th, 2019
- Is there anything we can do to stop someone spying on us? - Newstalk 106-108 fm - August 25th, 2017
- If you're really concerned about browser security, Incognito isn't enough - TechRepublic - August 20th, 2017
- The Daily Stormer has lost its lease, accessible only via Tor browser - The Moderate Voice - August 20th, 2017
- Tor Project 'disgusted' by Daily Stormer, defends software ethos - CNET - August 18th, 2017
- Neo-Nazi site Daily Stormer resurfaces with Russian domain following Google and GoDaddy bans - Vox - August 16th, 2017
- Tor Browser 7.0.4 Download - TechSpot - August 14th, 2017
- Debian-Based Tails 3.1 Anonymous OS Debuts with Tor Browser 7.0.4, Linux 4.9.30 - LXer (press release) - August 11th, 2017
- Tails 3.1 has been released but you'll need to do a manual upgrade - Neowin - August 10th, 2017
- China and Russia go further in squelching Internet freedom - Washington Post - August 10th, 2017
- The FBI Booby-Trapped a Video to Catch a Suspected Tor ... - Motherboard - August 9th, 2017
- Major Improvements Are Coming Soon to the Tor Browser - The Merkle - August 8th, 2017
- The Attack on Global Privacy Leaves Few Places To Turn - WIRED - August 4th, 2017
- Tor Co-Founder: There Is No Dark Web The Merkle - The Merkle - August 3rd, 2017
- There Is Basically No Dark Web. It's Only A Few Webpages TOR Co-founder - Fossbytes - July 31st, 2017
- How to Install Tor Browser for Mac and Protect Your Online Activity - iDrop News - July 29th, 2017
- How to get around an ISP blocking a website - MyBroadband - July 26th, 2017
- Don't blame online anonymity for dark web drug deals. - Slate Magazine (blog) - July 26th, 2017
- Tor network will pay you to hack it through new bug bounty program ... - ZDNet - July 21st, 2017
- Tor Project to launch public bug bounty project - CIO Dive - July 21st, 2017
- How to access the dark web - The Daily Dot - July 20th, 2017
- Your Mailman Is a Drug Dealer. He Just Doesn't Know It. - WNYC - July 20th, 2017
- Want porn? Prove your age (or get a VPN) Naked Security - Naked Security - July 20th, 2017
- Suspected AlphaBay founder dies in Bangkok jail after shutdown of online black market - Washington Post - July 19th, 2017
- S. Sudan blocks Sudan Tribune website over hostile coverage - Sudan Tribune - July 19th, 2017
- Assassins and child porn; a darknet offers everything - The Slovak Spectator - July 19th, 2017
- Apple users warned of dangerous new Mac malware that steals banking credentials - ThaiVisa News - July 18th, 2017
- The best security apps to lock down your Android phone - The Daily Dot - July 14th, 2017
- Mozilla is held to a higher standard - Ghacks Technology News - July 14th, 2017
- Privacy blunder? Firefox's Get Add-ons page uses Google Analytics - Ghacks Technology News - July 13th, 2017
- Russia, China vow to kill off VPNs, Tor browser - The Register - July 11th, 2017
- How to safely search the deep web - The Age - The Age - July 11th, 2017
- ACLU's Gillmor on privacy: 'We pay for what we value' (Q&A) - The Parallax (blog) - July 10th, 2017
- What is Tor browser, and is it safe? | Komando.com - July 7th, 2017
- Darknet 101: Your guide to the badlands of the internet - CNET - CNET - July 5th, 2017
- In Reporting on North Korea, Tech Helps Break Through Secrecy - New York Times - July 5th, 2017
- How to safely search the deep web - The Sydney Morning Herald - July 5th, 2017
- TOR Browser - darkwebnews.com - July 5th, 2017
- How To Search The Deep Web Safely - Gizmodo Australia - July 5th, 2017
- Burleson man convicted of accessing child porn from dark website - Fort Worth Star Telegram - July 4th, 2017
- Here Brazilian Journalists Learn Privacy for Themselves and Their Sources - Brazzil.com - June 30th, 2017
- Purism aims to push privacy-centric laptops, tablets and phones to market - Computerworld - June 29th, 2017
- Brazilian site teaches journalists how to protect sources and personal data from digital attacks - Knight Center for Journalism in the Americas (blog) - June 29th, 2017
- The best ways to make your search private in 2017 - KnowTechie - June 28th, 2017
- Bill regulating online anonymizers unanimously passes first ruling in Russian Duma - Washington Times - June 24th, 2017
- The Burger King Ad That Activated Google Home Just Won A Prestigious Award - XDA Developers (blog) - June 24th, 2017
- Mozilla's new Android browser blocks ads and trackers - Boing Boing - June 22nd, 2017
- Secure OS Tails 3.0 Launches With Debian 9 Base, Redesigned ... - Tom's Hardware - June 15th, 2017
- Tails OS hits version 3.0, matches Debian's pace but bins 32-bit systems - The Register - June 14th, 2017
- Tor Browser 7.0 is released | The Tor Blog - June 10th, 2017
- Tor Browser 7.0 works harder to protect your anonymity on its own - Engadget - June 10th, 2017
- Tor Browser 7.0 released - gHacks Tech News - Ghacks Technology News - June 8th, 2017
- Tor Browser 7.0 arrives with multiprocess mode, content sandbox, and Unix domain sockets - VentureBeat - June 7th, 2017
- Wikipedians Want to Put Wikipedia on the Dark Web - Motherboard - June 7th, 2017
- What The Dark Web Is And How To Access It - Komando - June 3rd, 2017
- What is Deep Web and How is it Different from Dark Web - Guiding Tech (blog) - June 1st, 2017
- If You Think WannaCry is Huge, Wait for EternalRocks - Data Center Knowledge - June 1st, 2017
- DOJ, FBI Executives Approved Running a Child Porn Site - Motherboard - May 30th, 2017
- What is Tor, How It Works And Where to Download the Tor Browser? Everything You Need To Know - MobiPicker - May 30th, 2017
- WannaCry 2.0: EternalRocks author calls it quits - TheINQUIRER - The INQUIRER - May 28th, 2017
- Data For Sale: What Everyday Consumers Can Do To Keep Their Info Safe - Forbes - May 26th, 2017
- Fearing surveillance in the age of Trump, activists study up on digital anonymity - Washington Post - May 26th, 2017
- EternalRocks Attack Spreads While Using Same Exploit As WannaCry Ransomware - Yahoo News UK - May 23rd, 2017
- Tor browser for Android that is better than Orfox is in the works - Android Kenya (blog) - May 23rd, 2017
- Organizations Can Combat WannaCry & Jaff Ransomware With Well Instrumented DNS - Techzone360 - May 23rd, 2017
- This Spy App Can See If You've Visited Whistleblowing Sites on the Dark Web - Motherboard - May 20th, 2017
- Why Nigerian CIOs should care about the dark web - ITWeb Africa - May 20th, 2017
- A hack has put data of 17 million Zomato users at risk: Should India be worried? - DailyO - May 20th, 2017
- New Jaff Ransomware Part Of Active Necurs Spam Blitz - Threatpost - May 13th, 2017
- Three vulnerabilities allow spies to detect Tor browsers - Cloud Pro - May 9th, 2017
- Tor Browser - TechRadar - May 6th, 2017