{"id":186364,"date":"2017-04-05T16:27:36","date_gmt":"2017-04-05T20:27:36","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/heres-how-to-protect-your-privacy-from-your-internet-service-provider-eff\/"},"modified":"2017-04-05T16:27:36","modified_gmt":"2017-04-05T20:27:36","slug":"heres-how-to-protect-your-privacy-from-your-internet-service-provider-eff","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/heres-how-to-protect-your-privacy-from-your-internet-service-provider-eff\/","title":{"rendered":"Here&#8217;s How to Protect Your Privacy From Your Internet Service Provider &#8211; EFF"},"content":{"rendered":"<p><p>    We pay our monthly Internet bill to be able to access the    Internet. We dont pay it to give our Internet service provider    (ISP) a chance to collect and sell our private data to make    more money. This was apparently lost on congressional    Republicans as they     voted to strip their constituents of their privacy. Even    though our elected representatives have failed us, there are    technical measures we can take to protect our privacy from    ISPs.  <\/p>\n<p>    Bear in mind that these measures arent a replacement for the    privacy rules that were repealed or would protect our privacy    completely, but they will certainly help.  <\/p>\n<p>    It goes without saying: if privacy is a concern of yours, vote    with your wallet and pick an ISP that respects your privacy.        Here is a list of them.  <\/p>\n<p>    Given the dismal state of ISP competition in the US, you may    not have this luxury, so read on for other steps you can take.  <\/p>\n<p>    In 2014, Verizon was caught injecting cookie-like trackers into    their users traffic, allowing websites and third-party ad    networks to build profiles without    users consent. Following criticism from US senators and    FCC action, Verizon stopped auto-enrolling users and instead        made it opt-in. Users now have a choice of whether to    participate in this privacy-intrusive service.  <\/p>\n<p>    You should check your account settings to see if your ISP    allows you to opt-out of any tracking. It is generally found    under the privacy, marketing, or ads settings. Your ISP doesnt    have to provide this opt-out, especially in light of the    repeals of the privacy rules, but it can never hurt to check.  <\/p>\n<p>    EFF makes    this browser extension so    that users connect to a service securely using encryption. If a    website or service offers a secure connection, then the ISP is    generally not able to see what exactly youre doing on the    service. However, the ISP is still able to see that youre    connecting to a certain website. For example, if you were to    visit <a href=\"https:\/\/www.eff.org\/https-everywhere\" rel=\"nofollow\">https:\/\/www.eff.org\/https-everywhere<\/a>, your ISP wouldnt    be able to tell that youre on the HTTPS Everywhere page, but    would still be able to see that youre connecting to EFFs    website at <a href=\"https:\/\/www.eff.org\" rel=\"nofollow\">https:\/\/www.eff.org<\/a>  <\/p>\n<p>    While there are limitations of HTTPS Everywhere when it comes    to your privacy, with the ISP being able to see what youre    connecting to, its still a valuable tool.  <\/p>\n<p>    If you use a site that doesn't have HTTPS by default, email    them and ask them to join the movement to encrypt the web.  <\/p>\n<p>    In the wake of    the privacy rules repeal, the advice to use a Virtual Private    Network (VPN) to protect your privacy has dominated the    conversation. However, while VPNs can be useful, they carry    their own unique privacy risk. When using a VPN, youre making    your Internet traffic pass through the VPN providers servers    before reaching your destination on the Internet. Your ISP will    see that youre connecting to a VPN provider, but wont be able    to see what youre ultimately connecting to. This is important    to understand because youre exposing your entire Internet    activity to the VPN provider and shifting your trust from the    ISP to the VPN.  <\/p>\n<p>    In other words, you should be damn sure you trust your VPN    provider to not do the shady things that you dont want your    ISP to do.  <\/p>\n<p>    VPNs can see, modify, and log your Internet traffic. Many VPN    providers make promises to not log your traffic and to take    other privacy protective measures, but it can be hard to verify    this independently since these services are built on closed    platforms. For example,     a recent study found that up to 38% of VPN apps available    for Android contained some form of malware or spyware.  <\/p>\n<p>    Below, we detail some factors that should be considered when    selecting a VPN provider. Keep in mind that these are    considerations for someone who is interested in preventing    their ISP from snooping on their Internet traffic, and not    meant for someone who is interested in protecting their    information from the governmenta whistleblower, for instance.    As with all things security and privacy-related, its important    to consider your threat    model.  <\/p>\n<p>        Does the VPN provider log your traffic? If yes, what kind        of information is logged? You should look for one that        explicitly promises to not log your Internet traffic and        how active the VPN provider is in advocating for user        privacy.      <\/p>\n<p>        Does the VPN provider use encryption in providing the        service? Its generally recommended to use services that        support a well-vetted open source protocol like OpenVPN or        IPSec. Utilizing these protocols ensures         best security available.      <\/p>\n<p>        If your VPN provider uses encryption, but has a single        shared password for all of the users, its not sufficient        encryption.      <\/p>\n<p>        Would using the VPN service still leak         your DNS queries to your ISP?      <\/p>\n<p>        Does the VPN support IPv6? As         the Internet transitions from IPv4 to the IPv6        protocol, some VPN providers may not support it.        Consequently, if your digital device is trying to reach a        destination that has an IPv6 address using a VPN connection        that only supports IPv4, the old protocol, it may attempt        to do so outside of the VPN connection. This can enable the        ISP to see what youre connecting to since the traffic        would be outside of the encrypted VPN traffic.      <\/p>\n<p>    Now that you know what to look for in a VPN provider, you can    use these    two     guides as your starting point for research. Though keep in    mind that a lot of the information in the guides is derived    from or given by the provider, so again, it requires us to    trust their assertions.  <\/p>\n<p>    If you are trying to protect your    privacy from your Internet company, Tor Browser perhaps offers    the most robust protection. Your ISP will only see that you are    connecting to the Tor network, and not your ultimate    destination, similar to VPNs.  <\/p>\n<p>    Keep in mind that with Tor, exit node operators can spy on your    ultimate destination in the same way a VPN can, but Tor does    attempt to hide your real IP address, which can improve    anonymity relative to a VPN.  <\/p>\n<p>    Users should be aware that some websites may not work in the    Tor browser because of the protections built in. Additionally,    maintaining privacy on Tor does require users to alter their browsing habits a little.    See this    for more information.  <\/p>\n<p>    Its a shame that our elected representatives decided to    prioritize corporate interests over our privacy rights. We    shouldnt have to take extraordinary steps to limit how our    personal information can be used, but that is clearly something    that we are all forced to do now. EFF will continue to advocate    for Internet users privacy and will work to fix this in the    future.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.eff.org\/deeplinks\/2017\/04\/heres-how-protect-your-privacy-your-internet-service-provider\" title=\"Here's How to Protect Your Privacy From Your Internet Service Provider - EFF\">Here's How to Protect Your Privacy From Your Internet Service Provider - EFF<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> We pay our monthly Internet bill to be able to access the Internet. We dont pay it to give our Internet service provider (ISP) a chance to collect and sell our private data to make more money <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/heres-how-to-protect-your-privacy-from-your-internet-service-provider-eff\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-186364","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/186364"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=186364"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/186364\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=186364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=186364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=186364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}