Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

[TIPS] Leave no trace: Tips to cover your digital footprint and reclaim your privacy

jughead3716 50

jughead3716

Alpha and Omega
Contributor
Access
Joined
Jun 28, 2014
Messages
5,120
Reaction score
11,325
Points
113
grants
₲128,617
11 years of service
Leave no trace: Tips to cover your digital footprint and reclaim your privacy

by Alex Castle, PCWorld

Privacy is at a premium. Whether its the NSA, a hacker cabal, or corporate marketers, someone is looking over your shoulder every time you use your PC.

You can minimize your exposure, though. Whether youd just like to keep your Web browsing under wraps or you want to obliterate all evidence of digital activities, follow these tips to stay on guard and off the grid.


Conceal your Internet activity

Covering your tracks on the Web starts with your browsers private browsing feature. Internet Explorer, Chrome, and Firefox each have this functionality, which prevents the browser from keeping a history of the pages you view. You can enable private browsing from the main menu-in Internet Explorer its called InPrivate Browsing, in Chrome its Incognito mode, and in Firefox its simply referred to as a Private Window.

5NUKXGq.png

Private browsing features, like Chromes Incognito mode, prevent Web browsers from recording your history.

Note that private browsing wont remove every trace of your Internet activities. Any files you save will remain. Private browsing also doesnt do anything to obscure your Web traffic from the servers side. Websites you visit will still have your IP address, and any unencrypted data you send is as susceptible to interception as it would be in a normal browser session.

A more covert option is to use private browsing in conjunction with Sandboxie, an application that prevents other programs from saving any data to your disk (including malware that might try to sneak in from the Internet).

Finally, theres Tor, a network that allows you to browse the internet completely anonymously. While youre running the Tor software, any outgoing or incoming network traffic is first bounced among many other computers that people have set up to act as nodes in the Tor network. Any sites you visit wont know your IP address (which can be used to find out where you live), and anyone listening in on your outgoing traffic (including your ISP) wont be able to tell what sites youre visiting.

AXiJU1f.png

Tor lets you browse the Web anonymously--and very slowly.

But while Tor may be the biggest weapon in the battle to protect your privacy, its certainly not the fastest. All that server-bouncing slows down your browsing considerably. Unless youre a dissident in a repressive regime, or someone else with a life-or-death need for Web anonymity, you may well find that Tor is more security than you actually need.


Put your data on the down low

The next step is to protect the personal data on your PC.

You should have unique user accounts with passwords set up for each person who uses your computer, including guests. (Windows guest accounts have lesser privileges.) By default, any file in the C:/Users directory (which includes My Documents, My Photos, and all related folders), is accessible only to the user account that created it. Its not airtight security, but it will reduce access to your files.

User accounts alone wont protect your private data from someone determined to get at it. To make your hard drive snoop-proof, you need to encrypt it. The easiest way to do this is with Bitlocker, the full-disk encryption built into the Ultimate and Enterprise editions of Windows 7 and Vista, as well as in the Pro and Enterprise versions of Windows 8. By default Bitlocker isnt enabled, but you can turn it on by going to Control Panel > System and Security > Bitlocker Drive Encryption. Encrypting your whole drive will make it completely inaccessible to anyone who doesnt have your Windows user password.

OHGsrQN.png

Eraser overwrites your data, making it iimpossible to recover.

If you dont have Bitlocker, you can still get free full-drive encryption with TrueCrypt, which secures your files with military-grade protection. Like Bitlocker, it can be used to encrypt your whole hard drive or just a subset of files. Files locked with TrueCrypt arent just inaccessible-theyre invisible to anyone who doesnt have the password for the containing volume.

Dont assume a deleted file is gone for good. Windows doesnt actually remove the data from your hard drive, it simply gets rid of the bit of your file system that points to the file. Even if you remember to empty your computers recycle bin, trashed data can frequently be recovered with software like Recuva. There are many utilities available to destroy a file. A program like Eraser, for instance, actually overwrites that data on your hard drive, ensuring that it can never be resurrected.



Corral clandestine activities to a private OS

Many privacy pitfalls boil down to the fact that Windows is a complicated operating system, and its difficult to keep track of all the nooks and crannies into which your data is being sorted. To eliminate evidence of your activities, the best option is to work in an operating system entirely separate from your regular one.

One easy way to do this is with virtualization. Using free software like VirtualBox, you can run a separate Windows or Linux computer in a window on your PC. Virtualization sets up a wall around the virtual computer, so nothing you do on the PC in VirtualBox can leave any files on your normal Windows file system. If youre really paranoid, you can even keep the VirtualBox data in a TrueCrypt volume, so that nobody but you can see it.

Finally, if nothing so far in this article is enough security for your needs, theres one last piece of software that provides absolute privacy. Its called Tails OS, and its for when you want to go deep undercover.

fkoADJN.png

Tails OS: privacy in your pocket

Tails OS is part of the Tor Project, which we discussed earlier. Its not a web browser like Tor itself, but rather an entire operating system devoted to privacy. You install Tails OS on a DVD or USB drive and run it on any computer you want. Everything needed to run Tails OS stays on the removable disk, and nothing gets written to the computers main drives. All data transmitted to and from the computer is filtered through the Tor network, so your browsing activity is completely untraceable, as well. Also, the operating system comes loaded with encryption and secure erase tools, as well as other privacy-oriented software. Think of it as your pocket privacy toolkit.


Stay stealthy

Following these tips is strong first step to reclaiming your privacy.




Source: PCWorld
Source Link: http://www.pcworld.com/article/2143846/leave-no-trace-tips-to-cover-your-digital-footprint-and-reclaim-your-privacy.html
 
PronL3G4CY 0

PronL3G4CY

Squaddie
Member
Access
Joined
Mar 19, 2015
Messages
372
Reaction score
200
Points
43
Age
124
grants
₲6,221
10 years of service
Wait.. kung ieencrpyt ko files ko kailangan ko pang idecrypt everytime to access them? :\
 
OP
jughead3716 50

jughead3716

Alpha and Omega
Contributor
Access
Joined
Jun 28, 2014
Messages
5,120
Reaction score
11,325
Points
113
grants
₲128,617
11 years of service
PronL3G4CY said:
Wait.. kung ieencrpyt ko files ko kailangan ko pang idecrypt everytime to access them? :\

baka sa backup files ka na lang mag encrypt..? o di kaya kapag active ang encryption software, ito na bahala na mag encrypt sa files mo at mag decrypt everytime na gagamitin mo ito...?

not sure kasi, hindi pa ako naka experience nitong encryption sa mga files ko eh..tsaka iba din ang encryption pagdating sa Linux na OS...
 
pinoyonline00 0

pinoyonline00

Squaddie
Member
Access
Joined
Aug 25, 2014
Messages
352
Reaction score
121
Points
28
grants
₲2,908
10 years of service
nice share sir jug.. salamat :yao:
mas naging aware na ako.. lol
 
OP
jughead3716 50

jughead3716

Alpha and Omega
Contributor
Access
Joined
Jun 28, 2014
Messages
5,120
Reaction score
11,325
Points
113
grants
₲128,617
11 years of service
pinoyonline00 said:
nice share sir jug.. salamat :yao:
mas naging aware na ako.. lol

youre welcome punkz...hehe... :cute:
 
D 0

django05

Transcendent
Member
Joined
Jul 25, 2015
Messages
14
Reaction score
0
Points
1
grants
₲223
9 years of service
Thanks for sharing.. laking tulong para sa mga newbie ng guide na to.
 
D 0

donclark10

Abecedarian
Member
Access
Joined
Jul 8, 2015
Messages
95
Reaction score
8
Points
8
grants
₲1,159
9 years of service
TOR the Onion Router...it works like the principle of routing...
 
OP
jughead3716 50

jughead3716

Alpha and Omega
Contributor
Access
Joined
Jun 28, 2014
Messages
5,120
Reaction score
11,325
Points
113
grants
₲128,617
11 years of service
django05 said:
Thanks for sharing.. laking tulong para sa mga newbie ng guide na to.

youre welcome punkz... :cute:

para ito sa mga lahat na hindi pa alam kung paano maging anonymous online...


donclark10 said:
TOR the Onion Router...it works like the principle of routing...

yup punkz...tama yan... :D
 
Top Bottom