- Joined
- Jun 28, 2014
- Messages
- 5,120
- Reaction score
- 11,325
- Points
- 113
- grants
- ₲128,617
11 years of service
Leave no trace: Tips to cover your digital footprint and reclaim your privacy
by Alex Castle, PCWorld
Privacy is at a premium. Whether its the NSA, a hacker cabal, or corporate marketers, someone is looking over your shoulder every time you use your PC.
You can minimize your exposure, though. Whether youd just like to keep your Web browsing under wraps or you want to obliterate all evidence of digital activities, follow these tips to stay on guard and off the grid.
Conceal your Internet activity
Covering your tracks on the Web starts with your browsers private browsing feature. Internet Explorer, Chrome, and Firefox each have this functionality, which prevents the browser from keeping a history of the pages you view. You can enable private browsing from the main menu-in Internet Explorer its called InPrivate Browsing, in Chrome its Incognito mode, and in Firefox its simply referred to as a Private Window.
Private browsing features, like Chromes Incognito mode, prevent Web browsers from recording your history.
Note that private browsing wont remove every trace of your Internet activities. Any files you save will remain. Private browsing also doesnt do anything to obscure your Web traffic from the servers side. Websites you visit will still have your IP address, and any unencrypted data you send is as susceptible to interception as it would be in a normal browser session.
A more covert option is to use private browsing in conjunction with Sandboxie, an application that prevents other programs from saving any data to your disk (including malware that might try to sneak in from the Internet).
Finally, theres Tor, a network that allows you to browse the internet completely anonymously. While youre running the Tor software, any outgoing or incoming network traffic is first bounced among many other computers that people have set up to act as nodes in the Tor network. Any sites you visit wont know your IP address (which can be used to find out where you live), and anyone listening in on your outgoing traffic (including your ISP) wont be able to tell what sites youre visiting.
Tor lets you browse the Web anonymously--and very slowly.
But while Tor may be the biggest weapon in the battle to protect your privacy, its certainly not the fastest. All that server-bouncing slows down your browsing considerably. Unless youre a dissident in a repressive regime, or someone else with a life-or-death need for Web anonymity, you may well find that Tor is more security than you actually need.
Put your data on the down low
The next step is to protect the personal data on your PC.
You should have unique user accounts with passwords set up for each person who uses your computer, including guests. (Windows guest accounts have lesser privileges.) By default, any file in the C:/Users directory (which includes My Documents, My Photos, and all related folders), is accessible only to the user account that created it. Its not airtight security, but it will reduce access to your files.
User accounts alone wont protect your private data from someone determined to get at it. To make your hard drive snoop-proof, you need to encrypt it. The easiest way to do this is with Bitlocker, the full-disk encryption built into the Ultimate and Enterprise editions of Windows 7 and Vista, as well as in the Pro and Enterprise versions of Windows 8. By default Bitlocker isnt enabled, but you can turn it on by going to Control Panel > System and Security > Bitlocker Drive Encryption. Encrypting your whole drive will make it completely inaccessible to anyone who doesnt have your Windows user password.
Eraser overwrites your data, making it iimpossible to recover.
If you dont have Bitlocker, you can still get free full-drive encryption with TrueCrypt, which secures your files with military-grade protection. Like Bitlocker, it can be used to encrypt your whole hard drive or just a subset of files. Files locked with TrueCrypt arent just inaccessible-theyre invisible to anyone who doesnt have the password for the containing volume.
Dont assume a deleted file is gone for good. Windows doesnt actually remove the data from your hard drive, it simply gets rid of the bit of your file system that points to the file. Even if you remember to empty your computers recycle bin, trashed data can frequently be recovered with software like Recuva. There are many utilities available to destroy a file. A program like Eraser, for instance, actually overwrites that data on your hard drive, ensuring that it can never be resurrected.
Corral clandestine activities to a private OS
Many privacy pitfalls boil down to the fact that Windows is a complicated operating system, and its difficult to keep track of all the nooks and crannies into which your data is being sorted. To eliminate evidence of your activities, the best option is to work in an operating system entirely separate from your regular one.
One easy way to do this is with virtualization. Using free software like VirtualBox, you can run a separate Windows or Linux computer in a window on your PC. Virtualization sets up a wall around the virtual computer, so nothing you do on the PC in VirtualBox can leave any files on your normal Windows file system. If youre really paranoid, you can even keep the VirtualBox data in a TrueCrypt volume, so that nobody but you can see it.
Finally, if nothing so far in this article is enough security for your needs, theres one last piece of software that provides absolute privacy. Its called Tails OS, and its for when you want to go deep undercover.
Tails OS: privacy in your pocket
Tails OS is part of the Tor Project, which we discussed earlier. Its not a web browser like Tor itself, but rather an entire operating system devoted to privacy. You install Tails OS on a DVD or USB drive and run it on any computer you want. Everything needed to run Tails OS stays on the removable disk, and nothing gets written to the computers main drives. All data transmitted to and from the computer is filtered through the Tor network, so your browsing activity is completely untraceable, as well. Also, the operating system comes loaded with encryption and secure erase tools, as well as other privacy-oriented software. Think of it as your pocket privacy toolkit.
Stay stealthy
Following these tips is strong first step to reclaiming your privacy.
Source: PCWorld
Source Link: http://www.pcworld.com/article/2143846/leave-no-trace-tips-to-cover-your-digital-footprint-and-reclaim-your-privacy.html
by Alex Castle, PCWorld
Privacy is at a premium. Whether its the NSA, a hacker cabal, or corporate marketers, someone is looking over your shoulder every time you use your PC.
You can minimize your exposure, though. Whether youd just like to keep your Web browsing under wraps or you want to obliterate all evidence of digital activities, follow these tips to stay on guard and off the grid.
Conceal your Internet activity
Covering your tracks on the Web starts with your browsers private browsing feature. Internet Explorer, Chrome, and Firefox each have this functionality, which prevents the browser from keeping a history of the pages you view. You can enable private browsing from the main menu-in Internet Explorer its called InPrivate Browsing, in Chrome its Incognito mode, and in Firefox its simply referred to as a Private Window.
Private browsing features, like Chromes Incognito mode, prevent Web browsers from recording your history.
Note that private browsing wont remove every trace of your Internet activities. Any files you save will remain. Private browsing also doesnt do anything to obscure your Web traffic from the servers side. Websites you visit will still have your IP address, and any unencrypted data you send is as susceptible to interception as it would be in a normal browser session.
A more covert option is to use private browsing in conjunction with Sandboxie, an application that prevents other programs from saving any data to your disk (including malware that might try to sneak in from the Internet).
Finally, theres Tor, a network that allows you to browse the internet completely anonymously. While youre running the Tor software, any outgoing or incoming network traffic is first bounced among many other computers that people have set up to act as nodes in the Tor network. Any sites you visit wont know your IP address (which can be used to find out where you live), and anyone listening in on your outgoing traffic (including your ISP) wont be able to tell what sites youre visiting.
Tor lets you browse the Web anonymously--and very slowly.
But while Tor may be the biggest weapon in the battle to protect your privacy, its certainly not the fastest. All that server-bouncing slows down your browsing considerably. Unless youre a dissident in a repressive regime, or someone else with a life-or-death need for Web anonymity, you may well find that Tor is more security than you actually need.
Put your data on the down low
The next step is to protect the personal data on your PC.
You should have unique user accounts with passwords set up for each person who uses your computer, including guests. (Windows guest accounts have lesser privileges.) By default, any file in the C:/Users directory (which includes My Documents, My Photos, and all related folders), is accessible only to the user account that created it. Its not airtight security, but it will reduce access to your files.
User accounts alone wont protect your private data from someone determined to get at it. To make your hard drive snoop-proof, you need to encrypt it. The easiest way to do this is with Bitlocker, the full-disk encryption built into the Ultimate and Enterprise editions of Windows 7 and Vista, as well as in the Pro and Enterprise versions of Windows 8. By default Bitlocker isnt enabled, but you can turn it on by going to Control Panel > System and Security > Bitlocker Drive Encryption. Encrypting your whole drive will make it completely inaccessible to anyone who doesnt have your Windows user password.
Eraser overwrites your data, making it iimpossible to recover.
If you dont have Bitlocker, you can still get free full-drive encryption with TrueCrypt, which secures your files with military-grade protection. Like Bitlocker, it can be used to encrypt your whole hard drive or just a subset of files. Files locked with TrueCrypt arent just inaccessible-theyre invisible to anyone who doesnt have the password for the containing volume.
Dont assume a deleted file is gone for good. Windows doesnt actually remove the data from your hard drive, it simply gets rid of the bit of your file system that points to the file. Even if you remember to empty your computers recycle bin, trashed data can frequently be recovered with software like Recuva. There are many utilities available to destroy a file. A program like Eraser, for instance, actually overwrites that data on your hard drive, ensuring that it can never be resurrected.
Corral clandestine activities to a private OS
Many privacy pitfalls boil down to the fact that Windows is a complicated operating system, and its difficult to keep track of all the nooks and crannies into which your data is being sorted. To eliminate evidence of your activities, the best option is to work in an operating system entirely separate from your regular one.
One easy way to do this is with virtualization. Using free software like VirtualBox, you can run a separate Windows or Linux computer in a window on your PC. Virtualization sets up a wall around the virtual computer, so nothing you do on the PC in VirtualBox can leave any files on your normal Windows file system. If youre really paranoid, you can even keep the VirtualBox data in a TrueCrypt volume, so that nobody but you can see it.
Finally, if nothing so far in this article is enough security for your needs, theres one last piece of software that provides absolute privacy. Its called Tails OS, and its for when you want to go deep undercover.
Tails OS: privacy in your pocket
Tails OS is part of the Tor Project, which we discussed earlier. Its not a web browser like Tor itself, but rather an entire operating system devoted to privacy. You install Tails OS on a DVD or USB drive and run it on any computer you want. Everything needed to run Tails OS stays on the removable disk, and nothing gets written to the computers main drives. All data transmitted to and from the computer is filtered through the Tor network, so your browsing activity is completely untraceable, as well. Also, the operating system comes loaded with encryption and secure erase tools, as well as other privacy-oriented software. Think of it as your pocket privacy toolkit.
Stay stealthy
Following these tips is strong first step to reclaiming your privacy.
Source: PCWorld
Source Link: http://www.pcworld.com/article/2143846/leave-no-trace-tips-to-cover-your-digital-footprint-and-reclaim-your-privacy.html