How-tos

Digital Privacy — Pros, Cons, Tips and Tricks | by Papa Thought | Aug, 2023


Decisive needs require decisive measures. At the time our requirements for privacy and security were rather high, so we had to do a lot of research and learn new skills to be able to provide for our needs. A lot of time went into studying cyber security and getting into the details of how Android operation systems worked. Some programming and soldering had to be learned and practiced as well. All that just to have secure and untethered phones that couldn’t be tracked, cracked or linked to a physical identity.

Back then we used CopperheadOS (which is now called GrapheneOS) on Nexus 6 devices. The OS was chosen because of its open source nature and some features like being untethered from Google and Facebook as well as being able to block or accept accesses which are usually accepted by default.

The phones were good because they were accessible, cheap and easy to pick apart. So we were able to remove all cameras, microphones, GPS, GSM, LTE and other modules. Passwords were set to 48 symbols including capital letters, numbers and other symbols. No social media apps, no search engines linked to Google. Only specific open source apps for encrypted communication. No emails or any personal information whatsoever. Only emails in use were generated by temporary mail generators and the same was done for phone numbers. We even had portable WIFI routers which were used with temporary SIM cards that we topped up with cash.

Of course our security measures weren’t the best, but we did the best we would with the means we had at the time. And to be honest we managed pretty well for quite some time. Of course later on we got our hands on some other more advanced devices that aren’t available to the wider public, but there’s no need to get into those details.

And although at some point our finite journey came to an end. There was one last occasion that put subtle smirks on all of our faces. During our court sessions when the evidence was being shown. There were no mentions of the phones or the data that was on them. Later on we found out that the police forces were simply unable to access them unless those who were arrested submitted their passwords willingly. Yet even then the information was only one sided.

I find it funny when I see drug dealers post pictures with money, guns or drugs on Instagram. Or how some talk about changing SIM cards or iPhones every week. My favourite ones are those who do their deals on social media and say “I use vague terms so it’s okay.” All while they use those same devices to access their personal social media accounts or take photos that keep all the EXIF data.

One certain way to be in full control of your data is to stop producing it by going completely off grid. Yet for most of us that is an unrealistic solution. So instead lets talk about managing your data and privacy and how we can be more mindful of what information we’re willing to give away for digital commodities.

For beginners just understand that whatever you upload on the internet is nearly impossible to remove completely and rather hard to hide. Everything you do online leaves a digital footprint that’s linked to your device and accounts that are linked to your device. More apps and services you use, more data points and connections you create. Now most of them are harmless and only improve your online experience by optimising the content and user experience. Yet keep in mind that same data that is used to keep you entertained can be used to manipulate you.

Choose the platforms you want to be a part of wisely. If you’re going to spend a lot of time on it, take some time to read about it. Look up their terms of services, privacy policies and other documentations. If you’re able to, read about the back end of the platform if such information is available. Are you willing to give your information to that platform? Can that information be used against you later on?

If the service doesn’t require you to identify yourself, consider using a variation of your name or change something about it. Use incorrect birth date and other information. Unless it’s a well known and secure platform, don’t give it any bank details. Be mindful of what information the customer support can and can not ask from you. Validate that the URL is correct and the SSL Certificate is being used (HTTPS:// means SSL Certificate is applied). Watch out for phishing sites and other forms of scams.

By now apps and platforms are required to ask for your consent before accessing other apps or functions on the device. Don’t blindly grant access, but read about what you’re consenting to. If for example a calculator app is requesting access to your camera or messages, maybe something is slightly off about it.

Various platforms like Twitter allow you to turn off personalised ads. Although by disabling that function you will get random ads that may not be of any interest to you — you cut out a small portion of manipulation that is being bestowed upon you on daily basis.

You can do it globally or turn it off for specific apps. If an app doesn’t need your location to function — don’t give it access to it. Most apps collect that data by default when in reality they have no business knowing when and where their calculator app being used.

VPN is good for concealing your location and IP. If you want to hide your identity and location while searching for things online. Or you just don’t want to get targeted ads about coffee machines after you googled something about coffee. It’s also good for accessing location restricted content on Netflix.

There are more search engines than just Google, Bing, Yahoo and Yandex. There’s DuckDuckGo (which I would no longer vouch for) and there’s my favourite Brave Browser with its own search engine, ad block and other fun features like mining localised crypto by viewing specific ads. Oh and then there’s good old Tor Browser.

There’s a lot of different antivirus software that can be installed on computers as well as smartphones. It’s a good way to keep an eye out for malware, viruses and spyware that can be injected into your machine via links, files and other means.

If you’re reading this, you’re probably not a big cyber security geek. Therefore maybe it’s not the best idea for your probably insecure browser to have access to your passwords and card details.

As with sharing your personal information and bank details on the internet. Same goes for putting your personal life on display. Before you post something about yourself, your friends or relatives, take a moment to think. Should this information be shared online? Is there any way it could cause harm or discomfort later on? Maybe you shouldn’t post that picture where you’re posing with money or maybe don’t share the street you’re living on. Maybe your political views should remain private to you as well?

Yes updates may include internal features that may collect your data. But at least in this case you’re willingly giving it up for the service you’re using. On the other hand updates provide security improvements which protect you from external threats. Hackers can exploit old software, breach the security measures and access your data without your consent. And they most definitely will sell your information to people you won’t want to have it.

There are many weird apps and software that can be found on the internet. App Store and Google Play Store aren’t that safe either. Unless you really need the application, don’t install it. Even if you need it, look if it’s being updated often enough, read the reviews and do a couple Google searches to see if it has any negative articles about it or are there any alternatives to it. Sketchy software can be disguised as simple games or low quality utility apps. Without raising much suspicion, they may collect your data or interact with your device in ways you wouldn’t want it to.



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.