Liste Pour La Protection Des Données Ou Manuel De

Total Page:16

File Type:pdf, Size:1020Kb

Liste Pour La Protection Des Données Ou Manuel De Liste pour la protection des données ou Manuel de résistance au capitalisme de surveillance Valentin Delacour 2016 - 2021 Version du 08.06.21 Valentin Delacour Table des matières 1. Introduction p. 2 2. Règles d’or p. 3 3. Ordinateur pp. 4-5 3.1 Systèmes d’exploitation 4 3.2 Services et programmes 5 4. Smartphone pp. 6-9 4.1 Systèmes d’exploitation 6 4.2 Applications 7-8 4.3 F-Droid 9 5. Navigateurs p. 10 5.1 Firefox 10 5.2 Tor Browser 10 6. Instances de services pp. 11-12 6.1 Searx 11 6.2 Invidious 11 6.3 Visioconférence 11 6.4 Résolveurs DNS 12 7. Ressources additionnelles (sources partielles) pp. 13-14 8. Configurations pp. 15-28 8.1 Systèmes d’exploitation 15-16 8.2 Applications et programmes 16-17 8.3 Firefox 18-28 1 Version du 08.06.21 Valentin Delacour 1. Introduction Ce document a pour but principal de proposer des outils et alternatives pour protéger les données et la vie privée de la prédation des entreprises privées œuvrant dans le cadre du système actuel de capitalisme de surveillance. Toutefois, suivre les recom- mandations qui suivent permet également d’améliorer, dans une certaine mesure du moins, la protection contre d’autres entités intéressées par les données personnelles telles que des services d’États ou des pirates, par exemple. Cette liste est destinée à toute personne consciente ou prenant conscience des enjeux de la protection des données dans notre société, indépendamment de ses connais- sances du sujet. Elle ne se destine pas aux personnes nécessitant un anonymat total du fait de leur fonction à risques tels les opposants politiques ou certains journalistes, même si certaines options citées pourraient leur convenir. En effet, le respect de la vie privée n’équivaut pas nécessairement à l’anonymat. Le format de liste a été choisi afin de rendre sa consultation la plus efficace possible. Cette approche empêche de détailler de véritables explications. Vous êtes donc invités à chercher celles qui vous sont nécessaires par vous-mêmes ou dans les ressources additionnelles mentionnées au point 7 du document. Ayant pour but de proposer les options les plus réputées et pratiques sans être encombrée, la liste n’a pas pour voca- tion d’être exhaustive et demeure subjective bien que visant la plus grande objectivité possible. Cette liste propose une première hiérarchisation (ordre d’apparition et présence ou non de parenthèses) subjective basée sur le rapport confidentialité/facilité d’utilisation afin de vous aider à choisir parmi les différentes options citées. Une deuxième hiérar- chisation (couleurs) se base uniquement sur la confidentialité estimée : vert (véritable respect de la vie privée), bleu (respect de la vie privée sous conditions ou présence d’un élément problématique), rouge (ne garantit pas le respect de la vie privée mais reste préférable aux options des GAFAM) et incolore (manque d’éléments pour former une estimation pertinente). La présence d’un astérisque indique que l’option mention- née est encore en phase de développement. J’espère que ce document vous servira pour améliorer la protection de vos données personnelles et de celles de vos proches. Bien qu’étant le fruit de plusieurs années de recherches et d’expériences, ce travail demeure bien évidemment perfectible. Toute suggestion ou remarque est donc plus que bienvenue à l’adresse mail suivante : "[email protected]". Plusieurs mois après la présente version du document, certaines informations données seront obsolètes. Le document étant fréquemment actualisé, vous êtes invités à vous procurer la dernière version sur la page web : "https://codeberg.org/PrivacyFirst/Data_Protection/issues". 2 Version du 08.06.21 Valentin Delacour 2. Règles d’or - Toujours éviter d’utiliser les services et programmes des GAFAM (Google, Amazon, Facebook, Apple et Microsoft) lorsque c’est possible. Il est recommandé de supprimer vos éventuels comptes. - Toujours vérifier tous les paramètres et autorisations de ce que l’on utilise et les opti- miser afin de limiter au maximum la collecte de données personnelles. - Installer uniquement les programmes/applications nécessaires, ce sont autant d’ac- cès potentiels à vos données personnelles. - Utiliser des programmes libres/open source (leurs codes sont publics et donc véri- fiables) au lieu des propriétaires/closed source à chaque fois que c’est possible. - Privilégier les options libres populaires à celles méconnues (elles seront davantage vérifiées/fiables). - Si une entreprise propose ses services gratuitement, en général, le produit qu’elle vend c’est vous (vos données personnelles). À cause du modèle dicté par le capitalisme de surveillance, payer ne vous protège même plus d’être également le produit. - Mettre à jour ses programmes/systèmes d’exploitation régulièrement pour profiter des correctifs de failles de sécurité exploitables et penser à remplacer ceux qui ne pa- raissent plus être mis à jour. - Ne pas utiliser d’antivirus tiers qui sont de véritables aspirateurs à données person- nelles (à part ClamAV). Leur apport est négligeable avec de bonnes habitudes numé- riques. La prudence et une bonne configuration sont les meilleurs antivirus. - Privilégier les Web Apps, ou raccourcis depuis le navigateur, pour accéder aux ser- vices désirés au lieu d’applications à installer pour limiter l’accès et donc les possibili- tés de collecte de données personnelles. - Utiliser une adresse de courriel temporaire pour créer un compte pour les sites/ser- vices peu importants. - Toujours désactiver le Wi-Fi, le Bluetooth et la géolocalisation de son smartphone lor- qu’ils ne sont pas utilisés et ne pas se connecter aux Wi-Fi publics sans VPN. - Ne pas utiliser d’objets connectés (leur but est de récolter un maximum de données personnelles) ou ne pas les connecter à internet lorsqu’ils sont indispensables. 3 Version du 08.06.21 Valentin Delacour 3. Ordinateur 3.1 Systèmes d’exploitation Windows (cf. 8.1) est actuellement le pire système d’exploitation en termes de confi- dentialité. Les seuls OS faciles d’utilisation et respectant véritablement la vie privée sont des distributions libres (donc gratuites) de Linux. Il en existe une multitude dont les caractéristiques varient grandement. Voici une petite sélection de celles proposant la meilleure expérience pour l’utilisateur (toujours en respectant la vie privée) ou ga- rantissant la meilleure protection des données. Il faut savoir que chacune d’entre elles propose une ou plusieurs interfaces (environ- nements de bureau) différentes en termes d’expérience, de consommation de res- sources et d’apparence. Il existe une documentation abondante en ligne pour choisir quelle distribution et quel environnement de bureau conviendront le mieux aux capa- cités de votre ordinateur et à vos préférences ainsi que pour savoir comment l’installer facilement sur votre ordinateur. Desktop : Linux Mint : idéal pour les débutants MX Linux (cf. 8.1) : convient aux débutants (Solus) : convient aux débutants (Parrot) : sécurité renforcée et option d’anonymat par Tor (utilisateurs confirmés) ((Qubes OS)) : sécurité extrême (utilisateurs avancés) ((Whonix)) : anonymat par Tor et sécurité extrême (utilisateurs avancés) USB live (RAM) : MX Linux : convient aux débutants Tails : anonymat par Tor (utilisateurs confirmés) (Parrot) : sécurité renforcée et option d’anonymat par Tor (utilisateurs confirmés) Raspberry Pi : LibreELEC : centre multimédia pour TV Plasma BigScreen* : centre multimédia pour TV (commande vocale avec Mycroft AI) Raspberry Pi OS : système d’exploitation classique Batocera : émulateur de consoles, retrogaming (RetroPie) : émulateur de consoles, retrogaming 4 Version du 08.06.21 Valentin Delacour 3.2 Services et programmes Navigateur : Firefox(cf. 5.1), Tor Browser(cf. 5.2), (LibreWolf*(cf. 5.1), Brave), ((Ungoogled Chromium*, Iridium Browser)). Moteur de recherche : Qwant, DuckDuckGo, Searx(cf. 6.1), Swisscows, (Startpage(proxy Google)). Bureautique : LibreOffice, OnlyOffice, Collabora Office(LibreOffice prof.), (CryptPad). Courriel : Tutanota, Protonmail, CTemplar, Posteo. Plateforme vidéo : Odysee(LBRY), PeerTube. Proxy Youtube : Invidious(cf. 6.2), CloudTube, FreeTube(client Youtube)(cf. 8.2). Messagerie instantanée : Threema, Signal, Telegram, (Session*, Element, Jami*), ((Gajim(client XMPP))). Visioconférence : Jitsi Meet(cf. 6.3), Signal, BigBlueButton(cf. 6.3), Jami*, Element. Réseau social : Telegram, Mastodon, Movim, Lemmy, Friendica, PixelFed. Proxy de réseau social : Nitter(Twitter), Libreddit(Reddit), Bibliogram(Instagram). Traduction : LibreTranslate, DeepL, Apertium. Cartes : OpenStreetMap, Qwant Maps*, DuckDuckGo, (Maps.me). Partage de fichiers : upload.disroot.org, swisstransfer.com, OnionShare. Collaboration et organisation : CryptPad, Mobilizon. Gestionnaire de mots de passe : Bitwarden, KeePassXC. Lecteur multimédia : mpv, VLC. VPN : ProtonVPN, IVPN, (Mullvad, Windscribe). Cloud : Disroot(Nextcloud), Cozy Cloud, Nextcloud, Kdrive(Infomaniak). Courriel temporaire : temp-mail.org, guerrillamail.com, EmailOnDeck. Gestionnaire d’alias pour courriel : forwardemail.net Notes : Standard Notes, Joplin. Antivirus (ClamAV): ClamTK(Linux), ClamWin(Windows). Nettoyage et optimisation de système : Stacer, BleachBit. Traitement d’image et dessin : GIMP/Drawing, Krita, Darktable/RawTherapee. Dessin vectoriel : Inkscape Mise en page, édition (PAO) : Scribus Édition audio : Audacity, LMMS, Ardour. Édition vidéo : OpenShot, Kdenlive, (Avidemux, Pitivi, Cinelerra). Suppression de métadonnées : ExifCleaner Outil de chiffrement : VeraCrypt, Cryptomator. Moniteur de trafic
Recommended publications
  • An Investigation Into the Security and Privacy of Ios VPN Applications
    An Investigation Into the Security and Privacy of iOS VPN Applications Jack Wilson Division of Cybersecurity School of Design and Informatics Abertay University, Dundee A thesis submitted for the degree of Bachelor of Science with Honours in Ethical Hacking 1st May 2018 Word Count: 11,448 Abstract Due to the increasing number of recommendations for people to use VPN’s for privacy reasons, more app developers are creating VPN apps and publishing them on the Apple App Store and Google Play Store. In this ‘gold rush’, apps are being developed quickly and, in turn, not being developed with security fully in mind. This paper investigated a selection of free VPN applications available on the Apple App Store (for iOS devices) and test the apps for security and privacy. This includes testing for any traffic being transmitted over plain HTTP, DNS leakage and transmission of personally-identifiable information (such as phone number, IMEI 1, email address, MAC address) and evaluating the security of the tunnelling protocol used by the VPN. The testing methodology involved installing free VPN apps on a test device (an iPhone 6 running iOS 11), simulating network traffic for a pre-defined period of time and capturing the traffic (either through ARP spoofing, or through a proxy program such as Burpsuite). This allows for all traffic to be analysed to check for anything being sent without encryption. Other issues that often cause de-anonymisation with VPN applications such as DNS leakage can be tested using websites such as dnsleaktest.com. The research found several common security issues with the VPN applications that were tested, with a large majority of the applications tested failing to implement HTTPS.
    [Show full text]
  • Wireguard in Eduvpn Report
    WireGuard in eduVPN Report Nick Aquina SURF, Utrecht Fontys University of Applied Sciences, Eindhoven INTERNSHIP REPORT FONTYS UNIVERSITY OF APPLIED SCIENCES HBO-ICT Data student: Family name, initials: Aquina, N Student number: project period: (from – till) 31 August 2020 – 22 January 2021 Data company: Name company/institution: SURF Department: Team Security Address: Kantoren Hoog Overborch, 3511 EP Utrecht, Moreelsepark 48 Company tutor: Family name, initials: Spoor, R Position: (Tech) Product Manager University tutor: Family name, initials: Vos, A Final report: Title: WireGuard in eduVPN Date: 12 January 2021 Approved and signed by the company tutor: Date: 12 January 2021 Signature: Preface This report is written for my internship for Fontys. The internship was done at SURF for the eduVPN project. My task was to build a proof of concept in which WireGuard is integrated into eduVPN. This internship took place from September 2020 until January 2021. I would like to thank Arno Vos for his guidance and feedback throughout this internship. I would also like to thank Rogier Spoor for guiding me throughout this internship and inviting me to meetings which gave me a valuable insight into cyber security and technological issues facing members of SURF. And last, but not least, I would like to thank François Kooman for all technical support, advice and code reviews which helped improve the project. All blue text can be clicked to open a hyperlink. 1 Contents Preface . .1 Summary 4 Introduction 5 Free software . .5 The company (SURF) 6 Project 7 Context / Initial situation . .7 Project goal . .7 Assignment . .7 Constraints . .8 Development strategy .
    [Show full text]
  • PDF Or ODT Format, You Will Notice Plenty of ``` in Place of Double Quotes (“”)
    The Hitchhiker’s Guide to Online Anonymity (Or “How I learned to start worrying and love privacy anonymity”) Version 1.0.4, September 2021 by AnonymousPlanet. This guide is still a work in progress. While I am working constantly to correct issues, improve the content, general structure, and readability, it will probably never be “finished”. Some parts might lack information or contain inaccuracies. Your experience may vary. Remember to check regularly for an updated version of this guide. This guide is a non-profit open-source initiative, licensed under Creative Commons Attribution-NonCommercial 4.0 International (cc-by-nc-4.0 [Archive.org]). See the license at the end of the document. • For mirrors see Appendix A6: Mirrors • For help in comparing versions see Appendix A7: Comparing versions Feel free to submit issues using GitHub Issues at: https://github.com/AnonymousPlanet/thgtoa/issues Feel free to come to discuss ideas at: • GitHub Discussions: https://github.com/AnonymousPlanet/thgtoa/discussions • Matrix/Element: ```#anonymity:matrix.org``` https://matrix.to/#/#anonymity:matrix.org Follow me on: • Twitter at https://twitter.com/AnonyPla [Nitter] (cannot guarantee this account will stay up for long tho) • Mastodon at https://mastodon.social/@anonypla. To contact me, see the updated information on the website or send an e-mail to [email protected] Please consider donating if you enjoy the project and want to support the hosting fees (for the Tor hosting and the Tor Exit node). There are several ways you could read this guide: • You want to understand the current state of online privacy and anonymity not necessarily get too technical about it: Just read the Introduction, Requirements, Understanding some basics of how some information can lead back to you and how to mitigate those, and A final editorial note sections.
    [Show full text]
  • Pentest-Report IVPN Apps & Daemon 03.2021
    Dr.-Ing. Mario Heiderich, Cure53 Bielefelder Str. 14 D 10709 Berlin cure53.de · [email protected] Pentest-Report IVPN Apps & Daemon 03.2021 Cure53, Dr.-Ing. M. Heiderich, BSc. C. Kean, BSc. B. Walny, MSc. R. Peraglie, MSc. F. Fäßler Index Introduction Scope Identified Vulnerabilities IVP-03-007 WP4: Root privilege escalation via race condition (Critical) IVP-03-011 WP4: OpenVPN management interface injection (Medium) IVP-03-012 WP4: Firewall allows deanonymization for eavesdropper (Medium) IVP-03-013 WP4: Root privilege escalation via WireGuard (Critical) Miscellaneous Issues IVP-03-001 WP1: Lack of restricted segments for dylib code injection (Info) IVP-03-002 WP 4 : Buffer overflow and erroneous parsing in Wifi notifier (High) IVP-03-003 WP4: Buffer Out-Of-Bounds read in WiFi notifier (Low) IVP-03-004 WP4: Trivial bypass of allowedClients list on Linux (Medium) IVP-03-005 WP4: Invalid pointer conversion via unsafe package (Medium) IVP-03-006 WP1: Enabled NSURLCache logs login credentials (Low) IVP-03-008 WP1: Incomplete iOS filesystem protections (Low) IVP-03-009 WP2: Lack of FORTIFY_SOURCE for third-party shared objects (Info) IVP-03-010 False Alert : Unencrypted login credentials in local storage (Info) IVP-03-014 WP 4 : Potential CSRF allows stealing VPN credentials (Medium) Conclusions Cure53, Berlin · 03/03/21 1/16 Dr.-Ing. Mario Heiderich, Cure53 Bielefelder Str. 14 D 10709 Berlin cure53.de · [email protected] Introduction “What you do online can be tracked by organizations you may not know or trust and become part of a permanent record. A VPN can’t solve this on its own, but can prevent your ISP from being able to share or sell your data.” From https://www.ivpn.net/ This report describes the results of a security assessment targeting the IVPN complex.
    [Show full text]
  • OSINT Handbook September 2020
    OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 Aleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetis 2 Foreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Such arguments are not without merit. My fear, however, is that they are also shortsighted. I offer four reasons why. To begin, a shortlist betrays the widening spectrum of OSINT practice. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. A limited toolkit can never satisfy all of these constituencies. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Indeed, the right tool can determine whether you harvest the right information.
    [Show full text]
  • Vpn Access Request Email Sample
    Vpn Access Request Email Sample Crutched and sixteen Sauncho trivialise her monologue tedding or buddled whereabouts. Sometimes ironclad Hammad publicise her abjections puzzlingly, but agonic Dewitt quizzes bifariously or rots substitutively. Oldish Marvin cluck that coati-mondis drip musingly and grounds below. Belkin through a framework for ssl vpn to finish the confidentiality statements and hopefully implement a sample request vpn access email requests access streaming smug that you? Note had this error message the word dialout is a misspelling for the words dial out. Belkin through a sample letter and you need format was made. A bunk to pad a mail for VPN access request form from excel public Internet can represent some got the benefits of a sweeping area network WAN There's. Note that you and not when to seem this box if left only perform to remotely access her Exchange e-mail account Instead data may jog your. Remote Access Procedures VPN Dial-In and SecurID DIT. Configure a VPN On Demand Profile VMware Docs. How can i connect directly connects your email addresses are used for this problem? ONLINE FORM kit FOR VPN ACCESS OFFSITE Once completed please adopt and email a copy to servicedeskdcuoitca General Information. Vendor Remote will Request our Business Office Medical. How do i update their. Whether did're in whose office or inflame the missile a VPN is still school of furniture best ways to. How solemn I obtain certificates for VPN connections Site high Site. The Cisco AnyConnect VPN Client is only for importance on VA Government. Connecting to obtain Virtual school Network VPN Prince.
    [Show full text]
  • Dark Corners of the Internet a Survey of Tor Research [Archive.Org]
    The Hitchhiker’s Guide to Online Anonymity (Or “How I learned to start worrying and love privacy anonymity”) Version 1.0.4, September 2021 by AnonymousPlanet. This guide is still a work in progress. While I am working constantly to correct issues, improve the content, general structure, and readability, it will probably never be “finished”. Some parts might lack information or contain inaccuracies. Your experience may vary. Remember to check regularly for an updated version of this guide. This guide is a non-profit open-source initiative, licensed under Creative Commons Attribution-NonCommercial 4.0 International (cc-by-nc-4.0 [Archive.org]). See the license at the end of the document. • For mirrors see Appendix A6: Mirrors • For help in comparing versions see Appendix A7: Comparing versions Feel free to submit issues using GitHub Issues at: https://github.com/AnonymousPlanet/thgtoa/issues Feel free to come to discuss ideas at: • GitHub Discussions: https://github.com/AnonymousPlanet/thgtoa/discussions • Matrix/Element: ```#anonymity:matrix.org``` https://matrix.to/#/#anonymity:matrix.org Follow me on: • Twitter at https://twitter.com/AnonyPla [Nitter] (cannot guarantee this account will stay up for long tho) • Mastodon at https://mastodon.social/@anonypla. To contact me, see the updated information on the website or send an e-mail to [email protected] Please consider donating if you enjoy the project and want to support the hosting fees (for the Tor hosting and the Tor Exit node). There are several ways you could read this guide: • You want to understand the current state of online privacy and anonymity not necessarily get too technical about it: Just read the Introduction, Requirements, Understanding some basics of how some information can lead back to you and how to mitigate those, and A final editorial note sections.
    [Show full text]
  • Lista Para La Protección De Datos O Manual De Resistencia
    Lista para la protección de datos o Manual de resistencia al capitalismo de vigilancia Valentin Delacour 2016 - 2021 Versión del 20.05.21 Valentin Delacour Índice 1. Introducción p. 2 2. Reglas de oro p. 3 3. Computadora pp. 4-5 3.1 Sistemas operativos 4 3.2 Servicios y programas 5 4. Smartphone pp. 6-9 4.1 Sistemas operativos 6 4.2 Aplicaciones 7-8 4.3 F-Droid 9 5. Navegadores p. 10 5.1 Firefox 10 5.2 Tor Browser 10 6. Instancias de servicios pp. 11-12 6.1 Searx 11 6.2 Invidious 11 6.3 Videoconferencia 11 6.4 Servidores DNS 12 7. Recursos adicionales (fuentes parciales) pp. 13-14 8. Configuraciones pp. 15-28 8.1 Sistemas operativos 15-16 8.2 Aplicaciones y programas 16-17 8.3 Firefox 18-28 1 Versión del 20.05.21 Valentin Delacour 1. Introducción Este documento tiene como objetivo principal proponer herramientas y alternativas para proteger los datos y la privacidad de la predación de empresas privadas bajo el sistema actual de capitalismo de vigilancia. Ahora bien, seguir las siguientes recomendaciones permite también mejorar, en ciertas medidas, la protección contra otras entes tales como servicios de Estados o piratas, por ejemplo. Esta lista se destina a todas las personas conscientes o tomando consciencia de la importancia de la protección de datos en nuestra sociedad, independientemente de sus conocimientos del tema. No se destina a las personas necesitando un anonimato total de parte de su función a riesgos tales como opositores políticos o algunos periodistas, aún si algunas opciones propuestas podrían convenirles.
    [Show full text]
  • Security Now! #752 - 02-04-20 the Little Red Wagon
    Security Now! #752 - 02-04-20 The Little Red Wagon This week on Security Now! This week we examine the most recent flaw found in Intel's processors and what it means. We look at the continually moving target that is Windows 10, we consider the Free Software Foundation's suggestion that Microsoft open-source Windows 7 and the fact last months was apparently NOT the last update of Windows 7 for all non-ESU users. We look at the evolution of exploitation of the Remote Desktop Gateway flaw, Google's record breaking vulnerability bounty payouts, the return of Roskomnadzor, the size of fines, the question of who owns our biometrics, an update on AVAST/AVG spying, the future of 3rd-party A/V, a major milestone for the WireGuard VPN, and the wonderful little red wagon hack of the decade which titled this podcast. Security News L1D Eviction Sampling becomes “CacheOut” So, Leo, last week at the beginning of the podcast you noted that news of another attack against Intel chips had surfaced. Since it bore the academic name “L1S Eviction Sampling” where “L1” would refer to the Level1 cache and “eviction” is the term used by caching systems when they must remove the typically least recently used (LRU) data to make room for new data to be cached. So from the name it sounded as though it must have been an attack that arranges to leverage the fact that the presence of caching would subtly and measurably alter the timing of cache-dependent code in such a way that sufficiently clever researchers could determine what had been evicted, and arrange to use that information to exfiltrate data across the processor's security boundaries.
    [Show full text]
  • 00049-129158.Pdf (3.25
    RATINGS Gas & Electric Ranges Family Sedans SUVs Coffee Makers & Coffee Nut Butters SMARTER CHOICES FOR A BETTER WORLD How to Protect Your Privacy Smart and easy ways to keep your data safe PLUS Top-Rated The End of Cash? Chain Restaurants The good, Including notable the bad, and newcomers the risks NOVEMBER 2016 CR.ORG Contents NOVEMBER 2016, VOL. 81 NO. 11 66 Ways to Protect Your Privacy Right Now There’s plenty you can do to prevent hackers and crafty companies from capturing your data. We bring you easy, effective solutions, as well as reporter Julia Angwin’ s essay on how she got started on her own data-protection journey. P. 24 38 Where America Eats 48 Cashing Out 54 What’s Cooking in Ranges Our biggest-ever subscriber survey Digital payment technologies are Thanks to a wave of new styles about restaurant chains dishes up which making life tough for legal tender. and features, you have a wealth of hot ones hit the spot—and highlights some Our examination of our increasingly new options when it comes to your tasty new trends. RATINGS cashless society investigates the kitchen’s key appliance. RATINGS conveniences as well as the risks. ILLUSTRATION: MICHAEL BRANDON MYERS MYERS BRANDON MICHAEL ILLUSTRATION: COVER ILLUSTRATION BY ROB DOBI NOVEMBER 2016 CONSUMERREPORTS.ORG 3 Contents IN EVERY ISSUE INSIGHTS 5 From the President: 20 Your Health The Evolution of Is Priceless Consumer Reports But health insurance is To serve you better, we expensive. During open- introduce a clearer, crisper enrollment season, we offer Consumer Reports while up a streamlined guide to also preserving our bedrock picking a plan that saves principles.
    [Show full text]
  • Vpn Download for Pc
    1 / 2 Vpn Download For Pc Apr 28, 2021 — Install the GlobalProtect Setup Wizard. This installation is performed on a Windows 10 - 64 bit computer. 1. After double-clicking on .... Jun 29, 2021 — Best FREE Unlimited VPN Download for PC & Laptop · 1) NordVPN · 2) ExpressVPN · 3) CyberGhost · 4) IPVanish · 5) Surfshark · 6) Unlocator · 7) .... Download ProtonVPN for your device · How to use the ProtonVPN Windows app · Security made easy · Why use ProtonVPN? · Secure your internet · Why choose the .... But no of the self-governing VPNs we've tested have some kind of limitation. Download Comodo free antivirus cleaner for PC to quick virus scan and instant .... Download best VPN for PC. Optimized for Windows 10, 8, and 7. One click to connect, protect in public hotspot Wi-Fi. IPVanish VPN setup for Windows. Easy free software download of the best VPN network with the fastest speeds.. Download ZoogVPN Windows client software to connect within seconds to VPN locations worldwide. The Windows VPN client comes with many great features .... How to set up a VPN on Windows 10, Windows 8, & Windows 7? Download and install a VPN for PC; Create an account (try it risk-free with a 30-day .... To download our Windows VPN app, press the download button below. Download. 3. Use the Encrypt.me Windows VPN app when you connect to an untrusted .... You'll be able to download our Windows VPN for free and help us make it even better! What's to come: remote servers all around the world, unlimited Internet .... VPN for Windows PC with multiple protocols.
    [Show full text]
  • Client-Side Vulnerabilities in Commercial Vpns
    Client-side Vulnerabilities in Commercial VPNs Thanh Bui Siddharth Prakash Rao [email protected] [email protected] Department of Computer Science Department of Computer Science Aalto Univeristy, Finland Aalto Univeristy, Finland Markku Antikainen Tuomas Aura [email protected] [email protected] Department of Computer Science Department of Computer Science Aalto Univeristy, Finland Aalto Univeristy, Finland ABSTRACT network and, second, the destination server does not learn the real Internet users increasingly rely on commercial virtual private net- IP address of the client. There are quite a few VPN protocols that work (VPN) services to protect their security and privacy. The VPN can be used to establish the tunnel (e.g. PPTP, SSTP, OpenVPN), and services route the client’s traffic over an encrypted tunnel to aVPN the commercial VPN providers usually support several of them. The gateway in the cloud. Thus, they hide the client’s real IP address commercial VPN providers also provide native client applications from online services, and they also shield the user’s connections with graphical user interfaces, which allow the user to select the from perceived threats in the access networks. In this paper, we protocol and server and set up the VPN connection accordingly. For study the security of such commercial VPN services. The focus is more technically savvy users who prefer not to install the provided on how the client applications set up VPN tunnels, and how the application, the VPN service providers usually give instructions for service providers instruct users to configure generic client soft- configuring the built-in VPN client in the user’s operating system ware.
    [Show full text]