Take Control of Your Online Privacy

Take Control of Your Online Privacy

EBOOK EXTRAS: v1.1 Downloads, Updates, Feedback TAKE CONTROL OF YOUR ONLINE PRIVACY by JOE KISSELL $10 Thank You, AgileBits This book is a gift from AgileBits, the company behind 1Password. One of the essential steps to keeping your personal information private is choosing passwords that are long, random, and different for every site and service you use. 1Password makes this process simple, and it has been my favorite password manager for many years. —Joe Kissell 2 From Dave at AgileBits To all our amazing customers. We wouldn’t be here without you. Thank you for enabling us to work at our dream jobs. —Dave Teare 3 Table of Contents Read Me First .............................................................. 7 Updates and More .......................................................... 7 Basics ......................................................................... 8 What’s New in Version 1.1 ............................................... 8 Introduction .............................................................. 10 Online Privacy Quick Start ......................................... 13 Learn What You Have to Hide .................................... 15 Things You Might Want to Keep Private ............................. 15 Personally Identifiable Information ................................... 18 Learn Who Wants Your Private Data (and Why) ....... 20 Advertisers ................................................................. 20 Local Villains ............................................................... 24 Hackers ..................................................................... 24 Big Media ................................................................... 25 Big Money .................................................................. 26 Big Data ..................................................................... 26 Big Brother ................................................................. 27 What about Privacy Policies? ........................................... 28 Develop a Privacy Strategy ....................................... 30 Fix the Easy Things ...................................................... 30 Create Privacy Rules for Yourself ..................................... 32 Cope with Special Cases ................................................ 33 Take the Pledge ........................................................... 34 Keep Your Internet Connection Private ..................... 37 Understand the Privacy Risks of Your Internet Connection ..... 37 Prevent Snooping ......................................................... 40 Turn Off Unnecessary Services ........................................ 51 4 Use a Firewall .............................................................. 54 Use an Outbound Firewall .............................................. 56 Browse the Web Privately ......................................... 58 Understand the Privacy Risks of Web Browsing ................... 58 Go to the Right Site ...................................................... 63 Browse Securely .......................................................... 64 Manage Local Storage of Private Data ............................... 65 Protect Passwords and Credit Card Info ............................ 75 Search Privately ........................................................... 77 Browse Anonymously .................................................... 77 Shop Online Privately .................................................... 81 Improve Email Privacy .............................................. 83 Understand the Privacy Risks of Email .............................. 84 Reduce Email Privacy Risks ............................................ 87 Encrypt Your Email ....................................................... 93 Send and Receive Email Anonymously .............................. 96 Use Email Alternatives ................................................... 97 Talk and Chat Privately ............................................. 99 Understand the Privacy Risks of Real-Time Communication .. 100 Improve Your Real-Time Communication Privacy ............... 101 Keep Social Media Sort of Private-ish ...................... 103 Understand the Privacy Risks of Social Media .................... 103 Check Your Privacy Settings .......................................... 105 Use Other Social Media Precautions ................................ 106 Share Files Privately ............................................... 109 Understand the Privacy Risks of File Sharing .................... 109 Encrypt Transfers, Files, or Both .................................... 110 Use Peer-to-Peer File Sharing ........................................ 113 Create a Personal Cloud ............................................... 115 Maintain Privacy for Your Kids ................................ 117 5 Teach This Book ...................................................... 120 About This Book ...................................................... 121 Ebook Extras ............................................................. 121 About the Author ........................................................ 122 About the Publisher ..................................................... 123 Copyright and Fine Print ......................................... 124 Featured Titles ........................................................ 125 6 Read Me First Welcome to Take Control of Your Online Privacy, version 1.1, published in March 2014 by TidBITS Publishing Inc. This book was written by Joe Kissell and edited by Geoff Duncan. This book explains potential privacy risks in everyday online activities like Web browsing and sending email, and suggests strategies for avoiding common pitfalls and improving online privacy. If you want to share this ebook with a friend, we ask that you do so as you would with a physical book: “lend” it for a quick look, but ask your friend to buy a copy for careful reading or reference. Also, you can Teach This Book. Copyright © 2014, alt concepts inc. All rights reserved. Updates and More You can access extras related to this book on the Web (use the link in Ebook Extras, near the end; it’s available only to purchasers). On the ebook’s Take Control Extras page, you can: • Download any available new version of the ebook for free, or buy any subsequent edition at a discount. • Download various formats, including PDF, EPUB, and Mobipocket. (Learn about reading on mobile devices on our Device Advice page.) • Read the ebook’s blog. You may find new tips or information, links to author interviews, and update plans for the ebook. If you bought this ebook from the Take Control Web site, it has been added to your account, where you can download it in other formats and access any future updates. However, if you bought this ebook elsewhere, you can add it to your account manually; see Ebook Extras. 7 Basics Here are a few “rules of the road” that will help you read this book: • Links: All blue text in this ebook is hot, meaning you can click (or tap) it, just like a link on the Web. If you click a link that takes you to a different part of the ebook, you can return quickly to where you were if your ebook reader offers a “back” feature. For example, if you use iBooks to read the EPUB version of this ebook, you can click the “Back to” link at the lower left. Or, if you use Preview on the Mac to read the PDF version of this ebook, you can choose Go > Back or press Command-[. • Menus: Where I describe choosing a command from a menu in the menu bar, I use an abbreviated description. For example, the abbreviated description for the menu command that creates a new folder in the Finder is “File > New Folder.” • Mobile devices: In this book I distinguish between conventional (desktop or laptop) computers and mobile devices, by which I mean smartphones, tablets, e-readers, and other handheld computer-like devices. The iPhone, iPad, iPod touch, Kindle, and BlackBerry (among many others) would all be considered mobile devices. What’s New in Version 1.1 Version 1.1 of this book, released about eight months after the original publication date, updates the book with the latest privacy-related information and adds numerous details. The most significant changes are as follows: • Added a note in Hackers about how to search for information on recent privacy breaches. • Included a tip in Big Brother with links to resources detailing government surveillance revelations. 8 • Updated Fix the Easy Things to emphasize the importance of keeping one’s operating systems up to date with security fixes. • Replaced numerous graphics (see, for example, Encrypt Your Wi-Fi Connection) with spiffier versions. • Made several clarifications about speed and reliability in Use a VPN. • Added a sidebar, SSL Implementation Bugs, covering the serious SSL vulnerability Apple disclosed and fixed in February 2014. • Updated the sidebar Set-top Boxes and the Like to further discuss the Internet of Things (“smart” connected objects like light bulbs and thermostats). • Mentioned how a password manager can ensure that you Go to the Right Site. • Noted the improved Private Browsing option in Safari for iOS 7 in Private Browsing Modes. • Included information on iCloud Keychain in Protect Passwords and Credit Card Info. • In Browse Anonymously, added a note distinguishing between anonymity and untraceability, and mentioned a further Tor vulnerability. • Mentioned cryptocurrencies such as Bitcoin in Shop Online Privately. • In Understand the Privacy Risks of Real-Time Communication,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    125 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us