Difference between revisions of "Privacy Protection"
(→Passwords) |
(→Encryption) |
||
Line 116: | Line 116: | ||
==Encryption== | ==Encryption== | ||
<div class="mw-collapsible mw-collapsed" data-expandtext="more" > | <div class="mw-collapsible mw-collapsed" data-expandtext="more" > | ||
− | + | ||
− | |||
− | |||
===Disk Encryption=== | ===Disk Encryption=== | ||
− | |||
− | |||
...makes it complicated or impossible to read hard disks without authorization. | ...makes it complicated or impossible to read hard disks without authorization. | ||
Line 129: | Line 125: | ||
* In MacOS the standard program is FileVault. | * In MacOS the standard program is FileVault. | ||
* Open source solution: [https://veracrypt.codeplex.com/ VeraCript] | * Open source solution: [https://veracrypt.codeplex.com/ VeraCript] | ||
− | + | ||
− | |||
− | |||
===File Encryption=== | ===File Encryption=== | ||
− | |||
− | |||
* Again: [https://veracrypt.codeplex.com/ VeraCript] | * Again: [https://veracrypt.codeplex.com/ VeraCript] | ||
* For encryption of single files using [[Email Encryption | PGP-technology]]: [https://www.gnupg.org/ GnuPG] on Windows, Linux, MacOS | * For encryption of single files using [[Email Encryption | PGP-technology]]: [https://www.gnupg.org/ GnuPG] on Windows, Linux, MacOS | ||
− | |||
− | |||
− | |||
</div> | </div> | ||
Line 145: | Line 134: | ||
<hr class=boldline> | <hr class=boldline> | ||
+ | |||
==Lock & Screensaver== | ==Lock & Screensaver== | ||
<div class="mw-collapsible mw-collapsed" data-expandtext="more" > | <div class="mw-collapsible mw-collapsed" data-expandtext="more" > |
Revision as of 15:19, 30 September 2019
Contents
Books & Online Sources
Related:
B. Hocks
Travel Guide to the Digital World
Internet Policy and Governance for Human Rights Defenders
In times, where a lot of communication takes places electronically, we have to rethink our care for privacy. Currently most communication data might be stored and analized through those who are not the addressee. For maintaining privacy we need to use specific tools that make surveillance less possible or even impossible.
Beyond this defensive motivation there could be another reason for showing interest for technical tools for protection. Privacy means not only to defend ourselves against nosey pencil pushers. Through a privacy-aware attitude civil actors contributes to more quality of communication and shape spaces of confidentiality.
Introductions Into Privacy and Tracking
Security in a Box
Tactical Tech Collective gives an up-to-date overview over general aspects and tools for privacy protection.
OnlineMotherboard Guide to Not Getting Hacked
A comprehensive guide to digital security
DownloadMy shadow
Tactical Tech Collective's introduction into tracking technologies
OnlineBig Brother Awards
These negative awards give you an insight in the state of art of big data and surveillance.
OnlineDigitale Selbstverteidigung
Digital courage's German languaged privacy page
Online
General Data Protection Regulation (GDPR)
The European regulation is enforcing citizens' rights and therefore regulating the tasks of data collecting businesses and organizations (entities). It is not affecting private persons.
- A short introduction in the regulation and the tasks provided by European Commission
- For more background: Watch the documentary about the development of the regulation:
Videos
- Do Not Track: ARTE's videos introduce into the world of Big Data in German, English, French
Passwords
Principles & Criteria
- The longer your passwords the better.
- At least: One capital letter, one number, 6 letters
- No dictionary words and publicly available information about yourself
- Consider using a phrase
- Different passwords for different services
- Update them regularly
Password Manager
The best electronic tool does not help, when your password is written in an email that is saved in an online email account. Here it can easily be read out. Therefore passwords should better be stored in a more safe place in digital wallets. If you use them, you need only to know one password for accessing the database of such a software. And you might copy and paste them into a form without anibody seeing the password when looking over your shoulder.
- KeePass (Linux, Win)
- IcloudKeyChain (MacOS)
Check
Is your email part of one of the big leaks? Is your password unique or as well compromitted? These two tools help you to check:
Virtual Keyboards
...do you know from mobile devices as screen keyboards. These may help when you want to hide your keystrokes from programs logging secretely, which keys you press.
- Virtual Keyboards are on board in Linux, Win, MacOS
Encryption
Disk Encryption
...makes it complicated or impossible to read hard disks without authorization.
- Encryption may be activated in Android in the system settings.
- Standard software is included in Linux which allows you to activate encription during the installatlion process of your system.
- In some Windows versions you might chose Bitlocker as an encryption tool.
- In MacOS the standard program is FileVault.
- Open source solution: VeraCript
File Encryption
- Again: VeraCript
- For encryption of single files using PGP-technology: GnuPG on Windows, Linux, MacOS
Lock & Screensaver
When you use your computer in cafés and you are on the toilet, make sure that your device is saved from nosey neighbors. A screen saver password locks your computer when the screen saver is on. Or,
- when going to the toilet, use the lock command.
Surveillance Free Connections to the Internet
Between your computer and the internet will be established a connection. In cafés, Hotels, or in some public spaces you get it for free through Ethernet (internet cable) or WiFi. Please consider, that this is not confidential. The guy on the reception may even track your browser history if he uses the right programs. And if you do not visit a SSL secured website (starts with https://), as well the content of visited websites.
VPN is a tool that helps you to surf and email save in critical environments and countries with a strong surveillance policy. This technology builds an encrypted connection to a server in a trustful environment. Therefore you access the internet through this trustful server, not directly through your hotel WiFi.
- VPN clients are included in Linux and MacOS
- VPN server need to be set up, often you need to buy a license from one provider.
Browsing
SSL |
SSL holds back those who would like to read the content of the websites you visited by encrypting the content during the transport from server to client. In example, when you fill out an online form. Or for finding out, which news you received in your Inbox.
|
|
TOR |
TOR-Project provides browsers that hide your access data. For the servers, that you are addressing and the men in the middle between you and the website you are seen as someone else with a different IP address than your existing address. This technology works as well, when you have no VPN-connection but need to surf confidential.
|
|
Search |
|
|
Clear Surf History and Cookies |
Cookies are files left on your computer that track you. Unfortunately we need these for some things like webmailers or access to other webpages with a log in. But you might influence which kind of cookies might be accepted and when it will be deleted.
|
|
Block Tracking |
|
|
Saving Passwords in Browsers (not) |
|
Mobile Communication
Clouds |
|
Trustworthy apps on your mobile device |
Your mobile phone provider and network providers track you through account data, bill data, your personal SIM-number (IMSI), the number of your device (IMEI) and, if governments come into the game, as well more things (i.e. they block the access to your number during demonstrations). Additionally app programmers try to offer you apps for free, that have the only one reason - to spy. Or why does your pocket lamp app require access to your contacts? Depending from your surrounding and activity, you should take these technical feasabilities into account.
|
Messengers |
|
Text Collaboration |
|
General |
|
Providers |
We are not offering a completed list or promoting certain providers. However, these two could be worth considering due to their very strong privacy features:
|
PGP Encryption |
|