Articles in Category: Privacy
Erasing your hard drive before you give it away is important. Exactly how thorough an erase you need depends on your data and level of paranoia.
Many hotels offer both wired and wireless internet, but with those hotel internet connections comes a security risk most folks don’t consider.
We worry a lot about privacy, but our concerns are often misplaced. Fortunately, the biggest risk to our personal privacy is right under our nose.
Worried about privacy? I believe we over-imagine the risks and at the same time are our own worst enemies.
Granting location permission gives apps and web sites a more accurate idea of exactly where you are. The question is: do they need or do they abuse it?
Email addresses can be used to locate public information, which could allow someone to track your location from your email address. Use caution when sharing it with someone you don’t trust.
Realistically, it’s impossible to delete things from the internet. Yet in an apparent contradiction in terms, if you happen to delete something in your control, you also can’t get it back.
Using a computer at work puts you at their mercy. It’s technically possible your workplace could spy on all your activities.
Working from home can be convenient, or even a necessity. Does it open up your other online activity to scrutiny by your company?
Although there’s no way to remove all traces of yourself from a machine, there certainly are ways to remove as much as you can.
Connectivity is becoming an added “perk” in some housing situations. Make sure you know the risks and alternatives when someone else provides your internet connection.
Google will use your mobile phone number for verification if you lose access to your account. Some people don’t want to provide that information to Google.
When using a shared computer, it’s too easy for others to see your data or history. If you must use a shared computer, you need to protect yourself.
Your mobile provider is indeed your ISP when you use their data services, and that means they can see a lot of your activity.
While it’s not typically easy, your internet traffic can be monitored at or near your router. I’ll look at how this might be done.
As much as you might wish it otherwise, it’s just not practical to try and hide your computer activity from your employer.
Many online cloud storage providers encrypt your data — which means they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.
Email is a fairly insecure media. There are many things that can go wrong when email gets delivered, and protecting yourself can be difficult.
Websites can collect a fair amount of information about you. Let’s look at what every website sees.
A VM doesn’t get you any additional privacy from your ISP… although it might be a convenience as part of a more complete solution.
It’s a worthwhile exercise to download the data made available by Google and Facebook, if only to realize exactly what information is being kept.
Sophisticated targeted ads can sometimes seem creepy. Here I explore how a few techniques work, and one I can’t explain at all.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated, and unfortunately, serious.
Wherein we consider how much information we “give away” in our daily lives online.
There’s a lot of misinformation, and even paranoia, relating to keystroke logging and privacy. Much of it, however, is based on small kernels of truth.
We spend a lot of time on software-related issues, but malicious activities and privacy violations can happen via hardware as well.
VPNs protect from certain types of surveillance and more. I’ll discuss what they’re good for, and what to consider when selecting one.
If you’re using an internet connection from a source you don’t trust, there are a few alternatives.
If your device is not physically secure, neither the machine nor your data is, either.
Everything you download adds risk. Be safer using my three guidelines.
Privacy is a complex and far reaching topic. One of the most basic and often overlooked players: the operating system on your device.
It’s not easy to give someone a laptop without giving them access to your personal accounts. Depending on intent and trust, there are steps you can take.
Privacy on the internet means different things to different people. I discuss three different privacy applications out there, explain what exactly each does, and offer some of my own thoughts.
If you are secured behind your own router in your own home, a VPN service is probably not necessary … though there are a few scenarios where you may want to consider it.
When a hacker gets ahold of your computer they can do anything. Keeping them off is the best plan.
Once you are out of https pages you are out of encryption. But there is one good way to secure all your online activities.
Safety in your internet browsing depends on how secure you really need to be! So let’s take a look at what remembering a login really means.
Moving a file almost always leaves traces behind. So deleting any file securely is only the first step.
It can be pretty frightening when a search result delivers back to you the term you were searching for as an ad… particularly if you were searching for your name. But it might not be any more sinister than that.
There is very little about your computer that can be transmitted over a WiFi connection… provided you know how to keep yourself safe on the internet.
Sharing an email address may seem like a good idea, as long as you’ve considered all the ramifications.
Search engines have numerous (and quite amazing) ways to gather information on people and the way they search. It’s nothing to worry about unless you have some critical need for privacy.
Google can find your location through multiple datapoints that you probably don’t even realize you’re sharing. There’s a lively and important debate about how much data entities can and should collect and correlate.
When you take a picture, your camera saves “metadata”, or data about the picture. Geodata can be used to place an image in a geographical location.
Checking that all apps are doing it right is not feasible, but I set up a sniffer to verify that Gmail was using an https secure connection. The results?
Some ISPs are taking a more aggressive position to stop illegal file sharing. Your ISP can see a lot, including the fact that you are filesharing.