It’s a worthwhile exercise to download the data made available by Google and Facebook, if only to realize exactly what information is being kept.
Sophisticated targeted ads can sometimes seem creepy. Here I explore how a few techniques work, and one I can’t explain at all.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated, and unfortunately, serious.
Google will use your mobile phone number for verification if you lose access to your account. Some people don’t want to provide that information to Google.
While it’s not typically easy, your internet traffic can be monitored at or near your router. I’ll look at how this might be done.
Wherein we consider how much information we “give away” in our daily lives online.
There’s a lot of misinformation, and even paranoia, relating to keystroke logging and privacy. Much of it, however, is based on small kernels of truth.
We spend a lot of time on software-related issues, but malicious activities and privacy violations can happen via hardware as well.
Do you need a VPN? And if so, which one should you get?
In an apparent contradiction in terms, anything you post online is there forever… yet if you delete something, you also can’t get it back.
The biggest risk to your privacy is probably not what you think it is.
If you’re using an internet connection from a source you don’t trust, there are a few alternatives.
If your device is not physically secure, neither the machine nor your data is, either.
Everything you download adds risk. Be safer using my three guidelines.
Privacy is a complex and far reaching topic. One of the most basic and often overlooked players: the operating system on your device.
It may seem like privacy is a thing of the past. I believe we misunderstand privacy, and can control more than we think.
Many hotels offer both wired and wireless internet, but along with those hotel internet connections comes a security risk most folks don’t consider.
It’s not easy to give someone a laptop without giving them access to your personal accounts. Depending on intent and trust, there are steps you can take.
Many online cloud storage providers encrypt your data, but if needed, they can decrypt it themselves. BoxCryptor is a great solution to ensure that your online data remains private, regardless of how it’s stored.
Privacy on the internet means different things to different people. I discuss three different privacy applications out there, explain what exactly each does, and offer some of my own thoughts.
If you are secured behind your own router in your own home a VPN service is probably not necessary. Though there are a few scenarios where you may want to consider it.
When a hacker gets ahold of your computer they can do anything. Keeping them off is the best plan.
Once you are out of https pages you are out of encryption. But there is one good way to secure all your online activities.
Safety in your internet browsing depends on how secure you really need to be! So let’s take a look at what remembering a login really means.
Moving a file almost always leaves traces behind. So deleting any file securely is only the first step.
Although there’s no way to remove all traces of yourself from a machine, there certainly are things that you should do to remove as much as you can.
It can be pretty frightening when a search result delivers back to you the term you were searching for as an ad… particularly if you were searching for your name. But it might not be any more sinister than that.
There is very little about your computer that can be transmitted over a WiFi connection… provided you know how to keep yourself safe on the internet.
Sharing an email address may seem like a good idea, as long as you’ve considered all the ramifications.
Search engines have numerous (and quite amazing) ways to gather information on people and the way they search. It’s nothing to worry about unless you have some critical need for privacy.
Google can find your location through multiple datapoints that you probably don’t even realize you’re sharing. There’s a lively and important debate about how much data entities can and should collect and correlate.
When you take a picture, your camera saves “metadata”, or data about the picture. Geodata can be used to place an image in a geographical location.
Checking that all apps are doing it right is not feasible, but I set up a sniffer to verify that Gmail was using an https secure connection. The results?
Erasing your hard drive before you give it away is important. Exactly how thorough an erase you need depends on your data and level of paranoia.
Some ISPs are taking a more aggressive position to stop illegal file sharing. Your ISP can see a lot, including the fact that you are filesharing.