Articles tagged: privacy
Something many people do every day may expose their location in ways they don’t know.
Google uses your mobile number for verification if you lose access to your account. Some people don’t want to provide it. They should.
Incognito, Private, or In Private modes protect your privacy to a point. It’s critical to know where that point is.
There are legitimate reasons for not wanting to give your phone number to an email service. Let’s look at alternatives.
When you leave a service, or if your information is stolen from that service, there may be steps you need to take.
Trust is tricky when it comes to computers. When you add relationships to the mix, things quickly get complicated.
Sharing posts you find on Facebook often results in an “unavailable” message. That’s Facebook respecting privacy settings.
“The right to be forgotten” is a misleading and ineffectual technique to prevent people from finding information on the internet. Bottom line: it can’t work.
When using your company’s machine and/or network, it’s safe to assume that your boss or IT department can see your emails, instant messages, and everything else.
Tracing the privacy and security of the path from your fingertips through the services you use to your information’s final destination.
Deleting your Facebook account requires some preparation, including understanding exactly what you’ll lose.
Facebook can use standard web protocols to get an idea of what you’re doing online, even if you don’t have an account.
Erasing your hard drive before you give it away is important. Exactly how thorough an erase you need depends on your data and level of paranoia.
Windows 10 privacy seems to be somewhat of an oxymoron, at least based on reputation. I’ll review the choices you can make at setup to retain some control.
You can and should be aware of and control your Facebook privacy settings.
We worry a lot about privacy, but our concerns are often misplaced. Fortunately, the biggest risk to our personal privacy is right under our nose.
Worried about privacy? I believe we over-imagine the risks and at the same time are our own worst enemies.
Working from home can be convenient, or even a necessity. Does it open up your other online activity to scrutiny by your company?
A VPN, or Virtual Private Network, is a fully encrypted, private internet connection via a VPN provider. I’ll look at what protection it offers.
Open WiFi hotspot downloads are available for the internet cafe owner to see. Whether or not they take the time to do it is another story!
Although there’s no way to remove all traces of yourself from a machine, there certainly are ways to remove as much as you can.
Anonymity on the internet is really, really hard. Some of the practices we might use to stay anonymous could still be leaking identifiable, traceable information.
Skype calls recorded by Skype? Possible, but until recently, highly unlikely. However, there’s a much scarier scenario that no technology can prevent.
When using a shared computer, it’s too easy for others to see your data or history. If you must use a shared computer, you need to protect yourself.
So-called “supercookies” and “evercookies” track the websites you visit even if you regularly disable or flush normal cookies.
The most common question related to Windows 10 seems to be “Should I upgrade?” I’ll cover my recommendations.
We’ll look at how to review and adjust privacy settings in several areas of Win10.
Windows 10 has been criticised for encroaching on users privacy. Is it an issue? Is Microsoft being evil? Or is it something else?
Web browsers like Google Chrome try to be helpful by recognizing commonly used forms and fields and remembering previously entered information for you. It’s no conspiracy, but it can seem spooky.
Facebook did some testing. It’s made some people upset. What’s important to realize is that testing is ubiquitous on the web and happens in many different ways.
Privacy on the internet means different things to different people. I discuss three different privacy applications out there, explain what exactly each does, and offer some of my own thoughts.
We rail against intrusions into our private affairs and private information; and then post our private information publicly. Where’s the logic in that?
Isolating other sessions in Gmail can become pretty complex. We’ll walk through a number of scenarios.
Deleting items on your computer usually doesn’t wipe them clean. That’s an extra step.
Even a cached version of a website could send information about you back to the original server. The thing is that we just don’t (and can’t) know.
Search engines have numerous (and quite amazing) ways to gather information on people and the way they search. It’s nothing to worry about unless you have some critical need for privacy.
Unfortunately, there is no practical way to determine what is and what isn’t personal information. Securing a computer to give away is an all-or-nothing proposition.
Once you’ve hacked into someone else’s account you’ve not only done something morally wrong – you’re at risk of being found out.