Privacy, Anonymity and Security: The Wonderful Threes Part 1

Hi guys, how are y’all doing? Today we will talk about privacy, anonymity and security. As i mentioned in the previous post The Password Guide. Edward Snowden the guy who aired out the dirty laundry of several large corporations, who are reading, seeing and hearing every piece of data in the world. And i know what you are thinking! What do i have to hide? They can keep on seeing them? but this is a naive way of thinking. They are using highly advance programs to hear every call you make, every text you send and social media. Therefore i must warn you, this will be a very long post as i will go in depth. Now before we start let me disarm those who say they have nothing to hide with a quote from Mr. Edward Snowden: “Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say,”

Source: Mic/AP

Now as a start, you should know there are governments alright with this Global Mass Surveillance, in fact they signed it.

The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other’s citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third party countries can and do spy on each other.

Source: https://www.privacytools.io/

restore privacy banner

Five Eyes

  1. Australia
  2. Canada
  3. New Zealand
  4. United Kingdom
  5. United States of America

Nine Eyes

  1. Denmark
  2. France
  3. Netherlands
  4. Norway

Fourteen Eyes

  1. Belgium
  2. Germany
  3. Italy
  4. Spain
  5. Sweden

Now, these guys collect and analyze loads and loads of data(Terabytes worth), they have projects and softwares that could trace you, Prism(Documents leaked by Snowden show that Facebook, Google, Microsoft, Yahoo, PalTalk, AOL, Skype, YouTube and Apple give the NSA direct access to its users’ information. According to the documents, Dropbox also joined this list), Tempora, Dishfire, SOMALGET and others to mention a few, they can trace your family, you pets, your background and more creating data maps based on info they get on you. So i will explain today how to prevent your sensitive information from being seen, leaked and utilized by them.

Another thing, it is necessary to know any VPN from any of these countries could easily be subpoenaed to submit your information, and not just VPNs, Google has done it, Yahoo, Bing/Microsoft, Facebook, Twitter, Instagram.

And countless others that i will list at the end of this post, there will also be a bonus. So step one.

Didn’t read the mini guide? Check it out here before reading this: https://ajulusthoughts.wordpress.com/2018/09/26/mini-privacy-security-and-anonymity-guide/

First Step

You already know Google, is giving your data to these departments(NSA, and others) of which we found out about thanks to Mr. Snowden.

I have met friends who know all about what I’ll be talking about but say Google is too useful to abandon.

And yes, i second that, its too useful, but, you don’t need to worry. There are security settings one can change, though some could possibly make it a little less useful. And there are also apps that could completely replace Google services, even some better than Google’s. You could use Google and these side by side, then decide(of which i highly discourage this due to Google tracking you all over the internet) One thing you should know Google is a monopoly. It has the greatest video streaming service in existence:- YouTube of course, now this is the only thing that cant be replaced as all others such as Vimeo are abit low on content and have some strict rules(as i have heard from friends who have used it, not my words) There are other services(few) that cant be replaced, i will not even bother mentioning their replacements because that’s just a waste of time. Hopefully soon they will rise and be capable of defeating google. Another point is, i wont explain Google services unless necessary, i wll just mention the replacements and their pros. So without hesitation:-

G-MAIL VS PROTONMAIL E-MAIL OR TUTANOTA EMAIL OR DISROOT OR MAILFENCE:

Now for Email you could use Protonmail, its the best, has a free and paid version. You will be limited but you will be relieved because they don’t read, neither do they allow any person or organization to read your emails. It features end to end encryption. The company is based in Switzerland, you can create an anonymous email, they don’t ask for too much information, its free and easy to use. I use this one as my preferred choice. Their Email Domain is ___@protonmail.com, you can also activate a receive only email which is ___@pm.me Link: https://protonmail.com/
Other Alternatives:-
https://tutanota.com/
https://disroot.org/en
https://mailfence.com/

GOOGLE SEARCH ENGINE VS DUCKDUCKGO SEARCH ENGINE OR STARTPAGE:

This is one i like very much, and use everyday, duckduckgo. Moreover its just like Google only more secure, they don’t track you, they don’t add Ads in your searches. Its an absolutely amazing alternative to google.  Link: https://duckduckgo.com
Other Alternatives:-
https://www.startpage.com/
http://www.wolframalpha.com/

GOOGLE DRIVE vs MEGA CLOUD OR NEXTCLOUD OR PCLOUD OR SYNC

This is a secure cloud with more space, more security(this is still debatable since a post in 2016, which i found after writing this section, so if concerned try https://nextcloud.com). It comes with 50 GB free plus end to end encryption, secure collaboration and live encrypted backup(Paid Feature). They also allow you to raise their base 50 GB storage e.g. installing Mega sync into your computer, earns you 20 GB, inviting friends 10 GB and installing their app in android 15 GB. Link: https://mega.nz/
Other Alternatives:-
https://nextcloud.com/
https://www.pcloud.com/
https://www.sync.com/

YOUTUBE VS VIMEO

Vimeo though not very known, has always been an alternative for Youtube(remember the text above, saying there is no replacement for Youtube, ignore that for a second and go to Vimeo’s site then base your conclusions and decide), first they don’t collect information as much as Youtube does. They are a good substitute especially for their lack of limitation(Youtube used to have a 10 minute limitation but i think that has stopped now)They have been in the industry just as long as Youtube. Link: https://vimeo.com/

PLAYSTORE VS F-DROID

This is pretty much the opposite to Google Play, but just as secure. They offer free and open source apps(FOSS). They have great apps especially dealing with the wonderful threes. Link: https://f-droid.org/

PLAYSTORE VS APTOIDE

Aptoide has been designed according to Google standards, and the experience is almost as good as the Play Store with a well-designed user interface. Aptoide is an open source Android app store with over 700,000 apps to choose from its collection that has over 3 billion downloads. It has been used by more than 150 million users worldwide since its launch in 2009. It allows you to download APKs to your device directly and install them. It is a safe and straightforward app store for Android that you can use as a great Google Play Store alternative. Link: https://en.aptoide.com/

SECOND STEP

I know it would have been easier to say block this and that but the truth is some(all) IPhones have a backdoor, so does some(all) android phones. Unfortunately i cant provide a solution for IPhone users right now. But the solution for android users requires a tech savvy user/power user, who knows how to tweak vpn settings, setup a more private DNS, root and flash ROMs into his/her device etc. And it also depends on the device make, model and android version.

ANDROID SOLUTION

Solution 1: Install the following apps(Some are paid, others free and some require root, ill try to list the free and no root versions first but do note sometimes free can be expensive)

VPN Services:- Orbot Proxy with Tor, ProtonVPN, NordVPN, PIA VPN, HMA PROXY AND VPN, 1.1.1.1(Not a VPN but acts like one, it is a DNS Server)

Firewalls:- NetGuard, GlassWire(Monitoring App), NoRoot, AFWall+

Password Managers and Generators:- LastPass, Bitwarden, Dashlane, Keeper, 1Password

Browsers:- Orfox(Must Be Used With Orbot), Tor Browser(Still Buggy, Use First One), Firefox Focus, Opera Touch, Firefox, Opera, Brave, DuckDuckGo, Waterfox

E-mail:- ProtonMail, Tutanota

Messaging:- Signal, Wickr, Wire, Telegram, Threema

Antivirus(Not really necessary but useful):- Malwarebytes, Norton

App locks:- Applock, Vault, Fingerprint Applock, App Lock: Locker w/fingerprint

File Managers: MiXplorer, Solid Explorer, Amaze

THIRD STEP

Microsoft is spying on you using Windows and Google Android, most of you all ready know this, some are still debating others don’t know. Well now you know. So this step we will look in to alternatives to Windows 7,8,10 and Android.
Android Alternatives
The problem with these is that they support specific devices. But you could go to their sites and check if your device is supported.
Here they are:-
https://copperhead.co/android/
https://unaos.com/
https://www.lineageos.org/(the best)
http://www.paranoidandroid.co/
http://www.resurrectionremix.com

Windows Alternatives
Check the sites out, most of these are Linux, because sadly Linux is the only OS that really cares about your privacy not forgetting Linux doesn’t get viruses and trojans as frequent as Windows(Viruses directed at Linux: 800, while windows more than 1 million since their creation date) and therefore little to no need of an antivirus software, not just this but there are literally more than 50000 Linux apps in their repository
https://www.ubuntu.com/
https://getfedora.org/
https://solus-project.com/
https://www.linuxmint.com/
https://elementary.io/
https://www.deepin.org/en/
https://nxos.org/
https://neon.kde.org/
https://ferenos.weebly.com/
https://zorinos.com/
https://manjaro.org/
https://pinguyos.com/
https://www.qubes-os.org/
https://www.debian.org/
https://trisquel.info/
https://www.whonix.org/

FOURTH STEP

This next step is called hardening. In this step you will have to sacrifice usability or performance or features or something else. This is where we get to some tough decisions and do some tech savvy stuff.

First off Browser hardening. For this i won’t go into it as it might take up a lot of space so just visit this site and read through to Firefox about:config area: https://www.privacytools.io/#fingerprint

Don’t use Windows 10 – It’s a privacy nightmare

Microsoft introduced a lot of new features in Windows 10 such as Cortana. However, most of them are violating your privacy.

Windows 10 Privacy
  1. Data syncing is by default enabled.
    • Browsing history and open websites.Apps settings.WiFi hotspot names and passwords.
    • Your device is by default tagged with a unique advertising ID. – Used to serve you with personalized advertisements by third-party advertisers and ad networks.
    • Cortana can collect any of your data. – Your keystrokes, searches and mic input.Calendar data.Music you listen to.Credit Card information.Purchases.
    • Microsoft can collect any personal data. – Your identity.Passwords.Demographics.Interests and habits.Usage data.Contacts and relationships.Location data.Content like emails, instant messages, caller list, audio and video recordings.
    • Your data can be shared. – When downloading Windows 10, you are authorizing Microsoft to share any of above-mentioned data with any third-party, with or without your consent.This tool uses some known methods that attempt to disable major tracking features in Windows 10: https://www.winprivacy.de/english-home/

Some good news

More bad news

HARDENING
It would be better you apply the above steps but if you need the services mentioned above, you could limit the amount of info, these companies gather on you and about you by doing something called hardening.

First step: cover your camera(Laptop Webcam) with tape, move security cameras away from areas you are likely to undress or do anything you want private, or if you don’t need it completely remove it: Hackers could easily plant a JavaScript code into websites, embed code in software or perform a man in the middle and activate your camera, capturing videos of you and selling them on the dark net or for other malicious purposes. Think am lying go visit Shodan.io(Search Engine for Hackers) then type in the search bar: Cameras, you will see a nimber of exploited or vulnerable cameras.

I need to apologize, hardening is a very wide topic touching many commonly used softwares, operating systems and as such i am not going to finish the hardening step here, there will be another post for that coming soon.

NB: AS YOU BROWSE, ENTER SOCIAL MEDIA, BUY STUFF ONLINE AND RESEARCH, KNOW THIS ALL THESE LEAVE FOOTPRINTS ALL OVER THE WEB(LIKE YOU DO ON SAND), WHICH MAKE IT EASIER FOR THESE ORGANIZATIONS AND HACKERS TO TRACK, SOCIAL ENGINEER AND HACK YOU. SO TRY TO LEAVE AS LITTLE INFORMATION ABOUT YOURSELF AS POSSIBLE, CLEAR COOKIES AND SITE DATA OCCASIONALLY(OR USE THE ADDON COOKIE AUTODELETE), PUT SOME ADBLOCKERS(LIKE UBLOCK ORIGIN, PRIVACY BAGDER) ON YOUR BROWSER, USE VPNS TO HELP CONFUSE TRACKERS, MAKE SURE EACH SITE YOU VISIT STARTS WITH https:// and not http://. 

Check out the mini guide here: https://ajulusthoughts.wordpress.com/2018/09/26/mini-privacy-security-and-anonymity-guide/

This is part one of the wonderful threes, part 2 will feature more security, privacy and anonymity steps, tricks, hacks, hardening, clearing your footprints and more. Stay Tuned.

Kindly do like, comment, share and support this blog by donating bitcoins or monero or ethereum.

HAVE A HAPPY NEW YEAR

28 thoughts on “Privacy, Anonymity and Security: The Wonderful Threes Part 1

  1. Pretty component of content. I simply stumbled upon your website and in accession capital to claim that I get actually enjoyed account your blog posts. Any way I will be subscribing in your feeds or even I achievement you get admission to persistently rapidly.|

    Like

  2. Hi there, I discovered your website via Google even as looking for a comparable topic, your website came up, it appears great. I’ve bookmarked it in my google bookmarks.

    Like

  3. Hey there excellent blog! Does running a blog such as this require a lot of work? I have absolutely no understanding of computer programming but I had been hoping to start my own blog in the near future. Anyway, if you have any ideas or techniques for new blog owners please share. I know this is off topic nevertheless I simply needed to ask. Thanks a lot!|

    Like

  4. We’re a gaggle of volunteers and starting a new scheme in our community. Your website offered us with helpful information to work on. You have done a formidable task and our whole community will likely be thankful to you.|

    Liked by 1 person

  5. Have you ever thought about creating an e-book or guest authoring on other websites? I have a blog centered on the same subjects you discuss and would really like to have you share some stories/information. I know my viewers would appreciate your work. If you’re even remotely interested, feel free to send me an e mail.|

    Liked by 1 person

  6. Hello exceptional blog! Does running a blog similar to this take a large amount of work? I have very little knowledge of programming however I had been hoping to start my own blog soon. Anyhow, should you have any ideas or techniques for new blog owners please share. I know this is off subject but I simply had to ask. Cheers!|

    Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.