Safer Internet: Keep Your Internet Connection Private

Summary | Preview | References


Summary

Preview: privacy / security / anonymity via encryption / indirection

  • Recall the letter / post office analogy in Privacy, Security, Anonymity section?
  • We're mostly concerned about content (postcard vs. letter) -- encryption
  • The address (actual vs. PO Box) could be important too -- anonymity via indirection
  • The following figures show the effect of encryption from various techniques
  • What's not shown: which information might be added, e.g., ads, tracking, malware
  • which information might be saved on client or servers, e.g., history, logs, caches
  • how secure your data is on their server, e.g., passwords, medical records, credit card, social security no.
  • how someone else accesses information you've 'published', e.g., email recipient, blog reader
  • no encryptionNone: {Figure 1. TCYOP-4: 56; TCYOP-3: 44} -- at right
  • [1] Wi-Fi (WPA2) [device-to-router]:
    {Figure 3. TCYOP-4: 58; TCYOP-3: 46}
  • [1] HTTPS: for browser, SSL/TLS for email [device-to-final specific site]
    {Figure 6. TCYOP-4: 67; TCYOP-3: 55}
  • [1-2] VPN [device-to-intermediate server; some address]
    {Figure 4. TCYOP-4: 60; TCYOP-3: 48}
  • [3] Tor [device-to-intermediate servers; most of address]
    {Figure 14. TCYOP-4: 104; TCYOP-3: 87}

References

  • {TCYOP-4: 51-77; TCYOP-3: 39-63; Wi-Fi connections, Cellular connections, DNS disruptions, ISP monitoring, Router monitoring, Malware, Location discovery, Quantum Computing and Encryption, Prevent Snooping}
  • Crosswords: Connection; Malware