Safer Internet: Keep Your Internet Connection Private

Quotes

Summary

  • not privateUnderstand privacy risks: WiFi, cellular, DNS, ISP
  • Always use WPA for Wi-Fi networks you control; avoid DNS problems
  • Use a VPN when you’re on any open or unfamiliar network
  • Use https: for web browsing (and SSL/TLS for email) when available
  • Avoid malware
  • Turn off unnecessary services, e.g., location
  • Turn on your computer’s firewall

Preview: privacy / security / anonymity via encryption / indirection

  • internet fairyRecall the letter / post office analogy in Privacy, Security, Anonymity section?
  • We're mostly concerned about content (postcard vs. letter) -- encryption
  • The address (actual vs. PO Box) could be important too -- indirection
  • The following figures show the effect of encryption from various techniques
  • What's not shown: which information might be added, e.g., ads, tracking, malware
  • which information might be saved on client or servers, e.g., history, logs, caches
  • how secure your data is on their server, e.g., passwords, medical records, credit card, social security no.
  • how someone else accesses information you've 'published', e.g., email recipient, blog reader
  • no encryptionNone: {Figure 1. TCYOP-2: 39; TCYOP-1: 39} -- at right
  • [1] Wi-Fi (WPA) [device-to-router]: {Figure 3. TCYOP-2: 41; TCYOP-1: 41}
  • [2] VPN [device-to-intermediate server; some address] {Figure 4. TCYOP-2: 43; TCYOP-1: 42}
  • [3] Tor [device-to-intermediate servers; most of address] {TCYOP-2: Figure 14: 77; TCYOP-1: Figure 13: 77}
  • [1] https: (for browser; SSL/TLS for email) [device-to-final site] {Figure 6. TCYOP-2: 47; TCYOP-1: 47}

References