Safer Internet: Keep Your Internet Connection Private

Quotes

Summary

  • not privateUnderstand privacy risks: WiFi, cellular, DNS, ISP
  • Always use WPA2 for Wi-Fi networks you control; avoid DNS problems
  • Use a VPN when you're on any open or unfamiliar network
  • Use HTTPS: for web browsing (and SSL/TLS for email) when available
  • Avoid malware
  • Turn off unnecessary services, e.g., location
  • Turn on your computer's firewall

Preview: privacy / security / anonymity via encryption / indirection

  • internet fairyRecall the letter / post office analogy in Privacy, Security, Anonymity section?
  • We're mostly concerned about content (postcard vs. letter) -- encryption
  • The address (actual vs. PO Box) could be important too -- indirection
  • The following figures show the effect of encryption from various techniques
  • What's not shown: which information might be added, e.g., ads, tracking, malware
  • which information might be saved on client or servers, e.g., history, logs, caches
  • how secure your data is on their server, e.g., passwords, medical records, credit card, social security no.
  • how someone else accesses information you've 'published', e.g., email recipient, blog reader
  • no encryptionNone: {Figure 1. TCYOP-3: 44; TCYOP-2: 39; TCYOP-1: 39} -- at right
  • [1] HTTPS: for browser, SSL/TLS for email [device-to-final specific site] {Figure 6. TCYOP-3: 55; TCYOP-2: 47; TCYOP-1: 47}
  • [1] Wi-Fi (WPA2) [device-to-router]: {Figure 3. TCYOP-3: 46; TCYOP-2: 41; TCYOP-1: 41}
  • [2] VPN [device-to-intermediate server; some address] {Figure 4. TCYOP-3: 48; TCYOP-2: 43; TCYOP-1: 42}
  • [3] Tor [device-to-intermediate servers; most of address] {Figure 14. TCYOP-3: 87; TCYOP-2: 77; TCYOP-1 (Figure 13): 77}

References

  • xwd{TCYOP-3: 39-63; TCYOP-2: 35-55; TCYOP-1: 35-55; Wi-Fi connections, Cellular connections, DNS disruptions, ISP monitoring, Router monitoring, Malware, Location discovery, Quantum Computing and Encryption, Prevent Snooping}
  • Crosswords: Connection; Malware