Summary | Preview | References
Summary
- "Stay the patient course...
- "Give a person a fish and you feed them for a day...
- [1] Use WPA2 for Wi-Fi networks; improve DNS lookups/privacy
- [1] Use a VPN when you're on any open or unfamiliar network
- [1] Use HTTPS: for web browsing (and SSL/TLS for email) when available
- [1] Avoid malware
- [2] Turn off unnecessary services, e.g., location
- [2] Turn on your computer's firewall
Preview: privacy / security / anonymity via encryption / indirection
- Recall the letter / post office analogy in Privacy, Security, Anonymity section?
- We're mostly concerned about content (postcard vs. letter) -- encryption
- The address (actual vs. PO Box) could be important too -- anonymity via indirection
- The following figures show the effect of encryption from various techniques
- What's not shown: which information might be added, e.g., ads, tracking, malware
- which information might be saved on client or servers, e.g., history, logs, caches
- how secure your data is on their server, e.g., passwords, medical records, credit card, social security no.
- how someone else accesses information you've 'published', e.g., email recipient, blog reader
- None: {Figure 1. TCYOP-4: 56; TCYOP-3: 44} -- at right
- [1] Wi-Fi (WPA2) [device-to-router]:
{Figure 3. TCYOP-4: 58; TCYOP-3: 46} - [1] HTTPS: for browser, SSL/TLS for email [device-to-final specific site]
{Figure 6. TCYOP-4: 67; TCYOP-3: 55} - [1-2] VPN [device-to-intermediate server; some address]
{Figure 4. TCYOP-4: 60; TCYOP-3: 48} - [3] Tor [device-to-intermediate servers; most of address]
{Figure 14. TCYOP-4: 104; TCYOP-3: 87}
References
- {TCYOP-4: 51-77; TCYOP-3: 39-63; Wi-Fi connections, Cellular connections, DNS disruptions, ISP monitoring, Router monitoring, Malware, Location discovery, Quantum Computing and Encryption, Prevent Snooping}
- Crosswords: Connection; Malware