Digital Privacy & Security

AIM: To provide a series of steps and recommendations to secure your privacy and the security of your information and technology.

OVERVIEW: In today’s hyper digitally connected world the machinery of data collection and tracking is ubiquitous. Whilst we can frequently dismiss the concerns as we feel hidden in the virtual crowd of the masses, it’s still scary knowing our profile and digital fingerprint is being recorded and analyses from every button we press, comment we make, product we buy and even image we glance at.

The solutions that are available to address this concern range from the brutal self isolation from the world to become a hermit, through to tactfully removing as much digital residue of your person with minimal impact to daily life.

It’s up to you how invisible you want to be but below are a series of tools, tips and solution that might assist in achieving that hybrid state of living under the radar.

Social Media:

  • Facebook Messenger & Whatsapp
  • Telegram
  • Signal
  • Briar
  • Wickr

Internet Browsing:

  • Secure Internet Browsers
  • Tor Browsers
  • VPNs

Smart Phones:

Burner Phones:

Clear Phones:

https://humanrightsadvocates.com.au/phones

Checklist of Steps

  • Step 1: Identify your exposure and risk (Use Checklist)
  • Step 2: STOP – First backup all critical information before any changes
  • Step 3: Secure what you have (passwords and encryption solutions)
  • Step 4: Remove unnecessary exposure (apps, accounts, history)
  • Step 5: Replace easy swap apps with safer solutions
  • Step 6: Implement new communication solutions for sensitive messaging
  • Step 7: Change habits and use interim solutions to reduce further exposure
  • Step 8: Implement technology solutions to aggressively remove identity (Clear Phones etc)

RESOURCES:

  • RiskExposureAssessment

[From Unchained Innovations]
As part of sharing knowledge so that people are better informed about privacy tools and apps, we have been covering various topics:

UPDATED: August, 2022

01 – VPN Services

Why a VPN service is a must have for everyone »

“If you think that you’re a normal citizen and you don’t need a VPN service for your daily internet activities, there are chances that you’re wrong. A VPN can help you get access to region-restricted sites, save yourself from hacking risks while using public Wi-Fi, etc. Overall, it gives you more control over your privacy, which is a basic human right.”

10 Reasons To Use A VPN Service
• Protect your browsing history from your internet provider
• Stop google/search engines from tracking you and your searching behaviour
• Stop apps and online users from knowing your IP/Location
• Bypass censorship
• Use public Wi-Fi without risks
• Bypass restrictions in office/school/college
• Access full Netflix content anywhere
• Secure your digital calls and online data access points
• Great for people/organizations dealing with confidential data
• Privacy is a human right

https://fossbytes.com/reasons-why-use-vpn-service/

  • How a VPN works » (https://t.me/privacyrus/https://t.me/unchainedinnovations/)
  • A good example of a VPN provider » Mullvad (https://t.me/unchainedinnovations/64)
  • Second example of a good VPN provider » Apart from Mullvad, we also have other VPN service providers that have the right framework with the added benefit of accepting Monero:
    https://www.ivpn.net/

02 – Decentralized VPN Services

Importance of a dVPNs »

Regular VPN services can be shutdown or blocked by nation states, because they are essentially servers through which you access the internet. This is why Decentralized VPN services are important as we move forward and more countries follow suit in the name of “protecting the citizen from illegal or harmful content”.

“The country’s communications regulator Roskomnadzor said Friday it had blocked access to some of the world’s largest VPN providers, including Nord VPN and Express VPN, following an investigation.

“The use of such services leads to the preservation of access to prohibited information and resources and creates the conditions for illegal activities, including those related to the distribution of drugs, child pornography, extremism and suicide,” Roskomnadzor said in a statement.”

https://www.themoscowtimes.com/2021/09/03/russia-blocks-vpn-providers-in-ongoing-internet-crackdown-a74966

  • Decentralized VPNs vs. Traditional VPNs » (https://t.me/unchainedinnovations/89)
  • Infographics Comparison » See Comparison (https://t.me/unchainedinnovations/90)
  • Blockchain VPNs Explained » Learn More (https://t.me/unchainedinnovations/91)
  • Good example of a dVPN » Orchid (https://t.me/unchainedinnovations/94)
  • Second example of a dVPN » Sentinel (https://t.me/unchainedinnovations/97)

03 – Decentralized Social Media Networks

Mastodon, a replacement for Facebook »

Decentralized Social Media Platforms: Mastodon

Mastodon is an open-source and decentralized network. Think of it as each community, business, or group having their own Facebook while being able to link them so that people can seamlessly go from one to another.

You can join an existing network or create your own with your own rules, branding, and community!

Because it is open-source, people have developed various iOS, Android, Windows, MacOS, and Linux apps to access this beautiful network.

https://joinmastodon.org/

PixelFed, a replacement for Instagram »

Decentralized Social Media Platforms: PixelFed (Alternative to Instagram)
A free and ethical photo sharing platform.

Benefits of PixelFed
• Ad-Free: No ads in timelines, or anywhere
• Privacy Focused: No 3rd party analytics or tracking included
• Open Source: no hidden ingredients

https://pixelfed.org/

04 – Email Services

ProtonMail »

Email Services: ProtonMail

The first on our list is Protonmail. They offer encrypted emails and calendars. They also have a VPN service, though we do not recommend putting all your eggs in one basket.
Follow the decentralization principles and keep them separate.

As a lot of people have ProtonMail, it makes it easier to communicate with others who also use ProtonMail ensuring emails are encrypted. If they do not use ProtonMail, then you can follow this post to learn how to secure your emails for non-proton users (https://t.me/privacyrus/127).

Benefits of ProtonMail:

— Offers free accounts
— You can pay in Bitcoin
— Protected by Swiss Privacy Laws
— End-to-End Encryption
— Open-source
— Supports custom domains (e.g. [at]yourdomain.com)
— Tor onion service

Concerns:
— Developed by CERN and MIT scientists. Given the platform is open-source and uses PGP keys we can dismiss this concern.
— Recently forced to log IP address and browser fingerprint information

(https://arstechnica.com/information-technology/2021/09/privacy-focused-protonmail-provided-a-users-ip-address-to-authorities/) https://protonmail.com/

  • ProtonMail over Tor » Learn More (https://t.me/unchainedinnovations/136)
  • Tutanota » Learn More (https://t.me/unchainedinnovations/137)
  • CTemplar » Learn More (https://t.me/unchainedinnovations/140)
  • How to Increase Email Security Awareness in Your Company? » (https://t.me/unchainedinnovations/141)
  • Privacy-Conscious Email Services » See List (https://t.me/unchainedinnovations/142)

05 – Cloud Storage

Mega »

Cloud Storage: Mega

One of our favorite cloud storage providers is Mega. They offer encrypted cloud storage solutions for personal and business needs and have a long standing track record for quality, privacy, and security.

If you’re looking for the strongest security for your files, then you need a provider that can offer zero-knowledge encryption. This means that your cloud storage provider doesn’t store a copy of your encryption key, so it can’t decrypt your data, even if compelled by law enforcement.

This is not the case with Google Drive, Dropbox etc.

Benefits:
— Privacy: End-to-end encryption, MEGA achieves actual privacy by design.
— Secure: End-to-end encrypted client-side using the AES algorithm.
— Transparent: MEGA’s client apps are Public Source.
— Reliable: MEGA owns and operates its redundant server infrastructure directly.
— Free Accounts
— Payable with Bitcoin
— Bounty program to find vulnerabilities in their system:
https://mega.nz/blog/the-mega-vulnerability-reward-program

Internxt »

Cloud Storage: Internxt

Internxt Drive is a zero-knowledge cloud storage service based on privacy and security.

A good alternative for Google Photos, iCloud, etc.

Benefits:
— Privacy: End-to-end encryption
— Zero-knowledge technology
— Photos App: Replace Google Photos, iCloud, etc.
— Free Accounts
— Open-source apps

Room for Improvement
— Not accepting crypto payment. Perhaps in the future?
— New company. Needs more time to prove itself.

https://internxt.com/

(https://t.me/unchainedinnovations/174)

06 – Web Browsers

Brave » Learn More
(https://t.me/unchainedinnovations/224)— Browser Privacy Test » Learn More
(https://t.me/unchainedinnovations/313)— Tor » Learn More

(https://t.me/unchainedinnovations/229)

07 – Privacy Phones

GrapheneOS vs. ClearOS (ClearPHONE): Which One Is Better? » Learn More
(https://t.me/unchainedinnovations/235)— GrapheneOS vs. Other Privacy Phones » Learn More
(https://t.me/unchainedinnovations/242)— Privacy Phones Backed by GrapheneOS Vs Apple’s iPhones: Is it time to make the switch? » Learn More

(https://t.me/unchainedinnovations/268)

08 – Privacy Laptops

Unchained Privacy Ninja Laptops » Learn More
(https://t.me/unchainedinnovations/294)— Switch to Linux and Ditch Windows/macOS » Learn More

(https://t.me/unchainedinnovations/432)

09 – Beyond Microsoft & Apple OS

Operating System: Linux Mint » Learn More
(https://t.me/unchainedinnovations/326)— Why Linux is Better Than Windows » Learn More
(https://t.me/unchainedinnovations/330)— Operating System: Elementary OS » Learn More

(https://t.me/unchainedinnovations/333)

10 – Encrypted Chats & Calls

Signal » Learn More
(https://t.me/unchainedinnovations/346)— Threema » Learn More
(https://t.me/unchainedinnovations/347)— Wickr » Learn More
(https://t.me/unchainedinnovations/349)— Status » Learn More
(https://t.me/unchainedinnovations/350)— Element » Learn More
(https://t.me/unchainedinnovations/352)— Conversations » Learn More

(https://t.me/unchainedinnovations/355)

11 – Password Managers

Bitwarden » Learn More
(https://t.me/unchainedinnovations/375)— KeePass » Learn More

(https://t.me/unchainedinnovations/379)

12 – 2FA

Enabled 2FA Telegram » Learn More
(https://t.me/unchainedinnovations/406)— 2FA vs Passwords » Learn More
(https://t.me/unchainedinnovations/408)— 2FA Directory (find services that support 2FA) » Learn More
(https://t.me/unchainedinnovations/412)— 2FA Hardware: YubiKey » Learn More
(https://t.me/unchainedinnovations/414)— 2FA Software: Aegis [Google Authenticator Alternative] » Learn More

(https://t.me/unchainedinnovations/416)

13 – Decentralized Platform/Network/Publishing

Freenet » Learn More
(https://t.me/unchainedinnovations/420)— ZeroNet » Learn More
(https://t.me/unchainedinnovations/422)— I2P – The Invisible Internet Project » Learn More

(https://t.me/unchainedinnovations/427)Privacy Course
— Re-claim Your Digital Privacy & Freedom (August 13-27) » Learn More

(https://courses.bittopia.org/claim-your-online-privacy-freedom/)Tools
— Go beyond websites with a paywall » Learn More
(https://t.me/unchainedinnovations/223)— How to accept Monero in your business » Learn More

(https://t.me/unchainedinnovations/312)Privacy Tips
— Telegram Privacy Tips » Read More
(https://t.me/unchainedinnovations/193)— How Not to Get Hacked on Telegram » Read More
(https://t.me/unchainedinnovations/253)— The Windows 10 Privacy Settings You Should Check Right Now » Learn More
(https://t.me/unchainedinnovations/261)— 7 macOS privacy settings you should enable now » Learn More
(https://t.me/unchainedinnovations/262)— 1200+ сompanies, stores, services where you pay with XMR. Find where Monero is accepted! » Learn More

(https://t.me/unchainedinnovations/337)➡️ For Privacy News, Tips & Devices Subscribe to: @UnchainedInnovations (https://t.me/unchainedinnovations) 🥷

All credit to Unchained Innovations who complied this content!

Comments:

Feedback from the community on this topic:

Your email address will not be published. Required fields are marked *