Announcement

Collapse
No announcement yet.

How to Protect your Personal Data :

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • How to Protect your Personal Data :

    How to Protect your personal data from spying :

    ================================================== =======================================
    Here are some basic tips to enhance your privacy of your personal data:

    1.Encrypt your emails :

    Emails sent across the web just like postcards. Might be, in some cases, they're readable by anyone standing between you and its recipient.It includes the web-mail company you are using, or it can be your Internet service provider and whoever is tapped into the fiber optic cable passing your message around the globe - not to mention a parallel set of observers on the recipient's side of the world.
    So, experts recommend encryption, which modify messages in which are pass across, so they're unreadable to any one trying to intercept them.There are various techniques, but PGP is one of the popular one, short for Pretty Good Privacy. Effectiveness of PGP technique has been experienced by U.S Government in mid -1990s, as that time they tried to block its export , arguing that it was so powerful it should be classed as a weapon.

    Disadvantages: This Encryption can be clunky and to work this technique, both parties have to be using it.


    2.Use TOR :

    Like emails, your travels around the Internet can easily be tracked by anyone standing between you and the site you're trying to reach. TOR is the short form of 'The Onion Router'. It helps to make your traffic anonymous by bouncing it through a network of routers. And , it happens before spitting it back out on the other side. Each travel through a router provides another layer of protection, thus the Onion router works.
    US military has originally developed the TOR . If you want to hide your traffic from, e.g. , eavesdropping by your local Internet service provider, TOR is believed to work pretty well . And criminals' use of TOR has so frustrated Japanese police that experts there recently recommended restricting its use. But it is worth noting that TOR may be unproductive against governments equipped with the powers of global surveillance.

    Disadvantages: Browsing the web with TOR can be painfully slow. And some services - like file swapping protocols used by many Internet users to share videos and music - aren't compatible.


    3.Ditch the phone :

    Our everyday cellphone has all kinds of privacy problems. Cellphone safety was so poor In Britain, that crooked journalists made a cottage industry out of eavesdropping on their victims' voicemails. Thus, most of the security issues like proprietary software, lousy encryption, hard-to-delete data make a cell phone risky for storing information you'd rather not share.
    And the more bigger issue is that cellphones almost always follow their owners , carefully tracking the location of every call, because of this governments could easily get a daily digest of your everyday life. Jacob Appelbaum, a Security researcher has described cellphones as tracking devices which is also used to make phone calls. If you are not happy with the idea of an intelligence agency following your footsteps across town, then there is the only way to avoid this is, leave the phone at home.

    Disadvantages: Not having a cellphone handy when you really need it. Other alternative rapidly become expensive, like using "burner" (Burner, an app that lets people create disposable numbers that they can give out in place of their real number) phones paid for anonymously and discarded after use.


    4.Cut up your credit cards :

    NSA is monitoring American credit card records in addition to phone calls. Same methods can be use by some cyber criminals. So, its better to stick to the cash. If you are more adventurous, make a use of electronic currencies to move your money around the world, if you want total privacy.

    Disadvantages:Credit cards are a pillar of the payment system of whole world, so washing your hands of plastic money is among the most difficult moves you can make. In many case, some cybercurrency systems offer only limited protection from government snooping and many carry significant risks.


    5.Malacious softwares :

    If we can not record it, track it, or intercept it, an increasing number of spies aren't shy about hacking their way in to steal your data outright. Guardian has been warned by the Edward Snowden, the NSA leaker, that his agency had been on a worldwide binge of cyberattacks.
    "We hack everyone everywhere," he said.
    Former officials don't appear to contradict him. Ex-NSA chief Michael Hayden described it as "exchanging to where the information is stored and extracting the information from the adversaries' network." In a recent interview with Bloomberg Businessweek, he boasted that "we are the best at doing it. Period."
    Malicious software used by hackers can be extremely hard to spot. But installing an antivirus program, avoiding attachments, frequently changing passwords, dodging suspicious websites, creating a firewall, and always making sure your software is up to date is a good start.

    Disadvantages: Keeping track of all the latest updates and warily scanning emails for viruses can be exhausting.

    ================================================== =======================================

  • #2
    Re: How to Protect your Personal Data :

    Great Post Shane.

    This is a great piece of information. Surely gonna help many.

    Comment


    • #3
      Re: How to Protect your Personal Data :

      This is great information. After hearing so much about government spying and all it is essential for one to be careful with their private data.

      Can you provide more information about how one can use these things like PGP and TOR to be safe?

      Comment


      • #4
        Re: How to Protect your Personal Data :

        Thanks SalonJud....!!!!

        Please refer the below instructions regarding "How one can use PGP and TOR for security in practice" , hope it will help you some extend.

        ================================================== =========================================
        How one can Use PGP for Secure Email

        Download and install GPG4Win :
        (NOTE:Gpg4win supported by Windows XP, Vista and 7. Both 32 and 64bit systems .)


        1. First of all, download GPG$Win. Now, Click or double-click the downloaded (.exe) file and hit RUN.

        2. Click Next to install. The only default option you should change in this process is to install links on the desktop.Otherwise keep clicking Next.

        3. Check Root certificate defined or skip configuration, then click Next. Restart the computer.

        4. Once the computer restarts, you’ll see 3 icons on desktop : GPA, Kleopatra and Gpg4win Documentation. We need to consider only GPA icon, or GNU Privacy Assistant, so you can “recycle” those other items if you wish.




        5.Set up your keys :

        5.1 .Double click the GPA icon to open it. This is your “key manager.”



        5.2. Firstly, you will have to create a new key by clicking on the Key menu and select New Key.



        5.3. Insert your name and click forward. After that insert the email address with which you want to associate this key and click Forward.Select to make a backup copy of the key when prompted.

        5.4. Then, it will asked for Password which you will use to access your key.(Please take care that password should be strong enough.)



        5.5. While the key is being created, move your mouse around or type into another application. It helps the program to create a better key. Might be it takes a few minutes,don't get worried. Once the program has finished creating your key, you will see it in the main window.

        5.6. You’ll want to send the “public” version of your key out to a keyserver, so other people can find it. For this, click on Server,>> Send Keys. For key to be sent it will take some time, but no need to worry; it will get there.

        5.7. Now you’ll need to get the keys of the people you want to email. To retrieve keys, click on Server, then Retrieve Keys. You have to know the ID of the key you’re looking for; to get this, you can ask the person whose key you want.

        5.8. There is one more simple method to import the key of friend you want to email. People can send you keys as files, or they might link to them online. Like, my key is here. To save it as a file, right click and select “save as,” then save it to your desktop or downloads files. To import it into the GPA, select Import, then select the saved file and click “open.”


        6. Start Encrypting :

        Now you have keys and you’re ready to encrypt. Outlook integration is quite problematic, so you can go through encrypting text and files so that you can paste encrypted messages into any email program.

        6.1. If you click on the clipboard icon in the right hand top corner of main window, you will get a window where you can type or paste text.






        6.2. After putting your message into the window, click on "Encrypt ". Then, another window will pop up, where you can select the recipient key, then Click OK .

        6.3. The message will be converted to encrypted text. You can paste this into the body of an email and send it.

        6.4. Finally the message will be converted to encrypted text. So, now you can paste this into the body of an email and send it.

        6.5. You can also encrypt entire files by clicking the “Files” button in the main window.

        6.6. By clicking the “Files” button in the main window you can also encrypt entire files.

        6.7. If you are sending an encrypted email to someone for the first time, it’s good to include your public key, so they will not look for it on the key server. For this, simply Click on Export in the main window, select a name for your key, and click save. Attach that file to the email you are sending. And, by clicking the “Files” button in the main window you can also encrypt entire files.


        7. Decrypt :

        To decrypt messages using GPA, simply copy and paste the full encrypted message into the clipboard, and click “decrypt.”

        Hope, this information will be helpful to you.


        ================================================== ========================================
        Last edited by Shane P; 25-06-2013, 06:57.

        Comment


        • #5
          Re: How to Protect your Personal Data :

          Hiya Friends,

          Thanks to all of you for sharing & contributing on this as much more information we got form it.

          Really appreciating your efforts to put up on this !!! Kudos




          Regards,
          Tech Hunter
          [email protected] Lo0king S0meth!ng.

          Comment


          • #6
            Re: How to Protect your Personal Data

            How to use TOR :

            ================================================== ========================================

            TOR(The Onion Router) works with many common existing applications, including remote login, web browsers, instant messaging clients and other applications based on the TCP protocol.

            e.g. Here are the steps How to use TOR with your browser.(These steps are only for windows platform ; you can also use TOR with Linux/MAC OS.)


            1.Download and Install TOR bundle :

            1.1.First you need to download the Tor Browser Bundle, then double click on it to run it. Follow the steps and complete the installation.

            1.2.Select where you want to save the bundle then click OK . At least 50 MB free space must be available in the location you select. Or you can simply save it to the Desktop. Also, If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk.

            1.3.After that Click Extract to begin extraction.


            2. Use with your browser :

            2.1. After completion of extraction , open the folder “Tor Browser” from the location where you saved the bundle, Double click on the Start Tor Browser application (on some systems it may be called Start Tor Browser.exe) The Vidalia window will shortly appear.(The Vidalia Control Panel - which you are now familiar with - is the main console for the Tor program)

            2.2. Firefox will automatically be opened, once Tor is ready. Only web pages visited through the included Firefox browser will be sent via To not the other web browsers such as Internet Explorer or any.

            2.3. Make sure that it shows “Tor Enabled” in the bottom right corner before using it. Don’t run your normal Firefox while using the Tor Browser Bundle, to reduce the risk of confusion. It's better to close existing Firefox windows before starting.

            2.4. Once you are finished browsing, close any open Firefox windows by clicking on the "X" closed button. For privacy reasons, the list of web pages you visited and any cookies will be deleted.



            ================================================== ========================================

            Thanks...!!!...

            Comment


            • #7
              Re: How to Protect your Personal Data :

              Thanks for taking your time and writing this detailed post. Really appreciate it.
              Referring these steps would definitely help me set things up correctly.
              Keep up the good work

              Comment


              • #8
                Re: How to Protect your Personal Data :

                SalonJud

                Comment


                • #9
                  Re: How to Protect your Personal Data :

                  Hello Shane,

                  Thank you for such a nice tutorial.
                  Good work keep it up.
                  Aarav 92
                  Red Hat Certified Security Specialist.

                  Comment


                  • #10
                    Re: How to Protect your Personal Data :

                    Hi Shane,

                    Nice share, Thanks

                    Comment


                    • #11
                      Re: How to Protect your Personal Data :

                      Hi Shane,

                      Thank you for the precious post, this as actually been very helpful to me and I hope will be helpful for others as well.

                      Thanks once again.

                      Comment


                      • #12
                        Re: How to Protect your Personal Data :

                        You are most guys..Rob,SinclairJ and Aarav92......

                        Comment

                        Working...
                        X