How to Maintain Your Privacy Online
This wikiHow teaches you how to minimize your online footprint by using encrypted services and hiding your online activity from your Internet Service Providers and ad companies alike. While you can never guarantee privacy on the Internet,...
Part 1 of 4:
Finding a Virtual Private Network (VPN)
- Search for a VPN online. VPNs route your browser traffic through a server other than your local one, which makes it impossible for your Internet Service Provider (ISP) to see your browsing history. Things to look for in a VPN include the following:
- On an HTTPS site - Never download browser security software from a site whose URL doesn't begin in "https"; unencrypted (non-HTTPS) sites make it easy for other people to steal your information.
- Based outside of the United States - VPN servers based outside of the United States aren't subject to US guidelines, meaning they can't be forced to expose users in the event of an investigation.
- Multiple-device support - Protecting your computer won't do anything for your mobile phone or tablet. Find a VPN that has an iOS and/or Android extension as well to stay protected across all of your devices.
EXPERT TIPSpike Baron
Network Engineer & Desktop SupportSpike Baron
Network Engineer & Desktop SupportOur Expert Agrees: "A VPN masks your IP address from the world while you're online. No one will know where you're coming from and it's a great way to browse the internet safer. You should also avoid sharing too much data and clicking on attachments from strangers."
- Compare your options. Keep in mind that, when it comes to sponsored content, you may not get an honest review for a paid spot in a list. Some things you might compare are ratings across multiple sites, performance, overall security, and price.
- You can find trustworthy VPN comparisons on https://thatoneprivacysite.net/simple-vpn-comparison-chart/ and on https://privacytoolsio.github.io/privacytools.io/#vpn/.
- For specific VPNs, try AirVPN (https://airvpn.org/) and BlackVPN (https://www.blackvpn.com/).
- Download your selected VPN from its official site. Some sites, such as CNET, will provide download mirrors for sponsored or preferred software. Unless there is no other place to download the VPN and you're positive of the download link's validity, refrain from downloading your VPN from anywhere but the official site.
- Again, if the site isn't HTTPS-encrypted, don't download a VPN from it.
- Most VPNs are paid options, so you'll likely need to pay before downloading. Consider using PayPal to pay instead of a credit or debit card.
- Install your VPN if needed. Some VPNs simply interface with your preferred browser, while others necessitate installing the program to your computer and activating it before browsing.
- Use your VPN in conjunction with HTTPS sites. VPNs don't automatically make all of your browsing private, since non-HTTPS sites can still pull information from your browser and publicly display it. To get the most out of your VPN, stick to well-encrypted sites and refrain from giving out your information.
- Half of the privacy battle comes from choosing to stay anonymous while using encrypted services. If you enter your email address, use Facebook "Like" buttons on other sites, or perform other identifying actions, your VPN won't necessarily prevent that information from being viewed by other people.
Part 2 of 4:
Using Social Networks
- Make your social media accounts as private as possible. Most social networks will allow you to customize your privacy settings. These settings dictate how others can search for you, and what information is available for the public to view. Most social networks have default settings that allow a lot of information through, so it is up to you to change the settings to increase your privacy.
- To make Facebook private, click the downward-facing arrow in the top-right corner of the page and select Settings, then click Privacy. Here you can set who can see your posts, how people can look you up, and if you want search engines to show your profile. If you want to stay as private as possible, limit everything to just your Friends, and then remove any friends from your list that you don't want to share with.
- On Twitter, your tweets are public by default, and anyone can see them. You can change this to "Protected" mode in the Twitter settings menu; protected tweets cannot be retweeted or viewed by people you haven't approved, and they will not show up in Google searches.[1]
- In Google+, your privacy settings are the same as those for all of your Google accounts. To manage your privacy options, click your picture in the top-right corner, and then select Account. In the left menu of the Account page, select Privacy. Here you can adjust what information can be seen by whom. Anything marked "Public" can be seen by anyone that searches for you. You can change your settings so that only the people that you designate can see specific information.
- View your profile as a random person. Sign out of your social network site, and then search for yourself on that site. Browse your profile and ensure that there isn't any data on there that you don't want publicly accessible. If you find information that you want hidden, enter your profile and either remove it or set it to hidden.
- Do a web search for yourself. Use any popular search engine to search your own name. Take note of what appears, and then do what you can to remove this information. For example, if a web search shows your profile for a high school reunion site, contact that specific site to remove your information.
- If you have unused accounts on old sites, go back and delete them to remove your information from that site's database.
- Limit the information you share. Even if you set everything to private, the companies that run the social networks still have access to all of your information. By limiting the amount of information you share, you'll limit the amount of knowledge these companies have about you.
- Disable location-based posting. Many social networks, such as Facebook, allow you to include the location you are at when you make a post. These locations are then saved to a database. Avoid sharing your location unless it is critical to your post that you share where you are.
- Understand that social networks make money off of advertising. By signing up for a social network, you are already compromising your privacy, even if you never post. Facebook can track your web use through the Like system, and Google does similar things with their +1 system. Even if all of your settings are set to Private, these companies will still use your information to attempt to sell you things.
Part 3 of 4:
Browsing
- Use a secure web browser. Internet Explorer comes bundled with all versions of Windows, but the browser is more susceptible to attack than browsers such as Firefox and Chrome. These browsers are available for free, so consider switching to help protect yourself from viruses and malware.[2]
- You should avoid using browsers like Tor or I2P since these sites are predominately used for illicit activity, and the simple act of using one may draw unwanted attention to you.[3]
- In general, stay off of the dark web when attempting to skirt surveillance. Unless you're extremely careful and well-experienced in navigating the dark web, you're likely to run into malware or worse.
- Avoid using unsecured networks. Wi-Fi networks that don't require a password--or even networks that do require a password but accommodate several people at once (e.g., an airport or a coffee shop)--put you at increased risk of having your data stolen.
- If you must use an unsecured network, refrain from logging into social media, bank accounts, or other sensitive places.
- Send a Do Not Track request. Websites can choose whether or not to honor this request, but in general it will lower the number of websites that track your actions online. You can turn this on in most browsers ion the Advanced section of the Settings menu.
- Do not assume that by selecting this you will no longer be tracked. Many websites will still collect your browsing information.
- Install an anti-tracking plugin. These plugins are typically much more effective than simply enabling Do Not Track, and they can be installed for free. One of the most popular plugins is DoNotTrackMe from Abine.
- uBlock Origin, which can be found in the Chrome, Firefox, and Opera app stores, is a well-reviewed app that blocks all ads in addition to attempts to access your IP address from third-parties and your ISP.
- Avoid major web services. Programs such as Skype and web services such as Google Search have recently been shown to be compromised by US government surveillance. To protect your web browsing and messaging, switch to programs that aren't located in the US, so that they do not fall under the jurisdiction of US law.
- Popular secure searching alternatives include Startpage (https://www.startpage.com/), DuckDuckGo (https://duckduckgo.com/), and Ixquick (https://www.ixquick.eu/).
- Popular messaging alternatives include: Jitsi (https://jitsi.org/), Pidgin (https://pidgin.im/), and Adium (https://adium.im/).
- Only provide personal information on sites protected by HTTPS. This is the secure form of the standard HTTP address, and data transferred to and from HTTPS websites is encrypted. Most secure sites will automatically load the HTTPS version of their website when you visit, but you can force it to load on all supported websites by using a browser plugin such as HTTPS Everywhere (https://www.eff.org/https-everywhere) for Firefox.
- If a site doesn't support HTTPS, then there is nothing that you can do to force an HTTPS connection. Avoid entering any personal information into these sites.
- You can identify a secure site by looking for the Secure indicator in your web browser. Each browser shows it a little differently, but in general you should see a lock icon or the word "Secure" next to the address of the site you are visiting. You should also be able to see 'https' at the beginning of the address.
- Connect to a proxy server. A proxy acts as a middleman between you and the internet. Requests are sent from your computer to the proxy, and then from the proxy to the internet. Results are returned in the opposite direction. This has the effect of masking your computer, as websites will think the proxy server is the one that is requesting the information.
- If you connect to the proxy through a VPN, then all of the data that is sent between your machine and the proxy is encrypted.
- Encrypt your emails. You can use GPG (a free encryption solution) to exchange encrypted email messages. GPG is end-to-end encryption that requires both the recipient and the sender have created and exchanged their GPG Public Keys. You can use GPG on Windows or on Linux.
Part 4 of 4:
Controlling Personal Information
- Find a list of data collection sites. There are multiple companies online that exist solely to collect data on you and then sell it to marketers. These sites take public records, social network information, browsing information, and more to create a profile about you that they can sell. Opting out of these lists can be time consuming and difficult.
- Remove yourself from the lists. Several sites have lists of the companies that collect data, as well as information on how to remove yourself. This typically involves emailing and calling the company until you reach someone who can delete your information. This can be a very time-consuming and frustrating process, as many of these companies purposefully make it difficult to remove yourself.
- Pay to have your data deleted automatically. There are services available that will delete your records from listing sites. These services essentially perform the same functions that you can do for free, but take care of it for you so that you don't have to spend your time trying to track down sites and people to talk to.
- These services are often subscription based. This is because even if you remove yourself from a list, you will often be placed back on it after a few months. These services repeat the deletion process every few months to ensure that you stay off the lists.
Update 24 March 2020
You should read it
- Google 'prioritizes' sites that use HTTPS protocol
- Learn about DNS Over HTTPS
- Instructions for setting up HTTPS for simple websites
- How to Remove Yourself from People Search Sites
- Enable DNS over HTTPS for apps on Windows 10
- What is HTTPS? and why is it needed for your site
- How does setting HTTPS affect SEO?
- Connecting over HTTPS is not necessarily safe
- Google Chrome will remove the Secure (Secure) label on the HTTPS website from September
- How to turn on HTTPS for your blog site
- How to enable DNS over HTTPS for all apps in Windows 10
- What is SSL? Is SSL important to the website?
Maybe you are interested
How to delete phone numbers on iPhone and Mac It's time to not consider the iPhone a luxury item anymore Vietnam is going to have Lotus social network, revolving around content, giving tokens to users Synthesis of wallpaper, beautiful fireworks photos in the new year Instructions for using Bluetooth on devices How to use Smarty Uninstaller to remove software completely on Windows