Last month I shared my concern about our diminishing privacy. Now I hope to share some ideas about how you can protect yourself. The key is encryption. Below I’ll give practical steps that you can take. I’ll cover a lot of different areas, I recommend doing as much of this as you’re comfortable with. The strategy is to encrypt everything. Most of these are easy to implement, so regardless of your background or technical ability you’ll be able to make a difference. The goal here is to become more secure in your daily life.
Your connection to the web should always be secure, which means enabling WPA2 encryption on your router at home and avoiding public networks. If you do need to surf on public wifi (coffee shops, airports, etc) then I strongly recommend that you take precautions to protect yourself. Disable sharing, turn on your firewall and use a VPN. I’ve used OpenVPN while traveling and I loved it. There are plenty of VPN services available. Protip, the Premium version of Disconnect blocks malware and is a VPN as well.
The best option here would be to avoid the companies known to have leaked to the NSA, but I’ll concede that isn’t realistic. Fortunately you have options. First, get the HTTPS Everywhere plugin for your browser and turn it on. Second, try DuckDuckGo or StartPage instead of Google, Bing or Yahoo.
Block ads & tracking scripts
Start with the simple, enable do not track within your browsers. Next, get the Disconnect browser plugin and configure it to block your browser from responding to requests. Finally, get Ad Block Plus and turn it on.
Encrypt your computer
This one used to be a challenge, but recently operating systems have appropriately taken over and now its a pretty straight forward task. For Windows you’ll enable BitLocker. For OS X you’ll turn on FileVault. Both of these are robust, well supported and easy to turn on. Just don’t forget your password. There are options for Linux as well, but my guess is that if you’re using Linux you don’t need my help.
Encrypt your data in the cloud
If you use a cloud storage service like Dropbox, Google Drive, iCloud or Box, your connection may be secure but if your files are unencrypted than anyone that gains access to those services has your pictures & files. These services have become a target for precisely this reason. There are a couple of options. If you already have files stored in one of the above services, you can use Boxcryptor or Viivo to encrypt what’s already there. These are freemium services so there’s a free option that will work for most, and a subscription option for more advanced features. They support most storage providers and most platforms, which makes them a great option. The next level would be choosing SpiderOak or Tresorit, which are zero-knowledge, secure cloud storage services. They both offer a free plan and modest fees for increased storage.
Encrypt your phone
Your phone goes everywhere with you. If it is lost or stolen, all of your data is ripe for the picking. Passwords aren’t enough to keep people out, you need to encrypt it so that the data is hidden. The good news is that it’s simple. Android, iPhone & Windows Phone each have native tools to easily enable this feature. In fact, for these devices phone encryption is just a setting.
This is the trickiest one of all. Until recently encrypted email has been challenging enough that for most people it wasn’t worth the effort. It’s also, in my opinion, the most important. Your email tells just about everything there is to know about you in one spot. Your friends, your interests, your calendar updates, where you bank, and more. This really could be its own series of blog posts, but my goal here is to keep things simple. For Gmail, Yahoo & Hotmail, you want Mailvelope, which is a browser plugin for Firefox or Chrome that simplifies the steps involved in PGP encryption. A better option would be to switch to a free secure email provider like ProtonMail or Tutanota. These services handle end-to-end encryption for you.
If you take these steps, you’ll both protect yourself from being a target for hacking, and protect your identity while online. Without the keys to decrypt it, it just looks like static or junk data. In fact, it IS junk data.
I’ve covered these topics pretty quickly. If you’d like to know more, I’d encourage you to do some investigating and educate yourself.