Privacy Preserving Techniques

From Privacy Doctrine
Jump to: navigation, search

Privacy is only attainable when you are absolutely sure that nobody is watching. While it may theoretically be possible to attain this level of privacy on your offline computer for periods of time; it is impossible to be truly private when you are connected to the Internet normally. You can never be too sure of your privacy when you are online because there are many documented Privacy Invading Techniques, as well as some that are yet to be documented.

When you must go online, if you must go online, you should take every step possible to protect your privacy. Every privacy preserving technique requires time or money to use and has differing levels of efficacy depending on the threat model.



Online Privacy Preservation Techniques

Encryption

Encryption uses mathematics to guarantee the security of your encrypted data.

Full Disk Encryption

Use an open source program like VeraCrypt to encrypt your entire hard disk.

Password Managers

Password managers provide a way for the average privacy acolyte to use long and complex passwords.

- DO NOT reuse passwords. Use one password for each account - Use an open source password manager like KeePass before a centralised service such as LastPass, which has been hacked in the past.

HTTPS

HTTPS combines HTTP and TSL or SSL to securely communicate over the Internet.

HTTPS EVERYWHERE is an open source browser extension for Mozilla Firefox, Google Chrome, and Opera Browser which forces websites to use HTTPS instead of HTTP if available.

Virtual Box

A Virtual Box or Virtual Machine allows a user to simulate a separate device on the same physical computer.

Tor

Tor, or The Onion Router, is an anonymity network originally developed by the US government. By using successive layers, like an onion, and encrypting information such as the destination IP address, Tor obfuscates its users.

Shared Virtual Private Networks

Privacy users can use Shared Virtual Private Networks run by centralized services, but, they should never trust these services 100%. Shared Virtual Private Networks are beneficial because privacy seeking users do not need to be technically skilled to use it.

“Note: Using a VPN provider will not make you anonymous. But it will give you a better privacy. A VPN is not a tool for illegal activities. Don't rely on a "no log" policy.” - PrivacyTools Note on VPN

More advanced technical users can also set up their own virtual private server (VPS) to attain a new level of privacy. Using a combination of open source programs can help encrypt your Internet traffic. Virtual private servers are still susceptible to hardware level targeted surveillance techniques.

Web Browser Add Ons

Most of these web browser add ons work with Firefox, the most commonly recommended Privacy Preserving Browser.

"Web Browser Add-ons

   HTTPS Everywhere (Firefox, Chrome): forces HTTPS versions of websites were they are available.
   Adblock Plus (Firefox, Chome, Opera, Android): customizable ad-blocking plugin
   NoScript (Firefox, derivatives of Mozilla): highly customizable plugin to selectively allow Javascript, Java, and Flash to run.
   Disconnect (Firefox, Chrome, Safari, Opera): stops 3rd party tracking sites around the web.
   BetterPrivacy (Firefox): removes and deletes long-term “super-cookies”

- EPIC Recommended Web Browser Add Ons

   UBlock Origin: open source ad-blocking plugin
   Random Agent Spoofer: Changes parts of your browser fingerprint on a timer
   Decentraleyes: Loads Content Delivery Network resources locally
   Self-Destructing Cookies: Set self-destructing cookies

- PrivacyTools.io Recommended Web Browser Add Ons

Chat

Most people on the internet today like to chat in some way, shape, or form. To preserve privacy while chatting online one should use an encrypted solution.

Clients

Pidgin is the best application to use for this and is available on GNU/Linux, Windows, and OSX. Pidgin is free and open source which allows for the greatest preservation of privacy due to the fact that it is not likely spying on you and respects your freedom.

Pidgin does not include encryption and must be coupled with Off The Record (OTR) Messaging to be considered secure. There exists a plugin called pidgin-otr which adds OTR encryption to Pidgin. here Detailed tutorial on Pidgin and OTR installation is available here

Protocol

Jabber account registration is available at Open Mailbox , DukGo and the Calyx Institute

Offline Privacy Preservation Techniques

Avoidance

Avoid companies listed in the Privacy Doctrine Hall of Shame. Be on guard when you are physically or electronically talking to people that are known to use products or services of shamed companies.

Avoidance of all Privacy Invading Techniques is not always possible. As of 2015, it is still possible to take your avoidance to the next level by practicing active seclusion.

Seclusion

The concept of seclusion as privacy has independently sprouted up around the world, often led by esthetic monks. Hermithood has always been a fringe occupation and lifestyle in many cultures. Using physical barriers such as a floor or wall or cave to seek privacy from predators and other humans has been a part of human nature and is one of the origins of privacy.

Encryption

Encryption uses mathematics to guarantee the security of your encrypted data.