Gass
Member
An entire industry has grown around buying all this information about our digital lives, combining it with information collected from websites like Google and Facebook, to produce the detailed information on your daily habits in order to sell you more stuff...
What will we do when the day comes when it not only affects the ads we see but the prices we are given and expected to pay as well - if it's not happening already.
Say someone's annual income reflects in the prices - that your collected data shows you have an interest in, more income equals a higher price your given, or if it's known that your more than likely to return an item as over half of what you buy has been returned - just two examples that can be multiplied by any number of entries in your profile contents of the collected data that is stored about you without your consent. Sold, shared, hacked this profile is linked to you !!!
No one can doubt how much we expose ourselves online by completing homework assignments, applying for jobs, banking, and performing a myriad of other daily tasks. In the era of “big data,” broadband providers do not need to look at the actual content you stream or download to learn about the likes and dislikes of everyone in your home, this gives ISPs a comprehensive view in your behavior, your ISP collects on the number of Internet connected “smart” devices as well, and how they behave (or us the users), this allows anyone with access to the information to construct a frighteningly accurate picture of our private life's.
“Google Web search” isn’t actually the only game in town. Less profit-motivated search engines like DuckDuckGo.com and Ixquick.com may take a little getting used to, but they do make explicit policy of protecting users’ browsing privacy.
Every time you send a message, post, or picture, you’re publishing it the same way CNN does a news story. And the internet never forgets. Thus "Never" so your data trails lead to BIG DATA Storage and profiles you.
“The traffic that an ISP can observe from such a gateway contains a significant amount of private information about user behavior. The same study from 2013 finds that network traffic can reveal significant information about user activity, including information about when a user is home; the number, type, and manufacturer of devices that they have connected to the network; and in some cases even the waking and sleeping patterns of users in the home. It is worth NOTING that we can observe these features of user activity even when the traffic is encrypted.”
This is happening at all levels now, from your ISP, OS, installed applications, metro apps, mobile apps to the websites one may visit, our Data is collected for harvesting our personal information, interests, habits, etc... Like examining a cross-cut of an adult trees growth rings you see an extended picture of it's life, so it's true with the collection of our data - just think of a two year period online what could be learnt of us.
The amount of information ISPs have access to multiplies when an ISP is also the customer’s cable provider. Cable companies can and do collect information from a customer’s set-top cable box. Your mobile phone tracks your daily locations then your cell ISP and should you connect to your homes Wi-Fi network all gain this information.
In a paper partially funded by Broadband for America, a coalition whose members include AT&T, Comcast, and Verizon, alleges that a user can shield their self from an ISP’s prying eyes by using encryption or Virtual Private Networks. But is this really true as fingerprinting technologies advance and combined with system and user profile ID-ing.
Does digital privacy belong to those who can pay for it and who can encrypt their traffic, or is privacy a right as Congress intended?
The FCC should follow the law and propose rules that recognize that consumers have the same right to privacy when visiting a website as they do when making a phone call. Privacy isn’t just for those who can afford it.
There are strong privacy protections for telephone communications. Broadband is today’s dominant form of communication and consumers should receive the same level of privacy communications in the 21st century as they did in the 1800’s.
The FCC, as the primary “cop on the beat” for telecommunications, needs to enforce the consumer’s long established right to privacy.
{In the Spoiler Tabs are Links to other Related information and you'll soon see a theme to some practices start to appear}
https://www.reddit.com/r/IAmA/comments/55t3ci/im_erka_koivunen_a_finnish_cybersecurity_expert/
EFF's Top 12 Ways to Protect Your Online Privacy
https://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy
https://cdt.org/blog/10-tips-for-protecting-your-digital-privacy/
https://www.theguardian.com/technology/2016/jul/03/online-security-measures-digital-privacy-guide
Digital self-defense
https://en.wikipedia.org/wiki/Digital_self-defense
Edit - bits and pieces I've shared here I've found across the web but, express my sentiment in part or as a whole of their line or paragraph. It is not from one source and some I've added to it contents.
EDIT-UPDATE 10/07/16
Gass
What will we do when the day comes when it not only affects the ads we see but the prices we are given and expected to pay as well - if it's not happening already.
Say someone's annual income reflects in the prices - that your collected data shows you have an interest in, more income equals a higher price your given, or if it's known that your more than likely to return an item as over half of what you buy has been returned - just two examples that can be multiplied by any number of entries in your profile contents of the collected data that is stored about you without your consent. Sold, shared, hacked this profile is linked to you !!!
No one can doubt how much we expose ourselves online by completing homework assignments, applying for jobs, banking, and performing a myriad of other daily tasks. In the era of “big data,” broadband providers do not need to look at the actual content you stream or download to learn about the likes and dislikes of everyone in your home, this gives ISPs a comprehensive view in your behavior, your ISP collects on the number of Internet connected “smart” devices as well, and how they behave (or us the users), this allows anyone with access to the information to construct a frighteningly accurate picture of our private life's.
“Google Web search” isn’t actually the only game in town. Less profit-motivated search engines like DuckDuckGo.com and Ixquick.com may take a little getting used to, but they do make explicit policy of protecting users’ browsing privacy.
Every time you send a message, post, or picture, you’re publishing it the same way CNN does a news story. And the internet never forgets. Thus "Never" so your data trails lead to BIG DATA Storage and profiles you.
“The traffic that an ISP can observe from such a gateway contains a significant amount of private information about user behavior. The same study from 2013 finds that network traffic can reveal significant information about user activity, including information about when a user is home; the number, type, and manufacturer of devices that they have connected to the network; and in some cases even the waking and sleeping patterns of users in the home. It is worth NOTING that we can observe these features of user activity even when the traffic is encrypted.”
This is happening at all levels now, from your ISP, OS, installed applications, metro apps, mobile apps to the websites one may visit, our Data is collected for harvesting our personal information, interests, habits, etc... Like examining a cross-cut of an adult trees growth rings you see an extended picture of it's life, so it's true with the collection of our data - just think of a two year period online what could be learnt of us.
The amount of information ISPs have access to multiplies when an ISP is also the customer’s cable provider. Cable companies can and do collect information from a customer’s set-top cable box. Your mobile phone tracks your daily locations then your cell ISP and should you connect to your homes Wi-Fi network all gain this information.
In a paper partially funded by Broadband for America, a coalition whose members include AT&T, Comcast, and Verizon, alleges that a user can shield their self from an ISP’s prying eyes by using encryption or Virtual Private Networks. But is this really true as fingerprinting technologies advance and combined with system and user profile ID-ing.
Does digital privacy belong to those who can pay for it and who can encrypt their traffic, or is privacy a right as Congress intended?
The FCC should follow the law and propose rules that recognize that consumers have the same right to privacy when visiting a website as they do when making a phone call. Privacy isn’t just for those who can afford it.
There are strong privacy protections for telephone communications. Broadband is today’s dominant form of communication and consumers should receive the same level of privacy communications in the 21st century as they did in the 1800’s.
The FCC, as the primary “cop on the beat” for telecommunications, needs to enforce the consumer’s long established right to privacy.
{In the Spoiler Tabs are Links to other Related information and you'll soon see a theme to some practices start to appear}
Earlier this year, Pew Research found that nearly three-quarters of internet users want more control over who can get their information. Consumers don’t want their financial, medical and other personal information shared, at least not without their permission.
Critics argued that because consumers could be confused, the government should not adopt new rules for ISPs unless those rules were imposed on everyone at the same time. In other words, because websites would not operate under the stronger rules, ISPs should not have to either. Limited privacy protections are what we have now, and nearly half of internet users surveyed say the current privacy regime leaves them confused, discouraged, and impatient.
The optimal solution would be to adopt strong privacy rules for both ISPs and websites, but unfortunately, this is easier said than done. The FCC can adopt rules of the road to protect people’s privacy only when it comes to ISPs.
Websites, on the other hand, are overseen by the Federal Trade Commission (FTC). Unlike the FCC, the FTC must follow an arduous process that makes it virtually impossible to adopt similar rules.
We need to make sure consumers’ privacy is protected, no matter where they go on the internet or how they connect. Congress should take this opportunity to fully empower the FTC, and give it the tools it needs to protect consumers from the unscrupulous practices of any company that can collect and monetize their data — whether it is a website or a cable company.
To fully answer the public’s call and maximize the economic power of the internet, the two agencies must do all they can to protect consumers by using the tools that they have today. That means the FCC must act now to finalize strong, new privacy rules.
Back in March the FCC voted to begin crafting new broadband privacy rules.
The agency was prompted to action by bad behavior from the likes of AT&T (which had begun charging users a premium if they wanted to protect their privacy) and Verizon (which has begun modifying wireless data packets to track user behavior around the internet).
The proposal is basic, simply requiring that ISPs disclose what they're collecting, and provide working opt out tools to consumers. ISPs, eyeing billions in new marketing revenue potentially hamstrung by informed and empowered consumers with the proposed ability to opt out.
The FCC's proposal to create privacy rules for ISPs is a result of last year's Open Internet Order, in which the Commission reclassified ISPs as Title II telecommunications services under FCC jurisdiction. This proposal has also gone through the necessary public comment periods. The proposal would create opt-in consent requirements from consumers for the majority of their data that is collected by ISPs. ISPs currently collect consumer data that includes information related to sensitive issues like health, finance, and e-commerce. This proposal will also give consumers greater control over their personal information. It's been over ten years since Congress mandated that ISPs' top privacy priority should be making sure consumer data is not misused. These rules are long overdue.
We face uncertainty with the approaching November election. A new administration could strip away these important consumer protections. We cannot afford to wait. These proposals are both necessary for a fair, competitive, consumer-friendly marketplace.
The 21st Century Privacy Coalition - which represents the largest cable and telecommunications companies - addressed the Federal Communications Commission’s recent efforts to protect online consumer data. The 21st Century Privacy Coalition, while supporting the general distinction made by the Federal Trade Commission (FTC) between “sensitive” and “non-sensitive” data, advocated for classifying broad categories such as “browsing history,” which generally contains sensitive information, as “non-sensitive.”
Relying on this framework, the following items would not be protected under a “sensitive-only” approach:
-Whether a subscriber has visited a website related to a particular medical condition or other private information such as websites related to sexual orientation or sexual abuse.
-Whether a subscriber uses a medical monitoring device or particular method of online payment.
-Which devices in the house are used by children, run applications designed for children, or are associated with such activities as homework.
The question has been whether the FCC should extend its highly successful cable privacy and phone privacy regime to include broadband, or whether the FCC should instead adopt the FTC’s approach.
Unsurprisingly, the broadband industry wants to cherry pick FTC precedent to construct a standard that would leave our most confidential communications subject to their prying eyes. This would break with more than 225 years of federal law consistently maintaining the privacy of our communications. We have never let letter carriers keep a log of where we send our letters.
We have never let the phone company sell to advertisers a list of whom we call. The FCC should not let broadband providers track our every website visit or application use.
Critics argued that because consumers could be confused, the government should not adopt new rules for ISPs unless those rules were imposed on everyone at the same time. In other words, because websites would not operate under the stronger rules, ISPs should not have to either. Limited privacy protections are what we have now, and nearly half of internet users surveyed say the current privacy regime leaves them confused, discouraged, and impatient.
The optimal solution would be to adopt strong privacy rules for both ISPs and websites, but unfortunately, this is easier said than done. The FCC can adopt rules of the road to protect people’s privacy only when it comes to ISPs.
Websites, on the other hand, are overseen by the Federal Trade Commission (FTC). Unlike the FCC, the FTC must follow an arduous process that makes it virtually impossible to adopt similar rules.
We need to make sure consumers’ privacy is protected, no matter where they go on the internet or how they connect. Congress should take this opportunity to fully empower the FTC, and give it the tools it needs to protect consumers from the unscrupulous practices of any company that can collect and monetize their data — whether it is a website or a cable company.
To fully answer the public’s call and maximize the economic power of the internet, the two agencies must do all they can to protect consumers by using the tools that they have today. That means the FCC must act now to finalize strong, new privacy rules.
Back in March the FCC voted to begin crafting new broadband privacy rules.
The agency was prompted to action by bad behavior from the likes of AT&T (which had begun charging users a premium if they wanted to protect their privacy) and Verizon (which has begun modifying wireless data packets to track user behavior around the internet).
The proposal is basic, simply requiring that ISPs disclose what they're collecting, and provide working opt out tools to consumers. ISPs, eyeing billions in new marketing revenue potentially hamstrung by informed and empowered consumers with the proposed ability to opt out.
The FCC's proposal to create privacy rules for ISPs is a result of last year's Open Internet Order, in which the Commission reclassified ISPs as Title II telecommunications services under FCC jurisdiction. This proposal has also gone through the necessary public comment periods. The proposal would create opt-in consent requirements from consumers for the majority of their data that is collected by ISPs. ISPs currently collect consumer data that includes information related to sensitive issues like health, finance, and e-commerce. This proposal will also give consumers greater control over their personal information. It's been over ten years since Congress mandated that ISPs' top privacy priority should be making sure consumer data is not misused. These rules are long overdue.
We face uncertainty with the approaching November election. A new administration could strip away these important consumer protections. We cannot afford to wait. These proposals are both necessary for a fair, competitive, consumer-friendly marketplace.
The 21st Century Privacy Coalition - which represents the largest cable and telecommunications companies - addressed the Federal Communications Commission’s recent efforts to protect online consumer data. The 21st Century Privacy Coalition, while supporting the general distinction made by the Federal Trade Commission (FTC) between “sensitive” and “non-sensitive” data, advocated for classifying broad categories such as “browsing history,” which generally contains sensitive information, as “non-sensitive.”
Relying on this framework, the following items would not be protected under a “sensitive-only” approach:
-Whether a subscriber has visited a website related to a particular medical condition or other private information such as websites related to sexual orientation or sexual abuse.
-Whether a subscriber uses a medical monitoring device or particular method of online payment.
-Which devices in the house are used by children, run applications designed for children, or are associated with such activities as homework.
The question has been whether the FCC should extend its highly successful cable privacy and phone privacy regime to include broadband, or whether the FCC should instead adopt the FTC’s approach.
Unsurprisingly, the broadband industry wants to cherry pick FTC precedent to construct a standard that would leave our most confidential communications subject to their prying eyes. This would break with more than 225 years of federal law consistently maintaining the privacy of our communications. We have never let letter carriers keep a log of where we send our letters.
We have never let the phone company sell to advertisers a list of whom we call. The FCC should not let broadband providers track our every website visit or application use.
Laptops, Smartphones, and other devices you use at home all connect to the internet through your router, if you have a setup like this. And so do web-connected devices such as Smart TVs and some security cams and children’s toys.
Outwit Your Smart TV
Automatic content recognition (ACR) systems built into many smart televisions transmit data to analytics companies that may use it for marketing. You’ve already paid for your TV with money. If you don’t want to pay again with your data, hunt through your TV’s “smart” settings for the feature—which may be called Live Plus, SynPlus, or anything but ACR—and turn it off.
Keep GPS Data Private
Facebook can extract your whereabouts from your mobile phone. But you can turn the function off using your phone settings.
For an iPhone, you'll find the controls under Location Services. If you've got an Android device, look under Facebook Permissions in Applications Manager.
Use some Password Math
A strong password can be your first and last defense.
Step 1. E stands for “entropy,” which is the opposite of an ordered pattern. Entropy is good: The bigger the E, the harder a password is to crack.
Step 2. Let’s say your keyboard has 95 unique characters. If you’re randomly constructing a password from that whole set, R=95.
Step 3. Let’s say you have a 12-character password. If so, L=12.
Step 4. The number R to the L power is 540,360,087,662,636,962,890,625—which is how many possible passwords you’ve got.
Step 5. That number is the same as 2 to the 78.9th power—and the log base 2 of that is 78.9. In info-security lingo, it’s 78.9 bits of entropy. That approaches the “exponential wall,” where a password could take ages to crack. And yes, 12 characters picked at random from a keyboard will do the job.
Use Separate Browsers
Set them both up to do all the security and privacy things their capable of, and install Adguard on your system, don't let one browser import passwords, bookmarks-favorites from the other browser -- this is meant of both browsers. Add the HTTPS Everywhere extension, which you can download from the Electronic Frontier Foundation, and your connections will be encrypted anytime you connect to a website that supports https. As some sites that support https use it inconsistently and the extension makes it's use more of a uniformed use.
Use One browser for your personal online affairs - use this one exclusively for banking, emailing, online purchases, etc...
In the Other One browser use is for everything else like online forums and reading news, web searches, etc...
If the Other One browser for everything else (being) other than your "personal affairs" is compromised (malicious attack) it can't affect (breach) any of your personal information such as credit/debit cards, banking account as it dosen't even know this information exists - as it contained in a separated browser.
Another way is to use an installed Password Manager and don't let any Browser know anything in this department of your personal information's.
Use Encryption Everyday
Encryption is for everybody—activists, journalists, secretaries, grandmas. When you mail a letter, you seal the envelope so no one can read it. It’s the same idea with your data and encryption.
Basically, encryption scrambles your data so that it’s unreadable by anyone who doesn’t have permission to access it.
Do Your Phone First
Your smartphone knows everything about you. New iOS and many Android smartphones are encrypted by default, if you have an older mobile OS, you’ll need to go into Settings.
Do Your Computer Files
You can encrypt your whole machine or just sensitive files. To encrypt specific files on a Mac, use the Disk Utility. Windows 10 Home users can download a free app such as GPG4win (aka Gnu Privacy Guard).
Do Your USB Drive
Flash drives can be misplaced—along with your files.
Keep Your Fitness Data to Yourself
Many wearables are paired with users’ smartphones using Bluetooth technology—but those phones may not be the only hardware scooping up the signals. A 2014 study by the security firm Symantec and a June 2015 study by Germany’s AV-Test.org found that many Bluetooth devices don’t prevent data access by “sniffers” located nearby. Fitness trackers and running watches can broadcast sensitive information such as the user’s name, address, password, and GPS data.
Not all trackers let you shut off Bluetooth, but many do. If possible, keep your wireless settings turned off until you choose to upload the data to your phone at the end of a workout or at night.
Just Fake Personal Information
Toymakers are rolling out connected kids' products—including tablets and talking dolls—and asking families to divulge personal information to register them. But that essentially provides marketers and potential hackers with details about your children. So consider providing fake information. For an address, may we suggest Bart Simpson’s—742 Evergreen Terrace?
Same for yourself when joining an online mediums - supply fake information and use temporary email services. Of course this is not meant for any e-commence unless you use cryptocurrency as a payment method.
Lock Down Your Baby Monitor
Hackers sometimes break into WiFi-connected babycams, even hijacking the speakers to talk to children and caretakers. That’s often because users don’t know to change the default settings. When you set up any internet-enabled camera, create a unique username and password. Also, turn off the babycam when it’s not in use. That will make hackers less likely to discover it.
-----------------------------
WIFI Privacy
Make your router more secure.
Find an Ethernet Cable
It’s safer to rely on old-fashioned wires and plugs, the freedom of wireless is not yours alone... Then use it to connect the router to your computer, other devices when using wireless - disconnect as soon as your done.
Get the IP Number
Every router has two IP (internet protocol) addresses, an external one for communicating with the internet through a modem and an internal one for your laptop, smart TV, and other devices. To make changes to your router’s settings, you need to access it through your browser using the local IP address. (Owners of Apple’s Airport routers who have a Mac can make changes via Airport Utility.)
Update the Username and Password
If you never changed the default settings, do that now.
Change the SSID . . .
Your SSID—service set identifier—is your home network’s name. Replace the default SSID with something more creative but not too personal. There’s no need to identify this as your network, is there?
Then Hide It
Router settings allow you to hide your WiFi network from prying outsiders. Note that once you do this, you’ll stop seeing the network pop up in your own devices’ WiFi lists, and you’ll need to type the SSID into each device you want to connect.
Embrace Encryption
You need to switch from WEP to WPA2-AES and disable the PIN method of using WPS. These acronyms represent ways to encrypt communications on your WiFi network. You want WPA2-AES because it’s the newest and strongest. If you have really old devices, they may not be able to connect this way. And that means it’s time to replace them.
Update Firmware
Some routers today automatically update their firmware—they check for updates, install new software, and reboot in the middle of the night. But not all of them do—and many routers that say they have automatic updates require users to log on and hit “Okay.” So do that
Make Sure Remote Management Is Off
Are you going to need to change your router settings when you’re far away from home? Probably not. Do you want to allow anyone else to do it? No, so make sure that this feature is disabled. It’s often referred to either as Remote Management, Remote Access, or Remote Administration.
Shut It Down
Going out of town? Turn off the router unless you need it to access smart devices such as your thermostat or a security camera.
Laptops, smartphones, and other WiFi-enabled devices can automatically connect to familiar networks.
That’s convenient—no one wants to enter a password for their home or work WiFi every day—but it can also be risky. A hacker can set up a rogue WiFi network with the same name as a legitimate one such as “Google Starbucks” or attwifi and trick your gadgets into joining it.
Periodically get a fresh start by using your devices’ network or WiFi settings to prune the networks you join automatically.
Most devices let you delete networks one by one, but if you have an iPhone or iPad, you need to go to Reset Network settings under General settings and delete all of them at once.
----------------------
Check on the Kids
Minors had their identity stolen 51 times more often than adults in a study by researchers at Carnegie Mellon University.
Keep an eye out for letters from collection agencies, bills for unpaid balances, or a warning that pops up when you try to file your taxes electronically if you list your child as a dependent. But sometimes there’s no hint that a minor is a victim of identity theft. To be safe, request reports from the three big credit-rating agencies by the time your children turn 15. That will give you time to clear up any problems before they apply for college loans, jobs, or credit cards.
Stop ID Theft After a Death
Identity theft affects 2.5 million estates every year, according to the IRS. If a loved one has died, send a copy of the death certificate to the IRS (the funeral home may help with that). Also, cancel any driver’s license, and notify credit agencies, banks, insurance firms, and financial institutions.
See the whole - 66 Ways to Protect Your Privacy Right Now
http://www.consumerreports.org/privacy/66-ways-to-protect-your-privacy-right-now/
Outwit Your Smart TV
Automatic content recognition (ACR) systems built into many smart televisions transmit data to analytics companies that may use it for marketing. You’ve already paid for your TV with money. If you don’t want to pay again with your data, hunt through your TV’s “smart” settings for the feature—which may be called Live Plus, SynPlus, or anything but ACR—and turn it off.
Keep GPS Data Private
Facebook can extract your whereabouts from your mobile phone. But you can turn the function off using your phone settings.
For an iPhone, you'll find the controls under Location Services. If you've got an Android device, look under Facebook Permissions in Applications Manager.
Use some Password Math
A strong password can be your first and last defense.

Step 1. E stands for “entropy,” which is the opposite of an ordered pattern. Entropy is good: The bigger the E, the harder a password is to crack.
Step 2. Let’s say your keyboard has 95 unique characters. If you’re randomly constructing a password from that whole set, R=95.
Step 3. Let’s say you have a 12-character password. If so, L=12.
Step 4. The number R to the L power is 540,360,087,662,636,962,890,625—which is how many possible passwords you’ve got.
Step 5. That number is the same as 2 to the 78.9th power—and the log base 2 of that is 78.9. In info-security lingo, it’s 78.9 bits of entropy. That approaches the “exponential wall,” where a password could take ages to crack. And yes, 12 characters picked at random from a keyboard will do the job.
Use Separate Browsers
Set them both up to do all the security and privacy things their capable of, and install Adguard on your system, don't let one browser import passwords, bookmarks-favorites from the other browser -- this is meant of both browsers. Add the HTTPS Everywhere extension, which you can download from the Electronic Frontier Foundation, and your connections will be encrypted anytime you connect to a website that supports https. As some sites that support https use it inconsistently and the extension makes it's use more of a uniformed use.
Use One browser for your personal online affairs - use this one exclusively for banking, emailing, online purchases, etc...
In the Other One browser use is for everything else like online forums and reading news, web searches, etc...
If the Other One browser for everything else (being) other than your "personal affairs" is compromised (malicious attack) it can't affect (breach) any of your personal information such as credit/debit cards, banking account as it dosen't even know this information exists - as it contained in a separated browser.
Another way is to use an installed Password Manager and don't let any Browser know anything in this department of your personal information's.
Use Encryption Everyday
Encryption is for everybody—activists, journalists, secretaries, grandmas. When you mail a letter, you seal the envelope so no one can read it. It’s the same idea with your data and encryption.
Basically, encryption scrambles your data so that it’s unreadable by anyone who doesn’t have permission to access it.
Do Your Phone First
Your smartphone knows everything about you. New iOS and many Android smartphones are encrypted by default, if you have an older mobile OS, you’ll need to go into Settings.
Do Your Computer Files
You can encrypt your whole machine or just sensitive files. To encrypt specific files on a Mac, use the Disk Utility. Windows 10 Home users can download a free app such as GPG4win (aka Gnu Privacy Guard).
Do Your USB Drive
Flash drives can be misplaced—along with your files.
Keep Your Fitness Data to Yourself
Many wearables are paired with users’ smartphones using Bluetooth technology—but those phones may not be the only hardware scooping up the signals. A 2014 study by the security firm Symantec and a June 2015 study by Germany’s AV-Test.org found that many Bluetooth devices don’t prevent data access by “sniffers” located nearby. Fitness trackers and running watches can broadcast sensitive information such as the user’s name, address, password, and GPS data.
Not all trackers let you shut off Bluetooth, but many do. If possible, keep your wireless settings turned off until you choose to upload the data to your phone at the end of a workout or at night.
Just Fake Personal Information
Toymakers are rolling out connected kids' products—including tablets and talking dolls—and asking families to divulge personal information to register them. But that essentially provides marketers and potential hackers with details about your children. So consider providing fake information. For an address, may we suggest Bart Simpson’s—742 Evergreen Terrace?
Same for yourself when joining an online mediums - supply fake information and use temporary email services. Of course this is not meant for any e-commence unless you use cryptocurrency as a payment method.
Lock Down Your Baby Monitor
Hackers sometimes break into WiFi-connected babycams, even hijacking the speakers to talk to children and caretakers. That’s often because users don’t know to change the default settings. When you set up any internet-enabled camera, create a unique username and password. Also, turn off the babycam when it’s not in use. That will make hackers less likely to discover it.
-----------------------------
WIFI Privacy
Make your router more secure.
Find an Ethernet Cable
It’s safer to rely on old-fashioned wires and plugs, the freedom of wireless is not yours alone... Then use it to connect the router to your computer, other devices when using wireless - disconnect as soon as your done.
Get the IP Number
Every router has two IP (internet protocol) addresses, an external one for communicating with the internet through a modem and an internal one for your laptop, smart TV, and other devices. To make changes to your router’s settings, you need to access it through your browser using the local IP address. (Owners of Apple’s Airport routers who have a Mac can make changes via Airport Utility.)
Update the Username and Password
If you never changed the default settings, do that now.
Change the SSID . . .
Your SSID—service set identifier—is your home network’s name. Replace the default SSID with something more creative but not too personal. There’s no need to identify this as your network, is there?
Then Hide It
Router settings allow you to hide your WiFi network from prying outsiders. Note that once you do this, you’ll stop seeing the network pop up in your own devices’ WiFi lists, and you’ll need to type the SSID into each device you want to connect.
Embrace Encryption
You need to switch from WEP to WPA2-AES and disable the PIN method of using WPS. These acronyms represent ways to encrypt communications on your WiFi network. You want WPA2-AES because it’s the newest and strongest. If you have really old devices, they may not be able to connect this way. And that means it’s time to replace them.
Update Firmware
Some routers today automatically update their firmware—they check for updates, install new software, and reboot in the middle of the night. But not all of them do—and many routers that say they have automatic updates require users to log on and hit “Okay.” So do that
Make Sure Remote Management Is Off
Are you going to need to change your router settings when you’re far away from home? Probably not. Do you want to allow anyone else to do it? No, so make sure that this feature is disabled. It’s often referred to either as Remote Management, Remote Access, or Remote Administration.
Shut It Down
Going out of town? Turn off the router unless you need it to access smart devices such as your thermostat or a security camera.
Laptops, smartphones, and other WiFi-enabled devices can automatically connect to familiar networks.
That’s convenient—no one wants to enter a password for their home or work WiFi every day—but it can also be risky. A hacker can set up a rogue WiFi network with the same name as a legitimate one such as “Google Starbucks” or attwifi and trick your gadgets into joining it.
Periodically get a fresh start by using your devices’ network or WiFi settings to prune the networks you join automatically.
Most devices let you delete networks one by one, but if you have an iPhone or iPad, you need to go to Reset Network settings under General settings and delete all of them at once.
----------------------
Check on the Kids
Minors had their identity stolen 51 times more often than adults in a study by researchers at Carnegie Mellon University.
Keep an eye out for letters from collection agencies, bills for unpaid balances, or a warning that pops up when you try to file your taxes electronically if you list your child as a dependent. But sometimes there’s no hint that a minor is a victim of identity theft. To be safe, request reports from the three big credit-rating agencies by the time your children turn 15. That will give you time to clear up any problems before they apply for college loans, jobs, or credit cards.
Stop ID Theft After a Death
Identity theft affects 2.5 million estates every year, according to the IRS. If a loved one has died, send a copy of the death certificate to the IRS (the funeral home may help with that). Also, cancel any driver’s license, and notify credit agencies, banks, insurance firms, and financial institutions.
See the whole - 66 Ways to Protect Your Privacy Right Now
http://www.consumerreports.org/privacy/66-ways-to-protect-your-privacy-right-now/
- Everything starts with fresh install. The bloatware just sickens me.
- I patch, harden and lock-down all my gear so that there is as little as possible attack surface to go after.
- I use full disk encryption together with strong password protection.
- I backup, backup my backups and locate the backups of my backup-ed backups somewhere else than my home (did I already say about encrypting your backups?).
- I keep a record of my family’s gear, encryption keys and backups; nobody remembers this by heart.
- I am wary of what networks I connect my devices with.
- I am conservative on who I let to our home networks. Nobody get in the inner parts of the network.
- https://safeandsavvy.f-secure.com/2016/10/06/7-ways-to-protect-yourself-like-a-cyber-security-expert/
https://www.reddit.com/r/IAmA/comments/55t3ci/im_erka_koivunen_a_finnish_cybersecurity_expert/
EFF's Top 12 Ways to Protect Your Online Privacy
https://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy
https://cdt.org/blog/10-tips-for-protecting-your-digital-privacy/
https://www.theguardian.com/technology/2016/jul/03/online-security-measures-digital-privacy-guide
Digital self-defense
https://en.wikipedia.org/wiki/Digital_self-defense
EDIT-UPDATE 10/07/16
10 golden rules for protecting your digital privacy
http://www.1sd.org/articles/10-golden-rules-for-protecting-your-digital-privacy/
6 Advanced Security Measures to Protect Your Digital Privacy
https://piwik.pro/2016/08/security-measures-protect-digital-privacy/
6 DIY Projects to Protect Your Digital Privacy
http://makezine.com/2015/07/01/whos-watching-you-protect-your-digital-privacy-with-these-diy-projects/
Ten low-tech ways to protect your privacy online
http://www.cnbc.com/2015/06/22/ten-low-tech-ways-to-protect-your-privacy-online.html
Online Privacy: How to Minimize your Digital Footprint
http://www.zonealarm.com/blog/2014/07/online-privacy-how-to-minimize-your-digital-footprint/
Protecting Your Digital Assets
http://www.ustrust.com/publish/ust/FEO/protecting-your-digital-assets.html
Teaching Privacy in the Internet Age
http://ikeepsafe.org/be-a-pro/privacy/teaching-privacy-in-the-internet-age/
Privacy in the Age of the Smartphone
https://www.privacyrights.org/consumer-guides/privacy-age-smartphone
http://www.1sd.org/articles/10-golden-rules-for-protecting-your-digital-privacy/
6 Advanced Security Measures to Protect Your Digital Privacy
https://piwik.pro/2016/08/security-measures-protect-digital-privacy/
6 DIY Projects to Protect Your Digital Privacy
http://makezine.com/2015/07/01/whos-watching-you-protect-your-digital-privacy-with-these-diy-projects/
Ten low-tech ways to protect your privacy online
http://www.cnbc.com/2015/06/22/ten-low-tech-ways-to-protect-your-privacy-online.html
Online Privacy: How to Minimize your Digital Footprint
http://www.zonealarm.com/blog/2014/07/online-privacy-how-to-minimize-your-digital-footprint/
Protecting Your Digital Assets
http://www.ustrust.com/publish/ust/FEO/protecting-your-digital-assets.html
Teaching Privacy in the Internet Age
http://ikeepsafe.org/be-a-pro/privacy/teaching-privacy-in-the-internet-age/
Privacy in the Age of the Smartphone
https://www.privacyrights.org/consumer-guides/privacy-age-smartphone
With rising concerns about identity theft and hacking in today’s data-driven world, it is important to know where security risks lie that might not be obvious. Internet-of-Things (IoTs), from coffee makers that are programmed to turn on when the user wakes up, to children’s toys that can connect to the Internet, have allowed certain features that have consumers saying, “how cool!”
But these Internet-connected devices usually require entering personal information about your home address, phone number, birthdate and more to set up your account and enable the WiFi connection. These “cool” features create a cause for concern as it provides a new way for hackers to access your personal information and identity.
A recent article by ABC Chicago covered the risks of having Internet-connected devices without secure passwords. Not only can other devices be easily hacked through the wireless connection after accessing one device, but the cameras in these devices can be used to spy on the user’s home–an even more frightening thought, especially for families with kids who may have WiFi-enabled toys.
Imagine a thief having a key to your bicycle lock, which then allowed them to access your car key, garage passcode and the key to your home. Soon they would have complete access to learn as much about you as possible and steal your information. This is effectively what can happen on a digital scale through IoTs if you do not use secure passwords. With new gadgets in your home after the holidays, now is a great time to make sure that your home is more secure by protecting your online identity.
Aside from hackers who want access to your personal information, marketers and retailers want to be able to read our habits across devices to discover more about us. Computers and location-tracking features are being added to many devices, from heart rate monitors and other health devices to cars and even newer model refrigerators.
Homeowners can access their home security systems and electricity via their Smartphones, and all of these devices require entering personal information into the account. While it is not illegal for them to conduct this cross-device tracking, you can safeguard your identity as much as possible by using a password manager and using a software to masked credit cards and email addresses to protect your private information.
This does not mean that you should throw away your computer and completely get off the grid. Many IoTs do provide useful features, and it is nearly impossible to work or live in the modern world without technology and a release of some of your information. This is a reminder to be proactive and stay as secure as possible by limiting tracking and creating strong, unique passwords for each account.
https://www.abine.com/blog/2016/the-internet-of-things-aka-the-interest-of-thieves/
But these Internet-connected devices usually require entering personal information about your home address, phone number, birthdate and more to set up your account and enable the WiFi connection. These “cool” features create a cause for concern as it provides a new way for hackers to access your personal information and identity.
A recent article by ABC Chicago covered the risks of having Internet-connected devices without secure passwords. Not only can other devices be easily hacked through the wireless connection after accessing one device, but the cameras in these devices can be used to spy on the user’s home–an even more frightening thought, especially for families with kids who may have WiFi-enabled toys.
Imagine a thief having a key to your bicycle lock, which then allowed them to access your car key, garage passcode and the key to your home. Soon they would have complete access to learn as much about you as possible and steal your information. This is effectively what can happen on a digital scale through IoTs if you do not use secure passwords. With new gadgets in your home after the holidays, now is a great time to make sure that your home is more secure by protecting your online identity.
Aside from hackers who want access to your personal information, marketers and retailers want to be able to read our habits across devices to discover more about us. Computers and location-tracking features are being added to many devices, from heart rate monitors and other health devices to cars and even newer model refrigerators.
Homeowners can access their home security systems and electricity via their Smartphones, and all of these devices require entering personal information into the account. While it is not illegal for them to conduct this cross-device tracking, you can safeguard your identity as much as possible by using a password manager and using a software to masked credit cards and email addresses to protect your private information.
This does not mean that you should throw away your computer and completely get off the grid. Many IoTs do provide useful features, and it is nearly impossible to work or live in the modern world without technology and a release of some of your information. This is a reminder to be proactive and stay as secure as possible by limiting tracking and creating strong, unique passwords for each account.
https://www.abine.com/blog/2016/the-internet-of-things-aka-the-interest-of-thieves/
Last edited: