Achieving digital privacy and anonymity is one of the best things you can reward yourself in this modern digital era. Although privacy and anonymity are two-faced, the good reasons to become private and anonymous outweigh the wrong reasons. Although one cannot achieve total privacy, you can always ensure that what is known about you is minimal. And here is how to do that;
Evite compartir en exceso su IIP
Personally Identifiable Information (PII) is any piece of information or data that can be linked to a specific person. This data is mainly composed of your name, your face, social security number, date of birth, your home address, location and everything that points to you. Most of the time, you can share this data without knowing for instance, when it’s requested by some online services or even in social media platforms. If it’s a service that you can do away with, think twice before giving out your PII. For instance, what if a data breach occurs? Or your details are hijacked by malicious actors?
Para estar seguro, ten siempre otro conjunto de tus datos que no puedan relacionarse contigo. Por ejemplo, puedes tener un segundo correo electrónico y utilizarlo para las compras en línea, otro para las redes sociales y asegurarte siempre de que sus contraseñas no estén relacionadas.
Evite el Wi-Fi público gratuito
Free public Wi-Fi is very enticing, and it can help you cut data costs. At the same time, it can be very costly if malicious actors intercept your internet traffic. Free public Wi-Fi has many vulnerabilities and threats lurking around waiting for unsuspicious users. Malicious actors can get to your data easily by eavesdropping, snooping, spoofing and even use other sophisticated attacks such as man-in-the-middle attacks. If at all you cannot avoid public Wi-Fi, use it for non-sensitive communication.
Evite los ordenadores públicos
Public computers can be a threat to your privacy if malicious actors have taken control. That’s, public computers may have keyloggers that harvest user input data or other spyware that collect information without the user’s consent. If, let’s say the public computers are free of malware and you really need o use them, always turn on incognito mode/private browsing.
Private browsing is not that helpful against online malicious actors, but it will help you preserve your local privacy, browser level. For instance, after you finish surfing the internet, the next person won’t know what you were up to as the browsing history and cookies are cleared. Some browsers provide the ‘Do not track’ feature.
Utilice aplicaciones y servicios centrados en la privacidad
Las aplicaciones y servicios centrados en la privacidad pueden ayudarte a garantizar que proporcionas el mínimo de datos y que el riesgo de que tus datos sean violados o accedan a ellos actores maliciosos será mínimo. Por ejemplo, puedes utilizar Duck Duck Go como motor de búsqueda, la aplicación Signal para mensajería y el navegador Brave para navegar por Internet.
Usar Tor
Tor es una red anonimizadora compuesta por varios nodos y repetidores. Al usar Tor, tu tráfico de Internet se encripta y luego se anonimiza al ser retransmitido por los diversos nodos de la red. Esta retransmisión se realiza de forma aleatoria continua, de modo que cuando tu tráfico llega finalmente a su destino, no se conoce el origen de tus datos, sólo se revela la dirección del nodo de salida. Esto dificulta que alguien pueda rastrearte. El resultado es un mayor nivel de anonimato capaz de proteger tu privacidad de la vigilancia e incluso del análisis del tráfico.
Utilizar una VPN - IPBurger VPN
A VPN provides both security and privacy. A VPN ensures that your internet traffic is secure by encrypting it and tunneling it through the selected server until it reaches its destination. A VPN uses unbreakable encryptions standards such as the AES 256 bit standard. Through the chosen server, a VPN also assigns you a virtual IP address which masks your real IP address. This virtual IP address also hides your actual location, and this gives you privacy.
Tor sobre VPN
A combination of Tor and VPN can help you achieve higher levels of anonymity. Especially when the using Tor over VPN set up. In this setup, you connect to a VPN and then to Tor. This hides your actual IP address from the Tor network, your Tor traffic will be encrypted further, and your internet won’t be visible to prying eyes.