Our private information is not safe online. We saw this in Netflix's 'Social Dilemma': big companies are constantly manipulating their users - molding them into their end product and to achieve this, there is a very heavy price to pay on ethics.
In this world, everything is allowed: collecting personal data and matching it to our every action, creating the perfect profiling and super efficient, tailored ads, and other similar practices.
That's why in 2021, it's crucial to know what actions to take when online to live it with peace of mind, benefiting from this new e-reality.
On this page, you’ll find:
Remember that time your mom ordered you not to accept candy from strangers? Well, we do that every day online, at least 52% of people do.
No, we're not really talking about that physical gift. Still, the chance to show other people how incredibly cool our lives are is tempting - and it drives us to provide truly personal information. Then, we use that same information as password recovery questions for other services or directly as our secret key: gateway to our intimate lives.
Also, who doesn't want to receive the IG story tag with "happy bday wishes" to repost? And who doesn't use the same birthday date as part of their personal password? Here comes XKCD's story of the correct-horse-battery-staple and the sage advice of creating silly nonsense stories that result in unbreakable passwords. Beyond that, two-factor authentication and similar features can also be an en-passant game changer when it comes to your privacy.
Related reading: How to protect data in the cloud: 9 best tips of 2021
Another thing that is almost always overlooked is the privacy of an email: many people make it visible on their Linkedin, but this is not a safe practice at all.
To avoid being included in email lists sold on the web, it can be useful to apply "address munging": basically it's when instead of entering firstname.lastname@example.org you include name[at]gmail[dot]com, this way algorithms have more trouble finding your email address and only real people can contact you.
Well, it actually still happens to be included in email lists that will be sold on the web, but you'll surely avoid a lot of spam.
N.B. This is where human complexity helps you out: a tip might be to replace the a in "at" with the a in another language that looks completely identical to the eye, but that the computer reveals instead as a different character. Or anything out of the box that you can think of.
You can use any tool you want, even a zero-knowledge encrypted service, but if you don't take care of your keys (and social engineering attempts to trick you!), good luck my friend!
Social engineering is based on human error: instead of processing a hacker attack on the server, the perpetrator manipulates the victim to gain access to the server directly through the front door.
And it's not just about stealing your credit card, your data - in whatever form you find it - is tempting: Have I Been Pwned is a tool through which you can check if they've stolen your password and it's currently being sold on the Dark Web.
It takes various forms:
The best prevention here is to know the problem: it's good to know that these dangers exist so we'll be aware the next time they try to trick us. Eyes open and let's find out the next tip on how to protect your privacy online.
We carry our cell phones with us all the time, to the point where it's a part of our extended lives. But we never think about the implications of that.
On one hand we have the apps we use: where turning off our location on Google Maps and keeping Wifi turned off are best practices. On the other hand, we also have a device that is directly connected to a SIM and can easily be swapped out by hackers to fool 2-FA and gain access to all your accounts.
That's why it's crucial to behave properly, using the right apps (i.e. install DNS66 ad-blocker + VPN!) and also keep it updated and truly protected as much as possible by doing updates, using antivirus and avoiding connecting it to public USB ports.
Also, a practice that seems annoying but really useful is to add a password to the screen lock: trivially, if someone gets physical access to your phone they have to guess! (i.e. you add an extra layer of security).
But isn't that the same thing? No, the difference is subtle but it does exist.
When we talk about privacy we are referring to all these things related to external people accessing our data as we mentioned with the Social Dilemma. But it also happens in a more tangible way in the US with the Cloud Act, where governments can ask to read your data from the service provider if required by law (which is why we strongly suggest choosing an EU-based, GDPR-friendly provider - here's a guide).
On the other hand, when we talk about security we are referring to encryption, data breaches and the like.
That's why suggestions like password strength, 2-factor authentication, level of encryption and the like refer to the second of the two worlds just laid out above. But let's think about it: if someone knows my password, they can access and read my data!
That's why I decided to leave a section to complete these tips on how to protect your privacy online with 6 security precautions:
Degooglise yourself! What a great motto, right?
But the reality is that the simplicity of these seemingly 'free' tools has made us increasingly dependent on them, and we can't break away from them. And while Google has promised many times to stop scanning content, the reality is that we're a long way from that.
Related reading: Cloud storage privacy & security: 6 things to consider
However, you've made it this far in your reading - you're aware of it and that's a good first step! To protect your online privacy it's time to act now, here are 5(+1) best practices to degooglise yourself:
eBlocker is a plug and play software to surf the internet anonymously and privately. It is free, open-source and you can simply install it on your Raspberry Pi. It protects you from trackers and ads while keeping your IP address anonymous. eBlocker is also our ally in the Privacy Avengers team - check it out! ⇒ eBlocker
Also, be careful with every tool you use. The story of Zoom is shocking: a video calling tool that in the aftermath of the pandemic has had a dramatic increase in use thanks to adoption by institutions like universities and prestigious firms worldwide. They were recently asked to pay $85 million for lying about their end-to-end encryption, instead sending data to Google and Facebook (read Arstechnica's article here).
The social dilemma we talked about in the article's introduction is a reality, and the task of this article was (I hope!) to make you aware that there is a way out.
Putting these 5 actionable tips on how to protect your online privacy into practice today will make all the difference in your daily life. If you want to achieve all-around peace of mind when it comes to privacy and security, get this free guide and start applying the 3-2-1 backup rule today!
Subscribe not to miss new articles and updates about Cubbit.
Cinquanta aziende provenienti da tutto il territorio italiano e da svariati settori - servizi, ICT e tecnologia, industria, meccanica di precisione, consulenza, cooperative e consorzi, PA, agroalimentare e FMCG - hanno aderito al programma della startup bolognese membro di GaiaX. Prende così vita, a partire dall’Italia, la prima rete B2B di cloud storage distribuito in Europa.
Wouter is a patent attorney, formerly at Nokia. After the WeTransfer security flaw, he switched to Cubbit for a file backup with end to end encryption.
Intervistiamo Daniele Righi, Chief Innovation & Business Development Officer di Linkem - riguardo alla sperimentazione Linkem & Cubbit per un nuovo paradigma di cloud distribuito.
Learn how you can secure your files in the safest place on the internet - plus subscriber-only special news and offers.