Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

How do You Protect Your Online Privacy? 129

P asks: "In the light of the recent discussions about on-line privacy: What can one do to protect his/her on-line privacy, while still having a enjoyable web experience? For example, are you using PGP for all your emails and Zfone for all your VOIP traffic? Or are there better ways of protecting oneself? Share your tips and tricks."
This discussion has been archived. No new comments can be posted.

How do You Protect Your Online Privacy?

Comments Filter:
  • Disable Cookies (Score:3, Informative)

    by Anonymous Coward on Tuesday May 16, 2006 @10:09PM (#15347650)
    About all I use online is a web browser. For this, I of course use Mozilla Firefox, but disable cookies (except for sites that I know really need them, like online banking) and disable certain javascript features (opening windows, removing location bar, etc.).

    I also use adblock to disable tracking sites. You know, hitbox.com and the like which use included URLs to track you by your IP address.
  • by ESRB ( 974125 ) on Wednesday May 17, 2006 @12:01AM (#15348169)
    Firstly, tor [eff.org] with Privoxy and a Firefox plugin that makes it easy to switch between it and a direct connection. Others may use FreeNet [sourceforge.net], but I personally don't bother.

    For IRC, connect using SSL (If you trust the network admins. Even if you don't, still better than nothing) and perhaps through Tor as well. For email, anything PGP-ish.

    Also, for protecting my files, I use TrueCrypt [truecrypt.org].
  • Re:Forget it (Score:2, Informative)

    by coaxial ( 28297 ) on Wednesday May 17, 2006 @12:36AM (#15348303) Homepage
    Demand that the DoD and other government agencies reduce their budgets while maintaining manpower to accomplish their missions. Do we really need to spend $200m on the F-22 when the $40m F-16 and F-18 is still good? Sure, the F-22 is nice, but would you rather be defended by a single F-22 or 5 F-16s? Do you really think a pilot in an F-22 could take out 5 F-16s?

    First, we''re not going to be fighting F-16s, MiGs? Sus? Yeah. Mirages and ChengDus? Maybe. But not Fs. Anyway, it might be able to, I don't know. The F-14 was capable of downing six over the horizon targets simultaneously, and we retired that.

    You're bigger point about weapon systems being political decisions rather than military decisions is dead on though. The RAH-66 Comanche program started in 1983, and 21 years and $31 billion laters it was canceled. What did Army Chief of Staff Peter Schoomaker say in February 2004 about its cancelation?

    [The] Comanche was a wonderful idea up until about 1989. [...] We started seeing that kind of threat disappear, and then it continued to disappear over the last decade." Commenting on the Schoomaker statement, Defense News wrote on 1 March: "Army officials say the move reflects the more elusive enemies and weapons that have emerged since Comanche was conceived in 1983 to find and fight Soviet tank formations. Stealth, once the RAH-66's biggest selling point, is now deemed unnecessary and expensive.


    That's just one example of an unneeded, and unwanted weapon systems. Unwanted by the military mind you. Why does this happen? The weapons mean jobs. And one one is going to vote against jobs in their district, and no one is going to vote against jobs in someone else's district for fear of retaliation. Why do you think the BRAC [defenselink.mil] is now (supposably) apolitical and is hella hard to appeal?

    Whenever I think about how much money is being wasted on undesired weapons, I think of Eisenhower's 1953 speech to the American Society of Newspaper Editors: [eisenhowermemorial.org]


    Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and not clothed.

    The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities.

    It is two electric power plants, each serving a town of 60,000 population.

    It is two finely equipped hospitals.

    It is some 50 miles of concrete highway.

    We pay for a single fighter with a half million bushels of wheat.

    We pay for a single destroyer with new homes that could have housed more than 8,000 people.

    This, I repeat, is the best way of life to be found on the road the world has been taking.

    This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron.


    Of course he was nothing but a goddamn pinko. [msu.edu]
  • Cross platform tools (Score:2, Informative)

    by Gallvs ( 784291 ) on Wednesday May 17, 2006 @03:39AM (#15348943)

    Some cross platform tools I use both under Linux and Windows:

    • Firefox with PermitCookies extension (to easily enable cookies on trusted websites) and BugMeNot extension (to avoid compulsory registration at popular websites)
    • When really needed (since it's pretty slow) Tor + Privoxy to surf anonymously
    • Thunderbird + Enigmail for email
    • Gaim + gaim-encryption plugin for IM
    • Truecrypt for disk encryption (latest version runs great under Linux too, although there is no GUI yet)
    • Throw-away email accounts like mailinator.com

    But most importantly: /dev/brain

    If you care about your privacy, don't give away your data to everyone!

  • Re:Disable Cookies (Score:4, Informative)

    by DrSkwid ( 118965 ) on Wednesday May 17, 2006 @03:47AM (#15348977) Journal
    the NoScript extension is also a MUST HAVE

    From /.'s homepage :

    <script src="//images.slashdot.org/prototype.js?T_2_5_0_11 1a" type="text/javascript">

    <script src="//images.slashdot.org/common.js?T_2_5_0_111a" type="text/javascript">

    <script type="text/javascript" src="http://a.as-us.falkag.net/dat/dlv/aslmain.js" >

    <script type="text/javascript" src="http://an.tacoda.net/an/11711/slf.js">

    <script type="text/javascript" src="http://a.as-us.falkag.net/dat/njf/104/slashdo t/mainpage_p2_top_right_skyscraper.js">

    <script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
    <script type="text/javascript">
            _uacct = "UA-32013-5";
            urchinTracker();
    </script>
  • by jurgen ( 14843 ) on Wednesday May 17, 2006 @07:11AM (#15349528)
    First off, use Linux. If your OS isn't reasonably secure, all bets are off, and Windows is just too difficult to keep secure for a casual user. With a good linux distro you're much better off so long as you keep it updated.

    Secondly use encrypted filesystems for data you want to keep private. I can recomend encfs for Linux http://arg0.net/wiki/encfs [arg0.net]... it's easy to use and can be installed with yum in Fedora. It uses file-level encryption which makes possible incremental backups which retain the encryption.

    If you want protection from being forced by a court to give up your key, take a look at http://www.truecrypt.org/ [truecrypt.org] . This is a filesystem that lets you keep multiple levels of data encrypted with different keys, and if you give up one key noone can know that there's more data hidden with another key.

    For web browsing use Tor, http://tor.eff.or/ [tor.eff.or]. Tor is still under development and may not be secure against a focused attack on you specifically, but at least your ISP won't be able to easily spy on you and your IPSs logs (which as we know are being mass-analyzed by the NSA) won't show anything about your activity. Also tor is /very/ easy to install and use, especially with Firefox and the FF tor extension. Also you can use it in combination with privoxy http://www.privoxy.org/ [privoxy.org] for some protection against malicious cookies and other tricks used by the sites you access.

    Plus, here's a good trick for ensuring that your web browser cache, history, etc., can't be easily searched by someone who gets access to your computer... put them on an encrypted filesystem, as follows. Make a script that mounts an encrypted filesystem (asking for the passphrase), sets your HOME env var to the newly mounted fs, then starts Firefox (which now places its cache there because that's HOME), and unmounts the encrypted fs after Firefox exits. You should do this even if your entire home dir is also on an encrypted fs, because your normal home dir is likely to stay mounted for longer periods of time, so this way you separate the risk levels. And it's easy. An additional little-known trick for this: set the LOGNAME env var to something other than your username to let you run a second copy of Firefox on the same X display (so you can have an "insecure" and a "secure" one running at the same time).

    Of course use GnuPG for secure email. The Thunderbird Enigmail extension makes it painless.

    You should also give money to the EFF and run a Tor server if you can, to help maintain our ability to have some privacy.

    Finally, if you are a hardcore libertarian and/or think we should have a truly free Internet, experiment with FreeNet http://freenetproject.org/ [freenetproject.org] and consider donating to its development. This project ran into some dead ends with scalability but the developers have taken a fresh approach and the new 0.7 dev version looks like it might be the start of something that could get big. They have a full-time programmer working on it paid by donations (and he's so dedicated to the ideal that his salary is the bare minimum he needs to live), so consider donating. (Btw., I'm not a libertarian in the political sense, but I think we need a strong counter-balance to the marching forces of fascism, so I donate to the Freenet project.)

    :j

  • by Anonymous Coward on Wednesday May 17, 2006 @10:04AM (#15350415)
    The solution you seek has already been implemented: anonetnfo.brinkster.net.nyud.net:8090 [anonetnfo....t.nyud.net].

Neutrinos have bad breadth.

Working...