How do You Protect Your Online Privacy? 129
P asks: "In the light of the recent discussions about on-line privacy: What can one do to protect his/her on-line privacy, while still having a enjoyable web experience? For example, are you using PGP for all your emails and Zfone for all your VOIP traffic? Or are there better ways of protecting oneself? Share your tips and tricks."
Disable Cookies (Score:3, Informative)
I also use adblock to disable tracking sites. You know, hitbox.com and the like which use included URLs to track you by your IP address.
Using a variety of tools... (Score:2, Informative)
For IRC, connect using SSL (If you trust the network admins. Even if you don't, still better than nothing) and perhaps through Tor as well. For email, anything PGP-ish.
Also, for protecting my files, I use TrueCrypt [truecrypt.org].
Re:Forget it (Score:2, Informative)
First, we''re not going to be fighting F-16s, MiGs? Sus? Yeah. Mirages and ChengDus? Maybe. But not Fs. Anyway, it might be able to, I don't know. The F-14 was capable of downing six over the horizon targets simultaneously, and we retired that.
You're bigger point about weapon systems being political decisions rather than military decisions is dead on though. The RAH-66 Comanche program started in 1983, and 21 years and $31 billion laters it was canceled. What did Army Chief of Staff Peter Schoomaker say in February 2004 about its cancelation?
That's just one example of an unneeded, and unwanted weapon systems. Unwanted by the military mind you. Why does this happen? The weapons mean jobs. And one one is going to vote against jobs in their district, and no one is going to vote against jobs in someone else's district for fear of retaliation. Why do you think the BRAC [defenselink.mil] is now (supposably) apolitical and is hella hard to appeal?
Whenever I think about how much money is being wasted on undesired weapons, I think of Eisenhower's 1953 speech to the American Society of Newspaper Editors: [eisenhowermemorial.org]
Of course he was nothing but a goddamn pinko. [msu.edu]
Cross platform tools (Score:2, Informative)
Some cross platform tools I use both under Linux and Windows:
But most importantly: /dev/brain
If you care about your privacy, don't give away your data to everyone!
Re:Disable Cookies (Score:4, Informative)
From
<script src="//images.slashdot.org/prototype.js?T_2_5_0_1
<script src="//images.slashdot.org/common.js?T_2_5_0_111a
<script type="text/javascript" src="http://a.as-us.falkag.net/dat/dlv/aslmain.js
<script type="text/javascript" src="http://an.tacoda.net/an/11711/slf.js">
<script type="text/javascript" src="http://a.as-us.falkag.net/dat/njf/104/slashd
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
<script type="text/javascript">
_uacct = "UA-32013-5";
urchinTracker();
</script>
Technologies to use... (Score:5, Informative)
Secondly use encrypted filesystems for data you want to keep private. I can recomend encfs for Linux http://arg0.net/wiki/encfs [arg0.net]... it's easy to use and can be installed with yum in Fedora. It uses file-level encryption which makes possible incremental backups which retain the encryption.
If you want protection from being forced by a court to give up your key, take a look at http://www.truecrypt.org/ [truecrypt.org] . This is a filesystem that lets you keep multiple levels of data encrypted with different keys, and if you give up one key noone can know that there's more data hidden with another key.
For web browsing use Tor, http://tor.eff.or/ [tor.eff.or]. Tor is still under development and may not be secure against a focused attack on you specifically, but at least your ISP won't be able to easily spy on you and your IPSs logs (which as we know are being mass-analyzed by the NSA) won't show anything about your activity. Also tor is
Plus, here's a good trick for ensuring that your web browser cache, history, etc., can't be easily searched by someone who gets access to your computer... put them on an encrypted filesystem, as follows. Make a script that mounts an encrypted filesystem (asking for the passphrase), sets your HOME env var to the newly mounted fs, then starts Firefox (which now places its cache there because that's HOME), and unmounts the encrypted fs after Firefox exits. You should do this even if your entire home dir is also on an encrypted fs, because your normal home dir is likely to stay mounted for longer periods of time, so this way you separate the risk levels. And it's easy. An additional little-known trick for this: set the LOGNAME env var to something other than your username to let you run a second copy of Firefox on the same X display (so you can have an "insecure" and a "secure" one running at the same time).
Of course use GnuPG for secure email. The Thunderbird Enigmail extension makes it painless.
You should also give money to the EFF and run a Tor server if you can, to help maintain our ability to have some privacy.
Finally, if you are a hardcore libertarian and/or think we should have a truly free Internet, experiment with FreeNet http://freenetproject.org/ [freenetproject.org] and consider donating to its development. This project ran into some dead ends with scalability but the developers have taken a fresh approach and the new 0.7 dev version looks like it might be the start of something that could get big. They have a full-time programmer working on it paid by donations (and he's so dedicated to the ideal that his salary is the bare minimum he needs to live), so consider donating. (Btw., I'm not a libertarian in the political sense, but I think we need a strong counter-balance to the marching forces of fascism, so I donate to the Freenet project.)
A secured-by-default network (Score:1, Informative)