2. Stay Anonymous
VPN (Virtual Private Network)
virtualised extension of a private network across a public
network, such as the Internet
created by establishing a virtual point-to-point connection
through the use of dedicated connections, virtual tunneling
protocols, or traffic encryption
masks IP address – more privacy for all online activities
WiTopia | AirVPN | CyberGhost VPN | TunnelBear VPN
http://www.techradar.com/news/the-best-vpn-services-and-
vpn-deals-of-2017
3. Stay Anonymous
Tor (Onion Router)
free software and an open network of volunteer-operated servers
that allows people to improve their privacy and security on the
Internet
using a Tor browser prevents others from learning location or
browsing habits (traffic analysis)
anonymous, but not private - slower connection!
https://www.torproject.org
4. Stay Anonymous
Trails (The Amnesic Incognito Live System)
a complete operating system
starts on any computer from a DVD, USB stick, or SD card
sends traffic through Tor network
use anywhere but leave no trace
https://tails.boum.org/
7. Own Your Data
Encryption
non encrypted files & media are not private
encrypt hard-drive: File Vault MacOSX | Windows 10 incl.
PGP (Pretty Good Privacy)
– used for signing, encrypting, and decrypting texts, e-mails, files,
directories and digital signature
MacOSX: https://ssd.eff.org/en/module/how-use-pgp-mac-os-x
Windows: https://ssd.eff.org/en/module/how-use-pgp-windows
8. Own Your Data
Back Up
create bootable OS
local back up: encrypted external drive
cloud back up: encrypted provider
Spider Oak | SugarSync | Backblaze
https://www.lifewire.com/online-backup-services-
reviewed-2624712
9. Protect Your Identity
Social Engineering | Phishing
never login into any account through email link
keep all software up-to-date
no login via social media accounts or google accounts
use https connections wherever possible
be aware of public WiFi
make up personal info - don’t give away information
use disposable email addresses
10. Protect Your Identity
Password Manager
LastPass | 1Password | Dashlane
https://lifehacker.com/5529133/five-best-password-managers
Two Factor Authentication (2FA)
a method of confirming a user's claimed identity by utilising a
combination of two different components
Authy: https://www.authy.com/app/
11. Damage Control
Anti-Virus Software
a computer virus is a program or piece of code that is loaded onto
your computer without your knowledge or permission.
never go online without anti-virus installed and firewall activated
Avast | Sophos | Avira and many more
http://www.tomsguide.com/us/best-antivirus,review-2588-6.html
12. Damage Control
Malware Detection (Malicious)
annoying or harmful type of software intended to secretly access
a device without the user's knowledge
types of malware include spyware, adware, phishing, viruses,
trojan horses, worms, rootkits, ransomware, browser hijackers
free: https://www.malwarebytes.com/mac/
learn about security: https://www.avast.com/c-online-threats
check your email accounts: https://haveibeenpwned.com/