This document discusses how internet service providers can steal users' private data through HTTP logs, cookies, history stealing, and web bugs. It notes that ISPs then sell this data to third parties like organizations and governments. To protect privacy, the document recommends enabling HTTPS everywhere to encrypt web traffic, and using a virtual private network (VPN) to encrypt all internet activity and hide users' locations and identities from ISPs. It provides steps for setting up browser-based and network VPNs, and explains remote access and site-to-site VPN types. The overall goal is to educate about privacy risks online and effective tools for securing communications.
3. Why we need to secure our privacy
over internet?
Answer is simple...
It is just because of our ISP – Internat Service
Providers that provide us internet facility but
steal our private data like our location.
4. HOW THEY STEAL OUR DATA?
• HTTP logs
• Cookies
• History stealing
• Web bugs
• Understanding website traffic
5. WHAT THEY DO WITH OUR DATA?
Sell to third parties like organization or government
who wants to buy it.
6. SO HOW DO WE HAVE ANY HOPE OF
PROTECTING OUR PRIVACY NOW?
Well we are not fools. We’re going to take the actions
necessary to secure our family’s privacy against the acts of
reckless monopolies and their political puppets.
And we’re going to do this using the most effective tools for
securing online communication: Encryption and VPNs.
7. STEP 1: ENABLE HTTPS EVERYWHERE
HTTPS works by encrypting traffic
between destination websites and your
device by using the secure TLS protocol.
8. But even with HTTPS enabled, ISPs will still know — thanks to
their role in actually connecting you to websites
themselves — what websites you’re visiting, even if they don’t
know what you’re doing there.
9. STEP 2: USE VIRTUAL PRIVATE NETWORK (VPN)
• People have traditionally used VPNs as a way to get
around websites that are blocked in their country or to
watch movies, TV shows that aren’t available in certain
countries. But VPNs are extremely useful for privacy, too.
10. VIRTUAL PRIVATE NETWORK (VPN)
• Virtual because you’re not creating a new physical
connection with your destination — your data is just
traveling through existing wires between you and your
destination.
• Private because it encrypts your activity before sending it,
then decrypts it at the destination.
11. BROWSER BASED VPN
If you just want a secure way to browse the web without
ISPs being able to easily snoop on you and sell your data,
Opera is a great start.
Step #1: Download Opera Browser and install it
Step #2: Turn on its ad blocker
Step #3: Turn on its VPN
Step #4: Install HTTPS Everywhere
12. NETWORK VPN
There are two basic VPN types which are explained
below.
1. Remote Access VPN
2. Site – to – Site VPN