2. • Therefore, the right to privacy becomes more important, the
protection of network privacy issues become one of the biggest
problems caused by the Internet.
To strengthen the network
environment for personal
privacy protection, has
become a top priority. There
are some tools you can use to
protect your privacy,such as
wifi signal blocker.
http://www.jammer-
buy.com/wifi-jammer/c-
29.html
3. The Operating System Security:
• First of all, ensure the computer operating system security.The
important and urgent patches need to be installed.Since the
operating system has automatic update patch function now, the
system should update frequently to ensure security.
4. The Security of Mobile Phones:
• From the security, the common mobile phone inside the iPhone
security is not the best escape, use the iPhone need to "fingerprint
unlock" feature and "find my iPhone" feature open, while ensuring
Apple ID password security, using a unique security password.
5. • And if you are afraid of someone tracking your phone,a cell phone
signal jammer can help you.If the phone is lost, you should log in the
iCloud site in the first time, go into "find my iPhone" to enable "lost
mode", so others can not use any of your mobile phone (not even
brush machine) . http://www.jammer-buy.com/cell-phone-
jammer/c-24.html
• Secondly,call the operator to report the loss of SIM card In case of
emergency, you can remotely wipe the information inside the phone
in iCloud site.
6. The Security of the Software:
• Avoid the use of those suspected softwares which have the risk of
losing privacy as far as possible. As for some softwares developed by
small companies,you should use with caution, do not enter personal
privacy information inside. The choice of commonly used software is
also very important.
7. Two-step Verification:
• If you are using a two-step verification function, in theory, all sensitive
accounts should try to open the two-step verification, while the
mobile phone APP application produce a one-time random password.
• Then even if the hacker through other means to obtain the user's
password, because there is no random phone password, so still
unable to log on to the user's account.