By Darren Chaker, http://darrenchaker.us, I typically post on TOR and give talks about cyber security, but could not resist to comment : Here’s the plan folks: when USA manufactured encryption is weakened, simply buy Russian, or any of the “546 encryption products from outside the US” per encryption guru Bruce Schneier. Besides the hype, the fact is the bill will never pass, but good to keep your options in mind!
On this note, and in honor of those who want to attack our privacy, it’s suggested:
- Use a PIN, at least 6 digits for our phone and turn on encryption; do NOT use finger print to get in your phone as you can be forced to swipe your finger (mixed cases say yes and no, currently before the Ninth Circuit).
- Encrypt your computer’s hard drive – BitLocker is good for Windows (Windows 10 Pro comes with it – do NOT save back up pass-phrase to Outlook email as it provided this option – and do not write it down), BestCrypt is one of my favorites. Apple computers and tablets (as well as Android tablets) come with encryption, so turn it on. Once encrypted, the hard drive is a useless brick – just be sure your pass-phrase (aka password) is complex.
- Use a history wiping utility – CCleaner is free and a good product for the typical person to wipe internet history, delete digital tracks, and wipe hard drive at least once a week; CyberScrub or East-Tec do the same, but with additional options, and are cheap ($20-60 range).
- Encrypt (WPA2) your WiFi connection with a password (do not use the factory PW); if you want ultra security, get a secure router, I use Sophos.
- When using free WiFi, use a Virtual Private Network (VPN) – this secures your info when away from home, and prevents the coffee shop selling your browsing data to third parties – remember – if it’s free – YOU are the product. It also prevents someone with technical know how from viewing your internet activities; and
- Go into your Google settings, and pause all search history, YouTube viewing history, location history, etc. While at it, delete the history too. If you like everything you do to be archived and available, that’s cool too. You decide your privacy fate.
Darren Chaker notes the above is the tip of privacy iceberg. It’s not everything one needs to do, but it is a lot more than most do. Keep in mind, doing the above helps protect the common folks, to the corporate executive whose computer is taken by a foreign company who wants to salvage corporate secrets from it.