We are living in times of exponential technological advancement and this advancement is most noticeable in our digital lives.
Often we give up our personal information in exchange for access to some very useful tools. Tools such as Facebook and Google exchange our personal information for the services we are using, thus, making our information the product to be bought and sold.
I believe there is, inherently, nothing wrong with this exchange if governments, intelligence organisations and corporations are flowery little organisations with your best interests at heart and your data can be protected from hackers.
All this information is out there and exploitation is only a matter of will.
Using the internet without taking personal responsibility for your safety is like going to an anal party with arseless, leather, riding chaps and expecting to be able to sit comfortably after. Maybe your ass is not that interesting and you can get away with it but it’s better to wear pants just in case.
Here are just a few basic tips to help you understand some concepts and use some of the same tools I use. Part 1 is really just the basics, the bare minimum for owning a computer connected to the net. Part 2 is a little more involved and targeted to those who want to keep their rights.
I recommend reading through the links in the tips one by one and getting a reasonable understanding of each concept.
Generally just be serious about it, be vigilant don’t be lazy.
Issue: People making money off you/security
Use open source software
I hope to be a developer and get paid for making things but there are entire communities of heroes dedicated to making software for free.
Some examples are Linux, Firefox, WordPress and many of the programming languages used to bring you your tech. This site is made on WordPress using PHP programming language in a Firefox web browser on Ubuntu, Linux operating system, all open source software. Heroes, right?
I don’t know exactly how much safer Linux operating systems are but the system of permissions and file ownership is far more complex than windows and we can see by the graphic below that in the mind of a hacker they constitute a much smaller target at 1.7 %.
Although if you find this article useful you will probably find Linux operating systems quite the learning curve, worth it in my opinion. Data from Wikipedia.
Can we get an open source brewery?
If you haven’t already, find an adblocker plugin for your browser to remove annoying advertising banners.
Here is one for Firefox web browser https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
Issue: Securing your machine
You always want to be running your computer behind a firewall. Basically, a firewall decides what, on your machine can communicate with the outside world.
Your operating system usually has one but they are often included in anti-virus packages. I recommend that you check yours to see what programs are communicating to places outside of your system. Do not allow anything you are unsure of to send and receive data. If you don’t know what it does do a search ffs.
Everybody wants to rip you off, use your computer to attack somebody else or just Fk with your $x#t
I actually recommend paying some money for this, however, I personally don’t. Apparently, in the U.K your bank will provide one free
For those who don’t want to pay, here is what I do (on my windows machine):
AVGFree is a decent free antivirus software. Annoyingly it harasses you pay for the paid version, but it’s the price you pay.
I combine it with another free malware program.
Although controversial, and I need to do my homework on this one, I clean my computer registry with Ccleaner.
Basically, it finds and deletes old and temporary files from your system freeing up space and speeding up the antivirus scans. This can be done manually (do a search) but “Ain’t nobody got time fo’ dat”.
Get your shit together with passwords
1234, password, pa55w0rd, Tr3vor81, qwerty, or the same password on multiple sites.
No, no, NO and no! Go back and change it all NOW!
If you aren’t aware of a password cracking technique called brute forcing you should be.
In short, This attack is basically “a hit and try” until you succeed. You use software to shoot hundreds of combinations of usernames and passwords at a login page until you get hits. You can find for free or buy on the dark-web massive libraries of combinations and previously successful login/password combinations(don’t use the same password for multiple sites). Combine this with the sheer computational power of modern computers and you have an issue.
Here are some fascinating videos:
How it’s done(basically a guy doing what I talked about above).
How to choose a good password:
In summary: Use over eight characters, a combination of uppercase, and lowercase letters, symbols and numbers, while avoiding common words and names. Use 2 step verification wherever possible.
What is 2 step verification?
Basically where you link a phone number and or email address to your account and you need to verify any important action that happens on your account by link, SMS or smartphone application.
In Part 2 we will continue with security namely VPNs and using your computer on unsecured networks.
Then we begin with something “they” the Jews, communist jew, globalists, Kenyan muslim, shariaists nazis or whoever your paranoiac flavour of the day does not want you to know about, “PRIVACY”.
We will also cover Tor, secure apps for communication and the dark web.
Also, please if you disagree or want to add something please do so in the comments.