Surfing with a minimum of security

12 109
Avatar for SolarPhasing
3 years ago

Hello friends,

Today I will tell you some tips that I personally use to browse the internet with maximum security with respect to my privacy and my data. Privacy is very important! My 3 basic tips!

1. The first thing that seems essential to me: Change your default DNS of your ISP, and do not use those offered by Google. Take free Open DNS. For example:

- Open DNS Servers (how to set them with the link)

208.67.222.222 and 208.67.220.220

If you can setup them on your ISP Router/Box, It's better, because then, they are set for all your devices on your private network.

2. Use a VPN! 24 hours a day. 365 days a year. There are free ones that are effective: Proton VPN, for example. The ideal is to find interesting offers on solid VPNs, and above all: NO LOG. They do not keep your connection files.

3. Use a secure browser, if possible in private mode: Firefox, for example. Even if it's not my favorite. Take the opportunity to install essential Plugins like: HTTPS Everywhere, basically. For more pluggins, you will make your own choices. If you want, you can also use TOR browser too for even more privacy, even occasionally.

Your ISP will not be able to trace you through a VPN tunnel. And Google will stop recording all your actions. The interest of these tips is to surf in a safe way leaving as few traces as possible.

You can consider doing the same on a Mobile device.

See you soon.. BCH Rockers! :0)

No publication without some music, you know it now!

A #Music lover Playlist. Enjoy.

You can support my music art by a donationhttps://cointr.ee/solarphasing

A watcher

Next time on the subject: going more deep on settings.

61
$ 1.52
$ 1.47 from @TheRandomRewarder
$ 0.03 from @Secure
$ 0.01 from @sanctuary.the-one-law
+ 1
Avatar for SolarPhasing
3 years ago

Comments

Why do you think Google would stop recording your actions? Considering the distance Google goes to track users, I can't imagine they would ignore users just because of a VPN. If you don't use TOR, and perhaps even if you do, fingerprinting is also used by some destinations to identify you. Here is an interesting fingerprinting test site: https://panopticlick.eff.org/

Here is an interesting article on some fairly recent Google "privacy proposals": https://www.eff.org/deeplinks/2019/08/dont-play-googles-privacy-sandbox-1

$ 0.00
3 years ago

What you have shared is really very, very interesting! :0) Merci beaucoup!

$ 0.00
3 years ago

fingerprinting

That's why a browser in private mode is needed.

Edit: your link https://panopticlick.eff.org/ is cool! Thanks. :0)

$ 0.00
3 years ago

Very interesting. Well, simple: because over a VPN all is encrypted. With a VPN, your Ip is not your ISP Ip.

  1. You don't use the google DNS
  2. You navigate through the VPN tunnel. What Google can record in that case? :0)
$ 0.00
3 years ago

I see, I thought you meant Google wouldn't track you even if you searched on Google.com or Google ads existed on the sites you were visiting. Certainly they wouldn't be able to track your DNS once you stopped using their servers or your IP once you've gone through a tunnel. While some might, not every browser's privacy mode necessarily completely prevents fingerprinting.

Edit: Also, if you are using Google Chrome, it may collect and return some data the same way Windows 10 does, and it's on the other side of the DNS and VPN, so none of that is hidden from it.

$ 0.00
3 years ago
$ 0.00
3 years ago

TOR can have vulnerabilities, and I seldom watch videos, but I can tell you that most published "vulnerabilities" involving TOR are actually just regular vulnerabilities involving connectivity that TOR does not protect you from. For instance, one recent "TOR vulnerability" that I did hear about involved Bitcoin funds being stolen by exit nodes when TOR users went to anonymous exchange sites. The problem only affected user that did NOT use HTTPS because the malicious exit nodes could manipulate the communication between the user and the service without being detected (a man-in-the-middle attack that could also happen outside of TOR with a domain typo or DNS breach). As far as I know, no user that used HTTPS was affected. However, it would technically have been possible for HTTPS users to be affected if the malicious servers used invalid SSL certificates and the users ignored the invalid SSL warnings.

Anyway, the point is anything and everything can and will have vulnerabilities, so layered best practices are always advisable.

$ 0.00
3 years ago

I strongly advise against Google Chrome, and maybe even any chromium based browser. You are absolutely right!

Concerning the fingerprint, some pluggins are responsible for blocking these scripts. Or the 3rd party. I think even Adblock do it good. Keep in mind that 100% security is never guaranteed.

But your interventions are very interesting and relevant because to go further, it will indeed be necessary to modify some parameters on the browser, install some additional pluggins, and even tamper with certain options of the internet parameters of the machine (netbios, ipv6, for example..), and the firewall.

Nice to chat with you, man! :0)

$ 0.00
3 years ago

Nice article that is. Thanks for sharing

$ 0.00
3 years ago

Security is a essential thing for us,thanks a lot for sharing

$ 0.00
3 years ago

Nice article..... Security is a essential thing for us ... Cz in this mordern world there is many kind of hacker.... Thanks for the beautiful article

$ 0.00
3 years ago

Apni ki Hacker So nice Article Thanks for the beautiful Article

$ 0.00
3 years ago