jeudi 16 juillet 2015

How to protect your life with you computer?

How to secure your data that pass through the web? Here are 10 software and applications to better protect you while the 2014 balance sheet shows that the Internet information security and services of the largest players in the sector seem very permeable.Everything that goes through the Internet can be intercepted, listened and stored elsewhere. The emails you send, the files you share, the photos you post online ....And by whom? If one does not fall into total paranoia, many people can do it: government, spy, mafia, hacker ... It's easy on your side especially if you are not very careful.But do not worry! You are not alone and helpless! There are tools that, used properly, improve data protection without sacrificing ease of Internet use.1. A secure connectionNo connection ensures protection of your privacy and anonymity, but you can limit risk through a combination of tools to encrypt your data.With Tor, the bounce communications through a distributed network of servers (nodes), called "onion routers" that protect you against web sites that record pages you visit against external observers, and against the "onions routers "themselves. This ensures an anonymous browsing. In addition, it is an easy to use and configure.
This image illustrates the path that run through your data using Tor

But Tor does not guarantee that your traffic is not "listened", analyzed. For this, it must encrypt your connection and pass through a tunnel. That is what do VPN (Virtual Private Network). The best known are HotSpot Shield and UltraSurf.

Tor can be used in conjunction with a VPN connection speed will be lower, but you can walk around on the web for more anonymously.
2. A more discreet browser

The Web browser is probably the application that you use most in your day. So must it be safe and has security plugins. Better as a browser it is written with a free code.

An interesting browser Tor Browser, which is based on Mozilla Firefox and is pre-configured to work with the Tor service. You can also test SRWare Iron, safer version of Chrome that sends no data to Google. Using a portable version, your level of security will be further increased.

Ghostery identifies all cookies which track the websites you visit

To further secure your browser, also install extensions like Ghostery or DoNotTrack. Remember, however, that these solutions help you navigate more anonymously, but does not encrypt your data.
3. A search engine safe

Navigating often begins with a query on a search engine. And the research that you can tell a lot about you. Also, is it better to use a search engine that leaves no trace of your research.

Since the revelation of the PRISM case, the independent search engine DuckDuckGo has become one of the best alternatives to Google so little discreet: its results have a similar quality but it will not store your data related to your research.


 If you want to continue using Google, a safer option is Googlesharing, an extension to the browser that will increase your search queries by an anonymous server, which will prevent Google to partner with the search results.
4. A more secure messaging manager

If there is one place where one can find a wealth of information about you is your email manager.

SecureGmail is an extension that will encrypt your emails managed by Gmail. If you want to go even further, using solutions like PGP or GPG, the most secure encryption system. For convenience, there are extensions like MailEnvelope and Secure Mail for Gmail.

An encrypted email with SecureGmail

Want an extra level of security? Create an account CounterMail HushMail or two emails safe management services with integrated encryption. Another alternative is the use of temporary accounts as Mailinator and Guerrilla Mail.
5. Safer courier

You can not do without WhatsApp? Know that this is not necessarily the safest application. There are still few, its traffic was not encrypted and it was storing your messages in your mobile.

Fortunately, there are alternatives. For mobile phones, the two most interesting are Wickr (iOS) and ArmorText (Android) that can secure your messages with a very powerful algorithm. And very soon will arrive Heiml.is, an app that is revolutionary.

For your PC, you can use Cryptocat, a Firefox extension that lets you chat with a powerful encryption system. It is available in 32 languages ​​and is a tool used by journalists to such confidential communications, including talk of sensitive sources. Used in conjunction with Tor, Cryptocat ensures an anonymous communication for your messages.6. A secure storage of your archivesTo keep sensitive files, it is not necessarily recommended to store on services whose servers are located in countries that do not guarantee a secure and anonymous access. Following the PRISM case, such doubt remains about the services of the great American actors (Google Drive, Sky Drive).A solution like BitTorrent Sync, whose use is explained here, has an ingenious 256-bit encryption key system to share files and folders in an easy and safe way.
BitTorrent Sync is a very good replacement for Dropbox. But other alternatives exist: Bitcasa Mega and who rely on an encryption system for storing archives on their servers which only the user knows the key to gain access.

The big web players are also beginning to react. Google has just reinforced the encryption Drive to reassure its users.
7. A quiet place to publish text and images

The best known way to share content in a text format is Pastebin, a kind of clipboard in the cloud with which you can share your documents with good protection of your privacy. Something even safer? CryptoBin, which will encrypt the text with a possible key to bypass.

For images, services like Postimage Imgur or let you upload and store files anonymously. Imgur stated clearly: if the photo you upload is not publicly shared, it will be visible by anyone. To you, of course, be careful not to share links that lead to your images with anyone, or on social networks.8. An application for cleaning in your metadataAny document that you create or copy contains metadata information that can expose you.But cleaning is not difficult. Utilities like Doc Scrubber or MetaStripper help you for this task. The board for the most cautious is to never share a document with someone without deleting its metadata.Indeed, as the communication channel you use to transfer a file as it is, the GPS coordinates of a photo, time, or even your name can appear in the metadata.
9. A cleaner than own social profile

In the 10 commandments to manage its online reputation, we have already provided advice to protect your privacy. One of the tips is to clean your profile on different social networks you use.

Application Safe Sheperd, for example, can make you a detailed analysis of your online presence.

Another solution is to keep your profiles "official" on one side and to create alternative profiles of another ... The invented identities, helpful to participate in public life on the web without exposing yourself either. Not an auspicious solution if you think that transparency must be a cornerstone of the web, but effective. Be careful though. Networks such as Facebook require users to use their services with a credible identity. It is better not to appoint you Harlock or Grendizer ...10. A secure hard disk in your PC and in the clouds.Although online storage services are exploding, the main place where it is stored more personal information remains the good old hard drive.To keep your data away from too curious people - remember that computers are often the most stolen during a burglary devices - it is better to encrypt your hard drive. PGP can do the job, but the most effective solution is free TrueCrypt, which will secure you and all the data at once.


If your files are stored in Box, Dropbox or other cloud services, so try BoxCryptor, which gathers and encrypts your files in a folder before syncing it with the remote server. But as with TrueCrypt, if you lose your password, you can say goodbye to your archives ...
A little common sense, protecting the best tool for your data

Applications and software presented above will help you protect your privacy but nothing replaces common sense. Using these solutions do not exempt you from your responsibilities with the Internet.

Feel free to share your own tools to protect your privacy.






Aucun commentaire: