Keeping Things Private Online

Transcription

Keeping Things Private Online
A
DIGITAL LIFE E-GUIDE
Keeping Things
Private Online
Ever had your status update read by more people than you
intended? Did your last embarrassing search query pop up while
showing something to your friend? Has anyone ever hacked into
your email account?
Anything you post or do online can be seen by strangers, used by
companies for advertising purposes, or even misused by people
with malicious intent.
Your online privacy is constantly at risk. Fortunately, there
are tools you can use to protect it. They will not only help you
minimize the amount of personal data tracked by websites and
services, but they can also be used to tighten the security of your
accounts, making sure no data goes out without your consent.
We’ve classified these privacy tools into three categories—browser
tools and features, online tools, and site/app settings and features.
Browser Tools
and Features
Plug-ins and Extensions
Plug-ins and extensions expand your browser’s functionality,
but did you know they can also increase your privacy? Some
extensions like Adblock Plus1 disable cookies and plug-ins that
track your activity. They also disable social media buttons,
which send your data to social networking sites like Facebook
and Google+.
Private Browsing
Don’t want anyone knowing about your frequently visited sites
or personal search queries? Opt for private browsing. It allows
you to go online without saving your personal information,
browsing history, or cache on the device you’re using. Most
browsers offer private browsing modes like Private Browsing
(Safari, Firefox), Incognito (Chrome), and InPrivate Browsing
(Internet Explorer). The option is available on some mobile
browsers like Firefox for Android.2
You can find the private browsing option under your browser’s
Tools, Settings, or Options menu. You can also use keyboard
short-cuts like Control/Command + Shift + N (Chrome, Opera)
or Control/Command + Shift + P (Firefox, Internet Explorer).
While private browsing clears your browser of your online
activities, websites, ISPs, and even your employers can still track
the pages you visit in real time.
1 http://adblockplus.org/
2 http://www.mozilla.org/en-US/mobile/
Delete Cache, Cookies, and History
Every time you go online, you leave a trail of digital “crumbs” in the
form of cookies, cache, and browsing history. Regularly deleting
these can remove traces of your online presence and activities.
There is a drawback though. Deleting cookies will require you to
enter your user name and password each time you visit a site.
You can delete your cookies, cache, and history by accessing the
Tools, Setting, or Options menu.
Disable Autofill/Autocomplete
Relying on browsers to remember your data might seem
convenient. Imagine not having to type the same things over and
over again. But this convenience can come at a price. The autofill
feature can reveal data you don’t want others to see, like your user
names and passwords.
You can disable this feature on the Tools, Settings, or Options menu.
Online Tools
Anonymizers or Proxy Avoidance Tools
If you want to make your online activity untraceable, use
anonymizers. These act as proxies between the Internet and your
computer. They hide any information revealing your computer’s
identity, such as your IP address and your exact location.
Anonymizers aren’t limited to desktop computers. Tor Project,
a non-profit organization specializing in secure and private
communications, offers desktop browsers3, an iOS browser4 and
an Android app5 to help hide your online presence.
Privacy Scanners
Just how much personal information goes in and out of the sites
you visit? Using privacy scanners, you can check your current
privacy settings on websites and get recommendations on what
to improve.
Privacy scanner apps are also available for mobile devices.
Trend Micro™ Privacy Scanner for Facebook lets you monitor
and control who can contact you or access your personal
information.6 Some privacy apps can even identify which of your
apps gather what type of information, so you can be aware of
any activity happening without your knowledge.
Self-Destructing Messages
Make sure no one else reads the private messages you send by
using self-destruct messaging services like BurnNote.7 Once your
messages are sent out to and read by your intended recipient, all
traces of them are deleted.
3
4
5
6
7
https://www.torproject.org/projects/torbrowser.html.en
http://itunes.apple.com/us/app/onion-browser/id519296448?mt=8
https://play.google.com/store/apps/details?id=org.torproject.android&hl=en
https://play.google.com/store/apps/details?id=com.trendmicro.socialprivacyscanner
https://burnnote.com/
Site/App Settings
and Features
Privacy Settings
Don’t settle for the default. It’s always better to tinker with your account
settings. Most social networking sites have a comprehensive list of
privacy settings. Facebook, for example, lets you control the how much
of your information people can view. Twitter also offers private accounts,
allowing you to screen who can view your tweets.
Some companies, like Google, provide you a master account for all their
sites. You can “turn off your Google Web History” so your search queries
and other activities won’t be linked to your online profile.8
Multi-factor Authentication
You don’t want strangers snooping in your email accounts and reading
your private messages. That’s why passwords exist, right? But relying on
passwords alone can be risky since they can be cracked.9 This is where
multi-factor authentication comes in.
Multi-factor authentication makes accounts more secure because it uses
“something the user knows” (your password) and “something the user
has” (a phone). Prying eyes won’t be able to open your accounts because
even if they guess your password, they will also need your phone,
containing the code you were sent.
Several services and sites now offer multi-factor authentication.
Facebook10, Google11, and Yahoo!12 all have settings for this feature. Other
sites like Amazon and WordPress support multi-factor authentication via
the Google Authenticator app.13
8
9
10
11
12
http://support.google.com/accounts/bin/answer.py?hl=en&answer=54057
http://arstechnica.com/security/2012/08/passwords-under-assault/
https://www.facebook.com/note.php?note_id=10150172618258920
http://support.google.com/accounts/bin/answer.py?hl=en&answer=180744
http://developer.yahoo.com/blogs/ydn/posts/2011/12/yahoo-introduces-stronger-user-authentication-second-sign-in-verification/
13 https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&hl=en
End User License Agreements (EULAs)
EULAs—those long and often confusing statements you need to
agree to before signing up for accounts—have become the bane of
users everywhere. In fact, a lot of users don’t bother reading them.14
Though the EULA is technically not a privacy feature, it can help
you gauge the amount of privacy you’re given. Familiarity with
EULAs is also an advantage, given how some sites change their
policies regularly. For instance, Instagram updated its policy to
claim the right to users’ photos without payment or notification.15
After much backlash, it removed that particular detail in its policy.16
14 http://www.theregister.co.uk/2012/12/04/feature_tech_licences_are_daft/
15 http://news.cnet.com/8301-13578_3-57559710-38/instagram-says-it-now-has-the-right-to-sellyour-photos/
16 http://news.cnet.com/8301-1023_3-57559890-93/instagram-apologizes-to-users-we-wontsell-your-photos/
Abuse and
Responsible Use
As the term implies, privacy tools are meant to protect
your privacy. However, these tools can also be abused by
cybercriminals to mask their identities and illegal activities. Your
fellow users could likewise misuse these tools for activities that
may be illegal or malicious.
Sudden and unannounced changes to EULAs can also be viewed
as abuse. EULAs may contain or add stipulations that may
actually be detrimental to your privacy.17 Your data can actually
be turned over to law enforcement without your knowledge.
So what can you do?
Familiarize yourself with privacy settings and tools. There are
many privacy tools offered online, most of them free. Also keep
yourself updated with the latest changes to the policies of your
frequently used sites. They may affect your online accounts and
the information you share. Always take the time to explore and
adjust your privacy settings accordingly.
Remember, everyone has the right to privacy, but this doesn’t
mean they should abuse the tools intended to protect that right.
Protecting your privacy comes with exercising your right to be a
responsible online citizen.
17 http://business.time.com/2012/08/28/7-surprising-things-lurking-in-online-termsof-service-agreements/
TREND MICRO
TRENDLABS
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global
cloud security leader, creates a world safe for exchanging
digital information with its Internet content security
and threat management solutions for businesses and
consumers. A pioneer in server security with over
20 years’ experience, we deliver top-ranked client, server
and cloud-based security that fits our customers’ and
partners’ needs, stops new threats faster, and protects data
in physical, virtualized and cloud environments. Powered
by the industry-leading Trend Micro™ Smart Protection
Network™ cloud computing security infrastructure, our
products and services stop threats where they emerge—
from the Internet. They are supported by 1,000+ threat
intelligence experts around the globe.
TrendLabs is a multinational research, development,
and support center with an extensive regional
presence committed to 24 x 7 threat surveillance,
attack prevention, and timely and seamless solutions
delivery. With more than 1,000 threat experts and
support engineers deployed round-the-clock in labs
located around the globe, TrendLabs enables Trend
Micro to continuously monitor the threat landscape
across the globe; deliver real-time data to detect, to
preempt, and to eliminate threats; research on and
analyze technologies to combat new threats; respond
in real time to targeted threats; and help customers
worldwide minimize damage, reduce costs, and ensure
business continuity.
Copyright ©2013 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend
Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.
LEGAL DISCLAIMER
The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice.
The information contained herein may not be applicable in all situations and may not reflect the most current situation. Nothing contained herein should be relied
or acted upon without the benefit of legal advice based upon the particular facts and circumstances presented and nothing herein should be construed otherwise.
Trend Micro reserves the right to modify the contents of this document at any time without notice.
Translations of any materials into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise
related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the
translation are not binding and have no legal effect for compliance or enforcement purposes.
Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any
kind as to its accuracy, currency or completeness. You agree that access to and use of and reliance upon this document and the content thereof is at your own risk.
Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing or delivering this document
shall be liable for any consequences, losses, or damages, including direct, indirect, special, consequential, loss of business profits or special damages, whatsoever
arising out of access to, use of or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this
information constitutes acceptance for use in an “as is” condition.