Do you feel like someone is spying on you while you’re browsing the Internet? Are you worried about your safety? Well, if you’re wondering how to protect your privacy online or how to stay anonymous, you’ve found the right place.
The Internet has made the world a better place. We can’t deny that. But these days a lot of people worry more and more about their privacy online. And they have the right to do so. We hear every day about hacker attack, global surveillance, spying, tracking.
These are all excellent reasons why you should be seeking tips on how to protect your privacy online.
What do you need to protect your privacy?
Even if you’re not worried about Big Brother watching and don’t kid yourself that he isn’t, it’s still crucial to protect your online privacy. If you’re not careful, unfamiliar people can learn tons about you just by hacking your accounts or by stalking your online activity.
You may say “I’m not a programmer, I don’t know how to do complicated stuff.” Well, I’m not going to teach you to be a computer expert, but I’m going to show you some simple things you must do to protect your privacy.
To protect your privacy online, you just need a couple of things:
So now let’s see what steps you have to take to protect yourself.
#1 Get rid of Windows
Most of you are probably using Windows as their primary operating system. Well, then I have some bad news for you. The most recent version of Windows – Windows 10 raises a lot of concerns when it comes to the safety and security of its users. For example:
To protect your privacy, you have the following options:
Linux is open source software, and therefore, a person with computer skills can notice if anything is wrong with the code. For example, someone spying on him.
Moreover, most viruses and malware are written for Windows. This means that they won’t target Linux users. The big con is that most programs and applications also run mainly on Windows. But there are many Linux option out there if you’re willing to make the change. In addition to this, Linux:
If you choose the second option, here’s what you must do:
- Click the windows icon in the taskbar.
- Choose “Settings” and go to “Privacy.”
- Go to “General” and turn off all four settings.
- Then go to “Location” and again turn it off.
- Disable “Speech, inking &typing.”
- After that go through all the others settings and disable everything you’re not comfortable with.
- Check this guide for more information.
- Disable Cortana if you’re using it.
You can also go back to previous versions of Windows – Windows 7 or Windows 8.
#2 Use VPN to protect your identity
You’ve probably heard about VPNs, and maybe you’re using one. Then you’ve made an excellent step towards protecting your identity and privacy online. If you haven’t, let me explain why you need one.
Then you Virtual Private Networks (VPNs) create an encrypted tunnel between you and the Internet servers. All your traffic goes through that tunnel, and no one can see what you’re doing on the Internet. Moreover, a VPN hides your IP address and provides you with anonymity because no one can pinpoint your location.
If you’re not using a VPN, your connection to your IPS is not encrypted. This means that anyone from hackers to the government can see what you’re doing. If that’s not enough, ISPs can sell your data to third parties. While those individuals might not have malignant intentions, it’s still not a pleasant thought.
VPNs are also handy if you want to avoid geographic restrictions. For example, you’re in France, but you want to access the US Netflix catalog.
However, don’t ever use free VPNs. You know the saying "There is no such thing as a free lunch" right? Well, that’s very true when it comes to free VPNs because they are not safe.
Let me tell you why you shouldn’t ever trust a free VPN:
Here are some paid VPNs that have been checked and have proven to be trustworthy:
To install the VPN, just visit your selected website and follow the provided instructions. For optimum security, you can also get a VPN router to secure all electronic devices.
#3 Stop using Google
Get rid of Google. Yes, that right. Google is undoubtedly the most popular search engine. And it keeps an eye on all your activity, especially if you have a Google account. It uses this data to build a profile of the user to “personalize the user’s experience.” Fancy words for spying, if you ask me.
So, the first step – stop using Google. Oh, no! What I’m going to do without Google! Don’t worry. There are alternatives to Google, and I’m not talking about Yahoo or Bing:
To install, DuckDuckGo on Firefox:
To install, DuckDuckGo on Chrome:
- Open Chrome.
- Copy and paste the following address - https://duckduckgo.com/
- Choose “Install DuckDuckGo.”
- Follow the instructions.
One more thing, if you’re still using Google, don’t ever use voice search. Or any similar software that allows you to dictate messages. Everything you say gets recorded. Everything. And who knows who gets this information.
As long as you’re up to the task, you might also delete your Google account. Here’s a video that will show you how to do it.
#4 Stay away from ads
You visit your favorite website, and you see an interesting ad. You click on it. Sounds innocent enough, right? Very, very wrong. An important rule of online privacy – ads are not your friend.
First, ads are dangerous because they might contain malware, which you can download on your computer with one click. Moreover, there are many pop-up ads which claim to offer “legitimate” software but do the opposite.
Once infected, this malware will wreak havoc on your system, steal personal information, slow your laptop performance, change your settings. You get the picture, right? And if you don’t have a good antivirus program, you might never learn that you’re infected until someone steals your money, online information or identity.
Moreover, ads are used to track the user’s behavior and activity, and they try to sell you stuff all the time. It can be annoying to see the same thing over and over again or to stumble upon pornographic ads.
Cybersecurity researchers also warn that viruses can be embedded in the main scrip of the page and you might get infected just by opening the site. That happened a while ago to people who visited legitimate sites like MSN, BBC, New York Times, etc. They got infected with the ransomware.
Ransomware encrypts all the date on your device. And they want money to give you the description key. But no one can guarantee that you’ll get your data back if you pay. So, don’t throw your money away.
In case, you got infected with ransomware before reading this article the best thing is to get over the loss of your information, reinstall your OS and take precautions.
However, the solution is simple. I’m going to offer you three choices:
For basic security purposes, you must install a browser add-on which blocks ads. You can use uBlock Origin or uMatrix for Firefox, and AdBlock for Chrome. To do that visit the “Add-on” section in your browser and follow the installation steps.
The good thing about these add-ons is that they are free, but the con is that they make it easier to track your activity (browser fingerprint). We’ll talk about it in a moment.
The other option is to install a VPN with an integrated ad blocker. I highly recommend that because the malicious and bothersome ads will be blocked right at the VPN server and they won’t get anywhere near your laptop.
The last option is to buy an eBlocker. This is a handy device that allows you to serve the net anonymously. It not only blocks ads, but it also hides your IP address and prevents tracking. eBlocker also can be connected to the Tor browser or a VPN for added anonymity.
Moreover, it’s entirely legal, and it doesn’t require any software or installation. Just plug it into your router, and you’re ready. But it’s more expensive than the VPN.
#5 Change your browser
Most browsers - Chrome, Mozilla, Internet Explorer, Microsoft Edge –gather and store information about the sites you’ve visited. But if you can’t use these popular browsers, what can you use?
The answer is Tor – (The Onion Router), an open network, which has been built to protect its users from tracking and helps them blend with other Tor’s users. While the Tor Network might be too slow for some of you, the Tor browser is just a modified version of Firefox with added security.
Here is how to use Tor browser with no Tor Network:
- First, download Tor for your OS.
- Install it.
- After that, go to “Options” and click “Preferences.”
- Select “Advanced,” then “Network” tab and “Settings.”
- Mark “No proxy” and click “Ok.”
- Copy this about: config into the URL box.
- Hit enter.
- Copy and paste this network.proxy.socks_remote_dns into the search box.
- Double click to disable.
- Repeat the previous two steps with extensions.torlauncher.start_tor.
- And you’re ready.
Keep in mind that if you want to use the Tor browser without Tor Network, you won’t be completely anonymous. You should also get a VPN.
Keep one more thing in mind. Most people use Tor browser with Tor Network. So you might leave a unique browsing fingerprint. We’ll talk about this in a moment.
Here’s a video you can watch to help you with the installation of the Tor browser.
# 6 Don’t leave a browsing fingerprint
When you touch an object, you leave a fingerprint. Browsing fingerprint is something similar, which can be used to track you. And it’s very efficient because it takes into consideration the following factors:
So the more extensions and add-ons you have, the more unique you are and easier to find. Check how unique your browser is here.
#7 Don’t use free emails
While Gmail, Yahoo, and Outlook are good free email services, they are not safe when it comes to your privacy online. When you’re sending an email, everyone interested in it can read it – your ISP, hackers, the government.
In addition to this, your message is not encrypted, and it’s stored on the servers of your email provider. And there is no way for you to detect if anyone has read what you’ve written.
The solution is a simple one. Start by deleting your old email account. For Gmail follow this procedure:
Then, choose a secure email provider. I’m recommending ProtonMail because:
#8 Secure/Delete your social media accounts
Probably a lot of you have a Facebook account where they share stories and photos, tag friends and post comments. It all seems innocent, right? Well, it isn’t.
A stranger can observe your profile and learn small things about you – your name, birthday, where you live or work, how you look like- and use this information to his advantage.
So, rule number one when it comes to online privacy – don’t share your life on Facebook, Twitter, Instagram, etc. You can’t have privacy and security if you post updates regularly and inform everybody what’s happening to you.
Use fake information if you want to keep using the social media and don’t ever post selfies. That’s an essential rule, especially when it comes to your children or allowing children to have social media accounts.
And don’t tag yourself when you go somewhere. You’re saying “I’m not home, come and rob me.” Remember that not all people on Facebook are there to have fun, some are stalking and looking for their next victim.
The best thing will be to delete your social media account. Brutal, I know, but necessary if you want to be anonymous and safe. And it’s simple. Just click here and select “Delete my account.”
If you’re not ready for this, remember these simple rules:
# 9 Secure your cell phone
When you take care of your computer, it’s time to think about your phone. If you want security and privacy, the step is easy – don’t use your smartphone or iPhone. I know, shocking. Take a deep breath. It’s not the end of the world. People have lived without phones for centuries.
Today cell phones are something more than a device, which allows you to talk with friends and family. In fact, cell phones have turned into miniature computers on which you play games, chat with people, log into Facebook, and so on. But:
If you don’t plan on getting rid of your brand new iPhone X8, then be smart and think. A simple app like a flashlight doesn’t need access to your contact or messages, and if it wants to access, there is something fishy. Also:
You have another option. There are new brand phones, which are built with the security and safety of its users in mind. For example, the encrypted phone Blackphone.
When you send a message or call someone, your date goes through a private cloud VPN so no one can read your text or spy on your calls. Moreover, since it uses a modified version of Android, you can change the settings on your apps and what they access. And it’s not that different from other smartphones on the market.
Your other option is to get one of these old phones that look like small bricks and use them only for calling, but no texting.
#10 Update your software
Outdated software, applications, and programs are a weak point, which hackers might use to steal your information. Often, companies release updates to fix vulnerabilities in their programs, so stay updated.
I also recommend that you use reliable antivirus software. You can try Avast!, which has a free version and a paid one. For maximum security, get the paid one. It offers you safety from ransomware attacks, protection against fake websites and website spying, and a firewall to keep your information safe.
#11 Use cryptocurrencies
I’m sure that most of you have shopped online at least once in their life. But while sites strive to protect their customers’ credit card information, sometimes hackers manage to steal it. Or you can stumble upon a false website and lose all your money.
So what’re your options? First, use prepaid debit cards and enter false information and no social security number. In such a way no one can track the transaction back to you. Moreover, prepaid debit cards are not linked to a bank account, and your money is safe.
The other option is to use cryptocurrency. You’ve probably heard about bitcoin. That was the first cryptocurrency, but since then many more have appeared. Cryptocurrencies grant you anonymity, and third parties can’t track or see the transaction amount.
If you’re interested in acquiring some cryptocurrencies, it’s easy. Just go to Coinbase, create an account and link it to your prepaid debit card. Then choose which cryptocurrency you want to buy. The site is user-friendly for a beginner, and you can store different cryptocurrencies in one account. Just don’t provide real information and you’ll be completely anonymous in your transactions.
Keep in mind that many sites don’t accept cryptocurrencies, but that will probably change in the future.
#12 Additional privacy tips
To avoid anyone violating your privacy, here are more tips:
As you can see, there are many ways someone can track you online and disturb your life. So be smart and learn how to protect your online privacy and how to stay anonymous.
And while having a 100% security and privacy online is hard to achieve, it’s not impossible. Just follow these steps, and it will be tough for someone to invade your privacy.
Just remember one final rule – you don’t know who you’re talking on the other end. Never share any kind of personal information and don’t ever use sensitive information for services that could easily be hacked (Facebook).
So what do you think about these tips how to protect your privacy online? Feel free to comment if you what to add something to the list.