How to ensure greatest amount of privacy when online?

PaxProSe

I am familiar with and use the Tor browser when on my Windows laptop to try to maintain some semblance of online privacy. Is Tor sufficient to ensure privacy, or are there other steps that I should take? I’m not a secret agent or a criminal mastermind, I just don’t think it’s anyone else’s business what I’m doing online, and would like to maintain my personal privacy without too much effort on my part.

Topic: Security
Answer this Question

Answers

2 total
jimlynch
Vote Up (1)

I agree with landon, try using Tor with Tails. That's a good way to do it.

Tails 1.0 review – total privacy
http://www.linuxuser.co.uk/reviews/tails-1-0-review-total-privacy

"Tails has been a curiosity to us for a while now, long before Snowden made it known to the mainstream. Cropping up every now and then on Distrowatch, we acknowledged that it existed and its list of features seemed to convey that the team knew what they were doing in constructing an ultra-secure and privacy-driven Linux distro. Now post-Snowden and Heartbleed, with the need for journalists and whistleblowers to have true internet privacy, we’ve come to see Tails as a necessity in the changing tech world."

landon
Vote Up (1)

If you want to go to the effort, you could combine Tails Linux distro with Tor. It will allow you to completely encrypt the files, emails, and IMs, as well as automatically for all internet traffic onto the Tor network. The irony, according to many recent press reports, is that by attempting to maintain personal privacy, you may be flagged by the US government as an “extremist.” 

 

Here’s the link for Tails if you are interested in giving it a try. https://tails.boum.org/ 

Ask a question

Join Now or Sign In to ask a question.
Questions abound over sites authenticating users via identities established through social networks, Yahoo Ponemon Institute survey shows.
Attackers are exploiting a vulnerability in distributed search engine software Elasticsearch to install DDoS malware on Amazon and possibly other cloud servers.
Vulnerabilities in the Tails operating system could reveal your IP address, but you can avoid trouble by taking a couple of precautions.
Financial institutions use many technologies to fight crime, but much of the work comes too late, focusing on suspicious activity, like uncharacteristic charges or money transfers, after it happens.
Dennis Technology Labs says it tested it because of marketing claims for it; Malwarebytes says free version of product is just a clean-up tool.
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
The Russian Ministry of Interior is willing to pay 3.9 million roubles, or around US$111,000, for a method to identify users on the Tor network.
Public certificate authorities (CAs) are warning that as of Nov. 1 they will reject requests for internal SSL server certificates that don't conform to new internal domain naming and IP address conventions designed to safeguard networks.
European data protection authorities still have questions after meeting with Google, Microsoft and Yahoo about the implementation of a recent ruling that gave European citizens the right to be forgotten by search engines.
An iPhone user has filed a lawsuit for invasion of privacy against Apple, about a week after a Chinese state broadcaster raised security concerns about the device's location-tracking functions.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+