How to ensure greatest amount of privacy when online?

PaxProSe

I am familiar with and use the Tor browser when on my Windows laptop to try to maintain some semblance of online privacy. Is Tor sufficient to ensure privacy, or are there other steps that I should take? I’m not a secret agent or a criminal mastermind, I just don’t think it’s anyone else’s business what I’m doing online, and would like to maintain my personal privacy without too much effort on my part.

Topic: Security
Answer this Question

Answers

2 total
jimlynch
Vote Up (2)

I agree with landon, try using Tor with Tails. That's a good way to do it.

Tails 1.0 review – total privacy
http://www.linuxuser.co.uk/reviews/tails-1-0-review-total-privacy

"Tails has been a curiosity to us for a while now, long before Snowden made it known to the mainstream. Cropping up every now and then on Distrowatch, we acknowledged that it existed and its list of features seemed to convey that the team knew what they were doing in constructing an ultra-secure and privacy-driven Linux distro. Now post-Snowden and Heartbleed, with the need for journalists and whistleblowers to have true internet privacy, we’ve come to see Tails as a necessity in the changing tech world."

landon
Vote Up (2)

If you want to go to the effort, you could combine Tails Linux distro with Tor. It will allow you to completely encrypt the files, emails, and IMs, as well as automatically for all internet traffic onto the Tor network. The irony, according to many recent press reports, is that by attempting to maintain personal privacy, you may be flagged by the US government as an “extremist.” 

 

Here’s the link for Tails if you are interested in giving it a try. https://tails.boum.org/ 

Ask a question

Join Now or Sign In to ask a question.
When online services lack privacy controls, you can roll your own using near military-grade encryption.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
In the wake of recent security breaches of medical databases, doctors can’t be too careful
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.
A type of body scanner in wide use across U.S. airports through last year fails to spot well-concealed weapons including guns and knives, computer security researchers contend.
randomness