How to ensure greatest amount of privacy when online?

PaxProSe

I am familiar with and use the Tor browser when on my Windows laptop to try to maintain some semblance of online privacy. Is Tor sufficient to ensure privacy, or are there other steps that I should take? I’m not a secret agent or a criminal mastermind, I just don’t think it’s anyone else’s business what I’m doing online, and would like to maintain my personal privacy without too much effort on my part.

Topic: Security
Answer this Question

Answers

2 total
jimlynch
Vote Up (1)

I agree with landon, try using Tor with Tails. That's a good way to do it.

Tails 1.0 review – total privacy
http://www.linuxuser.co.uk/reviews/tails-1-0-review-total-privacy

"Tails has been a curiosity to us for a while now, long before Snowden made it known to the mainstream. Cropping up every now and then on Distrowatch, we acknowledged that it existed and its list of features seemed to convey that the team knew what they were doing in constructing an ultra-secure and privacy-driven Linux distro. Now post-Snowden and Heartbleed, with the need for journalists and whistleblowers to have true internet privacy, we’ve come to see Tails as a necessity in the changing tech world."

landon
Vote Up (1)

If you want to go to the effort, you could combine Tails Linux distro with Tor. It will allow you to completely encrypt the files, emails, and IMs, as well as automatically for all internet traffic onto the Tor network. The irony, according to many recent press reports, is that by attempting to maintain personal privacy, you may be flagged by the US government as an “extremist.” 

 

Here’s the link for Tails if you are interested in giving it a try. https://tails.boum.org/ 

Ask a question

Join Now or Sign In to ask a question.
Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.
The TOR Project thinks it has figured out how the author of a canceled Black Hat talk cracked its software to mask the source of Internet traffic, and it is working on a patch.
Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners.
A ransomware threat that encrypts files stored on the SD memory cards of Android devices has been updated to target English-speaking users with FBI-themed alerts.
A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.
A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.
Researchers have concluded that those billions of connected devices could help save lives in the event of disaster, even one that knocks out the Internet
Goodwill Industries International said Monday federal authorities are investigating a possible payment card breach at its U.S.-based retail outlets.

White Papers & Webcasts

Webcast On Demand

Transform Your IT Service Management

Sponsor: EasyVista

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness