Guestlist

Issue 94

Monthly newspaper and online publication targeting 18 to 35 year olds. The ultimate guide to the hottest parties, going out and having fun. Music, fashion, film, travel, festivals, technology, comedy, and parties! London, Barcelona, Miami and Ibiza.

Issue link: https://read.uberflip.com/i/765744

Contents of this Issue

Navigation

Page 16 of 55

GUESTLIST 2016 / ISSUE 94 17 TECHNOLOGY StartPage removes all your identifying information and submits a search query to Google on your behalf. It doesn't log or track user activity. All search results are displayed with a proxy link beneath them, allowing you to click through to any site while retaining your privacy through a proxy. File transfers FileDropper is a simple and convenient solution that allows uploads of up to 5GB with no registration required. WeTransfer is another option that allows files up to 2GB without signing up. Upload a file and then send the link to whoever you want to receive it. Use a burner email. Choose your browser extensions carefully Many extensions can help maintain your privacy–ABP, Disconnect, Privacy Badger, HTTPS Everywhere, etc–but they also contribute to a more well-formed fingerprint. If you want to test how well your browser protects you from tracking, head over to the Panopticlick website. This tool made by the Electronic Frontier Foundation (EFF) can show you in excruciating detail how an ad agency can identify your browser using a unique fingerprint. Encrypted communications Besides email, you'll also want to cover your tracks when sending messages and making calls. Encryption is more focused on privacy than anonymity. Signal is the premier app for encrypted voice calls on smartphones. It also includes instant messaging. Users can verify the identities of their contacts by comparing key fingerprints. For encrypted text and media messaging, there's a wealth of free and private options. TorChat uses peer-to-peer encrypted messaging on the Tor network. It requires no installation and can be run from a USB drive. Encrypted backup Backups are best done locally to an encrypted external hard drive. Crashplan offers a free version of its software that makes this easy. If you want a cloud solution, seek out a "zero knowledge" service that allows you to set your own encryption key. SpiderOak, iDrive, BackBlaze, and Crashplan all offer this option, which prevents the provider from decrypting your files. Secure your webcam It's been proven that webcams can be remotely activated and used to spy on users. Webcams are usually remotely activated through malware, so a real-time virus scanner and regular system scans can prevent this from happening. If your laptop has an LED light that turns on whenever the webcam is active, make sure it's enabled and close your laptop when not in use. Secure your wifi router Routers can be used to intercept, read, and modify internet traffic. If you're on someone else's wifi network, be sure to use a VPN. If you want to remain anonymous, it's important to change the router's login credentials, update the firmware, set the strongest level of encryption (usually WPA2), restrict inbound and outbound traffic, turn off WPS, disable unused services, check port 32764, enable and read logs, and log out of your router when finished. iOS and Android are not optimal for anonymity If you're choosing between iOS and Android based on which is more anonymous, go with Android. But don't get comfortable and think you can be totally anonymous on either. It is far more difficult to be anonymous on a smartphone than on a computer. Be wary of the Internet-of- Things The internet of things presents a whole new wave of opportunity for hackers and snoopers. Security has unfortunately been an afterthought for many IoT manufacturers. A simple log of when your smart air conditioner is activated, for example, can tell a lot about a person's daily routine. Critics have warned against devices like the Amazon Echo, which are always listening for input even when deactivated. More at guestlist.net

Articles in this issue

Links on this page

view archives of Guestlist - Issue 94