Take Control of Your Online Privacy

Take Control of Your Online Privacy

Language: English

Pages: 151

ISBN: B00YNXRCKQ

Format: PDF / Kindle (mobi) / ePub

Take Control of Your Online Privacy

Language: English

Pages: 151

ISBN: B00YNXRCKQ

Format: PDF / Kindle (mobi) / ePub


Learn what's private online (not much)--and what to do about it!

Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just by well-meaning sites who want to keep you logged in or by marketing firms who want to show you targeted ads for products that you likely want to buy.

In the ebook, Joe helps you understand what to expect about online privacy and develop a sensible online privacy strategy, customized for your needs. He then explains how to enhance the privacy of your Internet connection, Web browsing, email messages, online chatting, social media interactions, and file sharing, as well as your mobile phone or tablet, and Internet of Things devices like webcams and thermostats. To bring home the most important privacy no-nos, Joe also encourages you to take The Pledge (it's tongue-in-cheek, though it would have saved numerous politicians from ridicule). Plus, parents will find important reminders about protecting a child's privacy.

Teach This Book! Once you're satisfied with your own online privacy strategy, you may want to help friends or colleagues improve theirs. To that end, Take Control of Your Online Privacy includes links to a free one-page PDF cheat sheet and to a PDF-based slide deck that you can show on any computer or mobile device screen.

Whether you have a Mac or PC, iOS or Android device, set-top box, cell phone, or some other network-enabled gadget, you'll find the advice that ordinary people need to handle common privacy needs (secret agents should look elsewhere). You'll receive savvy advice about:

Why worry? Learn about who wants your private data, and why they want it. Even if you don't believe you have anything to hide, you almost certainly do, in the right context. Would you give just anyone your financial records or medical history? Didn't think so.

Set your privacy meter: Develop your own personal privacy rules -- everyone has different privacy buttons, and it's important to figure out which are important to you.

"Joe Kissell nails it. Take Control of Your Online Privacy is a comprehensive and practical guide to protecting your privacy in the digital age. Joe helps you make and implement the right privacy choices for your life."
--Rich Mogull, CEO of Securosis

Manage your Internet connection: Understand privacy risks, prevent snoops, and take key precautions to keep your data from leaking out.

Browse and search the Web: Learn what is revealed about you when you use the Web. Avoid bogus Web sites, connect securely where possible, control your cookies and history, block ads, browse and search anonymously, and find out who is tracking you. Also, learn how to protect passwords and credit card data.

Send and receive email: Find out how your email could be intercepted, consider when you want email to be extra private (such as when communicating with a doctor or lawyer), find out why Joe doesn't recommend email encryption as a solution to ordinary privacy needs (but find pointers for how to get started if you want to try it -- or just encrypt an attachment, which is easier), get tips for sending email anonymously, and read ideas for alternatives to email.

Talk and chat online: Consider to what extent any phone call, text message, or online chat is private and find tips for enhancing privacy when using these channels.

Watch your social media sharing: Social media is by definition social, so there's a limit to how private it can be. Understand the risks and benefits of sharing personal information online, tweak your settings, and consider common-sense precautions.

Other topics covered in the book include sharing files, checking your electronics, thinking mobile and ways to help your children.

Stuff [UK] (June 2012)

Stuff [UK] (February 2011)

Interface

Pragmatic Thinking and Learning: Refactor Your Wetware (Pragmatic Programmers)

Trace Fossil Analysis

Raspberry Pi: A Quick-Start Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

stolen while entering a PIN at an ATM or retail counter, scanning a passport at the airport, using a smartphone on the bus, or even talking loudly on a mobile phone. When it comes to online privacy, this sort of low-tech analog snooping is just as much of a threat as hackers hunched over keyboards in dark rooms far away. Be prudent when using your electronics in public—always keep an eye out for people keeping an eye on you! Browse the Web Privately In the previous chapter, I told you how

you’ve visited. The above is only a partial list. Some sites use even sneakier techniques to squirrel away various information about you in a variety of places (see Live Data, ahead, for further detail). In addition to all these things, your device may store a global cache of recent DNS lookups—that is, somewhere outside your browser there may be a list of the domain names you (or your apps) most recently visited along with their IP addresses. If you’re sufficiently curious or motivated to

they reasonably can be, and when it’s best to choose an entirely different means of communication. Understand the Privacy Risks of Email If you send me an email message, you might have the impression that you and I are the only two people who can read it. Such assumptions are unwise. Let’s look at a few of the places email might be visible to someone other than the sender or recipient: On your end: Your email client may keep a copy of the messages you send. If so, anyone who gained access

less-wholesome files, including pirated movies, games, and software. If you’re tempted to do that, I invite you to skip back to Take the Pledge and follow the instructions there for avoiding online stupidity. Having dispensed with that obligatory disclaimer, the fact is that what you have to share is none of my business or concern. You may have digital content of some kind that, for any of numerous legitimate reasons, you want to share online, but for which you have a privacy concern. In this

fashion only, with no intention of infringement of the trademark. No such use, or the use of any trade name, is meant to convey endorsement or other affiliation with this title. This title is an independent publication and has not been authorized, sponsored, or otherwise approved by Apple Inc. Because of the nature of this title, it uses terms that are the trademarks or that are the registered trademarks of Apple Inc.; you can view a complete list of the trademarks and of the registered

Download sample

Download