Written byHisham Almiraat
This post also available in:
Français
· 10 résolutions pour être plus en sécurité sur le Web en 2013Español
· Diez resoluciones de Año Nuevo para navegar con seguridad en Internet el 2013
At Global Voices Advocacy (GVA), we are dedicated to defending freedom of expression online. We have always been keen on publishing guides and tools to help our fellow netizens navigate the internet safely, circumvent censorship and protect themselves online.
That is why, in 2013, we are committed to continue to defend your rights as netizens by publishing original reports and a new series of guides covering areas as diverse as circumvention, anonymity, surveillance, privacy, citizen journalism, visualization, online activism and advocacy.
As 2012 draws to a close, dear reader, here at team Advox, we've decided to suggest 10 resolutions for 2013, presented in the form of a review of the tools and strategies to protect yourself online. This is a selection of the best ways and methods we've come across in 2012. Remember that no one tactic will ever provide you with 100% security and safety online. At all times, stay armed with your common sense.
#1 - Hide your identity when using your mobile
Whether you're a company wishing to monitor the browsing habits of your potential customers or a repressive government obsessed with tracking dissidents online, mobile devices have been created for you. No technology has come so close to achieving Orwell's dystopian nightmare. Yet there are many ways to help users browse the Internet with their mobile devices in a smarter and safer way:
Orbot is a free, open source Android application that uses Tor's worldwide network of servers to conceal user's location and identity. The application was developed by Tor and The Guardian Project.
#2 - Learn good mobile reporting practices
Whether you're a professional journalist or a citizen media producer you might want to take a look at “Media Workers’ Toolkit for Safer Online and Mobile Practices“. This comprehensive guide, produced by Internews, a non-profit organization working to empower local media worldwide, offers good advice for media producers on how to protect themselves and their sources while using their mobile devices.
#3 - Stay anonymous online
Keep websites and governments from tracking you online, use Tor. Tor is a popular free browser that uses a global volunteer network of servers that helps you surf the internet securely while concealing your location from network surveillance and traffic analysis. Tor can also be downloaded onto a USB drive and used from any computer.
#4 - Remember the basics
It's always a good idea to remind ourselves of some basic online safety rules. Google offers a set of useful tips for staying more secure on the web.
Speaking of basics, the Electronic Frontier Foundation's (EFF) Surveillance Self Defense page remains a must-read for those of us willing to know more about the fundamentals of defensive technologies such as encryption, secure deletion or virtual private networks.
#5 - Think ahead of trouble
If you're a blogger, especially if you live in a repressive environment, think of a contingency plan in the event of an arrest. GVA's own Jillian C. York offers a number of tips and premeditated actions for threatened bloggers in this article she wrote for the Electronic Frontier Foundation.
#6 - Browse like James Bond… Don't leave a trace
Lifehacker walks us though how to use a portable Linux-based, live-boot operating system called Tails, to browse the internet from any computer “without leaving a trace.” The tactic is not completely infallible, but nothing ever is, isn't it?
#7 - Protect your privacy, stop online tracking
Your browsing habits say much about you. Most websites and online advertisers know it very well and use invisible tracking techniques to record personal information about you.
EFF offers an quick 4-step guide that will allow you to stop unwanted privacy invasion.
You may also want to use DuckDuckGo, an alternative search engine that, unlike Google, does not record user information.
#8 - Protect your data
Protect your sensitive data by using a hard disk encryption software like Truecrypt. Use it on every computer you own. Trucrypt is an easy-to-use, lightweight and intuitive freeware that can encrypt parts or your entire storage device. It is particularly useful for protecting and hiding your sensitive files, especially when travelling and crossing borders.
This Wikipedia article offers additional information on alternative disk encryption software and their system compatibility.
#9 - Destroy undesirable data
Deleted files may easily be recovered by interested parties. Make sure your sensitive data is not available to others by using data erasure software. One of the most popular of such tools is Eraser, a freeware available for Windows. It destroys undesirable data by overwriting it several times.
#10 - Commit to defeating censorship
Because the internet's original purpose is to allow people to communicate freely, without governments or corporations interfering, it is essential that we, netizens, learn about ways to make life difficult for the enemies of freedom of expression.
Floss Manuals, a Netherlands-based non-profit foundation dedicated to promoting the use of free software, published a comprehensive book earlier this year called “How To Bypass Internet Censorship” [PDF, 240 pages, 12 MB]. The book contains a diverse range of tools and techniques tailored to defeat censorship. It also assesses the risks associated with the use of each tool. A lightweight “Quickstart” version is also available here [PDF, 8 pages, 268 KB].
* * *
- Tactical Technology Collective's Security In A Box: A comprehensive set of digital security tools tailored for activists. Available in multiple languages.
- Access' “A Practical Guide to Protecting Your Identity and Security Online and When Using Mobile Phones“. Also available in multiple languages.
Thanks to the Global Voices Advocacy community for helping put together the resources available in this post.
-->
1 comment
Access' Executive Director, Brett Solomon, talks WCIT on ABC's 'The Drum'
About the WCIT: “If you move the governance of the Internet into a government-controlled body (…), that's not necessarily to the advantage of citizens”...
The internet deserves its own holiday
Public participation helped create the internet, and it helps protect it. That’s worth celebrating and remembering. Some are suggesting January 18, the annivesary of the PIPA/SOPA blackout, to do this...
via wired
From the Access Community
The top tech-politics developments of 2012
TechPresident creates a list of the top events and developments in the world of technology and politics in 2012...
China toughens its restrictions on use of the internet
The Chinese government issued new rules requiring internet users to provide their real names to service providers, while assigning internet companies greater responsibility for deleting forbidden postings and...
Mapping Iran's Human Rights, an ongoing project of the International Campaign for Human Rights in Iran, highlights and explores major human rights violations in different provinces of Iran, beyond Tehran's borders...
Neither Here, Nor There: Turkmenistan's Digital Doldrums
Hundreds of thousands of Turkmen citizens are now online. However, the country faces serious challenges as it prepares to go digital. Infrastructure is primitive, and public access is fully controlled by a state-owned monopoly. Slow speed, exorbitant prices...
Cambodia bans internet cafes near schools
The circular also prohibits internet cafes from welcoming young people under the age of 18, pointing that internet poses numerous dangers such as terrorism, economic crimes and the distribution of pornography...
The Federal Trade Commission hasn’t updated its children’s online privacy rules since 2000, back when the World Wide Web was a mere young'un. Much has changed since then, and a range of data-collection and marketing companies now track...
Egypt: The people demand free and open source software
A lot has been said about the liberating role technology has played in the Middle East uprising, yet there is more to be said about the mutual role the uprising is yet to play in liberating the technology in the region. Angered by an announcement...
National Conference on Media Reform (Denver, April, 5-7 2013)
FressPress is hosting a three-day conference that will delve into the most pressing issues facing technology and the future of the Internet. Want to attend? Early-bird registration rates are available through Jan. 30, 2013, so sign up today...
France's censorship demands to Twitter are more dangerous than "hate speech"
France's women's rights minister, Najat Vallaud-Belkacem, is demanding that Twitter help the French government criminalize ideas it dislikes...
Anonymous: The hackers’ big year
Perhaps no tech story was bigger this year than the growth of the crusading hacker collective Anonymous. In a Best of 2012 package, Andrew Leonard considers the group's mission and popularity. Natasha Lennard discusses the group's biggest successes of...
Police surveillance in Sao Paolo is at all-time high, as crime wave shocks city
Take a look into the Orwellian surveillance tech that police in Sao Paolo are using to monitor crime in the metropolis of 41 million. An integrated network of databases, tablet technology and mobile cameras...
Access defends and extends the digital rights of users at risk around the world. By combining tech-driven policy, user engagement, and direct technical support, we fight for open and secure communications for all.
dosch
“Yet there are many ways to help users browse the Internet with their mobile devices in a smarter and safer way:”
And then you name one… Orbot.
What options are there for us iOS, Windows and BB-users? And what many other options are there for Android users?
I like your list, but it is way to optimistic. Truth is that secure and safe communication on many platforms (Formost mobile ones, but also regular ones) is flawed and needs many patches like TOR, DuckduckGO, Ghostery etc. to protect you even a little…