10 New Year's resolutions to browse the Internet safely in 2013

Written byHisham Almiraat
 

TranslationsThis post also available in:

Français
· 10 résolutions pour être plus en sécurité sur le Web en 2013Español
· Diez resoluciones de Año Nuevo para navegar con seguridad en Internet el 2013
 
At Global Voices Advocacy (GVA), we are dedicated to defending freedom of expression online. We have always been keen on publishing guides and tools to help our fellow netizens navigate the internet safely, circumvent censorship and protect themselves online.

That is why, in 2013, we are committed to continue to defend your rights as netizens by publishing original reports and a new series of guides covering areas as diverse as circumvention, anonymity, surveillance, privacy, citizen journalism, visualization, online activism and advocacy.

As 2012 draws to a close, dear reader, here at team Advox, we've decided to suggest 10 resolutions for 2013, presented in the form of a review of the tools and strategies to protect yourself online. This is a selection of the best ways and methods we've come across in 2012. Remember that no one tactic will ever provide you with 100% security and safety online. At all times, stay armed with your common sense.

#1 - Hide your identity when using your mobile

Whether you're a company wishing to monitor the browsing habits of your potential customers or a repressive government obsessed with tracking dissidents online, mobile devices have been created for you. No technology has come so close to achieving Orwell's dystopian nightmare. Yet there are many ways to help users browse the Internet with their mobile devices in a smarter and safer way:

Orbot is a free, open source Android application that uses Tor's worldwide network of servers to conceal user's location and identity. The application was developed by Tor and The Guardian Project.

#2 - Learn good mobile reporting practices

Whether you're a professional journalist or a citizen media producer you might want to take a look at “Media Workers’ Toolkit for Safer Online and Mobile Practices“. This comprehensive guide, produced by Internews, a non-profit organization working to empower local media worldwide, offers good advice for media producers on how to protect themselves and their sources while using their mobile devices.

#3 - Stay anonymous online

Keep websites and governments from tracking you online, use Tor. Tor is a popular free browser that uses a global volunteer network of servers that helps you surf the internet securely while concealing your location from network surveillance and traffic analysis. Tor can also be downloaded onto a USB drive and used from any computer.

#4 - Remember the basics

It's always a good idea to remind ourselves of some basic online safety rules. Google offers a set of useful tips for staying more secure on the web.

Speaking of basics, the Electronic Frontier Foundation's (EFF) Surveillance Self Defense page remains a must-read for those of us willing to know more about the fundamentals of defensive technologies such as encryption, secure deletion or virtual private networks.

#5 - Think ahead of trouble

If you're a blogger, especially if you live in a repressive environment, think of a contingency plan in the event of an arrest. GVA's own Jillian C. York offers a number of tips and premeditated actions for threatened bloggers in this article she wrote for the Electronic Frontier Foundation.

#6 - Browse like James Bond… Don't leave a trace

Lifehacker walks us though how to use a portable Linux-based, live-boot operating system called Tails, to browse the internet from any computer “without leaving a trace.” The tactic is not completely infallible, but nothing ever is, isn't it?

#7 - Protect your privacy, stop online tracking

Your browsing habits say much about you. Most websites and online advertisers know it very well and use invisible tracking techniques to record personal information about you.

EFF offers an quick 4-step guide that will allow you to stop unwanted privacy invasion.

You may also want to use DuckDuckGo, an alternative search engine that, unlike Google, does not record user information.

#8 - Protect your data

Protect your sensitive data by using a hard disk encryption software like Truecrypt. Use it on every computer you own. Trucrypt is an easy-to-use, lightweight and intuitive freeware that can encrypt parts or your entire storage device. It is particularly useful for protecting and hiding your sensitive files, especially when travelling and crossing borders.

This Wikipedia article offers additional information on alternative disk encryption software and their system compatibility.

#9 - Destroy undesirable data

Deleted files may easily be recovered by interested parties. Make sure your sensitive data is not available to others by using data erasure software. One of the most popular of such tools is Eraser, a freeware available for Windows. It destroys undesirable data by overwriting it several times.

#10 - Commit to defeating censorship

Because the internet's original purpose is to allow people to communicate freely, without governments or corporations interfering, it is essential that we, netizens, learn about ways to make life difficult for the enemies of freedom of expression.

Floss Manuals, a Netherlands-based non-profit foundation dedicated to promoting the use of free software, published a comprehensive book earlier this year called “How To Bypass Internet Censorship” [PDF, 240 pages, 12 MB]. The book contains a diverse range of tools and techniques tailored to defeat censorship. It also assesses the risks associated with the use of each tool. A lightweight “Quickstart” version is also available here [PDF, 8 pages, 268 KB].

* * *

- Tactical Technology Collective's Security In A Box: A comprehensive set of digital security tools tailored for activists. Available in multiple languages.

- Access' “A Practical Guide to Protecting Your Identity and Security Online and When Using Mobile Phones“. Also available in multiple languages.

Thanks to the Global Voices Advocacy community for helping put together the resources available in this post.
 

inShare2

submit to reddit

-->

1 comment

  • dosch

    “Yet there are many ways to help users browse the Internet with their mobile devices in a smarter and safer way:”

    And then you name one… Orbot.

    What options are there for us iOS, Windows and BB-users? And what many other options are there for Android users?

    I like your list, but it is way to optimistic. Truth is that secure and safe communication on many platforms (Formost mobile ones, but also regular ones) is flawed and needs many patches like TOR, DuckduckGO, Ghostery etc. to protect you even a little…

 

Staff PicksArticle photo

Access' Executive Director, Brett Solomon, talks WCIT on ABC's 'The Drum'

About the WCIT: “If you move the governance of the Internet into a government-controlled body (…), that's not necessarily to the advantage of citizens”...

via youtube+1 Tweet Share
  

Article photo

The internet deserves its own holiday

Public participation helped create the internet, and it helps protect it. That’s worth celebrating and remembering. Some are suggesting January 18, the annivesary of the PIPA/SOPA blackout, to do this...

via wired +1 Tweet Share
  
From the Access CommunityArticle photo

The top tech-politics developments of 2012

TechPresident creates a list of the top events and developments in the world of technology and politics in 2012...

via techpresident +1 Tweet Share
  

Article photo

China toughens its restrictions on use of the internet

The Chinese government issued new rules requiring internet users to provide their real names to service providers, while assigning internet companies greater responsibility for deleting forbidden postings and...

via nytimes +1 Tweet Share
  

Article photo

Mapping Iran's Human Rights

Mapping Iran's Human Rights, an ongoing project of the International Campaign for Human Rights in Iran, highlights and explores major human rights violations in different provinces of Iran, beyond Tehran's borders...

via iranhumanrights +1 Tweet Share
  

Article photo

Neither Here, Nor There: Turkmenistan's Digital Doldrums

Hundreds of thousands of Turkmen citizens are now online. However, the country faces serious challenges as it prepares to go digital. Infrastructure is primitive, and public access is fully controlled by a state-owned monopoly. Slow speed, exorbitant prices...

via opennet +1 Tweet Share
  

Article photo

Cambodia bans internet cafes near schools

The circular also prohibits internet cafes from welcoming young people under the age of 18, pointing that internet poses numerous dangers such as terrorism, economic crimes and the distribution of pornography...

via globalvoicesonline +1 Tweet Share
  

Article photo

Privacy, please

The Federal Trade Commission hasn’t updated its children’s online privacy rules since 2000, back when the World Wide Web was a mere young'un. Much has changed since then, and a range of data-collection and marketing companies now track...

via freepress +1 Tweet Share
  

Article photo

Egypt: The people demand free and open source software

A lot has been said about the liberating role technology has played in the Middle East uprising, yet there is more to be said about the mutual role the uprising is yet to play in liberating the technology in the region. Angered by an announcement...

via globalvoicesonline +1 Tweet Share
  

Article photo

National Conference on Media Reform (Denver, April, 5-7 2013)

FressPress is hosting a three-day conference that will delve into the most pressing issues facing technology and the future of the Internet. Want to attend? Early-bird registration rates are available through Jan. 30, 2013, so sign up today...

via freepress+1 Tweet Share
  

Article photo

France's censorship demands to Twitter are more dangerous than "hate speech"

France's women's rights minister, Najat Vallaud-Belkacem, is demanding that Twitter help the French government criminalize ideas it dislikes...

via guardian +1 Tweet Share
  

Article photo

Anonymous: The hackers’ big year

Perhaps no tech story was bigger this year than the growth of the crusading hacker collective Anonymous. In a Best of 2012 package, Andrew Leonard considers the group's mission and popularity. Natasha Lennard discusses the group's biggest successes of...

via salon +1 Tweet Share
  

Article photo

Police surveillance in Sao Paolo is at all-time high, as crime wave shocks city

Take a look into the Orwellian surveillance tech that police in Sao Paolo are using to monitor crime in the metropolis of 41 million. An integrated network of databases, tablet technology and mobile cameras...

via techpresident +1 Tweet Share
  
 

Access defends and extends the digital rights of users at risk around the world. By combining tech-driven policy, user engagement, and direct technical support, we fight for open and secure communications for all.