Protecting your Digital Privacy

November 14, 2024

Privacy Plus+

Privacy, Technology and Perspective 

This week, let’s revisit essential privacy and security practices, highlighting WIRED Magazine's comprehensive guide on protecting yourself from government surveillance.

Previous Coverage

We've extensively covered the protection of digital privacy in these previous posts:

·       How to Go Quasi-Dark – Email and Messaging Edition

·       5 Tips for Protecting Your Home Network and Devices

·       Help us help you (protect your privacy)

·       Help us help you again

Key Security Measures

WIRED’s guide highlights several critical areas:

Encrypted Communications

  • ·   Use end-to-end encrypted messengers (Signal, WhatsApp, iMessage)

  • ·   Signal recommended for best privacy: no metadata collection, customizable message deletion

  • ·   Avoid default settings in Facebook Messenger, Telegram, X which only encrypt in transit

Device Encryption

  • ·   iOS/Android: Use full disk encryption with strong alphanumeric passwords

  • ·   Computers: Enable FileVault (Mac) or BitLocker/Veracrypt (Windows)

  • ·   Power off devices when not in use for maximum security

Cloud Storage

  • ·   Minimize sensitive data in cloud storage

  • ·   Enable end-to-end encryption when available (iCloud, Meta apps)

  • ·   Use Veracrypt for encrypting files before cloud upload

  • ·   Consider keeping sensitive data locally only

Online Anonymity

  • ·   Use Tor Browser or Brave's private browsing

  • ·   Consider VPN with strong privacy guarantees

  • ·   iCloud Private Relay available for Apple users

Location Privacy

  • Limit app location permissions

  • Review and delete unused apps

  • Disable automatic location logging

  • Consider using Faraday bags or leaving devices home

  • Enable Lockdown Mode on iPhone for additional protection

Financial Privacy

  • ·   Use cash when possible

  • ·   Understand that payment apps/cryptocurrency transactions can be traced

  • ·   Be aware that financial records are accessible to law enforcement

Additional Considerations

  • ·   Burner phones: Limited usefulness due to difficulty maintaining true anonymity

  • ·   Past data: Consider that historical information may already be available through data brokers

  • ·   Device compartmentalization: Separate work/personal activities on different devices

You can read the entire article in WIRED by clicking on the following link:

https://www.wired.com/story/the-wired-guide-to-protecting-yourself-from-government-surveillance/

Our Thoughts

These privacy tools and practices aren't just relevant for activists and journalists – they're essential for anyone valuing their privacy rights or concerned about government overreach. Whether protecting health information, personal communications, or exercising basic privacy rights, these measures offer important protection in today's connected world.  

--- 

Hosch & Morris, PLLC is a boutique law firm dedicated to data privacy and protection, cybersecurity, the Internet and technology. Open the Future℠.

 

Previous
Previous

Texas Jury Hits E-Discovery Vendor with Penalties for Violation of Computer Crimes Statute

Next
Next

Click-to-Cancel