Bitcoin Forum
May 07, 2024, 12:48:20 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: Privacy, ways to protection  (Read 520 times)
Charles-Tim (OP)
Legendary
*
Offline Offline

Activity: 1540
Merit: 4850



View Profile
October 06, 2020, 08:52:20 AM
Last edit: October 06, 2020, 12:33:00 PM by Charles-Tim
Merited by Welsh (4), 1miau (4), CryptopreneurBrainboss (3), Upgrade00 (3), Gozie51 (2), DdmrDdmr (2), o_e_l_e_o (2), Lordhermes (2), condoras (1), ABCbits (1), mk4 (1), notblox1 (1), Coyster (1), zasad@ (1), CryptocurencyKing (1)
 #1

Table of contents
Abstract
Introduction
1. Privacy-based browsers
       Firefox
       Tor browser
       DuckDuckGo
2. Privacy Search Engines
       DuckDuckGo
       Qwant
Information Google and other big companies are tracking
Why is Google tracking an issue?
3. Encrypting Internet connection with VPN
       ExpressVPN Best VPN for Tor
       NordVPN Budget VPN
       Surfshark
       CyberGhost
       PrivateVPN’s
       IPVanish
4. Making your communications private
       Using encrypted email(s)
       Limiting information shared publicly
       Limiting information shared privately
5. Be vigilant of phishing attacks
6. Keep your device always locked
When to use Tor
Conclusion



Abstract
People are ignorant of online privacy, they do not know how careless online usage has reduce their online privacy, not knowing how big tech companies like google are integrating their data (online information) and selling it for data-hungery companies, even unkomwing selling it directly or indirectly to scammers. Any personal data online is not safe so far it is not offline, and while the data are collected and integrated by these big companies like google, possibly can lead to date breaches which hackers can use to track victims into stealing bitcoin and other cryptocurrencies from him. Being careful of the browsers, search engines, VPNs, emails and many others such as being careful of the social media and the data we are sharing while online are all requisites to high level of privacy we can have online which can effectively protect us from hackers that want to steal bitcoin from us.


Introduction
People store keys to digital assets like bitcoin on phones, tablets and computers, this should make people to be conscious of their privacy, there are mistakes that can make hackers penetrate into victims computers and steal the keys which will be used to unlock the bitcoin by hackers and be stolen. Also, stealing any other sensitive data is possible which can lead to damages for victims. That is why privacy is very important in this digital era in order to be safe from hackers.

Many people use computers, tablets and phones to go online without knowing about privacy which is very important for self protection especially from attackers (scammers). People are making use of search engines the way they want, download any browser they wish, expose themselves online, not even conscious of how harmful these could to. Peoples' negligence about privacy makes them go online and be scammed, or resulting to malware download that can later results to bitcoin or other crypto wallets being hacked by attackers. Total Internet privacy is impossible, but you can get close by adjusting your online behavior — and a few of your privacy settings.

Phones, tablets, computers and other devices used to access the internet should be carefully used, there are many softwares that can unknowing make people not to have privacy, these softwares are mostly owned by big companies like google while there are some softwares needed on devices in order to have privacy. How we handle our devices generally is very important in maintaining privacy also.


1. Privacy-based browsers
The first to focus on are browsers, there are some privacy browsers but some browsers are privacy invaders, a good example of privacy invader browser is Chrome which is owned by tech giant called Google. Your web browser is the vehicle that carries you around the Internet to your desired websites. As such, it knows precisely what sites you have visited, how long you spent browsing them, and what you clicked on (or almost clicked on). Anyone who has access to your web browser can have a window into your income, your political leanings, and even your sexual preferences. This is why it’s so important to only use browsers you know will protect and improve your internet privacy. Below web browsers are best in keeping your browsing history safe from data-hungry tech companies and advertisers.

Firefox


The open source Firefox is the third-most-popular browser on the Internet, behind Google’s Chrome and Apple’s Safari. Developed by Mozilla, the Firefox team has improved the browser’s privacy protections in recent years. They have introduced advanced anti-fingerprinting and Enhanced Tracking Protection features this year, both of which make it much more difficult for third-party trackers to follow you around the Internet. If you primarily browse the Internet on your mobile device, Firefox Focus incorporates automatic ad blocking.

Tor browser


Tor is the best option if privacy is your utmost concern. The Tor browser is based on Firefox, but it has been stripped down and specially calibrated to run on the Tor network. When you use Tor, your traffic is encrypted three times and bounced between three Tor servers before it reaches your desired website. The encryption is handled in such a way that each server only has access to one set of instructions, so no server has access to both your IP address and the website you are visiting. This setup makes it impossible for Tor to keep any records about your online activity, and every time you close your session, the browser deletes your cookie cache and browsing history. The browser itself is formatted to prevent fingerprinting, and it blocks all kinds of trackers. Unfortunately, it also blocks a lot of plugins that websites rely on. For example, with its privacy settings fully activated, the Tor browser will block JavaScript. JavaScript can expose user information, but blocking it can make websites unusable. Using Tor can also mean performing endless CAPTCHA verifications when you try to access larger sites. Finally, the Tor browser is slower than other browsers because of the extra encryption.

DuckDuckGo


Unlike the other browsers mentioned above, DuckDuckGo does not have a standalone desktop browser, which means it is only a solution if you are browsing the Internet on your smartphone or tablet. With the DuckDuckGo browser, your browsing history never leaves your device. Deleting your entire browsing history is as easy as tapping a single button. It automatically blocks ads, stops third-party trackers, and ensures HTTPS encryption on all sites where that’s possible. One feature that does set it apart is the Privacy Grade it gives each site. This makes it easy for you to evaluate how much data each website collects from you, with and without DuckDuckGo’s protections, at a single glance.


2. Privacy Search Engines
The second to focus on are the search engines we are using, the reason why we should focus on search engines is discussed below using google as an example of privacy-invading search engines. Popular search engines like Google and Bing track your searches and other online activity.


DuckDuckGo


DuckDuckGo, unlike Google, utilizes the traditional method of “sponsored links” to display the advertisements. The ads are not focused on you but only the topic you are searching for – so there is nothing that could generate a profile of you in any manner – thereby respecting your privacy. Of course, DuckDuckGo’s search algorithm may not be the smartest around (because it has no idea who you are!). And, if you want to utilize one of the best privacy oriented alternative search engines to Google, you will have to forget about getting a personalized experience while searching for something. The search results are simplified with specific meta data. It lets you select a country to get the most relevant result you may be looking for. Also, when you type in a question or search for a fix, it might present you with an instant answer (fetched from the source). Although, you might miss quite a few functionalities (like filtering images by license) – that is an obvious trade-off to protect your privacy.

Qwant


Qwant is probably one of the most loved privacy oriented search engines after DuckDuckGo. It ensures neutrality, privacy, and digital freedom while you search for something on the Internet. If you thought privacy-oriented search engines generally tend to offer a very casual user experience, you need to rethink after trying out Qwant. This is a very dynamic search engine with trending topics and news stories organized very well. It may not offer a personalized experience (given that it does not track you) – but it does offer a rich user experience. Qwant is a very useful search engine alternative to Google. It lists out all the web resources, social feeds, news, and images on the topic you search for.

Lists of other privacy search engines
Startpage
Privatelee
searX
MetaGer
Swisscows
Peekier
Ecosia
Gibiru
Mojeek

Information Google and other big companies are tracking, and why
IP address
Location
Unique browser, app, and device identifiers
Search terms

When you think about how many times a day you enter a search term in Google, it’s easy to see how easy it would be for the company to build up a profile that strongly reflects what you do on a day-to-day basis. For example, we tend to search for a ton of topics related to our personal lives, all these information represent a pot of gold for advertisers. Advertisements are highly targeted to us based on our online activity because it is often highly reflective of our offline activity. Google and affiliate advertisers can create a very accurate profile of how each of us lives and market to us accordingly.

Why is Google tracking an issue?
Some people might find it helpful to be served ads on websites, within social media, and in emails that are tailored based on their personal tastes. Indeed, this is the basic premise upon which Google and similar companies justify their intense online tracking. They will typically say something along the lines of “to serve our customers better” or “to provide an improved experience for our users.”

What is really happening is that you, or your data at least, is a product that can be sold to advertisers or other third parties, whoever is the highest bidder, and this is a way that can leak your data to hackers. Many users find this intrusive and even downright creepy. Aside from knowing that someone is compiling a plethora of details about you so they can figure out how best to sell you products and services. The fact that all of this data is stored somewhere also makes it a target for hackers. And let’s not forget the potential for human error which could cause the data to be exposed inadvertently.


3. Encrypting Internet connection with VPN
A VPN encrypts your Internet connection from your device to the server owned by your VPN service provider. Using a VPN can help keep your web traffic safe from anyone monitoring the network at the local level: hackers, your Internet service provider, and surveillance agencies. A VPN will also mask your true location and IP address, allowing you to browse more privately and access geo-restricted content. A VPN will not, however, protect your web traffic against the VPN provider. That’s why it’s important to choose a VPN service you trust that does not keep logs of your activity. Download speed and privacy are usually the top considerations when looking for the best Tor VPNs. They can be used together to improve online privacy, but a provider that logs your activity or uses insufficient security will do just the opposite. The seven best VPNs for Tor and how to use them.

ExpressVPN Best VPN for Tor


Fastest VPN for Tor. Military-grade encryption. Accepts Bitcoin and has an onion site. ExpressVPN recently launched a .onion version of its website for users who want to anonymously make an account. The British Virgin Islands-based company accepts Bitcoin and sticks to a strict no-logs policy. Some non-identifying information is logged such as dates (not times), choice of server location, and total amount of data transferred each day. Cutting-edge encryption is used by default including 256-bit AES encryption, 4,096-bit DHE-RSA keys with perfect forward secrecy, and SHA512 authentication. ExpressVPN is highly rated, fast, user-friendly and has apps available for Windows, MacOS, Android, iOS, and Linux (command line).

Pros::
Fast and reliable
Accepts bitcoin
Has a .onion site
Leading security
No identifying logs

Cons:
Slightly more expensive

NordVPN Budget VPN


No logs, huge server network, strong security. Includes 30-day money-back guarantee. NordVPN gives users access to specialized servers pre-configured with Tor over VPN, which means all traffic is first sent through the VPN and then automatically redirected through the Tor network. This is great if you have apps other than an internet browser that you’d like to use with Tor. A double-VPN option is also available, which could be used with the Tor browser for a total of two VPNs and the Tor network, if you can tolerate the speed hit. NordVPN also boasts a strict zero logs policy and 256-bit AES encryption. The company accepts Bitcoin. Apps are available for Windows, MacOS, iOS, and Android.

Note that some experts object to Tor over VPN servers because NordVPN could hypothetically see what users are doing with their Tor connection by analyzing traffic before Tor encrypts it. NordVPN says it keeps zero logs, but if this is a concern, we recommend setting up Tor and the VPN independently.

Pros:
Onion servers
No logs
Strong security
Accepts bitcoin

Cons:
A few servers didn’t work

Surfshark


This privacy-conscious VPN comes packed with security features and allows you to pay in three different cryptocurrencies. Surfshark has 1,700+ servers in more than 60 countries, so you should be able to get a fast connection regardless of where you are in the world. Surfshark has a no-logging policy and secures your traffic with 256-bit AES encryption, a kill switch, and protection against IPv6, DNS, and WebRTC leaks. This service also has a couple of more advanced features. For instance, you can connect to multi-hop servers for even greater anonymity or speed up your other apps by using the split tunneling feature. Surfshark accepts Bitcoin, Ethereum, and Ripple payments, allowing you to sign up almost completely anonymously. Support is available 24/7 over live chat. Surfshark offers iOS, Android, Linux, MacOS, and Windows apps. It also works with supported routers but must be configured manually.

Pros:
Puts major emphasis on user security and privacy
Has no connection limit
Good speeds

Cons:
Some slow servers

CyberGhost


Excellent security, fast connection speeds, and zero logs. Our preferred budget VPN for Tor. PrivateVPN Simple to use, fast servers, and no logs. Also works well with streaming sites. CyberGhost doesn’t have any Tor-specific features, but it is the only VPN to earn a perfect score in our 2018 security and privacy assessment. For this reason, it pairs well with the Tor Browser. CyberGhost assigns each user a unique anonymous ID, and the email address you use to sign up is encrypted. This prevents third parties from connecting a users’ email address to their CyberGhost account. CyberGhost stores no identifying logs. The company is based in Romania, which has no mandatory data retention laws. Strong encryption, leak protection, a kill switch, and perfect forward secrecy are all included in the apps, even on mobile. Internet connection speeds are plenty fast enough to handle Tor traffic. Apps are available for Windows, MacOS, Linux, iOS, and Android. You may connect up to seven devices at a time.

Pros:
Advanced security
Zero logs
Bitcoin accepted
Fast

Cons:
No Tor-specific features

PrivateVPN’s


PrivateVPN’s website has a helpful guide on how to alter the OpenVPN configuration files included in the app so that outgoing internet traffic first passes through the Tor network, and then through the VPN—a setup known as “VPN over Tor”. If you want to use Tor to access sites on the clear web that don’t normally allow Tor connections, your IP address will be that of the VPN server, and the site won’t block you. Note that if you don’t want your ISP to see that you’re using Tor, it’s better to use a standard VPN connection with the Tor browser.

PrivateVPN offers great speeds and advanced security, plus a strict no-logs policy. You can connect six devices simultaneously.

Pros:
Zero logs
Fast servers
Strong encryption
Supports Tor-over-VPN

Cons:
Smaller server network

IPVanish


Advanced security, zero logs, and fast. Also popular with Kodi and torrent users. IPVanish is a speedy VPNs that doesn’t sacrifice privacy or security. A subscription gets you strong leak protection, unbreakable encryption,  and a strict no-logs policy. IPVanish allows up to 10 simultaneous connections — more than any other provider on this list. IPVanish apps come with an obfuscation feature that disguises the encrypted VPN tunnel as normal internet traffic. You can opt to periodically change your assigned IP address at certain intervals, making you harder to track. It doesn’t accept bitcoin, though, so if you want to make an anonymous purchase, look elsewhere. Apps are available for Windows, MacOS, iOS, and Android.

Pros:
Fast speeds
Security is solid
No logs

Cons:
Bitcoin not accepted

https://www.privacytools.io/providers/vpn/
Warning: Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic. If you are looking for anonymity, you should use the Tor Browser instead of a VPN. If you're looking for added security, you should always ensure you're connecting to websites using encrypted DNS and HTTPS. A VPN is not a replacement for good security practices. If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved.

4. Making your communications private
When communicating online, there are several ways companies or hackers can access your private conversations. Without encryption, an attacker monitoring the Internet would be able to see the information being transmitted to chat messages. Of course, the vast majority of online services use some form of encryption to protect the data traveling to and from their servers. But only a few tech companies encrypt your information in such a way that even the company cannot decrypt it. This kind of encryption is called end-to-end encryption (E2EE). Whenever possible, use services that offer E2EE and protect your privacy by default.

Using encrypted email(s)
Services like Gmail, Yahoo and Hotmail can scan your mailbox to collect data. Google, for instance, reads your purchase confirmation emails to build a database of everything you buy. If you don’t want your email service provider to have access to this kind of private information, you should switch to an end-to-end encrypted email provider. A good example of such emails is ProtonMail, messages between ProtonMail users are always transmitted in encrypted form. When a user sends an email to another ProtonMail user, the emails are encrypted on the sender’s device, and can only be decrypted by the recipient. All emails sent to/from a ProtonMail account (even if the other side is not using ProtonMail) are stored with zero-access encryption. Once a message is encrypted, only the account owner can decrypt it.
Increasingly, there are private alternatives to data-hungry companies, ProtonMail is a private alternative to Gmail. Instead of Google Drive, which can access and scan your files and documents, you could use encrypted cloud storage. For notes, Standard Notes is one end-to-end encrypted option.

Limiting information shared publicly
A lot of sensitive information about you is publicly available on the Internet. Some of it is a matter of public record, like court records, addresses, and voter registration. But much of it we put on the Internet voluntarily, usually via social media, like photos (often location tagged), family members’ names, and work history. Hackers can use these clues for social engineering and to answer security questions. Photos of you on social media can even be used to create deepfake videos of you. Almost all online services and Internet-connected devices have privacy settings you can adjust to restrict the amount of information collected and/or shared online. You can also add an additional email address to your ProtonMail account, which you can share publicly, instead of your primary email.

Limiting information shared privately
Online service providers can be vulnerable to data breaches, which can instantly compromise your privacy, sometimes in embarrassing ways. Even large services like Google or Facebook are not immune to data breaches. You can mitigate the privacy threat of data breaches by limiting the information you share with these services. For instance, you can use Google Chrome or Google Maps without logging into your account, or simply switching to a more privacy-friendly browser like Firefox. If the services themselves (and their third-party partners) are part of your threat model, switch to privacy-focused services that do not collect user data. With ProtonMail, accounts are anonymous (not linked to your real-life identity), and we collect as little user information as possible.

5. Be vigilant of phishing attacks
A phishing attack attempts to steal your account credentials or infect your device with malware by tricking you into clicking on a link or downloading an attachment. Phishing attack can be through email, or any other means like impersonation, clicking on unsecured links or visiting a site packed with malware's can all lead to phishing attacks. To protect yourself from phishing attack:

1. Do not click on links you do not authorize
2. Delete old apps on your devices
3. Be careful of who you are chatting with on social media , especially, strangers.
4. Not click on unsecured sites, unsecure sites are the http sites that do not have SSL certificate, visiting https sites have secure connections but the site itself may still be for scammers, so this only handle the connection part no what is happening on the site.
5. Updating your device OS (operating system) and also updating apps. You can help prevent attackers from installing malware on your device by keeping your apps and operating systems up to date. Software updates often include security patches for recently discovered vulnerabilities
6. Visiting legit sites
7. Not clicking on ads and link ads
8. Making use of privacy browsers
9. Not making use of free VPN but paid ones that are also legit and have high quality reputations.
10. Making use of privacy search engine and many more that are addressed on this write up.

6. Keep your device always locked
Because of the differences between different operating systems and devices, we will only provide general recommendations here. Always set a password on your device. Biometric authentication, such as fingerprints should be sufficient for most users. However, people with elevated security concerns may opt to require a password every time.

When to use Tor
If your threat model requires a very high level of Internet privacy, you should connect to the Internet through Tor. Tor is a technology maintained by the nonprofit Tor Project, which allows you to use the Internet anonymously. It works by bouncing your connection through multiple layers of encryption, both protecting your data and concealing its origin. Tor also allows you to access blocked websites (such as those offering E2EE services) via the dark web. However, the downside of Tor is that it is generally significantly slower compared to using a VPN

Conclusion
There are lots of ways to have high privacy, but privacy can not be 100%, having knowledge about it can be effective in avoiding hackers. Hackers are threat to bitcoin and other cryptocurrencies, because these cryptocurrencies are digital based, we need to have high level of privacy to protect them from scammers.

https://itsfoss.com/privacy-search-engines/
https://www.comparitech.com/blog/vpn-privacy/best-private-search-engine/
https://www.comparitech.com/blog/vpn-privacy/best-private-search-engine/
https://www.comparitech.com/blog/vpn-privacy/the-best-vpns-for-tor/
https://www.vpnmentor.com/amp/blog/best-private-search-engines-true-no-log-services/
https://protonmail.com/blog/internet-privacy/
https://protonmail.com/blog/best-browser-for-privacy/
https://www.comparitech.com/blog/vpn-privacy/best-vpn-for-windows-10/
https://www.comparitech.com/blog/vpn-privacy/fastest-vpns-of-2016-our-top-5-for-speed/










.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
1715086100
Hero Member
*
Offline Offline

Posts: 1715086100

View Profile Personal Message (Offline)

Ignore
1715086100
Reply with quote  #2

1715086100
Report to moderator
1715086100
Hero Member
*
Offline Offline

Posts: 1715086100

View Profile Personal Message (Offline)

Ignore
1715086100
Reply with quote  #2

1715086100
Report to moderator
"You Asked For Change, We Gave You Coins" -- casascius
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715086100
Hero Member
*
Offline Offline

Posts: 1715086100

View Profile Personal Message (Offline)

Ignore
1715086100
Reply with quote  #2

1715086100
Report to moderator
1715086100
Hero Member
*
Offline Offline

Posts: 1715086100

View Profile Personal Message (Offline)

Ignore
1715086100
Reply with quote  #2

1715086100
Report to moderator
ABCbits
Legendary
*
Offline Offline

Activity: 2870
Merit: 7483


Crypto Swap Exchange


View Profile
October 06, 2020, 10:35:47 AM
Merited by Charles-Tim (1)
 #2

Take note this guide would be less useful if you still use OS Windows or Android which comes with all kinds of data collection by default Roll Eyes

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
October 06, 2020, 10:36:14 AM
Merited by ABCbits (1), Charles-Tim (1)
 #3

I'm afraid I'm going to criticize most of your VPN recommendations.

Surfshark previously used CloudFlare on their VPN servers (I'm not sure if they still do - there have been conflicting reports). That makes it an instant avoid for that reason alone.

I've posted about CyberGhost before - https://bitcointalk.org/index.php?topic=5203656.msg53196238#msg53196238. Another one to definitely avoid.

IPVanish keeps logs and hands them over to the authorities - https://restoreprivacy.com/ipvanish-provides-logs-to-authorities/.

NordVPN servers were accessed by a hacker and they hid this fact for 18 months before it finally came out. They were previously a good VPN provider, but I would place zero trust in a company which covers up such a fact from users which have been affected.

For detailed VPN reviews, look here: https://restoreprivacy.com/ipvanish-provides-logs-to-authorities/
For simple VPN reviews, look here: https://www.privacytools.io/providers/vpn/



In terms of browsers, Tor is obviously the best, but many people do not want to use it because of the issues you have outlined - speed, breaking sites, etc. Firefox is the best "standard" browser, but there are a number of tweaks and add-ons you should be using to improve your privacy more. Start here and work down the page - https://www.privacytools.io/browsers/#webrtc. Disable WebRTC, download the commended add-ons, and implement the about:config tweaks.
Charles-Tim (OP)
Legendary
*
Offline Offline

Activity: 1540
Merit: 4850



View Profile
October 06, 2020, 11:08:31 AM
 #4

Take note this guide would be less useful if you still use OS Windows or Android which comes with all kinds of data collection by default Roll Eyes
That is correct, there are lots more to be reviewed, I noticed one thing, I have three devices and I used the same email on all the three devices before, I was using VPN on just one of the devices before, later I decided to use VPN on the three devices, all I noticed was that my password to login on the VPN just pop up when I wanted to sign in on the other two devices. Not only that, it happens to anything I am doing using an app I already have on one device but want to log in on another device having the same google email. I later knew google backs up my data. If one of the device is stolen by hackers, that will be the end as all my passwords will be known to the hackerss, because all my logging details are stored on google, I later have to delete all the login details. So now, I also deleted main google account on the two devices, and anytime I am registering for anything on my device, I do not save passwords again but only making back ups offlinne. You are very right.

...
You are right, VPN has its own issues, there are many VPN providers that indicated they do not save users log, but lies, I have noticed many case like that, about the ones you have just implied now, I found it now to also be true.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
hatshepsut93
Legendary
*
Offline Offline

Activity: 2968
Merit: 2145



View Profile
October 06, 2020, 11:10:44 AM
 #5

I'm pretty sure all the VPN's do keep logs, even if they claim they don't, because if not, they would be shut down rather quickly by governments. With VPN you are just replacing one party that can monitor your traffic - your ISP, with another - the VPN provider. Better just use TOR, as it's a truly decentralized solution where there's very little chance that you will get deanonymized, as long as you do everything right.

.BEST.CHANGE..███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
Charles-Tim (OP)
Legendary
*
Offline Offline

Activity: 1540
Merit: 4850



View Profile
October 06, 2020, 11:24:58 AM
 #6

I'm pretty sure all the VPN's do keep logs, even if they claim they don't, because if not, they would be shut down rather quickly by governments. With VPN you are just replacing one party that can monitor your traffic - your ISP, with another - the VPN provider. Better just use TOR, as it's a truly decentralized solution where there's very little chance that you will get deanonymized, as long as you do everything right.
Although, I really specially specified on Tor again as the last part of the article, but, your comment gives more insight that VPN providers do claim to not save logs which is a lie. Only when goverments are in need of them to take down hackers are the time people will realized they are saving logs, this is 100% true. The worst part of it, is that after taking down the hackers, they will still claim they are not saving logs. That is why Tor is the best means to achieve most high level of privacy but it is slower than other means but the best.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
October 06, 2020, 01:12:28 PM
 #7

I'm pretty sure all the VPN's do keep logs, even if they claim they don't, because if not, they would be shut down rather quickly by governments.
Not necessarily. A lot of VPN providers are incorporated in nations which have fairly good privacy laws such as Switzerland, and don't partake in mass surveillance of their population and tapping all lines of communication like the US and other 5- or 9-eyes countries do. Although I would never use a VPN based in such countries, even some of those based in the US - hands down the worst Western country for privacy invasion - such as Private Internet Access, have been subpoenaed for information and proved in court that they do not keep logs.

Note that I would absolutely avoid Private Internet Access for other reasons - their parent company (Kape) hide malware and adware in software packages that they send to customers.

With VPN you are just replacing one party that can monitor your traffic - your ISP, with another - the VPN provider. Better just use TOR, as it's a truly decentralized solution where there's very little chance that you will get deanonymized, as long as you do everything right.
This is true, and VPN's should not be relied upon for anonymity, but that doesn't make them useless.
condoras
Legendary
*
Offline Offline

Activity: 2912
Merit: 1103


This is what I do. I drink and I know things.


View Profile
October 06, 2020, 02:16:43 PM
 #8

Very good and helpful thread, congrats! Hopefully, you will update it with new things, providers, etc. as time goes by since internet privacy is a top priority for all and things change fast in this area.


Btw, something (a bit) irrelevant. It's true that the best way for online privacy is to use TOR but besides the reasons that you and others already mentioned, the main issue is people's safety if they try to use it. So perhaps it will be good and for sure helpful, to create a guidence thread regarding how can someone use TOR safely. Just a thought. Cool

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits.
..........UNLEASH..........
THE ULTIMATE
GAMING EXPERIENCE
DUELBITS
FANTASY
SPORTS
████▄▄█████▄▄
░▄████
███████████▄
▐███
███████████████▄
███
████████████████
███
████████████████▌
███
██████████████████
████████████████▀▀▀
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
.
▬▬
VS
▬▬
████▄▄▄█████▄▄▄
░▄████████████████▄
▐██████████████████▄
████████████████████
████████████████████▌
█████████████████████
███████████████████
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
/// PLAY FOR  FREE  ///
WIN FOR REAL
..PLAY NOW..
Rikafip
Legendary
*
Offline Offline

Activity: 1750
Merit: 5989



View Profile WWW
October 06, 2020, 02:44:08 PM
 #9

I'm pretty sure all the VPN's do keep logs, even if they claim they don't, because if not, they would be shut down rather quickly by governments.
Not necessarily. A lot of VPN providers are incorporated in nations which have fairly good privacy laws such as Switzerland, and don't partake in mass surveillance of their population and tapping all lines of communication like the US and other 5- or 9-eyes countries do. Although I would never use a VPN based in such countries, even some of those based in the US - hands down the worst Western country for privacy invasion - such as Private Internet Access, have been subpoenaed for information and proved in court that they do not keep logs.
Yep, country of incorporation is important, and I would generally avoid all VPNs registered in US and majority of EU countries.

VPN I am using for the last couple of years, ExpressVPN is incorporated in British Virgin Islands, and there they have strong privacy laws, at least they claim so.  Dunno, maybe they ExpressVPN is lying too and they do keep logs and are willing to give them to foreign countries, but generally I am very satisfied with them and I keep recommending them to everyone. I've tried many others (I was especially disappointed with NordVPN that advertises very agressively,  and none of them come even close). They are not the cheapest VPN around, but they are well worth the money, imho. You have to trust someone to some degree, otherwise might as well go into forest and live as a recluse.

██
██
██
██
██
██
██
██
██
██
██
██
██
... LIVECASINO.io    Play Live Games with up to 20% cashback!...██
██
██
██
██
██
██
██
██
██
██
██
██
NotATether
Legendary
*
Offline Offline

Activity: 1596
Merit: 6730


bitcoincleanup.com / bitmixlist.org


View Profile WWW
October 06, 2020, 03:10:26 PM
 #10

Instead of Google Chrome there is also Chromium which does not have any Google integrations in it. It is the open-source version of Chrome that doesn't have any Google tracking in it.

The two places you can download Chromium from are https://chromium.woolyss.com/, (get one of the "ungoogled" versions) and there is also an official script on Github that runs and downloads the latest Chromium for Linux. https://github.com/scheib/chromium-latest-linux

Keep in mind the chromium-latest-linux repo won't work if you live in a sanctioned country, but with the help of my new server I can create my own mirror that can evade these sanctions.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Smartvirus
Legendary
*
Offline Offline

Activity: 1428
Merit: 1110



View Profile
October 06, 2020, 08:11:58 PM
 #11

For a fact at OP, there is a lot that continues to evade us with regards to the privacy policy of certain applications and platforms which takes rather a long time of usage, testimonies from victims, insiders and code developers to aid in the discovery of the various conspiracies associated with privacy policies. Especially with the fact that, these platforms aren't built by ourselves and even at that, it's still going to be routed to some server giving it a doorway to access certain data's on the platform.
The truth of the matter remains that, the less you use, the less vulnerable you become and vice versa. So, it's more important to stick to what your used to and that which have been discovered to be relatively safe.

R


▀▀▀▀▀▀▀██████▄▄
████████████████
▀▀▀▀█████▀▀▀█████
████████▌███▐████
▄▄▄▄█████▄▄▄█████
████████████████
▄▄▄▄▄▄▄██████▀▀
LLBIT
  CRYPTO   
FUTURES
 1,000x 
LEVERAGE
COMPETITIVE
    FEES    
 INSTANT 
EXECUTION
.
   TRADE NOW   
logderson
Newbie
*
Offline Offline

Activity: 9
Merit: 2


View Profile
October 07, 2020, 10:48:26 AM
 #12

I'm afraid I'm going to criticize most of your VPN recommendations.

Surfshark previously used CloudFlare on their VPN servers (I'm not sure if they still do - there have been conflicting reports). That makes it an instant avoid for that reason alone.

I've posted about CyberGhost before - https://bitcointalk.org/index.php?topic=5203656.msg53196238#msg53196238. Another one to definitely avoid.

IPVanish keeps logs and hands them over to the authorities - https://restoreprivacy.com/ipvanish-provides-logs-to-authorities/.

NordVPN servers were accessed by a hacker and they hid this fact for 18 months before it finally came out. They were previously a good VPN provider, but I would place zero trust in a company which covers up such a fact from users which have been affected.

For detailed VPN reviews, look here: https://restoreprivacy.com/ipvanish-provides-logs-to-authorities/
For simple VPN reviews, look here: https://www.privacytools.io/providers/vpn/



In terms of browsers, Tor is obviously the best, but many people do not want to use it because of the issues you have outlined - speed, breaking sites, etc. Firefox is the best "standard" browser, but there are a number of tweaks and add-ons you should be using to improve your privacy more. Start here and work down the page - https://www.privacytools.io/browsers/#webrtc. Disable WebRTC, download the commended add-ons, and implement the about:config tweaks.

Don't know much about SurfShark or IPVanish, but apparently NordVPN's situation was not as straightforward as you say. I've read that the server management company failed to disclose the breach to Nord and also the breach did not affect any user data, and that's why it took so long for them to disclose it. Other than that I like that they now do yearly 3rd party audits.
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
October 07, 2020, 11:51:30 AM
 #13

but apparently NordVPN's situation was not as straightforward as you say.
Sure, I appreciate that the NordVPN breach did not affect private data, but it is the underlying processes which make it concerning. As you say, the server management company did not reveal the breach to Nord. That is hugely concerning that Nord are unaware of breaches which are happening on their own servers. And after Nord were made aware of it, they did not alert users who could have been breached or MITM attacked for several months.

It is this lack of awareness of their own systems and lack of respect for their customers which makes me avoid them, as opposed to the breach itself.
SquirrelJulietGarden
Hero Member
*****
Offline Offline

Activity: 1316
Merit: 727



View Profile
October 08, 2020, 04:43:19 AM
 #14

Tor

You have to sacrifice loading speed when you use it.

You can have Android version https://guardianproject.info/apps/org.torproject.android/

Tor is the best for your privacy because you don't have to put your belief on companies and their servers to protect your privacy. How is Tor different from other proxies? and No backdoor in Tor

Manage your identities
You can choose one of 2 options: New identity, New Tor Circuit for this Site when you open Tor browser.


https://tb-manual.torproject.org/managing-identities/

███▄▀██▄▄
░░▄████▄▀████ ▄▄▄
░░████▄▄▄▄░░█▀▀
███ ██████▄▄▀█▌
░▄░░███▀████
░▐█░░███░██▄▄
░░▄▀░████▄▄▄▀█
░█░▄███▀████ ▐█
▀▄▄███▀▄██▄
░░▄██▌░░██▀
░▐█▀████ ▀██
░░█▌██████ ▀▀██▄
░░▀███
▄▄██▀▄███
▄▄▄████▀▄████▄░░
▀▀█░░▄▄▄▄████░░
▐█▀▄▄█████████
████▀███░░▄░
▄▄██░███░░█▌░
█▀▄▄▄████░▀▄░░
█▌████▀███▄░█░
▄██▄▀███▄▄▀
▀██░░▐██▄░░
██▀████▀█▌░
▄██▀▀██████▐█░░
███▀░░
jossiel
Hero Member
*****
Offline Offline

Activity: 2982
Merit: 632


Seabet.io | Crypto-Casino


View Profile
October 08, 2020, 10:49:45 PM
 #15

I've watched a YouTube white-hat hacker and suggests that for VPN, he prefers to use Proton VPN. The reason is that it's based on Switzerland and that country has a good law about privacy which is in favor of the users.

I'm still haven't got to use it. But what do you think about it?

He also suggests for an email to use proton mail.

libert19
Hero Member
*****
Offline Offline

Activity: 2492
Merit: 942



View Profile WWW
October 09, 2020, 04:43:39 AM
 #16

Take note this guide would be less useful if you still use OS Windows or Android which comes with all kinds of data collection by default Roll Eyes

They are ways really, few tips for android, use custom roms which is ofc bit complicated. Disable Google and apps, use NetGuard to disable apps from consuming data (ie, not being able to send data to their servers), be careful about giving permissions, use proton mail instead of gmail, etc.

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits.
..........UNLEASH..........
THE ULTIMATE
GAMING EXPERIENCE
DUELBITS
FANTASY
SPORTS
████▄▄█████▄▄
░▄████
███████████▄
▐███
███████████████▄
███
████████████████
███
████████████████▌
███
██████████████████
████████████████▀▀▀
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
.
▬▬
VS
▬▬
████▄▄▄█████▄▄▄
░▄████████████████▄
▐██████████████████▄
████████████████████
████████████████████▌
█████████████████████
███████████████████
███████████████▌
███████████████▌
████████████████
████████████████
████████████████
████▀▀███████▀▀
/// PLAY FOR  FREE  ///
WIN FOR REAL
..PLAY NOW..
o_e_l_e_o
In memoriam
Legendary
*
Offline Offline

Activity: 2268
Merit: 18510


View Profile
October 09, 2020, 10:50:29 AM
 #17

Also for Android, you should consider using the app Orbot. It routes all traffic from all your apps, not just your browser, through the Tor network.

I'm still haven't got to use it. But what do you think about it?
ProtonVPN is one of the best choices. Good policies, transparent, open source, independently audited, accepts bitcoin.
SquirrelJulietGarden
Hero Member
*****
Offline Offline

Activity: 1316
Merit: 727



View Profile
October 09, 2020, 03:26:30 PM
Merited by o_e_l_e_o (2)
 #18

Also for Android, you should consider using the app Orbot. It routes all traffic from all your apps, not just your browser, through the Tor network.
That link is for Orbot app.

Quote
Orbot: Proxy with Tor
Enhance your privacy and break through firewalls.

███▄▀██▄▄
░░▄████▄▀████ ▄▄▄
░░████▄▄▄▄░░█▀▀
███ ██████▄▄▀█▌
░▄░░███▀████
░▐█░░███░██▄▄
░░▄▀░████▄▄▄▀█
░█░▄███▀████ ▐█
▀▄▄███▀▄██▄
░░▄██▌░░██▀
░▐█▀████ ▀██
░░█▌██████ ▀▀██▄
░░▀███
▄▄██▀▄███
▄▄▄████▀▄████▄░░
▀▀█░░▄▄▄▄████░░
▐█▀▄▄█████████
████▀███░░▄░
▄▄██░███░░█▌░
█▀▄▄▄████░▀▄░░
█▌████▀███▄░█░
▄██▄▀███▄▄▀
▀██░░▐██▄░░
██▀████▀█▌░
▄██▀▀██████▐█░░
███▀░░
bob123
Legendary
*
Offline Offline

Activity: 1624
Merit: 2481



View Profile WWW
October 09, 2020, 04:04:49 PM
 #19

This is true, and VPN's should not be relied upon for anonymity, but that doesn't make them useless.

It doesn't make them useless. But the majority of VPN user from this forum are using them because they actually believe they increase their privacy, anonymity or even security.

VPN's definitely have their use case. But enhancing anonymity/security is none of them.
And if you don't have a good reason to use a VPN, you most likely don't need one and it might even harm.

jossiel
Hero Member
*****
Offline Offline

Activity: 2982
Merit: 632


Seabet.io | Crypto-Casino


View Profile
October 09, 2020, 09:39:12 PM
 #20

I'm still haven't got to use it. But what do you think about it?
ProtonVPN is one of the best choices. Good policies, transparent, open source, independently audited, accepts bitcoin.
Thanks!

That confirms that the guy I've watched is legit and sharing information that are facts. Not like the other Youtubers, they're sharing misinformation about privacy.


Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!