Mar 29 2014
Once something has traveled over the Internet in any way, it’s potentially out there forever – and potentially public. You can delete a file from your computer, but once data has gone into the cloud, there’s never a guarantee that all copies of it have been eternally expunged. In fact, it’s far more likely that any given piece of data on the Internet will live on indefinitely.
Whether you have a Mac or PC, iOS or Android device, set-top box, cell phone, or some other network-enabled gadget, Joe Kissell’s updated ‘Take Control of Your Online Privacy’ has the advice that ordinary people need to handle common privacy needs (secret agents should really look elsewhere). Topics include:
- Why worry? Learn about who wants your private data, and, more important, why they want it. Even if you don’t believe you have anything to hide, you almost certainly do, in the right context. Would you give just anyone your financial records or medical history?
- Set your privacy meter: Develop your own set of personal privacy rules – everyone has different privacy buttons, and it’s important to figure out which are important to you.
- Manage your Internet connection: Understand privacy risks, prevent snoops, and take key precautions to keep your data from leaking out.
- Browse and search the Web: Learn what information is revealed about you when you use the Web. Avoid bogus Web sites, connect securely where possible, control your cookies and history, block ads, browse and search anonymously, and find out who is tracking you. Also, learn how to protect your passwords and credit card data.
- Send and receive email: Find out how your email could be intercepted, consider when you want email to be extra private (such as when communicating with a doctor or lawyer), get tips for sending email anonymously, and read ideas for alternatives to email.
- Talk and chat online: Consider to what extent any phone call, text message, or online chat is private and find tips for enhancing your privacy when using these channels.
- Watch your social media sharing: Social media is by definition social, so there’s a limit to how private it can be. Understand the risks and benefits of sharing personal information online, tweak your settings, and consider common-sense precautions.
- Share files: What if you want to share (or collaborate on) a contract, form, or other document that contains confidential or personal information? Find out about the best ways to share files via file server, an encrypted email attachment, cloud-based file sharing service, peer-to-peer file sharing, or private cloud.
Read all about this Ebook and watch Joe’s “None of Your Business” sketch here:
AMUG Members: Log in to members’ area for 30% MUG discount coupon code.
One more thing. A key aspect of maintaining privacy is using (and never re-using) strong passwords, so you don’t have to worry about anyone breaking into your accounts. Thanks to its clear recommendations about how to create and maintain secure passwords, Joe’s ‘Take Control of Your Passwords’ was TidBITS’ most popular book of 2013, and if you don’t already have a copy, you can save 20% when you buy it with ‘Take Control of Your Online Privacy’ using this link:
Buy 2 for USD$16. http://tid.bl.it/tco-online-privacy-passwords-20-bundle