Pinterest Stumbleupon Whatsapp
Advertisement

Internet surveillance has been a hot topic in recent years—we’ve talked about it extensively here at MakeUseOf, it’s been brought up on major news outlets daily, and we’ve seen a slew of new apps, extensions, and products aimed at helping you retain your privacy online.

This article is meant to be as comprehensive a resource as possible on avoiding Internet surveillance. We’ll talk about why Internet surveillance is such a big deal, who’s behind it, whether or not you can completely avoid it Can You Escape Internet Surveillance Programs Like PRISM? Can You Escape Internet Surveillance Programs Like PRISM? Ever since Edward Snowden blew the whistle on PRISM, the NSA's no longer secret surveillance program, we know one thing with certainty: nothing that happens online can be considered private. Can you really escape the... Read More , and a wide range of tools that will make you harder to track, identify, and spy on.

Avoiding Internet Surveillance: The Complete Guide

Why Worry About Internet Surveillance?

Before we get into the details of avoiding Internet surveillance, we should discuss exactly what sort of surveillance we’re talking about and why you might want to dodge it. Unless you’ve been living under a rock for a few years, you’ve heard about Edward Snowden and the documents that he released detailing surveillance programs run by the US National Security Administration (NSA) and the UK’s Government Communications Headquarters (GCHQ).

ed-snowden-talking

One of the most commonly discussed programs is called PRISM, and it allows the NSA to collect data from the servers of US service providers, including Microsoft, Apple, Google, Facebook, Yahoo!, and others. Anything you have stored on someone’s servers is potentially at risk of being collected and analyzed (to get the details, check out this article on everything you need to know about PRISM What Is PRISM? Everything You Need to Know What Is PRISM? Everything You Need to Know The National Security Agency in the US has access to whatever data you're storing with US service providers like Google Microsoft, Yahoo, and Facebook. They're also likely monitoring most of the traffic flowing across the... Read More ).

Advertisement

Other programs, like FAIRVIEW and STORMBREW, collect all traffic heading through a specific gateway or router. In both cases, there’s a wide variety of information that could potentially be collected, from browsing data and history How To Block Any Site Or Browser From Saving Recent Sites You Visited How To Block Any Site Or Browser From Saving Recent Sites You Visited Your web browser stores a list of your recently visited websites. Clearing this list is easy, but you’ll want to block your browser from saving history in the first place if you find yourself clearing... Read More to emails, chats, videos, photos, and file transfers. There are many others as well, including the recently revealed XKEYSCORE, which could make sure that you’re on the NSA’s watch list Your Interest in Privacy Will Ensure You're Targeted By The NSA Your Interest in Privacy Will Ensure You're Targeted By The NSA Read More if you search for privacy-related things like secure Linux distros Linux Distros For The Paranoid: What Are The Most Secure Distros? Linux Distros For The Paranoid: What Are The Most Secure Distros? If you're a Linux user, security was probably one of the benefits that made you switch from whatever operating system you were using before. Linux has a great reputation for being one tough nut to... Read More or virtual private networks (VPNs).

Of course, the US and the UK aren’t the only countries collecting data on citizens—it happens all over the world. It just so happens that we know the most about what’s going on in these two countries. And governments aren’t the only ones who are watching your movements online—this information is very valuable to private companies as well. While they won’t be reading your emails, they may track your browsing activity, social networking habits How To Block Facebook And Other Social Networks From Tracking You Online How To Block Facebook And Other Social Networks From Tracking You Online Whenever you visit a site with a Like, Tweet or +1 button, you're actually sharing data with Facebook, Twitter or Google. And that's not all. There are hundreds of advertising and data collection companies that... Read More , the apps you use, and information about your friends.

dates-when-prism-began-for-each-provider-slide.png

While this information is collected by private companies like social networks and retailers, it’s certainly possible that it will end up in government hands, either through programs like PRISM or through court orders to hand the data over. The same goes for the data collected by your Internet service provider Two Ways Your ISP Is Spying on You and How to Be Safe [10 x SurfEasy Total VPN + BlackBerry Z10 Giveaway] Two Ways Your ISP Is Spying on You and How to Be Safe [10 x SurfEasy Total VPN + BlackBerry Z10 Giveaway] It's a bad time to be a Verizon customer. Read More , which you might not even know about (much like users of Telstra had no idea their browsing habits were being logged and sent overseas).

So why might you want to keep governments and companies from getting this sort of information? There could be a wide variety of reasons: you’re a proponent of digital privacy, you’re worried that you could face discrimination or harassment because of your online activity, or because you feel that it violates human rights. All of these are perfectly good reasons for avoiding Internet surveillance.

If you’ve read this far, you’re probably already committed to the idea. However, there are a lot of people out there who believe they don’t have to worry about surveillance because they don’t have anything to hide. If we have a right to privacy, however, this argument is invalid. To find out more about why this argument just doesn’t work, you can read the section on it in my article about the Don’t Spy on Us event Lessons Learned From Don't Spy On Us: Your Guide To Internet Privacy Lessons Learned From Don't Spy On Us: Your Guide To Internet Privacy Read More .

Now that you have a better understanding of exactly what it is that we’re trying to avoid here, we can get into the details!

Hide Your Browsing Data

More than almost anything else, your browsing habits define you as an online entity. The sites you go to, the ads you see, the links you click—they all create a footprint that’s specific to you and your interests. Even if you don’t use your browser to access disreputable or dangerous sites, concealing this information could be valuable to you, especially if you live in a country that actively suppresses non-standard views Why The Next 10 Years Looks Bad for Internet Censorship Why The Next 10 Years Looks Bad for Internet Censorship Although denizens of the world are learning more about censorship and learning new ways to counteract it, the outlook for the future of Internet freedom isn't looking good. Read More (as we’ve seen in Iran, China, and Turkey). So how can you make sure no one’s watching what you’re doing online?

One of the simplest ways to go about concealing your actions on the web is to use a virtual private network, or VPN. When you’re engaging in unsecured browsing, your computer reaches out, through your ISP, across the Internet, to another site. Once you’ve made this connection, you can view that site. However, if anyone is looking closely, they can see that connection. A VPN inserts an intermediary server between you and the site you’re connecting to—if someone is looking now, all they’ll see is a connection from the VPN server to the site on the other end. Your connection to the VPN server is encrypted, concealing your identity.

There are quite a few VPNs that are free 5 Great Free VPN Services Compared: Which Is Fastest? 5 Great Free VPN Services Compared: Which Is Fastest? If you've never used a VPN before, you may want to reconsider. A VPN routes your internet connection through an encrypted third-party server, securing your data. But which VPN service is faster? Read More , which is great if you don’t use them all the time—many people only use them to access region-blocked video VPNs Are Old: Better Ways to Access Region-Blocked Video VPNs Are Old: Better Ways to Access Region-Blocked Video Internet users outside of the United States are blocked from accessing the wealth of streaming video and music content available to Americans. Even Americans are deprived of international services like BBC iPlayer. Faced with this,... Read More  when they want to watch Netflix from another country, for example. If you’re interested in getting a higher bandwidth limit, more speed, and no ads, you should look into paying for a VPN—we have a list of the best VPN services The Best VPN Services The Best VPN Services We've compiled a list of what we consider to be the best Virtual Private Network (VPN) service providers, grouped by premium, free, and torrent-friendly. Read More that you can check out. In most cases, it’s as simple as downloading a browser extension or an app, running a five-minute setup, and you’ll be on your way.

encryption-key

If a VPN is thought of as “one hop,” using the Tor network can be thought of as “three hops.” Instead of setting up a single server between you and your destination, using the Tor system bounces your connection through three separate servers before making the connection to the site you want to go to. The increased complexity of the connection makes it extremely difficult for anyone to monitor browsing traffic (though it’s been rumored that the NSA is making some progress in compromising the system).

To use Tor, you just need to download the Tor browser bundle and install it (we have a full guide to Tor Really Private Browsing: An Unofficial User’s Guide to Tor Really Private Browsing: An Unofficial User’s Guide to Tor Tor provides truly anonymous and untraceable browsing and messaging, as well as access to the so called “Deep Web”. Tor can’t plausibly be broken by any organization on the planet. Read More available that goes through the process in detail)—then, whenever you use the Tor browser, you’ll be routed through the Tor network. In addition to browsing with significantly increased security, you’ll also have access to .onion sites How To Find Active Onion Sites & Why You Might Want To How To Find Active Onion Sites & Why You Might Want To Onion sites, so named because they end with ".onion", are hosted as Tor hidden services – a completely anonymous way to host websites. They're part of the deep Web – an invisible part of the... Read More , websites that can only be visited through the Tor network.

If you want to make sure that your browsing is maximally secure, and that it’s next to impossible to trace, you can route your connection through a VPN and the Tor network. This makes for four servers between you and your destination. No one’s going to go through enough trouble to track you through that mess unless you’re at the top of an intelligence agency’s list.

how-tor-works

Another way that your browsing can be tracked is through files that are placed on your computer: cookies. These files can come from a number of sources, but one of the nefarious ways that you can receive trackers is through ads (which, as we have been finding out recently, can deposit a lot of bad stuff Meet Kyle And Stan, A New Malvertising Nightmare Meet Kyle And Stan, A New Malvertising Nightmare Read More on your computer). So how can you prevent these from sending data to snoopers? Ad blocking.

It’s a controversial practice, because ads keep much of the Internet free (see “Are Ad Blocking Browser Extensions Killing The Internet? Are Ad Blocking Browser Extensions Killing The Internet? Are Ad Blocking Browser Extensions Killing The Internet? One of the reasons for the Internet’s surge in popularity is the cost of most online content – or rather, the lack of cost. That’s not to say the content is free, however. Almost every... Read More ” and “AdBlock, NoScript, and Ghostery – The Trifecta of Evil AdBlock, NoScript & Ghostery - The Trifecta Of Evil AdBlock, NoScript & Ghostery - The Trifecta Of Evil Over the past few months, I've been contacted by a good number of readers who have had problems downloading our guides, or why they can't see the login buttons or comments not loading; and in... Read More “). However, blocking ads will prevent those ads from placing files on your computer. This means no cookies, no tracking information, and no malware. The prevalence of ad-embedded malware is on the rise, and blocking ads is currently the best way of keeping your computer safe; running an effective antivirus program like Avast Avast 2014 Launches With Do Not Track, Boot Disc, and DeepScreen Technology Avast 2014 Launches With Do Not Track, Boot Disc, and DeepScreen Technology Avast, one of the best Windows antivirus software out there, has released the latest version, Avast 2014, which it claims provides faster and better protection than any other in the market. Read More is also a good idea (though that might expose you to other forms of tracking Is Your Antivirus Tracking You? You'd Be Surprised At What It Sends Is Your Antivirus Tracking You? You'd Be Surprised At What It Sends Read More , as well).

If you’re not willing to go through the effort (and potentially slow your connection down a bit) to run VPNs or the Tor network on a regular basis, the best thing to do is to download and install a number of browser extensions. HTTPS Everywhere and Disconnect Search are two of the best, and they’re available for both Firefox Use These 6 Extensions To Improve Privacy & Security On Firefox Use These 6 Extensions To Improve Privacy & Security On Firefox You are being watched on the Internet – but if you use Mozilla Firefox, some of its great add-ons can help protect your privacy and security on the Web. Read More and Chrome.

Fortify Your Email Security

While browsing creates a digital footprint of your life, email has the potential to carry your most personal secrets, important business communications, and other kinds of sensitive information. While you might not send that sort of thing via email very often, it’s likely that you do discuss your opinions, beliefs, and plans, all of which could potentially be of interest to the government. What can you do to keep your private messages private?

First of all, it’s important to know that securing just one side of an email conversation won’t do you much good. If you send an encrypted message to a friend, and your friend stores it in an unencrypted format on a public server, it’s going to be pretty easy for someone to nab that message. Email is an inherently insecure medium Why Email Can't Be Protected From Government Surveillance Why Email Can't Be Protected From Government Surveillance “If you knew what I know about email, you might not use it either,” said the owner of secure email service Lavabit as he recently shut it down. "There is no way to do encrypted... Read More , which means you probably shouldn’t be using it for extremely private things at all. But there are a few things you can do to step up your security.

One of the most well-known and commonly used methods of encrypting email is called Pretty Good Privacy (PGP). The specific mechanics are quite complicated, but you can get the details in this guide to using PGP PGP Me: Pretty Good Privacy Explained PGP Me: Pretty Good Privacy Explained Read More . In a nutshell, the message is encrypted on your computer, signed with a digital key, and sent to your recipient. That person then uses their own personal key (which is kept secret) to decrypt the message. Theoretically, PGP is nearly uncrackable.

encryption-lock

PGP is a very popular option, but setting it up takes some minimal time and effort. If you’d skip the setup, you can use secure services like Hushmail, Vaultlet, and Enigmail, all of which were discussed in this article on secure email providers The 3 Most Secure & Encrypted Email Providers Online The 3 Most Secure & Encrypted Email Providers Online Fed up with government surveillance? Concerned your emails might be read by third parties? If so, it's worth looking at an encrypted email solution to protect your messages. Read More . These offer a number of different protections that help you rest easy that your mail won’t be easily intercepted and viewed by prying eyes.

Encrypting your mail will go a long way towards keeping the government from reading your messages, but they’re not the only ones who are interested in it. For example, Gmail monitors the contents of your messages The Gmail Panopticon: The End of Privacy As We Know It? The Gmail Panopticon: The End of Privacy As We Know It? Read More for specific triggers that indicate that you might be engaging in specific illegal activities. Earlier this year, the system alerted the authorities to a man who was trading child pornography. In addition to this sort of monitoring, they also scan the contents of your personal messages to better target ads.

Because of the insecurity of email and the fact that your email provider could be scanning your messages, your best bet is to not send anything via email that you’d like to keep private.

Encrypt Your Chats and IMs

We’ve started using instant messages for a lot of things, from quick personal chats to in-depth professional discussions. If you use Google’s chat app, you probably have thousands of IMs saved, and it’s quite likely that if you were to look through them, you’d find a huge variety of things that you don’t want other people to have access to. So what can you do to make sure no one’s snooping on your IMs?

One of the most widely used encryption protocols for instant messaging is called Off-the-Record messaging, or OTR. It uses an interesting style of cryptography called deniable authentication, which means that after the conversation, both participants can deny the existence of the conversation. Using OTR is quite simple: if two people have chat clients that can use the protocol, all they have to do is turn it on. A number of OTR-capable clients are now available, including Adium Adium - The Ultimate Instant Messaging App [Mac] Adium - The Ultimate Instant Messaging App [Mac] Start using the best instant messaging client out there for Mac. It's called Adium, it connects to everything and there's no reason for not using it. Okay, there's one reason - Adium does not support... Read More and Pidgin Combine All Your IM Accounts In One Application With Pidgin [Windows & Linux] Combine All Your IM Accounts In One Application With Pidgin [Windows & Linux] Pidgin is a free instant-messaging client that combines all your IM accounts in one simple application. Instead of running several different IM clients that display ads and eat up memory, just use Pidgin. All your... Read More , which provide OTR encryption for Google Talk, Facebook chat, AIM, Yahoo! Messenger, and a number of other protocols.

exchanging-keys

In addition to this widely used protocol, there are a number of other less well-known solutions. A great example of this is Cryptocat CryptoCat: Provides Private & Encrypted Chatting Within Your Web Browser CryptoCat: Provides Private & Encrypted Chatting Within Your Web Browser Read More , a web app that allows you to create an encrypted chat on the fly and invite others to join it by sending a link. After an hour of inactivity, your chats are wiped. It’s one of the easiest ways to encrypt a chat, you don’t need to download anything, and the browser extension lets you fire it up with a click.

SafeChat is another alternative that’s used for encrypting Facebook chats Keep Your Facebook Chats Secure With Encryption Keep Your Facebook Chats Secure With Encryption Facebook wants to take your personal messages and use them as a way to target you with more advertising. Let's try to stop them. Read More —so if you use Facebook primarily or exclusively for your IMing needs, it’s a good way to go. It’s available not only as a free Chrome and Firefox extension, but also as an iOS app, so you can continue your secure chatting on the go. ChatSecure is another app that allows you to securely use Facebook Chat and Google Talk from your phone.

Remember that with all of these encryption options, like secure email, both parties need to be using encrypted clients, or else anyone who wants to see what’s in your chat can just pull the information from your interlocutor’s computer.

Protect Your Messages

Chat, IM, and messaging are all becoming more similar, but there are still times when you want to use an app that’s a bit more like a traditional text messaging app Text Better with These Alternative SMS Apps for Android Text Better with These Alternative SMS Apps for Android Don't like your default SMS app? Try a new one! Read More than an instant messenger. Many of the apps that people use on a regular basis from their phones fall into this category, so it’s worth look at on its own. Because almost everyone uses them, they’re of high value to prying eyes—we saw a great example of this in South Korea last year.

There have also been a number of concerns over the privacy of specific messaging clients, such as when Facebook acquired WhatsApp Facebook WhatsApp, SkyDrive OneDrive, Yahoo Siri, Apple Tesla [Tech News Digest] Facebook WhatsApp, SkyDrive OneDrive, Yahoo Siri, Apple Tesla [Tech News Digest] Facebook buys WhatsApp, FCC responds to the loss of 'net neutrality', SkyDrive becomes OneDrive, Yahoo wants its own Siri, Apple is interested in Tesla, and Samsung mocks Apple in its latest set of television commercials. Read More . Although Facebook still hasn’t done much with the messaging app, it’s common knowledge that they collect a huge amount of data on users of their social network (including data on your offline purchases), and there’s been discussion of collecting some of that data through the contents of Facebook chat messages. Obviously, the acquisition of WhatsApp was cause for concern.

Since then, however, WhatsApp has stepped up its game in relation to security and privacy. In a recent Android update, it turned on end-to-end encryption for messages, meaning that not even the servers at WhatsApp contain unencrypted messages. This is a huge victory for privacy advocates. While this encryption hasn’t been enabled for all platforms yet, it’s likely to come in the near future.

woman-texting

Although WhatsApp remains at the top of messaging app popularity list, there are a lot of other great options. Telegram Telegram Provides A Secure & Fast-Growing Alternative To WhatsApp Telegram Provides A Secure & Fast-Growing Alternative To WhatsApp Read More is quickly becoming more popular, and beat WhatsApp to the punch on many features, like end-to-end encryption, self-destructing messages, and a web client. Telegram’s cloud-based messaging lets you see your messages from your phone, tablet, computer, and any other computer via a browser. The encryption protocol was developed specifically for the app to be highly secure and very fast. And it beats WhatsApp’s great $1-per-year pricing by being free.

We’ve profiled a number of other secure messaging apps 6 Secure iOS Messaging Apps That Take Privacy Very Seriously 6 Secure iOS Messaging Apps That Take Privacy Very Seriously Don't fancy your messages being read by unwanted parties? Get a secure messaging app and worry no more. Read More in the past, including Silent Text, Threema, Wickr, and Confide. If you can convince everyone that you regularly message to download one of these apps, you’ll have no cause to worry about the security of your messaging. Obviously it’s best if everyone’s using the same app, but the low cost of these options means it’s easy to message one group of friends with one app and another group with another.

Secure Your Mobile Device

While some of the apps and strategies listed above can be used on your mobile phone, there are a few issues that are unique to phones, such as the collection of metadata Metadata - The Information About Your Information Metadata - The Information About Your Information Read More . If you’ve been paying attention to the latest news on the NSA’s data collection practices, you’ll have heard of metadata—but you might not know what it is. Put succinctly, metadata is information about your information.

Metadata includes things like the phone numbers you’ve called, when you called them, how long you were on the phone, which cell towers you used during the call, and the location of the recipient of the call. Taken together, these things can actually reveal a lot about your conversation and your relationship with the person you’re talking to. Of course, with a court order, government agencies can also easily get a wiretap on your phone 6 Possible Signs Your Cell Phone May Be Tapped 6 Possible Signs Your Cell Phone May Be Tapped Has your smartphone been hacked? Is an employer, lover, scammer, or even newspaper giving you the type of enhanced attention that constitutes a breach of your privacy? Here are six signs to look out for. Read More , but that’s much less likely to happen.

mobile-privacy-surveillance

The difficulty in protecting your metadata is that it’s comprised of information stored by your phone company, and that information can be requested or subpoenaed. Companies aren’t exactly resistant in handing it over.

Unfortunately, the things you can do to protect your metadata are limited. Mobile hardware and software focused on privacy, like the BlackPhone and Silent Circle, helps a lot. They encrypt metadata and make it much more difficult for anyone to obtain it. You can also use a burner phone Sick of the NSA Tracking You? Burn Them with a Burner Phone Sick of the NSA Tracking You? Burn Them with a Burner Phone Sick of the NSA tracking you using your phone's positioning coordinates? Prepaid phones known colloquially as "burners" can provide you with partial privacy. Read More , if you’d rather not have the NSA collecting data on your phone calls, though this approach does come with some inconvenient drawbacks.

One of the interesting points that a few people have brought up recently is the fact that by offering end-to-end encryption in WhatsApp, Facebook is essentially throwing away a huge amount of potentially valuable data. No one believes that they would offer this feature just for users’ privacy after paying $19 billion for the app, so that value has to be made up somewhere—and most people are pointing to metadata. It’s really valuable.

support-snowden-protest

Beyond the methods above, the best way to keep your metadata out of the hands of the NSA is political: join campaigns to reform metadata-collection laws, hold companies accountable for the data that they hand over to the government, and make sure your voice is heard.

Although it’s tough to prevent the collection of your metadata, there are a number of things you can do to keep the content of your communications private. Using the apps detailed above for messaging is a great place to start (especially if you, like many people, do a lot more messaging than calling). And Guy’s article on three ways to make your smartphone more secure 3 Ways To Make Your Smartphone Communications More Secure 3 Ways To Make Your Smartphone Communications More Secure Total privacy! Or so we think, as our words and information went flying through the air. Not so: First it's word of warrantless wiretapping, then it's word of newspapers, lawyers, insurers and more hacking your... Read More  details Kryptos and Silent Phone, two VoIP apps that encrypt your calls, making them very resistant to any sort of data collection.

Messaging and calling isn’t all that you use your phone for, however—a lot of people also do a great deal of mobile browsing, and just like on your computer, this information can potentially be tracked. To protect your browsing data, there are a number of mobile VPN services that you can set up to use just like the ones discussed above for your computer. We’ve written about HotSpot Shield Hotspot Shield: A Solid VPN That's Available Free Of Charge Hotspot Shield: A Solid VPN That's Available Free Of Charge Read More  and VPN Express 2 Free VPN Services For Secure Browsing On Your iOS Device 2 Free VPN Services For Secure Browsing On Your iOS Device Read More  for iOS, as well as a number of Android VPN apps Keep Your Data Private With These 4 VPN Apps For Android Keep Your Data Private With These 4 VPN Apps For Android VPNs can be useful for a whole host of reasons, but their main benefits are that they keep your data private even over a public WiFi connection (which are surprisingly easy to exploit) and they... Read More , that will keep your mobile browsing data safe.

mobile-browsing

Many VPN services now offer both desktop and mobile protection, and you can get both by signing up for an account—if you’re concerned about your privacy and you don’t wanted limited bandwidth, spending $10 or $15 each month on a premium VPN The Best VPN Services The Best VPN Services We've compiled a list of what we consider to be the best Virtual Private Network (VPN) service providers, grouped by premium, free, and torrent-friendly. Read More might be well worth the cost.

Unfortunately, it’s difficult or impossible to prevent your service provider (or Google, or Apple) from tracking your location using the GPS receiver—if you really want to keep anyone from knowing where you are by tracking your phone, your best bet is to turn your phone off and take the battery out, or use the BlackPhone.

And don’t forget to opt out of ad tracking, too. It’s different on each phone, so check out this article on the basics of smartphone privacy Smartphone Privacy Settings You Need To Activate Today Smartphone Privacy Settings You Need To Activate Today Smartphones ship with plenty of default settings that could be leaking your info. Let's dive in and tweak them. Read More .

Keeping Your Social Life Private

Using secure browsing and messaging techniques will keep most of your social networking data from falling into the hands of the government (unless, of course, a social network gives in and hands your data over to the NSA, which is certainly possible). However, social networks—especially Facebook—are doing a lot of surveillance on their own. While they may not be collecting data to see if you’re a potential threat to national security, they can make a lot of money with it What Does Facebook Selling Your Data Mean For Privacy? What Does Facebook Selling Your Data Mean For Privacy? Read More . (You can make money selling your own data I Make $2000 A Year Selling My Personal Information, You Can Too I Make $2000 A Year Selling My Personal Information, You Can Too Don't be one of those suckers that sells their information for nothing! Read More , too, but that counteracts quite a bit of the advice in this guide.)

The amount of data collected by Facebook is staggering—they collect so much that they can create “shadow profiles Facebook Shadow Profiles: You Probably Have One Too [Weekly Facebook Tips] Facebook Shadow Profiles: You Probably Have One Too [Weekly Facebook Tips] You think you're not on Facebook? Think again. Facebook no doubt has a shadow profile made just for you. You may recall recently that Facebook found a bug exposing personal details of 6 million user... Read More ” of people who don’t even have Facebook accounts just by collating information from other users’ contacts. Other sites that are linked to Facebook send your information back to their servers (though you can use tools like Facebook Disconnect FacebookDisconnect: Eliminate Facebook buttons from sites you visit [Chrome] FacebookDisconnect: Eliminate Facebook buttons from sites you visit [Chrome] Read More to prevent that). And let’s not forget about the fact that other companies can gather mass amounts of public Facebook data Should You Be Concerned About Your Facebook Data Being Scraped? Should You Be Concerned About Your Facebook Data Being Scraped? How would you feel if you discovered your picture on a website, where people rank the picture as to whether or not you look like a jerk? Well, it's a true story. Read More , too.

surveillance-screen

While you might feel like your privacy is being violated—even to the degree where it might be illegal in some cases—there’s not much you can do about it. The terms of service of major online services, from Facebook and Twitter to Google and Dropbox, almost always require that you give up at least a good portion of your rights to privacy to use the service. Even your Facebook chats could be scanned.

Even more unnervingly, Facebook can figure out when its ads have influenced your offline purchase decisions. There are very few places where you’re not being surveilled by the social giant. Remember that Facebook isn’t the only culprit here—it’s just the biggest one. Twitter tracks the apps you have on your phone Stop Twitter Tracking Your Apps, GoPro Is Developing Drones, & More... [Tech News Digest] Stop Twitter Tracking Your Apps, GoPro Is Developing Drones, & More... [Tech News Digest] Also, Obama signs the E-Label Act, 100 free music albums, get Torchlight for free, and a Keyboard Waffle Iron comes to Kickstarter. Read More , and we recently published an article on ten social networks 10 Social Mobile Apps That Breach Your Teenager's Privacy 10 Social Mobile Apps That Breach Your Teenager's Privacy Your children have become proto-adults, beginning to grow up. Like their friends, they spend a lot of time using smartphones, tablets and computers in a way you could only dream of. Read More that are pretty bad when it comes to privacy.

If you’ve signed up for a social network, they’re almost certainly collecting some data about you. App.net Everything You Need To Know About App.net - The "Other" Social Network Everything You Need To Know About App.net - The "Other" Social Network App.net was born out of frustration with the status quo. How much do you know about it? Read More  is a social network that isn’t funded by ads, so you can probably feel safe that your data, even though some if it’s being collected (as can be seen in their privacy policy), won’t be sold to advertisers.

facebook-phone

However, you can take steps to limit the amount of data that’s being collected. One of our Facebook Weekly Tips from 2013 dealt specifically with limiting the amount of tracking How To Stop Facebook From Tracking Everything You Do [Facebook Weekly Tips] How To Stop Facebook From Tracking Everything You Do [Facebook Weekly Tips] Facebook has basically made a business out of knowing as much as they can possibly find out about everyone. So, tracking your behaviour online and offline makes perfect sense to them. However, it might not... Read More Facebook can do. You can also opt out of sharing data with Facebook How To Stop Facebook From Selling Your Browsing Data [Weekly Facebook Tips] How To Stop Facebook From Selling Your Browsing Data [Weekly Facebook Tips] Did you plan on sharing your browser history with advertisers? Because if you have been sharing your browsing history with Facebook then that's exactly what's going to happen. Read More through the Digital Advertising Alliance (though the efficacy of that is debated). It’s a good idea to take these steps, as a lot of social networks, as well as other online companies, may be able to bypass your browser’s security settings Google, Facebook & More Bypassing Browser Privacy Settings [News] Google, Facebook & More Bypassing Browser Privacy Settings [News] Read More .

Unfortunately, the best way to avoid being surveilled by social networks is to not use them . . . and limit the amount of contact that you have with people who do.

Take Privacy Into Your Own Hands

As you can see, avoiding Internet surveillance isn’t easy. In fact, completely avoiding it is nearly impossible. And taking all of the steps above will cost you quite a bit of time, effort, and money. But is it worth it? That all depends on how you feel about your privacy.

We know that “nothing to hide, nothing to fear” just isn’t a viable argument when it comes to online privacy. We are being pervasively watched by governments, companies, and service providers around the clock, while we’re on our computers, phones, and tablets. We’re even being watched by social networks when we’re away from our computers—and often when we don’t even have accounts.

in-your-hands

As I mentioned earlier, all of this, for the most part, doesn’t really affect our daily lives (other than creating an information filter bubble How Do You Feel About Being In Facebook's Psych Experiment? [Weekly Facebook Tips] How Do You Feel About Being In Facebook's Psych Experiment? [Weekly Facebook Tips] You've probably heard about the latest scandal from the Facebook world: Facebook has been experimenting on users and playing with their emotions. Yes, really. Read More ). But if history has shown us anything, it’s that the status quo can be changed at any time, often when we least expect it. And beyond practical safety concerns, what about our right to privacy? Don’t we have a right to have a private life that’s truly private? That can’t be seen by people who are suspicious of our actions or those who are using us to make copious amounts of money?

It’s time to take your online privacy into your own hands. Use the strategies outlined above and share them with others—the more we fight back against pervasive Internet surveillance, the more likely we are to retain our privacy and online freedom.

What steps do you take to ensure that you’re not being surveilled online? Do you feel like your privacy is being violated by companies and governments? Or do you feel that it’s not worth the effort? Share your thoughts below!

Image credits: Beautiful business woman secretly texting (edited) via ShutterstockLaura Poitras via Wikimedia CommonsSafety concept: pixelated KeySecurity concept: Lock on digital screen, Two businessperson shaking handsPretty young business womanSecretive Couple with Smart Phones via Shutterstock; See-Ming Lee via flickrsmartphone hand usingView of three nurses in hospital canteen via Shutterstock; Maria Elena via flickr, Projecting The Future via Shutterstock.

Leave a Reply

Your email address will not be published. Required fields are marked *