The Paranoid Conspiracy-Theorist’s Guide To Online Privacy & Security

Mark O'Neill 18-05-2015

Last time, I showed you how to attempt to break free of the tight embrace How To Clear Your Data From Google & Attempt To Regain Some Of Your Privacy Wiping all trace of you from the web is not easy, but after reading Dragnet Nation by Julia Angwin you might just want to try. It's time to stop willingly throwing away your privacy. Read More that is Google. This time, I am going to cover a wide range of topics, and offer tips that I have picked up on my online travels and from speaking to knowledgeable colleagues and friends. Hopefully you will find something here that connects with you and use to make your time online more secure.


Revoke Website Privileges On Google, Twitter & Facebook

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security appprivs

When you sign up for a website, the signup buttons for Facebook Connect and Google are always there, lurking in the lazy side of you (“do you really want to fill out this very long sign-up form? If you use the Facebook / Google button, it’s only a couple of clicks!”). But by using Facebook Connect or Google, we are telling Facebook and Google a lot about ourselves – in particular our browsing history. Twitter too. Browsing habits are what marketing profiles are made of.

So start revoking those privileges. Here’s the Google page, the Facebook page, and the Twitter page to do just that. Then start signing up to websites using disposable email addresses Need a Disposable Email Address? Try These Great Services Need to send or receive an email without using your real address? Here are some great services that let you do just that. Read More which redirect to your real address. The gold standard here is Blur. There is a free plan and a paid one, but the free one is more than sufficient for most people.

Use a Virtual Private Network (VPN)

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security muo best vpn tunnelbear

This is something that we have covered extensively in the past, including a roundup of all the best VPN services The Best VPN Services We've compiled a list of what we consider to be the best Virtual Private Network (VPN) service providers, grouped by premium, free, and torrent-friendly. Read More . I personally love Tunnelbear Tunnelbear VPN Adds Privacy Protection & "Always On" Security Tunnelbear have introduced two things which users will greatly appreciate, given recent events about intelligence agencies spying on our Internet usage - Privacy Protection & "Always On" Security. Read More , but many others are available for you to take a look at. Everyone who surfs the Internet should be using a VPN – in fact, GHacks asked if VPN’s were the next big browser feature.


A VPN essentially switches your IP address and re-routes all of your website traffic through that VPN’s servers. So it looks as if you are surfing from the country you have chosen in the VPN software. This is good for hiding your true location, and stopping anyone from looking at your login information in a public Internet café – but you shouldn’t really be using public Internet cafes anyway. You never know what is installed on those computers to capture your passwords; for all you know, there could be keyloggers in there 5 Ways to Protect Yourself Against Keyloggers Keyloggers are one of the most feared threats to computer security. Heed these tips so you don't fall victim to hackers. Read More  recording every keystroke.

Use the Tor Browser

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security torbrowser

It’s been claimed that using Tor will immediately gain you the attention of the NSA, or its British counterpart, GCHQ. But my feeling is that they are watching us anyway, so what’s the difference? There were also concerns not that long ago that the Tor browser was compromised, but still, a little bit of protection is better than none. Just make sure you are downloading the right version. ALWAYS download from the official site. Not sure what TOR is? Our TOR guide explains this Really Private Browsing: An Unofficial User’s Guide to Tor Tor provides truly anonymous and untraceable browsing and messaging, as well as access to the so called “Deep Web”. Tor can’t plausibly be broken by any organization on the planet. Read More and more.

Always Use Security & Privacy Browser Plugins

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security muo security freak https


HTTPS What Is HTTPS & How To Enable Secure Connections Per Default Security concerns are spreading far and wide and have reached the forefront of most everybody's mind. Terms like antivirus or firewall are no longer strange vocabulary and are not only understood, but also used by... Read More indicates that the site has a encrypted security certificate, which stops people from hacking into the site. As a normal web surfer, you should be trying to visit as many sites as possible which have “https” in their web address.

One way to ensure this is all done without any effort on your part is to install “HTTPS Everywhere“, a browser add-on made by the Electronic Frontier Foundation. This will redirect you to the https version of a website, and you can whitelist sites which should be ignored by the add-on (some sites won’t work on https).

If you use Chrome, then some other good plugins include Google Analytics Opt-Out, Password Alert, and Chrome UTM stripper. The last one removes all of the crap from a URL, which is used for tracking purposes. Next time you click on a link on social media or from an email newsletter, look at the URL – there is likely to be a “UTM” tracking code on there.

Abandon WhatsApp & Use Telegram Instead

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security telegram


My wife and I use WhatsApp Everything You Need to Know About Your WhatsApp Privacy Settings As with all communication tools, privacy is of utmost importance. Here's how to protect your privacy when using WhatsApp. Read More exclusively to communicate via mobile phone, and we are not alone. As of last month, the company reported an increase of monthly active users from 700 million in January 2015 to 800 million in April 2015. I love using the app, but one thing really bugs me though – WhatsApp has more holes than a golf course Is WhatsApp Safe? 5 Security Threats Users Need to Know About WhatsApp security is a challenge. It's a favorite target of scammers and hackers. Is WhatsApp safe? Here's what you need to know. Read More , with no SSL encryption. Plus it is owned by Facebook, which makes me wary about its long-term privacy prospects. Facebook changes their privacy settings like I have hot dinners.

Instead, I have been hearing great things about Telegram, which offers free apps for iOS, Android, and Windows Phone, as well as versions for the PC, Mac OS X, Linux, and can also be accessed via your browser. As far as I can see, it is a clone of WhatsApp but with loads of privacy settings added in. This includes encrypting your messages, destroying them with a timer, and the servers are spread worldwide, so the service can’t be completely shut down from one location (here’s looking at you FBI!). Similar apps include Signal and Wickr.

Make Your Searches In Incognito Mode

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security 0 incognito intro

If you do need to use Google for any reason (perhaps your work uses Google Apps Google Apps Guide: Free Email and More On Your Website Own a domain? You need to read this Google Apps guide. This manual explores the amazing free power of Google Apps. Read More ), then you will find that in order to stay logged into your Google email, you need to stay logged in across the entire Google network. Log out of one Google service, such as YouTube, and it logs you out of everything. It doesn’t take long for this to get really irritating. And if you stay logged in over the entire Google network, then everything gets logged – searches, YouTube videos watched, news stories read, locations visited, when you picked your nose, the whole lot.


So to keep yourself logged into email, and keep your searches private at the same time, use Incognito How to Start Google Chrome in Incognito Mode by Default Read More for all searches (or Private Browsing Not Just for Porn: Other Uses For Private Browsing Private-browsing mode has many other names, including "incognito mode" in Chrome and "InPrivate Browsing" in Internet Explorer. Some people refer to private-browsing mode as "porn mode", but it isn't just for porn addicts. It can... Read More , if you use Firefox). Also use a VPN app to switch your IP address to some far-off distant exotic land. Australia sounds nice. You just have to change your name to Bruce.

Encrypt Your Instant Messaging With “On The Record” (OTR)

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security otradium 640x487

Instant Messaging (IM) is something I am not too fond of, as it can distract me when I am “in the zone”, while writing. But I still need it to communicate with clients and colleagues, so recently I have been trying out “Off The Record” (OTR). This is a plugin for Pidgin and Adium, which encrypts your chat messages, and stops “man in the middle” attacks, where the messages are intercepted while on the way to the other side.

When starting a conversation, you can make OTR optional, or alternatively you can insist on it being switched on. Keep in mind that many people get nervous with things like encryption, and so refusal may be likely. So you need to figure out how important it is to have that chat with the person.

Use Passphrases, Not Passwords

We’ve all been conditioned to use passwords Password Management Guide Don't feel overwhelmed by passwords, or simply use the same one on every site just so you'll remember them: design your own password management strategy. Read More to protect our accounts, but it seems that passphrases are much better. Edward Snowden explains the concept in an interview with John Oliver.

You might think that @_Fn56@3Cxp0#_Z@ is a pretty secure password, but this XKCD cartoon shows us why a passphrase is much better.

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security password strength

Passphrase generators abound online. Four words is more than enough, but of course you can have more if you have thought of a killer phrase. You can also use dice to work out your passphrases but that seems a bit too over-the-top (even I have my limits).

Put a Sticker Over Your Laptop Webcam (Or Close The Protective Cover On Your PC Webcam)

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security webcambandaid

Webcams are great for talking to grandma, and showing her the new puppy. But webcams also have their dark side too, because you can spied upon without your knowledge – even if the webcam light is off. Think I’m nuts? Read this about a webcam hacker then tell me I’m nuts. And this one.

So unless you fancy being spied upon 24/7, you need to keep the webcam covered up when you’re not using it. Many PC webcams have built-in covers to go across the lens. USE IT! If it doesn’t have one, throw it away and buy one that does. I use Logitech which has never let me down. If you use a laptop, get some stickers, cut them into squares big enough to cover your webcam, then use them to cover the cam when you are not using it. Or if all else fails, use a band-aid.

Remove All Photos Of Yourself Online – Then Stick To Comic Avatars & Drawings

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security londoncamera

Facial recognition is on the rise and it’s only going to get worse. The FBI expects to have over 50 million facial images in its database this year, and no doubt law enforcement and intelligence agencies in other countries have the same. Indeed, in London, you can’t walk down any street without being filmed by several cameras. Also, unsurprisingly, Facebook has its own version for “automating photo tagging” (how thoughtful of them), and Microsoft thinks they can guess your age by scanning your photo (data brokers will love THAT one).

And if that wasn’t spooky enough, a smartphone app called NameTag will enable someone to take your picture, and then use that picture to instantly find your social media accounts. It’s apparently if you want to date the person, but wouldn’t dangerous stalkers use it too?

All of these chilling developments has led to the rise of an anti-facial recognition movement. Fighting developments such as facial recognition is important because what if a machine decides that you are the spitting image of a wanted terrorist? Try explaining that you’re not Al-Qaeda’s newly promoted number 2 while you sit in a jail cell for an indefinite period.

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security 365741d29b43e5ed1eb730040b6e703b

To avoid being indexed in online facial recognition databases, do three things – go to your Facebook security and disallow automatic tagging of your face. Secondly, search online and remove every known photo of you. Lastly, replace those photos with an avatar of yourself or a pencil drawing. I like Face Your Manga, which is the service I used to create my avatar. As for on the street? Wear a hoodie and a good pair of shades. And look down as you walk.

Turn On “Do Not Track” In Your Browser

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security donottrack

In all of the major browsers, there is an option to switch on “Do Not Track” with your browsing traffic. But in all truthfulness, this is totally dependent on sites honoring your request. It has frequently been compared to the Do Not Call Registry DoNotCall: Remove your Phone Number from Telemarketing Lists Read More , which is supposed to stop telemarketers from calling you. Your desire not to be called is clearly there, but the telemarketer can still call if they want to. Do Not Track is pretty much the same. Nice in principle, but in reality, it’s perhaps a little idealistic. But on the other hand, how will it hurt having it enabled?

This site has a nice description of what “Do Not Track” is, as well as telling you how to switch it on for your browser, and a list of the sites that actually do honor the request. Sadly, it is an extremely small list.

Encrypt Your Email With PGP & GNU Privacy Guard

The Paranoid Conspiracy-Theorist's Guide To Online Privacy & Security pgp explained 640x320

I’ve left the hardest one till last, because after a couple of weeks, I STILL haven’t been able to get this to work. But if your neighbor happens to have a ten year old child, maybe you could ask them to do it for you (unfortunately, I have elderly neighbors who think that typewriters are the latest cool thing).

PGP stands for Pretty Good Privacy What Is PGP? How Pretty Good Privacy Works, Explained Pretty Good Privacy is one method for encrypting messages between two people. Here's how PGP works and how anyone can use it. Read More and can be used to encrypt your emails into gibberish, for the person at the other end to decrypt. You both need private and public keys for this to work.

If you use Thunderbird, use Enigmail. If you use Outlook, you could try Outlook Privacy Plugin, But if you are using Windows, you should install GPG4win, for Mac GPGTools, and for Linux, check out this good article. But encryption can also be achieved in webmail How to Encrypt Your Gmail, Outlook, and Other Webmail Email accounts hold the keys to your personal information. Here's how to encrypt your Gmail,, and other mail accounts. Read More .

So what else can you recommend that will strengthen a person’s security and privacy online? Leave your ideas and suggestions in the comments below.

Image Credits: looking at the laptop Via Shutterstock, Bandaid On a Webcam – Shutterstock, Password Strength – XKCD

Related topics: Encryption, Online Privacy, Online Security.

Affiliate Disclosure: By buying the products we recommend, you help keep the site alive. Read more.

Whatsapp Pinterest

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. Anonymous
    October 29, 2015 at 5:23 pm

    Face Your Manga: wow, what a site. Fantastic !!

  2. R A Myers
    May 19, 2015 at 6:52 pm

    Sound, vibration energy, carries intelligence. Cover your built in microphone with something sound absorbent and unplug your microphone at minimum.

    Your cooling pad vibration may help cover your microphone input.

  3. Giulian
    May 19, 2015 at 12:37 pm

    Excellent summary, thanks! I wasn't aware that Tor has ever been compromised! I'll still use it, though. And I don't buy the argument that using it will gain you the immediate attention of the NSA. (Even if that'd be the case right now, once more people start using Tor, that could no longer apply.)

    Instead of Telegram, I use Threema (been using it since before Telegram was even around), and instead of going "incognito" (you probably shouldn't be using Chrome, anyway), I use DuckDuckGo.

  4. Ilya Geller
    May 18, 2015 at 6:26 pm

    You must be either active or passive: either you search for information, or information searches for you. Structured data allows information to search for you.
    I discovered and patented how to structure any data: Language has its own Internal parsing, indexing and statistics. For instance, there are two sentences:

    a) 'Sam!’
    b) 'A loud ringing of one of the bells was followed by the appearance of a
    smart chambermaid in the upper sleeping gallery, who, after tapping at
    one of the doors, and receiving a request from within, called over the
    balustrades -'Sam!'.'

    Evidently, that the 'Sam' has different importance into both sentences, in regard to extra information in both. This distinction is reflected as the phrases, which contain 'Sam', weights: the first has 1, the second – 0.08; the greater weight signifies stronger emotional ‘acuteness’.
    First you need to parse obtaining phrases from clauses, restoring omitted words, for sentences and paragraphs.
    Next, you calculate Internal statistics, weights; where the weight refers to the frequency that a phrase occurs in relation to other phrases.
    After that data is indexed by common dictionary, like Webster, and annotated by subtexts.
    This is a small sample of the structured data:
    this - signify - : 333333
    both - are - once : 333333
    confusion - signify - : 333321
    speaking - done - once : 333112
    speaking - was - both : 333109
    place - is - in : 250000
    To see the validity of technology - pick up any sentence.

    Do you have a pencil?

    All other technologies depend on spying, on quires, on SQL, all of them on External statistics. See IBM, Oracle, Microsoft, Google and Yahoo? Apache Hadoop and NoSQL? My technology is the only one that obtains Internal statistics directly from texts themselves.

    Being structured information will search for users based on their profiles of structured data. Each and every user can get only specifically tailored for him information: there is no any privacy issue, nobody ever will know what the user got and read. (No spam!)

    The technology came from Analytic Philosophy, Internal Relations Theory.

  5. Prime
    May 18, 2015 at 5:42 pm

    I'm just using TAILS for everything and just play on windows...
    I feel much safer on Tails and it also redirects everything through the Tor network