Did you know that your privacy constantly being invaded by the sites you visit, your IPS, or your government? Everything you do is being tracked on the Internet and becoming fully anonymous is not 100% possible. However, there are some ways to get as close as possible to anonymous. In this page we will teach you how to secure all of your devices--such as computers, phones , tablets, and anything else, by securing your passwords, using two factor authentication, securing your web browsers, using a VPN, securing social media , your communication like texting and email, your operating system.
Choosing a strong password for anything that you use is very important. It’s important to have a password manager with all of your passwords created inside of it with a super strong password protecting your manager. There’s a website called “how secure is my password” to test if your password is strong.
When you sign in to a site, it requires you to type a password plus an additional authentication by sending something to your phone number that you type. However, phone numbers are proven to be a great security risk. That’s why, many sites are starting to transition to using Google Authenticator.
Make sure using trusted add-ons and extensions. Switch your default search engine to DuckDuckGo or start page and never store cookie history cache or clear them yourself frequently.
A VPN is going to hide your identity on the websites you visit, your internet service provider and any other person trying to track you. It is also an encrypted traffic so nobody can see what you’re doing.
Instead of putting your phone number to sites that you use, create a Google Account with false information using a VPN and then use Google Voice and Google Hangouts as a secondary number which is unattached to your personal identity.
Disable setting that send your usage data instead of apps and the operating system.
Did you know that Iphone is more secure than Android? Most of Android devices don’t get continuous security updates and it’s much easier to infiltrate majority of them. An exception to this is that if you have a stock Android device which frequently gets update come back to this 9.59
Storage You need to periodically wipe your hard drive’s free space using a tool to make sure you can’t recover any of those files. Also, you should be using drive encryption such as BitLocker on windows or FileLocker on Macs. NEVER remove your encryption on Android devices if you have an option to do so.
Avoid using Chrome, since Google is very well known as to collect your data. Make sure to have uBlock Origin and make sure flash and JavaScript are completely disabled inside of your browser.
Texting and SMS messages are not secure. You should either use imessage which only works on Apple devices or switch over to Signal. Signal is a very secure messaging app. Everything there is fully encrypted. Side note, Signal can also protects your phone calls as an added feature. Email is a an everyday business communication service that everyone uses. But, most email providers invade your emails sent back and forth. Protonmail is a completely secure, end-to-end encryption and open source email service. Switching Email Providers
After a few months, you won’t get any email in your old email account. At that point, you can just use Proton.
Don’t use any form of protection on your computer or mobile devices that isn’t a traditional password - nothing biometric, no pins, nothing voice or fingerprint activated. Make sure to not use a default password on your router and you have a password generated by your password manager.
Avoid using Chrome, since Google is very well known as to collect your data. Make sure to have uBlock Origin and make sure flash and JavaScript are completely disabled inside of your browser.
Most Secure OS
Switching to a different operating system is a big transition, so start off with a virtual machine or dual booting with one of your main operating system.
Make sure that your password protect your bios as well as your storage drives. This way, no one can tamper with your bios or even begin the operating without typing in a password to get past the bios and access your disk or disks.
If you fo to Google activity center, you’ll see where they collect all your information. Delete everything, then delete your Google account. As I mentioned, Google is not secure at all.
This step is difficult. but delete all your social media. Privacy is supposed to hide who you are and what you’re doing and social media is 100% is not doing that.
Tor Browser Bundle is a browser that will encrypt your traffic and mask your IP address. This makes a traffic unable to be sniffed or searched, even by your ISP. The goal here is to get rid of any browser outside of Tor. For android devices you can use Orbot, Orfox, or Firefox Focus which are known as deleting all of your web traffic once you’re done browsing. For iPhones, you can use RedOnion or Firefox Focus.