For the first time, be careful about social networks and the information you publish, remember what got into the network there forever and apply the rules of cyber hygiene. (Make OSINT (What is it? Search the site). And now let’s move on to the most interesting, namely the programs that are recommended to use. I hope you know what privacy is, and if not, I recommend reading the articles on the site in the section”Privacy”, this also applies to understanding the difference between proprietary software and free software, so now let’s look at software (ie programs) that will help raise the level privacy and be more private online. But first again, a theory to understand – consider the difference between the concepts. Anonymity, Privacy and Security (because they seem so similar ..) Anonymity is when no one knows who you are but potentially sees what you are doing, but privacy is when no one sees what you are doing but potentially knows who are you If privacy is a working tool for democracy, then anonymity is a tool for self-preservation. In small doses, both tools are definitely useful.
But it is worth overdoing with these sensitive indicators of social freedoms, and the terry color of conspiracy will begin to cover everything related to a person’s private life. Using the possibilities of privacy and anonymity, one must see the boundary that separates freedom from permissiveness. When the line is met, the usefulness of both tools is undeniable. Feelings of impunity have never led to good. Anonymous access to some sites allows individuals to cross the thin line of permissiveness. You can never forget about safety no matter what you do. Security is when you want to preserve your reputation, not hide your identity. The best Internet security software protects against a number of threats, including hacking, viruses, and malware. An integrated online security product should detect device vulnerabilities, block cyber threats until they spread, and isolate and eliminate immediate threats.
Use apps to remove metadata from the photos and videos you share, and smartphones, cameras, and other devices store a wealth of information at the time of shooting, which you can analyze to determine the device, author, and location.
Use encryption messengers that use public encryption algorithms, such as messengers.
Use search engines without tracking.
Використовуйте Virtual Private Network (далі – VPN) для захисту свого мережевого трафіку від перехоплення та модифікації.
Use Virtual Private Network (VPN) to protect your network traffic from interception and modification.
Use strong passwords, meaning the use of an alphanumeric / character password. (“Each service is a new password”)
Use UNIX-like operating systems for your PC (also has an OS with a bias against security and anonymity)
Use anti-detection browsers, search engines generate a digital fingerprint of the device so you need to protect yourself