Site icon Thought for Your Penny

Digital Privacy 101

You need to familiar yourself with proxies, vpn’s, and tor/torrents.

A VPN sets up a secure network at your home. From there, you can connect from anywhere via a proxy. Proxies reroute your data to look like it’s coming from somewhere else.

With that set up, you’ll be as secure as you make your home network. This means, unlisting your SSID, enabling a MAC filter, and keeping a firewall, antivirus, and anti malware installed, updated, and running.

This is your base.

Now to be truly secure, you need to design a priority system and file type to store your data offline. You also need a team monitoring all traffic 24/7. Of course, you’re too poor to do that.

Tor and torrents further route data by breaking it into pieces, similar to teleporting on Willy Wonka or 6th Day. Torrents are great for file transfers, but Tor is incredibly slow (limited, as any p2p network, by the amount of people connected). Over time, this could become the new standard, as small cell carriers are pushing for p2p wireless in a world moving toward the internet of things.

For email, use PGP encryption and a desktop client. This secures email, although people can still see who sent something to whom. For anonymity, you need a custom script to split your emails into pieces posted on a variety of newsgroups that are accessed via proxies. Of course, this makes emailing take up to several hours, and some people don’t have the patience.

Exit mobile version