Datafication, Phantasmagoria of the 21st Century

Category: Privacy (Page 2 of 2)

Identifiers. You Are Being Watched Online

When you browse the web, you probably focus on the content that you come across. However, built within the digital architectures of the web are invisible little scribes that record what you do, where you go, and how you behave as you browse. Those little digital scribes are called identifiers. What exactly can they know about you as you live your life online? And why is it important?

This website tells you what identifiers you leave behind when you browse. Click on the link below and it will show you a long list of all the identifiers that every website you visit can find out about you, your location, your device etc…

https://www.deviceinfo.me

Why should you care? Because all these different data points are then used to create a “fingerprint” of your web browser, allowing the rest of your web activity on that same browser/device to be trackable.

I checked and the results show that it is possible to know my device type or model, operating system, browser, IP address (and whether I am using a VPN), country, ISP and servers names, the connection type. I expected that. What I did not expect was the system to detect “fingerprinting resistance”, as well as details about my hardware (number of webcams, microphones. which graphic card, RAM, battery status, number of fonts) and my browser (extensions, content filtering, cookies enabled or not etc). It also checked for “live”, i.e., changing operations as I was using the computer: live device motion (checked at intervals of 500ms), rotation and acceleration including gravity, live page visibility changes and live screen orientation and resolution changes. It could see the live current scroll position, the keys pressed, the mouse position on the screen amongst others.

We can’t stop browsing. What to do? Short of not being online, it is not possible to completely avoid surveillance. Use a good VPN, which means a paid-for VPN (the free ones most probably sell your data) that is well regarded in privacy circles. I use ProtonVPN, from the same company as ProtonMail, one of the most privacy conscious email providers on the planet. Use browsers that are known for their security and privacy features such as Firefox (do NOT use Microsoft Bing or Google Chrome). Regularly clear your cache and cookies (I do it several times a day). Install browser extensions that give you some control over what happens when you browse, such as No Script, Privacy Badger, HTTPS everywhere, Canvas Blocker, uBlock Origin, Facebook. Container. Set your browser privacy (in settings) to strict.

And spend a bit of time learning about how to protect yourself online. There are now MANY good publications, and articles in tech-oriented magazines such as WIRED, MIT TechReview and others that describe how to set up some levels of protection online. I know one can easily feel disempowered today in the face of the incongruous levels of unrestricted digital surveillance, but do not give in to despair. Technology is invented everyday to help us, and it IS possible to avoid a reasonable number of surveillance features that are built into our digital architectures. If you are really into privacy and security, check Michael BAZZELL’s book “Extreme Privacy, What It Takes To Disappear”, 4th Ed. 2022. There is an updated eBook on mobile devices. Check his website to learn more (I do not get any commission, I am recommending him because his book is phenomenal, and he is very knowledgeable).

[HOW TO] Protect From Data Theft? (Privacy)

Many people ask me how to protect from data theft from Big Tech. This is a really important question, so I asked a digital security expert friend of mine. This is his (unedited) reply. Some of those are more directly actionable than others. I will regularly add to the list.

Use a *trustworthy* VPN for all devices like Mullvad or ProtonVPN (or tor/I2P for truly sensitive things) with reliable DNS protection (but also aware VPN has own risks, strictly only to mask your true IP + mask your web activity from your ISP + provide more secure internet when connected to public or unsafe networks).

Use Linux on desktop (or any open source privacy friendly version, just avoid MacOS, Windows and ChromeOS).

Use de-googled android (grapheneOS) on mobile. Neither Androids not iPhones are safe. A mobile phone is most invasive and privacy leaking device in our lives.

Delete all social media and big tech accounts.

Replace the services/apps one uses with open source/libre software alternatives. Email, contacts, calendar, cloud storage, apps on phone etc… Especially avoid any products or services by big tech (e.g. Google docs, Gmail, drive, youtube, search, Chrome, WhatsApp etc…).

Use privacy friendly web browser (recommend “brave” browser) with disabled telemetry and tracking blocking and fingerprinting resistance settings set to maximum.

Use privacy friendly search engine (duckduckgo is OK), do not use Google search, Microsoft Bing, etc.

Understand how internet and web infrastructure works (networking basics) as this is key to knowing how to manage own data trail and emissions. Key part is understanding that every single action taken in relation to internet or digital anything leaves a permanent record and digital trail of breadcrumbs. So to know how to get by using alias information when possible, and to be extremely judicious in providing any true personal data in any digital context. Doesn’t matter that one uses the most private and secure computer system if they just go and share their personal life story and details by posting such on the internet. Disclose as little as possible online, and if needed use false/alias data.

Use end to end encrypted and metadata minimising methods of online communication (e.g. Signal is not perfect but probably best balance between privacy/security and usability/widespread use).

Generally opt to use software and services that rely on well-implemented encryption technology and *end to end* and *zero knowledge* encryption wherever possible.

Do not use regular phone call or SMS (use secure WiFi call or message via secure apps instead).

Newer posts »