The online data hackers and spy networks are reality that more and more people are concerned. The all-seeing Big Brother blurs from paper to come alive. Furthermore, the use of electronic devices , such as smartphones or tablets, has made our data more vulnerable. Social networks also play a leading role, as millions use them as a showcase for their private lives. Just recall the event of 2013 Edward Snowden leaked mass NSA espionage to the media , marking a turning point. The SOFT-E-VIEW blog offers us some tips that will prevent the traffic of our information. Options such as filtering, passwords , or the use of antivirus are the most basic. Recommendations available to anyone, cheap and easy to make, to prevent our data from circulating freely on the web.
THE IMPORTANCE OF ENCRYPTION
Experts like Bruce Schneider, with access to NSA material , recommend encryption as a safe option. Free software system that does not share your secret keys are the best choice. In addition, they are open for review by a security expert . They also encrypt data from start to finish, from your computer to the person you are chatting with. The most recommended tool to encrypt some instant messaging services is the OTR, off the record. It can be used on Google Hangout or Facebook Chat, for example. To avoid espionage of your email, the PGP program is recommended.
You can also block your internet traffic using a plug-in for Chrome or Firefox. It is also possible to use encryption on your hard drive. The latest versions of Windows, Mac OS X and Android have this function. If they are not activated, anyone with physical access to the electronic device can copy content .
USE STRONG AND DIFFERENT PASSWORDS
A strong password must be long, combine numbers and letters without forming words, and some punctuation. You can also create a password using a random word system. A few months ago Mark Zuckerberg‘s own social networks were hacked revealing a laughable password. “Dadada” had been used for different services. Facebook , Twitter or email were some of them. This is a mistake. Each service must have its own password. Reusing them means that when you discover the code have access to all the services that use it. It is safer to write them down on paper, as they can all be difficult to remember. In turn, two-step authentication must be used. You enter the password and a confirmation number that reaches the user’s mobile every time you enter. Gmail, Dropbox or Twitter already have this option.
HIDE YOUR ONLINE IDENTITY
We have all heard of Tor. It is free software that protects your identity online by mixing your data through voluntary servers. A document from the British GCHQ shows the concern of intelligence agencies about the use of Tor. The archive focuses on the fact that terrorists use this service, but in reality there are many more users. Thanks to a global network of servers your identity is kept hidden in the network. It is also necessary to filter the information posted on social networks. Photographs at work, on vacation, on the spree… You never know who is looking, and “posturing” can be expensive. Nor should one talk about the routine that is followed, or future plans.
FILES TO SPY ON THE NETWORK
To keep your computer safe , it is recommended to install an antivirus. While it is not 100% secure protection, it does offer one level more than malware will have to overcome. Many of these viruses reach our terminal through security holes or email and compromised websites. Files downloaded from emails or web pages can completely lose control of the equipment. Therefore, it is recommended to download only secure material, of people whose identity we know. For the documents that we already have to our credit, we can use to save them a notebook that we do not connect to the internet. We can also use a USB memory, and encrypt it through TrueCrypt. Thus, our files will always be safe.