Browsing as anonymous user

Your progress is saved locally. Create an account for cloud sync and permanent storage.

Devices > Computer

Progress: 0/14

0%

Switch your browser + Use an ad blocker

If you are using default Chrome, Edge, Firefox, Opera or any other non-privacy oriented browser you should switch to a browser that do it's job without tracking you.

As a plus you should also choose a browser that blocks tracking from websites and use an ad blocker.

For those reasons we recommend using Librewolf if you want a firefox-based browser or Brave if you want a chromium-based browser.

I use a private browser and an ad blocker easy

Disable tracking from your system

If you are using Windows, Macos or some favors of Linux you should disable all of the tracking and telemetry you can from your system either trought the settings or firewall.

For windows and Macos you will never be able to disable all tracking but the less tracking there is the better it is, even if it's not perfect.

I disabled system telemetry. easy

We can recommend using O&O ShutUp10 for Windows.

Clean your computer logs and cache

You should regularly clean your computer logs and cache to prevent forensics, tracking and just free up space and cycles on your computer.

I regularly clean my computer logs and cache easy

We recommend you use Bleachbit to do so.

Encrypt your disk(s)

Whereas you are using linux, Windows or Macos you should encrypt your disk(s) to prevent anyone from accessing your data at rest. There are many ways to do so but the most common is to use LUKS on linux, Bitlocker on Windows and FileVault on Macos. For Windows and Macos the encryption keys might be saved to your account by default.

I encrypted my disk(s) easy

Switch to linux

Any proprietary operating system is a nightmare for privacy even if their marketing department is trying to make you think it's not. You should therefore use open source and free operating systems. We recommend using linux and more precisely Fedora with Gnome as it is an easy to use linux distribution you shoudn't have any issue with.

I switched to linux medium

Be cautious of your environment

Do not let your computer unlocked without you, do not show sensitive information if there is peoples arround or do not use it if there are suspicious peoples arround. Someone getting full access to your system negates most of the privacy and security efforts you would make so you need to always be aware of your surroundings.

I am always aware of my surroundings and never leave my computer unlocked medium

Tweak your ad blocker settings

When you install an ad blocker (we recommend Ublock Origin) some default blocking lists are enabled.

If you want to block more trackers or specific services (social media, google, gambling, porn...) you can add blocklists easelly.

I tweaked my ad blocker medium

Use VMs extensively

Virtual machines are a great way to isolate your activities and thereby prevent tracking. You can use them for testing new software or creating new online identities.

I use virtual machines extensively medium

Wipe data using secure algorithms

If you delete your file through your Operating System standard way then your files can be recovered using easily accessible forensic techniques. To prevent this, you should use tools that wipe your data using secure algorithms such as rewriting over the data multiple times.

We recommend you use BleachBit on Linux and Windows.

I wipe data using secure algorithms hard

Disable speakers, browser autoplay and / or sound

First, you should obviously disable both to prevent leaking information if you are dealing with sensitive audio data. A less known risk, however, is audio beacons. These are inaudible sounds that can be used to track or signal specific devices even when they use all of the right protections.

Imagine a scenario where someone is actively searching for you, they could make you visit a page of a website that would autoplay a sound you can't hear but your phone, your "virtual assistant" or someone outside could pick up and use to determine your location or transfer any data from a device to another silently. You can see a demonstration of this concept in this ccc talk by Vasilios Mavroudis and Federico Maggi.

I disabled my speakers and autoplay on my browser hard

Use a more secure OS

We recommend two options:

  • Tails if you need your OS to not store anything.

  • QubesOS if you need the best security and privacy while still having persistance.

I use a more secure OS like Tails or QubesOS hard

User wifi or ethernet

Both have advantages and disadvantages so you will need to refer to your threat model.

Wifi permits spoofing of your mac adress making tracking of your computer connected to wifi harder while Ethernet do not let any signal out in the open.

I considered and used the best internet access possible for my usecase hard

Keep certain devices offline

If you are a journalist, investigator or writter of any sort you can for example have one computer for research connected to the internet and one for your writting offline to keep this information confidential.

I keep my devices that do no need access to the internet offline hard

Anti-tampering

This is valid for computers but also any other device or physical object you do not want someone opening. This can be done using specific anti-tampering tape or as mullvad demonstrated here glittery nail polish.

I tamper protected my devices and/or objects I don't want opened hard
NSA spying on Wikileaks CryptoPhone with an implant

A tailor-made implant was installed inside the CryptoPhone used by wikileaks to communicate for multiple years. If they had anti-tampering methods this would have been detected way sooner. To learn more see https://www.cryptomuseum.com/crypto/gsmk/ip19/implant.htm.