Browsing as anonymous user
Your progress is saved locally. Create an account for cloud sync and permanent storage.
Devices > Computer
Progress: 0/14
Switch your browser + Use an ad blocker
If you are using default Chrome, Edge, Firefox, Opera or any other non-privacy oriented browser you should switch to a browser that do it's job without tracking you.
As a plus you should also choose a browser that blocks tracking from websites and use an ad blocker.
For those reasons we recommend using Librewolf if you want a firefox-based browser or Brave if you want a chromium-based browser.
Disable tracking from your system
If you are using Windows, Macos or some favors of Linux you should disable all of the tracking and telemetry you can from your system either trought the settings or firewall.
For windows and Macos you will never be able to disable all tracking but the less tracking there is the better it is, even if it's not perfect.
We can recommend using O&O ShutUp10 for Windows.
Clean your computer logs and cache
You should regularly clean your computer logs and cache to prevent forensics, tracking and just free up space and cycles on your computer.
We recommend you use Bleachbit to do so.
Encrypt your disk(s)
Whereas you are using linux, Windows or Macos you should encrypt your disk(s) to prevent anyone from accessing your data at rest. There are many ways to do so but the most common is to use LUKS on linux, Bitlocker on Windows and FileVault on Macos. For Windows and Macos the encryption keys might be saved to your account by default.
Switch to linux
Any proprietary operating system is a nightmare for privacy even if their marketing department is trying to make you think it's not. You should therefore use open source and free operating systems. We recommend using linux and more precisely Fedora with Gnome as it is an easy to use linux distribution you shoudn't have any issue with.
Be cautious of your environment
Do not let your computer unlocked without you, do not show sensitive information if there is peoples arround or do not use it if there are suspicious peoples arround. Someone getting full access to your system negates most of the privacy and security efforts you would make so you need to always be aware of your surroundings.
Tweak your ad blocker settings
When you install an ad blocker (we recommend Ublock Origin) some default blocking lists are enabled.
If you want to block more trackers or specific services (social media, google, gambling, porn...) you can add blocklists easelly.
Use VMs extensively
Virtual machines are a great way to isolate your activities and thereby prevent tracking. You can use them for testing new software or creating new online identities.
Wipe data using secure algorithms
If you delete your file through your Operating System standard way then your files can be recovered using easily accessible forensic techniques. To prevent this, you should use tools that wipe your data using secure algorithms such as rewriting over the data multiple times.
We recommend you use BleachBit on Linux and Windows.
Disable speakers, browser autoplay and / or sound
First, you should obviously disable both to prevent leaking information if you are dealing with sensitive audio data. A less known risk, however, is audio beacons. These are inaudible sounds that can be used to track or signal specific devices even when they use all of the right protections.
Imagine a scenario where someone is actively searching for you, they could make you visit a page of a website that would autoplay a sound you can't hear but your phone, your "virtual assistant" or someone outside could pick up and use to determine your location or transfer any data from a device to another silently. You can see a demonstration of this concept in this ccc talk by Vasilios Mavroudis and Federico Maggi.
Use a more secure OS
We recommend two options:
-
Tails if you need your OS to not store anything.
-
QubesOS if you need the best security and privacy while still having persistance.
User wifi or ethernet
Both have advantages and disadvantages so you will need to refer to your threat model.
Wifi permits spoofing of your mac adress making tracking of your computer connected to wifi harder while Ethernet do not let any signal out in the open.
Keep certain devices offline
If you are a journalist, investigator or writter of any sort you can for example have one computer for research connected to the internet and one for your writting offline to keep this information confidential.
Anti-tampering
This is valid for computers but also any other device or physical object you do not want someone opening. This can be done using specific anti-tampering tape or as mullvad demonstrated here glittery nail polish.
NSA spying on Wikileaks CryptoPhone with an implant
A tailor-made implant was installed inside the CryptoPhone used by wikileaks to communicate for multiple years. If they had anti-tampering methods this would have been detected way sooner. To learn more see https://www.cryptomuseum.com/crypto/gsmk/ip19/implant.htm.