We have made privacy available over Wi-Fi by developing ‘Privacy on Top’ – a super easy way to get privacy. You connect your phone or tablet to this Wi-Fi and that’s it – Privacy is on. Our ‘Privacy On Top’ loaded Wi-Fi router makes you anonymous and private using Tor network.
Your ISP will not be able to see sites you browse. Neither the websites will ever know where you come from as your physical location will be hidden.
This is a very elegant solution to protect all your network-data from all devices and all apps you use. Any data going out of your router will be encrypted and travels through Tor network. Tor is proven way for privacy and over 2 million people around the world use it every day.
Who we are ? Privacy On Top is a product brought to you by a newly born startup – Open Netware. Based in Mumbai, India, Open Netware is founded by two enthusiastic and wise entrepreneurial minds viz. Sameer Kulkarni and Mangesh Bhamre.
What product we are offering ? Our ‘Privacy On Top’ Wi-Fi router that provides privacy and security over Wi-Fi to all connected device is what we want to promote. We are going live with crowdfunding campaign for this product and want to get highlighted for it.
Incognito mode or private mode in browsers is extensively used for various reasons. Core value it brings is non-persistence of your browsing history. Your browser starts with clean slate and leaves no traces on laptop/device which is great for privacy.
Just to refresh what you get from Incoginto –
Browser starts with clean slate – No cookies or older traces of visiting any sites or login info
Leave no traces of visiting any site
Cleanup any cookies when you close down browser
All-in-all a great tool for privacy.
Using just Incognito mode is NOT the total solution for privacy. You need to go beyond that
Your browser clearly calls out two warnings –
Your Internet service provider (ISP) can see what you do online
Websites you visit knows where you come from – your physical location is known
Virtual Private Network(VPN) is known way to protect yourself from ISP. It creates a tunnel between your computer and a server and all data from machine gets encrypted. You ISP cannot see what you browse or download.
There are lots of VPN service provider with various internal options to choose from. Most of VPN vendors come with handy app/program to install on your laptop and use login credentials to go incognito.
Advantage of using VPN:
Great for travel purposes. If you connect to public Wi-Fi then VPN is perfect
Multiple servers world wide to connect and choose your exit point. Most VPN vendors have distributed network of servers around the globe for you
Disadvantage of using VPN:
Its a paid service
You need to configure it on every device on which you need privacy
Tor browser has been getting popular for privacy and its been used by 2 million plus people around the globe. Its a package that you need to download and run from your laptop which comes with its own browser (Firefox tuned for privacy).
Once you use Tor browser, all network-data from browser gets encrypted and traversed between random servers around the globe. Your ISP cannot see which sites you visit, neither websites know where you come from. Read more on Tor here – http://TorProject.com
Advantages of Tor Browser:
Its a free service
Your data gets encrypted with tree layered encryption
Data travels between random volunteered servers and thus great level of privacy
Disadvantages of Tor Browser
Tor slows down your network as it routes your network traffic from multiple servers before it hits the website.
Tor browser is platform specific – available for Mac / Linux / Windows / Android and you need to install it on every device.
A new generation of routers are seen in recent years that integrates Tor in Wi-Fi router. You connect any device to this Wi-Fi router and your privacy is ON. No installation required on any device. Your network-data from any device and any app gets routed from Tor Network. ISPs can’t see which websites you browse, neither websites know your location.
Yes, that’s true! you read it right. More than 2000+ companies around the world are built for tracking you in 26 different ways to sell you personalized content/ads, emails, or target you for online scams like phishing.
Almost every website you visit uses services from these 2000+ companies. Over the time huge amount of info about you is getting collected, shared and sold. You are the product and websites wants to know everything about you to sell something.
Here are the 25 types of website trackers that tracks your every move online.
Serious Privacy Trackers
1. Device Fingerprinting – These apps can identify and Id a user across multiple devices
2. Visitor De-Anonymization -These apps are actively engaged in identifying a particular browser session to be actual user using that browser
3. Behavior Tracking – These apps engage in tracking your behaviour or deriving your behavioral traits through traffic examination
4. History Sniffing – These entries are known to “Sniff” your browsing history, meaning, they check which sites you’ve visited in the past
There are 54+ companies around world geared to monitor you very closely. They know you better than your spouse.
5. Analytics – Tracks your visits, revisits, page navigation within site, duration and device details
6. Local Analytics – These trackers are usually operated as self-hosted solutions by the first party web sites
7. E-mail Analytics – Apps that collect information on how well an email campaign is working
There are around 144+ companies in addition to google that provides analytic solutions that websites can integrate to watch your move across their websites.
8. Affiliate Marketing – Advertising generated by these apps is known as affiliate marketing
9. Popunders & Popups – A type of self-explanatory advertising that these apps engage in
10. In-Text Ads – A tag for advertising companies that like to provide annoying ads in-text via deceptive hyperlinks 11. Interstitial – An incredibly annoying advertising technique that forces a user to see an ad that appears between certain content or before they could access some content.
12. Lead Management – These apps are designed to generate new potential business clientele by connecting outgoing consumer advertising with the responses to that advertising
13. Overlays – Another annoying advertising technique that involves content overlays that have to be closed prior to seeing content.
14. Pornvertising – This is a collection of advertisers that most often appear on pornographic sites
15. Segment Data – These apps are involved in deriving segmentation data through the tracking
There are around 136 companies that provides personalized ads that websites can integrate to generate revenue for them.
Standard website plugins trackers
16. Website Chat – These apps are generally used to provide ability for site operator to chat with visitors
17. Feedback – These companies offer widgets and other tools that help operators gather and respond to feedback
18. Polls – These companies offer widgets that are used in asking site visitors simple questions and aggregating results in a poll result 19. Social – All kinds of social sharing widgets that are easily recognizable 20. Commenting systems – These apps are commonly used to provide the web site with some kinds of commenting functionality 21. Audio / Video Player – Self explanatory
22. Search – These apps are involved in providing off-site search, so if search functionality is broken these are the entries to look at
Website Management Trackers
23. A/B Testing – Tracking apps that provide A/B testing scaffolds for web-sites 24. Font Systems – That affect how your fonts are rendered on the web sites
25. Tag Manager – This is a collection of apps that provide third party tag management
26. Site Optimization – These apps provide various means to optimize visited websites
Data source : Ghostery extension for chrome
Every top website you visit integrates with average 5 different tracking companies out of 2000, so as to target your identity and improve marketability. Source here.
Install Ghostery extension fromhere and visit top websites. You should be able to see a number on the Ghostery app. Screenshot showing 13 trackers on cnn.com
Below screenshot showing 2000+ trackers and categories.
How can you prevent tracking & improve privacy ?
Install Ghostery chrome extension and block all trackers fromhere. FireFox extensionhere.
Use Incognito / Private browsingmode while you do shopping, research, or do casual browsing. Start with clean slate and prevent your browsing patterns been read by websites.
Tor Browser – Use Tor browser is browser to hide your identity from websites.
Tor Router– User Tor Router provides online anonymity and privacy – better solution than Tor browser. It encrypts all data so that ISP can’t see. You physical address gets hidden from websites can thus blocking targeted ads. Visit – http://PrivacyOnTop.com . Privacy On Top is custom Wi-Fi router with Tor installation built for privacy and security.
If you are a frequent traveler, you connect your devices to various networks. Some are safe, some may not be, or in worst cases some networks are honeypots to grab your personal data. There are various reasons not to connect to public Wi-Fi networks.
Lets accept that fact that we still need connectivity and cant go away with it. Privacy and security then becomes low priority in this case – That’s the point we become susceptible for attacks.
Here is a better way to be safe and private while connecting to any network. “Privacy On Top” is privacy & security centric pocket/travel Wi-Fi router. Everything you need to stay secure your network is bundled into this tiny box.
“Privacy On Top” provides privacy using TOR network. This box provides Wi-Fi network that routes your network traffic via TOR network. Every secure/non-secure network connections made by all your devices and apps gets encrypted as it leaves from this box, making it entirely private.
You hotel network, or cafe or friends ISP cannot snoop in your data and monitor what you do over the network. All your business and personal communication remains encrypted as it goes out.
Setup is easy. This router comes pre-installed with TOR software and provides Wi-Fi network. Connect incoming network cable to this router & provide USB power. You then need to connect your laptop, tablet or phone to this Wi-Fi and there you go.
Using TOR is perfectly legal as far as you use it for right reasons. Here are various reasons people use TOR for. https://www.torproject.org/about/torusers.html.en
The technology has become so advanced that every interaction that you make with it can be traced. Take search engines or ISPs as an example. They probably are aware of your current location, all the sites you visited, all the purchases you made and so on. The irony is, you- rather most of the users- are exposing these information themselves, without even knowing it. This exposed information collected over the time gets mapped with your identity. With technology advancements your online behavior can easily be understood with all available data about you. And, that can affect you in many ways.
Having your location, ISP details, or your device information exposed makes you vulnerable for phishing against identity, targeted ads, Identity theft, or social engineering. Moreover, this information is even available for sale. Anyone can buy it and you never know about it. In short, your person and professional identity is at stake.
The widely known, proven and legal mechanism to protect your online privacy is the use of Tor network. The Tor network is a group of world-wide volunteer-operated servers that allows people to improve their privacy and security on the Internet. All your internet traffic gets encrypted and bounced across many tor servers before reaching to destination; making you untraceable. You can read more about Tor project here.
Privacy On Top is the product which facilitates connectivity to Tor Network. It is the replacement software for Wi-Fi router which enables router to connect to tor network. It exposes additional Wi-Fi (SSID) which helps you to connect any device to Tor Network and provide privacy.
Privacy On Top is currently supported on set of widely available routers. One can easily upgrade their router to Privacy On Top software using an android app that takes care of the installation process.
In addition to online privacy, this product gives you online security too. It has integrated OpenDNS and DNSScrypt that secure you from phishing by blocking bad websites. The OpenDNS also makes your internet faster and smarter.
Privacy On Top is built on open source linux operating system called OpenWrt which is secure and highly customizable. Learn more about the OpenWRT advantages here
To get Privacy On Top or know more about it, click here.
“I don’t believe society understands what happens when everything is available, knowable and recorded by everyone all the time” – Google Chairman Eric Schmidttold the Wall Street Journal 8-14-10.
“We know where you are. We know where you’ve been. We can more or less know what you’re thinking about;” – Google Chairman Eric Schmidt 10-1-10 per theAtlantic.
Privacy problems with today’s internet:
Your ISP knows everything about your online activity
Websites knows you physical location and have data about you. Can trace how often you visit and more
You are constantly watched and your data is been recorded
“Even if you’re not doing anything wrong, you are being watched and recorded” – Edward Snowden
Online Security Problem:
You could land up in phishing website that looks exactly like your bank website or facebook or the one you frequently visit and end-up giving your credentials
Identity theft is a serious issue and anyone who doesn’t take precaution is putting themselves at risk of becoming the next victim.
“I always tell people that if you haven’t had your identity stolen already, you will,’ ‘There are just so many outlets and so many ways it can happen.” – Mike Sullivan, director of education for Take Charge America
Multi Device Problems:
“Average number of devices per person is 2.5 in developed countries” – statista
No centralized way to get online privacy or security
Each device needs to have some kind of app/installation if we wish to stay secure
Management cost of protecting all devices is high
There are devices which connect to Internet, however there is no control over installing any security software. e.g. TV, XBOX, Apple TV, Chromecast and other boxed devices.
Solution: Privacy On Top
Solution: Privacy On Top
Privacy on top is the feature rich firmware/software for your Wi-Fi router which offers online privacy and security to connected devices.
It exposes two separate Wi-Fi from the router, one Wi-Fi for online security and other for online privacy/anonymity.
Privacy On Top is built using open source OpenWRT operating system that runs on Wi-Fi router. OpenWRT turns your ordinary router to smart router by providing customizable functionality.
Privacy On Top uses TOR Network for privacy. TOR protects you by bouncing your network traffic around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Visit TorProject for more details on how Tor protects you online.
Privacy on Top also gives you advantage of OpenDNS and DNScrypt. Which in simple words means online security. OpenDNS helps prevent identity theft, blocks phishing sites and bad websites. It speeds up your existing internet connection. You can visit OpenDNS for more information about how you can get online security with it.
“Securing the device is not enough anymore, you need to secure network. Centralized network security solution to protect all home/office devices is future” – Mangesh Bhamre CTO, Open Netware
Why Privacy on Top?
What you do over Internet can be easily tracked by interested parties like your ISP, government, websites you visit, hackers etc. Your online privacy is at stake. Your physical location can be exposed and your browsing patterns can be learnt as you use Internet.
You are not safe online. Many times, you come across phishing sites or unnecessary ads bothers your security. Who knows, your ISP or hacker may be sitting in between you and your sites and reading the data you send over internet.
CUSTOM FEATURE RICH FIRMWARE
Your existing firmware offers only limited set of features which are developed by your router’s manufacturer. Also existing firmware is vulnerable to common attacks. Your router is way too smart device than you think it is. The only thing lacking in that device is smart operating system. Using new firmware you can your router with full throttle.
How to get Privacy On Top ?
Open Netware has built an android app that can be downloaded here. App guides you to detect, install and setup your Wi-Fi router with new firmware.
Privacy On Top App does following steps –
Pre-Install check to see if you are connected to Wi-Fi and that required disk space exist to download firmware
Detects router based on MAC address and Web Interface
Downloads appropriate firmware and installs it using web interface on Wi-Fi router
Reboots the router and setup up new SSIDs with new password
Connects you to newly configured Wi-Fi
“Privacy On Top is unique solution to your privacy and security at home/office/travel. All your data gets encrypted as it leaves from your Wi-Fi router ensuring no one can snoop it”
What is TOR and Why we use TOR Network to get privacy?
Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Read more here.
TOR is trusted name in anonymity and privacy. Your data gets encrypted between Wi-Fi router and TOR-exit nodes and thus all kind of network traffic is been protected from ISP and intermediate gateways.
Using TOR does not log any info similar to other privacy techniques e.g VPN and thus TOR is our preferred way of providing privacy.
Who use TOR?
Family & Friends – People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.
Businesses – Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.
Activist – Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report
Media – Journalists and the media use Tor to protect their research and sources online.
Military and law enforcements – Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.
OpenDNS is company that provides secure DNS (Domain name system) service. In simple terms, they categorize websites as good and bad. If you are trying to visit a website that is bad then OpenDNS blocks you from visiting that site.
It provides protection against phishing thereby blocking you from visiting fraudulent bank websites .
In addition OpenDNS makes browsing faster and smarter.
OpenDNS and DNSCrypt is free. You can get more features of OpenDNS if you upgrade for premium account.
What is OpenWRT & Why we use it?
Privacy On Top firmware is built using open source Linux operating system called OpenWRT. It is secured and community of people help is to make it secure everyday.
We have further secured Wi-Fi router by taking care of all common attacks known to newly purchased router.
Wi-Fi passwords are long and complex.
Password for admin is auto-generated when you setup the router and is unique and long enough for any sorts of login attacks.
Wi-Fi security is set to highest encryption standard i.e. WPA2-AES
Rooting Android phone using Cyanogenmod (or similar mods) gives your phone pure android experience without any blotted apps. You get features that are not available on default firmware to make it feature rich. It’s built on open source and you can rely on it.
What if you could root Wi-Fi router to get new feature set ? E.g. TOR based privacy via Wi-Fi or Online Security or get Secured and customizable OS on router – Sounds interesting ?
Wi-Fi routers in market are re-programmable. You could install new firmware on it to make it enterprise grade router.
How to root your Wi-Fi router ?
If you are a super geek, you could install OpenWRT and configure it as you want.
OpenWRT is Open Source Linux distribution for Wi-Fi router. Its free for anyone to download and use
OpenWRT is customizable and there are packages available that you could download and install on top of it to provide TOR Privacy, Security or more.
What’s the catch with it?
Problem is that it’s NOT easy for geeks to do it right. Your router could be bricked and that you could spend endless time fiddling with it. Surely it’s doable and not impossible task. Please do it at your own risk – my DISCLAIMER.
What’s the alternative ?
Open Netware a startup, has came up with revolutionary android app
“Privacy On Top” that can install new firmware on router over air.
How does it work?
Just install an Android App – “Privacy On Top” and that will guide you through 6 simple install steps. You don’t need to touch your Wi-Fi router and everything happens over air. Interesting?
Is my router supported ?
Privacy On Top currently supports set of 7 widely used routers. TPLink, DLink and Western Digital. Exact list could be found here.
What do I get with Privacy On Top firmware?
A dedicated Wi-Fi for privacy using TOR Network. All your devices get connected to TOR Network. Everything coming out of router will be encrypted and cannot be snooped by ISP
A dedicated Wi-Fi for Online Security using OpenDNS and DNSCrypt. It secures you from phishing and bad websites by blocking the traffic. Read about OpenDNS here.
Secured and customized ready to use OS that protects you against all known attacks on Wi-Fi routers.
What is Online Privacy and why anyone should care about it online?
Online Privacy is about you and personal privacy concerning your data the way its stored and used by third-parties, and displaying that via internet.
With internet age, your data is captured every moment with what you do online and is available for companies to use and share with others without you noticing it and that’s the reason why you should care. Your identity and data is not only yours anymore.
Google the web king:
Every google search you do after login to google is stored. Google exactly know what kind of info you are looking for and what was your search history which it can relate and then show new results. Search done on webpage/tablet will also show up on phone and vice-versa.
If you have android then you can also see that “Google Now” will show related blogs/articles around your search. E.g. if you search for a name of place then few minutes later you will see a short map with time to travel to that destination will be shown. Its a great personalization and very useful to user. However its a way to show that your search queries are stored and processed for various purposes.
Every Android user ideally has Google account and that is the way Google brings in gmail / youtube/play and other services to user. All your emails are now with Google and they exactly know what you do and your personality traits. Ads shown by Google are defined by context of your emails.
You use youtube, and it knows which videos you watched, what you like and what you are likely to view. It show all that closely matches your taste to you and removes all other clutter.
Google alone brings huge issue of privacy online, and its hard to stay away from Google for all the services that you use.
As per policy Google collects name, email, phone number, credit-card, address, search query, your photo, you IP address, OS, On Android – call log, sms logs, hardware settings, device unique IDs, browser type, browser language, browser cookies to uniquely identify you, users location via GPS/Wi-Fi/Mobile-tower,
Google does accept as per their policy that they share this info with partners/companies/individuals outside Google.
Google does a good job of providing us ways to view our web history and then remove items from them. You can also stop recording web-history.https://history.google.com and you see it all there. You can see all you web history of search, image search, maps, finance, travel, books, videos and more.
You got facebook account and Facebook knows what you share, your friends, your chat, your likes and dislikes. Your close friends, your relatives and your affairs. Facebook can track you every webpage you visit (via like/share buttons on those pages). Even user who don’t have facebook accounts are also tracked by facebook. Facebook recently acquired Whatsapp and thus all chat communication is now known to facebook.
Photos and Videos you like or comment are with facebook. You get tagged in various photos of your friends and all that is with facebook.
If you are working, then its high chance that you have an LinkedIn account with all your info about employer you work/worked for, peers, projects, achievements, skills, recommendations and much more. Anyone can exactly find what you work on and your skillset without you noticing it. Its good and bad. LinkedIn is great for professionals to showcase skills and connect to peers across, however the data we pour in there is huge. Again this data is available to anyone for ads or personalization.
In addition to LinkedIn, employers do search for social networking and other sites to know more about you before they interview/hire you. And with companies sharing your data, your scores are defined before even you get to interview.
Whatsapp and other messengers has sprung up due to smartphone and always on connectivity. Around 500 million users are hooked on Whatsapp alone. Text, Videos and photos are widely shared in 1-to-1 or Whatsapp groups. This info is with whatsapp and now with facebook. Data of 500m young people!
All your data and websites pass through your internet service provider and then on the routers across globe. All this data is tracked and monitor by vendors at various levels. Your ISP, you state/country and all intermediate internet gateways on the way.
Governments can ask for any of the website companies to share data about a user for any kind of investigations.
Your emails/chat/photos/videos/likes and other data can now goes in hand of government without your consent.
Governments exactly know your income and expenses, credit/debit cards you hold, things you buy and from where you buy.Which place you visit and how often you visit. They can even tell you your monthy income/expense and categorize each item and tell you how much you spend on hotel/ restraurant/ grossery/ medicine / flights or movies you watched.
Skype/Viber and all telephony companies know whom you talk to and how long, even if you delete all your call log or history. All this is available as data to investigate and reuse for various purposes.
Your phone provider knows where you are so as to connect and ring your phone for incoming call. This info is maintained as you walk/drive.
If you have kindle/e-book reader then amazon knows which books you read, what’s your reading pattern, which books you are likely going to read and show those. It also knows your reading speed and show how long you are going to take to complete a book.
Spotify and many other music players provide free music service with ads. Great to listen on phone/laptop. You login to these services via Facebook/Google accounts and all that info is captured. You personal favorites, playlist and more.
Google/Dropbox/facebook knows which camera you got, where you clicked photos, how many photos you clicked and what’s your photography skills look like.
Smartphone the privacy killer:
You got smartphone and it captures all your info, place you visit, websites you navigate, apps you install, games you play, songs you listen time you wake up, chat you do on whatsapp and banks you hold your accounts. It knows how many steps you walk/run daily and how many calories you burnt. Android/iPhone capture all that you do with your phone and most of it does get sent back.
With malls providing you cards to gain points and redeem, exactly knows who you are and what you buy. Which fruits your eat and how healthy you eat. By just entering malls they know you are in using your smartphones wi-fi. How much time you spent in mall and which shop/section you spent most of the time.
Malls you visit first time also knows about your just due to the fact that you have smartphone with Wi-Fi enabled. They capture all your info, shops you visit and time you spent. Is that your first time in the mall or a returning visitor. Your smartphone keeps searching for known Wi-Fi hotspots and that helps Wi-Fi sniffers to know about your and can track you.
Almost all hotels now provide Wi-Fi and that forms the entry point of monitoring who connects or who is near by hotel. What time you came in and how long you stayed.
Other Internet services that we often use:
You use netflix or other movie streaming and it knows what you are watching. Notes you take on Onenote/Evernote/Google Keep and other sites are available on cloud.
Tripadvisor and other travel sites exactly know places you like and hotels you visit, they show what’s you likely going to book in your next travel destination.
Modern day cars are connected to internet and keeps track of how you drive, places you visit, FM and songs you listen to and more.
Everyone is concern about backup and dont want to miss photos or documents they have been working. All of this data again goes to cloud services like google Drive or Dropbox or box.net or Amazon. All your data is surely safe to be available for restoring in case you lose your device or your hard-disk fails.
However you are now giving your data to keep in some other hands and that’s all unknown to you. All your private photos/ideas/your work/music and much more is backed up on cloud and managed by some one whom you don’t know. Surely this data will be scanned, processed and maintained in a way to make more sense to you and others.
50% of theft happening around world is about mobile/tablet/laptops. All of these are data centric devices and points to your identity.
Reflection of your data on ads/personalization:
Ads you see on internet relate to you more than ad on TV. Google/Facebook/Apple/ other know exactly what you do online and show ads that you are likely to view or interests you.
All of these data is collected behind the scene and sold from one company to other without your consent or knowledge. Companies make most of it to give you personalized service on their websites and try to engage you most.
Even with private-browsing modes enabled, your internet service provider, state government, your company knows exactly what you browse. This dump is maintained for long time to refer back.
Personalization based on your data is great, however huge amount of data is been collected about you every hour/day and stored forever. You never know how it can be used against you or processed for you to provide unique internet experience for you that may be different than reality.
A good solution is not to use internet at all, however that’s not practical as it brings in so many advantages which we have been enjoying. However we should be aware about above listed things and make sure you follow some best practices to keep a tab on your privacy.
You need to be careful on what you do and how you interact with technology that constantly follows you. Here are some good tips
Review your web history on google and keep it minimal. May be block web-history recoding from google. Review it at https://history.google.com
Review privacy settings on facebook. Remove unwanted access to apps and fine tune who see your shared info
Use Private-browsing mode if you are searching and don’t want google to capture that, of course don’t login to browser or google
Be cautious about what you share/like/comment online on social media
Disable Wi-Fi/Bluetooth if not in use
Uninstall unwanted apps that you don’t use on smartphones
Ensure you have Anti-theft apps on your mobile devices and you wipe data remotely using them if you lose it. Setup PIN/Password on your mobile devices.
Review your usage of internet and data sharing
Ensure online accounts for data backup are safe and not exposed
Avoid connecting to public Wi-Fi hotspots or use VPN solutions to encrypt all communication.
Use Tor for additional privacy from ISP and intermediate gateways
Setup Google Alert on your name. Visit http://www.google.com/alerts enter your name, and variations of your name, with quotation marks around each. Select how frequently you want alerts (daily is probably fine for most of us) and where you want them sent. Now onwards if your name appear anywhere on public internet and google finds it, it will notify you.
People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.
They protect their privacy from unscrupulous marketers and identity thieves. Internet Service Providers (ISPs) sell your Internet browsing records to marketers or anyone else willing to pay for it. ISPs typically say that they anonymize the data by not providing personally identifiable information, but this has proven incorrect. A full record of every site you visit, the text of every search you perform, and potentially userid and even password information can still be part of this data. In addition to your ISP, the websites (and search engines) you visit have their own logs, containing the same or more information.
They protect their communications from irresponsible corporations. All over the Internet, Tor is being recommended to people newly concerned about their privacy in the face of increasing breaches and betrayals of private data. From lost backup tapes, togiving away the data to researchers, your data is often not well protected by those you are supposed to trust to keep it safe.
They protect their children online. You’ve told your kids they shouldn’t share personally identifying information online, but they may be sharing their location simply by not concealing their IP address. Increasingly, IP addresses can be literally mapped to a city or even street location, and can reveal other information about how you are connecting to the Internet. In the United States, the government is pushing to make this mapping increasingly precise.
They research sensitive topics. There’s a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control, Tibetan culture, or world religions is behind a national firewall.
They skirt surveillance. Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
They circumvent censorship. If you live in a country that has everblocked Facebook orYoutube, you might need to use Tor to get basic internet functionality.
Reporters without Borders tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
The US International Broadcasting Bureau (Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without safe access to free media. Tor preserves the ability of persons behind national firewalls or under the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, economics and religion.
Citizen journalists in China use Tor to write about local events to encourage social change and political reform.
Citizens and journalists in Internet black holes use Tor to research state propaganda and opposing viewpoints, to file stories with non-State controlled media, and to avoid risking the personal consequences of intellectual curiosity.
To verify IP based firewall rules: A firewall may have some policies that only allow certain IP addresses or ranges. Tor can be used to verify those configurations by using an IP number outside of the company’s alloted IP block.
To bypass their own security systems for sensitive professional activities: For instance, a company may have a strict policy regarding the material employees can view on the internet. A log review reveals a possible violation. Tor can be used to verify the information without an exception being put into corporate security systems.
To connect back to deployed services: A network engineer can use Tor to remotely connect back to services, without the need for an external machine and user account, as part of operational testing.
To access internet resources: Acceptable use policy for IT Staff and normal employees is usually different. Tor can allow unfettered access to the internet while leaving standard security policies in place.
To work around ISP network outages: Sometimes when an ISP is having routing or DNS problems, Tor can make internet resources available, when the actual ISP is malfunctioning. This can be invaluable in crisis situations.
Online surveillance: Tor allows officials to surf questionable web sites and services without leaving tell-tale tracks. If the system administrator of an illegal gambling site, for example, were to see multiple connections from government or law enforcement IP addresses in usage logs, investigations may be hampered.
Sting operations: Similarly, anonymity allows law officers to engage in online “undercover ” operations. Regardless of how good an undercover officer’s “street cred” may be, if the communications include IP ranges from police addresses, the cover is blown.
Truly anonymous tip lines: While online anonymous tip lines are popular, without anonymity software, they are far less useful. Sophisticated sources understand that although a name or email address is not attached to information, server logs can identify them very quickly. As a result, tip line web sites that do not encourage anonymity are limiting the sources of their tips.
Human rights activists use Tor to anonymously report abuses from danger zones. Internationally, labor rights workers use Tor and other forms of online and offline anonymity to organize workers in accordance with the Universal Declaration of Human Rights. Even though they are within the law, it does not mean they are safe. Tor provides the ability to avoid persecution while still raising a voice.
When groups such as the Friends Service Committee and environmental groups are increasingly falling under surveillance in the United States under laws meant to protect against terrorism, many peaceful agents of change rely on Tor for basic privacy during legitimate activities.
In the US, the Supreme Court recently stripped legal protections from government whistleblowers. But whistleblowers working for governmental transparency or corporate accountability can use Tor to seek justice without personal repercussions.
A contact of ours who works with a public health nonprofit in Africa reports that his nonprofit must budget 10% to cover various sorts of corruption, mostly bribes and such. When that percentage rises steeply, not only can they not afford the money, but they can not afford to complain — this is the point at which open objection can become dangerous. So his nonprofit has been working to use Tor to safely whistleblow on government corruption in order to continue their work.
At a recent conference, a Tor staffer ran into a woman who came from a “company town” in the eastern United States. She was attempting to blog anonymously to rally local residents to urge reform in the company that dominated the town’s economic and government affairs. She is fully cognizant that the kind of organizing she was doing could lead to harm or “fatal accidents.”
In east Asia, some labor organizers use anonymity to reveal information regarding sweatshops that produce goods for western countries and to organize local labor.
Does being in the public spotlight shut you off from having a private life, forever, online? A rural lawyer in a New England state keeps an anonymous blog because, with the diverse clientele at his prestigious law firm, his political beliefs are bound to offend someone. Yet, he doesn’t want to remain silent on issues he cares about. Tor helps him feel secure that he can express his opinion without consequences to his public role.
People living in poverty often don’t participate fully in civil society — not out of ignorance or apathy, but out of fear. If something you write were to get back to your boss, would you lose your job? If your social worker read about your opinion of the system, would she treat you differently? Anonymity gives a voice to the voiceless. Although it’s often said that the poor do not use online access for civic engagement, failing to act in their self-interests, it is our hypothesis (based on personal conversations and anecdotal information) that it is precisely the “permanent record ” left online that keeps many of the poor from speaking out on the Internet. We hope to show people how to engage more safely online, and then at the end of the year, evaluate how online and offline civic engagement has changed, and how the population sees this continuing into the future.
Security breach information clearinghouses: Say a financial institution participates in a security clearinghouse of information on Internet attacks. Such a repository requires members to report breaches to a central group, who correlates attacks to detect coordinated patterns and send out alerts. But if a specific bank in St. Louis is breached, they don’t want an attacker watching the incoming traffic to such a repository to be able to track where information is coming from. Even though every packet were encrypted, the IP address would betray the location of a compromised system. Tor allows such repositories of sensitive information to resist compromises.
Seeing your competition as your market does: If you try to check out a competitor’s pricing, you may find no information or misleading information on their web site. This is because their web server may be keyed to detect connections from competitors, and block or spread disinformation to your staff. Tor allows a business to view their sector as the general public would view it.
Keeping strategies confidential: An investment bank, for example, might not want industry snoopers to be able to track what web sites their analysts are watching. The strategic importance of traffic patterns, and the vulnerability of the surveillance of such data, is starting to be more widely recognized in several areas of the business world.
Accountability: In an age when irresponsible and unreported corporate activity has undermined multi-billion dollar businesses, an executive exercising true stewardship wants the whole staff to feel free to disclose internal malfeasance. Tor facilitates internal accountability before it turns into whistleblowing.
Field agents: It is not difficult for insurgents to monitor Internet traffic and discover all the hotels and other locations from which people are connecting to known military servers. Military field agents deployed away from home use Tor to mask the sites they are visiting, protecting military interests and operations, as well as protecting themselves from physical harm.
Hidden services: When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of local strikes. However, some functions must be centralized, such as command and control sites. It’s the nature of the Internet protocols to reveal the geographic location of any server that is reachable online. Tor’s hidden services capacity allows military command and control to be physically secure from discovery and takedown.
Intelligence gathering: Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website to record a military address, thereby revealing the surveillance.
Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. You have probably seen some of the vigorous debate (pro, con, andacademic) over anonymity. The Tor project is based on the belief that anonymity is not just a good idea some of the time — it is a requirement for a free and functioning society. The EFF maintains a good overview of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:police tip lines, adoption services, police officer identities, and so forth. It would be impossible to rehash the entire anonymity debate here — it is too large an issue with too many nuances, and there are plenty of other places where this information can be found. We do have a Tor abuse page describing some of the possible abuse cases for Tor, but suffice it to say that if you want to abuse the system, you’ll either find it mostly closed for your purposes (e.g. the majority of Tor relays do not support SMTP in order to prevent anonymous email spamming), or if you’re one of the Four Horsemen of the Information Apocalypse, you have better options than Tor. While not dismissing the potential abuses of Tor, this page shows a few of the many important ways anonymity is used online today.