Upload
torentspy
View
219
Download
0
Embed Size (px)
Citation preview
8/13/2019 How to Protect Your Internet Privacy
http://slidepdf.com/reader/full/how-to-protect-your-internet-privacy 1/4
How to Protect Your Internet PrivacyJanuary 18, 2012
FPRIVATE "TYPE=PICT;ALT=privacy.p!"
In #i$% &' %$! vari&u( %$r!a%( %& In%!rn!% privacy, i% i( n!c!((ary %& pr&%!c% y&ur(!#' n&%&n#y 'r&) &v!rn)!n%(, *u% )u#%ina%i&na# c&rp&ra%i&n(, in%!rn!% (!rvic! pr&vi+!r(,
univ!r(i%i!(, !)p#&y!r(, an+ cri)ina# n!%&r-(.
Is life so dear, or peace so sweet, as to be purchased at the price of chains and slavery? Forbid it, Almighty God! I know not what course others may take; but as for me, give me
liberty, or give me death!
Patrick Henry, A)!rican F&un+in Fa%$!r an+ R!v&#u%i&nary Pa%ri&%.
by Jack Helios
(henrymakow.com)
The U.S. overnment i( &n! &' %$! #!a+in %$r!a%( %& In%!rn!% 'r!!+&).
In 2011, I))ira%i&n( an+ Cu(%&)( En'&rc!)!n% ICE/ (!i!+ )&r! %$an 100 +&)ain(,
&'%!n i%$&u% any *a(i( in #a.
&)! p&#i%ician()&(% n&%a*#y J&(!p$ Li!*!r)an$av! ca##!+ '&r an In%!rn!% 3i##
i%c$ $!r!*y %$! !4!cu%iv! *ranc$ &' %$! 5ni%!+ %a%!( 6&v!rn)!n% &u#+ *! iv!n%$! "#!a# au%$&ri%y" %& "-i##" &r %!r)ina%! (&)! &r a## &' %$! In%!rn!% '&r any r!a(&n.
7&r! r!c!n%#y, %$! %&p n#in! Piracy Ac% PA/, a +rac&nian )!a(ur! (upp&r%!+ *y)uc$ &' 9&##y&&+, %$r!a%!n( %& (u*v!r% $a% #i%%#! 'r!!+&) r!)ain( &n %$! In%!rn!%.
9&!v!r, #!i(#a%i&n %ar!%in In%!rn!% 'r!!+&) )u(% *! c&n(%ru!+ in a *r&a+!r c&n%!4%:
(inc! !p%!)*!r 11%$, 2001, %$! Pa%ri&% Ac% $a( !((!n%ia##y (un+!r!+ %$! ri$%( an+
8/13/2019 How to Protect Your Internet Privacy
http://slidepdf.com/reader/full/how-to-protect-your-internet-privacy 2/4
'r!!+&)( a''&r+!+ *y %$! 5ni%!+ %a%!( C&n(%i%u%i&n. An+, in )any ay(, i% $a( iv!n
*ir%$ %& %$! a%i&na# !curi%y %a%!.
In #i$% &' %$! vari&u( %$r!a%( %& In%!rn!% privacy, i% i( n!c!((ary %& pr&%!c% y&ur(!#' n&%
&n#y 'r&) &v!rn)!n%(, *u% )u#%ina%i&na# c&rp&ra%i&n(, in%!rn!% (!rvic! pr&vi+!r(,
univ!r(i%i!(, !)p#&y!r(, an+ cri)ina# n!%&r-(.
!"#$YPT!% I"T!$"!T
Ev!ry c&nn!c%i&n %& %$! In%!rn!% $a( an In%!rn!% Pr&%&c&# IP/ a++r!(( i((u!+ *y an
In%!rn!% (!rvic! pr&vi+!r IP/. T$! IP a++r!(( )ay n&% &n#y r!v!a# $& %$! in%!rn!%
(!rvic! pr&vi+!r i(, *u% )&r! i)p&r%an%#y, %$! appr&4i)a%! ci%y, (%a%!, an+ c&un%ry &' a
par%icu#ar u(!r.
In a++i%i&n, !v!ry (!arc$ )a+! an+ !v!ry !*(i%! vi(i%!+ in par%icu#ar, &n#in! *an-in,
!)ai# #&in(, !% a#/ r!c&r+ a p!r(&n<( IP a++r!(( an+ (av!( i% in+!'ini%!#y.
I% i( %$i( nu)*!r %$a% uniu!#y i+!n%i'i!( !v!ry u(!r &n %$! In%!rn!%. An+ (inc! %$! IP $a(
a r!c&r+ &' %$! (u*(cri*!r na)!, %a4 i+!n%i'ica%i&n nu)*!r, $&)! a++r!((, !% a#/ , !v!ryc&nn!c%i&n i( %rac!a*#!%rac!a*#!, %$a% i% i(, un#!(( %$! +a%a i( 'ir(% !ncryp%!+ *y a pr&4y
&r a VP (!rvic! *!'&r! pa((in %$r&u$ %$! in%!rn!% (!rvic! pr&vi+!r, )a-in %$! +a%a
unr!a+a*#! %& %$! IP.
In a++i%i&n %& !ncryp%in +a%a, pr&4i!( an+ VP( can $i+! a p!r(&n<( IP a++r!(( an+
r!p#ac! i% i%$ a +i''!r!n% IP.
A#%$&u$ )any (!rvic!( &n %$! In%!rn!% pr&)i(! privacy an+ an&ny)i%y, '! +!#iv!r &n
(uc$ a pr&)i(!. A## !* *a(!+ pr&4i!(, (uc$ a( y&urc$!a%.c&), an&ny)&u(!.c&), an+
($a+&(ur'.c&), '&r !4a)p#!, ar! in!''!c%iv! an+ c&n(!u!n%#y )u(% *! av&i+!+.
>!* *a(!+ pr&4i!( +& n&% !ncryp% an In%!rn!% c&nn!c%i&n an+ (i)p#y cann&% $an+#! %$ir+
par%y p#uin( (uc$ a( Javacrip%, F#a($, Java, !% a#. 7&r! i)p&r%an%#y, )any !* *a(!+ pr&4i!( ar! in 'ac% run *y cri)ina# n!%&r-(, #a !n'&rc!)!n%, an+ in%!##i!nc! a!nci!(.
Vir%ua# Priva%! !%&r-( VP(/, un#i-! pr&4i!(, !ncryp% %$! $&#! In%!rn!%; $&!v!r,
#i-! pr&4i!(, VP( can *! &&+ &r *a+, +!p!n+in &n %$! (!rvic! pr&vi+!r. A VPc&nn!c%i&n %ypica##y !ncryp%( +a%a 'r&) a p!r(&n<( c&)pu%!r %$r&u$ %$! IP %& a VP
(!rv!r.
How to choose a &P":
? A#ay( r!a+ %$! privacy p&#icy &' a VP pr&vi+!r. Av&i+ (!rvic!( %$a% -!!p +a%a #&(.
? 5n+!r(%an+ %$a% a## VP (!rvic!(, r!ar+#!(( &' %$! privacy p&#icy, &''!r priva%!n&%
an&ny)&u(c&nn!c%i&n(. VP( ar! n&% an&ny)&u( *!cau(! a## +a%a pa((!+ 'r&) u(!r(<
c&nn!c%i&n( ar! vi(i*#! %& %$! VP pr&vi+!r; u#%i)a%!#y, VP( r!uir! a c!r%ain a)&un% &'
8/13/2019 How to Protect Your Internet Privacy
http://slidepdf.com/reader/full/how-to-protect-your-internet-privacy 3/4
%ru(% &n %$! u(!r<( !n+.
? Av&i+ P&in% %& P&in% Tunn!#in Pr&%&c&# PPTP/ (!rvic!(. PPTP( ar! c&n(i+!r!+ #!(((!cur! %$an p!nVP (!rvic!(.
? p!nVP i( &p!n (&urc! VP %!c$n&#&y %$a% !ncryp%( In%!rn!% c&nn!c%i&n( i%$ $i$ra+! !ncryp%i&n. .vpn@a##.c&) an+ .cy*!r$&(%vpn.c&) ar! a '! p&pu#ar
VP (!rvic!(.
Pr&4y !rvic!(:
? n#y u(! n!%&r- pr&4i!( %$a% ar! &p!n (&urc! pr&ra)(.
? ni&n Pr&4y (!rvic!( (uc$ a( T&r/ ar! %$! )&(% an&ny)&u( In%!rn!% c&nn!c%i&n( *u%a#(& ar! a)&n %$! (#&!(%.
? Pr&4i!( $av! #i)i%a%i&n( &n %$! p&r%( %$!y can an&ny)i!. In &r+!r %& an&ny)i! a##
p&r%(, pr&4i!( r!uir! %$ir+ par%y (&'%ar! -n&n a( &c-(i'i!r(.
!'I
E)ai# )!((a!( r!(!)*#! a p&(% car+%$!r! i( n&%$in pr!v!n%in any&n! 'r&) r!a+in i%in %ran(i%. 9!r! ar! (&)! pr!cau%i&n( y&u can %a-!*
? A#ay( !ncryp% (!n(i%iv! !)ai#( i%$ !i%$!r P6P &r 7I7E (%an+ar+(.
? Av&i+ p&pu#ar !)ai# (!rvic!( &''!r!+ *y .&&#!.c&), .ya$&&.c&), an+
.$&%)ai#.c&). T$&(! (!rvic!( ar! n!i%$!r priva%! n&r an&ny)&u(.
? B! cau%i&u( &' c!r%ain !)ai# (!rvic!( c#ai)in %& *! priva%! i.!. .(a'!)ai#.c&)/
*u% ar! in r!a#i%y in%!##i!nc! $&n!yp&%(.
? A#ay( r!a+ %$! privacy p&#icy &' !)ai# (!rvic!(. I% i( a#)&(% a#ay( pr!'!ra*#! %& u(!
an !)ai# (!rvic! &u%(i+! &' #&ca# uri(+ic%i&n. .v!-a.n!%; .cryp%&$!av!n.c&);
an+ .#ava*i%.c&) ar! p&pu#ar c$&ic!(.
? T& av&i+ (pa), pr!(!rv! privacy, an+ pr&%!c% aain(% p&%!n%ia##y +an!r&u( !)ai#,
a#ay( u(! a +i(p&(a*#! !)ai# (!rvic! '&r '&ru) #&in(, &n#in! c&up&n(, an+ &%$!r &n#in!
ac%ivi%i!(. .)ai#ina%&r.c&) an+ .+i(p&(%a*#!.c&) ar! &&+ c$&ic!(. 9&!v!r, p#!a(! r!)!)*!r %$a% )&(% %$r&aay !)ai# (!rvic!( ar! n&% in%!n+!+ '&r (!n(i%iv! +a%a,
(inc! any&n! )ay *! a*#! %& r!a+ %$! c&n%!n%( &' %$! !)ai#.
+"I"! PU$#HS!S
? I% i( a#ay( pr!'!ra*#! %& u(! a pr!pai+ i'% car+ A)!rican E4pr!((, Vi(a, !% a#/ '&r
an&ny)&u( &n#in! purc$a(!( %$an a +!*i% &r cr!+i% car+.
8/13/2019 How to Protect Your Internet Privacy
http://slidepdf.com/reader/full/how-to-protect-your-internet-privacy 4/4
? I% i( pr!'!ra*#! %& u(! an a#ia( $!n purc$a(in &n#in! pr&+uc%(.
T$! au%$&r i( %$! au%$&r &' T$! Privacy B&&-. C&n%ac% %$! ac-$!#i&(v'!)ai#.n!% F&r
)&r! in'&r)a%i&n, p#!a(! vi(i% $%%p(:.a4cn4.+!$an+*uc$.$%)
&%! 'r&) 9!nry A r!a+!r (u!(%!+ u(in (%ar%pa! a( a (!arc$ !nin!. T$!y +& n&%
r!c&r+ y&ur IP a++r!((
Jack Helios (author) (ai+ January 21, 2012/:
7y (!arc$ !nin! r!c&))!n+a%i&n(:
.(%ar%pa!.c&)
.(%ar%inpa!.c&)
.i4uic-.c&)
.+uc-+uc-&.c&)T$! 'ir(% %$r!! ar! a## %$! (a)! c&)pany. Ba(ica##y, %$!y ar! an&ny)&u( v!r(i&n( &' 6&&#!.c&).
A## '&ur ar! !ncryp%!+ (!arc$ !nin!( %$a% +& n&% #& IP a++r!((!(.
T$!y ar! pr&*a*#y %$! )&(% priva%! &n!( ar&un+.