Grammer 2 and formating

This commit is contained in:
Alicia Sykes 2018-03-18 16:52:17 +00:00 committed by GitHub
parent db888e3c18
commit 103f0423c3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -24,11 +24,11 @@ Over [2 billion people](https://www.statista.com/topics/1164/social-networks/) r
**Web Browsers**
Your web browser also allows for data to be recorded about you, without your immediate knowledge. Most browsers store cookies from sites and also record IP addresses, information about your devices, web beacons, HTTP , and Pixel tags.
Your web browser also allows for data to be recorded about you, without your immediate knowledge. Most browsers store cookies from sites and also record IP addresses, information about your devices, web beacons, HTTP, and Pixel tags.
**Internet Service Providers**
Your ISP (the company providing you with your internet connection) monitor all your online activity. From the things you search for and the sites you visit to your current location and also shopping habits. They do this through deep packet inspection and work closely with the government.
Your ISP (the company providing you with your internet connection) monitor all your online activity. From the things you search for and the sites, you visit your current location and also shopping habits. They do this through deep packet inspection and work closely with the government.
**The Government**
@ -55,9 +55,9 @@ Ideally, you should use a different, and secure password to access each service
| **Done** | **Security** | **Details and Hints** |
| -------- | -------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| [] | **Use a strong password** | Check how strong your password is at: [HowSecureIsMyPassword.net](https://howsecureismypassword.net) |
| [] | **Use different passwords for each account you have** | In order to manage having hundreds of different passwords, use a [password manager](https://en.wikipedia.org/wiki/Password_manager). Have a look at [LastPass](https://www.lastpass.com), [DashLane](https://www.dashlane.com), [KeePass](https://keepass.info) or [Robo Forms 8](https://www.roboform.com). |
| [] | **Never answer online security questions truthaly** | Instead, create a password inside your password manager to store your fictitious answer. This will stop people guessing your place of birth or mothers mainen name. |
| [] | **Dont use a 4-digit pin to access your phone** | Dont use a short pin to access your smartphone or computer. Instead use a text password. |
| [] | **Use different passwords for each account you have** | In order to manage to have hundreds of different passwords, use a [password manager](https://en.wikipedia.org/wiki/Password_manager). Have a look at [LastPass](https://www.lastpass.com), [DashLane](https://www.dashlane.com), [KeePass](https://keepass.info) or [Robo Forms 8](https://www.roboform.com). |
| [] | **Never answer online security questions truly** | Instead, create a password inside your password manager to store your fictitious answer. This will stop people guessing your place of birth or mothers maiden name. |
| [] | **Dont use a 4-digit pin to access your phone** | Dont use a short pin to access your smartphone or computer. Instead, use a text password. |
| [] | **If possible, try to avoid bio-metric and hardware-based authentication** | Fingerprint sensors, face-detection and voice-recognition are all easily hackable. Where possible replace these with traditional passwords. |
| [] | P**assword protect your BIOS and drives** | A BIOS or UEFI password will make a hackers life much harder if they get hold of your PC or hard drive, [here is a guide on how to do it](https://www.howtogeek.com/186235/how-to-secure-your-computer-with-a-bios-or-uefi-password/). |
@ -68,27 +68,27 @@ This is a secure method of logging in, where you supply not just your password,
| **Done** | **Security** | **Details and Hints** |
| -------- | ------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [] | **Use an authenticator.** | Use [Google Authenticator](https://support.google.com/accounts/answer/1066447) where sites offer 2-FA. Alternative authenticators include: [Authy](https://authy.com), [FreeOTP](https://freeotp.github.io), [LastPassAuthenticator](https://lastpass.com/auth/) and [AuthenticatorPlus](https://www.authenticatorplus.com). SMS codes are ubiquitous, but easy to break so although better than nothing, not ideal. Another option is a hardware-based 2FA, such as [Yubico](https://www.yubico.com/security-keys-authentication/), although with limited compatibility and of course a physical cost. |
| [] | **Use an authenticator.** | Use [Google Authenticator](https://support.google.com/accounts/answer/1066447) where sites offer 2-FA. Alternative authenticators include: [Authy](https://authy.com), [FreeOTP](https://freeotp.github.io), [LastPassAuthenticator](https://lastpass.com/auth/) and [AuthenticatorPlus](https://www.authenticatorplus.com). SMS codes are ubiquitous, but easy to break so although better than nothing, not ideal. Another option is a hardware-based 2FA, such as [Yubico](https://www.yubico.com/security-keys-authentication/), although with limited compatibility and of course a physical cost. |
**Browser and Search**
Most modern web browsers allow for addons and extensions, these can access anything that you do online, avoid installing anything that may not be legitimate and check permissions first.
Most modern web browsers allow for add-ons and extensions, these can access anything that you do online, avoid installing anything that may not be legitimate and check permissions first.
| **Done** | **Security** | **Details and Hints** |
| -------- | -------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [] | **Only use trusted browser addons and extensions** | Both Firefox and Chrome webstore allow you to check what permissions access rights an extension requires before you install it. Check the reviews. Only install extensions you really need. |
| [] | **Only use trusted browser add-ons and extensions** | Both Firefox and Chrome webstore allow you to check what permissions access rights an extension requires before you install it. Check the reviews. Only install extensions you really need. |
| [] | **Use a private search engine** | Take a look at [DuckDuckGo](https://duckduckgo.com) or [StartPage](https://www.startpage.com). Neither store cookies or cache anything. |
| [] | **Consider a privacy browser** | Google openly collects usage data on Chrome. There are several privacy browsers out there which minimize the amount of data collected. Have a look at [Brave Browser](https://brave.com), [Yandex](https://browser.yandex.com), or [Comodo](https://www.comodo.com/home/browsers-toolbars/browser.php). As a more extreme choice, consider [Tor](https://www.torproject.org/). |
| [] | **Consider a privacy browser** | Google openly collects usage data in Chrome. There are several privacy browsers out there which minimize the amount of data collected. Have a look at [Brave Browser](https://brave.com), [Yandex](https://browser.yandex.com), or [Comodo](https://www.comodo.com/home/browsers-toolbars/browser.php). As a more extreme choice, consider [Tor](https://www.torproject.org/). |
| [] | **Block scripts from bad origin** | Use an extension such as [uBlock Origin](https://github.com/gorhill/uBlock), to block anything being loaded from an external or unverified origin. |
| [] | **Block Trackers** | Use an extension such as [Privacy Badger](https://www.eff.org/privacybadger) to disallow adds from secretly tracking where you go, and which sites you visit. |
| [] | **Force HTTPS only traffic** | Use an extension such as [HTTPS Everywhere](https://www.eff.org/https-everywhere), to force all sites to load securely. |
| [] | **Disable Flash** | Adobe Flash has been around since the dawn of the internet, however it has been falling in popularity for a while. It brings with it many unpatched vulnerabilities (a few of which you can [read about here](https://www.comparitech.com/blog/information-security/flash-vulnerabilities-security/)). See [this guide](https://www.howtogeek.com/222275/how-to-uninstall-and-disable-flash-in-every-web-browser/), on how to disable Flash player. |
| [] | **Disable Flash** | Adobe Flash has been around since the dawn of the internet, however, it has been falling in popularity for a while. It brings with it many unpatched vulnerabilities (a few of which you can [read about here](https://www.comparitech.com/blog/information-security/flash-vulnerabilities-security/)). See [this guide](https://www.howtogeek.com/222275/how-to-uninstall-and-disable-flash-in-every-web-browser/), on how to disable Flash player. |
**VPN**
A Virtual Private Network (VPN) allows you to securely connect to the internet, when you visit a site, your visiting it through the secure VPN connection and not broadcasting your own IP address. A VPN will hide your identity on the websites you visit, to your internet service provider, and to anyone else trying to track you, they can also encrypt your traffic so you can browse more securely on public networks. Theyre really easy to setup.
A Virtual Private Network (VPN) allows you to securely connect to the internet when you visit a site, your visiting it through the secure VPN connection and not broadcasting your own IP address. A VPN will hide your identity on the websites you visit, to your internet service provider, and to anyone else trying to track you, they can also encrypt your traffic so you can browse more securely on public networks. Theyre really easy to set up.
| **Done** | **Security** | **Details and Hints** |
| -------- | ------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
@ -100,10 +100,10 @@ A Virtual Private Network (VPN) allows you to securely connect to the internet,
| **Done** | **Security** | **Details and Hints** |
| -------- | --------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [] | **Check your privacy settings** | Most social networks allow you to control your privacy settings. Ensure that your profile can only be viewed by people who you are in your friends list, and you know personally. |
| [] | **Only put info on social media that you wouldnt mind being public** | Even with tightened security settings, dont put anything online that you wouldnt want to be seen by anyone other than your friends. Dont reply soley on the social networks security. |
| [] | **Check your privacy settings** | Most social networks allow you to control your privacy settings. Ensure that your profile can only be viewed by people who you are in your friend's list, and you know personally. |
| [] | **Only put info on social media that you wouldnt mind being public** | Even with tightened security settings, dont put anything online that you wouldnt want to be seen by anyone other than your friends. Dont rely solely on the security of the social network. |
| [] | **Dont give social networking apps permissions they dont need** | By default many of the popular social networking apps, will ask for permission to access your contacts, your call log, your location, your messaging history etc.. If they dont need this access- dont grant it. |
| [] | **Remove meta data before uploading media** | Most smartphones and some cameras automatically attach a comprehensive set of additional data to each photograph., This usually includes things like time, date, location, camera model, user etc. Remove this data before uploading. See [this guide](https://www.makeuseof.com/tag/3-ways-to-remove-exif-metadata-from-photos-and-why-you-might-want-to/) for more info. |
| [] | **Remove metadata before uploading media** | Most smartphones and some cameras automatically attach a comprehensive set of additional data to each photograph., This usually includes things like time, date, location, camera model, user etc. Remove this data before uploading. See [this guide](https://www.makeuseof.com/tag/3-ways-to-remove-exif-metadata-from-photos-and-why-you-might-want-to/) for more info. |
**Your Devices**
@ -111,9 +111,9 @@ A Virtual Private Network (VPN) allows you to securely connect to the internet,
| **Done** | **Security** | **Details and Hints** |
| -------- | ------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| [] | **Turn of connectivity features that arnt being used** | When your not using WiFi, Bluetooth, NFC or anything else- turn those features off. These are commonly used to easily hack individuals. |
| [] | **Turn of connectivity features that aren't being used** | When your not using WiFi, Bluetooth, NFC or anything else- turn those features off. These are commonly used to easily hack individuals. |
| [] | **Uninstall apps that you dont need** | Dont have apps that your not using on your phone, as they can be collecting data in the background. Dont install apps from non-legitimate sources, or apps with few reviews. |
| [] | **Dont grant apps permissions that they dont need.** | If an app doesnt need access to your camera- dont grant it access. Same with any features of your phone, be wary about what each app has access to. |
| [] | **Dont grant apps permissions that they dont need.** | If an app doesnt need access to your camera- dont grant it access. Same with any features of your phone, be wary of what each app has access to. |
@ -122,7 +122,7 @@ A Virtual Private Network (VPN) allows you to securely connect to the internet,
| **Done** | **Security** | **Details and Hints** |
| -------- | ---------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [] | Avoid using your real phone number | Where possible, avoid giving out your real phone number while creating accounts online. You can create phone numbers using services such as [Google Voice](https://voice.google.com) or [Skype](https://www.skype.com/en/features/online-number/). For temporary usage you can use a service like [iNumbr](https://www.inumbr.com) that generates a phone number that forwards messages and calls to your main number. |
| [] | **Avoid using your real phone number** | Where possible, avoid giving out your real phone number while creating accounts online. You can create phone numbers using services such as [Google Voice](https://voice.google.com) or [Skype](https://www.skype.com/en/features/online-number/). For temporary usage, you can use a service like [iNumbr](https://www.inumbr.com) that generates a phone number that forwards messages and calls to your main number. |
**Communication**
@ -131,8 +131,8 @@ SMS texting is not secure.
| **Done** | **Security** | **Details and Hints** |
| -------- | ------------------------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [ ] | Dont use SMS - Use E2E encrypted messaging apps | [iMessage is secure](https://techcrunch.com/2014/02/27/apple-explains-exactly-how-secure-imessage-really-is/). For non-Apple users [Signal](https://signal.org) is the most secure option. As of late 2016 [WhatsApp](https://www.whatsapp.com) is also [end-to-end-encrypted using the Signal protocol](https://signal.org/blog/whatsapp-complete/). Signal can also protect your phone calls. |
| [ ] | Use a secure email provider | Most email providers completely invade your privacy intercepting both messages sent and received. [ProtonMail](https://protonmail.com) is a secure email provider, that is open source and offers end-to-end encryption. There are alternative secure mail providers (such as [CounterMail](https://countermail.com), [HushMail](https://www.hushmail.com) and [MailFence](https://mailfence.com))- but [ProtonMail](https://protonmail.com) has both a clear interface and strong security record |
| [ ] | **Dont use SMS** - Use E2E encrypted messaging apps | [iMessage is secure](https://techcrunch.com/2014/02/27/apple-explains-exactly-how-secure-imessage-really-is/). For non-Apple users [Signal](https://signal.org) is the most secure option. As of late 2016 [WhatsApp](https://www.whatsapp.com) is also [end-to-end-encrypted using the Signal protocol](https://signal.org/blog/whatsapp-complete/). Signal can also protect your phone calls. |
| [ ] | **Use a secure email provider** | Most email providers completely invade your privacy intercepting both messages sent and received. [ProtonMail](https://protonmail.com) is a secure email provider, that is open source and offers end-to-end encryption. There are alternative secure mail providers (such as [CounterMail](https://countermail.com), [HushMail](https://www.hushmail.com) and [MailFence](https://mailfence.com))- but [ProtonMail](https://protonmail.com) has both a clear interface and strong security record |
**Your Router**
@ -146,7 +146,7 @@ SMS texting is not secure.
**Operating Systems**
Although Windows and OS X are easy and convient, they both are far from secure. The ideal option would be to install a security-based OS. Where this often isnt possible, using a VM or dual-booting with a consumer-focused Linux distro is still preferable to primarily using a either of Microsofts, Apples or Googles services.
Although Windows and OS X are easy and convenient, they both are far from secure. The ideal option would be to install a security-based OS. Where this often isnt possible, using a VM or dual-booting with a consumer-focused Linux distro is still preferable to primarily using a either of Microsofts, Apples or Googles services.
| **Done** | **Security** | **Details and Hints** |
| -------- | -------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
@ -159,7 +159,7 @@ Although Windows and OS X are easy and convient, they both are far from secure.
| **Done** | **Security** | **Details and Hints** |
| -------- | ------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [] | **Consider using a pre-paid debit card, topped up with cash** | There are a lot of options out there, some are free, some are only available in certain locations, some do require identity checks, whereas others dont- so its worth shopping round to find the one thats right for you. |
| [] | **Consider paying with a Crypto currency** | This is the most secure method of payment, although unfortunately not currently widley supported. |
| [] | **Consider paying with a Cryptocurrency** | This is the most secure method of payment, although unfortunately not currently widely supported. |
| [] | **Consider not getting goods delivered to your home address** | Use a pickup service, such as Doddle, Amazon Click + Collect, eBay Argos collect etc. |