mirror of
https://github.com/Lissy93/personal-security-checklist.git
synced 2024-10-01 01:35:37 -04:00
Adds links
This commit is contained in:
parent
cb1d45cab6
commit
a177005f1d
@ -35,8 +35,9 @@
|
|||||||
A password manager is an application that generates, stores and auto-fills your login credentials for you.
|
A password manager is an application that generates, stores and auto-fills your login credentials for you.
|
||||||
All your passwords will be encrypted against 1 master passwords (which you must remember, and it should be
|
All your passwords will be encrypted against 1 master passwords (which you must remember, and it should be
|
||||||
very strong). Most password managers have browser extensions and mobile apps, so whatever device you are on,
|
very strong). Most password managers have browser extensions and mobile apps, so whatever device you are on,
|
||||||
your passwords can be auto-filled. A good all-rounder is [BitWarden](https://bitwarden.com), or see
|
your passwords can be auto-filled. A good all-rounder is
|
||||||
[Recommended Password Managers](https://github.com/Lissy93/awesome-privacy#password-managers)
|
[Bitwarden](https://awesome-privacy.xyz/essentials/password-managers/bitwarden), or see
|
||||||
|
[Recommended Password Managers](https://awesome-privacy.xyz/essentials/password-managers)
|
||||||
|
|
||||||
- point: Avoid sharing passwords
|
- point: Avoid sharing passwords
|
||||||
priority: Essential
|
priority: Essential
|
||||||
@ -74,7 +75,7 @@
|
|||||||
if you are in any of their lists. [Firefox Monitor](https://monitor.firefox.com), [Have I been pwned](https://haveibeenpwned.com)
|
if you are in any of their lists. [Firefox Monitor](https://monitor.firefox.com), [Have I been pwned](https://haveibeenpwned.com)
|
||||||
and [DeHashed](https://dehashed.com) allow you to sign up for monitoring, where they will notify you if your
|
and [DeHashed](https://dehashed.com) allow you to sign up for monitoring, where they will notify you if your
|
||||||
email address appears in any new data sets. It is useful to know as soon as possible when this happens, so
|
email address appears in any new data sets. It is useful to know as soon as possible when this happens, so
|
||||||
that you can change your passwords for the affected accounts. Have I been pwned also has domain-wide
|
that you can change your passwords for the affected accounts. [Have i been pwned](https://awesome-privacy.xyz/security-tools/online-tools/have-i-been-pwned) also has domain-wide
|
||||||
notification, where you can receive alerts if any email addresses under your entire domain appear (useful if
|
notification, where you can receive alerts if any email addresses under your entire domain appear (useful if
|
||||||
you use aliases for [anonymous forwarding](https://github.com/Lissy93/awesome-privacy#anonymous-mail-forwarding))
|
you use aliases for [anonymous forwarding](https://github.com/Lissy93/awesome-privacy#anonymous-mail-forwarding))
|
||||||
|
|
||||||
@ -182,7 +183,7 @@
|
|||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
For increased security, an encrypted offline password manager will give you full control over your data.
|
For increased security, an encrypted offline password manager will give you full control over your data.
|
||||||
[KeePass](https://keepass.info) is a popular choice, with lots of [plugins](https://keepass.info/plugins.html) and
|
[KeePass](https://awesome-privacy.xyz/essentials/password-managers/keepass) is a popular choice, with lots of [plugins](https://[KeePass](https://awesome-privacy.xyz/essentials/password-managers/keepass).info/plugins.html) and
|
||||||
community forks with additional compatibility and functionality. Popular clients include: [KeePassXC](https://keepassxc.org)
|
community forks with additional compatibility and functionality. Popular clients include: [KeePassXC](https://keepassxc.org)
|
||||||
(desktop), [KeePassDX](https://www.keepassdx.com) (Android) and [StrongBox](https://apps.apple.com/us/app/strongbox-password-safe/id897283731)
|
(desktop), [KeePassDX](https://www.keepassdx.com) (Android) and [StrongBox](https://apps.apple.com/us/app/strongbox-password-safe/id897283731)
|
||||||
(iOS). The drawback being that it may be slightly less convenient for some, and it will be up to you to back it up,
|
(iOS). The drawback being that it may be slightly less convenient for some, and it will be up to you to back it up,
|
||||||
@ -232,7 +233,8 @@
|
|||||||
priority: Essential
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Using an ad-blocker can help improve your privacy, by blocking the trackers that ads implement.
|
Using an ad-blocker can help improve your privacy, by blocking the trackers that ads implement.
|
||||||
[uBlock Origin](https://github.com/gorhill/uBlock) is a very efficient and open source browser addon,
|
[uBlock Origin](https://awesome-privacy.xyz/networking/ad-blockers/ublock-origin) is a very
|
||||||
|
efficient and open source browser addon,
|
||||||
developed by Raymond Hill. When 3rd-party ads are displayed on a webpage, they have the ability to
|
developed by Raymond Hill. When 3rd-party ads are displayed on a webpage, they have the ability to
|
||||||
track you, gathering personal information about you and your habits, which can then be sold, or used
|
track you, gathering personal information about you and your habits, which can then be sold, or used
|
||||||
to show you more targeted ads, and some ads are plain malicious or fake. Blocking ads also makes pages
|
to show you more targeted ads, and some ads are plain malicious or fake. Blocking ads also makes pages
|
||||||
@ -244,7 +246,8 @@
|
|||||||
It may sound obvious, but when you logging into any online accounts, double check the URL is correct.
|
It may sound obvious, but when you logging into any online accounts, double check the URL is correct.
|
||||||
Storing commonly visited sites in your bookmarks is a good way to ensure the URL is easy to find. When
|
Storing commonly visited sites in your bookmarks is a good way to ensure the URL is easy to find. When
|
||||||
visiting new websites, look for common signs that it could be unsafe: Browser warnings, redirects,
|
visiting new websites, look for common signs that it could be unsafe: Browser warnings, redirects,
|
||||||
on-site spam and pop-ups. You can also check a website using a tool, such as: [Virus Total URL Scanner](https://www.virustotal.com/gui/home/url),
|
on-site spam and pop-ups. You can also check a website using a tool, such as:
|
||||||
|
[Virus Total](https://awesome-privacy.xyz/security-tools/online-tools/virus-total),
|
||||||
[IsLegitSite](https://www.islegitsite.com), [Google Safe Browsing Status](https://transparencyreport.google.com/safe-browsing/search)
|
[IsLegitSite](https://www.islegitsite.com), [Google Safe Browsing Status](https://transparencyreport.google.com/safe-browsing/search)
|
||||||
if you are unsure.
|
if you are unsure.
|
||||||
|
|
||||||
@ -263,7 +266,8 @@
|
|||||||
- point: Use a Privacy-Respecting Browser
|
- point: Use a Privacy-Respecting Browser
|
||||||
priority: Essential
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
[Firefox](https://www.mozilla.org/en-US/firefox/new) (with a few tweaks) and [Brave](https://brave.com)
|
[Firefox](https://awesome-privacy.xyz/essentials/browsers/firefox) (with a few tweaks)
|
||||||
|
and [Brave](https://awesome-privacy.xyz/essentials/browsers/brave-browser)
|
||||||
are secure, private-respecting browsers. Both are fast, open source, user-friendly and available on all
|
are secure, private-respecting browsers. Both are fast, open source, user-friendly and available on all
|
||||||
major operating systems. Your browser has access to everything that you do online, so if possible, avoid
|
major operating systems. Your browser has access to everything that you do online, so if possible, avoid
|
||||||
Google Chrome, Edge and Safari as (without correct configuration) all three of them, collect usage data,
|
Google Chrome, Edge and Safari as (without correct configuration) all three of them, collect usage data,
|
||||||
@ -275,8 +279,9 @@
|
|||||||
priority: Essential
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Using a privacy-preserving, non-tracking search engine, will reduce risk that your search terms are not
|
Using a privacy-preserving, non-tracking search engine, will reduce risk that your search terms are not
|
||||||
logged, or used against you. Consider [DuckDuckGo](https://duckduckgo.com), [Qwant](https://www.qwant.com),
|
logged, or used against you. Consider [DuckDuckGo](https://awesome-privacy.xyz/essentials/search-engines/duckduckgo),
|
||||||
or [SearX](https://searx.me) (self-hosted). Google implements some [incredibly invasive](https://hackernoon.com/data-privacy-concerns-with-google-b946f2b7afea)
|
or [Qwant](https://awesome-privacy.xyz/essentials/search-engines/qwant).
|
||||||
|
Google implements some [incredibly invasive](https://hackernoon.com/data-privacy-concerns-with-google-b946f2b7afea)
|
||||||
tracking policies, and have a history of displaying [biased search results](https://www.businessinsider.com/evidence-that-google-search-results-are-biased-2014-10).
|
tracking policies, and have a history of displaying [biased search results](https://www.businessinsider.com/evidence-that-google-search-results-are-biased-2014-10).
|
||||||
Therefore Google, along with Bing, Baidu, Yahoo and Yandex are incompatible with anyone looking to protect
|
Therefore Google, along with Bing, Baidu, Yahoo and Yandex are incompatible with anyone looking to protect
|
||||||
their privacy. It is recommended to update your [browsers default search](https://duckduckgo.com/install)
|
their privacy. It is recommended to update your [browsers default search](https://duckduckgo.com/install)
|
||||||
@ -287,7 +292,7 @@
|
|||||||
details: >-
|
details: >-
|
||||||
Extensions are able to see, log or modify anything you do in the browser, and some innocent looking
|
Extensions are able to see, log or modify anything you do in the browser, and some innocent looking
|
||||||
browser apps, have malicious intentions. Websites can see which extensions you have installed, and may
|
browser apps, have malicious intentions. Websites can see which extensions you have installed, and may
|
||||||
use this to enhance your fingerprint, to more accurately identify/ track you. Both Firefox and Chrome
|
use this to enhance your fingerprint, to more accurately identify/ track you. Both [Firefox](https://awesome-privacy.xyz/essentials/browsers/firefox) and Chrome
|
||||||
web stores allow you to check what permissions/access rights an extension requires before you install it.
|
web stores allow you to check what permissions/access rights an extension requires before you install it.
|
||||||
Check the reviews. Only install extensions you really need, and removed those which you haven't used in a while.
|
Check the reviews. Only install extensions you really need, and removed those which you haven't used in a while.
|
||||||
|
|
||||||
@ -309,7 +314,7 @@
|
|||||||
(developed by the [EFF](https://www.eff.org/)) used to be a browser extension/addon that automatically
|
(developed by the [EFF](https://www.eff.org/)) used to be a browser extension/addon that automatically
|
||||||
enabled HTTPS on websites, but as of 2022 is now deprecated. In their [accouncement article](https://www.eff.org/)
|
enabled HTTPS on websites, but as of 2022 is now deprecated. In their [accouncement article](https://www.eff.org/)
|
||||||
the EFF explains that most browsers now integrate such protections. Additionally, it provides instructions
|
the EFF explains that most browsers now integrate such protections. Additionally, it provides instructions
|
||||||
for Firefox, Chrome, Edge and Safari browsers on how to enable their HTTPS secure protections.
|
for [Firefox](https://awesome-privacy.xyz/essentials/browsers/firefox), Chrome, Edge and Safari browsers on how to enable their HTTPS secure protections.
|
||||||
|
|
||||||
- point: Use DNS-over-HTTPS
|
- point: Use DNS-over-HTTPS
|
||||||
priority: Essential
|
priority: Essential
|
||||||
@ -317,17 +322,22 @@
|
|||||||
Traditional DNS makes requests in plain text for everyone to see. It allows for eavesdropping and
|
Traditional DNS makes requests in plain text for everyone to see. It allows for eavesdropping and
|
||||||
manipulation of DNS data through man-in-the-middle attacks. Whereas DNS-over-HTTPS performs DNS
|
manipulation of DNS data through man-in-the-middle attacks. Whereas DNS-over-HTTPS performs DNS
|
||||||
resolution via the HTTPS protocol, meaning data between you and your DNS resolver is encrypted.
|
resolution via the HTTPS protocol, meaning data between you and your DNS resolver is encrypted.
|
||||||
A popular option is Cloudflare's 1.1.1.1, or compare providers- it is simple to enable in-browser.
|
A popular option is [CloudFlare](https://awesome-privacy.xyz/networking/dns-providers/cloudflare)'s [1.1.1.1](https://awesome-privacy.xyz/security-tools/mobile-apps/1.1.1.1), or compare providers- it is simple to enable in-browser.
|
||||||
Note that DoH comes with its own issues, mostly preventing web filtering.
|
Note that DoH comes with its own issues, mostly preventing web filtering.
|
||||||
|
|
||||||
- point: Multi-Session Containers
|
- point: Multi-[Session](https://awesome-privacy.xyz/communication/encrypted-messaging/session) Containers
|
||||||
priority: Essential
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Compartmentalisation is really important to keep different aspects of your browsing separate. For
|
Compartmentalisation is really important to keep different aspects of your browsing separate. For
|
||||||
example, using different profiles for work, general browsing, social media, online shopping etc
|
example, using different profiles for work, general browsing, social media, online shopping etc
|
||||||
will reduce the number associations that data brokers can link back to you. One option is to make
|
will reduce the number associations that data brokers can link back to you. One option is to make
|
||||||
use of Firefox Containers which is designed exactly for this purpose. Alternatively, you could
|
use of [Firefox Containers](https://awesome-privacy.xyz/security-tools/browser-extensions/firefox-multi-account-containers)
|
||||||
use different browsers for different tasks (Brave, Firefox, Tor etc).
|
which is designed exactly for this purpose.
|
||||||
|
Alternatively, you could
|
||||||
|
use different browsers for different tasks
|
||||||
|
([Brave](https://awesome-privacy.xyz/essentials/browsers/brave-browser),
|
||||||
|
[Firefox](https://awesome-privacy.xyz/essentials/browsers/firefox),
|
||||||
|
[Tor](https://awesome-privacy.xyz/networking/mix-networks/tor) etc).
|
||||||
|
|
||||||
- point: Use Incognito
|
- point: Use Incognito
|
||||||
priority: Essential
|
priority: Essential
|
||||||
@ -361,7 +371,9 @@
|
|||||||
priority: Essential
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Blocking trackers will help to stop websites, advertisers, analytics and more from tracking you in
|
Blocking trackers will help to stop websites, advertisers, analytics and more from tracking you in
|
||||||
the background. Privacy Badger, DuckDuckGo Privacy Essentials, uBlock Origin and uMatrix (advanced)
|
the background. [Privacy Badger](https://awesome-privacy.xyz/security-tools/browser-extensions/privacy-badger),
|
||||||
|
[DuckDuckGo Privacy Essentials](https://awesome-privacy.xyz/security-tools/browser-extensions/privacy-essentials),
|
||||||
|
[uBlock Origin](https://awesome-privacy.xyz/networking/ad-blockers/ublock-origin) and uMatrix (advanced)
|
||||||
are all very effective, open source tracker-blockers available for all major browsers.
|
are all very effective, open source tracker-blockers available for all major browsers.
|
||||||
|
|
||||||
- point: Beware of Redirects
|
- point: Beware of Redirects
|
||||||
@ -439,7 +451,8 @@
|
|||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
The CSS Exfiltrate attack is a method where credentials and other sensitive details can be snagged with
|
The CSS Exfiltrate attack is a method where credentials and other sensitive details can be snagged with
|
||||||
just pure CSS. You can stay protected, with the CSS Exfil Protection plugin.
|
just pure CSS. You can stay protected,
|
||||||
|
with the [CSS Exfil Protection](https://awesome-privacy.xyz/security-tools/browser-extensions/css-exfil-protection) plugin.
|
||||||
|
|
||||||
- point: Deactivate ActiveX
|
- point: Deactivate ActiveX
|
||||||
priority: Optional
|
priority: Optional
|
||||||
@ -458,7 +471,8 @@
|
|||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Canvas Fingerprinting allows websites to identify and track users very accurately. You can use the
|
Canvas Fingerprinting allows websites to identify and track users very accurately. You can use the
|
||||||
Canvas-Fingerprint-Blocker extension to spoof your fingerprint or use Tor.
|
Canvas-Fingerprint-Blocker extension to spoof your fingerprint or
|
||||||
|
use [Tor](https://awesome-privacy.xyz/networking/mix-networks/tor).
|
||||||
|
|
||||||
- point: Spoof User Agent
|
- point: Spoof User Agent
|
||||||
priority: Optional
|
priority: Optional
|
||||||
@ -488,14 +502,16 @@
|
|||||||
- point: Enable 1st-Party Isolation
|
- point: Enable 1st-Party Isolation
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
First party isolation means that all identifier sources and browser state are scoped using the URL bar
|
[First Party Isolation](https://awesome-privacy.xyz/security-tools/browser-extensions/first-party-isolation) means
|
||||||
|
that all identifier sources and browser state are scoped using the URL bar
|
||||||
domain, this can greatly reduce tracking.
|
domain, this can greatly reduce tracking.
|
||||||
|
|
||||||
- point: Strip Tracking Params from URLs
|
- point: Strip Tracking Params from URLs
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
Websites often append additional GET parameters to URLs that you click, to identify information like
|
Websites often append additional GET parameters to URLs that you click, to identify information like
|
||||||
source/referrer. You can sanitize manually, or use an extension like ClearUrls to strip tracking data
|
source/referrer. You can sanitize manually,
|
||||||
|
or use an extension like [ClearURLs](https://awesome-privacy.xyz/security-tools/browser-extensions/clearurls) to strip tracking data
|
||||||
from URLs automatically.
|
from URLs automatically.
|
||||||
|
|
||||||
- point: First Launch Security
|
- point: First Launch Security
|
||||||
@ -508,7 +524,7 @@
|
|||||||
- point: Use The Tor Browser
|
- point: Use The Tor Browser
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
The Tor Project provides a browser that encrypts and routes your traffic through multiple nodes, keeping
|
The [Tor](https://awesome-privacy.xyz/networking/mix-networks/tor) Project provides a browser that encrypts and routes your traffic through multiple nodes, keeping
|
||||||
users safe from interception and tracking. The main drawbacks are speed and user experience.
|
users safe from interception and tracking. The main drawbacks are speed and user experience.
|
||||||
|
|
||||||
- point: Disable JavaScript
|
- point: Disable JavaScript
|
||||||
@ -605,7 +621,9 @@
|
|||||||
- point: Consider Switching to a Secure Mail Provider
|
- point: Consider Switching to a Secure Mail Provider
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Secure and reputable email providers such as Forward Email, ProtonMail, and Tutanota allow for end-to-end
|
Secure and reputable email providers such as [Forward Email](https://awesome-privacy.xyz/communication/encrypted-email/forward-email),
|
||||||
|
[ProtonMail](https://awesome-privacy.xyz/communication/mail-forwarding/protonmail),
|
||||||
|
and [Tutanota](https://awesome-privacy.xyz/communication/encrypted-email/tuta) allow for end-to-end
|
||||||
encryption, full privacy as well as more security-focused features. Unlike typical email providers, your
|
encryption, full privacy as well as more security-focused features. Unlike typical email providers, your
|
||||||
mailbox cannot be read by anyone but you, since all messages are encrypted.
|
mailbox cannot be read by anyone but you, since all messages are encrypted.
|
||||||
|
|
||||||
@ -1100,10 +1118,10 @@
|
|||||||
It's common to want to pump your router's range to the max, but if you reside in a smaller flat, your
|
It's common to want to pump your router's range to the max, but if you reside in a smaller flat, your
|
||||||
attack surface is increased when your WiFi network can be picked up across the street.
|
attack surface is increased when your WiFi network can be picked up across the street.
|
||||||
|
|
||||||
- point: Route all traffic through Tor
|
- point: Route all traffic through [Tor](https://awesome-privacy.xyz/networking/mix-networks/tor)
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
VPNs have their weaknesses. For increased security, route all your internet traffic through the Tor
|
VPNs have their weaknesses. For increased security, route all your internet traffic through the [Tor](https://awesome-privacy.xyz/networking/mix-networks/tor)
|
||||||
network.
|
network.
|
||||||
|
|
||||||
- point: Disable WiFi on all Devices
|
- point: Disable WiFi on all Devices
|
||||||
@ -1191,7 +1209,7 @@
|
|||||||
- point: App Permissions
|
- point: App Permissions
|
||||||
priority: Essential
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Don’t grant apps permissions that they don’t need. For Android, Bouncer is an app that allows you to grant
|
Don’t grant apps permissions that they don’t need. For Android, [Bouncer](https://awesome-privacy.xyz/security-tools/mobile-apps/bouncer) is an app that allows you to grant
|
||||||
temporary/ 1-off permissions.
|
temporary/ 1-off permissions.
|
||||||
|
|
||||||
- point: Only install Apps from official source
|
- point: Only install Apps from official source
|
||||||
@ -1237,7 +1255,8 @@
|
|||||||
- point: Monitor Trackers
|
- point: Monitor Trackers
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
εxodus is a great service which lets you search for any app and see which trackers are embedded in it.
|
[εxodus](https://awesome-privacy.xyz/security-tools/online-tools/εxodus) is a great service which
|
||||||
|
lets you search for any app and see which trackers are embedded in it.
|
||||||
|
|
||||||
- point: Use a Mobile Firewall
|
- point: Use a Mobile Firewall
|
||||||
priority: Optional
|
priority: Optional
|
||||||
@ -1252,12 +1271,13 @@
|
|||||||
- point: Sandbox Mobile Apps
|
- point: Sandbox Mobile Apps
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Prevent permission-hungry apps from accessing your private data with Island, a sandbox environment.
|
Prevent permission-hungry apps from accessing your private data with [Island](https://awesome-privacy.xyz/security-tools/mobile-apps/island), a sandbox environment.
|
||||||
|
|
||||||
- point: Tor Traffic
|
- point: Tor Traffic
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
Orbot provides a system-wide Tor connection, which will help protect you from surveillance and public WiFi threats.
|
[Orbot](https://awesome-privacy.xyz/security-tools/mobile-apps/orbot) provides
|
||||||
|
a system-wide Tor connection, which will help protect you from surveillance and public WiFi threats.
|
||||||
|
|
||||||
- point: Avoid Custom Virtual Keyboards
|
- point: Avoid Custom Virtual Keyboards
|
||||||
priority: Optional
|
priority: Optional
|
||||||
@ -1275,30 +1295,32 @@
|
|||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
SMS should not be used to receive 2FA codes or for communication, instead use an encrypted messaging app,
|
SMS should not be used to receive 2FA codes or for communication, instead use an encrypted messaging app,
|
||||||
such as Signal.
|
such as [Signal](https://awesome-privacy.xyz/communication/encrypted-messaging/signal).
|
||||||
|
|
||||||
- point: Keep your Number Private
|
- point: Keep your Number Private
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
MySudo allows you to create and use virtual phone numbers for different people or groups. This is great for
|
[MySudo](https://awesome-privacy.xyz/finance/virtual-credit-cards/mysudo) allows
|
||||||
|
you to create and use virtual phone numbers for different people or groups. This is great for
|
||||||
compartmentalisation.
|
compartmentalisation.
|
||||||
|
|
||||||
- point: Watch out for Stalkerware
|
- point: Watch out for Stalkerware
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Stalkerware is malware that is installed directly onto your device by someone you know. The best way to get
|
Stalkerware is malware that is installed directly onto your device by someone you know.
|
||||||
rid of it is through a factory reset.
|
The best way to get rid of it is through a factory reset.
|
||||||
|
|
||||||
- point: Favor the Browser, over Dedicated App
|
- point: Favor the Browser, over Dedicated App
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Where possible, consider using a secure browser to access sites, rather than installing dedicated applications.
|
Where possible, consider using a secure browser to access sites,
|
||||||
|
rather than installing dedicated applications.
|
||||||
|
|
||||||
- point: Consider running a custom ROM (Android)
|
- point: Consider running a custom ROM (Android)
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
If you're concerned about your device manufacturer collecting too much personal information, consider a
|
If you're concerned about your device manufacturer collecting too much
|
||||||
privacy-focused custom ROM.
|
personal information, consider a privacy-focused custom ROM.
|
||||||
color: fuchsia
|
color: fuchsia
|
||||||
softwareLinks:
|
softwareLinks:
|
||||||
- title: Mobile Apps, for Security + Privacy
|
- title: Mobile Apps, for Security + Privacy
|
||||||
@ -1334,7 +1356,8 @@
|
|||||||
priority: Essential
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Maintaining encrypted backups prevents loss due to ransomware, theft, or damage. Consider using
|
Maintaining encrypted backups prevents loss due to ransomware, theft, or damage. Consider using
|
||||||
Cryptomator for cloud files or VeraCrypt for USB drives.
|
[Cryptomator](https://awesome-privacy.xyz/security-tools/mobile-apps/cryptomator)
|
||||||
|
for cloud files or [VeraCrypt](https://awesome-privacy.xyz/essentials/file-encryption/veracrypt) for USB drives.
|
||||||
|
|
||||||
- point: Be Careful Plugging USB Devices into your Computer
|
- point: Be Careful Plugging USB Devices into your Computer
|
||||||
priority: Essential
|
priority: Essential
|
||||||
@ -1460,7 +1483,7 @@
|
|||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
Regularly check for rootkits to detect and mitigate full system control threats using tools like
|
Regularly check for rootkits to detect and mitigate full system control threats using tools like
|
||||||
chkrootkit.
|
[chkrootkit](https://awesome-privacy.xyz/operating-systems/linux-defenses/chkrootkit).
|
||||||
|
|
||||||
- point: BIOS Boot Password
|
- point: BIOS Boot Password
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
@ -1471,7 +1494,9 @@
|
|||||||
- point: Use a Security-Focused Operating System
|
- point: Use a Security-Focused Operating System
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
Consider switching to Linux or a security-focused distro like QubeOS or Tails for enhanced privacy and
|
Consider switching to Linux or a security-focused distro like QubeOS or
|
||||||
|
[Tails](https://awesome-privacy.xyz/operating-systems/desktop-operating-systems/tails)
|
||||||
|
for enhanced privacy and
|
||||||
security.
|
security.
|
||||||
|
|
||||||
- point: Make Use of VMs
|
- point: Make Use of VMs
|
||||||
@ -1614,7 +1639,9 @@
|
|||||||
- point: Mitigate Alexa/ Google Home Risks
|
- point: Mitigate Alexa/ Google Home Risks
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Consider privacy-focused alternatives like Mycroft or use Project Alias to prevent idle listening by voice-activated assistants.
|
Consider privacy-focused alternatives like
|
||||||
|
[Mycroft](https://awesome-privacy.xyz/smart-home-and-iot/voice-assistants/mycroft) or use
|
||||||
|
Project Alias to prevent idle listening by voice-activated assistants.
|
||||||
|
|
||||||
- point: Monitor your home network closely
|
- point: Monitor your home network closely
|
||||||
priority: Optional
|
priority: Optional
|
||||||
@ -1669,27 +1696,35 @@
|
|||||||
- point: Use Virtual Cards
|
- point: Use Virtual Cards
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Utilize virtual card numbers for online transactions to protect your real banking details. Services like Privacy.com and MySudo offer such features.
|
Utilize virtual card numbers for online transactions to protect your real banking details. Services like [Privacy.com](https://awesome-privacy.xyz/finance/virtual-credit-cards/privacy.com) and [MySudo](https://awesome-privacy.xyz/finance/virtual-credit-cards/mysudo) offer such features.
|
||||||
|
|
||||||
- point: Use Cash for Local Transactions
|
- point: Use Cash for Local Transactions
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Pay with cash for local and everyday purchases to avoid financial profiling by institutions.
|
Pay with [Cash](https://awesome-privacy.xyz/finance/other-payment-methods/cash) for local and everyday purchases to avoid financial profiling by institutions.
|
||||||
|
|
||||||
- point: Use Cryptocurrency for Online Transactions
|
- point: Use Cryptocurrency for Online Transactions
|
||||||
priority: Optional
|
priority: Optional
|
||||||
details: >-
|
details: >-
|
||||||
Opt for privacy-focused cryptocurrencies like Monero for online transactions to maintain anonymity. Use cryptocurrencies wisely to ensure privacy.
|
Opt for privacy-focused cryptocurrencies like
|
||||||
|
[Monero](https://awesome-privacy.xyz/finance/cryptocurrencies/monero) for
|
||||||
|
online transactions to maintain anonymity. Use cryptocurrencies wisely to ensure privacy.
|
||||||
|
|
||||||
- point: Store Crypto Securely
|
- point: Store Crypto Securely
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
Securely store cryptocurrencies using offline wallet generation, hardware wallets like Trezor or ColdCard, or consider long-term storage solutions like CryptoSteel.
|
Securely store cryptocurrencies using offline wallet generation, hardware wallets
|
||||||
|
like [Trezor](https://awesome-privacy.xyz/finance/crypto-wallets/trezor) or
|
||||||
|
[ColdCard](https://awesome-privacy.xyz/finance/crypto-wallets/coldcard), or
|
||||||
|
consider long-term storage solutions like
|
||||||
|
[CryptoSteel](https://awesome-privacy.xyz/finance/crypto-wallets/cryptosteel).
|
||||||
|
|
||||||
- point: Buy Crypto Anonymously
|
- point: Buy Crypto Anonymously
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
details: >-
|
details: >-
|
||||||
Purchase cryptocurrencies without linking to your identity through services like LocalBitcoins, Bisq, or Bitcoin ATMs.
|
Purchase cryptocurrencies without linking to your identity through services
|
||||||
|
like [LocalBitcoins](https://awesome-privacy.xyz/finance/crypto-exchanges/localbitcoins),
|
||||||
|
[Bisq](https://awesome-privacy.xyz/finance/crypto-exchanges/bisq), or Bitcoin ATMs.
|
||||||
|
|
||||||
- point: Tumble/ Mix Coins
|
- point: Tumble/ Mix Coins
|
||||||
priority: Advanced
|
priority: Advanced
|
||||||
@ -1768,7 +1803,8 @@
|
|||||||
- point: Install Reputable Software from Trusted Sources
|
- point: Install Reputable Software from Trusted Sources
|
||||||
priority: Essential
|
priority: Essential
|
||||||
details: >-
|
details: >-
|
||||||
Only download software from legitimate sources and check files with tools like Virus Total before installation.
|
Only download software from legitimate sources and check files with tools
|
||||||
|
like [Virus Total](https://awesome-privacy.xyz/security-tools/online-tools/virus-total) before installation.
|
||||||
|
|
||||||
- point: Store personal data securely
|
- point: Store personal data securely
|
||||||
priority: Essential
|
priority: Essential
|
||||||
@ -1865,19 +1901,26 @@
|
|||||||
checklist:
|
checklist:
|
||||||
- point: Destroy Sensitive Documents
|
- point: Destroy Sensitive Documents
|
||||||
priority: Essential
|
priority: Essential
|
||||||
details: Shred or redact sensitive documents before disposal to protect against identity theft and maintain confidentiality.
|
details: |
|
||||||
|
Shred or redact sensitive documents before disposal to protect against
|
||||||
|
identity theft and maintain confidentiality.
|
||||||
|
|
||||||
- point: Opt-Out of Public Records
|
- point: Opt-Out of Public Records
|
||||||
priority: Essential
|
priority: Essential
|
||||||
details: Contact people search websites to opt-out from listings that show personal information, using guides like Michael Bazzell's Personal Data Removal Workbook.
|
details: |
|
||||||
|
Contact people search websites to opt-out from listings that show persona
|
||||||
|
information, using guides like Michael Bazzell's Personal Data Removal Workbook.
|
||||||
|
|
||||||
- point: Watermark Documents
|
- point: Watermark Documents
|
||||||
priority: Essential
|
priority: Essential
|
||||||
details: Add a watermark with the recipient's name and date to digital copies of personal documents to trace the source of a breach.
|
details: |
|
||||||
|
Add a watermark with the recipient's name and date to digital copies of
|
||||||
|
personal documents to trace the source of a breach.
|
||||||
|
|
||||||
- point: Don't Reveal Info on Inbound Calls
|
- point: Don't Reveal Info on Inbound Calls
|
||||||
priority: Essential
|
priority: Essential
|
||||||
details: Only share personal data on calls you initiate and verify the recipient's phone number.
|
details: |
|
||||||
|
Only share personal data on calls you initiate and verify the recipient's phone number.
|
||||||
|
|
||||||
- point: Stay Alert
|
- point: Stay Alert
|
||||||
priority: Essential
|
priority: Essential
|
||||||
|
Loading…
Reference in New Issue
Block a user