mirror of
https://github.com/Lissy93/personal-security-checklist.git
synced 2024-12-24 06:49:35 -05:00
Adds VPN
This commit is contained in:
parent
1451f03080
commit
bbdd05a58c
@ -10,6 +10,7 @@ You can greatly increase your digital security, by switching to privacy-respecti
|
||||
Using open-source applications with a strong emphasis on security, will help stop
|
||||
large corporations profiting from your data, through logging, storing and selling your personal details.
|
||||
|
||||
|
||||
## Password Managers
|
||||
|
||||
| Provider |Description |
|
||||
@ -20,7 +21,7 @@ large corporations profiting from your data, through logging, storing and sellin
|
||||
**[LessPass](https://lesspass.com)** | LessPass is a little different, since it generates your passwords using a hash of the website name, your username and a single master-passphrase that you reuse. It ommits the need for you to ever need to store or sync your passwords. They have apps for all the common platforms and a CLI, but you can also self-host it.
|
||||
|
||||
|
||||
## 2-Factor Authentication Apps
|
||||
## 2-Factor Authentication
|
||||
|
||||
| Provider |Description |
|
||||
| --- | --- |
|
||||
@ -39,6 +40,24 @@ large corporations profiting from your data, through logging, storing and sellin
|
||||
|
||||
If you need to create a compressed archive, prior to encrypting your files, then [PeaZip](https://www.peazip.org/) is a great little cross-platform open source file archiver utility. It allows you to create, open, and extract RAR TAR ZIP archives.
|
||||
|
||||
|
||||
## Virtual Private Networks
|
||||
|
||||
VPNs are good for getting round censorship, increasing protection on public WiFi, obscuring your IP address, and reducing what data your ISP can log. But for the most anonymity, you should use [Tor](https://www.torproject.org/).
|
||||
|
||||
Before jumping in and signing up for a VPN, there's a couple of things to note:
|
||||
- A VPN does not make you anonymous- it merely chnages your IP accress to that of your VPN provider, instead of ISP. Your browsing session can still be linked back to your real identity either through your system details (such as user agent, screen resolution even typing patterns), cookies/ session storage, or by the identifiable data that you enter. [Read more about fingerprinting](https://pixelprivacy.com/resources/browser-fingerprinting/).
|
||||
- VPNs and logging- If you choose to use a VPN because you do not agree with your ISP logging your full browsing history, then it is important to keep in mind that your VPN provider will have access to these logs. Many VPNs claim not to keep logs, but you cannot be certain of this. See [this article](https://gist.github.com/joepie91/5a9909939e6ce7d09e29) for more
|
||||
|
||||
You could host your own VPN, which would allow you to have full visibility and control over logs. See [Streisand](https://github.com/StreisandEffect/streisand)
|
||||
|
||||
| Provider |Description |
|
||||
| --- | --- |
|
||||
**[Mullvad](http://mullvad.net/en/)** | Mullvad is one of the best for privacy, they own all their own servers and have a totally anonymous sign up process, you don't need to provide any details at all, you can choose to pay annonymously too (with Monero, BTC or cash)
|
||||
**[ProtonVPN](https://protonvpn.com/)** | From the creators of ProtonMail, ProtonVPN has a solid reputation. They have a full suit of user-friendly native mobile and desktop apps. ProtonVPN is one of the few "trustworthy" providers that also offer a free plan
|
||||
|
||||
For a full-comparison, see: [thatoneprivacysite.net](https://thatoneprivacysite.net/).
|
||||
|
||||
---
|
||||
|
||||
**Note**: In order to stay protected, it is important to also: Use strong and unique passwords, 2-factor authentication,
|
||||
|
Loading…
Reference in New Issue
Block a user