-
Try to choose Apple devices as much as possible. For operating systems, use MacOS or Linux, Ubuntu systems whenever possible; for Windows systems, try to use the original system or MSDN system; avoid installing antivirus software similar to 360 on computers (consider installing Huorong or Avast antivirus software); for mobile phones, use iOS whenever possible. If using an Android phone, try to use a phone with a native Android system for higher security.
-
For browsers, it is recommended to use Brave or Firefox, Librewolf browser; for plugins, it is advisable to install Privacy Badger, No-Script, Cookie AutoDelete, uBlock Origin, Decentraleyes, etc. (refer to here).
-
For two-step verification, if security is a priority, it is recommended to use Aegis; if ease of use is a priority, it is recommended to use Authy.
-
For password managers, it is recommended to use Bitwarden or Keepass (or KeepassXC), and try to remember the master password of the password manager in your mind; for internet accounts, provide different strengths of random passwords based on different privacy requirements.
-
Use reliable software or software from trusted sources. For example, software from official websites, open-source software from GitHub repositories, or Android software from platforms like Uptodown or F-Droid.
-
If security is a priority, consider using Protonmail or Tutanota, Mailfence (which has blocked CN IP); you can use the email developed by Duckduckgo, @duck email, or addy or forwardemail as a relay email, and you can also use temporary email; try to avoid using Microsoft's email.
-
For file synchronization, consider using Syncthing or Localsend; for file encryption, you can use VeraCrypt; for text services, you can use Pastebin service, Nopaste service, Yopass; for note-taking software, it is recommended to use Standard Notes (online), or Logseq, Obsidian (preferably local).
-
For input methods, it is recommended to use the open-source Rime input method (Win version RIME, MacOS version RIME, Android version, download details).
References:
- Privacytools: https://www.privacytools.io/)
- Awesome Privacy: https://github.com/KevinColemanInc/awesome-privacy
- Personal Security Checklist: https://digital-defense.io/)
- Digital Privacy: https://github.com/ffffffff0x/Digital-Privacy
- Privacy Explosion: https://evilcos.me/yinsi.html
- Incomplete Guide to Personal Data Security: https://thiscute.world/posts/an-incomplete-guide-to-data-security/
The original text was published on the Gengdu TG channel.