iGdux

耕读无限

Learner and Observer, be happy to share useful and nice things.
youtube
follow
tg_channel
github
email

How to protect your digital privacy as much as possible?

  1. Try to choose Apple devices as much as possible. For operating systems, use MacOS or Linux, Ubuntu systems whenever possible; for Windows systems, try to use the original system or MSDN system; avoid installing antivirus software similar to 360 on computers (consider installing Huorong or Avast antivirus software); for mobile phones, use iOS whenever possible. If using an Android phone, try to use a phone with a native Android system for higher security.

  2. For browsers, it is recommended to use Brave or Firefox, Librewolf browser; for plugins, it is advisable to install Privacy Badger, No-Script, Cookie AutoDelete, uBlock Origin, Decentraleyes, etc. (refer to here).

  3. For two-step verification, if security is a priority, it is recommended to use Aegis; if ease of use is a priority, it is recommended to use Authy.

  4. For password managers, it is recommended to use Bitwarden or Keepass (or KeepassXC), and try to remember the master password of the password manager in your mind; for internet accounts, provide different strengths of random passwords based on different privacy requirements.

  5. Use reliable software or software from trusted sources. For example, software from official websites, open-source software from GitHub repositories, or Android software from platforms like Uptodown or F-Droid.

  6. If security is a priority, consider using Protonmail or Tutanota, Mailfence (which has blocked CN IP); you can use the email developed by Duckduckgo, @duck email, or addy or forwardemail as a relay email, and you can also use temporary email; try to avoid using Microsoft's email.

  7. For file synchronization, consider using Syncthing or Localsend; for file encryption, you can use VeraCrypt; for text services, you can use Pastebin service, Nopaste service, Yopass; for note-taking software, it is recommended to use Standard Notes (online), or Logseq, Obsidian (preferably local).

  8. For input methods, it is recommended to use the open-source Rime input method (Win version RIME, MacOS version RIME, Android version, download details).

References:

  1. Privacytools: https://www.privacytools.io/)
  2. Awesome Privacy: https://github.com/KevinColemanInc/awesome-privacy
  3. Personal Security Checklist: https://digital-defense.io/)
  4. Digital Privacy: https://github.com/ffffffff0x/Digital-Privacy
  5. Privacy Explosion: https://evilcos.me/yinsi.html
  6. Incomplete Guide to Personal Data Security: https://thiscute.world/posts/an-incomplete-guide-to-data-security/

The original text was published on the Gengdu TG channel.

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.