# responsible behaviors on line
a) Do not install big tech socials app on your smartphone.
No Facebook , Twitter, Youtube, Goocle App in general, Reddit , Yahoo etc..
Remedy? Web access with dedicated page/link, you can put icon on your smartphone.Limited functions, in many cases, slower, but less tracking and spying.
There are apps for watching youtube, looking to twitter,instagram without access,staying anonymous.
b) Do not grant / give personal phone number, but secondary card
c) Use P.I.M. apps where data stays only on your phone,app open source not shared with big tech apps. Phonebook/Calendar/SMS/Tasks (PIM) access is the flagship of relationships, tracking.
d)In any defense system, "compartmentalize" i.e.: on facebook I'm mario rossi, on twitter I'm scarabeo, on reddit I'm mastro Geppetto, on google I'm marco verdi, etc. no one in the individual socials knows who I am in the others. The privacy advocate has several fictitious identities and consistent information of a constructed identity so that the social is unrelated and confusing.
This is for my personal protection. I know, very few have done this, protection of identity, but the one who steals the identity is the social itself, resells it to the best buyer,might be the information services, commercial companies and so on. A technique in a well-known video "I am Spartacus, everyone is Spartacus"(obfuscation - youtube video) - A.I. is confused.
Do not cross link-data of socials accounts unless essential - keep each environment separate so that there are no online "stalkers", OSINT, spies following the profile for other purposes. Another trivial consideration, each account that has user name + password - DIFFERENT.
**All these mistakes I have made**. They are in human psychology stating one's identity, the verification of it, the "complacency" of recognizing and relating to others. We are not the criminals, they are the ones who capture the good faith of the users!
e) In internet navigation use a secure browser (see list, Brave,Old v of Firefox, tor browser, Duck etc.) in many cases they give the possibility to create "profiles", so create several profiles - public, duck, pluto, you namme it, etc for different functions. For example, in Brave I created a "social" profile where there can be all the features (bookmarks,pwd,access) useful for fast scrolling. When I go to do my personal research or access to messaging or reports, I use another Brave-Profile and so on; in this profile the traces, many functions of the browser are disabled others are enabled for security. Do not store sensible passwords in the browser (i.e. bank,payment services, mail,etc.)
f) We do not allow others to see what we do online and keep a record of all our access and reports. Here are several solutions, many of which are absolutely necessary when using public wi-fi !!! Many solutions.
The first and simple one is DNS-Crypt* , where all addresses called from my laptop or smartphone are encrypted, only me and the recipient know- it picks up several functions besides this one.
The second is a VPN (e.g. proton-VPN or others, beware).
The third is to use a firewall like Netguard (open source, you need to set it up).
The fourth is to use an app to access TOR network, you can still use DNS-Crypt by checking the appropriate box. TOR system adds anonymization, it's normal that many accesses will be blocked and/or slowed down, it's up to you.Honestly I don't use it frequently.
Beware of the private mode in the browser because it means something else!
When the browser says that you are in private or incognito mode, it means that it does not record addresses on YOUR device, nothing, but NOT outside,you are visible and can access services.
g) Password management. Use a password generator, change passwords frequently.
i) Security notifications. There are apps, services, sometimes the same service provider that warns of a "breach" or hacking of the site, data loss and if belonging to that service, immediately follow the recommended procedure, usually change passwords, download data, delete accounts, depends on the breach. These news of hacked security are very important, I had direct and personal experience of it. You don't have to be a hacker to know about them, if you know that they have duplicated your home key, you don't have to be a locksmith or a thief to know what follows. A special paragraph will refer to websites, apps, services that help you to make periodic checks.
Sometimes they discover hundreds of thousands of transparent (unsecured) GB data, with related emails, if you manage in 24-48-72 hours to change the password to the service, it is likely that the hacker did not have enough time to penetrate the system and your personal account, unless you are a famous person.
h) use secure instant messaging apps rather than e-mails.
i) use e-mails secure, alias, re-mails, some services guarantee anonymity.
k) do not use cloud - in general - no commercial service, unless encrypted.
l) any illegal activity on-line can be tracked,before or later. Do not try to be smarter than them, you only want to have your personal data protected from hackers, goverment,stalkers,socials engineer,predators etc.
They have "special ways" to turn around security features, if they "target you" better burn all digital items, but you are only one of 8 billion people so if you are not "special", average citizen, why would THEY spend time, money to know your calendar, your call log, your e-mails, your history of geolocation?
What you can do is to protect from easy, massive survellaince, tracking.
m) **the security and privacy process is always updating**.Every day it can happen that the famous secure app is sold to a big tech and its reliability totally compromised. One example? Skype, but there are others. Firefox can be the next compromised.
It happened not so long ago that a well-known, commercial, free German antivirus while performing its job of "scanning" or searching for viruses disclosed and resold to third parties certain personal data, without anyone being aware of it.
Every day you can update some passwords, check your date integrity, mobile phones, scanning virus, tracking etc. It could save time, money later !!
n) **our online behavior can determine the failure of many big tech operations**, because we are **the consumers-users-customers** !
So if we oppose the new regulations of Whatsapp, we change the messaging app, it is happening that millions of users change the most known messaging system, this is the revolution. Never mind that I did it over two years ago and for quite some time everyone called me a deviant, a crazy person. I was certainly not the only one. Why did I do it? Precisely because I wanted private messages and I did not trust facebook, I am not a computer scientist, hacker etc. but I read about the numerous security breaches, reports.
We cannot belong to facebook groups, we can stop sharing facebook links and in a few months or years, there will be few left in facebook, it will fail.
The same thing Amazon ; I remember it has destroyed bookstores, small stores and threatens big stores. There is a deplorable behavior that Amazon has pursued, linking directly to the manufacturer and bypassing the small retailer, business practices that in physical stores would have led to complaints, get informed. Fair competition is void with different taxation and logistics because of the huge investments impossible for the individuals or small stores. If we do not agree with the policy of Amazon, **we do not sponsor links**, and we do not buy products,** we starve the beast**. I'm a nobody, but many of us will make a difference.
Translated with www.DeepL.com/Translator (free version) + me.
18th January 2021 updated 25th January 2021
Home: https://hackmd.io/@rice63/B1IbRQQ1_