• Kissimmee, FL
  • Life, the Universe, and Everything
393
23
24
Jason McIntyre

Posting the everyday, usual, mundane stuff.

@jason.bsky.jasonmc.com

Jason's Blog

InternetTechnology

Staying anonymous on the Internet

Due to changes in legislation, your online activity may soon be collected and sold without your permission, but there are methods to protect your information, though none can guarantee complete...

Jason McIntyre
Saturday, April 22, 2017, 9:48am
2 Mins Read
421 Views
0 Comments

Part One

So, thanks to our wonderful, outstanding, useful, totally not-bought-and-paid-for United States Congress® combined with our Reality-TV-star president, there is a very good possibility that your online activity soon can and will be collected and sold without your express permission.

Up until now, Internet Service Providers, who can track all of your online activity, had to get your express permission to collect and sell such information. (Of course, how many people read the entire Terms and Conditions before clicking “OK.” But it was at least nice of them to ask. So it’s likely that we’ve already voluntarily signed a lot of rights away in exchange for a service.)

But there are ways to obfuscate quite a bit of your online activity. In this video, former hacker and current author Kevin Mitnick explains some things you can do to protect yourself.

Now, some of these suggestions only help protect your information and not necessarily your browsing habits. If you visit bankofamerica.com, even with secure sockets layer enabled, your ISP will still know you’ve visited the site. They just can’t see what you’ve done there. Using TOR, as also suggested in the video, would help prevent that type of monitoring.

None of these suggestions is a guarantee of safety or anonymity. They just help.

Part Two

On top of TOR, or maybe even more important than TOR, I would recommend signing up for a subscription VPN service. There are several good reasons for signing up with a VPN service, and most of these reasons are covered in this nice YouTube video:

There are several good VPN providers out there; I won’t specifically recommend one here, but there are several reviews available online. If you’re looking for a good VPN provider though, keep in mind that each one has different policies regarding the safety and privacy of your data and personal information. And different providers have different methods for configuring your Internet access as well. A lot depends on the type of equipment you use when you access the Internet. Some providers give you installation programs to install on computers to protect them individually. That means that each individual device you want to connect to the VPN must be configured separately. Some providers will give you configuration files (for OpenVPN, for example)  that you can import into all of your devices to connect them. And some routers support using configuration files to protect all of the devices on your network at once. (Usually, at the cost of speed.)

Of course, if you don’t mind that Comcast knows you’re shopping for size 37 purple underwear on amazon.com, you don’t have to do anything at all.

Tags:

hackingInternetprivacysecurity

Share Article

Follow Me Written By

Jason McIntyre

Jason is an IT specialist and systems engineer who stares frequently at screens of various sizes, often with a puzzled expression on his face. He presses buttons with letters and numbers on them until tiny dots illuminate on a flat screen in front of him and appear in a manner and order that he (or someone who is paying him) finds pleasing.

Other Articles

Previous

QuickPost: Jack Fleming

Next

College Hunt, Final Edition: Our SCAD Bee

Next
Thursday, September 21, 2017, 9:49pm

College Hunt, Final Edition: Our SCAD Bee

Previous
Tuesday, January 17, 2017, 8:25pm

QuickPost: Jack Fleming

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recent Posts

"A scientist wearing a lab coat examines a test tube filled with a liquid substance. The perspective is from the scientist's point of view, looking down at their gloved hands holding the test tube against the backdrop of a well-equipped laboratory. Various pieces of scientific equipment, including beakers, microscopes, and chemical bottles, are visible on the lab bench in the background."
The things that don’t happen
4 weeks ago
A laptop sitting on a light brown wooden table that is minimally decorated. On the laptop screen that is visible is a generic looking social media site with various posts and pictures. There is a person holding a cup of coffee that is looking at the screen.
In support of alternative social media projects
5 months ago
Journey of Water, Inspired by Moana
2 years ago

Stay Connected

LinkedIn
393
Youtube
23

Featured Items

Twice? Twice?!
293 Views
Eating at Mako Mike’s
414 Views
Just Beachy…
555 Views
Ripe for the picking
405 Views

Recent

The things that don’t happen

In support of alternative social media projects

Categories

Computing 56
Family 42
Humor 34
Holidays 33

Copyright ©️2025 jasonmc.com