The new Data Privacy Act (GDPR), in force from next May 2018, defines a common framework for protecting personal data. But what can we do ourselves to protect online browsing? In this post, I have listed all possible solutions to browse the web safely and anonymously.
It is essential to make a distinction about how personal data is managed by browsing the Web. Suppose I decide to subscribe to social networks and public-private information. In that case, the privacy management of my data is in the hands of service providers operating under the contract I have read and signed.
Data management while browsing online
When browsing the internet or during searches carried out through classic search engines, data management is different from that of Social channels. If we want:
- do not make our activity on the Net public;
- do not disclose our data;
You can use connections through Secure Networks (VPNs) and the TOR browser: then the details.
The measures introduced on the protection of personal data.
It is interesting to recall that the United States House of Representatives voted for a provision that diminishes the safeguards in force to protect online users’ data. American Internet Providers (i.e., those providing the connection) will be allowed to sell their web browsing history and other personal information to third parties.
In the “Code on the protection of personal data” (D.L. 30 June 2003, n. 196, art. 132), it is mentioned that to ascertain and suppress crimes (…) data relating to telematic traffic, excluding the contents of communications, are kept by the supplier for twelve months”.
That the Internet provider can draw a picture of its users’ online activities is therefore peaceful. What is prohibited is to use such data for commercial purposes or even resell it to third parties and check the contents of communications.
You can also read: How to defend against viruses in emails?
How to protect data transfer and online communications?
When browsing the Internet, data transfer and communications should take place securely. Security is put at risk when connecting to unsafe networks such as public or free WiFi connections (airports, hotels, etc.). In these cases, network configurations may:
- do not implement security at the highest levels;
- be attacked by attackers.
Use Secure Network (VPN) connections.
The Virtual Private Network is a private connection created to ensure security and anonymity to navigation through encryption protocols. This solution has taken hold in the United States. It is possible to connect to a VPN via:
- Personal Computer;
Devices are increasingly used for critical applications, for example, to access their online bank. Here are some best VPNs that you can use.
You can also read: How To Limit Other Users’ Access To Home Wi-Fi
What features should a VPN have?
A VPN, to ensure the security and anonymity of navigation, should meet the following requirements:
- do not trace logon accesses through log files;
- use kill switch technology: functionality that allows you to be disconnected from the Internet when the connection to the VPN stops being active;
- the purchase of the service should be anonymous (through Bitcoins or other cryptocurrencies);
- have a Tier1 provider.
Browse the Internet using TOR browser
To increase the degree of anonymity and the use of secure connections, it would also be advisable to use the TOR (The Onion Router) browser. Combining these systems will make it difficult to track the activity on the Internet and be attacked by online attackers.
If we activate the VPN before accessing the internet and then navigate using TOR, our service provider (ISP) will see only the type of connection. This allows neither the ISP nor the VPN provider to see the traffic generated. The VPN provider can only see our IP address with which we present ourselves on the Internet. For the latter reason, it is desirable to choose a VPN provider that does not keep logs or traces of logins.
More ways to surf the Internet
Other measures to be used to increase the security of our data both online and offline are:
1) encrypting data on our devices: in case of loss and/or theft, our information remains inaccessible;
2) use strong passwords, different and unrelated to any reference to your person: use a professional password manager;
3) keep the profiles distinct: the one to surf the Internet and the one used to browse in a protected/anonymous way;
4) use electronic coins not attributable to our person to make any transactions;
5) make registrations using, where necessary, an anonymous e-mail address: there are several such services, both free and paid. These services give you the ability to delete your inbox after a set period automatically.
6) search through search engines that do not store our requests: example, duckduckgo.com
You can also read: Creating A Secured Wi-Fi Network With Virtual Router Plus
How to surf the Internet safely and anonymously. Conclusions
Surfing the Internet in an unsafe way increases the risk of cyberattacks by attackers. In this article, I have listed valuable solutions to protect your privacy and navigate securely. I also wrote, 6 Tips to Increase Cybersecurity.