So with the Senate voting to overturn the FCC's privacy rules I began thinking about how I could stay private on the Internet. How do you keep what you do on the Internet private when even your ISP can spy on you now?
Not that I have anything to hide. But any society that trades a little privacy for a little safety deserves neither and will lose both. How do I claim back my privacy?
>>59695115
Virtual machine and VPN.
that's my best guess.
or:
remove the internet chip from your computer, stop using the internet.
OR:
use TOR and a VPN in conjunction to avoid being tracked.
1. Setup OpenVPN server on rPi and hide it at your school/work/local mall/library/etc.
2. Profit.
>>59695115
Security tips in order of difficulty:
Level 1: Use firefox with "pocket" disabled, and with addons for security and privacy.
Level 2: Don't save your passwords on a plaintext or in some "cloud" service like lastpass, create and remember one good main password and use KeePassX (and I mean the one with an X) and use the option to generate the rest.
Level 3: Replace your e-mail provider with a more safe, more appropriate provider.
Level 4: Use GNU/Linux. Start with Lubuntu for easy mode (stay away from something called BSD, is suspected to leave backdoors open).
Level 5: Use a GNU/Linux distro free from "systemd", which is suspected to be the last resort of secret agencies to implant a backdoor on "hacker friendly" operating systems.
---Begins to cost money from here---
Level 6: Buy a router compatible with LibreCMC and install LibreCMC.
Level 7: Buy a VPN service in some privacy friendly country.
Level 8: Buy a computer pre-installed with Libreboot or compatible and install it yourself.
---End of money cost---
---Start of extreme high security---
Level 9: Browse the web with javascript and cookies disabled by default.
Level 10: Encrypt your e-mail with GnuPG.
Level 11: Use Mutt for e-mail client, as to avoid web beacons (tracking pixels).
Level 12: Use YaCy with collaborative database disabled when in need to search on the web.
Level 13: Use Exim in your own server for e-mail.
Level 14: Tunnel all your communications through i2p, not Tor, to navigate internet.
Level 15: Use the Linux-libre kernel.
Level 16: Use only libre software (software "free as in freedom").
Level 17: Reduce the amount of software installed in your computer.
Level 18: Use text-based programs with less library dependencies than the GUI counterparts.
Level 19: Use a source based distro.
Level 20: Use a source based distro without crypto libraries on its package manager.
>>59695261
I'm already doing levels 1 & 9, how safe am I?
I don't.
If you can't beat them, join them.
>>59695155
Doesn't TOR track you though?
>>59695448
You're not.