Full Guide to Online Privacy 2020 - (Browser, Email, OS, & Compartmentalization)

Mental Outlaw
13 Jun 202015:32

TLDRThe video provides a comprehensive guide to enhancing online privacy in 2020. It warns against the risks of relying on tech ecosystems controlled by companies like Apple, Google, and Amazon, which can lead to a loss of privacy and control over personal data. The speaker recommends using privacy-respecting alternatives such as DuckDuckGo or StartPage for search, the Brave browser or a privacy-configured Firefox for web browsing, and advises against using cookies for login details, suggesting a password manager instead. The importance of using a secure operating system like Linux or BSD is emphasized, and for mobile devices, the use of an Android phone with F-Droid as the app store is suggested. Email privacy is addressed with recommendations for Tutanota or ProtonMail, and the use of temporary email addresses for less important accounts. The video concludes with the advice to use a password manager for secure account management and to avoid centralizing digital activities within a single tech ecosystem.

Takeaways

  • 🚫 Avoid centralizing your tech ecosystem with a single company to prevent them from controlling your data and activities.
  • 🔍 Use privacy-respecting search engines like DuckDuckGo or StartPage to prevent tracking and manipulation of your search results.
  • 🌐 For browsers, Brave is recommended for its out-of-the-box privacy settings, while Firefox offers more customization for advanced users.
  • 🍪 Be cautious of cookie storage and consider using a password manager instead of relying on cookies for login details.
  • ⛔ Block or limit JavaScript usage and consider using Tor for accessing sites with excessive JavaScript to enhance privacy.
  • 📱 On smartphones, prefer Android over iOS for more control over settings and the ability to sideload apps.
  • 📱 Use app stores like F-Droid that offer more privacy-focused apps and don't require a Google account.
  • ✉️ For email, consider secure and encrypted options like Tutanota or ProtonMail to protect your messages from prying eyes.
  • 📧 Use temporary email services or separate email addresses for less important accounts to prevent tracking.
  • 🔑 Employ a password manager to generate and store unique passwords for each of your accounts.
  • 🛡️ Embrace compartmentalization by using different services and products from various providers to enhance privacy and reduce surveillance.

Q & A

  • What is the main concern regarding the use of tech ecosystems created by large companies like Apple, Google, and Amazon?

    -The main concern is that these companies control the entire tech ecosystem and use their products to lure in users without considering the ways in which these companies use the products to control and collect data on users, leading to a significant loss of privacy.

  • What is the recommended search engine for someone who wants to protect their online privacy?

    -DuckDuckGo or StartPage are recommended as they do not track users and do not manipulate search results, which is crucial for maintaining privacy.

  • Why is using a privacy-respecting search engine not enough to protect privacy if you continue using a browser made by the same company behind the search engine?

    -Using a privacy-respecting search engine while still using a browser made by the same company is not enough because the browser itself can still track your activities and send data back to the company, negating the privacy benefits of the search engine.

  • What browser is suggested for users who want a balance between user-friendliness and privacy?

    -The Brave browser is suggested as it is based on Chromium, which is open source and user-friendly, and comes pre-configured with optimized privacy settings.

  • Why is it important to use a password manager instead of relying on cookie storage for remembering passwords and login details?

    -Using a password manager is important because cookies can be used to track users, whereas a password manager can securely store and manage login credentials without the risk of being tracked through cookie data.

  • How can compartmentalization help in protecting online privacy?

    -Compartmentalization helps by using unique email addresses, unique passwords, and different software, hardware, and services that are not all made by the same companies, making it harder for companies to link activities and track users.

  • What is the recommended approach for securing your operating system?

    -The recommended approach is to use Linux or BSD, which are open-source operating systems. For an even more secure setup, one can use a source-based distribution like Gentoo and compile packages from source to ensure no malicious code is included.

  • Why is it suggested to use an Android phone over an iPhone for better privacy?

    -Android phones are suggested because they offer more access to settings, the ability to sideload applications, and a variety of hardware options from different manufacturers, which can lead to better competition and more privacy options compared to the more controlled ecosystem of Apple.

  • What are the recommended email services for maintaining privacy?

    -Doteax and ProtonMail are recommended as they have end-to-end encryption built into them, ensuring that the providers cannot read the content of any emails.

  • How can using a temporary email address help in maintaining privacy for less important online accounts?

    -Using a temporary email address for less important accounts helps maintain privacy by preventing the linking of various online activities to a single, personal email address, making it more difficult to track a user's online behavior.

  • What is the recommended approach for securing online accounts?

    -Using a password manager to generate and store unique, complex passwords for each account is recommended. This way, if one account is compromised, the password泄露泄露 (leak) will not affect other accounts.

Outlines

00:00

🛡️ Protecting Online Privacy from Tech Giants

The first paragraph emphasizes the importance of safeguarding privacy against intrusive tech companies and government surveillance. It discusses how tech ecosystems like Apple, Google, and Amazon can control and profile users by integrating their products and services into daily life. The speaker suggests avoiding reliance on a single tech ecosystem and instead recommends using privacy-focused alternatives like DuckDuckGo or StartPage for search, Brave or Firefox for browsing with optimized privacy settings, and the use of a password manager to reduce cookie tracking.

05:02

🔒 Browser Privacy and Operating System Security

The second paragraph focuses on enhancing browser privacy through the use of privacy-respecting tools and practices. It advises against using browsers developed by companies that may compromise privacy, such as Google Chrome or Microsoft Edge. Instead, it recommends using Brave or Firefox with privacy settings configured for optimal protection. Additionally, it touches on the importance of using a secure operating system, with a preference for Linux or BSD due to their open-source nature, and suggests using a source-based distribution for heightened security.

10:06

📱 Smartphone Privacy and Email Protection

The third paragraph addresses the challenges of maintaining privacy on smartphones, which are inherently trackable due to their cellular and GPS functionalities. It suggests using an Android phone over an iPhone for greater control and the ability to sideload apps. The paragraph also recommends using alternative app stores like F-Droid and secure email providers like Tutanota or ProtonMail, which offer end-to-end encryption to protect email content. For less critical online accounts, it suggests using temporary email services to prevent tracking.

15:07

🔐 Comprehensive Online Security and Privacy

The final paragraph summarizes the key strategies for securing one's online life. It stresses the importance of compartmentalization, using unique email addresses and passwords, and avoiding reliance on a single company's ecosystem. The speaker encourages breaking free from tech monopolies and adopting software and services that prioritize user privacy and security.

Mindmap

Keywords

💡Online Privacy

Online privacy refers to the ability of individuals to keep their personal information secure and private while using the internet. In the context of the video, it is the central theme, emphasizing the importance of protecting personal data from large corporations and government surveillance. The video provides various strategies to enhance online privacy, such as using privacy-focused search engines and browsers.

💡Tech Ecosystems

Tech ecosystems are comprehensive networks of interconnected products and services provided by a single company, like Apple, Google, or Amazon. The video discusses how these ecosystems can be intrusive, as they often collect user data across different services, creating a detailed profile of the user's behavior and preferences. The speaker advises against centralizing one's digital life within a single tech ecosystem to avoid such privacy invasions.

💡DuckDuckGo

DuckDuckGo is a search engine that emphasizes user privacy by not tracking searches or manipulating results. It is presented in the video as a preferred alternative to Google or Bing for those concerned about privacy, as it does not compile user data for advertising or other purposes.

💡Brave Browser

The Brave browser is a chromium-based web browser that comes pre-configured with privacy settings that block trackers and protect user data. It is recommended in the video for users who want a browser with strong default privacy protections, without the need for extensive configuration.

💡Firefox

Firefox is a free and open-source web browser that can be customized with privacy settings to a greater extent than many other browsers. The video suggests configuring Firefox for optimized privacy settings as a way to enhance online security beyond the defaults of browsers like Brave.

💡Password Manager

A password manager is a tool that stores and manages users' passwords securely, allowing for the use of unique and complex passwords for each online account. In the context of the video, it is recommended to avoid tracking through cookie-based login details and instead use a password manager to maintain privacy and security.

💡VPN

A Virtual Private Network (VPN) is a service that allows users to mask their IP address and encrypt their online activity, making it more difficult for third parties to track or monitor internet usage. The video mentions using a VPN as a method to enhance privacy when browsing the internet.

💡Linux

Linux is an open-source operating system that can be highly customized and is known for its robust security features. The video suggests using Linux or BSD as an alternative to Windows or MacOS for a more secure and private operating system environment.

💡Android

Android is an open-source operating system used by many smartphones. The video recommends using an Android phone over an iPhone due to its greater flexibility, customization options, and the ability to sideload applications, which can help in maintaining privacy.

💡F-Droid

F-Droid is an installable catalogue of FOSS (Free and Open Source Software) applications for the Android platform. Unlike the Google Play Store, it does not require a Google account and offers apps that respect user privacy. The video suggests using F-Droid as a more private alternative to the Play Store.

💡Email Encryption

Email encryption involves encoding the content of emails to ensure that only the sender and the intended recipient can read them. The video recommends using email services like Tutanota or ProtonMail, which offer end-to-end encryption, to protect the content of emails from being accessed by third parties.

Highlights

The importance of not centralizing your digital activities to a single tech ecosystem to protect your online privacy.

Using DuckDuckGo or StartPage as privacy-respecting search engines to avoid tracking.

Avoiding browsers like Google Chrome, Microsoft Edge, and Safari for better privacy.

Recommendation to use the Brave browser for its pre-configured privacy settings.

Advantages of using Firefox with optimized privacy settings for enhanced browser security.

The necessity to manage cookie storage and avoid excessive JavaScript to prevent tracking.

Using Tor for accessing sites that are bloated by JavaScript to maintain privacy.

Creating multiple browser profiles with privacy configurations to compartmentalize online activities.

Utilizing a proxy or VPN to mask your IP address while browsing.

Switching to Linux or BSD for a more secure and open-source operating system.

Compiling packages from source in Linux distributions for heightened security.

The challenges of maintaining privacy on smartphones and the recommendation to use an Android phone.

Installing F-Droid as an app store alternative to Google Play for more privacy.

Using email services like Tutanota or ProtonMail that offer end-to-end encryption.

Employing temporary email services for less important online accounts to prevent tracking.

The significance of using a password manager with unique passwords for each account.

Bitwarden and KeePassXC recommended as secure password managers.

The overall strategy for securing your online life through compartmentalization and the use of privacy-respecting software and services.