Well, privacy and security over your accounts is it a joke?
- Darkvader12
- Mar 11, 2021
- 6 min read
The privacy over the internet is taken into account because of the joke as you. An IP address is continually discovered regardless of which sort of VPN (virtual personal network) as for the privacy, it will ne'er happen, but the masking of the IP address might assist you to mask your actual location that i'm not denying at all. However, it is unimaginable that you are secured yours have to be compelled to be cautious over the privacy over the web as the one big name told that any issue that's free that does not imply that is free as you're the merchandise of the corporate like the example we tend to see what is an app and Facebook. This foremost controversial company takes the user's information and sells it over the third party business. They primarily track the spoken language of a person's day-to-day life. In and of itself, currently, their policy of the what's app was to once more to promote over our data when the most recent iOS fourteen updates, apple pushed the privacy feature more, and this caused Facebook to embrace the new policy that rosed several concern over a ton of users. Several began to switch to various platforms as shortly as they heard about it.
What is more, the once-that-all has app saw this and came to open public not to get away from their platform. The general public statement and therefore the controversial policy created things clear that the privacy one the web may be a mere joke, with the statement of the policy but the protection of over the accounts isn't restricted most of the time it's unheeded by several users just like the account protection through authenticators most of the time many users ignore it. Enough of this, let us first observe privacy over the internet. Privacy over the internet is often a joke. Something connected is not safe and personal until associated until and unless you place a restriction of sharing the items on the web.
What is more, the internet's privacy does not concern your body-shaming elements; however, it is about the content shared, then it is sold-out over the internet via the third-party website and, therefore, the post. Most of us suppose that uploading talking over the internet is termed private, but the catch anything uploaded on the internet is rarely intimate each your bank account details. Thus something you are doing on the network is rarely personal your IP address can continually be exposed, but you'll be able to mask IP address firmly with victimization VPN, especially for people who wish to use a free net on the public.
So here is the thing what you can do to safeguard your privacy while surfing on the internet use of the VPN is much appreciated; you can try VPN like Nord Vpn, Windscribe such VPN can at-least give you some privacy over the internet as such company wants money so they collect them as much as data from you like a cryptocurrency, without being said your data is the new mine in the modern days so in order to protect your private use of VPN is must moreover there is the setting on your google account to turn off the history browser in that way you can still mask your browsing history, why I am telling that this because if you have turned on the browsing history collection then Google, Facebook and lot of there companies will send you the targeted ads and spam emails. So, to safe against the data and personalized target ads, better turn off the browser history. Of course, the history is saved locally on the computer drives, but you can clear them if so desire, but it will not collect on the servers.
Google > sign in your account > manage your account > go to privacy and personalization> manage your account and then > turn off every activity this way, Google cannot track you and will not able to save this history to give you target ads. Although there are various ways to turn protect your privacy, this is just an example.
Another thing on the android side is the sensors off. This feature allows you to go in complete privacy mode; however, this feature is found on android ten, and up the feature, I am talking about is found on the developer option of the android phone.
That is
Go to setting of the android phone >> then go to about phone >> build number and then Tap it seven times >> the magical menu that is the developer option will be opened >> then scroll down a little bit and see the option of the quick tiles editing then tap on it. You will find the sensors off enable the option, and none of the sensors will work except the fingerprint, and the flashlight rest all of the sensors will be turned off. Not a single sensor will work on the phone. If you like some privacy and security, you can enable these options.
The last method is to check the permission given to the apps. The most prominent thing on the app is that we certainly allow things without knowing anything. The app permission also plays a vital role. If you concern about privacy too much, then keep watch on the permission. Moreover, the Android 12 and iOS 13 and above let the user see which apps are using the camera and microphone. Moreover, android 12 lets the user disable the permission after a certain period of the quick toggles allow the user to turn off the mic and the camera. Entirely thus, you can go into full privacy mode. So
Now let's talk about security.
As such, we know that strong passwords are easy to protect things. However, the strong password could be a mere joke either way. As such, the passwords could be changed from time to time. I am talking about the online accounts you log in to for the time being to communicate with others. To protect the account, you should enable two-factor authentication like login with one-time passwords (OTP) using authenticators on the account or the prompt popup to secure the account. Now let's talk about each method of authentication which is secure and when to use it.
Phone number authentication method (offline method)
As such, in this authentication method, the phone number used to authenticate your identity, that the OTP login will be available in the message inbox of your phone's messaging app. This method is secure when your phone does not have an internet connection or the authenticators or the prompt pop up is not working, but the catch the phone number is easy to crack and can be hacked in no time. Most of us prefer this method because of the convenience, but as the convenience grows, the risk of hacking also increases, so keep in mind using the phone number as an authenticator as a backup, not daily.
Online methods
The backup codes
Usually, the backup codes are hidden on the accounts. That is when all the methods failed; the backup codes are used to authenticate the account. This method is used when you or the authenticator lost your phone somewhere. Highly secure when all the methods are lost.
The prompt
As many of us heard and used prompt to login, our selves this method is used to have quick access over the account that is the prompt will pop up on the phone if you click yes then it will allow on the other client to log in on the various client as the backup up code it might or might not be as secure as some time we lost the mind and hit yes if we are not on the mind. The chance of security is 50-50. As such, it could be hazardous and could be as secure as well.
The security key
The security key is the NFC, and a USB-based security key allows the user to have a key to login on to the accounts that are the USB be used for logging in via NFC or by inserting the USB to a USB slot to log in as the method requires physical contact with the device, just the door lock, the security key works, allowing the user to carry a key with him/her.
The authenticator
Highly secure method to authenticate as the authenticator provide random codes for 30 to 50 seconds which is valid for only that time, so if you have typing speed, then the authenticator is way to go because the authenticator works on the server codes, which does not require any phone number or prompt or back up codes it is easy to use. However, upon the highest security on the top, it lacks the critical element that when you lose the authenticator keys without taking backup, then you will not be able to recover the account once you lose the authenticator, so it is best to keep three methods out of which phone number should not be used as the principal authenticator.
Conclusion
So in the end I will say that is it better keep away things private and secure whenever you are surfing as the internet is the ocean of data which could be mined to create money from you.
Comments