Conspiracy Revelation: 4.12.2020: Interesting that someone else noticed Avasts Extreme Sabotage Spy Actions… Gmerek, somehow you chose the wrong company…go back to Gmer without BSODs.
“Use Antivirus Software
The first step in blocking spyware is to make sure it doesn’t have a chance to run on your computer. Even cautious users can stumble upon a virus from time to time, which is why having good, up to date antivirus software can come in handy.
Unfortunately, the antivirus world is rife with invasions of privacy. Popular programs such as Avast and the free version of AVG have been shown to record and store a list of the websites you visit. They still offer basic protection from spyware, but because they function as spyware themselves, they’re not exactly good solutions. !!!
Conspiracy Revelation: 4.12.2020: They also attack sometimes, may I remember the A2 Guy Haak..who attacked my virtual box or let´s say it this way: His signature was visible in the forensic tcp-protocol analysis.
Bit Defender itself acts like a nasty Rootkit, the same is valid for Symantec and most other “AV”s…Hook the world until the System is completely damaged. They try the fire versus fire variant. Nothing learned from the Past.
Comodo is incapable of defeating Zombiehost and nobody wants a online-only Exe, we want OFFLINE-Tools. (btw your Dragon-Browser is unstable as Hell, Right-Mouse-Crash nonstop on Facebook..Latest Version also. And they already exploited it. The Dragon-Ico does not show a blinking effect anymore)
Eset spreads false information about the first in the Wild Rootkits…and people think that is the solution.
I miss the Chinese Anti-Rootkit tools from 10-15 years ago.
The security market is very backwards in retardation-loop…Peak time was around 2008.
“If you use Windows and prefer not to use the option below, Microsoft’s own Defender software is a useful second-best. Note that Microsoft was named as part of the PRISM program (see below) and shares information with the NSA, so it’s not the most secure option available.”
Conspiracy Revelation: 4.12.2020: Linux-Switch is nonsense…They can attack and exploit all Linux Versions, I have made the Test in 2018..with Pendrive Only and Only Linux… in fact you are by far worse off, because the forensic capabilities of Linux are uncomfortable GUI-Less and Stone-Age like. Let Alone the Browser-Firewalls, ugly, uncomfortable and really remember us at the early beginnings of the Computer-Age.
“Replace Common Software with Privacy Conscious Alternatives
We used dozens of different kinds of software and apps each day, both at home and at work. Many of them are known to store and share user information with third parties and government agencies, including the NSA.
Most common programs and apps have more secure alternatives, especially if they’re designed to handle sensitive information. The software below gives you an extra layer of security against data leaks and theft by providing encryption and other privacy-centric features.
Signal Private Messenger – Private, encrypted calling and SMS app for iPhone and Android.
SpiderOak One – An encrypted, zero-knowledge cloud hosting alternative to Dropbox and Google Drive.
ENCRYPT.One – Share files with an encrypted browser-based interface.
Atlantis Word Processor – A feature rich word processor that lets you encrypt files with just a few clicks.
Secure Your Cell Phone
Smartphones carry an enormous amount of personal data, everything from our home address to contacts, banking information, e-mails, and more. They’re high value targets for thieves and hackers, and the NSA knows it can get a lot of information from a single source. Keeping the contents of your cell phone safe should be a high priority.
In addition to online data theft, mobile devices have the added risk of being physically compromised. It’s easy to forget your phone at a cafe or have someone lift it from a purse or backpack. They can install spyware or key loggers, both of which can route data directly to government agencies without your knowledge.
In addition to using common sense and keeping your device with you at all times, there are a few things you can do to boost privacy and prevent the NSA from tracking your phone.
Use a strong screen lock passcode
It’s tempting to set lock screen passcodes to simple four digit combinations or swipe patterns. After all, we unlock our phones dozens of times a day, that could save a ton of time! By switching to a six digit passcode or a six node swipe pattern, however, you increase the complexity of your password exponentially, making it difficult even for a supercomputer to crack.
Turn on airplane mode
If you’re not actively making calls, switch on airplane mode to stop transmitting information to local cell towers.
Remove the battery
Phones can send location data as long as they have power. With no battery, nothing can be sent.
Encrypt your device
Local phone encryption locks down files on your device and makes them unreadable without the proper decryption keys.
Treat your phone like a computer
Do you use firewalls, VPNs, adblockers, and encrypted chat on your PC? Don’t forget to do the same on your phone.
Unfortunately, cell phones will never be perfectly secure. In order to send data to your device the cell phone company needs to be able to find it. That means transmitting location information wirelessly, which is a dead giveaway to NSA spies. Make sure you read our guides on securing an iPhone or an Android phone. And what are the best VPNs for iOS and Android.
The number one workaround for this is to stop using a smartphone altogether.
Use the Tor Browser
The Tor network was built for anonymity. Tor works by encapsulating data in layers of encryption and passing that data through a series of computers called nodes. Each node peels back a layer of encryption, which reveals instructions on which node to pass the data next. When the last layer is peeled back, the data is delivered to its destination. This allows digital communication to occur without leaving a direct trail, making it extremely difficult if not impossible for the NSA to follow your activity.
Invest in a Good VPN
One of the most powerful things you can do to ensure your online privacy is to use a virtual private network. VPNs act like a tunnel between your computer and the internet at large. Instead of sending raw data ISPs can collect and hackers can steal, a VPN encrypts everything and sends it to servers located around the world. Your personal details aren’t attached to this traffic, and even if they were, it’s encrypted and nearly impossible to decrypt.
When shopping for a VPN there are a number of factors you’ll want to consider. Privacy is at the top of the list, and a good indicator for how seriously the VPN service takes your privacy is to make sure they have a strict zero-logging policy. DNS leak protection and kill switches are also nice features that help prevent data loss.
For more information on how to find the fastest, most secure, and most feature rich VPNs, check out our guides below:”
“Use a Search Engine that Doesn’t Track You”
“Browser Extensions to Stop NSA Spying
The web browser is a hub for most of our online activity. Every click, every website, and most private communications pass through it on a daily basis, making it a prime starting point for boosting your privacy to prevent spying.
After culling your add-ons list of unused and potentially dangerous extensions, it’s time to incorporate new tools to help lock down your private information and prevent NSA onlookers. The suggestions below are widely used by the privacy community and are available for most modern browsers, including Chrome, Opera, and Firefox.
HTTPS Everywhere – An extension made by the Electronic Frontier Foundation (EFF) that forces a number of popular websites to use a secure connection.
Privacy Badger – Another add-on made by the EFF. This one blocks invasive ads, spying trackers, and helps discourage browser fingerprinting.
NoScript – A phenomenal anti-tracking add-on for Firefox and other Mozilla based browsers.
Disconnect – A powerful privacy tool that helps prevent data leaks and keeps your information”
Clamwin – Free and open source antivirus that doesn’t track anything.”
“What is the NSA PRISM Program?
PRISM is a code name for a program operated by the U.S. National Security Agency (NSA) that collects digital communications from at least nine major internet companies such as Microsoft, Yahoo!, Google, Facebook, YouTube, AOL, Skype, and Apple. This data includes everything from e-mails to text documents, photos, location information, IP addresses, browsing history, and video call content, all of which was legally given to the NSA without user permission.
The PRISM program is the number one source of raw intelligence used for NSA reports, which is a clear indicator of just how widespread digital surveillance has become. Nearly everyone who’s used the internet has visited sites operated by the companies above, which means the NSA theoretically has access to their personal details. Privacy has never been more important than it is today.
The NSA’s expansive surveillance program is an ongoing threat to Internet freedoms, but you can fight back by using a VPN in addition to the other tips mentioned in today’s article. Of course, as time goes on, new threats may arise–so stay tuned to Addictive Tips’ blog for updates on how to counter them and secure your privacy online.”
Conspiracy Revelation: 4.12.2020: No, Snowden-Tail is out, bad to handle and really makes zero fun to use.
Show me one Linux-Mint with a decent Firewall: ZERO. ZERO. ZERO! 104.xx. connects before you connect to the internet. Totally insecure and already infiltrated before you use it!!!
“Do you have any security tips for us? Leave a comment below.”
“2. Stop using social networks
Social networks such as Instagram, Twitter, and Facebook serve as vast repositories of personal information that
people intentionally contribute to. Putting up photos from your vacation or talking about the awesome lunch you had
seems innocent enough, but it’s what companies can do with that data that compromises your security. Social
networks can share or sell information you add, and if a government agency such as the NSA makes a data request,
the company has to comply. If you want to end the spying, stop using social networks, especially Facebook.”
“6. Cover up or unplug your webcam (immer)
It sounds like something a paranoid person would do, but simply putting a piece of tape over your laptop’s webcam and microphone is a surprisingly effective spyware deterrent.”