Privacy in Digital Era
Privacy in Digital Era
Everything you do leaves a footprint somewhere.
About the Book
Why would someone in this "social" age want to be anonymous?
We live in a time when a significant part of communication takes place over the Internet, to be more precise a substantial part of communication takes place through services of different corporations. Facebook, Google, Youtube, Twitter, Skype are some of the services which millions of us use to interact with friends, family, conduct buisnes .
Companies cooperate with intelligence agencies, they are collecting data on the activities on the Internet and over mobile networks thus contributing to a system of mass surveillance. Various corporations and other institutions mainly do it with intention to make money, either by using them to optimize their marketing and sales strategies, or by selling them to other entities who want to use them for the same purposes.
Imagine for a moment that every conversation and every form of communication in the world is accessible to them and how it affects your privacy. These companies collect information about your searches over the internet, who contact's who, manner in witch you communicate as well as content of communication, they know who your friends are, what you like, dislike, what are your political views, religious views, etc.
Privacy is not only the right but also the natural need of every human being. Everyone has the right to free activities on the Internet without anyone’s control over it. Regardless of whether or not you have something to hide, protecting your privacy is a matter of principle, it’s about accessing data without your knowledge and consent for reasons unknown.
What can we do to protect our privacy?
First step is to consider your current level of security and to improve it. Aim of this book is to do precisely that. We will cover steps to achieve and maintain system security. Later on we will go trough encryption methods for securing data on our hard drives as well as cloud storage. Then we will move on to how securely delete data or entire hard drive so that there are no traces of our presence. Next stop will be securing communication by means of encryption for mail, chat and using the web with anonymizing networks.
Second step and this one is as important as the first one. Spread awareness about the need for the internet as a medium and as a source of information to remain as much as possible free, unattended and neutral. To ultimately preserve it as a free source of information for the future.
Those who would give up Essential Liberty to purchase a little Temporary Safety, deserve neither Liberty nor Safety.
- Benjamin Franklin
Table of Contents
-
Introduction
- About the book
- Important note for Windows and Mac users
- Conventions used in this Book
- Terminology
-
Current state of affairs
- Active surveillance programs
-
Open Source
- What is Linux
- Benefits of using Linux
- Debian Linux
-
Before we begin
- Debian installation
-
System security
- Protecting BIOS
- Firewall
- Fail2Ban
- Tiger
- ClamAV
-
Intrusion-Detection
- Aide
- RKHunter
- Chkrootkit
- Keyloggers
-
Secure communication
- DNS-Servers
- Passwords
- KeePass
- Firefox/Iceweasel
-
Secure File-Deletion
- BleachBit
- Secure-Delete
- Securely wipe Drives
-
Encryption
- Best password practices
- Full-disk encryption
- Cloud storage
- Setting up private cloud storage
-
Encrypting online communication
- Firefox Encryption Add-Ons
- Encrypting files in your Browser
- Encryption for social networks and open web
-
Encrypting your email
- Mail (Thunderbird and PGP)
-
Encrypting your Internet traffic
- Tor
- TorChat
- Setting up Pidgin to work with TOR
- Setting up X-chat to work with TOR
- I2P
- Setting up X-chat to work with I2P
- Setting up Pidgin to work with I2P
- Secure and Encrypted VoIP
- Virtualbox
- Whonix (Anonymous Operating System)
- Virtual Private Network (VPN)
-
Online habitats
- Alternative
- Secure E-mail Providers
- Disposable E-mail Addresses
Causes Supported

Electronic Frontier Foundation
Defending your civil liberties in a digital world.
https://www.eff.org/Based in San Francisco, EFF is a donor-supported membership organization working to protect fundamental rights regardless of technology.
Other books by this author
The Leanpub 60-day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
80% Royalties. Earn $16 on a $20 book.
We pay 80% royalties. That's not a typo: you earn $16 on a $20 sale. If we sell 5000 non-refunded copies of your book or course for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $12 million USDwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them