Privacy in Digital Era
Minimum price
Suggested price

Privacy in Digital Era

Everything you do leaves a footprint somewhere.

About the Book

As technology continues to advance, our digital footprint expands, and we become more reliant on internet-based services for our daily communication, the issue of online privacy has become a growing concern. The collection of vast amounts of data about our online activity has become inevitable. Unfortunately, this data is often used for targeted advertising and is shared with third-party entities without our knowledge or consent.

This book is a comprehensive guide for novice and intermediate readers who want to learn how to protect their online privacy.

Chapter 1: Assessing Your Current Level of Security

The first step to improving your online privacy is to assess your current level of security. This chapter will guide you through the process of evaluating your existing security measures and identifying potential vulnerabilities in your system.

Chapter 2: Hardening Your System Security

In this chapter, you will learn how to harden your system security to protect against common cyber threats such as malware, phishing, and hacking. You will learn how to configure your firewall, antivirus, and other security tools to ensure maximum protection against cyber attacks.

Chapter 3: Monitoring Malicious Activities

To ensure maximum protection against cyber threats, it is essential to monitor for malicious activities in your system. This chapter will teach you how to use security tools such as intrusion detection systems and security information and event management systems to monitor your system for potential security breaches.

Chapter 4: Properly Handling Data Erasure

Data erasure is a crucial step in protecting your privacy online. This chapter will teach you how to properly erase sensitive data from your system and ensure that it cannot be recovered.

Chapter 5: Employing Full-Disk Encryption

Full-disk encryption is an effective way to protect your data from unauthorized access. In this chapter, you will learn how to employ full-disk encryption on your system to ensure that your data is secure.

Chapter 6: Properly Using Social Networks and the Open Web

Social media platforms and the open web are essential parts of our daily lives. However, they also pose a significant threat to our online privacy. In this chapter, you will learn how to use social networks and the open web safely and protect your personal information.

Chapter 7: Encrypting Your Internet Traffic

Encrypting your internet traffic is an effective way to protect your online privacy. This chapter will teach you how to use VPNs and other encryption tools to ensure that your internet traffic is secure and protected from prying eyes.

Chapter 8: Encrypting Online Communication

In this chapter, you will learn how to use encryption tools to ensure that your online communication is secure and protected from eavesdropping.

Chapter 9: Using Anonymizing Services

Anonymizing services such as Tor and I2P are effective ways to protect your online privacy. This chapter will teach you how to use these services to ensure that your online activities are anonymous and protected.

Chapter 10: Safely Using Your Email

Email is one of the most commonly used communication channels, but it is also a significant source of privacy breaches. In this chapter, you will learn how to use email safely and protect your personal information.

In conclusion, protecting our online privacy has become more critical than ever. By following the steps outlined in this book, you can significantly improve your online security and take control of your digital identity. Remember, protecting online privacy is not a one-time task but a continuous process. Stay informed about the latest threats and vulnerabilities affecting online security and privacy and be proactive in your approach to online security.

Those who would give up Essential Liberty to purchase a little Temporary Safety, deserve neither Liberty nor Safety.

- Benjamin Franklin

About the Author

Richard White
Richard White

Richard White @digitaleranet

Richard is the author of three books, his most recent, Privacy in Digital Era is forthcoming in hardcover. He is also the head editor and the driving force behind Digital Era.

He regularly writes about privacy related issues and is hard at work on The Art of CLI, a collection of command line, open-source software.

Richard White is a geek, programmer, freelancer, and technology enthusiast.

Follow @digitaleranet on Twitter, check out Digital era.

Table of Contents

  • Introduction
    • About the book
    • Important note for Windows and Mac users
    • Conventions used in this Book
    • Terminology
  • Current state of affairs
    • Active surveillance programs
  • Open Source
    • What is Linux
    • Benefits of using Linux
    • Debian Linux
  • Before we begin
    • Debian installation
  • System security
    • Protecting BIOS
    • Firewall
    • Fail2Ban
    • Tiger
    • ClamAV
  • Intrusion-Detection
    • Aide
    • RKHunter
    • Chkrootkit
    • Keyloggers
  • Secure communication
    • DNS-Servers
    • Passwords
    • KeePass
    • Firefox/Iceweasel
  • Secure File-Deletion
    • BleachBit
    • Secure-Delete
    • Securely wipe Drives
  • Encryption
    • Best password practices
    • Full-disk encryption
    • Cloud storage
    • Setting up private cloud storage
  • Encrypting online communication
    • Firefox Encryption Add-Ons
    • Encrypting files in your Browser
    • Encryption for social networks and open web
  • Encrypting your email
    • Mail (Thunderbird and PGP)
  • Encrypting your Internet traffic
    • Tor
    • TorChat
    • Setting up Pidgin to work with TOR
    • Setting up X-chat to work with TOR
    • I2P
    • Setting up X-chat to work with I2P
    • Setting up Pidgin to work with I2P
    • Secure and Encrypted VoIP
    • Virtualbox
    • Whonix (Anonymous Operating System)
    • Virtual Private Network (VPN)
  • Online habitats
    • Alternative
    • Secure E-mail Providers
    • Disposable E-mail Addresses

Causes Supported

Electronic Frontier Foundation

Defending your civil liberties in a digital world.

Based in San Francisco, EFF is a donor-supported membership organization working to protect fundamental rights regardless of technology.

From the Internet to the iPod, technologies are transforming our society and empowering us as speakers, citizens, creators, and consumers. When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990—well before the Internet was on most people's radar—and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights.

The Leanpub 60-day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

See full terms

80% Royalties. Earn $16 on a $20 book.

We pay 80% royalties. That's not a typo: you earn $16 on a $20 sale. If we sell 5000 non-refunded copies of your book or course for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earnedover $12 millionwriting, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub