Privacy in Digital Era
Privacy in Digital Era
Everything you do leaves a footprint somewhere.
About the Book
Why would someone in this "social" age want to be anonymous?
We live in a time when a significant part of communication takes place over the Internet, to be more precise a substantial part of communication takes place through services of different corporations. Facebook, Google, Youtube, Twitter, Skype are some of the services which millions of us use to interact with friends, family, conduct buisnes .
Companies cooperate with intelligence agencies, they are collecting data on the activities on the Internet and over mobile networks thus contributing to a system of mass surveillance. Various corporations and other institutions mainly do it with intention to make money, either by using them to optimize their marketing and sales strategies, or by selling them to other entities who want to use them for the same purposes.
Imagine for a moment that every conversation and every form of communication in the world is accessible to them and how it affects your privacy. These companies collect information about your searches over the internet, who contact's who, manner in witch you communicate as well as content of communication, they know who your friends are, what you like, dislike, what are your political views, religious views, etc.
Privacy is not only the right but also the natural need of every human being. Everyone has the right to free activities on the Internet without anyone’s control over it. Regardless of whether or not you have something to hide, protecting your privacy is a matter of principle, it’s about accessing data without your knowledge and consent for reasons unknown.
What can we do to protect our privacy?
First step is to consider your current level of security and to improve it. Aim of this book is to do precisely that. We will cover steps to achieve and maintain system security. Later on we will go trough encryption methods for securing data on our hard drives as well as cloud storage. Then we will move on to how securely delete data or entire hard drive so that there are no traces of our presence. Next stop will be securing communication by means of encryption for mail, chat and using the web with anonymizing networks.
Second step and this one is as important as the first one. Spread awareness about the need for the internet as a medium and as a source of information to remain as much as possible free, unattended and neutral. To ultimately preserve it as a free source of information for the future.
Those who would give up Essential Liberty to purchase a little Temporary Safety, deserve neither Liberty nor Safety.
- Benjamin Franklin
Table of Contents
-
Introduction
- About the book
- Important note for Windows and Mac users
- Conventions used in this Book
- Terminology
-
Current state of affairs
- Active surveillance programs
-
Open Source
- What is Linux
- Benefits of using Linux
- Debian Linux
-
Before we begin
- Debian installation
-
System security
- Protecting BIOS
- Firewall
- Fail2Ban
- Tiger
- ClamAV
-
Intrusion-Detection
- Aide
- RKHunter
- Chkrootkit
- Keyloggers
-
Secure communication
- DNS-Servers
- Passwords
- KeePass
- Firefox/Iceweasel
-
Secure File-Deletion
- BleachBit
- Secure-Delete
- Securely wipe Drives
-
Encryption
- Best password practices
- Full-disk encryption
- Cloud storage
- Setting up private cloud storage
-
Encrypting online communication
- Firefox Encryption Add-Ons
- Encrypting files in your Browser
- Encryption for social networks and open web
-
Encrypting your email
- Mail (Thunderbird and PGP)
-
Encrypting your Internet traffic
- Tor
- TorChat
- Setting up Pidgin to work with TOR
- Setting up X-chat to work with TOR
- I2P
- Setting up X-chat to work with I2P
- Setting up Pidgin to work with I2P
- Secure and Encrypted VoIP
- Virtualbox
- Whonix (Anonymous Operating System)
- Virtual Private Network (VPN)
-
Online habitats
- Alternative
- Secure E-mail Providers
- Disposable E-mail Addresses
Causes Supported

Electronic Frontier Foundation
Defending your civil liberties in a digital world.
https://www.eff.org/Based in San Francisco, EFF is a donor-supported membership organization working to protect fundamental rights regardless of technology.
Other books by this author
The Leanpub 60-day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
Do Well. Do Good.
Authors have earned$11,721,492writing, publishing and selling on Leanpub, earning 80% royalties while saving up to 25 million pounds of CO2 and up to 46,000 trees.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers), EPUB (for phones and tablets) and MOBI (for Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them
Top Books
Recipes for Decoupling
Matthias NobackWrite software that survives
CQRS by Example
Carlos Buenosvinos, Christian Soronellas, and Keyvan Akbary- Leverage your Software Architecture skills by learning everything about CQRS in detail with lots of examples
- Develop faster applications by applying CQRS and fostering Read Models and Projections
- Learn how to apply CQRS into a brownfield project from a pragmatic approach
OpenIntro Statistics
David Diez, Christopher Barr, Mine Cetinkaya-Rundel, and OpenIntroA complete foundation for Statistics, also serving as a foundation for Data Science.
Leanpub revenue supports OpenIntro (US-based nonprofit) so we can provide free desk copies to teachers interested in using OpenIntro Statistics in the classroom and expand the project to support free textbooks in other subjects.
More resources: openintro.org.
Maîtriser Apache JMeter
Philippe Mouawad, Bruno Demion (Milamber), and Antonio Gomes RodriguesToute la puissance d'Apache JMeter expliquée par ses commiteurs et utilisateurs experts. De l'intégration continue en passant par le Cloud, vous découvrirez comment intégrer JMeter à vos processus "Agile" et Devops.
If you're looking for the newer english version of this book, go to Master JMeter : From load testing to DevOps
C++20 - The Complete Guide
Nicolai M. JosuttisAll new language and library features of C++20 (for those who know previous C++ versions).
The book presents all new language and library features of C++20. Learn how this impacts day-to-day programming, to benefit in practice, to combine new features, and to avoid all new traps.
Buy early, pay less, free updates.
Other books:
Jetpack Compose internals
Jorge CastilloJetpack Compose is the future of Android UI. Master how it works internally and become a more efficient developer with it. You'll also find it valuable if you are not an Android dev. This book provides all the details to understand how the Compose compiler & runtime work, and how to create a client library using them.
Ansible for DevOps
Jeff GeerlingAnsible is a simple, but powerful, server and configuration management tool. Learn to use Ansible effectively, whether you manage one server—or thousands.
Mastering STM32 - Second Edition
Carmine NovielloWith more than 1200 microcontrollers, STM32 is probably the most complete ARM Cortex-M platform on the market. This book aims to be the most complete guide around introducing the reader to this exciting MCU portfolio from ST Microelectronics and its official CubeHAL and STM32CubeIDE development environment.
Rector - The Power of Automated Refactoring
Matthias Noback and Tomas VotrubaLearn how to automatically and continuously upgrade and improve your PHP code base
The Hundred-Page Machine Learning Book
Andriy BurkovEverything you really need to know in Machine Learning in a hundred pages.
Top Bundles
- #2
CCIE Service Provider Ultimate Study Bundle
2 Books
Piotr Jablonski, Lukasz Bromirski, and Nick Russo have joined forces to deliver the only CCIE Service Provider training resource you'll ever need. This bundle contains a detailed and challenging collection of workbook labs, plus an extensively detailed technical reference guide. All of us have earned the CCIE Service Provider certification... - #3
Pattern-Oriented Memory Forensics and Malware Detection
2 Books
This training bundle for security engineers and researchers, malware and memory forensics analysts includes two accelerated training courses for Windows memory dump analysis using WinDbg. It is also useful for technical support and escalation engineers who analyze memory dumps from complex software environments and need to check for possible... - #4
Software Architecture
2 Books
"Software Architecture for Developers" is a practical and pragmatic guide to modern, lightweight software architecture, specifically aimed at developers. You'll learn:The essence of software architecture.Why the software architecture role should include coding, coaching and collaboration.The things that you really need to think about before... - #5
Static Analysis and Automated Refactoring
2 Books
As PHP developers we are living in the "Age of Static Analysis". We can use a tool like PHPStan to learn about potential bugs before we ship our code to production, and we can enforce our team's programming standards using custom PHPStan rules. Recipes for Decoupling by Matthias Noback teaches you in great detail how to do this, while also... - #9
All the Books of The Medical Futurist
6 Books
We put together the most popular books from The Medical Futurist to provide a clear picture about the major trends shaping the future of medicine and healthcare. Digital health technologies, artificial intelligence, the future of 20 medical specialties, big pharma, data privacy, digital health investments and how technology giants such as Amazon...