Take Control of Your Online Privacy, Third Edition
This book is 100% complete
Completed on 2017-04-21
About the Book
Nowadays, it can be difficult to complete ordinary activities without placing your personal data online, but having your data online puts you at risk for theft, embarrassment, and all manner of trouble. In this book, Joe Kissell helps you to develop a sensible online privacy strategy, customized for your needs. Whether you have a Mac or PC, iOS or Android device, set-top box, cell phone, or some other network-enabled gadget, you’ll find practical advice that ordinary people need to handle common privacy needs (secret agents should look elsewhere).
You’ll learn how to enhance the privacy of your Internet connection, Web browsing, email messages, online chatting, social media interactions, and file sharing, as well as your mobile phone or tablet, and Internet of Things devices like webcams and thermostats. Parents will find important reminders about protecting a child’s privacy. The book also includes Joe’s carefully researched VPN recommendations.
The book is packed with sidebars that help you get a handle on current topics in online privacy, including international travel, quantum computing, why you should beware of VPN reviews online, two-factor authentication, privacy and your ISP, understanding Gmail ads, and more.
Teach This Book! Once you’re satisfied with your online privacy strategy, you may want to help friends or colleagues improve theirs. To that end, this book includes links to a free PDF cheat sheet and to a PDF-based slide deck that you can show on any computer or mobile device screen.
You’ll receive savvy advice about:
- Why worry? Learn who wants your private data, and why they want it. Even if you don’t believe you have anything to hide, you almost certainly do, in the right context. Would you give just anyone your financial records or medical history? Didn't think so.
- Set your privacy meter: Develop your own personal privacy rules—everyone has different privacy buttons, and it's important to figure out which matter to you.
- Manage your Internet connection: Understand privacy risks, prevent snoops by securing your Wi-Fi network, and take key precautions to keep your data from leaking out. Also find advice on using a VPN, plus why you should never believe a VPN review that you read on the Internet—even if it seems like it was written by Joe!
- Browse and search the Web: Learn what is revealed about you when you use the Web. Avoid bogus Web sites, connect securely where possible, control your cookies and history, block ads, browse and search anonymously, and find out who is tracking you. Also, take steps to protect passwords and credit card data.
- Send and receive email: Find out how your email could be intercepted, consider when you want email to be extra private (such as when communicating with a lawyer), find out why Joe doesn’t recommend email encryption as a solution to ordinary privacy needs (but find pointers for how to get started if you want to try it—or just encrypt an attachment, which is easier), get tips for sending email anonymously, and read ideas for alternatives to email.
- Talk and chat online: Consider to what extent any phone call, text message, or online chat is private, and find tips for enhancing privacy when using these channels.
- Watch your social media sharing: Understand the risks and benefits of sharing personal information online, tweak your settings, and consider common-sense precautions.
- Share files: What if you want to share (or collaborate on) a contract, form, or other document that contains confidential information? Find out about the best ways to share files via file server, email attachment, cloud-based file sharing service, peer-to-peer file sharing, or private cloud.
- Check your electronics: All sorts of gizmos can connect to the Internet these days, so everything from a nannycam to smart light bulbs should be considered in your online privacy strategy.
- Think mobile: Ponder topics like SIM card encryption keys, supercookies, location reporting, photo storage, and more as you decide how to handle privacy for a mobile phone or tablet.
- Help your children: As a parent, you know a lot about your children, and you have access to lots of photos of them. But that doesn't mean you should share everything without a thought to your children's privacy needs. Find a few key tips to keep in mind before you tell all.
Read Me First
- Updates and More
- What’s New in the Third Edition
- What Was New in the Second Edition
- Online Privacy Quick Start
Learn What You Have to Hide
- Things You Might Want to Keep Private
- Personally Identifiable Information
Learn Who Wants Your Private Data (and Why)
- Data Brokers
- Local Villains
- Big Media
- Big Money
- Big Data
- Big Brother
- What about Privacy Policies?
Develop a Privacy Strategy
- Fix the Easy Things
- Create Privacy Rules for Yourself
- Purge Your Info from Data Brokers
- Cope with Special Cases
- Take the Pledge
Keep Your Internet Connection Private
- Understand the Privacy Risks of Your Internet Connection
- Prevent Snooping
- Turn Off Unnecessary Services
- Mind Your Camera and Microphone
- Use a Firewall
- Use an Outbound Firewall
Browse the Web Privately
- Understand the Privacy Risks of Web Browsing
- Go to the Right Site
- Browse Securely
- Manage Local Storage of Private Data
- Protect Passwords and Credit Card Info
- Search Privately
- Browse Anonymously
- Shop Online Privately
Improve Email Privacy
- Understand the Privacy Risks of Email
- Reduce Email Privacy Risks
- Encrypt Your Email
- Send and Receive Email Anonymously
- Use Email Alternatives
Talk and Chat Privately
- Understand the Privacy Risks of Real-time Communication
- Improve Your Real-time Communication Privacy
Keep Social Media Sort of Private-ish
- Understand the Privacy Risks of Social Media
- Check Your Privacy Settings
- Use Other Social Media Precautions
Share Files Privately
- Understand the Privacy Risks of File Sharing
- Encrypt Transfers, Files, or Both
- Use Peer-to-Peer File Sharing
- Create a Personal Cloud
Manage Your Mobile Privacy
- Cellular Data Considerations
- Granting Apps Access Permission
- Location Awareness
- Photos and Videos
- Mobile Backups
Keep the Internet of Things Private
- Set-top Devices
- Web-connected Cameras
- Other Connected Objects
- Maintain Privacy for Your Kids
- Teach This Book
About This Book
- Ebook Extras
- About the Author
- About the Publisher
- Copyright and Fine Print
This book is published on Leanpub by Take Control Books
With its Take Control series of ebooks, alt concepts inc. covers a wide range of technology topics, with a special emphasis on Apple products and services. Our catalog comprises over 100 titles, and we’ve sold hundreds of thousands of ebooks in the process of providing expert advice and technical know-how to tens of thousands of readers around the world. Join us today!
The Leanpub 45-day 100% Happiness Guarantee
Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
Free Updates. Free App. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers), EPUB (for phones and tablets), MOBI (for Kindle) and in the free Leanpub App (for Mac, Windows, iOS and Android). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.