{"id":5059,"date":"2019-03-25T08:00:05","date_gmt":"2019-03-25T13:00:05","guid":{"rendered":"http:\/\/blog.zoha-islands.com\/?p=5059"},"modified":"2019-03-25T08:00:05","modified_gmt":"2019-03-25T13:00:05","slug":"which-privacy-tools-do-you-need","status":"publish","type":"post","link":"https:\/\/zoha-islands.com\/blog\/which-privacy-tools-do-you-need\/","title":{"rendered":"Which Privacy Tools Do You Need"},"content":{"rendered":"<table border=\"0\" width=\"100%\">\n<tbody>\n<tr>\n<td valign=\"top\">\n<div class=\"intro\">\n<p>Did you miss the headline? \u201cMillions Affected by Massive Data Breach\u201d If so, just wait until tomorrow, when another example of how many companies are with your privacy will be announced. Many consumers are seeking additional means to protect their privacy themselves, disregarding pious assurances from companies that obviously don&#8217;t care or don&#8217;t know how to protect their customers. Here are some of the most often recommended privacy-protection tools, and some thoughts about how well you can expect them to work&#8230;<\/p>\n<\/div>\n<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div id=\"adsense-new\"><\/div>\n<div id=\"a005468more\">\n<div id=\"more\">\n<div class=\"KonaBody\">\n<h2>Yet Another Breach of Your Private Information? <img decoding=\"async\" loading=\"lazy\" class=\" wp-image-5075 alignright\" src=\"http:\/\/blog.zoha-islands.com\/wp-content\/uploads\/2019\/03\/Breech-300x225.jpg\" alt=\"\" width=\"416\" height=\"312\" srcset=\"https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2019\/03\/Breech-300x225.jpg 300w, https:\/\/zoha-islands.com\/blog\/wp-content\/uploads\/2019\/03\/Breech.jpg 474w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/h2>\n<p>In just one of many recent examples, over two BILLION customer accounts were stolen in March 2019 from Verifications.io, an email marketing firm. Forbes reported that the <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/03\/10\/2-billion-unencrypted-records-leaked-in-marketing-data-breach-what-happened-and-what-to-do-next\/#56e3f9af6b0d\" target=\"_blank\" rel=\"noopener noreferrer\">stolen data<\/a> includes emails, phone numbers, addresses, dates of birth, social media account details, credit scores and mortgage data.<\/p>\n<p><span id=\"ezoic-pub-ad-placeholder-116\" class=\"ezoic-adpicker-ad\"><\/span>Like I said, that&#8217;s just one of many. The Identity Theft Resource Center publishes a <a href=\"https:\/\/www.idtheftcenter.org\/Data-Breaches\/data-breaches\" target=\"_blank\" rel=\"noopener noreferrer\">monthly Breach Report<\/a> that identified over 80 data breaches in January 2019. The report shows the name of the company where the breach occurred, the types of data compromised, and the number of affected records. This handy <a href=\"https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2019\/01\/ITRC_2018-EOY-BREACH-REPORT-KEY-FINDINGS.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">infographic<\/a> summarizes the data breaches from 2017 and 2018. Business, healthcare, and banking were the most common targets in the 2,800+ breaches from that time period.<\/p>\n<p>Were you affected by any of those breaches? With a total of over 2.5 billion consumer records affected in the past two years, and over a billion Yahoo accounts compromised in 2016, I&#8217;d say you would be lucky to escape with your privacy unscathed. Valuable data such as account passwords, social security numbers, financial data, and credit card information is sold by the pound on the Dark Web. Check out the privacy tools below, for some tips on identifying if, when or how you may have been affected. I&#8217;ve also got some tips on how to protect what&#8217;s left of your digital privacy.<\/p>\n<p><a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Have I Been Pwned<\/a>: Enter your email address and this site will tell you if it has been compromised at any time in the past. (The term &#8220;pwned&#8221; is geekspeak for &#8220;owned,&#8221; or &#8220;defeated.&#8221;)<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"imgmain\" src=\"https:\/\/askbobrankin.com\/privacy-protection-tools.jpg\" alt=\"Protecting your online privacy\" width=\"484\" height=\"403\" \/><\/p>\n<p><span id=\"ezoic-pub-ad-placeholder-112\" class=\"ezoic-adpicker-ad\"><\/span><a href=\"https:\/\/breachalarm.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">BreachAlarm<\/a> is a similar, but more proactive service that allows you to check anonymously if your email account has been hacked, leaked or compromised. They comb the dark corners of the Internet in search of stolen password lists that have been posted online. You can sign up for email notifications about future password hacks that affect you.<span id=\"ezoic-pub-ad-placeholder-117\" class=\"ezoic-adpicker-ad\"><\/span><\/p>\n<p><a href=\"https:\/\/getoutline.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Outline VPN<\/a> by Alphabet, Inc., parent of Google, is a life-saving boon for journalists and activists in countries with repressive governments. It is somewhat effective for ordinary citizens free-roaming the Internet.<\/p>\n<p>A VPN (Virtual Private Network) provides encrypted connections between two or more computers to keep communications between them private. But all of the computers on a given VPN must have the same VPN client software and permission to be on this private network. You may have VPN client software on your machine, but that \u201ccat\u201d video site where you spend most of your work day does not. The connection from the video site to the VPN server is wide open and can be traced back to you. However, it is neither easy nor quick, and random citizens are not worth that much of a hacker\u2019s time and trouble while so many of them fall for traps easily set.<\/p>\n<h2>More Privacy Tools (and one to avoid)<\/h2>\n<p>The <a href=\"https:\/\/goo.gl\/h7iK8g\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook Container Add-on For Firefox<\/a> is nothing more or less than a private\/incognito browsing window fitted into a browser tab. When first installed, the add-on deletes all cookies set by Facebook, including cookies set by other sites where you have used your Facebook ID to register, comment, or like. You interact with Facebook only in this special, blue-colored tab. In other tabs, you can interact with other sites and Facebook will not be able to track your Web activities. The downside is that you won\u2019t be able to \u201csign in with Facebook\u201d on other sites or share their pages to your Facebook page. Oh, and you\u2019ll have to use Firefox, eschewing the many advantages of Chrome.<\/p>\n<p><span id=\"ezoic-pub-ad-placeholder-113\" class=\"ezoic-adpicker-ad\"><\/span><span id=\"div-gpt-ad-askbobrankin_com-box-4-0\" class=\"ezoic-ad\"><\/span>Password managers are vital tools for privacy, security, and remembering passwords. If you\u2019re not using a password manager, you are probably violating most of the rules for keeping your accounts secure. Here&#8217;s an article <a href=\"https:\/\/askbobrankin.com\/can_this_robot_manage_your_passwords.html\" target=\"_blank\" rel=\"noopener noreferrer\">Can This Robot Manage Your Passwords?<\/a> has links to Roboform and some other recommended password manager apps.<\/p>\n<p>The <a href=\"https:\/\/askbobrankin.com\/do_it_now_google_password_checkup.html\" target=\"_blank\" rel=\"noopener noreferrer\">Google Password Checkup tool<\/a> will alert you on the spot if the username and password you are about to enter on a website have been compromised. Password Checkup is a Chrome browser extension that checks your input against a database of four billion login credentials that Google knows have been compromised.<\/p>\n<p><a href=\"https:\/\/Privacy.com\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy.com<\/a> is a service provider of single-use debit card numbers. You sign up by giving Privacy.com the keys to your checking account &#8211; username, password, and answers to security questions. I just did it myself. Wait, what?! NO, I did not, and neither should you! That\u2019s not how virtual payment card numbers are supposed to work.<\/p>\n<p>A virtual payment card number is, essentially, a non-physical version of your \u201cchipped\u201d credit or debit card. It\u2019s a random number that fits the required pattern of a valid credit\/debit card number, generated at the point of an online sale. It is tied to your real card number for one transaction only, after which it won\u2019t work for any payment. Credible institutions such as American Express, Bank of America, Capital One, and Citibank offer virtual card number services. Never get such things from strangers on the Internet, even if your uncle Joe knows a guy in a nearby city who lives near a police station, and he met a nice lady who recommended them.<\/p>\n<p>What steps do you take to protect your online privacy?<\/p>\n<p>Have a great week from all of us at ZI<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Did you miss the headline? \u201cMillions Affected by Massive Data Breach\u201d If so, just wait until tomorrow, when another example of how many companies are with your privacy will be announced. Many consumers are seeking additional means to protect their privacy themselves, disregarding pious assurances from companies that obviously don&#8217;t care or don&#8217;t know how &hellip; <a href=\"https:\/\/zoha-islands.com\/blog\/which-privacy-tools-do-you-need\/\" class=\"more-link\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":5077,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,3,4,5,6],"tags":[],"_links":{"self":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts\/5059"}],"collection":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/comments?post=5059"}],"version-history":[{"count":0,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/posts\/5059\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/media\/5077"}],"wp:attachment":[{"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/media?parent=5059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/categories?post=5059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zoha-islands.com\/blog\/wp-json\/wp\/v2\/tags?post=5059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}