Your online privacy protections have been repealed. Here's a look at your options.
Image credit: blackpanther / Pixabay.com

Your online privacy protections have been repealed. Here's a look at your options.

This week, Congress voted to repeal rules proposed by the Obama administration that would restrict Internet Service Providers such as Comcast and AT&T from selling customers' browsing habits to advertisers and other parties without their approval. President Trump is expected to sign the bill repealing the rules, though it's not known exactly when.

Surfers of the modern internet have a few privacy options at their disposal, but not all are useful when an Internet Service Provider, or ISP, is in the business of selling your search and browsing history. Understanding the limitations of each option is an important first step in figuring out your own privacy strategy.

Let's take a look at some security features and technologies, and how they factor into protecting your browsing activity.

Browser Incognito Mode

Helpful for keeping websites out of your local browsing history and for testing user session and caching bugs, Incognito Mode (or Private Browsing) does not prevent identifiable information being sent across the ISP’s network. Everything this mode does only affects the device it’s being used on. Queries and site requests coming from your computer in Incognito Mode still work like normal traffic, though sometimes without cookies or other site-specific identifiers. Requests still come from your IP address, which your ISP can trivially associate with your personal identity. 

SSL/HTTPS

SSL, or Secure Sockets Layer, is a general term often used to refer to sites which use HTTPS, a protocol that encrypts traffic between your computer and the web server providing it. It’s not a perfect analogy, but you can think of HTTPS as an envelope for a letter, and normal unsecured HTTP as just sending a postcard. Without the strong encryption provided by HTTPS, your credit card details, passwords, and the contents of your web searches would be just as easily readable as if they were written on a postcard in the mail.

HTTPS gets us part of the way toward keeping an ISP from watching everything that we do. But when we make requests to websites, even ones with https:// in front of them, requests can still be observed -- just as there's a mailing address on the outside of an envelope. The domain name, at the very least, can still be discovered by tools that analyze network traffic. That’s because DNS, the address book of the internet, doesn’t use encrypted requests. When you request a given website, DNS servers take your request and hand back a numeric address that your browser can communicate with. If you’re using your ISP’s DNS servers, they can easily link your IP address to requests for websites. If you’re using a third party’s DNS servers, such as the ones that OpenDNS and Google provide, the traffic can still be inspected, and the request information observed. 

And, while it takes slightly more resources to accomplish, malicious network operators can attempt to spoof secure sites in order to collect personal information.

VPN

VPN, or Virtual Private Networking, takes us a step further in obscuring even our requests from the ISP. A VPN can be configured to take all of your computer's (or network’s) traffic, requests and all, to a different network. A VPN is an encrypted tunnel through which information flows, routed through your ISP’s network out to somewhere else on the internet. To continue our envelope analogy, a VPN is like an armored mailtruck that takes letters to and from a distant mail sorting facility, rather than the local one. And with the recent decisions by Congress to allow ISP’s to track and monetize browsing data, this sounds like a pretty good option for people in the US wanting to keep their information as private as possible.

But what we get in terms of privacy from using a VPN to tunnel through the ISP’s network, we have to compensate for on the other end. Effectively, we’re pushing the trust in our network out to the very end, where the VPN tunnel actually connects to the internet. If you’re only trying to keep Comcast from finding out you’re a die-hard Warriors fan, a VPN of most any type would probably get the job done. But the question remains as to what network your data ends up on. 

That exit network can still be observed by its owner, and depending on how honest or enterprising they are, they could sell your request data, correlated with your other activity visible to them. There are quite a few free and low-cost VPN Providers out there who are perfectly content to track your activity and traffic and serve you ads based on that. 

So with a VPN, the question remains, how do we trust the far end? And the unfortunate answer is, unless you’re in the enviable position of having direct access to the internet backbone, you can’t. There are some reasonable options available to you — but as with most things, they’re based on the level of trust you personally have in whatever system hosts your VPN. 

You could configure your own VPN server, using basic Linux command line skills, on a network you trust, using software such as Streisand or Algo. Many cloud hosts are probably safe(ish) to set up a server on and send your traffic to — Azure, Google, Linode, and so forth. Other hosts, such as DigitalOcean and Vultr may be an option, as well. But cloud hosts may record and monetize their traffic too — and most of them have bandwidth limits for servers in their clouds. 

You may choose to use a VPN host in another country, but with that comes other concerns (and the inconvenience of appearing to be outside of the US for shopping and streaming purposes). 

Or, you could sign up for a paid VPN service, which ostensibly has a stake in staying reputable. A popular option for this is Cloak.

Tor

Another option is to use the Tor network, which takes your computer's traffic and routes it around a network of other computers, or nodes, in order to obscure the contents and the origin. But Tor has its drawbacks, too -- it can affect the speed of your browsing, it sometimes can suffer the same problems as an out-of-country VPN, and sometimes, Tor exit nodes can be malicious, set up for the express purpose of observing what is intended to be private traffic.

Trust

The point here is that there's no one magic bullet for guaranteed privacy and security online. Combining some of these options, you can get close -- but at a cost of convenience. What's important with all of these options is that you do research to determine if you trust them.

And of course, no privacy strategy is complete without the basics -- so make sure you're up to speed with Computer Security and Internet Safety Fundamentals. And if you're curious about the IT security world, check out IT Security Career Paths and Certifications.



Dr Olga Lazin

VICE PRESIDENT - PROFMEX CONSORTIUM FOR RESEARCH ON MEXICO

3 年

Check out my recent book, here is the Backcover, with ISBN: Exhilarating read: Too, AMLO ended the “rights” of the FBI, CIA, etc. to carry guns for self-defense in Mexico.?And AMLO broke the U.S.-Mexico Treaty by throwing some secret U.S. documents into the air to reveal (“inadvertently”?) to Mexican criminals some top secret information that could only help them learn how, where, and with whom U.S. agents operate. The Romanian SRI,descendent of the dreaded Securitate is still lacking transparency. ?? Hugs

  • 该图片无替代文字
Scott Reese

Server and Storage Manager at Michigan Supreme Court

7 年

This is really a non-story. The current action does repeal rules "not laws" proposed by the previous administration, but they are rules THAT WERE NEVER ENACTED. These rules were to take effect soon, but now they won't. So NOTHING CHANGES. Trump has not taken anyone's privacy away, nor granted permission to ISPs to do anything they weren't already allowed to do (and were already doing). Keeping the rules as they are (not as they were proposed to be) just keeps the rules the same for Verizon and AT&T as they are (and would have continued to be) for Facebook, Google and Yahoo.

Christopher Minn

Passionate SaaS & Marketing Strategist | Expert in Boosting Engagement & Driving Growth

7 年

Cracking image Scott

John Derick

Musician Producer/ Medical Transporter

7 年

Thanks for sharing this.

回复
Pat Fortier

Owner, Field service technician

7 年

But Facebook and Google have been doing this all along? Why are you only now bothered that Verizon, ATT, etc, have a level playing field as google and Facebook? Sorry, but I do not remember seeing the outrage over google and Facebook doing this "sale" over the past years. Help me out here.....

要查看或添加评论,请登录

Scott Simpson的更多文章

  • Explore Linux on LinkedIn Learning

    Explore Linux on LinkedIn Learning

    For those starting to learn about Linux, it can seem overwhelming even figuring out where to begin. My LinkedIn…

    2 条评论
  • A Summer of Learning

    A Summer of Learning

    I spend a lot of time down in the weeds of technologies that I teach. When I'm not working on course design, I'm…

    1 条评论
  • Learning Linux with LinkedIn Learning

    Learning Linux with LinkedIn Learning

    #LinkedInLearning is a great place to start learning about Linux. We’ve got over 3700 videos making up over 130 courses…

    4 条评论
  • 3 Tips to Protect Yourself from the KRACK Attack

    3 Tips to Protect Yourself from the KRACK Attack

    By now, you may have heard about Monday's announcement that part of the WPA2 protocol, which secures WiFi networks, has…

    1 条评论
  • New Course: Building an Ubuntu Home Server

    New Course: Building an Ubuntu Home Server

    Building a home server is a great way to learn about Linux, and it provides you with some really convenient services…

  • Linux Lab 2: Which Distro?

    Linux Lab 2: Which Distro?

    Part of the confusion faced by Linux beginners is that there's so many different distributions of Linux available, and…

  • New Course: Browsing the Web Securely

    New Course: Browsing the Web Securely

    Recent legislation in the United States, which scrapped proposed privacy regulations for Internet Service Providers…

  • Linux Lab 1: Overview

    Linux Lab 1: Overview

    Learning Linux isn't quite the same as learning Photoshop, or Excel, or another software product. Often, a software…

    1 条评论
  • Exploring the Amazon Echo

    Exploring the Amazon Echo

    I bought an Amazon Echo, and I love it. I know, I know, I'm supposed to be an Apple guy, but after a few years of…

    32 条评论

社区洞察

其他会员也浏览了