Recommendations for a secure internet environment

1 Installation of the operating system

We recommend to chose the Mint Linux operating system. You can install it on any Windows computer and any Mac computer and Rasberry pi.

– installation with hard disk encryption (separate password needed at system startup)

– chose the option to encrypt the user home folder as well

https://linuxmint.com

2 Choice of internet search engine

We highly recommend to chose the search engine from ixquick.com. Go to the settings and optimise the search engine for your needs.

The StartPage Proxy explained – https://www.ixquick.com/proxy/eng/help.html#hmb

3 Install and use the TOR browser

We also highly recommend to chose the TOR webbrowser for your daily work. Among other very good reasons for choosing the TOR webbrowser:

– go to https://dnsleaktest.com and see, where you are “located”

– the security settings are very restrictive

https://www.torproject.org

4 Install and activate the browser plugin GHOSTERY

Ghostery detects and blocks tracking technologies to speed up page loads, eliminate clutter, and protect your data.

https://www.ghostery.com

In other words: its not possible to track your preferences.

5 Install and use KeepassX for all your passwords on all your devices

The advantages are simply great! You can generate complex passwords, you can build groups for separating passwords for your business and for your private accounts, you can synchronise your passwords in KeePassX through all operating systems – WIN, Mac OSX, LINUX

https://www.keepassx.org

Most important: it is absolutely save!

KeePassX is an application for people with extremly high demands on secure personal data management. It has a light interface, is cross platform and published under the terms of the GNU General Public License.

KeePassX saves many different information e.g. user names, passwords, urls, attachments and comments in one single database. For a better management user-defined titles and icons can be specified for each single entry. Furthermore the entries are sorted in groups, which are customizable as well. The integrated search function allows to search in a single group or the complete database.
KeePassX offers a little utility for secure password generation. The password generator is very customizable, fast and easy to use. Especially someone who generates passwords frequently will appreciate this feature.

The complete database is always encrypted either with AES (alias Rijndael) or Twofish encryption algorithm using a 256 bit key. Therefore the saved information can be considered as quite safe. KeePassX uses a database format that is compatible with KeePass Password Safe. This makes the use of that application even more favourable.

6 Data storage / Cloud computing

If you are struggeling with the idea of having all your files stored on a server in the United States – be it on the servers of Apple, Google, Amazon or Microsoft – you are not alone with this unpleasant feeling.

What are the alternatives for file storage in the American cloud environment?

– Using your private hard drives and connect LIMA for synchronising all your devices with the storage

https://meetlima.com/index.php?lang=en

The Cloud that respects your privacy
Keep your personal files safe at home. Access them from anywhere. That’s the beauty of the Personal Cloud.

– Using the secure servers somewhere in Russia. Among several offers, we highly recommend to chose the services from MAIL.RU

The services includes: Email, Calendar, Contacts and file storage in the Cloud (on their servers)

Don´t get us wrong – we perfectly understand, if your first reaction now is scepticism. Glasnost369 has checked the security of these services and also contacted MAIL.RU directly. As a result we can confirm, that these services are 100% secure.
Nevertheless, we also can confirm, that MAIL.RU is following the laws of RUSSIA, which means, you might have to familiarise yourself with the thought, that the Russian FSB (Russian Secret Service) might have access to the storage of the service providers.

We decided to prefer the Russian FSB as our “exclusive partner”, instead of any American company.

We have to leave it up to you, which service or which solution you prefer to use for your file storage.

7 Chat programm for mobile phones

We are following the recommendations from Edward Snowden. Signal from Open Whisper Systems can be installed on any mobile device.

5 Online Privacy Tips From Edward Snowden
https://www.inc.com/larry-kim/5-online-privacy-tips-from-edward-snowden.html

https://whispersystems.org

“Signal is the most scalable encryption tool we have. It is free and peer reviewed. I encourage people to use it everyday.”
Laura Poitras, Oscar winning filmmaker and journalist

8 Social Network

We are perfectly aware, that many people are spending quite a lot of time in the social medias, such as Facebook, Twitter and others. We are not in the position to tell you what to do. We simply would like to make you think about, what you are posting in these accounts.

From the information your are giving in your social media accounts, it is very much easy to get a profile of you as a person. You are providing transparency about your personal data (also in pictures – the places where you are and where you are going), the people you are having contact with and your personal opinions and preferences.

All these information are collected and stored on the servers of Homeland Security, the NSA, the CIA and FBI.

If you like to delete your Facebook account, we have here listed some links for you how to do that.

IMPORTANT:
All your posts are not beeing deleted, if you choose to deactivate your Facebook account!

How to delete all Facebook wall posts from your timeline
https://www.itsupportguides.com/knowledge-base/facebook-articles/how-to-delete-all-facebook-profile-wall-posts/

How to remove all old posts from your Facebook Timeline


We are ready to support you. Please, feel free to contact us.

Leave a Reply