• How do you protect your privacy from the pervasive tracking and surveillance?

    Home » Forums » Outside the box » The Junk Drawer » How do you protect your privacy from the pervasive tracking and surveillance?

    Author
    Topic
    #2324098

    I have found this article today in the MIT Reader, a newsletter I subscribe to, but it is not necessary to subscribe to read this. So I am posting this comment to learn what others here make of the article and what they themselves do to preserve, as much as possible, their own privacy.

    https://thereader.mitpress.mit.edu/the-fantasy-of-opting-out/

    It begins of a description of how an hypothetical person is, in these times, tracked in many different ways through a normal day by a variety of means including, of course, what she does online, but also many different gadgets that she would use to get access to different things she may need or like to use. And, particularly in large cities, the widespread surveillance of where she is and what she is doing there by security cameras and the possible use of AI-type technology of face recognition, as well as by the use of her signal to locate and record where she uses her cellphone, etc. All of it accepted by her (if she is even aware of it), as by most of us, as necessary, for example for the deterrence of and protection from crime.

    Then the article continues with a discussion of whether there are practical ways to escape, at least to a substantial extent, from this endless surveillance, whether meant to help or protect people, or carried out with malevolent intent. And what this means for the preservation of freedom of expression and, therefore, of democracy.

    Excerpts:

    For all the dramatic language about prisons and panopticons, the sorts of data collection we describe here are, in democratic countries, still theoretically voluntary. But the costs of refusal are high and getting higher: A life lived in social isolation means living far from centers of business and commerce, without access to many forms of credit, insurance, or other significant financial instruments, not to mention the minor inconveniences and disadvantages — long waits at road toll cash lines, higher prices at grocery stores, inferior seating on airline flights.

    We can apply obfuscation in our own lives by using practices and technologies that make use of it, including:

    The secure browser Tor, which (among other anti-surveillance technologies) muddles our Internet activity with that of other Tor users, concealing our trail in that of many others.
    The browser plugins TrackMeNot and AdNauseam, which explore obfuscation techniques by issuing many fake search requests and loading and clicking every ad, respectively.
    The browser extension Go Rando, which randomly chooses your emotional “reactions” on Facebook, interfering with their emotional profiling and analysis.
    Playful experiments like Adam Harvey’s “HyperFace” project, finding patterns on textiles that fool facial recognition systems – not by hiding your face, but by creating the illusion of many faces.”

    Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

    MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
    Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
    macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

    • This topic was modified 4 years, 5 months ago by OscarCP.
    3 users thanked author for this post.
    Viewing 13 reply threads
    Author
    Replies
    • #2324142

      The continuing spread of facial recognition technology is the best argument I can think of for extending the use of masks that began with the pandemic.  🙂  Add a baseball cap and thick-rimmed glasses to further limit Big Brother’s ability to tell who’s popping into the screen.

      We keep our cell phones turned off except for emergencies or when we’re on the road and need to communicate with someone who’s not in the car.

      We don’t use “smart TV” features, but stick to watching live television or programs recorded on the DVR. Any streaming is done through a computer, never the TV set itself.

      Except for the occasional video chat session, we don’t use WiFi, either at home or on our phones when we’re out.

      We fortify our browsers with ad blockers and use privacy-oriented search engines like DuckDuckGo.

       

      2 users thanked author for this post.
      • #2324163

        I use Linux on the desktop and my laptops. No Windows telemetry of which to speak.

        For browsers, definitely not Chrome… I use Firefox now, with uMatrix and uBlock Origin, along with Cookie Autodelete to get rid of cookies as soon as the tab is closed (and all are removed when the browser shuts down). I use DDG as my first search go-to, with Startpage as a backup if DDG can’t get what I am looking for. The Google search plugin isn’t even enabled.

        I don’t use Google sites/services like Maps, Street View, Youtube while signed in (I use bookmarks instead of subscriptions), and certainly Gmail is just for throwaway stuff like notifications from sites (that don’t ask if I want notifications) that I will never read.

        I don’t use any of the other Google stuff. No Facebook or any of the other social media data slurpers either. I have facebook.com and facebook.net blocked in uMatrix.

        I have no Alexa or any other such digital assistant. My TV has a cathode ray tube, from an era when TVs were all dumb, and my household appliances are too. My satellite box has an ethernet port, but it’s never been connected.

        Until recently I used a dumb phone, but now I have been lured to the dark side, and the fun of folding, spindling, and mutilating the OS (initially Android) was certainly part of the choice. If I had to leave it stock… no way.

        I’m using LineageOS, a derivative of the same AOSP that forms the basis of Android, but without the Google stuff on top that does the spying (Google Play Services, mainly, but all of the Google apps feed into it). Location services (GPS) are kept off, and without Play to, er, play around with that stuff and “leak” the location even when the user has demonstrated intent to stop that, it should actually be off.

        I also have AdAway on there, which does a fantastic job of doing what its name says, for the entire device, not just the browser. It’s so good at blocking ads that Google banned it from the Play store, but it’s still on F-Droid. Since the ad networks are the also the spying networks, blocking the ads at the host level should also block the bulk of the spying that isn’t done through Play, which of course isn’t there either.

        Without Play there is no Google account associated with the phone, so using that as a persistent ID doesn’t work, so the picture that apps themselves can build is quite limited, isolated as they are from one another and the system. I don’t know if user-level apps can detect the IMEI or other things, but I would guess not.

        My car is too old to have a black box that records anything.

        Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
        XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
        Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)

        1 user thanked author for this post.
    • #2324177

      Besides the usual wise precautions, is anyone here familiar and can also comment on some of the use of those “obfuscation” tools available to make it hard for others to track us, identify us and have our actions recorded online, that are listed at the end of the excerpts from the last issue of the MIT Reader in the original article at the beginning of this thread? What is their purpose, how reliable are they, for which operating systems are they available, and so on?

      Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

      MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
      Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
      macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

    • #2324186

      is anyone here familiar and can also comment on some of the use of those “obfuscation” tools available to make it hard for others to track us, identify us and have our actions recorded online, that are listed at the end of the excerpts from the last issue of the MIT Reader in the original article at the beginning of this thread?

      Given that this is a ‘tech’ website, mostly about Microsoft’s Windows OS… what ‘obfuscation tools’ are you on about?

      I doubt AskWoody can help you choose the most effective face mask to confuse facial recognition cameras.

      However, if it’s about defeating Microsoft’s data slurping as much as possible from within the Windows OS then there’s already info available here and elsewhere.

      1. What are you trying to achieve?

      2. What have you tried?

      3. What’s stumped you so far?

      Perhaps then one or more can answer your rather vague question?

      Hope this helps…

      • #2324188

         

        Rick Corbett: “Given that this is a ‘tech’ website, mostly about Microsoft’s Windows OS… what ‘obfuscation tools’ are you on about?

        Please, read the original comment at the beginning of this thread. Those things are mentioned there. By the way, I’ve already said the same thing in the comment just above yours. As I’ve already stated, I do not know what OS they are for. That’s why I have asked if someone here knows anything about them and maybe also has an opinion of them.

        Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

        MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
        Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
        macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

        • This reply was modified 4 years, 5 months ago by OscarCP.
        1 user thanked author for this post.
    • #2324204

       

      Rick Corbett: “Given that this is a ‘tech’ website, mostly about Microsoft’s Windows OS… what ‘obfuscation tools’ are you on about?

      Please, read the original comment at the beginning of this thread. Those things are mentioned there. By the way, I’ve already said the same thing in the comment just above yours. As I’ve already stated, I do not know what OS they are for. That’s why I have asked if someone here knows anything about them and maybe also has an opinion of them.

      • This reply was modified 4 years, 5 months ago by OscarCP.

      Your questions OscarCP are very clear. And your text here is still alive; extra ordinary. From my point of view you will get on this matter mostly very subjective answers. This site being a tech site speaks for itself.

      In my many years of labor in the IT-protection there is always many things to do about privacy related tools and legislation. Sorry to say that the USA still has to improve a lot to protect the ordinary people.

      Much real good info you can get with the EFF ans BotsOfFreedom organisations, both originating out of private citizens initiative , and much in English aswell.

      To all in this Askwoody community:  Tonight a very peaceful and good transition to 2021 and stay Covid-free.  It is getting difficult here with far to many people that don’t obey regulations.

      * _ ... _ *
      2 users thanked author for this post.
    • #2324206

      I would like people read the “MIT Reader” article I linked in the original comment. It is not just about computer break-ins but the many ways in which we are watched and have our personal information vacuumed without us being asked or even being aware of it, that we are subject to for some good and some not so good reasons, so I don’t think one has to be a computer expert to be interested in what it is discussed in there.

      It is written by these two authors:

      Finn Brunton is assistant professor in the Department of Media, Culture, and Communication at New York University.

      Helen Nissenbaum is professor of information science at Cornell Tech

      Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

      MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
      Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
      macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

      1 user thanked author for this post.
    • #2324228

      He didn’t predict the tech, or get the timing right, but George Orwell’s 1984 is looking more and more prescient. He was clearly writing from a political viewpoint, so it was mainly about government surveillance, but nowadays it’s about a whole lot more than just that

      I don’t live in one of the great hubs of civilisation, so maybe I’m getting a slightly skewed view of things, but where I live, people don’t really care about these issues. They find it charming, not creepy, that Alexa remembers their birthdays. They think it’s only criminals who need to worry about government intrusion into their privacy. They spend their lives on Facebook. They click on the ads (so thoughtfully tailored to their needs) and the funny videos of cats chasing squirrels

      And, perhaps they’re right. Perhaps we’re the ones who are out of step, trying to stem the ever swelling tide of prying and intrusion as best we can

      One thing’s for sure though, and that is that it’s only ever going to get worse

      5 users thanked author for this post.
    • #2324241

      One thing’s for sure though, and that is that it’s only ever going to get worse

      You are right about that. Groups of people think we are living in the Matrix already; nice series of movies and “conspiracy thinking”, many will say.

      Perhaps there time to live after the Covidvirusses are handled by the stronger people.

      Repression and total control by data-slurping companies and governments will come for shure… (China India MiddleEast Russia and all others _yes, we too_ )

      * _ ... _ *
    • #2324280

      Don’t use Tor Browser for general browsing (Tor is the relay system, The Onion Router.  Tor Browser is a stripped down, secure, private version of Firefox).  It’s awful for general browsing; if you disable its security and privacy features to make it usable, it becomes Firefox used over Tor.  Yeah it’s more private but if a lot of users do this, Tor will begin bogging down with those attempting to get something they can get outside.  Some users really need Tor, I mean need it to stay safe and are willing to give up typical browsing ease.  If you go directly into Tor, your Internet Provider will know.  Privacy and suspicion, not so hot.  Articles recommending Tor Browsing are doing those who need it a disservice.

      Angst about your browser being unique is silly.  Use results from those checkers to learn about tracking but you can’t bury yourself in the crowd.  At the very least you need an IP to send and fill requests.  Use anything but Chrome, you’re in a much smaller pool.  Messing with user agents causes a lot of breakage.

      The very first thing anyone serious about reducing tracking should do is upgrade to Windows Pro or Enterprise and learn how to use gpedit. Services and Task Scheduler are in Control Panel>Administrative Tools, go through and turn off anything you don’t like.  Do frequent system restore points and document each change made.  Windows Firewall has easy switches to prevent various programs from calling out, even edge, turn off whatever you deem necessary.

      Don’t use Defender, why give MS even more of your info?  There are many good AV’s (an Internet Suite is not recommended, too many redundant settings).  Avast is a data broker, stay away.

      JMO, but I’d never consider Chredge; don’t install it, uninstall it, both are easy to do.  The dynamic duo of Google and MS?  Nope.  Firefox is a good private browser IF you make considerable modifications to the about:config settings.  Find Github’s ghacksuserjs.  OOB, FF is no different than Chromia.

      A system level ad blocker/anti tracker is great for stopping browsers and programs and the  OS from spreading you thin.  Browser independent, stops webRTC (usually needed for video calling, etc), which otherwise can’t be disabled in any chromium based browser.  AdGuard works very well, faster than their browser extension.

      Use a VPN, a REAL VPN if needed.  Pay for one.  Many of them have ad blockers and anti-trackers; if you do the other things, they aren’t needed but the VPN will dramatically stop the number of ads and redirects you get.

      A personal preference that indirectly affects privacy because it makes your interface much clearer, is installing Open Shell Start Menu (only the start menu.)  Brings back Win 7’s start menu, hiding that silly gigantic touch screen thing Windows ships with.

      For a taste of what can be done with no risk of hosing your system, try WinaeroTweaker, there’s a portable version.

      2 users thanked author for this post.
    • #2324328

      Please, read the original comment at the beginning of this thread. Those things are mentioned there. By the way, I’ve already said the same thing in the comment just above yours.

      I’ve read and re-read all posts but still waiting for you to mention the specific ‘obfuscation tools’ you’re so concerned about.

      Names or filepaths, perhaps?

      • #2324331

        I’ve read and re-read all posts but still waiting for you to mention the specific ‘obfuscation tools’ you’re so concerned about.

        Names or filepaths, perhaps?

        Five specific things are mentioned in the last paragraph of the first post.

        Four are software (browser/extensions).

        1 user thanked author for this post.
    • #2324367

      Interesting article from the MIT Press.

      The world has indeed changed since I attended high school in the early 70’s, where we were forced to use slide rules on tests, rather than the electronic calculators which were just coming to market.

      But like with the analogy of the “boiling frog” in the pot, we have turned into a totally tech driven society today.  It has constantly changed and evolved so gradually over the past 50 years or so, that most hardly noticed, or cared. I read Orwell’s “1984” in the 70’s. When that year 1984 arrived, we were mostly OK, but still in a Cold War. But no Big Brother yet!

      Anyone who has ever seen a “Jason Bourne” movie, or anything similar in that genre, understands what “going off the grid” entails. Get out of the city, smash your cell phone, no credit cards, cash only, “borrow” a car that’s not registered to you personally, avoid security cams, no logging into accounts online with your credentials, use the one at the library instead, etc. Fail at any one of those and whoever may be tracking you will track you down.

      That’s an extreme example, but my point is that unless you are willing to find your own “Walden Pond” somewhere and live out your life totally off the grid, and in isolation from modern society, it would be futile to become overly obsessed with obfuscation as a means to remain hidden and un-tracked by the “trackers”.

      I’m not sure that enough “obfuscating” could be accomplished that you could be totally hidden from the tracking that today is built into every action and transaction that we perform in society.

      Just my two cents! 🙂

      Carry on…

      Windows 10 Pro 22H2

      • This reply was modified 4 years, 5 months ago by JohnW.
      1 user thanked author for this post.
      • #2324373

        JohnW wrote “But like with the analogy of the “boiling frog” in the pot, we have turned into a totally tech driven society today. It has constantly changed and evolved so gradually over the past 50 years or so, that most hardly noticed, or cared.

        Exactly right!

        To be equally clear, I am not interested in going completely “off the grid”, as if I were a fugitive trying to evade the police of some oppressive and technically savvy government, which I am not. But I think it is worth discussing practical ways of substantially limiting, rather than stopping altogether, the success others may otherwise have in surveying and tracking our lives without our express permission.

        Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

        MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
        Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
        macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

        3 users thanked author for this post.
    • #2324388

      To be equally clear, I am not interested in going completely “off the grid”, as if I were a fugitive trying to evade the police of some oppressive and technically savvy government, which I am not. But I think it is worth discussing practical ways of substantially limiting, rather than stopping altogether, the success others may otherwise have in surveying and tracking our lives without our express permission.

      A few thoughts for starters…

      • Get a VPN, so that your actual IP cannot be linked and tracked by marketers as you use the web (legally).
      • Add reasonable tracker protection to your browser.
      • Get several email addresses. For example: One for conducting personal business, one for friends and family, one for spam (burner).
      • Don’t use your real name on web forums. Don’t use the same name everywhere.
      • Don’t use Gravatar.
      • Limit social media. Stay logged out unless actually using it. I only use Facebook, and at that it’s locked down to just family and friends, posts only viewable by family and friends. N0 public posts except main profile page.
      • Use only a local account for logging into your PC, not your Microsoft account.
      • Clear all cookies daily, except for those companies that have current accounts and are used frequently.
      • Use a land line phone number for all site registrations or transactions when required. Mobile number is only given out on a need to know basis.
      • Google is your friend. It’s OK to let them know about your entire life. 🙂

      Windows 10 Pro 22H2

      4 users thanked author for this post.
    • #2324464

      But I think it is worth discussing practical ways of substantially limiting, rather than stopping altogether, the success others may otherwise have in surveying and tracking our lives without our express permission.

      Yes, that’s right; and an open and fair democracy with transparent legislation for peoples rights and needs is the best wish for anybody this coming week and year. It’s not only a matter of IT  techniques and antivirusses, the mind and spirit is just that important. Anywhere.

      * _ ... _ *
      2 users thanked author for this post.
      • #2324469

        The MIT article is a good an open minded start for very basic thought and discussion in matters of daily life. Quote: “There is no simple solution to the problem of privacy, because privacy itself is a solution to societal challenges that are in constant flux.”…  So on the edge of being expelled, I will be watching tv on January 6…

        If you can take your covid19-vaccination, this illness is society threatening too.

        * _ ... _ *
        1 user thanked author for this post.
    • #2360781

      I heed much of the advice related in this thread. But as I state on my public regular bookmark page, it is ultimately that the Fourth Amendment to the United States Constitution is dying by a thousand cuts, with non-U.S.-governmental agencies [e.g.: Australia] achieving the “unreasonable” searches.
      The Fourth Amendment does not apply to Microsoft, Apple, or Google. But these corporations are what multi-millions of U.S. citizens are dependent.
      A VPN could help. But the VPN needs to be in a country which is not one of the “five eyes” countries the U.S.A. recruits to do the prohibited acts it cannot perform.
      As for me, I feel every country will surrender to the U.S.A. if pressured enough. So I will not pay for ‘fake security’ like a VPN.
      Essentially, the model of American jurisprudence has been catastrophically flipped. It is no longer “Innocent until proven guilty”, but “Guilty unless proved innocent.
      This I find abhorrent. But communicating with politicians that this should be prevented will likely result in, not an act introduced to limit the collection of this data, but the addition of the citizen suggesting the privacy revisions to surveillance lists. 😡

      Important links you can use, without the monetization pitch = https://pqrs-ltd.xyz/bookmark4.html
      3 users thanked author for this post.
    • #2360797

      I think vpn is probably fools gold, it’s just taking the problem and moving it upstream.  There is no way to avoid surveillance.  I think if you are looking at something you want private use tor otherwise its not private.  But even tor has zero day exploits, JavaScript, you get the idea.  Going off grid is great until you need to come back, what then?  I agree with the comparisons to 1984 and would also recommend the movie Enemy Of The State.  Made in the nineties take a look and then look around the world we have now.  Also depending on your point of view there are 14 eyes not only 5.

      1 user thanked author for this post.
    Viewing 13 reply threads
    Reply To: How do you protect your privacy from the pervasive tracking and surveillance?

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: