Topics

late

AI

Amazon

Article image

Image Credits:Bryce Durbin / TechCrunch

Apps

Biotech & Health

mood

an illustration of an underground tunnel using mostly green, yellow and black, with the tunnel exit in the near distance

Image Credits:Bryce Durbin / TechCrunch

Cloud Computing

commercialism

Crypto

a screenshot showing AdBlock browser extension in a web browser, active, and blocking ads on a search page.

An ad blocker prevents ads — and their privacy-invading tracking code — from loading on websites and in search results.Image Credits:TechCrunch (screenshot)

Enterprise

EVs

Fintech

a screenshot showing the settings menu for iCloud Private Relay, which reads in part: “Private Relay hides your IP address and browsing activity in Safari and protects your unencrypted internet traffic so that no one-including Apple-can see both who you are and what sites you’re visiting."

iCloud Private Relay hides your browsing activity in Safari and other apps to prevent snooping on your web traffic.Image Credits:TechCrunch (screenshot)

Fundraising

Gadgets

Gaming

a screenshot of the BBC News website loading in the Tor Browser from its .onion domain, which is accessible only using Tor

The BBC News website, which is accessible through the Tor Browser. The dark web doesn’t have to seem scary.Image Credits:TechCrunch (screenshot)

Google

Government & Policy

Hardware

Instagram

Layoffs

Media & Entertainment

Meta

Microsoft

Privacy

Robotics

Security

Social

Space

startup

TikTok

Transportation

speculation

More from TechCrunch

Events

Startup Battlefield

StrictlyVC

Podcasts

video

Partner Content

TechCrunch Brand Studio

Crunchboard

reach Us

If you ’ve heard that a VPN provider can help oneself protect your privateness and security measure online , don’t believe the hype . The truth is thatmost people do n’t in reality need a VPN .

By funneling all of your internet traffic through their own servers , VPN providers give away their customers to the very concealment risks they exact to help defend against , including having their net browsing records steal by cybercriminals or obtained by legal order .

That ’s why if youthink you need a VPN , we ’ll show you how toset up your own individual and encrypted VPN server .

If you ’re in the absolute majority who do n’t require to use a VPN , there are still easy and effectual fashion to reduce the track of data that you result behind as you range the web . Some of these way include the use of simple tools in your browser app that can automatically prevent online trackers from hoard information about you to begin with , and encrypting your web browsing traffic that spend a penny it more difficult for anyone to spy on the sites and services you access .

There are no one - sizing - fit - all solutions or a cure-all for out-and-out privacy . Instead , all of these simple step can provide extra and meaningful privateness as you use the web , and we ’ll explicate how .

Install and use an ad-blocker

Love them or hate them , advert blocking agent are an authoritative security and privacy defense for any on-line user . Eventhe FBI suggests using an advertizing blocker , cave in the hike of malicious ads used for scams , sham , andthe delivery of malware and spyware .

Ad blockersare World Wide Web browser app extensions that mechanically prevent ads from laden on web site and in search result . The obvious upside is that your ocular browsing experience will ameliorate , but advertizement blockers also stop your web browser app debase the underlying trailing codification that ads rely on to collect information about you . By blocking the code , ad companies ca n’t give chase the websites you visit as you surf the vane , which makes it more difficult for the ad and technical school companies to infer your tastes and interest and otherwise monetise your graze data point . ( Of course , you could always temporarily switch off your ad blocker on any website . )

Using an ad blocking agent is one of the most effective ways of preventing the absolute majority of on-line tracking by making it much more difficult for ad and technical school giants to know which websites you visit as you browse the web .

One of the best small - memory ad blocking agent for web browsers isuBlock Origin , which work out in most modern browsers , and its computer code is open source ( allowing anyone to take care at the reservoir code to make trusted it ’s safe to use).AdGuardalso has anopen sourcead blocking agent for a variety of devices and program . think back to always download from trusted and verified sources , like their prescribed Sir Frederick Handley Page , before installing .

Once you ’re set up with an advert blocker , the on-line rights radical Electronic Frontier Foundation has a cock calledCover Your Tracksthat lets you accent - screen your internet browser ’s anti - tracking defenses and evidence you what you’re able to do to help ameliorate them . This otheronline open source toolis an easy way to quickly test your ad blocker on any machine .

Use an encrypted DNS provider

Almost every site on the net today can be delivered to your internet browser over an encrypted connexion ( cognise as HTTPS ) , which foreclose anybody else on the net from seeing what stretch on your concealment or tampering with it before it engender there .

But because of the way that the internet inherently functions and routes your information around the Earth ( through a public and global arrangement called DNS ) , you could still leave alone behind a phonograph recording of the specific website you inflict because DNS traffic has historically largely been unencrypted .

For most , your unencrypted DNS traffic — which can reveal which websites you ’re visiting and the apps you ’re using — typically rout through your cyberspace supplier , which , like advertisers and tech giants , can monetize and sell that data or make your information available to request legal authorities .

switch to an encrypted DNS avail is fairly prompt and simple , and it can have immediate event .

Some browsers ( likeChromeandFirefox ) began write in code DNS dealings by nonremittal back in 2020 , and have long admit option to use an encrypted DNS provider , such as Cloudflare and NextDNS , to plow DNS dealings alternatively of your local net supplier .

You should be aware of how long the provider retains your information ; some of the big DNS providersprovide reasonable security measure and concealment assurances . Also , if your DNS supplier briefly goes down , your internet bodily process will suffer until the problem resolves or you trade your DNS supplier . This is also why pluck a reputable DNS supplier can be helpful .

you could go beyond just your web web browser ’s options by changing your DNS in the options for your gimmick , so that all of the DNS traffic on your machine gets encrypted . If you want all the devices on your home electronic web to take advantage of encrypted DNS , you could prefer to change the DNS options on your web router , too .

A multi-hop service, like Apple Private Relay, can have privacy benefits

A core problem with VPNs is that you have to commit a single provider that it wo n’t trade or snoop on your data , or provide it to someone who will . Since 2021 , Apple has countenance its paying customer to stick more private online through its “ multi - hop ” service callediCloud Private Relay , which send a user ’s encrypted net dealings through two disjoined cyberspace relays ( or “ hops ” ) , let in one that is n’t feed by Apple .

Because iCloud secret Relay uses two disjoined internet relays to route a drug user ’s dealings , this prevents either of the cyberspace electrical relay , include Apple , from being able-bodied to see or analyze your net traffic . That also mean that requesting law enforcement bureau can not get your information from a unmarried internet relay ; they instead have to demand the information from both electrical relay . Apple ’s partners , like Cloudflare , help to provide the multi - hop relay race service .

iCloud individual Relay assist to protect both entanglement and app traffic on your Apple equipment , and is usable for Apple customers who pay off for Apple ’s premium iCloud+ service of process . iCloud Private Relay is n’t available in all regions , such as rural area like China and Russia , where internet freedoms are considerably limited .

While services like iCloud Private Relay offer some seclusion benefits , beware of non - reputable providers that purport to bid multi - hop service of process or make other claims that can not be independently affirm .

Tor is the gold standard for online anonymity

Wherever you are in the world , using Tor is one of the universally best tools for allowing users to graze the web freely while bypass censorship and deflect surveillance .

For some hoi polloi , Tor is synonymouswith the “ dark web,”which some mechanically ( and wrongly ) conflate with criminalness . In reality , Tor is a privacy putz used every day by journalists , researcher , militant , and anyone else who wants to browse the WWW with a eminent degree of privacy and anonymity .

You might want to browse the web anonymously foranyreason , but this can include searching the web without desire the hunt locomotive ( or anyone else ) link up you to those hunting resultant , or just access a word website or resource that might be banned by a government or regional assurance .

Instead of relaying your data through a single virtual tunnel ( like a VPN ) or through two separate relays ( like a multi - hop divine service ) , Tor solve by encrypting and routing its users ’ net traffic multiple times through thousands of servers set up around the humankind . This way , the user ’s internet traffic is shielded from everyone else on the web as well as the regular net . As such , using Tor is often slower than the steady internet and is not designed to be used for accessing gamy - bandwidth services , like euphony or video streaming .

Most people use Tor bydownloading and race the Tor web browser , a custom - made edition of Firefox , in which anything that hap in that web browser windowpane in private route over the Tor web . Other effectuation of Tor are available , including roving apps .