tech:privacy_and_security_online
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
tech:privacy_and_security_online [2024/10/05] – créée Mathieu | tech:privacy_and_security_online [2024/10/05] (Version actuelle) – [Backing Up and Managing Personal Data] Mathieu | ||
---|---|---|---|
Ligne 4: | Ligne 4: | ||
Our lives are increasingly dependent on the internet and the data we associate with our identities. **Many of us still approach this situation naively**, without a clear understanding of what their online identity represents, the data connected to it, or the risks involved. | Our lives are increasingly dependent on the internet and the data we associate with our identities. **Many of us still approach this situation naively**, without a clear understanding of what their online identity represents, the data connected to it, or the risks involved. | ||
+ | |||
+ | <WRAP center round help 60%> | ||
+ | Une version française de cette page [[tech: | ||
+ | </ | ||
+ | |||
Use the information found here at your own risk: **my advice and suggestions should never replace your understanding of the issues** and a strategy tailored to your particular situation. I believe them to be relevant, but **applying them without understanding could lead to more insecurity** than anything else. | Use the information found here at your own risk: **my advice and suggestions should never replace your understanding of the issues** and a strategy tailored to your particular situation. I believe them to be relevant, but **applying them without understanding could lead to more insecurity** than anything else. | ||
Ligne 83: | Ligne 88: | ||
In general, **avoid free services like the plague**, which will probably be financed by selling your data. However, for occasional use, and if you can accept a reduced speed (it's slow!), **[[https:// | In general, **avoid free services like the plague**, which will probably be financed by selling your data. However, for occasional use, and if you can accept a reduced speed (it's slow!), **[[https:// | ||
+ | |||
+ | |||
+ | ==== TOR network ==== | ||
+ | |||
+ | <wrap danger> | ||
+ | |||
+ | <WRAP center round important 90%> | ||
+ | TOR is a protocol that allows for a very high level of ASP, but it comes with significant constraints. It is not a solution for everyday use or a typical threat model. | ||
+ | </ | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | **This solution is by far the most secure and anonymous for connecting to the internet**. However, it comes with significant constraints: | ||
+ | |||
+ | * You can expect **a substantial slowdown in your connection**, | ||
+ | * Some sites and services blacklist TOR exit nodes, either to prevent anonymity or avoid abuse, | ||
+ | * Although TOR is highly secure by default, **it's easy to make a mistake that will ruin all your efforts** for anonymity, for instance, if you log into a service that holds information about you (your bank, your email, Google, Facebook...), | ||
+ | * Besides human errors, there are attacks that TOR does not protect against, such as [[https:// | ||
+ | |||
+ | In short, TOR is the most technically effective solution for security and anonymity but requires a good understanding of the underlying issues to use it safely. I may create a [[: | ||
+ | |||
+ | ====== Choosing a Browser ====== | ||
+ | |||
+ | The browser is the window through which you access the internet. Google Chrome, Safari, Firefox... obviously, **it is a crucial piece in our approach**. | ||
+ | |||
+ | Most people use either the default browser on their system, such as **Edge** or **Safari**, or **Chrome**, Google' | ||
+ | |||
+ | These three browsers are proprietary software, difficult to audit, and they collect private data about you without any way to stop it. Anyone concerned with ASP should avoid them entirely((Special mention to Safari, which is far more secure by default than Edge or Chrome. However, privacy is a different matter)). | ||
+ | |||
+ | ===== Brave ===== | ||
+ | |||
+ | <wrap safety> | ||
+ | |||
+ | [[https:// | ||
+ | {{: | ||
+ | |||
+ | If you're looking for an easy replacement for Chrome, Edge, or Safari without worrying about configuration, | ||
+ | |||
+ | However, there are reasons you might not want to choose Brave, starting with its integration of a cryptocurrency system((which can easily be disabled)). Some users prefer to avoid Chromium-based solutions, so as not to contribute to the near-monopoly of Blink((the underlying web rendering engine)) on the web, much like the days of Internet Explorer. | ||
+ | |||
+ | ===== Firefox ===== | ||
+ | <wrap caution> | ||
+ | |||
+ | [[https:// | ||
+ | {{ : | ||
+ | |||
+ | Firefox also has the advantage of promoting web diversity and interoperability, | ||
+ | |||
+ | Its default configuration is insufficient (from an ASP perspective). Here are [[tech: | ||
+ | |||
+ | I place Firefox in <wrap caution> | ||
+ | |||
+ | ===== Specialized Browsers ===== | ||
+ | <wrap danger> | ||
+ | |||
+ | Several other options exist: specialized browsers whose main goal is to provide a particularly secure and anonymous experience. | ||
+ | |||
+ | * **[[https:// | ||
+ | * **[[https:// | ||
+ | * **[[https:// | ||
+ | |||
+ | ===== Other Browsers ===== | ||
+ | |||
+ | Many other lesser-known browsers exist, both open-source and proprietary. Some are, of course, legitimate tools, so don't hesitate to read about them. However, beware of two proprietary browsers: | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | |||
+ | ====== Authenticating and Protecting Your Identity ====== | ||
+ | |||
+ | One of the main security challenges we face online is protecting our identity. If it hasn't happened to you personally, you've likely witnessed Facebook accounts being hacked, with the owner losing control, or passwords being stolen from a compromised site and used elsewhere to access other accounts. | ||
+ | |||
+ | The problem is complex, but good security practices can dramatically reduce the risk of falling victim. | ||
+ | |||
+ | ==== Password Manager ==== | ||
+ | <wrap safety> | ||
+ | |||
+ | <WRAP center round important 90%> | ||
+ | A password manager is essential, easy to use, and dramatically improves your security. | ||
+ | </ | ||
+ | |||
+ | Protecting your identity, on paper, is fairly simple: it //" | ||
+ | * **Strong passwords** (not '' | ||
+ | * **Unique passwords** for each site (or rather, each account). Otherwise, one security breach on a site can compromise all accounts using the same password. | ||
+ | |||
+ | {{: | ||
+ | |||
+ | Once again, **avoid proprietary software**: trust relies on open code. **Also avoid your browser’s internal password management**, | ||
+ | |||
+ | For most people, [[https:// | ||
+ | |||
+ | You'll need to protect access to this password manager with a... password, called a //master password//, which is also strong and unique. Fortunately, | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | <WRAP center round box 90%> | ||
+ | //A trick we recommend: create a sentence, such as "The best time to play basketball is in June." Take the first letter of each word, some in uppercase, some in lowercase, and add numbers you’ll easily remember. You’ll get the following result: Tbtpbij2366. That's a password only you can remember.// | ||
+ | </ | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | Once you’ve chosen a password, I suggest testing it on [[https:// | ||
+ | |||
+ | ==== Two-Factor Authentication - 2FA ==== | ||
+ | |||
+ | <wrap caution> | ||
+ | |||
+ | Two-factor authentication((commonly referred to as " | ||
+ | |||
+ | You’ve likely encountered this before, for instance, when websites send you a code via SMS when logging in. This is an extremely effective technique if implemented properly, and **you should enable it whenever possible**. | ||
+ | |||
+ | There are several implementations of 2FA, and while **all are more secure than single-factor authentication**, | ||
+ | |||
+ | * **SMS**: Often imposed, especially by banks, this is the weakest form of 2FA. The security and privacy of SMS are a joke, and it’s easy for an attacker to gain access. This method could also cause problems when trying to log in from an area with no cell network or if you lose your phone. It's favored((wrongly, | ||
+ | * **Email**: Working on the same principle as SMS-based 2FA, it's much less popular but significantly more secure. | ||
+ | * **TOTP**: You might be familiar with [[https:// | ||
+ | * **Physical keys**: You can also use physical keys with the U2F((Universal 2nd Factor)) or FIDO((Fast IDentity Online)) protocols, such as those sold by [[https:// | ||
+ | |||
+ | <WRAP center round info 90%> | ||
+ | **To summarize: | ||
+ | </ | ||
+ | |||
+ | <WRAP center round tip 90%> | ||
+ | You can use **a physical key or a TOTP token in Bitwarden**. | ||
+ | </ | ||
+ | |||
+ | ====== Communicating ====== | ||
+ | |||
+ | ===== Emails ===== | ||
+ | |||
+ | Email is **one of the oldest internet protocols**. As such, it was designed in a completely different context than the one we know today—a world where data theft, identity theft, and spam hardly existed—and is absolutely not built to address these challenges. | ||
+ | |||
+ | However, **email is at the heart of our digital identity**: we use it to authenticate with banks or governments, | ||
+ | |||
+ | Beyond the security issue, privacy is also crucial with email. Without going as far as this [[https:// | ||
+ | |||
+ | There are several ways to protect yourself from this intrusion, such as [[tech: | ||
+ | |||
+ | ==== Secure Providers ==== | ||
+ | <wrap safety> | ||
+ | |||
+ | A simpler solution is to switch to **a secure email provider that respects your privacy**. These are few in number and often paid, but they make **a significant difference** to your ASP. | ||
+ | |||
+ | * {{ : | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | |||
+ | ==== Anonymous and Secure Email ==== | ||
+ | |||
+ | <wrap danger> | ||
+ | |||
+ | Using the providers above places you in an infinitely better situation, from an ASP standpoint, than any mainstream provider, but **this does not guarantee complete anonymity**. For instance, [[https:// | ||
+ | |||
+ | This doesn’t give authorities access to the content of their emails, but it can still endanger a person or their activities. If you're concerned about this type of anonymity and want **something more absolute** than what the above providers offer by default, here are a few tips: | ||
+ | |||
+ | * With the **TOR browser**, connect to [[https:// | ||
+ | * **Do not reveal** this email’s existence to anyone, let alone its connection to you, | ||
+ | * **Never** use this email outside of TOR, and **always** use the onion service to access it, | ||
+ | * **Never** use this email for any activity related to you, even remotely. | ||
+ | |||
+ | Such an email account won't be useful for everyday life, but if you need **a truly secure and anonymous means of communication**, | ||
+ | |||
+ | ===== Instant Messaging ===== | ||
+ | |||
+ | The other major axis of online communication is instant messaging: Messenger, WhatsApp, Telegram, Signal, to name the most well-known. | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | To keep it simple, as much as possible, **use [[https:// | ||
+ | |||
+ | If you can’t use Signal (for example, if your contacts don’t use it), make sure to enable end-to-end encryption in the settings of your messaging app. | ||
+ | |||
+ | ====== Backing Up and Managing Personal Data ====== | ||
+ | <wrap caution> | ||
+ | |||
+ | **Backing up your data online**, using services like Google Drive, Dropbox, or OneDrive might seem like a good idea from a security standpoint. These services offer several useful features on top of the security provided by backups. | ||
+ | |||
+ | However, there are several problems with this approach: | ||
+ | |||
+ | * **All your data will be scanned**, indexed, and used to profile you and generate profit, | ||
+ | * **A synchronization service is not a backup**, and cannot replace one. If you accidentally delete an important file, it will also be deleted from your online sync. If ransomware encrypts your files to extort money in exchange for the decryption key, this encryption will also be propagated to your online sync. | ||
+ | |||
+ | That being said, **maintaining an up-to-date backup of your data is crucial for security**, unless you have no important data stored digitally. | ||
+ | |||
+ | Several approaches can help circumvent these issues: | ||
+ | |||
+ | * Making backups on **physical media**, such as external hard drives or USB keys. This is a viable approach, but it becomes quite complex when considering the need for regular backups, stored off-site to protect against risks like theft or fire. **This approach requires a lot of discipline and regular rotation of media**, making it a fragile and difficult strategy to implement. | ||
+ | | ||
+ | * Using an online service, such as those mentioned above, but **encrypting your data** before uploading it to the service. This is a perfectly viable approach, though somewhat complex. You won’t be able to rely on the built-in sync features of mainstream services, and you’ll lose access to features that require unencrypted files (such as sharing or online editing). If you choose this route, it's better to use a " | ||
+ | {{ : | ||
+ | |||
+ | |||
+ | * <wrap danger> | ||
+ | |||
+ | ====== Going Further ====== | ||
+ | |||
+ | These general tips cover the essential daily concerns regarding ASP, and applying them will place you in a far better position than you likely are by default. | ||
+ | |||
+ | However, if these issues are important to you, many other stones deserve to be turned. | ||
+ | |||
+ | ==== A Secure Operating System ==== | ||
+ | |||
+ | The operating systems of our computers and phones can have a major impact on our security and privacy: | ||
+ | |||
+ | * **Windows is notoriously insecure**, though the situation has improved considerably. Its code is also almost entirely proprietary, | ||
+ | | ||
+ | * **Mac OS is relatively secure by default**, and far more so than Windows. However, in terms of privacy, Apple’s practices are just as questionable as those of Microsoft. | ||
+ | |||
+ | * <wrap caution> | ||
+ | |||
+ | * <wrap danger> | ||
+ | |||
+ | * **On smartphones**, | ||
+ | * By default, **iOS is more secure than most " | ||
+ | * " | ||
+ | * <wrap danger> | ||
+ | * **The cellular network itself is a security flaw**, as it **constantly tracks your location**. This location data is not hard to obtain and is available to anyone for a small price, | ||
+ | * <wrap caution> | ||
+ | * <wrap danger> | ||
+ | |||
+ | ==== Self-Hosting ==== | ||
+ | <wrap danger> | ||
+ | |||
+ | To avoid entrusting your data and its security to third parties, **one possible approach is to self-host**((yourself or a trusted third party)) **all the services that handle your data**, from email and backups to streaming movies or music. | ||
+ | |||
+ | This is an approach that’s **very effective but requires a lot of time and work**. For most people, it’s impractical—too difficult, too time-consuming, | ||
+ | |||
+ | If this is a path you want to take, I recommend sharing the efforts with a few friends to distribute the work and responsibilities. You'll learn a lot along the way, but you’ll also likely experience some lonely moments :) | ||
+ | |||
+ | <WRAP center round alert 90%> | ||
+ | <wrap danger> | ||
+ | |||
+ | This is an especially hostile sector, and any configuration error will be exploited faster than you think, potentially within minutes of your mail server going live. **Likely causing significant damage to both you and third parties**. | ||
+ | </ | ||
+ | |||
+ | ==== Everything Else ==== | ||
+ | |||
+ | I’ve tried to cover the main issues of online security and anonymity, but each application and service we use is likely to expose us to new risks. | ||
+ | |||
+ | Applying these tips should give you a solid foundation and a good sense of online security, enabling you to generalize them to other situations. The core principles remain the same, and similar techniques apply: | ||
+ | |||
+ | * Prioritize **open-source software and protocols**, | ||
+ | * **Limit the permissions** granted to third parties to the bare minimum necessary, | ||
+ | * **Minimize exposure** of your data as much as possible, | ||
+ | * Identify your needs, **model the risks** you face, | ||
+ | * **Know the limitations** of the security measures you rely on, | ||
+ | * **Formalize and systematize** your security practices to minimize human error. | ||
+ | |||
+ | ==== Modeling Risks and Developing Appropriate Strategies ==== | ||
+ | |||
+ | These tips are broad, and you may be wondering what is relevant or not in your situation. I won’t delve deeply into risk modeling here, but here are three profiles to help you identify your position: | ||
+ | |||
+ | === General Public === | ||
+ | <wrap safety> | ||
+ | |||
+ | You don’t have anything specific to hide, don’t handle sensitive data, and don’t want to invest a lot of time, effort, or money into these issues. You have no reason to be specifically targeted, either by a government or a private actor. **Your main concern is to avoid overly intrusive profiling and protect yourself from criminal attacks**. | ||
+ | |||
+ | * Use a password manager and activate 2FA where available, | ||
+ | * Use the Brave browser, or configure Firefox if you prefer to support web diversity, | ||
+ | * Move your email to Proton Mail, | ||
+ | * Think about a backup system for your data, keeping in mind that backups and syncs are not the same. | ||
+ | |||
+ | === Increased Security Needs === | ||
+ | <wrap caution> | ||
+ | |||
+ | You are involved in **activism**, | ||
+ | |||
+ | * In addition to a password manager, ensure you only use services compatible with 2FA and that offer either TOTP or physical keys, | ||
+ | * Besides transferring your email to a secure service, learn to use [[https:// | ||
+ | * Keep up-to-date, encrypted backups, with at least one stored off-site. | ||
+ | |||
+ | === Healthy Paranoia === | ||
+ | <wrap danger> | ||
+ | |||
+ | If you suffer from healthy paranoia, whether justified by your activities or the surveillance you’re under, or simply by your own twisted mind, the tips on this page are, of course, applicable but probably not enough. At a minimum, you should: | ||
+ | |||
+ | * **Encrypt all your data**, even locally, | ||
+ | * Master GPG, asymmetric encryption, and apply a strict policy of encryption and signature, | ||
+ | * Have **an anonymous email** created and accessed exclusively via TOR, | ||
+ | * Use **a free operating system**, such as Linux, **and** harden its default security settings with TOR, SELinux, and various [[https:// | ||
+ | * Consider using **a security and anonymity-focused OS, like [[https:// | ||
+ | * Leave or at least severely compartmentalize social networks, | ||
+ | * Learn to use **anonymity-oriented cryptocurrency**, | ||
+ | * Stay actively informed about technologies that keep you secure. If an encryption algorithm or service you use is compromised, | ||
+ | |||
+ | ==== Resources ==== | ||
+ | |||
+ | If you're looking for relevant resources on these topics, you can check out: | ||
+ | |||
+ | * The [[https:// | ||
+ | * They provide several practical tools: | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * You can also take a look at [[https:// | ||
+ | |||
+ | {{tag> | ||
tech/privacy_and_security_online.1728149780.txt.gz · Dernière modification : 2024/10/05 de Mathieu