tech:privacy_and_security_online
Différences
Ci-dessous, les différences entre deux révisions de la page.
Les deux révisions précédentesRévision précédenteProchaine révision | Révision précédente | ||
tech:privacy_and_security_online [2024/10/05] – [Password Manager] Mathieu | tech:privacy_and_security_online [2024/10/05] (Version actuelle) – [Backing Up and Managing Personal Data] Mathieu | ||
---|---|---|---|
Ligne 4: | Ligne 4: | ||
Our lives are increasingly dependent on the internet and the data we associate with our identities. **Many of us still approach this situation naively**, without a clear understanding of what their online identity represents, the data connected to it, or the risks involved. | Our lives are increasingly dependent on the internet and the data we associate with our identities. **Many of us still approach this situation naively**, without a clear understanding of what their online identity represents, the data connected to it, or the risks involved. | ||
+ | |||
+ | <WRAP center round help 60%> | ||
+ | Une version française de cette page [[tech: | ||
+ | </ | ||
+ | |||
Use the information found here at your own risk: **my advice and suggestions should never replace your understanding of the issues** and a strategy tailored to your particular situation. I believe them to be relevant, but **applying them without understanding could lead to more insecurity** than anything else. | Use the information found here at your own risk: **my advice and suggestions should never replace your understanding of the issues** and a strategy tailored to your particular situation. I believe them to be relevant, but **applying them without understanding could lead to more insecurity** than anything else. | ||
Ligne 86: | Ligne 91: | ||
==== TOR network ==== | ==== TOR network ==== | ||
+ | |||
<wrap danger> | <wrap danger> | ||
Ligne 92: | Ligne 98: | ||
</ | </ | ||
- | [[https:// | + | [[https:// |
+ | |||
+ | {{ : | ||
**This solution is by far the most secure and anonymous for connecting to the internet**. However, it comes with significant constraints: | **This solution is by far the most secure and anonymous for connecting to the internet**. However, it comes with significant constraints: | ||
Ligne 120: | Ligne 128: | ||
If you're looking for an easy replacement for Chrome, Edge, or Safari without worrying about configuration, | If you're looking for an easy replacement for Chrome, Edge, or Safari without worrying about configuration, | ||
- | However, there are reasons you might not want to choose Brave, starting with its integration of a cryptocurrency system((which can easily be disabled)). Some users prefer to avoid Chromium-based solutions, so as not to contribute to the near-monopoly of WebKit((the underlying web rendering engine)) on the web, much like the days of Internet Explorer. | + | However, there are reasons you might not want to choose Brave, starting with its integration of a cryptocurrency system((which can easily be disabled)). Some users prefer to avoid Chromium-based solutions, so as not to contribute to the near-monopoly of Blink((the underlying web rendering engine)) on the web, much like the days of Internet Explorer. |
===== Firefox ===== | ===== Firefox ===== | ||
Ligne 128: | Ligne 136: | ||
{{ : | {{ : | ||
- | Firefox also has the advantage of promoting web diversity and interoperability, | + | Firefox also has the advantage of promoting web diversity and interoperability, |
Its default configuration is insufficient (from an ASP perspective). Here are [[tech: | Its default configuration is insufficient (from an ASP perspective). Here are [[tech: | ||
Ligne 252: | Ligne 260: | ||
If you can’t use Signal (for example, if your contacts don’t use it), make sure to enable end-to-end encryption in the settings of your messaging app. | If you can’t use Signal (for example, if your contacts don’t use it), make sure to enable end-to-end encryption in the settings of your messaging app. | ||
+ | |||
+ | ====== Backing Up and Managing Personal Data ====== | ||
+ | <wrap caution> | ||
+ | |||
+ | **Backing up your data online**, using services like Google Drive, Dropbox, or OneDrive might seem like a good idea from a security standpoint. These services offer several useful features on top of the security provided by backups. | ||
+ | |||
+ | However, there are several problems with this approach: | ||
+ | |||
+ | * **All your data will be scanned**, indexed, and used to profile you and generate profit, | ||
+ | * **A synchronization service is not a backup**, and cannot replace one. If you accidentally delete an important file, it will also be deleted from your online sync. If ransomware encrypts your files to extort money in exchange for the decryption key, this encryption will also be propagated to your online sync. | ||
+ | |||
+ | That being said, **maintaining an up-to-date backup of your data is crucial for security**, unless you have no important data stored digitally. | ||
+ | |||
+ | Several approaches can help circumvent these issues: | ||
+ | |||
+ | * Making backups on **physical media**, such as external hard drives or USB keys. This is a viable approach, but it becomes quite complex when considering the need for regular backups, stored off-site to protect against risks like theft or fire. **This approach requires a lot of discipline and regular rotation of media**, making it a fragile and difficult strategy to implement. | ||
+ | | ||
+ | * Using an online service, such as those mentioned above, but **encrypting your data** before uploading it to the service. This is a perfectly viable approach, though somewhat complex. You won’t be able to rely on the built-in sync features of mainstream services, and you’ll lose access to features that require unencrypted files (such as sharing or online editing). If you choose this route, it's better to use a " | ||
+ | {{ : | ||
+ | |||
+ | |||
+ | * <wrap danger> | ||
+ | |||
+ | ====== Going Further ====== | ||
+ | |||
+ | These general tips cover the essential daily concerns regarding ASP, and applying them will place you in a far better position than you likely are by default. | ||
+ | |||
+ | However, if these issues are important to you, many other stones deserve to be turned. | ||
+ | |||
+ | ==== A Secure Operating System ==== | ||
+ | |||
+ | The operating systems of our computers and phones can have a major impact on our security and privacy: | ||
+ | |||
+ | * **Windows is notoriously insecure**, though the situation has improved considerably. Its code is also almost entirely proprietary, | ||
+ | | ||
+ | * **Mac OS is relatively secure by default**, and far more so than Windows. However, in terms of privacy, Apple’s practices are just as questionable as those of Microsoft. | ||
+ | |||
+ | * <wrap caution> | ||
+ | |||
+ | * <wrap danger> | ||
+ | |||
+ | * **On smartphones**, | ||
+ | * By default, **iOS is more secure than most " | ||
+ | * " | ||
+ | * <wrap danger> | ||
+ | * **The cellular network itself is a security flaw**, as it **constantly tracks your location**. This location data is not hard to obtain and is available to anyone for a small price, | ||
+ | * <wrap caution> | ||
+ | * <wrap danger> | ||
+ | |||
+ | ==== Self-Hosting ==== | ||
+ | <wrap danger> | ||
+ | |||
+ | To avoid entrusting your data and its security to third parties, **one possible approach is to self-host**((yourself or a trusted third party)) **all the services that handle your data**, from email and backups to streaming movies or music. | ||
+ | |||
+ | This is an approach that’s **very effective but requires a lot of time and work**. For most people, it’s impractical—too difficult, too time-consuming, | ||
+ | |||
+ | If this is a path you want to take, I recommend sharing the efforts with a few friends to distribute the work and responsibilities. You'll learn a lot along the way, but you’ll also likely experience some lonely moments :) | ||
+ | |||
+ | <WRAP center round alert 90%> | ||
+ | <wrap danger> | ||
+ | |||
+ | This is an especially hostile sector, and any configuration error will be exploited faster than you think, potentially within minutes of your mail server going live. **Likely causing significant damage to both you and third parties**. | ||
+ | </ | ||
+ | |||
+ | ==== Everything Else ==== | ||
+ | |||
+ | I’ve tried to cover the main issues of online security and anonymity, but each application and service we use is likely to expose us to new risks. | ||
+ | |||
+ | Applying these tips should give you a solid foundation and a good sense of online security, enabling you to generalize them to other situations. The core principles remain the same, and similar techniques apply: | ||
+ | |||
+ | * Prioritize **open-source software and protocols**, | ||
+ | * **Limit the permissions** granted to third parties to the bare minimum necessary, | ||
+ | * **Minimize exposure** of your data as much as possible, | ||
+ | * Identify your needs, **model the risks** you face, | ||
+ | * **Know the limitations** of the security measures you rely on, | ||
+ | * **Formalize and systematize** your security practices to minimize human error. | ||
+ | |||
+ | ==== Modeling Risks and Developing Appropriate Strategies ==== | ||
+ | |||
+ | These tips are broad, and you may be wondering what is relevant or not in your situation. I won’t delve deeply into risk modeling here, but here are three profiles to help you identify your position: | ||
+ | |||
+ | === General Public === | ||
+ | <wrap safety> | ||
+ | |||
+ | You don’t have anything specific to hide, don’t handle sensitive data, and don’t want to invest a lot of time, effort, or money into these issues. You have no reason to be specifically targeted, either by a government or a private actor. **Your main concern is to avoid overly intrusive profiling and protect yourself from criminal attacks**. | ||
+ | |||
+ | * Use a password manager and activate 2FA where available, | ||
+ | * Use the Brave browser, or configure Firefox if you prefer to support web diversity, | ||
+ | * Move your email to Proton Mail, | ||
+ | * Think about a backup system for your data, keeping in mind that backups and syncs are not the same. | ||
+ | |||
+ | === Increased Security Needs === | ||
+ | <wrap caution> | ||
+ | |||
+ | You are involved in **activism**, | ||
+ | |||
+ | * In addition to a password manager, ensure you only use services compatible with 2FA and that offer either TOTP or physical keys, | ||
+ | * Besides transferring your email to a secure service, learn to use [[https:// | ||
+ | * Keep up-to-date, encrypted backups, with at least one stored off-site. | ||
+ | |||
+ | === Healthy Paranoia === | ||
+ | <wrap danger> | ||
+ | |||
+ | If you suffer from healthy paranoia, whether justified by your activities or the surveillance you’re under, or simply by your own twisted mind, the tips on this page are, of course, applicable but probably not enough. At a minimum, you should: | ||
+ | |||
+ | * **Encrypt all your data**, even locally, | ||
+ | * Master GPG, asymmetric encryption, and apply a strict policy of encryption and signature, | ||
+ | * Have **an anonymous email** created and accessed exclusively via TOR, | ||
+ | * Use **a free operating system**, such as Linux, **and** harden its default security settings with TOR, SELinux, and various [[https:// | ||
+ | * Consider using **a security and anonymity-focused OS, like [[https:// | ||
+ | * Leave or at least severely compartmentalize social networks, | ||
+ | * Learn to use **anonymity-oriented cryptocurrency**, | ||
+ | * Stay actively informed about technologies that keep you secure. If an encryption algorithm or service you use is compromised, | ||
+ | |||
+ | ==== Resources ==== | ||
+ | |||
+ | If you're looking for relevant resources on these topics, you can check out: | ||
+ | |||
+ | * The [[https:// | ||
+ | * They provide several practical tools: | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * You can also take a look at [[https:// | ||
+ | |||
+ | {{tag> | ||
tech/privacy_and_security_online.1728149944.txt.gz · Dernière modification : 2024/10/05 de Mathieu