Advanced DIY Privacy for Every Woman
  • Introduction
  • Before we start
  • 1 - Identify your security risks
  • Security areas to prioritise
  • 2- Document security violations
  • Safety and security strategies
  • Securing a mobile phone or a tablet
  • FAQ on mobile phones
  • Securing your laptop/other connected devices?
  • 3 - Securing your connections
  • 4 - Securing your apps, software and internet services
  • 5 - Browsing the web
  • Social engineering and phishing
  • Internet browser, search engine and passwords
  • IP address, WIFI and emails
  • Social media: what to pay attention to!
  • Facebook, Twitter, Google, Foursquare
  • Apps and internet enabled apps
  • Online banking, billing account and other accounts
  • Protection measures
  • 6 - Documenting privacy violations
  • Voice calls and keeping a diary
  • 7 - Advanced security resources
  • Anti-virus, Firewall and Spyware
  • Secure internet browsing
  • Authentification
  • Encryption
  • Deleting your information
  • 8 - Glossary
  • How we put this guide together
  • Final words
Powered by GitBook
On this page
  • Internet browser
  • Search engine
  • Passwords

Internet browser, search engine and passwords

PreviousSocial engineering and phishingNextIP address, WIFI and emails

Last updated 7 years ago

Internet browser

A programme used to surf the internet

VULNERABILITIES

  1. Cookies

  2. Trackers

ACTION

  1. Clear your cookies every time you browse (through your browser’s Preferences > Settings)

  2. Disable and block third party cookies (Browser > Preferences/Settings > Privacy > Clear Cookies), install the add-on Privacy Badger

  3. Find out what is tracking you by running an anti-spyware tool (this can also clear cookies - See References “Advanced PC/Laptop Security” for recommended tools)

  4. Use a (eg. , )

  5. Browser Extensions (see References)

  6. Use HTTPS connections whenever possible (Brave has integrated )

Search engine

A Search Engine is a program that uses keywords a user types into a search field (the search box) to find information on the World Wide Web

VULNERABILITIES

  1. Search history is discoverable

ACTION

  1. If using Google/Yahoo/Bing and other search engines turn off search personalisation (Search Tools > All Results > Verbatim)

  2. Use HTTPS

Passwords

A password is a string of characters used to prove identity and access approval to enter a device, website or network.

VULNERABILITIES

  1. Tracking via cell service

  2. Spyware

  3. Phishing

  4. Find My Phone apps

  5. Internet-enabled apps

  6. Tracking app

  7. Mobile (bug)

ACTION

  1. Never, ever reuse passwords across sites / services. Use a different, unique, complex generated password for each login.

  2. Change your passwords regularly (monthly is recommended).

  3. Do not log-in to websites from a link in an email

  4. Do not trust emails asking for personal information, survey data, or anything else that could reveal information about you, no matter how professional they look

  5. Two-step verification (see References)

See this full and comprehensive article on

Use alternative search engines that don’t track your searches, i.e. ,

Use a password manager, with a strong unique password known only to you. eg. ,

How Internet Search Engines Work
DuckDuckGo
Startpage
Keepass
LastPass 3.0
Remove your saved passwords from a web browser
more secure web browser
Brave
TorBrowser
HTTPS Everywhere