Skip to main content

How do I protect my online privacy from 'surveillance capitalism'?


How do I protect my online privacy from 'surveillance capitalism'?

Chris wants to better protect his privacy. What can he easily do besides de-Googling his online life
Protecting your privacy online requires changes to the tools you use and the way you access information on the internet.
 Protecting your privacy online requires changes to the tools you use and the way you access information on the internet. Photograph: Science Photo Library/Alamy Stock Photo
Having read Edward Snowden’s revelations in the Guardian and in his book, I would like to protect myself from both the surveillance state and surveillance capitalism. I already use a VPN, and I am in the process of removing Google from my online life. What else should I be doing that’s reasonable for a home environment? Chris
Great timing! On Monday, the Electronic Frontier Foundation published a 17,000-word report on this topic. Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance, by Bennett Cyphers and Gennie Gebhart, covers both online privacy problems and the growth of real-word surveillance.
BOWM, for short, explains how personal data is gathered, brokered, and used to serve targeted advertisements. In theory, users should prefer useful adverts to irrelevant ones. In reality, it provides a stream of data to anyone who wants it. Most of us, I suspect, don’t object to the ads as much as to the vast infrastructure used to deliver them. Non-targeted ads are fine with me.
As the report points out, when you visit a website, data associated with your online identity will be sent to anyone interested in bidding in an auction to show you a targeted advertisement. A data-snorting company can just make low bids to ensure it never wins while pocketing your data for nothing. This is a flaw in the implied deal where you trade data for benefits.
You can limit what you give away by blocking tracking cookies. Unfortunately, you can still be tracked by other techniques. These include web beaconsbrowser fingerprinting and behavioural data such as mouse movements, pauses and clicks, or sweeps and taps.
Data brokers can try to connect whatever information they get to data that you are giving away in other areas. This might include your email address, mobile phone number, location, credit card and store card numbers, your car’s number plate and face recognition data. Some of this information may have been purchased from third parties.
You probably handed over your email address to get coffee-shop wifi or to register on various websites. You probably gave some social media sites and app-based services your phone number. You used your credit card to buy things online, and provided your home address for deliveries. Your smartphone is constantly giving away your location. Even if you turn off location tracking, your phone can be found by triangulating from cellular masts or by companies that have beacons listening for potential wireless or Bluetooth connections.
Even if you could avoid all the real-world trackers, you probably have smartphone apps that have access to all sorts of personal data and keep “phoning home”. Some of these apps may know how many steps you have taken, your heart rate, and how you slept, among other things.
As BOWM points out, real-world identifiers can last a lot longer than your browsers or even your devices. Your main email address, phone number, credit card number and car number plate don’t change very often. Good luck changing, or disguising, your fingerprint and face recognition data. “Gait recognition” is already being used in China. You can run but you can’t hide.
Today, we are past the stage where it’s a technology problem. Only governments can protect our privacy by banning the collection of data and giving us the rights both to prevent its collection without explicit permission, and to delete data that has already been collected. The EU’s GDPR (General Data Protection Regulation) was a baby step in the right direction. BOWM also mentions Vermont’s data privacy law, the Illinois Biometric Information Protection Act (BIPA) and next year’s California Consumer Privacy Act (CCPA). We need many more things like this, but I don’t expect we’ll get them in the UK – especially not if we’re outside the EU.
In any case, the game looks like moving on from browser-based surveillance to exploiting data from smartphones, smart watches and “Internet of Things” devices, with smart cars and smart roads to come. And rather than just flogging you stuff, the new threats include manipulating behaviour, as Shoshana Zuboff discusses at length in The Age of Surveillance Capitalism.

Browser choices

mozilla firefox logo
Pinterest
 Try the Mozilla Firefox browser if you’d like to try and avoid Google’s Chrome or the open-source Chromium technology it is built on. Photograph: Mozilla
Google pioneered surveillance capitalism and it still dominates the market. According to Ghostery privacy extension-maker Cliqz, quoted in BOWM, Google collects data on more than 80% of measured web traffic, which is far more than Facebook or anybody else. It’s not enough to avoid Chrome and Google’s web properties because its trackers are on most other popular sites as well. You should therefore install Google’s “opt out” cookie in your browsers and pause data collection in My Activity.
There are lots of alternatives to Google Chrome, the main one being Mozilla’s Firefox. It’s the only major browser that is fully open source and not controlled by one of the web giants. It has some privacy features built in, such as tracking protection, and “containers” that can isolate privacy-threatening websites from other tabs. Multi-account containers let you operate two or more Twitter, email, Facebook or other accounts from a single browser.
But Firefox aims to provide ordinary users with a good online experience, where websites work as intended. If you take privacy more seriously, you will want to install a few extensions, and Mozilla has some recommendations.
Tor, the original anti-surveillance browser, is based on an old, heavily modified version of Firefox. However, it is more complicated to set up, and uses distributed relays to hide your internet address, which makes it rather slow. It’s less suitable for ordinary users.
Most other browsers are now, like Chrome, based on Google’s open source Chromium. Once enough web developers started coding for Chrome instead of for open standards, it became arduous and expensive to sustain alternative browser engines. Chromium-based browsers now include Opera, Vivaldi, Brave, the Epic Privacy Browser and next year’s new Microsoft Edge.
True to its name, Epic tries to maximise your privacy. It defaults to a sort of private-browsing mode, anonymises searches and clears browsing data when you quit. Epic has removed several Google features that could leak sensitive data including URL checks, URL tracking and error reporting. You will lose some features, such as auto-translation and spell checking. But there are often trade-offs between privacy and convenience, and Epic is still worth a look.
I’ve been using the beta version of Chr/Edge and recommend it as your second or third browser, because Microsoft has put a lot of effort into de-Googling the Chromium code. Microsoft may get some personal data in return, but I already use Windows 10, Defender, Outlook, OneDrive and Microsoft Office as a paying customer, not as an unwilling victim. Also, Microsoft’s business is based on selling software and services, not, like Google’s, on surveillance.
People who disagree are welcome to use Linux (free) or buy a Mac (expensive), but the US Defense Department and most major corporations are using Windows 10.

Extensions and plugins

The EFF’s Privacy Badger browser extension is a good place to start.
Pinterest
 The EFF’s Privacy Badger browser extension is a good place to start. Photograph: EFF
Bennett Cyphers, co-author of BOWM, works on the EFF’s privacy-oriented browser extension, Privacy Badger. It’s a good option for most users. It’s lenient to begin with, but learns as it goes along. People who want something more aggressive can try Ghostery, Redmorph or Disconnect. The last two also work on Android smartphones and Apple iPhones.
Ghostery doesn’t block anything by default, but you can set it to block things you don’t like and either whitelist sites or unblock certain services (eg Disqus, in my case) as required. Ghostery’s data sharing “is solely related to tracking technologies” and it’s turned off by default. Also, it’s now open source and owned by a German company, Cliqz, in which Mozilla has invested.
Raymond Hill’s uBlock Origin is a general-purpose blocker, and what it blocks depends on the lists installed. EasyPrivacy and the Malware domain lists are among the ones installed by default. If you want to block trackers or analytics systems, as Ghostery does, you will need to add more filter lists. Otherwise, be careful not to confuse uBlock Origin with either uBlock.org or AdBlock. uBlock Origin is efficient, non-commercial, open source, and completely free.
HTTPS Everywhere tries to make your browser use an encrypted connection, where websites provide the option. It’s a joint project by the EFF and Tor, and it’s also available for Firefox on Android. It can run into problems with “mixed content” pages where some elements are sent securely (https) while others are sent insecurely (http), but it generally works pretty well.
It doesn’t cost anything to try different browsers and different extensions, except a little time. However, bear in mind that, like smartphone apps, extensions can compromise your privacy instead of enhancing it. Always uninstall any you don’t really need.

Comments

Popular posts from this blog

Article from "The New York Times" Madagascar and Vanila plantations Photographs and Text by FINBARR O’REILLY AUG. 29, 2018

 Comment:  I once found a bag near a shopping Mall in Paris ....  It looked like a girl owned it because it was full of makeup bits and pieces and there were a lot of cards in it , one of which belonged to a buisness school and this had her name on it.  The student was from Madagascar and i was sighing to myself when i called the school and the receptionist wasnt helpful in finding the person i was looking for.  I went to the consolate or Embassy one morning , spending money on a Taxi in order to give the bag to a safe person working there.  The consolate reminded me of  consolates or embassies representing very poor countries ...   .... where is  all the money and wealth going ? SAMBAVA, Madagascar — Bright moonlight reflected off broad banana leaves, but it was still hard to see the blue twine laced through the undergrowth, a tripwire meant to send the unwary tumbling to the ground. “This is the way the thieves come,” sai...

Abigail Heyman’s Groundbreaking Images of Women’s Lives (from The New Yorker)

Photo Booth Abigail Heyman’s Groundbreaking Images of Women’s Lives By Naomi Fry November 1, 2019 “Houma Teenage Beauty Contest,” 1971. Photographs by Abigail Heyman In a two-page spread featured early on in “ Growing up Female ,” a photography book by Abigail Heyman, from 1974, two black-and-white pictures are laid out side by side. The left-hand photo shows a reflection of a little girl, from the shoulders up, gazing at herself in a bathroom mirror. The child, who is perhaps four or five, with dark, wide-set eyes and a pixie haircut, is separated from her likeness by a counter, whose white-tiled expanse is littered with a variety of beauty products: perfume bottles, creams, and soaps. These quotidian markers of feminine routine are accompanied by an element of fantasy; gazing at herself, the little girl stretches a slinky into a makeshift tiara atop her head. Seemingly mesmerized by her own image, she is captured at the innoce...

My mother's family life in Banglore as children (1930's onwards .... and before the Partitian

Life and opinions of Jahan Namazie/Azim Ali ....  written in the summer of 2018 They had this theory that children being small didn't need much food. The choicest food was given to the men, as they were the bread winners so they needed to eat well. The dastarkhan was laid with all the best dishes. The men were served first while the women and children waited patiently till the men finished eating and the leftovers the women and rest of the family ate. Lucky for us we did not practice this in our house. My mother believed men and women were equal and deserved the same opportunities. She made my brothers do house work as well as the girls which was shocking as men had to be waited hand and foot. Men never went into the kitchen or took care of the children. My father had broken the rules, he did the cooking and took care of the children. Every one made fun of him, but he had an excuse as my mother was disabled due to her arthritis and co...