The best browser plugins to protect your privacy. Anti-Spying Plugins

Internet security involves the use of programs. In this article I will give a short overview of such programs (plugins).

The problem of total surveillance of a user on the Internet was discussed earlier. The previous article was devoted to tools that allow you to manage and erase cookies that are used to track the user. However, deleting cookies is not enough because... they will arise again. Therefore, in addition to deletion, software tools for blocking and other methods of tracking you online are important. I will list some of them.

Review of anti-tracking plugins for your browser

(Chrome,IE, Firefox) - a product of Google. Disables personalization of online advertising based on cockies. The plugin works immediately after installation and does not require configuration (at least for Chrome).

(Chrome, Firefox, Safari) - prevents Twitter, Facebook, Goole and other web resources from following you online.

(Chrome,IE9, Firefox,Opera, Safari) - does not allow sending data about you

(Internet Explorer, Firefox, Google Chrome, Safari) - the most multifunctional plugin. Provides an easy way to control websites that track you. Makes it possible to identify and block any tracking carried out not only through cookies, but also using scripts and other methods. Shows you which companies are following you on a specific website and gives you the opportunity to learn more about them.

It’s up to you personally to decide whether to use such plugins or not, but you should at least know about their existence.

Despite the cancellation of Snowden's first public appearance in Russia, his advice on maintaining privacy on the Internet is becoming more relevant every day. collected recommendations from the most famous former US intelligence officer on how to protect yourself on the Internet.

1. Encryption of voice calls and text messages. Snowden is an absolute proponent of encrypting all content stored and transmitted. Nowadays there are many applications that have encryption functions. Moreover, among them there are common and well-known instant messengers, such as WhatsApp, Telegram, ICQ. By the way, the most popular - WhatsApp - introduced full end-to-end encryption in April 2016.

Snowden himself calls Signal his favorite messenger for communication (available for and), which, as he wrote on his Twitter, he uses every day. The application is being developed by Open Whisper Systems, which also offers call encryption.


2. Hard drive encryption. In addition to securing your mobile devices, the former CIA agent also advises securing your computer, particularly your hard drive. You can find instructions on how to do this on the Internet. Usually special software is used. For example, for Windows there is a program preinstalled in extended versions of the OS - BitLocker, for Mac - FileVault. This way, if your computer is stolen, an attacker will not be able to read your data.


3. Password managers. A useful thing that most people don't even think about. Such programs allow you to keep your passwords in order - create unique keys and store them. According to Snowden, one of the most common problems of online privacy is leaks: for example, a service for which a user registered in 2007 was attacked and data leaked to the Internet - just remember the recent reports about the sale of millions of passwords from accounts on Twitter. , “VKontakte”, MySpace, LinkedIn. There are different password managers in the market such as 1Password, KeePassX and LastPass.


4. Two-factor authentication. Security words, previously offered on large services and allowing you to recover a password using them, are becoming a thing of the past. Now all popular online platforms - Facebook, VKontakte, email clients, Twitter, Dropbox - have switched to two-step authentication. It allows you to link a phone number to your account, which will be used for additional authorization when logging into your account. It will also help you recover your lost password. True, you will have to “light up” your mobile phone, which makes it possible to identify you with the specified number (as Facebook does, for example, allowing you to find a user by his phone number).

5. Tor. The anonymous network Tor (abbr. The Onion Router) is called by a former NSA employee “the most important technological project for ensuring privacy currently in use.” He stated that he uses it on a daily basis. Tor allows you to “cover your tracks” on the Internet, that is, it provides anonymity and makes it difficult to determine a person’s IP address and location. This is accomplished by connecting through a chain of intermediate computers belonging to different Internet users. The project is supported entirely by volunteers. The easiest way to use the system is through the browser of the same name ().


6. And once again about passwords. Snowden advises using not words like onetwothreefour (“onetwothreefour”) or even password (“password”) as a key to an account, but something more intricate that even a computer cannot pick up, but at the same time memorable - margaretthatcheris110%SEXY (“MargaretthatcherSEXUALNA110%”) ").

For the specially paranoid

In the video below, a former NSA agent demonstrated to a journalist how to avoid total surveillance by intelligence agencies, which can remotely turn on the microphone or camera on a smartphone and start listening. The answer is simple - remove the microphone and camera modules from the device. Instead, it is proposed to use an external accessory and wean yourself from selfies.

For the convenience of Internet users, browser functions are constantly being improved. However, browsers are becoming not only better, but also more “curious”: they send search queries, information about the use of programs and other information to the servers of their developers. Sites you visit can share information with each other through various cookies that remain on the system.

It has always been believed that intelligence services can easily eavesdrop on any conversation and read email correspondence, messages on social networks and via instant messengers.

How do intelligence agencies receive correspondence?

Several methods are used to obtain information. So what ways do Russian intelligence services have to read someone else’s mail?

  1. SORM is a system of technical means to ensure the functions of operational-search activities. This is the provision by Internet providers of access to their communication channels and special-purpose services. Without providing such access, not a single Internet provider in the Russian Federation will receive a license.
  2. An official request from an investigator, prosecutor or court to the server of a company providing email services.

But not everything is so complicated for those who encrypt the communication channel and also use foreign postal services. Servers of foreign postal services are not physically located in the Russian Federation and do not have a license to operate in the Russian Federation.

The Russian government recommends, and in some cases tries to force, foreign companies to cooperate with the Russian Federation and provide access to the correspondence of its users. For example, the well-known Telegram service Pavel Durov was repeatedly threatened with banning and blocking in Russia if he did not cooperate with the Russian intelligence services.

“Skype, for example, immediately agreed to cooperate, it gives authorities access to encryption algorithms,” Putin’s adviser German Klimenko said in an interview with the Komsomolskaya Pravda newspaper.

How to choose an email service and protect yourself from reading your mail?

It is necessary to proceed from whether the postal company cooperates with Russian laws or not. I will quote the words of Adviser to the President of Russia German Klimenko from an interview with the Komsomolskaya Pravda newspaper. “So, our company Mail.ru will respond to the investigator’s request. But Google won’t answer, but will send you away. Why? He also responds to 32 thousand requests from the US National Security Agency per year. But he doesn’t answer ours.” From here we can conclude that services such as mail.ru, yandex.ru, rambler.ru can be read by the FSB of the Russian Federation, but services such as yahoo.com, gmail.com, aol.com cannot be read.

Any legislation in the field of messaging boils down to the fact that build servers with us, and if you are encrypted, provide access keys. The question is why?

Adding tracking protection to your browser

Why does the Russian government want to control everything? The government explains this as helping to catch criminals: “drug addicts, rapists, pedophiles,” Klimenko reports.

Although on the Internet you can read an alternative opinion of people who talk about the control of petty criminals just as a curtain, but the meaning of total control lies elsewhere. Well, for example, to identify organizations of mass protests against the current government. Identification of opposition activities.

Let's summarize:

In order to protect your correspondence, you need to use the postal services of a foreign service with a democratic policy, and be sure to encrypt your Internet connection, because this is not prohibited by law.

German KlimenkoSurveillance traffic encryption

Every time you access the Internet, you leave “digital traces”: account passwords, messages, information about your preferences. Sometimes there is absolutely no need for outsiders to store this data. 42.TUT.BY has compiled “instructions for paranoids” and collected ways to protect against online surveillance by advertising networks, large services and attackers.

Inappropriate ads can be annoying: you bought the iron a long time ago, but you see it again and again. Or they might put you in an awkward situation if, for example, after searching for C# strings, your work computer starts showing you advertisements for lingerie.

The two largest networks whose advertisements are seen by Belarusian users are Google AdWords and Yandex.Direct; their blocks are placed on thousands of sites. You can disable the personalization of ads from the Google network here, and for Yandex here. Advertising will not disappear after this, but will no longer take into account the history of sites you have visited and the content of search queries.

You can also enable Do Not Track in your browser. It will notify sites that you don't want advertisers to track your web movements and collect data using cookies. The most intrusive advertisers can be stopped using special plugins. They will block cookies and scripts from those companies that continue to track your activities despite your blocking.

Chrome, Safari, Opera, Firefox, Android, iOS, Facebook.

Plugins: Privacy Badger (available for Chrome and Firefox browsers) or Ghostery (available for Chrome, Firefox, Opera and Safari).

Many online login services use social media accounts as a quick replacement for registration. Sometimes they simply confirm your identity, and sometimes they get rights to access correspondence and even publish posts instead of you.

Sometimes, even if you no longer use a service, permissions for it continue to be stored. In such cases, it is better to disable unnecessary third-party applications linked to your social networks.

How to disable third-party services:

“VKontakte”, “Odnoklassniki”, Facebook, Google.

Google is watching every step

Google is the world's largest IT company, and many of its services are the most popular on the planet. And most likely, these services know more about you than you do yourself.

Google remembers every product you've ever used, everything you've found through a search, every video you've watched on YouTube, the passwords you've saved, and even your movements.

All this information is stored so that the company’s services work better. Google takes privacy seriously. True, such a volume of your data in one place can cause internal discomfort.

How to disable:

You can turn off Google tracking yourself by visiting our dedicated tracking and security pages.

Surveillance by hackers or intelligence agencies

If you feel like someone is intentionally spying on you, you should practice some “digital hygiene.” No one knows for sure what tools people who want to steal your information have. Here are some tips from the Electronic Frontier Foundation, a nonprofit that advocates for civil liberties online.

Use HTTPS. Using strong encryption, every email sent is converted so that no one except the recipient can read it. HTTPS encrypts communications so that they cannot be seen by other people on your network - for example, users of the same Wi-Fi connection, co-workers, or attackers. If communication occurs over HTTP rather than HTTPS, intercepting and reading everything the browser is used for becomes a simple task.

Many sites use encryption to protect data, but this protection is not always enabled by default. The HTTPS Everywhere browser plugin will help solve this problem, which enables encryption on all sites that have it.

Use a VPN.

VPN (Virtual Private Network) is a virtual private network. It protects your Internet traffic from surveillance on public networks. There are many paid and free options online. A free VPN client with unlimited data consumption has recently been available in the Opera browser.

How to encrypt everything

Encrypt correspondence. If you discuss something via VKontakte or WhatsApp, your messages are already encrypted from intruders and any third parties while the information is in transit. But the chat is not protected from the service provider company. She has the encryption keys for your chat and can give them to the authorities or use them for marketing purposes.

To protect your correspondence, you can apply additional encryption to instant messages and email, such as OTR technology or PGP encryption. Another option is to use “secure” instant messengers, which do not allow the server to record your conversation. For example Signal (Android, iOS) or ChatSecure (Android, iOS).

Access the Internet using Tor Browser. It works like any other web browser, except it sends your requests through Tor.

The safest browser: how to avoid online surveillance

It's harder for people who follow you to know exactly what you're doing online. It's harder for those who monitor the sites you visit to determine where you connected from. The browser itself can be downloaded here, and the installation guide can be read here.

True, all these measures cannot provide absolute guarantees. What you formally deleted may continue to be stored on someone else's servers, and serious security precautions may contain vulnerabilities. It is worth remembering that the most reliable way to protect yourself from online surveillance is not to use the Internet at all.

Read in full: https://42.tut.by/522004

Read in full: https://42.tut.by/522004

Read in full: https://42.tut.by/522004

Read in full: https://42.tut.by/522004

2004

How to protect yourself from scanner programs

Publishing House "KOMIZDAT"

In addition to viruses and spam, so-called scanner programs often penetrate your computer from the Internet. These uninvited guests make themselves at home on the computer and begin to spy on the owners

Few people still do not know that storing confidential information on a computer is not nearly as safe as in a safe or even just in a desk drawer, especially if the computer is connected to the Internet. But in order for someone to interfere in your affairs, an Internet connection is not necessary. Of course, the creators of some websites monitor user activity and then sell this information to advertising specialists. But besides this, programs are often downloaded onto the computer via the Internet that spy on our actions and report them to their unknown masters.

These spy utilities are usually installed on PCs along with free programs that promise—and deliver—something useful. But, as you know, free cheese only comes in a mousetrap.

The second type of “spy” programs comes to us not from the Internet, but from respected bosses who want to know what we do during working hours. This option is worse because you can’t stop your boss from spying on you! Both jealous spouses and vigilant parents use such things...

Commercial keyboard scanners such as Spector Pro, Eblaster, WinWhatWhere, XPCSpy, Desktop Surveillance Personal Edition monitor your actions completely unnoticed. They note not only every key pressed, but also every visit to a website, email or ICQ message. They take screenshots and send them along with other reports to a remote computer - all without your knowledge. Everything you do on the computer is recorded and transmitted to the unknown Alex.

Identifying invisible people

It's amazing and sad how many companies live on people's suspicions. Even sadder is that the products of these companies - surveillance programs - are not so easy to recognize and remove. Many such utilities are very well disguised as “legal” applications and processes. Existing software tools to combat them do not always give the desired effect. None of the well-known anti-spyware programs, such as 1Ad-aware, Spybot Search & Destroy, PestPatrol and Spy Sweeper, recognizes and destroys 100% of the “outsiders”. It remains to rely on logical considerations: the more anti-spyware utilities are used, the higher the chances of success. It is recommended to install at least Ad-aware and Spybot on a computer connected to the Internet; For greater guarantee, you can install PestPatrol and Spy Sweeper.

If you suspect that a keyboard and mouse scanner is installed on your computer, you can try to remove the program from “invisible” mode and uninstall it. Most programs detect themselves by key combinations - for example, for Spector Pro it works , and for XPCSpy - . Even if whoever installed the spyware on your computer has changed the standard keyboard combination to a new one, with a little patience you will find it. Just remember to close all applications first, including those that run in the background and are visible only by icons in the system tray of the taskbar, so that some combination does not work in them and cause trouble.

When all programs are closed, click , or other similar key combination, and try adding regular letters, numbers and symbols to it. Thus, using the “trial and error” method, you can detect an invisible “stranger”.

There are other ways to detect hidden programs. One such method is described on the website of X Software, a spyware manufacturer: to bring the XPCSpy utility out of invisible mode, select Start > Run, enter rx in the Open field and click OK.

If you discover that there is a spyware operating on your system, you will most likely not be able to access its settings, since most such programs are password protected. But at least you will know that some Big Brother is trying to keep an eye on you. Of course, you won’t like it much that your actions are being recorded and even less that someone is spying on you. However, the employer has the right to install tracking systems on equipment owned by him (see also “Software Monitoring”, K+P No. 10/2003). Therefore, stating that you do not like the presence of such a program on your work computer, much less trying to disable it, may not be in your best interests. Before you do anything, review your rights and, in particular, the contents of the contract concluded with your employer.

Tracking Protection in Firefox

If the computer belongs to you or a member of your family, the situation becomes even more delicate...

In any case, disabling the scanner program will warn its owner that you know everything. If you try to get rid of the spyware, but find that it is protected by a password that prevents the uninstaller from running, you can try to delete the program files if you find out what they are called and where they are located. A large list of keyboard scanners, both commercial and free, is presented on the PestPatrol website. There you will also find instructions on how to remove and disable them.

If, after trying different options, you still cannot get rid of the scanner, your last resort is to save all data, format the hard drive and reinstall the operating system and applications.

To prevent unwanted programs from installing on your computer, it is better to use operating systems with strict registration, such as Windows XP, Windows 2000 or Linux (Windows 98 and Me registration protocols are looser). Choose good passwords for all user accounts—ones that you have never used before.

Again about firewalls

So, “spy” programs come in two ways: from people - strict bosses, a jealous wife, vigilant parents, smart children - or from the Internet. In the first case, it is probably better to rely on diplomacy: in the end, good relations are often the most important thing. But in the second case, obviously, curiosity should be said decisively “no!” and put a barrier to it in the form of hardware and software firewalls.

Anti-spies

The following software tools can detect at least some commercial scanner programs.

Spam should remain unanswered

To confirm that their letters reach real people, many spammers use letters requiring notification of receipt. For its part, the best reaction of the recipient to spam is no reaction - as if he forgot this address long ago and does not read the mail, which means there is no point in sending it.

Therefore, it is better to disable the message confirmation function in your email client, if it is enabled by default. To do this, in Outlook 2000 and 2003, select Tools > Options, go to the Preferences tab, open E-Mail Options > Tracking Options, turn on Never send a response, and click on the OK button.

In Outlook Express, select Tools > Options > Receipts, select Never send a read receipt, and click OK. In Mozilla and Netscape Mail, select Edit > Preferences, open the Category window under Mail & Newsgroups > Return Receipts, enable Never send a return receipt, and click the button OK.

Tracking generally refers to content, cookies, or scripts that can collect your browsing data across multiple sites. Firefox provides users with tools to block these online trackers. This feature was called Tracking Protection in the past. Starting in Firefox version 63, the functionality of Tracking Protection is included in a new set of features called Content Blocking. Now, you can get the same tracking protection by selecting the setting to block all detected trackers.

Turn Content Blocking on or off

Starting in Firefox 63, content blocking includes settings for trackers and tracking cookies. By default, Firefox blocks trackers only in private windows. You can change your options preferences to block trackers all the time. You can also set your options preferences to not block any content at all.

Click the main Firefox menu button and select Content Blocking. This takes you to the Content Blocking section in options preferences.

  1. To block trackers for all browsing sessions, change the All Detected Trackers option from Only in private windows to Always.
  2. To turn off Content Blocking, deselect the checkbox for All Detected Trackers.

Table of Contents

Turn Tracking Protection on or off

Turn Tracking Protection on or off automatically for certain sessions

Click the switch next to Tracking Protection on the Private Browsing home page to turn it off or back on. (If you don"t see a Tracking Protection switch, it means that you"ve customized your Firefox Options Preferences to always keep Tracking Protection on.)

Turn off Tracking Protection for individual sites

You may also choose to disable Tracking Protection for particular websites.

To re-enable Tracking Protection, click the shield icon again and click Enable ProtectionEnable For This Site.

Since Private Browsing mode doesn’t keep any information about your browsing session, when you disable Tracking Protection for a site it only lasts for this session. When you start a new Private Browsing session, Tracking Protection will be turned on again for all sites.

11.02.17 4844

Today, there are many browser plugins that promise to protect user privacy. In this article we will look at the most popular browser plugins that protect from advertising on the Internet.

Block ads, scripts and pop-ups with AdBlock Plus

Ad and script blockers provide control over your browsing experience. They allow you to block ads on sites you visit and prevent the execution of scripts and widgets that send user data to unknown destinations.

But if you don't know how to use such tools, they can interfere with your browsing, making them unusable until you figure out what to allow and what to block. Additionally, by blocking ads, you can have a pretty significant impact on the site and the people working on it.

AdBlock Plus ( Firefox/Chrome/Safari) blocks banner ads, pop-ups, video ads and much more. It prevents you from visiting domains that host malware, and also disables third-party tracking cookies and scripts. We believe it combines ease of use with whitelisting and automated management to make it a tool that anyone can use. Advanced users can get their hands on and experiment with the different subscription lists and active list settings they use.

Alternatives:

In our opinion, Adblock Plus is the best choice, but there are several other plugins that do the same thing.

Let's consider other options Internet advertising protection:

  • uBlock Origin for Chrome and Firefox is supported by the original developer. The plugin is as powerful as AdBlock Plus. Perhaps even more powerful because, unlike ABP, it gives you more control over what to block and what to allow. It also takes up less system resources and does not cause problems like ABP. the creators of which are paid by some large companies to ensure that their ads fall within the framework of the "acceptable advertising" policy. The only reason uBlock Origin isn't our favorite is that it's a bit complex for first-time users and blocks more than ABP. So first you need to understand it in order to customize it to your needs. And two: ABP has features like scraping Facebook, hiding YouTube comments, and more that uBlock Origin doesn't... at least until you're an experienced enough user to do it yourself. If you consider yourself an advanced user, remove ABP and install uBlock Origin;
  • NoScript ( Firefox) and ScriptSafe ( Chrome, formerly ScriptNo): both disable script execution on pages until the user whitelists them. Block execution of Java, JavaScript, Flash and other components. They are powerful, but very aggressive and interfere with the functioning of many sites. If you're going to use them, be prepared to understand the scripts on every site you visit to figure out which ones make the site work. Besides this, AdBlock Plus already does this ( and less aggressive), you just need add correct filters.

If you're not using AdBlock Plus's extra features to trim various YouTube junk or block certain items, try uBlock Origin. It will work wonders - it will reduce the amount of memory consumed by your browser, and as a result you will get a more powerful and customizable online ad protection tool for free. Although you will have to tinker with it to make it work exactly the way you want.

Blocking all tracking requests with Disconnect

Includes anti-tracking and anti-cookie extensions.

Disconnect Private Browsing ( Firefox/Chrome/IE/Safari) is our pick because it protects against tracking, malware, and malicious advertising, provides secure Wi-Fi, and provides bandwidth optimization functionality that other tools simply don't offer. It blocks tracking cookies and gives you control over all scripts and site elements from an easy-to-use toolbar.

Disconnect can protect you even when malware embeds its ads on popular pages or the ad network is infected with embedded malware. The plugin also protects against tracking via social networks such as Facebook, Google+ and Twitter, which use the browser to collect data about you even outside of their social platforms. Finally, Disconnect protects you when an attacker can use stolen cookies to access personal data without having to steal your password.

Alternatives:

Disconnect is our favorite plugin of the bunch, but there are other browser extensions that do the same thing:

  • Privacy Badger ( Chrome/Firefox) - since he is new to this field, he tried to take the best from all previously created plugins. Acts too softly - blocks unwanted actions and creates a "blacklist" when it observes bad behavior, instead of blocking specific sites, cookies, and pop-ups. This makes it more lightweight, but it provides a little less protection, at least as long as it learns based on your behavior. You also get an easy-to-operate button on the toolbar that gives you a completely clear view of your information being recorded. System " Green / yellow / red» shows whether you are being tracked across sites or not;
  • Do Not Track Me ( Firefox/Chrome/IE/Safari): Offers a drop-down browser toolbar that shows you what tracking cookies and scripts are being loaded on the site and allows you to disable them completely. Has a friendly interface. It also leaves plugins and scripts running until you turn them off. Disconnect is much more powerful and functional, Do Not Track Me is suitable for those people who want to download online ad protection and disable elements selectively;
  • Ghostery(): Just like other browser extensions, Ghostery blocks tracking cookies and scripts while loading. Displays a list of blocked items so you can see if the blocked items are harmless. The Ghostery database is huge and provides the ability to block everything or something specific. Unfortunately, Ghostery has problems selling information to advertisers, so you might want to stay away from it.

You could argue that Disconnect, Do Not Track Me and Ghostery do the same thing, but we still think Disconnect is the most reliable of the three. We like Privacy Badger's approach" learn as you go", but we can't argue that it will provide less protection when entering the tracking area than any other plugin. By the way, the new version of Disconnect is only available for Firefox and Chrome, so if you prefer Safari, IE, or Opera, we'd suggest Do Not Track Me.

Essentially it comes down to personal preference: what doesn't interfere with your browsing and what works best in the browser you use most often. So if one plugin doesn't work, don't be afraid to try another one.

Desktop and mobile protection Disconnect Desktop

The Disconnect browser tool is worth downloading, and we recommend it for those who want privacy or faster web browsing. If you want to go even further, new desktop package Disconnect Private Browsing, which we mentioned above, with its own proxy and VPN will ensure the safety of your web surfing. It checks connections against a list of malware embedded in ad networks, monitors tracking tools for known malicious hosts and sites, and then simply blocks them.

The free version of the Disconnect desktop suite includes the browser plugins we mentioned above, with its own search service and a basic proxy server that keeps your web surfing safe. Upgrade to Disconnect premium for $5 per month or $50 per year to get these features along with the iOS and Android mobile apps.

This is great service protection against advertising on the Internet, and, frankly, there is no alternative to it. However, the premium price may be too high for some people. We think you should sign up for a VPN, especially when you're in a Wi-Fi zone or on untrusted networks, but Disconnect is designed for privacy and security. For many people, the Disconnect extension is all they need for protection.

Additional privacy tools

HTTPS Everywhere ( Firefox/Chrome) is required no matter what security measures you choose to use. Once installed, the extension will check your connection using SSL and try to find secure versions of the sites you visit. This is a great way to protect your web surfing.

Virtual private network (VPN) encrypts all your Internet traffic and offers the highest possible protection from prying eyes. Look for a provider that stores only the minimum required logs for troubleshooting, offers strong encryption, has a good reputation among users, and provides plenty of options. Don't rush to any offshore VPN just because your VPN provider is located in a distant country. If you're just looking for a free service to keep you safe while you surf the internet, and you're not ready to try a full-fledged paid VPN service ( or your own), try Hideman or Tunnelbear.

Antivirus utilities important for protecting safety. Try to avoid suspicious sites, practice good online hygiene, and keep your antivirus tools up to date.

Other security tools you may need

We've covered the most important and necessary tools for privacy and security, but there's always one more step you can take to make sure your communications aren't intercepted or read by third parties. Here are some more tools for better protection from online advertising:

  • Web of Trust ( WOT): (Firefox/Chrome/Safari/IE) WOT does a great job of ranking sites by reputation. It's not an ad blocker or anything like that, but it does notify you when the site you're visiting is untrustworthy. Experienced users may not need support, but newbies may not always be able to see what is being loaded onto their computer when they visit a site;
  • Email encryption: If you want to take desktop security to a whole new level, you may want to consider email and chat encryption. Our favorite chat apps Pidgin and Adium can make this quite easy. If you need another option, use TorChat;
  • Tor ( Windows/Mac/Linux) encrypts your Internet traffic and sends it back through a series of other computers, known as relays, to hide your location as well as maintain your privacy. Of course, anonymity doesn't go far: traffic leaving a Tor network node is no longer encrypted. Only while the traffic is inside the Tor network

    Good bad