My Data My Privacy My Choice: A Step-by-step Guide to Secure your Personal Data and Reclaim your Online Privacy!
- Length: 280 pages
- Edition: 1
- Language: English
- Publisher: BPB Publications
- Publication Date: 2020-06-05
- ISBN-10: 9389845181
- ISBN-13: 9789389845181
- Sales Rank: #4504379 (See Top 100 Books)
A Step-by-step Guide to Secure Your Personal Data & Reclaim Your Online Privacy!
- This book is aimed at helping the reader understand how their personal data often gets shared without their explicit knowledge and permission. This book also provides concrete steps on how to limit such unauthorized sharing of personal data.
- This book is intended for readers with little to no formal education in technological concepts. Any readers with a basic understanding of ‘daily-use’ technology will find this book easy to read and follow.
- Readers are only expected to have basic technological knowledge such as operating electronic devices or navigating an online service. Any additional knowledge is not only welcome but will also help the reader follow higher-level recommendations, thereby improving their ‘privacy score’.
Cover Page Title Page Copyright Page Dedication Foreword Testimonials About the Author Acknowledgement Preface Errata Table of Contents Section 1: Introduction 1. Prologue Introduction Before we begin... Who should read this book? How to read this book? What is #Rohit Recommends? Basic Intermediate Advanced Expert The points system Conclusion 2. Internet and Privacy Introduction Privacy? What privacy?! Google Microsoft Facebook Cambridge Analytica Adversaries and threats Passive adversaries Active adversaries Intrusive advertising Invisible threats What we already know about you The basics of snooping Advanced snooping or OSINT Conclusion Section 2: Devices 3. Android Devices Introduction The Google-Android ecosystem Android Open-Source Project (AOSP) So, why does Google do this? What is a ROM? Official ROMs Custom ROMs Official firmware vs custom ROMs Android and privacy Google Telemetry Non-Google Telemetry OnePlus Telemetry Xiaomi Telemetry anddata breach …and others! Recommendations and suggestions Sensors Permissions #RohitRecommends Google Telemetry BASIC: (1 point) INTERMEDIATE: (2 points) ADVANCED: (3 points) EXPERT: (5 points) Non-Google Telemetry BASIC: (1 point) Sensors BASIC: (1 point) Permissions BASIC: (1 point) INTERMEDIATE: (2 points) Conclusion 4. Apple iPhones Introduction The Apple Ecosystem iOS iCloud Jailbreaking Apple and Privacy Sensors Permissions The Settings App Analytics and Advertising #RohitRecommends iOS and iCloud BASIC (1 point) ADVANCED (3 points) Sensors BASIC (1 point) ADVANCED (3 points) Permissions BASIC (1 point) ADVANCED (3 points) Settings | Privacy BASIC (1 point) Analytics and Advertising BASIC (1 point) INTERMEDIATE (2 points) Conclusion 5. Smartphone Apps Introduction Bloatware How to Identify Bloatware on Android? Malware What are the Different Kinds of Malware? How Do I Know I’m Affected? Why Doesn’t Someone Do Something, Then? How can I prevent malware attacks in the future? Sandboxing Permissions #RohitRecommends Bloatware On Android BASIC: (1 point) INTERMEDIATE: (2 points) ADVANCED: (3 points) EXPERT: (5 points) Malware BASIC: (1 point) ADVANCED: (3 points) Sandboxing BASIC: (1 point) Permissions BASIC: (1 points) INTERMEDIATE: (2 points) ADVANCED: (3 points) Conclusion 6. Smart Devices and IoT Introduction The Internet of Things (IoT) Security vulnerabilities in IoT and smart devices Strava Smart TVs Alexa, Siri, and Google Smart appliances #RohitRecommends BASIC: (1 point) INTERMEDIATE: (2 points) ADVANCED: (3 points) EXPERT: (5 points) Conclusion 7. Desktops Operating Systems Introduction Operating systems Microsoft Windows Modern Windows (Win10, Win 8.1, and Win8) Windows 7 and older versions macOS Linux Multi-OS systems Dual boot Virtual machines Live OS Data persistence Default user: administrator vsguest Telemetry Windows 10 telemetry Diagnostics and feedback Keystroke logging Cortana Wi-Fi Sense Apple’s Keychain and ‘KeySteal’ Other privacy settings #RohitRecommends Operating system (OS) BASIC: (1 point) INTERMEDIATE: (2 points) ADVANCED: (3 points) EXPERT: (5 points) Spy vs Spy! Telemetry Diagnostics & feedback Keystroke logging Cortana Wi-Fi Sense Other ‘Privacy’ Settings BASIC: (1 point) INTERMEDIATE: (2 points) macOS BASIC (1 point) INTERMEDIATE (2 points) EXPERT (5 points) Linux BASIC (1 point) ADVANCED (3 points) Conclusion 8. Desktops-Software Applications Introduction Software applications Bloatware Manufacturer-branded utilities Third-party apps and utilities Integrated Bloatware Security software Firewalls Antivirus and anti-malware #RohitRecommends Software applications BASIC (1 point) INTERMEDIATE (2 points) ADVANCED (3 points) Sandboxing File encryption System restore Bloatware removal Windows 10 BASIC: (1 point) INTERMEDIATE: (2 points) ADVANCED (3 points) EXPERT (5 points) Apple (macOS) BASIC: (1 point) Linux BASIC: (1 point) Security software Windows 10 Firewalls BASIC: (1 point) INTERMEDIATE: (2 points) Antivirus & Anti-malware BASIC: (1 point) INTERMEDIATE: (2 points) macOSand Linux BASIC: (1 point) Antivirus andanti-malware ADVANCED (3 points) Antivirus and anti-malware Conclusion 9. Desktops-Browsers Introduction How do modern browsers work? Popular browsers Privacy-aware browsers Brave browser Epic browser The Tor browser Is Tor truly anonymous? Privacy settings Private windows Telemetry opt-out Syncing and personalization Search engine integration Cookies, tracking, and content blocking Forms and autofill Permissions andsite settings Plugins and extensions The difference Plugins and extensions are fundamentally different Potential security concerns with plugins Potential security concerns with extensions #RohitRecommends BASIC (5 points) Browser recommendation Private browsing Privacy settings Extensions INTERMEDIATE: (10 points) ADVANCED: (15 points) Browser recommendation Private browsing Privacy settings Extensions EXPERT: (25 points) Installing Tor Using Tor Caveat Emp-tor! Conclusion 10. Services - Email Introduction Email Accessing email Web-based portals Email clients Compromising your email Phishing Weak passwords Malware Email ads Hosting your own email server Using a privacy-aware email service provider Spam #RohitRecommends Accessing your email Web-based portals (BASIC, 1 point) Offline clients (BASIC, 1 point) Compromising your email Phishing BASIC: (1 point) Passwords and authentication BASIC: (1 point) Malware BASIC: (1 point) INTERMEDIATE: (2 points) ADVANCED: (3 points) Email ads BASIC: (1 point) INTERMEDIATE: (2 points) ADVANCED: (3 points) EXPERT: (5 points) Spam BASIC: (1 point) INTERMEDIATE: (2 points) ADVANCED: (3 points) EXPERT: (5 points) Prevention and mitigation BASIC: (1 point) INTERMEDIATE: (2 points) Conclusion 11. Software-as-a-Service (SaaS) Introduction So, what exactly is SaaS? Types of SaaS Social SaaS Shopping SaaS Financial SaaS Other SaaS Privacy and security concerns ToS and privacy policy Service reliability Security and transparency Security breaches and response Security updates Data access #RohitRecommends Types of SaaS BASIC (1 point) INTERMEDIATE: (2 points) ADVANCED (3 points) EXPERT (5 points) SaaS privacy concerns ToS and privacy policy (BASIC, 1 point) Service reliability (ADVANCED, 3 points) Security and transparency (EXPERT, 5 points) Security breaches and response (INTERMEDIATE, 2 points) Security updates (EXPERT, 5 points) Data access (ADVANCED, 3 points) Conclusion 12. Networks: Connectivity and Internet Introduction Wired networks Wireless networks Wi-Fi/WLANs GSM Bluetooth NFC Common attack vectors Identification Interception Wireless attack vectors Bluetooth NFC #RohitRecommends BASIC: (1 point) INTERMEDIATE: (2 points.) ADVANCED: (3 points.) EXPERT: (5 points) Conclusion 13. Operational Security (OPSEC) Introduction An adversarial approach The OPSEC process Dos and Dont’s Mobile phone subscription Device security New signups Conclusion 14. Epilogue Introduction Updated analysis Conclusion 15. Bonus Chapter: Useful Tips and Tricks The 10 Android permissions listed under “dangerous” protection level. How to setup your Android without Google Services Useful apps that you should definitely consider installing Alternative app stores For Android For Apple Conclusion Checking your email on an unknown computer
Donate to keep this site alive
To access the Link, solve the captcha.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.