After reading the knowledge base
and recommended tools
sections, these were the questions I was unable to answer, I think answering them could help a lot of people:
-
When is it advisable to use **Tor**? Having three browsers (Firefox, Mullvad and Tor) seems redundant.
A: To be answered. -
When should a VPN be used, exactly? PG says: it is useful when anonymity is needed, but when is anonymity needed in the first place?
A (the following are my assumptions): A VPN is used to prevent websites from learning your IP address, which can approximate your location. A VPN provides security and privacy by encrypting your internet connection, which shields your activities from external observers like hackers and ISPs (though these parties may indirectly be able to obtain this data anyway. E.g., if the website you were visiting knew your real IP, it could potentially sell it to other parties), and to a smaller degree the websites you visit. The reason that security and especially privacy are harder to achieve from the websites themselves are because (1) you may willingly or obligatorily provide these websites with your information, (2) they may obtain data from your device using technologies only available to them, and not outside parties, e.g., cookies, (3) assuming they have the ability to do so, they may use other information that you may have provided them, and check for this information across other external sites, which could have your real IP tied to this information, or (4) lastly and most importantly, they will in most cases still be able to obtain your real IP address, even if you used a VPN on such sites, because this encryption is only effective if youâve consistently used the VPN on those sites and have enabled a kill switchâa feature that cuts off your internet if the VPN disconnects, preventing data leak. Otherwise, websites that log multiple IP addresses could potentially identify your real IP by recognising and excluding common VPN server IPs. However, I assume that a paid VPN with servers within your geographic region (e.g., America) can make it harder for websites to differentiate your real IP from the VPN-assigned ones, since your IP address could be any of those within America for example. However, these website can also log how often each IP is used and when they are used to notice obvious patterns. Although a VPNâs usefulness is reduced if a website already knows your IP, it still offers protection against cross-site tracking. This is because if entities can track your IP across sites, they can link your activities and information, and create a profile on you. A VPN prevents future websites from obtaining your IP. The verdict is use a VPN wherever you can, except for where doing so is impractical (e.g., in circumstances when performance is needed, such as an online academic test) or if having your information available to your ISP, hackers (only applicable to public networks), and websites you do and donât visit is not a worry, i.e., not apart of your threat model, or unsafe (illegal).
@PrivacyAintReal was the one to highlight the caveats of using a VPN. -
How should people handle their personal information for online orders? Is it recommended to use their real name or a fake name or initials?
A: Use fake names where legal, I give online shopping websites my real first name and then provide an initial as my last name for online orders. You may be able to get away with faking your name entirely. I might start giving them my name using characters from other countires, although I am not sure this is allowed. -
How can people avoid receiving unencrypted order confirmation emails that contain their personal data?
A: Donât give them your personal info in the first place, or reduce the amount of personal info you give them, or opt out of email and allow them to message you in other ways. -
Is it recommended to use a VPN when purchasing online, even when using a real-life identity? PG says: âUsing a VPN in cases where youâre using your real-life or well-known identity online is unlikely be useful,â and âWhen purchasing online, ideally you should do so over Tor.â However, PG also suggests using a VPN before connecting to Tor. This seems contradictory, and may require further clarification.
A: Yes to prevent cross-site tracking (I think), even if the site now knows your address. Use Tor when purchasing items online! -
What are some good Firefox extensions to enhance privacy and security?
A: Just use uBlock Origin, it does a lot. -
Is it better to use Bitwardenâs extension or web vault? The trade off here seems to be between fingerprintability and convenience + phishing protection. Is addy.io more effective as a website or a browser extension?
A: Just use Duck Duck Go email aliases (or the other aliasing services Bitwarden supports) and link them to Bitwarden, which will generate aliases for you, you are knocking out two birds with one stone. -
Is it a good practice to register all online accounts to a single Proton Mail account using aliases, or should different email addresses be used?
A: Compartmentalising your activities with different email address is pointless due to the existence of email aliases (I think)! -
What are some ways that people can deanonymize themselves online? PG says: 'We know people can quite easily deanonymise themselves in a number of ways, e.g.: Reusing personal information (e.g., email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN , etc.).' What does this mean, and how can it be prevented?
A: It means that if someone has access to your info across sites, and you use this same email on two or more these sites, even with anonymity software, they will know who you are, by tying info about you from another site that you may have accessed without anonymity.
@wojciechxtx also provided this example: By mistakenly attachingEXIF
data for example. -
Is **Orbot** recommended as a VPN on iOS, the problem is it is unusably slow, so shouldProtonVPN be used?
A: I and others think you can use either, except for when you are connecting to the iOS Tor Browser, which itself suggests you use Orbot. -
What is the best alternative for multi-factor authentication (MFA) if physical keys are not convenient? Is TOTP the next best option?
A: Pretty sure its TOTP (time-based one-time passwords are generated securely and expire after 30 seconds). -
Is Thunderbird hardening recommended? Is this a one-time process or does it require regular updates?
A: Itâs a pain to do (instruction are here), but I havenât had to update it since. -
Which iOS email client is more suitable for a non-Proton email account: Apple Mail or Canary? Is Canaryâs encryption worth paying for?
-
What is the purpose and benefit of OpenPGP and how can it be used?
A: its purpose is email encryption, it is built into Thunderbird. For all other cases these are used. -
What is Mailvelope (still not entirely sure) and why is it listed in the email clients section?
A: a browser extension for email encryption using OpenPGP. No idea why it is not in the encryption software section. -
What is the *best* way emails can be encrypted from sender to receiver, even if one or both parties donât use a privacy-oriented email service provider or OpenPGP encryption software?
A: Donât think this is possible, just use Signal. -
Can Thunderbird (an email client) enhance the privacy of email addresses that donât support encryption by default?
A:
-
Should sending emails and registering accounts be limited to personal computers, or can this be done equally safely on mobile devices? E.g., is it safer to use Proton mail + SimpleLogin on a PC rather than on an iPhone?
A: Does not matter, in fact mobile phones tend to have better sandboxing (security) and privacy (allegedly). Use Duck Duck Go email aliases on Bitwarden app! -
Are Picocrypt and VeraCrypt redundant if BitLocker is already used on Windows 11?
A: From my understanding, Picocrypt (used for encrypting single files) is not redundant, since full-disk encryption slows down some actions in the computer, such as file organisation.
From @overdrawn98901: the benefit of single file encryption is that it can be used as essentially an extra layer of protection. For example, even if a hacker stole your full encrypted computer, by knowing your computer password, the single file encryption is used with a different password, so that is a whole separate issue to crack it. You can also pass around the encrypted file anywhere, e.g., email, copy it on an unencrypted drive - the works, and itâll be secure so long as your password is secure. -
What is the use case for Cryptomator?
A: designed for privately saving files to any cloud provider. It allows you to create vaults that are stored on a virtual drive, the contents of which are encrypted and synced with your cloud storage provider. -
Is it possible to encrypt files using any other method and then upload them to Proton Drive? Doesn't this make Cryptomator redundant?
A: To be answered. -
How can passwords in Bitwarden be backed up securely? Is it better to export, encrypt, and save them on Proton Drive using Cryptomator, or on a separate encrypted hard drive using BitLocker?
A: either encyrpt the backup and save it to the cloud using Cryptomator or encrypt the backup and save it to a hard drive (Picocrypt can be used here). -
Can changing settings within a search engine like DuckDuckGo affect fingerprintability?
A: Yes apparently. -
What is self-hosting, and what are its pros and cons?
A: From my understanding, web servers are used to provide people with services when people make requests for them, self-hosting is the act of using a private web server. This means you donât risk others taking your information from your requests. -
What is the role of the âRouter Firmwareâ page? Is it necessary to install such firmware? What does this software do? Does it allow changing the DNS settings on a wireless router?
A: Changes how the hardware works, potentially improving privacy, security and performance (I think). ISP firmware could be up to no good. -
I have moved my questions regarding DNS here.
-
In general, some PG tool recommendations are vague or incomplete, e.g., the function of the tools and whether they are essential or optional for most users, needs to be explained more clearly.