Mayerrounds Reclaimyourprivacy v12
Mayerrounds Reclaimyourprivacy v12
Mayerrounds Reclaimyourprivacy v12
YOUR
PRIVACY:
5 Things You Can Do Right Now
by Bill Rounds, Esq. & Trace Mayer, JD
Guide 1.1
Bill Rounds,
Esq. &
Trace Mayer,
JD
This PDF is best viewed
using Adobe Reader. If
you hare having trouble
accessing the hyperlinks, copy the footnote
URL into your browser.
INTRODUCTION
Tattoo ink and the Internet ink are very similar. A lot of people are getting
tattoos, and a lot of people are putting their personal information on the Internet. But both tattoos and information on the Internet are regrettably hard
to remove. Even good ol Mark Zuckerberg is finding out the hard way that making some personal information
public might be a bad idea.
Whatever the popular trend is, there will always be some people who arent fond of permanent identifying
marks. But what can you do if you have made a few foolish mistakes in the past and you need to remove personal
information from the Internet? Fortunately, it is a lot less painful to remove some of your personal information
from the Internet than it is to remove a Mike Tyson Special.
Most
sites
allow
you to
remove
data.
A lot
of the
Internet
is just a
big echo
chamber.
Intelius and Acxiom are two big data aggregators that are the largest source for
most other websites that share sensitive information on the Internet. Removing your information from Intelius or Acxiom will effectively remove it from most other websites as well. You
may still want to remove personal information from other sites too, just to be on the safe side.
Most sites allow you to remove data like your address, phone number, and social security number. Every company has a different method and you need to follow their own
procedures. They might let you do it online; they might make you do it through the
mail. Lots of times they will want you to provide more personal information to prove
who you are to remove your information. Here is a list of the main sites where your
information might be found with a link to remove your info. You might want to check
each one to see how much of your own personal information shows up.
Intelius.com
Acxiom.com
USsearch.com
Google.com
Zabasearch.com
Peoplefinder.com
Whitepages.com
Yahoosearch.com
411.com
Whowhere.com
Privateeye.com
Infospace.com
Anywho.com
PublicrecordsNow.com
6
Removing information from any of these sites, even just Intelius or Acxiom, is like removing
an unwanted tattoo. However, it is much better to avoid the tattoo in the first place than to try
to remove it later, as there are no guarantees that you can even remove it completely. The only
way to do that is to know how your information gets in those databases in the first place and
prevent it from ever showing up there.
Social Networking
The sooner you get
started removing
personal information
from the Internet, the
better off you will be.
Renting a house,
condo, or apartment
instead of buying is
one of the easiest
ways to keep your
private information
out of public records.
If you never give out your rental address, use ghost addresses, and order utilities and services
in another name, among other things, you will remain very private.
of you. If you own multiple properties with multiple business entities it will be much harder
to create such a profile, especially if each of your business entities exist for the sole purpose of
managing one property.
New Mexico is the only state where an LLC is totally anonymous. That means that if you own
property with a New Mexico LLC your name cant be connected with the property in the public ownership records or the business ownership records.
Plus, you can own real estate with a New Mexico LLC in
just about every state in the United States without any special filing or permission.
If you want to be very advanced, your New Mexico LLC
can be the only owner of your LLC or corporation formed
in another state. That way, when someone queries the
ownership of an LLC, all they will get is your New Mexico
LLC. It will be a dead end.
Unfortunately there are too many service providers, too many types
of phones, too many different countries, a lack of fully developed solutions, and not much compatibility across them all to give you one
simple solution to your mobile privacy needs. This is an overview of the
information that you might want to keep private and a few general ways
to do that, mostly for smartphones, but not-so-smart ones can be more secure as well. With this overview, it
should be easier to discover and implement your optimum privacy configuration.
Laws are different everywhere. It may be illegal in some places to use some of these cell phone security tools or
techniques. Do not use any techniques that will violate the law. That will negatively affect your privacy much
more than if you had complied with the law and not used that tool.
Subscriber Information
When you buy a phone, your name is usually attached. You sign a contract or you make payments with a credit card, or do something else that
ties all of the activity on that device to you. Keeping subscription information private prevents corrupt governments from accessing that information
with or without warrants, subpoenas, or due process to silence dissidents, jail peaceful protesters,
and hide abuse. It also prevents hackers and rogue
employees from compromising networks and databases to steal the valuable data.
Keeping subscription
information private prevents
corrupt governments from
accessing that information
with or without warrants.
10
Prepaid cell phones can still be purchased for cash without a contract. Minutes can be reloaded
with cash as well. You can use the prepaid cell for all of your communications or just for the
most sensitive communications. After a while, the prepaid phone will probably gather enough
data to identify you. Replace your prepaid phone often.
Published Number
Most phone numbers can be found in online directories. Those directories are compiled by
the vast amounts of data that thousands of companies gather from their customers. If you give
a number to a company, or even give them a call, they probably record that number in their
database. Your number then might be shared, sold, and copied many times by hackers, corrupt
governments, thieves, and stalkers.
Your phone number can be a key piece of data to paint a data profile
that identifies you and a lot more information about you. Hackers,
thieves, and overly curious stalkers could easily use your phone
number to cause you harm.
Ask your service provider to unlist your number. Contact the databases that collect this information, like Intelius and Acxiom, and
follow their procedures for unlisting your number. Stop giving out
your number or give out a fake number to people who dont really
need it.
Many carriers will allow you to block caller ID so that the people you are calling cant get your
phone number. In the United States you can block caller ID before an individual call (for a
price) using *67.
You can sign up for call forwarding that forwards calls from your public number to your private number, keeping your private number confidential. Google Voice1 is a helpful, free callforwarding service.
With Spoofcard,2 it can appear that you are calling from any number you want, protecting your
actual number.
Location
Your general location is constantly triangulated by your service providers cell towers. Your
precise GPS coordinates and the WiFi networks you are close to can be monitored and recorded as well. When you use your device, the location is logged.
1
2
https://www.google.com/voice/b/0/?setup=1&pli=1#setup
http://www.spoofcard.com/
11
Corrupt governments can access this data with or without warrants, and thieves can use it to
target your house when you are on vacation. The cell phone can also be pinged at any time to
determine its location, even if you arent using it.
To prevent unwanted tracking and increase your cell phone
security, you can turn your cell phone off to make sure that
you arent connecting to any WiFi, your general location
isnt being triangulated, and your GPS coordinates are not
being tracked. Malware can continue to broadcast location
information, even when the phone is switched off, although
it is not common. To prevent surreptitious tracking, remove
the battery.
Many phones allow you to adjust settings to store less history on the phone itself. This way your
old text messages, call logs, and other sensitive items can be less vulnerable.
Password protect your cell phone. This isnt just to prevent butt-dialing. This also keeps out
the curious. Most thieves, illegal government searches, and hackers will easily get around the
password protection unless the phone is encrypted.
Regularly delete unwanted data. Just like a computer, its not really gone until it gets overwritten, but at least novice thieves and the casually curious wont get it.
Dont let your phone out of your sight. All someone needs is a few minutes with your phone to
install software or hardware that can overcome almost any cell phone security precautions you
have taken. If someone that you dont trust has had access to your phone, you may think twice
about trusting it.
12
Many smartphone apps allow partial encryption; you can encrypt certain types of data on your
phone while the rest of it is not encrypted. It can be tricky to make sure there are no unencrypted
copies of the data somewhere else on the phone, but partial encryption can be useful to save certain confidential files. Again, open source is best, but trusted encryption software is also good.
Check out the fantastic Reset the Net Privacy Pack for more recommendations, including
free software for encrypted calls, chat, and text messaging.
Protecting Conversations
Usually when you have a confidential call with your business partner, your spouse, your
attorney, or your doctor, nobody else is invited to the conversation. Cell phone networks
around the world allow governments to secretly listen in on those conversations without a
warrant. Rogue employees can listen to those conversations too. There is even a slight chance
that malicious software is installed on your phone to capture your voice conversations.
Many phones let you use voice over IP (VoIP) to communicate over the Internet instead of
over a network that may be compromised by secret wiretaps. A VoIP app might be available,
or you can use VoIP through your phones Internet connection. You will still have to trust
that the VoIP service is not eavesdropping. Open source VoIP software is best; trusted software is good too. Some common software that is free but not open source: Google and Skype.
None of these will stop malicious software on your phone from
spying on you.
Although it is still
rare, phones can be
infected with viruses
and malware.
http://kryptoscommunications.com/
http://www.cellcrypt.com/cellcrypt-mobile
5
https://whispersystems.org/
3
4
13
also protect from viruses by not opening suspicious email attachments and not clicking on
sketchy links. You can also make sure to download only trusted apps.
Texting
Text messages are very insecure. They travel through the network unencrypted, are stored on
your device, and might be stored for a long time. Text messages are available to just about
anyone who gets any access to your phone like corrupt governments, clever hackers, thieves,
and unscrupulous competitors. They get it by accessing the network, accessing your providers
records, accessing your phone, and many other ways.
There are some secure text message apps available that encrypt your text messages both in transit and at rest on your device. TextSecure for Android, maintained by WhisperSystems,6 is
an open source example. See the Reset the Net Privacy Pack for more.
There are several web-based instant messaging (IM) programs designed for different phones
that are encrypted and protect your cell phone security and text communications much better
than old fashioned text messaging. Unless the IM software is open source, you still have to trust
the source, but it is probably better than trusting a large provider.
Voicemail
Voicemail is stored by your service provider on their server. Rogue
employees, corrupt governments, and hackers are the most likely
to have unauthorized access to voicemail information.
Some VoIP services will also offer encrypted voicemail. You
still have to trust the VoIP service, but a small offshore VoIP
service is less likely to reveal confidential data than a larger service provider.
Photos
Smartphones not only take photos but they usually add a lot of hidden data to the picture file,
called EXIF data. It can include time, date, and GPS coordinates, among other things. Any
photo that you email or upload from your phone might have this identifying EXIF information
in the file.
https://whispersystems.org/
14
Turn GPS tracking off. Some phones let you turn off geotagging in the settings. Turning geotagging off can prevent
the data from ever being added to the picture file.
Mobile Apps
Mobile apps let you play cool games and have powerful business tools at your fingertips, but
many of them can be mining a lot of data that you wouldnt want to share. LinkedIn, for example, stores your username and password in plain text. Since most people use the same username and password in many places, this is very damaging information that is very unprotected.
And there are a lot more apps that do similar things. Some apps even have malicious code
hidden in them.
Minimize your usage of apps or only use trusted apps to increase your cell phone security. Research what data they access and then use them only if you are willing to share that information
and are sure there is no malware in them.
Email
Email is the digital equivalent of a post card. The message passes through the hands of many
servers en route to its destination and everyone along the way can read it. At the very least,
your email provider will have a log of your emails which can be subpoenaed or peeked at by
corrupt governments.
You may be able to encrypt the emails that you send from your device so that nobody can read
them in transit or at rest. If the recipient is also using proper encryption, the message may be
protected from end to end.
Web Browsing
Your Internet provider can see every website that you visit and they can see every wireless network that your phone connects to. Your browser can see every term you search for.
All of this data is readily available to rogue employees and corrupt governments. In many cases it may be sniffed out by clever hackers and
15
sneaky competitors. Most of this data is also stored right on the phone where anyone that has
physical access, even the casually curious, can find it.
You may be able to use anonymous web surfing. Some phones let you use VPNs like the Tor
network7 so that your carrier, the web browser, and the websites that you visit cant see where
you go on the Internet. The VPN records would only be available to corrupt governments if the
VPN is in a cooperative jurisdiction.
https://www.torproject.org/
time commitment will be comparable to what you spend on your antivirus software. Most
paid proxy services are relatively straightforward to use and will be easy to operate for novice
computer users.
SpeedMost free proxy servers still want to make some kind of profit. One of the ways
they do this is by using advertising. The ads can slow or severely restrict your user experience and make using the free sites cumbersome. Another phenomenon, known as the
tragedy of the commons, affects this free resource. The idea behind the tragedy of the
commons is that when there is a free resource, the public will have a tendency to overuse
it. So the free proxy servers are often overloaded with traffic and therefore run slowly, even
if there are no ads. Most of the better paid proxy servers have minimal, if any, advertising
and wont noticeably slow down the user experience when using anonymous browsing.
VersatilityFree proxy servers tend to have difficulty displaying some images and many
free proxy servers will not give you access to websites that require you to login. Hotmail,
Myspace or several other websites are examples. Although there are alternatives which
allow you access to most of those sites, many times the free anonymous browsing proxy
will only allow access to one of them and you have to change proxies to have access to
the others. Most paid proxies will be able to handle any image and allow you access to
any page that requires a login.
ecurityA computer listed as a free proxy server may itself be a compromised computS
er. There is even a risk that identity thieves will run a free proxy server and record all of
your private data as you enter it. Simply reading up on the server that you intend to use
before you use it can help you avoid any problems, but that creates more work for you. I
generally do not even use a proxy server unless I can entrust it with my bank privacy. A
good, paid, anonymous browsing proxy service will control a network of servers to route
your traffic through, making your searching more safe. Paid sites will usually be able to
run in the background and protect your computer every time you are connected to the
Internet, making the burden on the user minimal.
17
Free proxy servers are a great way to do anonymous browsing if you have a
little bit of time and technical ability. If you have money, or simply lack the
time or ability, a paid proxy server can be a great solution. I have a favorite
paid proxy server, but there are many to choose from and a different one
might better suit your needs.
The potential
tax savings from
making sure that
you are surfing
only in tax free
states could be
tremendous.
Recently, I was scanning information on the latest reported data breaches throughout
the United States. A data breach is when personal information, like social security
numbers, credit card numbers, etc., that could be used for identity theft has been compromised. The Identity Theft Resource Center8 publishes this figure, along with having a lot of other useful stuff.
The data breaches they report all come from either insecurely transferring files, accidental compromise, insider
theft, theft by subcontractors, or even hackers. And the report only contains breaches that were reported in the
media. As you scan through this document9 from 2013, you notice some very disturbing things. First, you see
a lot of recognizable names that might have some of your data. The next thing you might notice is that a lot of
those recognizable names have had significant breaches where thousands, and sometimes millions, of records
have been compromised.
As you scan the document even more, you will notice that a lot of the reported breaches show a red zero indicating no records were compromised. This is slightly misleading. A red zero means they dont know how many
records were compromised. Maybe a giant red question mark would be more appropriate.
The low number of companies using encryption software is totally ludicrous. Encryption is incredibly simple to
use and there is plenty of free encryption software. TrueCrypt is a free, open source program that provides excellent encryption of data and much better privacy. Though the program is no longer in development, many people
still trust and rely on it. But you have to use version 7.1a, since version 7.2 is a crippled version of the program
that only decrypts. If you have never heard of TrueCrypt, any other free encryption software, or encryption at all
for that matter, encrypting all of your files will take you a total of about
eight minutes.
http://www.idtheftcenter.org/
http://www.idtheftcenter.org/images/breach/ITRC_Breach_Report_2013.pdf
10
https://diskcryptor.net/wiki/Main_Page
8
9
18
more at
19