How To Surf The Web Anonymously

Screen Shot 2014-05-08 at 3.01.18 PM

Have you heard that nearly everything you do or create on the Internet gets recorded somewhere, somehow?

Meaning that for every blog post you write and every photo you share, there’s a copy of it somewhere on the Internet. It doesn’t matter if you erase it, a copy will still be there for people to find. Not to mention the fact that our searches, sites we visit and other activities are tracked, too.

But what is more unsettling is that even if you just visit a particular Web site, you are often unknowingly giving out your personal information, such as your current location, what device you are using, and even where you go to after that. Kind of creepy, right?

Well, it gets worse…depending on where you live, this data may then be collected, sorted, analyzed, and even accessed and used by the government and other parties.

But, don’t worry — there is something you can do about it!

There are now Web services that allow you to browse anonymously. These services essentially act as the middle man between you and the Web site that you want to visit. This means that the Web site will not gain access to your private, personal information.

You have to remember, though, that while the destination Web site will not see your personal information, the “anonymizer” service, itself, may be keeping server logs that could record your data…and these logs could be subpoenaed. So, be sure to look for an anonymizer service that does not keep logs!

If you’re worried about protecting yourself and your data online, we’re here with some helpful solutions.  Read on to learn how to surf the Web anonymously.

Disable any extensions

Anonymous browsing services will protect you from people who have physical access to your computer. This means it will not leave anything about your history, and it will delete any cookies and private data when you close the browsers. Google, for example, has the Incognito mode for Chrome browsers.

However, there’s one more reason for you to use Incognito and other browser’s anonymous browsing mode: it disables any plugin or extension by default. Plugins and extensions can store private data and share these with the Web sites you visit without you even realizing it!

Without plugins or extensions running, you can be sure that Web sites cannot obtain data from them.

Get a second browser

Chrome, Firefox, Internet Explorer, Safari and other well-known browsers are available for free. Even if you have a favorite browser for your daily activities, it makes a great deal of sense to use a second browser for sites that you want to visit anonymously.

By second browser, we mean a browser that you do not use to open e-mails, access your social media accounts, and do your online shopping, among other usual activities online.

Why?

Because some anonymizer services – which may include those of your favorite browser – could still leave cookies on your machine, which could be used to find out who you are.

Use a Web proxy

If you only wish to anonymize select activities (and if you do not mind the slow speeds), you might want to check out Web proxies.

All you need to do is go to a Web proxy site, enter the URL you want to visit, and voila! You’re there…anonymously!

Be reminded, however, that some content may not display when you use a Web proxy. Forms may also not get submitted, such as when you are logging into your Web mail service.

A better option would be to use manual proxy servers that work like a Web proxy, but in this case, you will need to set your browser to use the proxy’s IP address.

Do not login

You’ve probably noticed that today there are countless sites that require you to use (or create) a username and password in order to read a complete article or use other functionalities of the Web site. Or, perhaps, they ask you to connect to the site using Facebook or Twitter.

Why?

Because the site wants identifying information about you.

Think twice before logging in or registering on any site with which you’re unfamiliar.

Don’t want to create a username & password, but still want access to the site?

Check out BugMeNot.com to see if they have log-in credentials that you can use instead.

Use TOR

TOR is short for The Onion Router.

What it does is simple: your browser will be performing the same data requests, but it will pass through a series of TOR servers, and at each of these transmissions, your data will be encrypted. This way you can access all your favorite sites without being “followed”!

Get a VPN

VPN stands for Virtual Private Network. These networks enable you to browse anonymously by hiding your IP address and replacing it with that of another server.

When you use a VPN you can rest assured that your data is secure and safe from hackers, cyber scams, identity theft and phishing email fraud.

5 Simple Steps To Keep Your Home Wi-Fi Secure

Screen Shot 2014-05-20 at 12.16.32 PMDo you have Wi-Fi in your home?

Chances are the answer is “yes”.

Today, Wi-Fi is essential because of the growing multitude of devices that only work if connected wirelessly, like mobile phones and tablets.

Even most desktop computers use Wi-Fi for their internet connections nowadays because it’s just simpler to connect to Wi-Fi than it is to run an unsightly network cable across the floor.

All of this Wi-Fi is great, but is it safe?

We’ve all heard horror stories about some unsuspecting family who has a criminal next door that uses their Wi-Fi to do some ghastly deed, ultimately resulting in legal trouble for the victimize family. Now, in all likelihood, that won’t happen to you, but that doesn’t mean you shouldn’t take the proper precautions to ensure that your home Wi-Fi is as safe and secure as possible.

Here are 5 simple steps you can take to secure your home Wi-Fi connection:

Encryption – One of the easiest, quickest ways to protect your home network is to encrypt it. In fact, most routers support encryption already, just be sure to use either the WPA or WPA2 settings — they provide the best level of security. Once you encrypt your network, you’ll have to enter a password whenever you wish to connect, but that minor inconvenience definitely outweighs the headache of getting hacked.

Change Passwords – Many routers come with preset passwords for working with the device settings, and this password is different from the password that you use to access your Wi-Fi itself. Hackers often know standard default passwords and then are able to manipulate your router. Be sure to change the router’s device password after installation.

SSIDs – Another safety measure you can take is to set your router so that it does not broadcast your service set identifier a.k.a. SSID, which is your network’s name. Once you disable your SSID broadcasting, your network’s name will no longer be visible on nearby computers and devices. This means that only people who know your network’s name will be able to find and access it.  

Firewall – Most wireless routers come with built-in firewalls, however sometimes these firewalls are turned off when the router is shipped. Double check that your router’s firewall is turned on.

Disable Remote Admin – Often routers allow you to access the router remotely and administer changes. Unless this is a feature you need and are very familiar with, it’s often best to disable it so that hackers cannot gain administrative access to your Wi-Fi network for their own personal gain.

To learn how GhostPath VPN can protect your privacy online, click here.

Why You Should Consider Using a DD-WRT Router

Wi-Fi Security

DD-WRT is third-party firmware designed to upgrade and enhance the functionality of OE wireless internet routers by replacing the router’s original, integrated firmware. The big question is, “Why would you want to replace the original firmware?”

The problem with the original firmware is that router manufacturers often intentionally limit their product’s full capabilities. The limitations are designed into the preinstalled firmware. DD-WRT does not impose those limitations, allowing your router to become powerful enough to rival those used in enterprise IT environments. Using a DD-WRT router unleashes a variety of ways to realize enhanced performance and functionality. Even better, it doesn’t cost you a dime.

Benefits of Using DD-WRT

It’s one thing to have expanded power, but the real benefits are derived from knowing how to harness it for your benefit.

If we were to list all the benefits you can enjoy from using DD-WRT, the list would be longer – much longer than we have space or time to list here. So, is a short list of what we consider the top features and benefits of DD-WRT:

  1. IPv6 support. With IPv4 addresses becoming increasingly scarce, you’ll appreciate DD-WRT’s built-in IPv6 support.
  2. Advanced Quality of Service controls are available on some DD-WRT builds.
  3. A highly configurable and very powerful firewall that is based on iptables firewall construction. You can easily edit the iptables firewall via DD-WRT’s interface.
  4. DNS controls such as DNSmasq, which allows simplified DNS configuration behind the firewall and makes host-name lookup faster. You also get support for DNS providers such as No-IP, TZo, DynDNS and others.
  5. The access point is visible only to your wireless clients, preventing inadvertently giving access to each client’s shared files.
  6. Easy access to multiple source access-control solutions such as WiFiDog, HotSpot System, ChilliSpot and others.
  7. Extensions, extensions, and more extensions. You can add functionality far beyond the original limitations of the router, such as external USB connectors.
  8. DD-WRT plays well with VPN. Instead of configuring each of your devices to connect to a VPN (*ahem* Ghost Path) you can configure the router itself to connect over VPN, protecting all devices on your network.

The best thing is that DD-WRT is FREE! Well, at least for now.

Securing Your Entire Home

Because your home network gains the power of an enterprise-level router, you also get better security. No more neighbors stealing your Wi-Fi connection!

For one, DD-WRT ignores unrequested packets that go through your WAN port, making it difficult for a hacker to even know that you have a network there. It even provides better protection against Trojans, which do not pass through your Internet connection, hence, bypassing your firewall.

You gain a range of security protocols to make your Wi-Fi secure. There’s WPA that even supports RADIUS, there’s TKIP, AES and a combination of both. There’s WPA2 and WEP. You can choose the safest options: WPA + AES, WPA + TKIP + AES. Or, if you are feeling generous, you can disable these protocols and give Wi-Fi access to those who can see your network. Setting up security for your DD-WRT router is very easy, using its Web-based interface.

Again, DD-WRT’s built-in VPN connectivity allows you to automatically send all your network traffic over the VPN, greatly increasing security.

Need to Know

There are some things that you should know before trying, installing and using DD-WRT firmware for your router. First, using DD-WRT invalidates the manufacturer’s warranty support for your router. This is no different than what typically happens when you make performance-enhancing changes to your car. You will not be able to call Linksys, D-Link, NETGEAR, and others, if something were to go wrong with your router. Be sure to research the ramifications as well as the benefits before you modify your stock firmware with DD-WRT.

Second, it is entirely possible that your router will be bricked, turning it into a lovely paperweight. As with modifying anything, there is always the potential for suffering other unintended consequences. So, again, do your homework and weigh the risks before installing DD-WRT.

Third, manufacturers aim to make it easier for non-technical users (un-geeks and anyone over 55) to tinker with and install their routers.

The grass may be greener on the DD-WRT side of the fence. Just be cautious when scaling the top of the fence and be especially careful of what you land in.

Analyzing the 1000 Most Common Wi-Fi Network Names

Wi-Fi SSID

I recently came across a list of the 1000 most commonly used SSID’s and thought it would be fun take a quick look at it. If you didn’t already know, SSID is the technical term for the name of your wireless network.

Here are some of the most interesting things I gleaned from the list. The percentages below represent how often the SSID shows up in the total list of SSID names survey, not just the top 1000 SSID’s.

  1. No name, or a hidden name, is really popular. Over 2.3% of the SSID’s examined had no name, a hidden name, or something similar.
  2. Routers that come with a predefined network are popular. AT&T’s Uverse routers are a good example and come with a pre-defined wireless network that includes a name like “2WIRE199”.
  3. Netgear also sells routers that come with predefined network names. “NETGEAR00” through “NETGEAR99” are all names that make it into the top 1000.
  4. “default” (0.6%) and “home” (0.3%) are used quite commonly
  5. Hotels, such as “Marriott_Guest” (0.01%), “Hyatt” (0.01%), “hhonors” (0.06%), and “laQuinta” (0.01%) make the top 1000.
  6. Among SSID’s named after people, “Alex”, “David”, “Mike”, and “John” lead the way.
  7. My personal favorites from the top 1000: “pretty fly for a wifi”, “skynet”. “boobs” was not in the top 1000, sadly.

Why You Shouldn’t Be Using a Common SSID

If I can find a list of the 1000 most commonly used network names then I know that the bad guys can too. Most of the time people allow network names to be broadcasted from the router, but a higher-security option is to not broadcast the name and require that users connecting be able to specify the network’s name and key. If you don’t broadcast your SSID then you certainly wouldn’t want to compromise that bit of security by using a frequently used SSID.

Now, let’s talk about Uverse for a second. People know how Uverse routers are setup generally. They know the number of characters in the network key and the character-set. Knowing these details makes it fairly easy to brute-force guess the network key. I believe that Uverse routers use only numeric characters in the network key… how much simpler could it get? If you use Uverse at home then you should immediately change your SSID and network key away from the defaults. It’s not hard to do and will greatly increase your security at home.

Photo Credit: woodleywonderworks via Compfight cc

Ghost Path Proposes a “National Password Day”

National Password Day

We have days throughout the year commemorating everything from doughnuts to the color purple, but we don’t have a day for one of the most important aspects of modern life. We need a “National Password Day” to remind everyone of the importance of routinely changing your passwords.

The Plan

May 20th is the day that we’ve chosen. Every year on May 20th (starting in 2014, most likely) social media will be blanketed with reminders to change passwords for the services you use most (email, Facebook, etc.). The goal is for major media outlets to start covering the movement and spreading the word to mainstream internet users, who are the users that likely need the most advice for protecting themselves online.

Why You Should Change Your Password Frequently

Usernames, email addresses, and passwords are the keys to your digital life. Someone stealing, guessing, or hacking your password can lead to serious financial consequences and identity theft. Changing your passwords frequently can help keep you vigilant. Also, changing passwords frequently requires you to get creative with your password choices, which is good thing. A weak password is like a door left unlocked… it doesn’t really provide much protection.

How To Choose A Strong Password

What type of password you can choose depends greatly on the service that you’re using. Not every website allows special characters and they all have different length requirements. Keeping that in mind here are a few suggestions:

  • Always mix uppercase and lowercase letters. However, don’t do it obviously. Something like “eaTmoreSteak” is better than “EatMoreSteak”. 
  • Always add numeric characters whenever possible. Again, don’t do it obviously. Think “eaTmore4Steak” instead of “eaTmoreSteak4”.
  • Special characters are your friend. If they are allowed then use them to replace common characters. My favorites are @, !, and _. “e@Tmore4Steak!” is a winner of a password.
  • An outside the box suggestion is to use three or more dictionary words. If spaces are allowed then you can build secure, easy to remember passwords. “eat more steak” is nearly as secure as “e@Tmore4Steak!”, but has the added benefit of being quite easy to remember.

Of course, you should never use your birthday, address, name, pet’s name, mother’s maiden name, anniversary date, etc. as your password. These are far too easy and offer no protection at all.

Help Us Promote National Password Day

We need your help to make National Password Day a reality. Leave a comment below if you believe that having a National Password Day is a good idea. We need to be able to show the level of interest on our application.

We’ve also created a shareable image that you’re free to use.

National Password Day icon