When someone is going online or using any online services, there is no such thing as privacy. All data is currently being tracked by all parties — including ISPs. Some ISPs even go so far as to inject web pages visited by their customers with the ads they want.
However, that does not mean that there are no ways to protect your privacy while surfing the internet. For this reason, we want to provide some tips to keep yourself private when using the internet. Without further ado, let us jump to the first one.
1. Use Encrypted Messenger
To chat and communicate securely, you can use a messenger that has an encryption feature. WhatsApp is a messenger that is equipped with it. Even though it is based on mobile, there are applications that you can also use on a PC for mirroring.
The existence of encryption in messengers such as WhatsApp makes other parties, including ISPs, only able to see that you are using the application but cannot track your activity inside.
2. Visit Websites with HTTPS Enabled
Currently, various websites are already using HTTPS to encrypt data exchange and protect the privacy of their visitors. This encryption allows other parties to only know you visited the site without knowing what page you were on. In addition, sites with HTTPS cannot be easily injected by ISPs with various codes to be displayed to their customers.
Almost all popular websites such as Google, Facebook, Twitter, Gmail, to various local online stores have HTTPS enabled. If you’re a blog owner, we recommend switching to HTTPS immediately.
3. Use a VPN
Using a Virtual Private Network can also protect your privacy data while freely browsing the internet. This is because your internet activity will pass through the VPN server first, thereby masking your IP address. Let no unwanted spies by using our VPN servers to hide your private information. Most quality VPNs also encrypt data exchange and allow you to browse anonymously.
There are many free VPNs, but make sure you are selective in your choice. Our advice, use a paid premium VPN that is trusted and has a fast, safe, and quality connection.
4. Use Tor Network
Tor will pass data to several servers first before finally being redirected to its actual destination. This makes your internet activity challenging to track. Every data is also encrypted, making it more difficult for other parties, including the ISP, to trace.
You can browse through Tor using various Tor applications such as Tor Browser for browsing the internet, Tor Messenger for chat, etc. It does come with some lacks, though; you may feel a slower internet connection while using the Tor apps.
5. Use DNSCrypt
In the same way that SSL converts HTTP to encrypted HTTPS, DNSCrypt also converts ordinary DNS traffic into encrypted DNS traffic. As a result, data exchange will be safer from snooping and peeping from other naughty eyes.
6. Avoid Using Public Computers
If you are forced to use a public computer, you should avoid accessing sites, services, applications, or other private things. This is especially true for online activities that involve payments or other financial activities such as banking.
To always use the internet safely, use a public computer such as an office or an internet cafe only for ordinary activities, such as browsing or casual writing.
7. Always Use Trusted Sources for Downloading Software
When you visit a site, there will be lots of promotional software installations offered for free.
Some sites that offer software download for free may have false information stating that your computer’s software is an old version and urgently needs the latest update.
Don’t be fooled with the old trick like this because almost all free software downloaded from those suspicious sites contains malware. It’s not all dangerous, but it’s better to prevent it than become a cybercrime victim.
8. Password Management
To protect your account when login into a specific site, it’s better to use a different password for each account.
Maybe this method is a little complicated and will be difficult to remember a long list of passwords. But now, there are many password management applications that you can use to overcome this.