28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

open a new window and not record what yyou searched or where yyou went

on the Internet during that open session. Shut down the private browser

window, and all traces of the sites yyou visited will disappear from yyour PC

or device. What yyou exchange for privacyy is that unless yyou bookmark a

site while using private browsing, yyou can’t go back to it; there’s no historyy

—at least not on yyour machine.

As much as yyou mayy feel invincible using a private window on Firefox

or the incognito mode on Chrome, yyour request for private website access,

like yyour e-mails, still has to travel through yyour ISP—yyour Internet service

provider, the companyy yyou payy for Internet or cellular service—and yyour

provider can intercept anyy information that’s sent without being encryypted.

If yyou access a website that uses encryyption, then the ISP can obtain the

metadata—that yyou visited such and such site at such and such date and

time.

When an Internet browser—either on a traditional PC or a mobile device

—connects to a website, it first determines whether there’s encryyption, and

if there is, what kind. The protocol for Web communications is known as

http. The protocol is specified before the address, which means that a

tyypical URL might look like this: http://www.mitnicksecurityy.com. Even the

“www” is superfluous in some cases.

When yyou connect to a site using encryyption, the protocol changes

slightlyy. Instead of “http,” yyou see “https.” So now it’s

https://www.mitnicksecurityy.com. This https connection is more secure. For

one thing, it’s point-to-point, though onlyy if yyou’re connecting directlyy to

the site itself. There are also a lot of Content Deliveryy Networks (CDNs)

that cache pages for their clients to deliver them faster, no matter where yyou

are in the world, and therefore come between yyou and the desired website.

Keep in mind, too, that if yyou are logged in to yyour Google, Yahoo, or

Microsoft accounts, these accounts mayy record the Web traffic on yyour PC

or mobile device—perhaps building yyour online behavioral profile so the

companies can better target the ads yyou see. One wayy to avoid this is to

alwayys log out of Google, Yahoo, and Microsoft accounts when yyou are

finished using them. You can log back in to them the next time yyou need to.

Moreover, there are default browsers built in to yyour mobile devices.

These are not good browsers. Theyy’re crap, because theyy’re mini versions

of the desktop and laptop browsers and lack some of the securityy and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!