First, you should investigate how you store and keep your data private. Most of our services have been supporting our information for some future nefarious reason. Since we no longer want to be controlled by someone else and not wanting to be victimized, it’s always best to have a preventable stance with your security. Here are the steps we recommend to get your data private.
- Your cell phone is listening. Your phone and the SIM card are both sending your information somewhere.
- Your home computer is sending private information, screenshots, and voice recordings somewhere.
- Your home printers, TV, and phones take pictures, listen to you, and send your data somewhere.
- Your Router is sending out your information and can hold up to 128 gigs of data to send somewhere.
- Your www searches are captured, and your conversion to IP addresses is sent somewhere.
- Your bank, credit cards, SS, and other businesses send your data somewhere.
- School records capture your data through Windows and then send it somewhere.
It is a fact that some countries do not let Microsoft Software into their schools or universities due to the breach of security. There have been lawsuits from Germany against the software giant. They are spying on you, and you don’t even know it. There are so many lawsuits and testimonials of high-level cyber security officers reporting that their companies are spying on you, collecting data, and sending it somewhere. Your phone is always coming out sound waves of information announcing who you are, your address, and your IP address.
The only way you can keep yourself safe is to understand where they are breaching your privacy and fix it. You 2fa already compromised. Your six or 8-digit passwords are already compromised. That is why we must burn the old way of doing things and adopt a more secret stance with our data. Personal privacy will be one of the most important transitions we make the following year. Why not start a more “ghosted” experience with what you do, invest, or say? Start with this list:
- Digital personal keys that plug into your computer.
- Password manager and using passphrases, not letters.
- Scrap your router and get a decent firewall.
- Junk Microsoft and learn the Zorin Linux system
- Get a secure transition through the airways to the internet using firewall software
- Use the quad9 DNS server
- Use a secure email address or start your website and create your email address
- Look for service providers in Switzerland; they are the most secure due to laws
- Only do business with “open” source providers whose OP operates with a Linux software program.
- Work your way off the towers and get into the cloud.
- Switch phones to a Blackberry, Linux OS
- Take a Linux class and learn how to control your computer by making commands, not clicking on what they want you to use, and locking down the hidden stashes of your data or backdoors.
- Use a mic jammer
- Use a phone screen for non spying
- Get Michael Bazzel and Edward Snowden’s books on privacy, security and hacking.