The protection of personal data is a subject that has been at the forefront of the news for several years now. On the other side of the Atlantic, the current trend does not lend itself to optimism, with the American government increasing the number of laws reinforcing the interference of the authorities in the processing and collection of users’ private data. So, in April 2018, the Cloud Act was signed into law and allows law enforcement to force cloud service providers to disclose their customers’ data, whether they are in the United States or not.
However, for the first time, an investigation was opened against FacebookFacebook, regarding the management of the personal data of its users which would have been used by the company Cambridge Analytica in order to manipulate part of the electorate and favor the election of Donald Trump. In Europe, European institutions seem more sensitive to this problem, which is why the GDPR (General Data Protection Regulation) was born, which strengthens the rights of citizens of the European Union over their personal data by posing threats of heavy financial sanctions on companies that fail to comply with their data protection obligations.
When personal data is traded
In the midst of this philosophical debate, should personal data remain private or are they a commodity? The user lambda has, in all cases, every interest in protecting itself from the maliciousness of computer hackers: remember the hacking of cloud systems in order to steal very intimate photos from Hollywood stars and expose them for everyone to see on the internet. We also know that many malware, contained in emails, dangerous sites or programs installed automatically on a computer, aim to collect bank card numbers or any data that can be used illicitly.
Added to all this is the collection of your personal data, which is a major objective of the web giants in order to drown you in a continuous stream of targeted advertisements. Ultimately, these days, unless you’re an IT security expert, it’s hard to know exactly how much of a threat you’re facing. Therefore, even if you are not doing anything illegal, it seems safer to encrypt all of your communications and files. To do this, Futura presents the most useful and best-known tools available.
Email encryption services
Even though Gmail provides good protection of your privacy against external threats, it scans your emails to then display targeted advertisements according to your preferences. If you don’t like this idea, there are customers of messagingmessaging which secure all emails with end-to-end encryption, i.e. no one can read the emails except the sender and recipient. ProtonMail is software of this type, free, easy to use and based in Switzerland, therefore subject to the strict legislation of this country regarding privacy. If you don’t want to change email clients, there are software programs that only encrypt emails and attachments.
The best known are Gpg4win which has the advantage of being open source and free or Symantec Desktop Email Encryption which is reserved for professional use.
We can also mention SecureGmail which is an extension for Chrome allowing you to encrypt Gmail messages.
And VPNVPN, or virtual private network, is software that creates a secure tunnel through the internet by encrypting your data as it passes through a public network. A VPN can overcome geographic content restrictions, meaning it allows you to escape censorship and not be affected by content limitations depending on the country you are in.For this, the VPN hides your address IPaddress IP and your location by assigning others to you virtually. Most VPNs offer a list of countries in which you can choose to locate virtually. This is, for example, the case of TunnelBear (also read “The essentials for your PC in 2019 “), the Little version of which is free and easy to use, while being limited to 500 MB/month. A multitude of other VPNs exist and the difference between them is mainly based on the vitessevitesse of the connection, its stability and the types of data managed (some VPNs do not work for P2PP2P and the torrentstorrents).
Most of browsersbrowsers, among the most popular, integrate numerous tools to prevent opening malicious websites, evade automatic installation of dangerous software and update automatically to prevent their security vulnerabilities from being exploited. But few of them offer anonymous surfing and complete privacy.
So, if the non-disclosure of your personal data is one of your priorities, then the web browser TorTor Browser is probably for you. It hides your IP address, location, and the content you are accessing using multiple levels of encryption. This is the reason why Tor Browser is the most popular browser among hackers.
Encryption of data stored on a cloud
The data you choose to back up to a cloud is theoretically encrypted, but you have limited control over how it is encrypted and who can decrypt it. If you want to have greater control, then cloud services like Mega (the site replacing MegaUpload) allow the user to manage encryption and storage themselves. decryptiondecryption Datas. If you are already a user of a cloud service and do not want to change, then software like Cryptomator can be used to encrypt the data upstream, then store it on Dropbox, Google Drive, OneDrive, etc.
Encryption of text messages and video and voice conversations in instant messaging
The services of instant messaginginstant messaging the most famous, Facebook, Messenger and Whatsapp, offer end-to-end encryption for text messages. To do this, they rely on the encryption technology of the company Open Whisper Systems which created its own applicationapplication, Signal, which you can use to also secure your video and voice chats. If you don’t mind changing your email, then TelegramTelegram has been specially designed to protect your data, as it is very complexly encrypted and can even self-destruct!
Encryption of data stored on a hard drive
BitLocker Drive Encryption, included in Professional and Enterprise editions Windows 8Windows 88.1 and 10, is a data protection specification designed by MicrosoftMicrosoft which allows you to encrypt the contents of your Hard diskHard disk so that it is protected in the event of access to your PCPC and attempted theft of your data.
If you prefer to choose an alternative solution to that offered by Microsoft, then you can turn to VeraCrypt which is free, open source and based on the TrueCrypt tool.
Download Bitlocker Drive Encryption
rewrite this content and keep HTML tags