All that is written below is the overall and not the most complete set of those actions that are personally tried on themselves and give a good result. But this description will be enough in order to understand the mainstream and develop a line of behavior.
Before discussing security issues in general, security issues as part of the use of social networks, in particular, you need to answer one simple, but important question: do you think the information environmental environment (Internet) to the aggressive environment, the environment, which can apply to you what -Lo damage (reputational, information, physical, financial, etc.) If your answer is "no" - you should not waste time for further reading of this text. If your answer "Yes" - then continue
Also, I mean that this text can be useful for those users of social networks that have already moved away from the position "I have nothing to hide", but has not yet sick with such a worldship, like "Cockroaches write a report on me in FSB / ANB / MB."
It is understood that all your actions you perform using a safe and properly configured browsers (Firefox, Orfox, etc.) and a specific software (Tor, FreeVPN, etc.).
Speaking of safety, it should be noted that social networks are a complex ecosystem, habitat in which requires compliance with some simple rules.
1. Opening an account. Currently, almost all social networks when registering an account require a mobile phone number and email. Your mobile phone number can be required at first registration steps (both in the same VC) and after registering with the use of email address for the so-called "activation of your account". The essence is one - your room is entered into the DB Sots. Networks and is there all the time while you use your account. Formally, many networks declare that when deactivating / removing an account, all records, including a mobile phone number, will be deleted. But we cannot check it out. So - we will question this fact and proceed from what hit once in the database, your number will always be on us.
1A) Using emails for registration. The most correct is the use for registration in social. Networks:
- nonien mailboxes (under the term "name" I mean the name of the drawer of the
[email protected]);
- virtual mailboxes (such as mywiz.cn);
- Drawers provided by temporary email services (dropmail.me, temp-mail.org, crazymail.com). Most social. Networks do not like such services and in every way banitis. But you can always find a service that will work. Fortunately, search engines have not been canceled yet, and such services actively index themselves in search engines.
The minus use of the last option is the impossibility of restoring a lost password to the mailbox address, for such a mailbox exists 10-30 minutes after its activation. So if you suffer sclerosis or you are a blonde with pink bows, ever losing all - options using temporary email services not for you.
In my opinion, the safest email use is the first option - the opening of an impersonal mailbox on some "informational garbage", such as Mail.Ru, Yahoo.com, etc. Why? Because, using the option with temporary services, we can only guess who has access to our box on the server side, how much information is stored in reality, etc. Using a nonien mailbox will allow us to avoid the possibility of our further identification.
I recommend still creating a separate mailbox for each social. Networks and not use this box anywhere else. By this, we reduce the chance to "light up" our box in other networks and avoid logical binding of different social. Networks and accounts to one point in case someone will occur to conduct similar analytical work. Thus, providing itself with the "right" mailbox (or the like) we can safely prescribe it in your account in any social. Network.
In the end I will give links to the latest example of how nonsense and Ponte spoil people life
1B) Mobile numbers. We have already agreed with the idea that using your real mobile number in binding to the account on social networks is not very smart. There are three ways to circumvent the requirements of entering the number of your mobile phone when registering / activating an account in a social set:
- Use "free" numbers that are not tied to passport data (in those countries where possible. The practice of distribution in all advertising projects on Symos Street of the main mobile operators was widely disseminated. It was possible to immediately In the nearest terminal, it is anonymously downloaded to the account of the new SIM cards of rubles 200-300 and felt on such an impersonal number of activation code);
- Use free virtual telephony numbers (such as Next +). The situation is the same as with temporary email services: they are bantas and contribute to black check-in listings, but you can still find a valid. Using virtuals, I managed to register accounts (several pieces in every network) in VK, Twitter, Firebook, OK. With the latter, I had to tinker the longest - I had to go through 12 virtual telephony services, while I was able to find the one that was valid. In principle, we can say that this method of using virtuals during registration is unreliable, since I have access to your virtual number is very limited. This is a fair thought. BUT! First, the use of the same NEXT + is the number for 30 days to you, and no one bothers every 28 days to change the number tied to the accuint (the man I personally did not do), and, secondly, for several years this practice never There were no problems so that someone would take hold of my account by using my virtual number.
So, we assume that we have registered your new account on the social network using the mailbox and telephone that exclude our personal identification.
What's next?
2. FULL NAME. What I like in many democratic countries - no one is interested in your real name. This principle can be adhered to both social. networks. No one bothers you instead of your real name, say Sergey Ivanovich Petrov, use derivatives (well, if you are bad with a fantasy) = Ivan Petrovich Sergeev, Peter Sergeevich Ivanov, etc. But if there is a fantasy - it is not worth over to give her will, because your pseudonym the Terminator Hitlerovich Penguins will attract more attention to you than, say Ignat Evseevich Pukin. And our task is, just not to attract unnecessary attention. And if you became Ignat Pukin in Ok, then let him live there, and a completely different person should appear in VC with a completely different name.
One of the weakest links of your anonymity is your contacts and photos of you.
3. Your contacts within social networks. It is necessary to understand that if you were able to "encrypt" your identity with the help of fake phone numbers, mailboxes and names, but they connected to your friends and in a circle of communication of people who know you in reality - a penny price of your anonymity and security. For, as a rule, all the failures and disavowing begin, just, from your environment :-(. So, before connecting to your fake profile of my best friend and Comrade in the Kindergarten group, writing it something like: "Kolyan , Healthy, this is me Serega! Cool nickname, yes? ", Think:" Nafiga do I do it ??? ". With the same Kolyan, it is possible to build yourself so much. And even surprise the clogging at how His new friend knows his new friend, as it understands his soul :-)) And if you have become in the network Ignat / Terminator / T.P. - So stay to them to the end, avoid use in chats or correspondence of your present name or the real name of your interlocutor.
4. Photos. This is just that the topic on which many "burn". The point is not even that in the face or in the area you can identify people or a place where the event occurs in reality. (Stupid, unloading on her page of 1500 of its photos Against the background of the Mausoleum of Lenin's grandfather, say that you have never been in Moscow in life.) Most pictures have such a funny thing as EXIF data. I will not ship with a detailed description of what it works, why need, etc. I'll just say: EXIF is a thing that helps help to bring your photo by time and the real place of the event. How would you like it. How to deal with it? In two ways: Turning off, to hell, the ability to geometers in your camera and using external programs, the same photoshop that allows these tags to lift.
The penultimate question is whether there is no sense to use "branded" applications social networks? They simply simplify life to users!
Indeed, such applications greatly simplify life and work to all: users, administrators, servers and law enforcement officers. I, for example, (I will say gently) I'm not sure that the "native" application from VK or OK transmits only your username and password to the server. So the most reliable login of a social network is an old good web interface. Some social networks, the same Facebook, very nervously belong to the fact that I enter through the browser and torus. Face Time notifies me that they could hack me that I need to check everything all-all. For such networks characterized by increased hysterical, I use either self-written applications, or applications created by independent developers. Fortunately, no one has canceled the search, independent markets and repositories.
Using social networks, you should always remember a simple rule that is formulated many times and at different times. It's closest to me the formulation of G.K. H. Wensterton, English theater and writer: the sheet is hidden in the forest, and the corpse is among the dead bodies. And, guided by this rule, even from totally controlled social networks, you can squeeze maximum useful. For example, the same communication. Any open chat in any social network can be turned into a place of discussion that it is not recommended to discuss what to talk about what is not recommended about. How? Read, at least, artistic books about spies and remember the famous phrase: "Do you sell a Slavic wardrobe?". In the absence of modern telecommunication technologies, the information exchange between, for example, a resident and agent, was carried out exclusively in open information networks: newspapers, magazines, street bulletins. Each key event is given a certain logical and spent cipher. An example that I have already led before: in the chat in VC, two persons who are sitting under accounts with cute quotes and steamers are actively discussing their friend-old-old neighbor: how he got everyone for a lot of communication, and it would be time for him to move With the apartment removed to them, and in general, you need to do something with him, maybe you need a doctor? What do they mean?
Well, the latter - there are a large number of social, etc. Networks relating to great respect for the anonymity of their users. Among them, the same Silkroad (yes, he is still alive, and they sell and discuss not only what is forbidden to write and say), diaspora, etc.