選單
中文 (繁體)

The basic principles of digital hygiene

The rapid increase of people's personal data abuse by companies and individuals calls for the creation of some kind of self-defense checklist, and here is ours.

It answers a simple question: what is most important if you don't want to be hurt because someone knows too much about you.

It is not a guide on cybersecurity. It is far from being exhaustive and contains some obvious points. But nothing is forgotten more often than what everyone's sure they know. With that in mind, here are some pieces of advice that will help protect your private sensitive data form being harvested uncontrollably for profit of others:

1. Do not neglect the fundamentals

You probably brush your teeth twice a day and regularly take a shower, just so that people would be comfortable around you, and you would be comfortable around them. These are hygiene fundamentals that everyone agrees on (hopefully). So make sure you take care of your online hygiene too: take a habit of changing passwords from time to time, at least for critically important websites and services. These include those that have access to your financial information, to your location and everyday routes, home and work addresses, information about your health issues, and so on. But how to choose a new password?

1.1. Basic principles of a good password:

  • Strong. At least 12 characters including numbers and capital letters)
  • Unique. Don't get scared, there are cognitive techniques to generate unique passwords and memorize them without much effort. Alternatively, you can store them in a trustworthy password manager app (also protected by password or biometry).
  • Not written anywhere. Yes, don't be this guy from TV who left a post-it note with all passwords on the monitor and got the entire office hacked.
  • Not put in any forms except for the one made for it. Those "check your password strength" websites are scams. Those "check if your password has leaked" services are most probably scams too. Those fake website pages mimicking real websites are scams (they are called phishing for a reason). It’s okay to use services that check it by an email or by a phone number like Have I been pwned.

2. Use 2-step authentification wherever possible

Relax, this is not for long. Companies promise us a passwordless future, biometric identification, and blockchain-based digital money that just can not be stolen or lost (not to be confused with cryptocurrencies). It's all going to happen soon, but not tomorrow, and until then you'll have plenty of chances to be hurt in plenty of ways. Escape the dubious honor to be the last person on Earth robbed by cybercriminals and use 2FA with important services (see above the definition of important).

3. Protect your devices with a password and lock them when not in use

Smartphones, tablets, laptops, desktop computers — what do people do with all these huge amounts of time they spare not locking devices? Most of them can be unlocked with a fingerprint or face ID in a fraction of a second. And yes, if you are in the office and leave your workplace for a short trip to the cooler — lock the computer. Maybe there are no evil hackers around, but you can fall victim to a practical joke or idle curiousity of colleagues. And of course, set up automatic locking after a minute of inactivity.

4. Update your apps and the system

Most people let software updates live their own mysterious lives, but power users often optimize the updates in order to save battery, traffic, or their own nerves from the cases when Windows demands a restart in the middle of a Zoom meeting (or a Minesweeper game, if the day is slow). Some people switch to manual updates and then forget to run them. They more often fall victim to vulnerabilities found by hackers and spammers that could have been fixed by a postponed update. You do not want to belong to these people.

5. Do not insert USB drives found somewhere into your computer

It doesn't matter: a personal computer, an office computer. Friend's computer. Enemy's computer (even the enemy might not deserve the consequences).

I just can hear you scream "Oh come on, I'm not five years old"!
You have no idea how many cats curiosity has killed. You will not even need to launch anything from a malicious drive or open any files to get your computer attacked, and even a freshly updated antivirus might not be enough.

5.1 An advice of the same level of obviousness and the same level of public neglect: do not keep Bluetooth, Wi-Fi and geolocation active on your device when you do not need them. Even if you do not care about data, you probably care about battery life. It's just a bad idea to let your device connect automatically to public Wi-Fi networks — most unexpected things can happen that will be exploited by cybercriminals sooner or later.

6. Do not overshare

Data is the new oil, they say, so why walk around leaking that valuable liquid? Fill only the required fields in the forms. Participate in polls only if you get something for it, and it's worth it. Trade your information, don't gift it. And why actually would a flashlight app on your smartphone ask for the access to your geolocation and contacts? Why a weather forecast app wants access to data storage and camera? I mean, they know what to do with it (spoiler: they'll sell it to advertisers, at best), but what is there for you?

6.1 Delete unused accounts. It is hard to remember everything you've ever signed up to, but at least pay attention to notifications and emails. It is sad in some way: companies try to galvanize you as a customer with their newsletters, and you thank them by leaving and covering your tracks.

6.2 Do not do work stuff at home. Do not do personal stuff at work. Do not do any important stuff in public networks.

If you actually need something done as soon as possible, do it of course. But it is a nice lifehack to zone your activities in time and space, including the digital universe's space and time. Your office network administrator absolutely does not have to know anything about your personal finances, or whom you flirt with on Facebook. And all the shrinks of the world advise to leave your work at work (if in the midst of the pandemic world you are fortunate enough to possess a workplace separated from other places).

At least there is no dispute about public networks. Subway Wi-Fi, park Wi-Fi, cafe Wi-Fi, your neighbors' Wi-Fi — they are all shark pools, or at least you should treat them like that. Use a VPN and avoid passing somehow sensitive information, visit only thoroughly protected websites (Google services are more or less so, a small independent e-commerce website — rather not, if you want an example).

7. Know your rights

Especially if you are in the EU. Or California. Or China. Or Russia. Do you get the idea?

Countries generally like to protect their citizens, and countries also like to be protected from their citizens. Explore the legislation around data, privacy, and digital services regulation in your country. Find out what you can and can not do. What can and can not be done to you. Ignorantia legis neminem excusat — ignorance of the law excuses no one.

8. Get yourself impressed

You might change your view on privacy if you find out how much data they harvest and what happens to people because of that. You can start from here.

Or maybe you should request your data gathered by Facebook (you can ask them, and not only them, "what do you know about me") and try not to turn paranoid discovering how much they know about you.

One more way to have a lot of fun: check your advertising preferences, for example, on Facebook or Google. See yourself in the distorting mirror of Zuckerberg's eyes. You can even correct them if they think that you are a COVID dissident, live in a four-store house, or have been to North Korea.

9. Discover handy tools and use them

VPN, DNS, ad blockers, antiviruses, browser incognito mode, cookie cleaning, private search engines and secure messengers — they are not made for criminals, spies, or celebrities. They are made for and used by real people, the Smiths next door. Browser incognito mode or a VPN can help you escape price discrimination (when airline tickets, hotels, rental cars, and many other things are more expensive for those who are considered by robots to be rich or more in need. An ad blocker saves you from attention draining, fatigue, procrastination, marketing manipulation, spontaneous spending, battery drain, and much more.

Of course, it is crucially important to choose a service provider or a vendor wisely. Use well-known solutions from experienced developers with positive feedback in independent reviews. Download apps only from official app stores and developers' websites (sometimes a mobile app can be downloaded only from a website because, let's say, Google does not allow apps with certain functions to their stores, wink-wink).

10. Give feedback, report violations

Waste three or four taps, donate a second of your time to charity: report bad ads, spam, scam, bullying, and everything evil (or even just suspicious).

11. Think twice

This is a good general advice for everyday life. Spontaneous emotional reactions exist to be abused. Don't act on impulse the next time you receive an email from a Nigerian prince.

12. Do not consider yourself protected and invulnerable by default

If you are neither rich nor stupid, it doesn't mean that your data is not of interest, or that there are no ways to get to it. Your personal information is worth more than you think, and there are people and corporations willing to take it from you.

13. Look after the weaker ones

Teach your children and your parents the rules of secure web experience that you learnt today (or knew beforehand). By protecting them, you protect yourself, if nothing else.


I really hope that at least some of these pieces of advice will be helpful for you. Even if there's too much to take in at once, start with something small: change your Google password that's been collecting dust for two years, or give VPN a go. Who knows, maybe you'll make a habit of keeping digital hygiene sooner than you'll notice.

喜歡這篇文章嗎?
19,180 19180 使用者評論
極好的!

AdGuard for Windows

Windows 版 AdGuard 不只是廣告封鎖程式,它是集成所有讓您享受最佳網路體驗的主要功能的多用途工具。其可封鎖廣告和危險網站,加速網頁載入速度,並且保護兒童的線上安全。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for Mac

Mac 版 AdGuard 是一款獨一無二的專為 MacOS 設計的廣告封鎖程式。除了保護使用者免受瀏覽器和應用程式裡惱人廣告的侵擾外,應用程式還能保護使用者免受追蹤、網路釣魚和詐騙。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for Android

Android 版的 AdGuard 是一個用於安卓裝置的完美解決方案。與其他大多數廣告封鎖器不同,AdGuard 不需要 Root 權限,提供廣泛的應用程式管理選項。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for iOS

用於 iPhone 和 iPad 的最佳 iOS 廣告封鎖程式。AdGuard 可以清除 Safari 中的各種廣告,保護個人隱私,並加快頁面載入速度。iOS 版 AdGuard 廣告封鎖技術確保最高質量的過濾,並讓使用者同時使用多個過濾器。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard 內容阻擋器

AdGuard 內容阻擋器將消除在支援內容阻擋器技術之行動瀏覽器中的各種各類廣告 — 即 Samsung 網際網路和 Yandex.Browser。雖然比 AdGuard for Android 更受限制,但它是免費的,易於安裝並仍提供高廣告封鎖品質。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard 瀏覽器擴充功能

AdGuard 是有效地封鎖於全部網頁上的所有類型廣告之最快的和最輕量的廣告封鎖擴充功能!為您使用的瀏覽器選擇 AdGuard,然後取得無廣告的、快速的和安全的瀏覽。
19,180 19180 使用者評論
極好的!

AdGuard 助理

AdGuard 桌面應用程式的配套瀏覽器擴充功能。它為瀏覽器提供了自訂的元件阻止的功能,將網站列入允許清單或傳送報告等功能。
19,180 19180 使用者評論
極好的!

AdGuard DNS

AdGuard DNS 是一種不需要安裝任何的應用程式而封鎖網際網路廣告之極簡單的方式。它易於使用,完全地免費,被輕易地於任何的裝置上設置,並向您提供封鎖廣告、計數器、惡意網站和成人內容之最少必要的功能。
19,180 19180 使用者評論
極好的!

AdGuard Home

AdGuard Home 是一款用於封鎖廣告 & 追蹤之全網路範圍的軟體。在您設置它之後,它將涵蓋所有您的家用裝置,且為那您不需要任何的用戶端軟體。由於物聯網和連網裝置的興起,能夠控制您的整個網路變得越來越重要。
19,180 19180 使用者評論
極好的!

AdGuard Pro iOS 版

除了在 Safari 中之優秀的 iOS 廣告封鎖對普通版的用戶為已知的外,AdGuard Pro 提供很多功能。透過提供對自訂的 DNS 設定之存取,該應用程式允許您封鎖廣告、保護您的孩子免於線上成人內容並保護您個人的資料免於盜竊。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for Safari

自 Apple 開始強迫每位人使用該新的軟體開發套件(SDK)以來,用於 Safari 的廣告封鎖延伸功能處境艱難。AdGuard 延伸功能可以將高優質的廣告封鎖帶回 Safari。
19,180 19180 使用者評論
極好的!

AdGuard Temp Mail

免費的臨時電子郵件地址產生器,保持匿名性並保護個人隱私。您的主收件匣中沒有垃圾郵件!
19,180 19180 使用者評論
極好的!

AdGuard Android TV 版

Android TV 版 AdGuard 是唯一一款能封鎖廣告、保護隱私並充當智慧電視防火墻的應用程式。取得網路威脅警告,使用安全 DNS,並受益於加密流量。有了安全性和零廣告的使用體驗,使用者就可以盡情享受最喜愛的節目了!
已開始下載 AdGuard 點擊箭頭所指示的檔案開始安裝 AdGuard。 選擇"開啟"並點擊"確定",然後等待該檔案被下載。在被打開的視窗中,拖曳 AdGuard 圖像到"應用程式"檔案夾中。感謝您選擇 AdGuard! 選擇"開啟"並點擊"確定",然後等待該檔案被下載。在被打開的視窗中,點擊"安裝"。感謝您選擇 AdGuard!
在行動裝置上安裝 AdGuard