Share on Social Media:

California Enacts New Privacy Law

The Golden State claims to have blazed a trail in the protection of online privacy.  The California legislature has passed, and Governor Jerry Brown has signed, an online privacy bill that its supporters say requires full disclosure and the right to opt out of data sharing and third-party sharing. The consumer will also be able to delete collected data if he wishes.

Image result for california images

Some consumer advocates are unsatisfied with the bill. They say that businesses should be required to obtain opt-in consent before collecting or sharing user data. Some internet service providers and online advertisers fiercely opposed the bill, though, so it couldn’t have been entirely toothless.

All parties will have ample time to adapt to the new law. It won’t be in force until 2020.

Was the privacy bill necessary?

Advocates of the privacy law point to recent events that they say indicate need for action. Among these are a pattern of serious data breaches, Cambridge Analytica’s use of Facebook data, scrutiny of tech platforms by Congress, and the FCC’s handing off of online privacy concerns to the FTC.

An even tougher data privacy bill had been scheduled for placement on this November’s ballot. Now that the California legislature has acted, though, the sponsors of this tougher bill have agreed to abandon their effort.

The lobby that most actively promoted the bill is Common Sense Media. Two Democrats, Senator Robert Hertzberg and Assemblyman Ed Chau, introduced it n the legislature.

Did anyone object?

Some analysts say the new law will bring more harm than good. The critics argue that web users gladly exchange personal data for free goods and services. The new law would inhibit these exchanges. Web users, then, would miss out on many essential services- or would have to pay for them.

Some privacy advocates say the California law doesn’t go far enough. They want the ‘opt out’ standard replaced with ‘opt in’. In other words, ISPs, browsers, and social media couldn’t collect user data without express consent from users. Under the the new privacy standard, consumers can opt out of sharing or commercial use of their data. But they have to act affirmatively to do so. They waive their online privacy unless they remember to act affirmatively to protect it.

The new law incorporates a separate children’s rights section. This section does require opt in parental consent for sale of data from minors under 16 yeas old. The law provides for fines and lawsuits for breaches of this section.

Will other states follow suit?

Will California’s online privacy bill be a model for other states? It’s too early to tell. The state’s political and cultural climates are so unusual, it can be difficult to predict when its accepted practices will be adopted elsewhere.

 

(For the most reliable internet connection, contact Satellite Country. We can help.)

Share on Social Media:

End of ‘Net Neutrality’

The sky has not fallen. Armageddon has passed evidently passed us by. We have not seen the Great Tribulation that was expected to fall on us on June 11, with the official end of the FCC’s Title II ‘net neutrality‘ internet rules.

Image result for net neutrality images

Without the regulations, we were told, the web wouldn’t work properly. Disaster would follow: fire and brimstone, floods, earthquakes, mass extinction, dogs and cats living together- real Wrath of God stuff. At the very least, we’d see our content requests blocked or slowed, with frustratingly long buffering of music and video. Of our afflictions there would be no end.

Why hasn’t the sky fallen?

So far, none of the dire predictions has been realized. We haven’t seen ISPs rushing to raise rates, block or slow content, or otherwise restrict internet access.

In fact, most ISPs have announced plans to develop advanced 5G systems. They are investing massive amounts in creation of new networks and expansion of existing ones. These investments had been retarded under the Title II web rules, because ISPs did not want to risk capital in an uncertain regulatory climate. The FCC had too much discretion, and ISPs could not be sure how it would rule from one case to another. With the end of the Title II framework, ISPs are more certain about what the law allows.

What happens now?

Does this mean the industry is finally at peace? Will the advocates of the restricitve web rules admit that they could have been wrong? Don’t bet on it. Though the legal battle over Title II is settled- for now- the political quarrel is nowhere near its end.

The industry is sharply divided over the issue. Google and Facebook have argued strenuously for retaining the Title II rules for ISPs, while Verizon and AT&T called for their abolition.

Several states, and some municipal governments, have said that they will enact ‘net neutrality’ rules on their own.  This effort has encountered stiff resistance. Roslyn Slayton is a scholar for the American Enterprise Institute who served on Mr. Trump’s transition team. Slayton said to CNN, “It’s patently illegal for the states to make their own internet policy.”

The Trump Administration is likely to join some of the larger ISPs in lawsuits against state attempts to regulate the web.

UPDATE:  We’ve received word that an effort to enact a state ‘net neutrality’ law has stalled in the California legislature.

What does it all mean anyway?

‘Net neutrality’ is the principle that an internet service provider (ISP) should treat all data equally. An ISP should not block, slow, or charge extra for any data based on the user, application, website, platform, connected equipment, or means of communication.

The Title II web rules are extensions of the 1934 Telecommunications Act. Under its terms, an ISP is to be regulated like as a ‘common carrier’, like a land line telephone exchange.

 

(For the most reliable internet connection, talk to Satellite Country. We can help.)

 

Share on Social Media:

Zuckerberg in the Hot Seat

Mark Zuckerberg may soon cease to be a Master of the Universe. At least, that’s what we can gather from some of the Congressional reactions to his recent testimony on Capitol Hill.

Image result for mark zuckerberg

The Facebook CEO has been under fire lately over some of the social platform’s questionable business practices. These include blocking or ‘shadow-banning’ content for political reasons, limiting the reach of ads customers had paid for, and selling user data to third parties.

The immediate catalyst for the hearings was a recent report about Facebook’s relationship with Cambridge Analytica. The latter had apparently collected user data through an app called Global Science Research. More than 270,000 people allowed use of their data, but Cambridge was able to collect data about their friends, too. Cambridge used the data to promote Mr. Trump’s presidential campaign.

At this news, Congressional Democrats erupted. Of course, it may help to keep matters in perspective. Facebook had also allowed the Obama reelection campaign to exploit user data in 2012- and had not charged for it. Obama campaign officials even bragged about Facebook’s willingness to help them, and Mr. Zuckerberg visited the White House dozens of times between 2009 and 2013.

The legacy press apparently saw no problem with this. Many establishment reporters even hailed Obama for his genius and foresight in use of social media.

The Rules Change

It wasn’t the data collection itself, then, that offended the high and mighty. It wasn’t even the fact that most of it was without user consent. Facebook’s real crime, evidently, was that in 2016 a REPUBLICAN campaign had been able to exploit its user data.

Never mind that Obama’s people had used Facebook data far more extensively- and in the general election, while Cambridge had used it for Trump only during the primary. Never mind that Facebook had been happy- even eager- to help Obama. If Trump benefited, then data collection practices that had hitherto been perfectly acceptable were suddenly grave sins.

Mr. Zuckerberg Goes to Washington

And so, Mark Zuckerberg was required to explain himself to Congress. Democrats flayed him over Cambridge Analytica. Zuckerberg was deeply respectful and promised that he would try very very hard to ensure that nothing like this ever happens again.

Some Republicans asked about censorship of conservative posts. Senator Ted Cruz (R-TX) grilled Zuckerberg closely about it. Rep. Marsha Blackburn (R-TN) asked how Facebook determines what is or isn’t offensive content. In the face of this line of inquiry, the witness dodged and weaved, offering carefully worded and evasive responses.

On the whole, Mr. Zuckerberg proved carefully prepared- and quite slippery. We got the impression that Facebook may never provide a full accounting for its privacy and censorship practices, and that the reforms it promises will only be cosmetic.

 

(For the most reliable internet connection, talk to Satellite Country. We can help.)

Share on Social Media:

Will Your Next Driver’s License Be Digital?

Your current driver’s license is a plastic card. Every previous license was a plastic card. So far as you know, your driver’s licenses will always be plastic cards that you’ll carry in your wallet or purse. They couldn’t take any other form, could they?

Man in a car showing his drivers license on his phone

This is about to change. Some states are planning to digitize your driver identity so you can display it on a mobile tablet or phone. The new licenses will feature biometric data absent from your current license, such as fingerprints, iris scans, and facial recognition. Iowa will lead the way, issuing digital driver’s licenses in 2019. Delaware, Virginia, and Wyoming are conducting limited pilot studies of  digital license technology. Other states have also begin to study the matter.

How will the changes affect you?

Idemia, a company seeking new functions for augmented reality, developed Iowa’s digital license program. Its CEO says the new licenses will be “dynamically connected”. This means they will update driver information in real time, so if your license is suspended or you just reached your 21st birthday, your digital license will be updated to display the information.

If your device is stolen, the thief can’t open your license. Unlocking it requires your biometric data. At the very least, it will require PIN or fingerprint authentication. Without your PIN or biometric data, the thief will never get your personal information.

Your digital license data will be synced with your state’s DMV database. If a cop pulls you over, he can send a message to your phone simply by scanning your license plate. Your response confirms your identity. The signals “shake hands”. The cop can relax when he approaches your car, because he knows who you are. You in turn can be sure he’s not an imposter, because only a real cop could send a signal to your device.

When will you get your first digital driver’s license?

It will be several years, at least, before most states issue digital driver’s licenses. One great hurdle is lack of interoperability, or coordination between state DMV databases. Police in one state will need access to DMV data from another state.

Expect a national interoperability standard to be settled by the middle of the next decade. After this, your driver’s license will exist in cyberspace.

 

(For all news related to the internet, watch this space. For the most reliable internet connection, talk to us. We can help.)

Share on Social Media:

Ditching Twitter & Facebook: Part II

You’ve hate Twitter and Facebook. I hate Twitter and Facebook. Despite our exasperation with them, though, we can scarcely imagine living without them. We need reliable platforms for connection with family and friends, and we don’t know where else to go. We worry that ditching the biggest network platforms will bring social isolation.

Image result for rejection images

Don’t give up. There are multiple alternatives, one for almost every specialized need. Which one is best for you will depend on your interests and personality.

Here are a few of the more popular social media platforms:

LinkedIn

LinkedIn is geared for professionals job seekers, and others seeking work or business opportunities. It has more than 500 million users in more than 200 countries. LinkedIn defines its mission as “…connect(ing) the world’s professionals to make them more productive and successful.”

Employers post job openings on LinkedIn, job seekers post curriculum vitae on it, and both use it to maintain and extend contact networks. Job seekers can review profiles of hiring managers and see if any of their existing contacts can introduce them.

Users can even post articles and share video on LinkedIn.

GAB

Perhaps you’re fed up with shadowbanning and other abuse dished out by Twitter. Maybe you’re frustrated with its 140-character limit. If this is the case, GAB may be platform you need.

GAB is what Twitter claims to be, but isn’t. GAB is a truly open platform that doesn’t censor user posts. It also allows longer posts, with a 300-character limit.

GAB does enforce a code of conduct, just as other social media do. GAB is much more specific about what it forbids, though, and doesn’t exploit vague standards as an excuse for political censorship.

Mighty Networks

Unlike Facebook, which attempts to connect people who already know each other, Mighty Networks seeks to expand user social contacts. The platform’s ‘pods’ are based on common interests. With the Mighty Networks, it’s easier to reach new people who share the same passions and concerns.

Users can join existing ‘pods’ or create their own. With a Mighty Network account, you can organize contacts by similarity, shared interests, or physical proximity. You can even earn money for building a community.

Mastodon

Mastodon is a decentralized open-source network. It allows up to 500 characters per post, so it’s better than twitter at enabling extended conversation.

Mastodon differs from other social media in that it doesn’t sell user data to advertisers. Mastodon permits no advertising, data mining, or walled gardens.

Diaspora

Diaspora bills itself “the anti-Facebook”. Like Mastodon, it is a decentralized network. Instead of holding user data on centrally located servers controlled by a giant corporation, Diaspora operates on independently controlled servers in many locations. Users own all of their data on the network.

With your Diaspora account, you don’t have to use your own name, and you control who gets to see your posts.

NextDoor

NextDoor was founded on the theory that social media have alienated us from our neighbors. Most of our Twitter and Facebook contacts live far away from us, and few of us know many of the people who live nearby.

NextDoor was designed to reintroduce you to your neighbors, and its networks are based on geographic location. NextDoor is a forum for informing users about events in their neighborhoods. The platform is useful for planning local events, warning neighbors about dangerous visitors, reporting lost and found items, and even scheduling babysitters.

Other Networks

These are a few of the more popular general interest social platforms. There are others that cater to special interests. Ello bills itself the creator’s network, “built by artists for artists”. Dogster and Catster connect pet lovers. Peanut connects mothers seeking emotional support, advice, or opportunities to vent. Wanelo is a network for avid shoppers. Vero is a photo-sharing platform.

There are other networks, such as Tumblr and Reddit, that are already well established.

If you look, you can find a suitable substitute for Twitter and Facebook.

Share on Social Media:

How to Unplug Facebook

Should we unplug Facebook? The social medium, though it has 1.4 billion followers, is a huge headache for many of us. It vacuums up our personal data to sell to advertisers, and it can be an enormous waste of time.

Image result for facebook image

Do you suffer manipulation and loss of privacy?

Facebook has been known to toy with our minds. A few years ago, it was caught manipulating the news feeds of 600,000 users to see how they would act in response to negative versus positive news. The corporation is developing a brain-computer interface, so a user could control his computer with his mind- but Facebook could as easily use the interface to influence the user’s mind. And the company recently faced a firestorm of criticism over Cambridge Analytica’s mining of user data.

To  be fair, the Trump campaign was not the first to mine Facebook user data to enhance voter turnout. Mr. Obama used it far more extensively- in both of his Presidential campaigns.

Regardless of who benefits, a Facebook account brings serious problems. You can’t very well be active on the platform without sacrificing privacy. The more we learn, the wiser it seems to unplug Facebook.

What can you do about it?

How can you do it, though? You don’t want to lose touch with friends and loved ones. You want a means to communicate your concerns to a large body of readers. Are there other social media platforms that will meet this purpose? Can you use them without the privacy losses you court with Facebook?

There are several alternate social platforms that may meet your need. Which one is best for you depends on what you want to do with it.

Some of the other platforms that may suit you are Wayn, Steemit, Dribbble, Mastodon, and Mighty Networks. In a future post, we will analyze the advantages and limitations of each.  You then can unplug Facebook, confident that you’re not dooming yourself to social isolation.

 

(For the most reliable internet connection, talk to us. We can help.)

Share on Social Media:

Secrets to Masking Your Identity Online

In a previous post, we offered a few tips about protecting online anonymity. We addressed browser security, VPNs, TOR, and proxy servers.

Related image

Now we will explore a few other steps to masking your identity online.

Phone Security

If you’re serious about protecting your anonymity, the easiest way is to ditch your smart phone. Apple, which owns the iOS system, is obsessed with control; and Google, which owns Android, vacuums up your personal data for its advertisers. For anonymity, you need a pre-paid phone. It’s what police call a ‘burner’.

The advantage of using a pre-paid phone is that your name can’t be traced to it. Of course, GPS triangulation can still locate the phone, so you’ll have to throw it away to guarantee that your location won’t be tracked.

If you don’t want to give up your smart phone, masking your identity requires another step. You’ll need more numbers for your device. You can get extra temporary numbers through several apps.

There are some disadvantages with the temporary numbers. One is inability to call 911. Also, the pool of available numbers is small, and they’re often recycled, so you may receive calls you don’t want from people trying to reach someone who had your number before.

Available ‘burner’ number services include CoverMe, Too, Burner, and Hushed. Burner is the original.

Too charges $1.99 per month plus 3 cents per minute and 8 cents per text. CoverMe charges $4.99 for 130 texts and 130 voice voice minutes. Hushed charges $1.99 for 7 days or $3.99 per month- with limits on texts and calling. Burner charges $4.99 per month for a premium subscription with unlimited texts, calls, and pictures.

Most of Burner’s numbers expire after a specified period. Any number you don’t renew is burned. With the premium subscription, you can get a permanent second number.

In-Home Firewalls

If your computer is connected directly to a modem, then you’re vulnerable. Hackers are constantly probing IP addresses for routes into computer systems.

Masking your identity online may require a router with a built-in firewall. Such a router will assign an IP address to each home device on your network through Network Address Translation (NAT). These addresses will be visible only on your home network. This step alone will stop most direct attacks.

If your system doesn’t have a built-in firewall, you can buy a security suite with firewall software. Norton Symantec and Avast are two of the better-known providers of of such security packages.

To be continued…

You may want to do more for masking your identity online, such as securing your e-mail and finding out what information your device is giving away. We will cover these subjects in a future post. Watch for it.

 

If you don’t have a reliable web connection, get one. Talk to us. We can help.

Share on Social Media:

How can you protect your anonymity online?

A famous New Yorker cartoon from the dawn of the internet age features two dogs at a computer. One says to the other: “On the internet, nobody knows you’re a dog.” On the web, anonymity was virtually guaranteed.

Related image

Those canines might not be so confident about online privacy now. With each passing month, we get more disquieting news that others are spying on our web traffic. It was governments at first. But in the last few years we have learned that Google, Amazon, Microsoft, and Facebook have been tracking our web usage so they can show us targeted ads. Trolls and stalkers have learned how to find the real identities behind user names we adopt for online comments.

Does this mean we should abandon hope for online anonymity? If we want to maintain our privacy, do we have to stay off of the internet?

In truth, there is only one guarantee of absolute anonymity. We’d have to stay offline entirely.

Short of this, we’re taking on some risk. Still, there are several ways to hold our odds of exposure and I D theft to a bare minimum. I will cover two of them here:

TOR, Proxies, and VPNs

One of the most effective ways to mask identity and location is to appear to be someone else at a different location. For this, you’ll need a virtual private network (VPN) or a proxy server. Not only can they mask your identity, they can enable surfing in other countries like the natives.

VPN services are easy to find. They protect traffic between your computer and internet servers, and they will mask your IP location and address. Suppose that , while working from home, you connect through your employer’s VPN. Websites will track your activity to corporate headquarters, not to your home.

For more advanced security, you may want a proxy server, a computer that redirects your web traffic. Like a VPN, it will mask your IP address. The proxy server also caches internet requests and responses, which will speed connection for your return visits to your favorite sites.

TOR is sometimes called ‘the onion router’ for its multiple layers of protection for anonymity. It provides a network of routes for data requests and downloads.

A few years ago, Edward Snowden revealed that the NSA had been spying on web traffic, giving special attention to TOR. But the NSA was only able to monitor its ‘exit nodes’. The agency could track what TOR was being used for, but couldn’t identify users.

Browser Security

How do you know your browser isn’t informing on you? Some, most notably Google Chrome, have been especially aggressive in tracking user traffic. Usually, the purpose of vacuuming up this data is advertising. You can’t be sure, though, that your web footprint will never be used for more sinister purposes. Since Google and Facebook have been caught censoring information for political reasons, it pays to be careful.

You can block your browsers ability to store your passwords. Of course, this can be inconvenient, since you probably have a separate password for each web service you use. A password manager can cache your passwords so you don’t have to remember them. Some password managers are free.

You could also activate your browser’s anonymous surfing mode. For Microsoft’s Explorer and Edge, it’s called In Private. For Firefox, it’s called Private Browsing, and for Chrome, it’s called Incognito. Activating the anonymous mode will block the browser from keeping records of websites you visit, your downloads, cookies, passwords, and cached material. Your browser may also offer a Do Not Track option in its settings bar. If it does, you’d be wise to activate it.

Anonymity through Browser Choice

Some browsers are better than others at protecting user anonymity.

Google is notorious for vacuuming up user data for use in targeted advertising. Bing and Yahoo also are aggressive in collecting user data.

Comodo Dragon, Comodo IceDragon, and Epic use Google’s Chromium rendering engine, but they don’t share user information with Google. DuckDuckGo, Brave, and Opera do not use Google, Bing, or Yahoo search engines. They don’t track your web usage or sell your data.

Stealth modes and specialized browsers won’t provide perfect web security. But they can keep websites from sending unrequested info to your computer, info that other sites can read to discern your surfing habits.

More to Come…

There are other steps you can take to protect your anonymity online. We will spell out these additional steps in another post.

 

(For the best internet connection, talk to us. We can help.)

Share on Social Media:

2018: What to Expect in TV Displays

In the last decade, we’ve seen dramatic improvements in TV screens. HD has given way to 4K, the first HDR screens are on the market, and OLED and QLED displays have become practical. We don’t expect innovation in screen technology to come to a halt, but it won’t be moving at the blistering pace we’ve seen lately. So what will we find in video displays in 2018?

Image result for 2018 TV displays images

Incrementalism is likely to be the dominant theme in video display tech this year. Most developments will merely build on radical technical leaps of the past, very few being completely new to the consumer market.

Still, some interesting prospects are on the near horizon. Here are a few of the most important changes in video equipment that we will see in 2018:

 HDMI 2.1

How often do you think about the cables connecting your TV set? They don’t get much respect. They can be critical, though, for the quality of your TV sound and picture.

The current HDMI 2.1 specs were published only in November 2017. This obviously leaves an excruciatingly tight time frame for manufacture of 2018-model TV sets or other devices that will comply with the new standard. Almost no HDMI 2.1-compliant sets, therefore, will be on the market until late in the year.

For now, you don’t need to worry about their absence. The HDMI 2.1 spec is almost outrageously future-proofed. Some of its capabilities, including 8K resolution and much higher frame rates, won’t be available in consumer TV for several years. A TV set you buy this year can handle the best available content for several years.

Emissive Quantum Dots

Quantum Dot LED (QLED) TV have gotten a lot of press in the last two years. QLED sets have shown great promise. They can’t yet match the overall picture quality of OLED, though, lagging in refresh rates and contrast.

2018 may be the year QLED catches up. Some experts are placing their bets on emissive quantum dots (EQD). EQD sets have been hyped as the “true QLED” that video buffs have awaited eagerly for years.

With EQD, miniscule quantum dots actually emit light instead of merely enhancing LCD backlight. They could also match or surpass OLED’s “infinite” contrast ratio, with far lower power consumption, and with a much wider and more intense color gamut.

4K & HDR Everywhere

You’ll see many 4k and HDR sets this year. Almost every manufacturer is producing models that can handle both specs.

Both formats were developed at least two years ago, but are difficult to build into TV screens. Also, very little programming has been available in either format, because they require new cameras and editing tools.

That will change in the new year. Almost all new display screenss will be compatible with both formats, and studios are beginning to produce a wide array of video content for them.

Local Dimming

Local dimming is independent brightening or dimming of different areas of the screen. The more expensive TV sets released in 2018 will feature it.

Micro LED

Samsung wants to challenge the technical leadership of OLED.  For this purpose, it’s expected to offer a Micro LED display.

In concept, the technology far older than you’d guess. Micro LED was invented seventeen years ago, and Sony demonstrated a working model in 2012. Techniques for its manufacture were extremely expensive, though, so it wasn’t suited for the consumer market.

Refined manufacturing techniques, enabling relatively cheap bulk production, may finally bring Micro LED to us in 2018.

Micro LED screens feature extremely small diodes, each emitting its own light, eliminating need for an LCD backlight. Each diode can be switched on or off separatelyly, enabling OLED-like contrast and rapid refresh rates.

Samsung is expected to demonstrate a 150-inch Micro LED model at the Consumer Electronics Show in January, and to release smaller consumer versions later. The latter may be available for purchase by the end of the year.

Voice Control

Voice control is hardly new. Voice-activated video screens and remote controls have been on the market for years. Early versions were buggy, though, and they often compromised user privacy.

For 2018, voice control and interactive displays will be much more reliable. One of the most important developments on this front is manufacturer collaboration with Amazon and Google. Video displays will be synced with Alexa and Google Home systems.

 

(For streaming TV, you need a reliable internet connection. Talk to us. We can help.)

Share on Social Media:

VPN: Do You Need One?

How much of your life is on the internet? How much do you communicate online?

If you’re like most of us, you probably reveal much more about yourself than you intended. Your schedule, your relationships, your general location, your political and religious loyalties- all are open to public scrutiny on the web. Skilled hackers can also obtain your credit card, social security, and bank account numbers, plus your identification codes.

The web is notoriously insecure. What’s even more alarming is that your ISP is allowed to sell your browsing history.

Image result for vpn images

How, then, can you keep your data secure?

One of the most effective methods is the virtual private network (VPN), an encrypted connection between you and the network’s private server. Some experts call such connections “tunnels”. The network masks your identity, because to a hacker or a spy, your web surfing appears to originate from the VPN’s address. It’s highly unlikely your data will be intercepted, especially if the sites you visit are secured with HTTPS protocol. If it is intercepted, though, it’s almost impossible for anyone to trace it back to you.

What level of protection do you need?

How do you know you need a VPN? It depends on how concerned you are about data privacy. If you never use public WiFi networks, you never buy anything online, and you keep a low profile, ordinary internet precautions may be enough. Even in this case, an extra level of protection may be wise.

You certainly should consider a VPN if you use public WiFi. You need to be especially wary on public networks. Not only is public WiFi  vulnerable to spies, some such networks are actually run by the thieves. The Applebee’s name on the network doesn’t always mean Applebee’s operates it. Anyone spying on the airport or coffee shop WiFi, though, will be unable to intercept data you’ve routed it through a VP network.

Consider, also, whether and how often you shop via the internet. Buying online can expose your credit card numbers, bank account numbers, personal I D codes, and other private data.

Finally, what is your profession? What are your hobbies? How do you use social media? If you’re a journalist, a public official, or a celebrity, you could be a high-profile target. Countless people may have powerful incentive to ruin your life, and an insecure web connection may be the opening they need.

 

If any of this applies to you, you need an extra measure of online security. You may need a VPN.

 

(For a secure home internet connection, talk to us. We can help.)