Stay informed. Stay empowered. Stay private.

Month: March 2024

Privacy is Power: A Review of Neil Richards’ Why Privacy Matters.

Privacy is a fundamental human right increasingly under threat in
the digital age. In his book Why Privacy Matters, Neil Richards argues
that privacy is not dead but up for grabs. He discusses that the fight for
privacy is a fight for power that will determine our future and whether it will
remain fair and accessible.

Richards defines privacy as the ability to control information
about us and our actions. He identifies four essential values that privacy
protects: identity, power, freedom, and trust. He explains how privacy enables
us to express our individuality, resist oppression, pursue our interests, and
form meaningful relationships.

He also warns of the dangers of losing privacy in a world where everything
is connected and monitored. He exposes the myths and misconceptions often used to justify the erosion of privacy, such as the trade-off between privacy and
security, the certainty of surveillance, and the irrelevance of privacy in the
public sphere. He challenges us to rethink our assumptions and expectations
about privacy and demands better privacy rules and practices from governments
and corporations.

Why Privacy Matters challenges us to rethink our assumptions and
expectations about privacy and to demand better privacy rules and practices
from governments and corporations, it inspires us to value and protect our
privacy and recognize its importance for our well-being and dignity.

The book not only provides a clear and accessible framework for
understanding why privacy matters and how to protect it, but it also offers
practical strategies and recommendations. These are not just for individuals
but also for organizations and policymakers to enhance privacy protection and
promote the essential values that privacy supports.

We value your thoughts on the book’s content. Do you agree or disagree with
Richards’ views on privacy? What are your personal experiences with privacy,
and how do they align with or challenge the book’s arguments? We look forward
to hearing from you in the Privacy Hive comments section. Thank you for
reading. 

Choosing a Privacy-Focused Cloud Storage Solution.

Some individuals keep their personal and confidential files, such as photos, videos, and papers, on their own devices, where they can access them easily. Others use online storage services, like Google Drive, Dropbox, or Microsoft OneDrive. However, these providers may claim the right to examine, operate, and share your content for marketing purposes and with other entities.

There are privacy-first cloud storage services for those prioritizing data security and privacy. Privacy-first storage sites are cloud storage services that prioritize your data’s security and privacy over other features. They usually use end-to-end encryption, zero-knowledge privacy, and robust authentication methods to protect your data from unauthorized access, hacking, or surveillance. Some examples of privacy-first storage sites not affiliated with major platforms are:

Proton Drive

Proton Drive is a secure cloud storage service created by Proton, the company behind Proton Mail, Proton VPN, Proton Pass, and Proton Calendar. Founded by a group of scientists at CERN, Proton puts privacy and security at the heart of all its products.

Benefits

  • Proton Drive uses end-to-end encryption to ensure that only you can access your files. Your files and metadata are encrypted on your device before uploading to the cloud, so Proton or anyone else cannot see or access them.
  • Proton Drive is based in Switzerland, which has some of the strongest privacy laws in the world. Proton does not collect or share personal data or cooperate with third-party requests unless a Swiss court approves them.
  • Proton Drive integrates seamlessly with other Proton products, such as Proton Mail and Proton VPN, to provide a comprehensive suite of privacy tools. You can use your Proton account to access all Proton services with a single login.

Costs

  • Proton Drive is in beta and accessible to all Proton users. You can get up to 20 GB of free storage by inviting your friends to join Proton.
  • Proton Drive plans to launch paid plans, starting from €4 per month for 100 GB of storage. You can also get discounts by bundling Proton Drive with other Proton services.

Features

  • Proton Drive lets you store and share files, such as documents, photos, videos, and music. You can access your files from any device using the web app, the desktop app (Windows, Mac, Linux), or the mobile app (Android, iOS).
  • Proton Drive allows you to share your files securely with anyone, even if they don’t have a Proton account. You can create encrypted links that expire after a particular time or number of downloads and protect them with a password or a passphrase.
  • Proton Drive supports version history and trash recovery, so you can restore any file to a previous state or recover any deleted file within 30 days.

pCloud

pCloud is a cloud storage service offering standard and encrypted storage options. You can choose between pCloud Basic, a regular cloud storage service, or pCloud Crypto, a secure vault for sensitive files.

Benefits

  • pCloud Crypto uses client-side encryption to protect your files with a zero-knowledge architecture. This means your files are encrypted on your device before uploading them to the cloud, and you only have the key to decrypt them. pCloud or anyone else cannot access your files or your encryption key.
  • pCloud offers a unique lifetime subscription option, which lets you pay a one-time fee and get unlimited access to your cloud storage. This can save you much money in the long run, compared to paying monthly or yearly fees.
  • pCloud supports various file formats, such as images, videos, audio, documents, and archives. You can preview and stream your files directly from the cloud without downloading them to your device.

Costs

  • pCloud Basic is free for up to 10 GB of storage. You can get more free storage by completing specific tasks or inviting your friends to join pCloud.
  • pCloud Premium costs $4.99 per month or $47.88 per year for 500 GB of storage, or $9.99 per month or $95.88 per year for 2 TB of storage. You can also get a lifetime subscription for $175 for 500 GB or $350 for 2 TB.
  • pCloud Crypto costs an additional $3.99 monthly or $47.88 per year for unlimited encrypted storage. You can also get a lifetime subscription for $125.

Features

  • pCloud lets you sync any folder on your computer or mobile device with the cloud. You can also use pCloud Drive, a virtual drive that enables you to access your cloud files without taking up space on your device.
  • pCloud allows you to share your files and folders with anyone, even if they don’t have a pCloud account. You can set permissions, expiration dates, and passwords for your shared links. You can also create upload links that let others upload files to your cloud.
  • pCloud supports file versioning and trash recovery, so you can restore any file to a previous version or recover any deleted file within 30 days. With a paid plan, you can extend this period to 180 days or 360 days.

Sync.com

Sync is a cloud storage and document collaboration platform that helps teams stay safe, secure, and connected in the cloud. It combines file storage, file sharing, and file backup features with end-to-end encryption and zero-knowledge architecture.

Benefits

  • Sync uses end-to-end encryption to ensure that only you and your authorized collaborators can access your files. Your files and metadata are encrypted on your device before uploading to the cloud, and Sync.com or anyone else cannot see or access them.
  • Sync is based in Canada, which has strong privacy laws and does not participate in mass surveillance programs. Sync.com does not collect or share personal data or comply with third-party requests unless they are legally valid and enforceable in Canada.
  • Sync offers unlimited cloud storage and unlimited data transfer for its paid plans, so you don’t have to worry about running out of space or bandwidth. You can store and share as many files as you want without limits or fees.

Costs

  • Sync Basic is free for up to 5 GB of storage. You can get more free storage by referring your friends to Sync.com.
  • Sync Solo costs $8 per month or $96 per year for 2 TB of storage, or $20 per month or $240 per year for 6 TB of storage. These plans are for individual users who want more storage and features.
  • Sync Teams costs $6 per user per month $60 per user per year for 1 TB of storage per user, $15 per user per month or $180 per user per year for unlimited storage per user. These plans are for teams who want to collaborate and manage their projects in the cloud.

Features

  • Sync lets you access your files from any device using the desktop app (Windows, Mac, Linux), the mobile app (Android, iOS), or the web app. You can also use Sync CloudFiles, a virtual drive that lets you browse your cloud files without taking up space on your device.
  • Sync lets you share your files and folders with anyone, even if they don’t have a Sync.com account. You can set permissions, expiration dates, and passwords for your shared links. You can also create a custom-branded client portal with your company logo and domain name.
  • Sync supports file versioning and trash recovery, so you can restore any file to a previous version or recover any deleted file within 180 days. You can also enable ransomware protection, which lets you roll back your entire account to an earlier state in case of an attack.

Conclusion Proton Drive, pCloud, and Sync.com are among today’s best privacy-focused cloud storage services. They offer end-to-end encryption, zero-knowledge architecture, and robust data protection policies. They also have different benefits, costs, and features that may suit various needs and preferences. Privacy-focused storage providers give you peace of mind; they protect your data from hackers and spies.

Protect Your Online Privacy From Browser Leaks.

What is Browser Leakage?

In previous blog posts, Privacy Hive has discussed the importance of choosing a privacy-oriented browser and installing browser extensions for improved online privacy. This post explores browser leakage and actions you can take to protect your online privacy.

Browser leakage refers to the private information your browser can access, which you want to keep between yourself and the browser. Modern web browsers enhance the user experience, but the various features and functions can also inadvertently expose your personal information.

Your browser has access to a significant amount of private information, which includes:

  • IP Address: Your IP address can reveal your general location and is visible to all websites you visit.
  • Browser History: Your browser will store websites you visit.
  • Cookies: These small files are stored on your computer by websites you visit.
  • Form Data: Website forms can remember information you enter into your browser.
  • Passwords: If you choose to save them, your browser can store passwords for quick access.
  • Autofill Data: includes your name, address, and credit card numbers if you save them.
  • System Information: Websites can extract data about your system through JavaScript and Web APIs.

Websites to Determine the Extent of Browser Leakage

Websites like Browser Leaks and Privacy.net Analyzer offer a range of tests to evaluate the security and privacy of your web browser. These tests identify ways websites may leak your IP address, collect information about your device, and perform browser fingerprinting.

Browser Leaks is a comprehensive suite of tools designed to evaluate the security and privacy of your web browser. It provides many tests that identify ways websites may leak your IP address, collect information about your laptop, and perform browser fingerprinting. The site provides analysis and offers a complete examination of your online presence and potential vulnerabilities. It includes IP address Whois lookup, TCP/IP operating system fingerprinting, Web RTC, DNS, and IP6 leaks. Understanding these risks, you can take appropriate steps to protect your online privacy and minimize exposure.

Privacy.net Analyzer is another tool that lists information about website advertisements and widget collection from your web browser. It provides an analysis of your geolocation and browser permissions. This site offers tests you can perform to evaluate your browser privacy. The site helps you understand what data is exposed from your browser and how the information can identify and track your behavior using techniques like IP lookups and fingerprinting. This knowledge can help you take the necessary steps to enhance your online privacy.

There are several ways you can control what information your browser shares with websites:

  • Delete your browser history: If you do not want to see advertisements based on your previous online activity, delete cookies, clear your browser, and search history.
  • Adjust your privacy settings: The privacy settings in your browser give you some control over the information websites collect about you. For example, you can block websites from seeing your browsing history or decide not to share your location.
  • Screen Sharing: Be cautious when sharing your screen with websites. Firefox, for example, warns users not to share when a browser window is visible on your screen unless you trust that website.
  • Sync Browser Data: Some browsers allow you to sync your browser data with your account, giving you control over the shared information.
  • Use Privacy Browsing Mode: Some browsers, like Firefox, have a private browsing mode that deletes your browsing history after you end your session; however, it does not block websites from seeing your online history.  

Staying informed and vigilant is the key to protecting yourself from browser leaks. Regularly update your browser and its plugins, and always be cautious about the websites you visit and the information you share online.

Remember, no solution is perfect; the best defense combines these methods. Stay informed about the latest privacy threats and defenses to ensure online privacy.

Texting: The World’s Least Secure Whisper.

Why You Should Switch from SMS to a Secure Messaging App

Text messaging is one of the most popular ways to communicate in the digital era, but it also comes with privacy and security risks. In this blog post, we will explain why text messaging is based on older technology and is insecure, how text via SMS can be hijacked, and why using a text application is a good alternative to just a phone number for texting.

The Problem with SMS

SMS stands for Short Message Service, and it is the standard protocol for sending and receiving text messages over cellular networks. SMS was developed in the 1980s and 1990s, and it has not changed much since then. SMS has several limitations and vulnerabilities, such as:

  • SMS messages are not encrypted, meaning they can be intercepted, read, and modified by anyone with access to the network or the device.
  • SMS messages are stored by cellular providers, who can see the contents of the messages and share them with third parties, such as advertisers, law enforcement, or hackers.
  • SMS messages have a limited length of 160 characters, which can result in fragmented or incomplete messages.
  • SMS messages rely on the phone number of the sender and the receiver, which can be spoofed, hijacked, or stolen by malicious actors.

The Solution: Secure Messaging Apps

Secure messaging apps are applications that use the internet to send and receive text messages and other types of media, such as photos, videos, voice messages, documents, etc. Secure messaging apps have several advantages over SMS, such as:

  • Secure messaging apps use end-to-end encryption (E2EE), which means that only the sender and the receiver can see the messages’ contents, and no one else, not even the app provider, can access them.
  • Secure messaging apps do not store the messages on their servers; they delete them after they are delivered or after a certain period, depending on the user’s settings.
  • Secure messaging apps do not limit the length or type of messages and can support rich features such as group chats, stickers, emojis, gifs, etc.
  • Secure messaging apps do not depend on the user’s phone number; they can use other identifiers, such as usernames, email addresses, or QR codes, to verify the user’s identity and prevent impersonation or hijacking.

How to Choose a Secure Messaging App

Many secure messaging apps are available on the market, but not all are equally trustworthy or reliable. Some of the factors to consider when choosing a secure messaging app are:

  • The app’s privacy policy and terms of service should clearly state what data it collects, how it uses it, and with whom it shares it.
  • The security features and the app’s encryption protocol should be transparent, open-source, and audited by independent experts.
  • The app’s user interface and user experience should be easy to use, intuitive, and customizable.
  • The app’s popularity and reputation. It should have a large and active user base and positive reviews and ratings.

Some of the most popular and reputable secure messaging apps are:

  • Signal: Signal is a free and open-source app that offers E2EE for text, voice, and video messages, group chats, disappearing messages, and other features. It is widely regarded as the most secure and private messaging app and is endorsed by many experts and activists, such as Edward Snowden, Elon Musk, and Jack Dorsey.
  • Telegram: Telegram is a free and cloud-based app that offers E2EE for text, voice, and video messages, as well as group chats, channels, bots, and other features. Telegram is known for its speed, reliability, and functionality, and it has over 500 million users worldwide.
  • Wire: Wire is a free and open-source app that offers E2EE for text, voice, and video messages, as well as group chats, file sharing, and other features. It is designed for personal and professional use and complies with European data protection laws.

Conclusion

Text messaging is a convenient and popular communication method but poses privacy and security risks. SMS is based on older technology and is insecure, and using text via SMS can be hijacked. A text application is a good alternative to just a phone number for texting, as it offers more security, privacy, and functionality. However, not all text applications are equally secure, and users should carefully choose the app that best suits their needs and preferences.

BleachBit: Scrubbing Your Digital Footprints So You Can Tread Lightly On The Web!

Online privacy is a fundamental right that everyone should enjoy. However, in the digital age, our data and activities are constantly exposed to various threats, such as hackers, malware, spyware, phishing, and identity theft.

We must have suitable PC security measures to protect our online privacy. Good PC security allows you to enjoy the Internet’s benefits without compromising privacy.

BleachBit

BleachBit is a free and open-source tool that frees disk space by deleting, shredding, and wiping traces of files deleted by other applications. It works for Linux and Windows systems and supports thousands of applications, including Firefox, Chrome, and Opera. BleachBit is vital for keeping your computer clean because it helps you remove junk files that slow down your system, consume valuable storage space, and expose your online activities. Using BleachBit regularly lets you maintain your computer’s performance, optimize your disk usage, and protect your online privacy.

BleachBit protects your online privacy by deleting the traces of your online activities that other applications leave behind. For example, BleachBit can erase your browsing history, cookies, cache, passwords, and form data from web browsers, which prevents websites, advertisers, and hackers from tracking your online behavior, preferences, and identity. BleachBit can also shred files that contain sensitive information, such as bank statements, tax returns, or personal photos, thus making it impossible for anyone to recover or access those files, even with specialized software. BleachBit can reduce the risk of data breaches, identity theft, and online surveillance.

While BleachBit can delete most traces of your online activities, it cannot delete all. BleachBit cannot delete digital traces stored on remote servers, such as email messages, cloud files, or social media posts. You would need to delete those manually from the respective websites or applications. Furthermore, BleachBit cannot hide your online activities from third parties, such as your internet service provider, government agencies, or hackers. Additional VPN, Tor, or encryption tools, which we discussed in previous blog post would add additional protection to your online privacy.

Conclusion

Using BleachBit regularly lets you maintain your computer’s performance, optimize your disk usage, and protect your online privacy.

© 2025 Privacy Hive Blog

Theme by Anders NorenUp ↑

WordPress Cookie Plugin by Real Cookie Banner