VERY IMPORTANT
Internet banking
Social media profiles
(work) email
school and work information systems
This module contains 3 parts:
#1 Find out where you stand
🟡
Start by searching yourself on search engines like Google or Seznam. How? Simply enter your name, nicknames, email address, phone number, or something else that is characteristic of you into the search engine. Tip: if your name is common, add something more specific: residence, school, occupation.
Your name, nicknames, email address, phone number, or anything else that is characteristic of you.
🟡
Evaluate what you found about yourself and how the information is interconnected. For example, if one page lists your name and email and another your email and phone number, everything can be easily linked in a way you might not like.
🟡
Explore other systems or platforms you use or have used. For example, school systems, classified portals, discussion forums, and of course, social media—we will focus more on these later. If you have a Google account, also check Google Dashboard. You will find out what data Google has on you and you can also delete it.
🟡
Remove or request removal wherever you deem appropriate.
🟡
Google Alerts service works very simply—you enter the keywords you want to monitor—typically your name or another identifier. If it then appears somewhere on the internet, the service will send you an email.
#2 Focus on social media
🟡
Social media allows us to share almost everything, and many people eagerly use this opportunity. Whatever your approach, we recommend adhering to these principles:
#3 Tips a tricks
The anonymous mode of a browser is useful but often misunderstood. Let's explain it then. What it's good for:
🟡
Automatically deletes browsing history and filled-out form data once you close the window. This keeps your activity on the device hidden. Therefore, anonymous mode is a necessity when using a device that isn't ours.
🟡
After closing this mode, cookies from the browsed websites are deleted.
🟡
Your IP address will still be public, meaning your online activities can still be tracked by internet service providers.
🟡
Websites will still collect data about your browsing using tracking scripts, even if you use anonymous mode.
🟡
Your computer can still be infected with a harmful file. Anonymous mode does not provide any additional protection.
Knowing the importance of your accounts and information that a potential attacker could access will be useful not only in protecting your privacy. This is the goal of this challenge.
1.Imagine you have three lockers:
🟥 The red locker represents a well-secured vault for accounts and information with a high risk of misuse.
🟨 Yellow for accounts and information that still need protection, albeit slightly less.
🟩 Green is for accounts and information that are freely accessible.
2. Think about where you would place the accounts you have and the information you work with. Ask yourself if it would be okay if they fell into the wrong hands. By identifying important accounts and information, you will know when to be especially cautious. We see it roughly like this:
Internet banking
Social media profiles
(work) email
school and work information systems
Phone number
Adress of permanent residence
E-mail with promotional offers
Need to send a large file? Cloud services and online storage can be very useful. But it's important not to forget the risks to your privacy and security—we have two tips for you.
It is important to know that not all communication apps offer this encryption. There are also apps that only claim to use it.
It may be useful to know whether your app offers end-to-end encryption. The National Cyber and Information Security Agency (NÚKIB) has prepared an analysis that describes everything briefly and clearly. You can see the result in the form of a graphic table below.
We recommend you go through the mentioned analysis in its entirety; it's really short and you will know how your communication app actually stands. This will allow you to change it or start working with it differently.
Do you use Messenger and most of your friends do too? Fine, we just want to tell you that it also offers advanced security features that allow you to communicate without worries.
One of these features is "secret conversation," which allows automatic deletion of messages after they have been read or after a set time limit expires. Moreover, messages will only appear on the device where you activate this mode and nowhere else. Learn to use it with the help of the tutorial below.
For Android:
For Apple:
You may have heard that you should only connect to public Wi-Fi through a VPN. Today, this is not strictly necessary, thanks to the widespread use of the HTTPS protocol, which secures your data.
Nevertheless, using a VPN can still make sense, especially when traveling abroad. Not all foreign websites use HTTPS, and a VPN with the option to change IP addresses allows you to bypass local censorship or access content limited to certain countries, such as Czech sports broadcasts unavailable outside the Czech Republic.
Let's summarize it then:
VPN allows you to safely connect to corporate or school systems, even when you are far from the office or home.
Secures your connection in case the site does not have an HTTPS protocol, thus minimizing the risk of data leakage.
VPN hides your real IP address and replaces it with the IP address of the VPN server. In other words, you can view websites and services that are normally blocked in other countries or are not available abroad.
🟡
You can obtain a VPN from a number of providers, but it is key to choose carefully. An important criterion is the trustworthiness of the provider, which can be assessed based on reviews and the quality of the encryption offered. Remember that the VPN provider has access to your internet traffic data (but not to the specific content you exchange with sites secured by the HTTPS protocol).
🟡
Although VPN services are usually paid and available directly on the providers' websites, there are also free VPNs that may be of dubious quality and less secure. Therefore, it is recommended to invest in a verified paid service.
🟡
Masaryk University provides VPN to employees and students for free. You can find the installation guide on the MU IT service pages.
🟡
Moreover, because your device will be connected to the university network, you will also remotely access the electronic information resources of MUNI (ezdroje.muni.cz), university licenses, dedicated servers (available to a specific faculty and workplace).
Brave is a web browser that places special emphasis on the privacy and security of users. Its main priority is to minimize the tracking of online activity and ensure that your personal data remains protected. For instance, Brave automatically blocks ads and tracking scripts on websites, prevents the collection of your data by third parties, and has an enhanced anonymous mode. If privacy is a priority for you, definitely try this browser.
As an alternative to the Brave browser, we recommend Tor. It is an open-source package based on Onion Routing technology. Tor encrypts data multiple times and routes it through a global network of voluntarily operated servers, known as relays, which gradually remove layers of encryption and ensure user anonymity. Tor provides a higher level of privacy than regular VPN services due to its layered encryption and separation of the user's identity from their online activities. Despite potential slowdowns and access limitations, Tor offers excellent anonymity and privacy protection.