Tech Talk #5 with Salina Media Connection! In this tech talk we cover increasing and maintaining your online privacy. We start with simple steps and work our way into some more complicated measures that support the most online privacy. We encourage you to check out the video! Below is a write up by our assistant manager, Zach, on the topic with links about what we discussed to follow.
Why worry about online privacy?
People often say, “I have nothing to hide so why should I care?” The truth of the matter is, while people may feel like they have nothing to hide, they handle a lot of important information on their devices. Would you be okay with a stranger looking at your credit card information? How about a stranger on the street, with no warning, picking up your phone and going through all your text messages? People, even the ones I have heard utter this statement, frequently use their devices for payment and banking, and private conversations/romance.
Another reason privacy is important is because big tech regularly makes billions of dollars off YOUR data, and you do not get a dime of it. These companies like Facebook, Microsoft…etc. use profiles they build off you because you accept their “terms of service.” They sell your data to companies in bulk for unfathomable amounts of money to then target it all back towards YOU through ads.
The following discussion and steps can help combat this! And do not fret, links for further information will be posted at the end.
Use privacy focused search engines like DuckDuckGo instead of Google and Bing.
Google and Microsoft’s Bing utilize targeted ads anytime you use their services. They build a profile for you and tailor your experiences using that profile. DuckDuckGo does not build a profile about you! They do not collect identifiable information from their users, and they do not place trackers on websites to aid in their profile construction. They also do not tailer search results based on a profile, like Google and Microsoft. On Google and Bing results will be specific to you. Two people searching the exact same thing will get different results because their profile is different.
Adjust Software settings of apps/social media.
Many popular companies that offer software enable data to be sent to them by default about usage and the device. Some of these companies: Microsoft, Google Chrome, Instagram, Reddit, Facebook…etc. This data is sometimes anonymous, but this isn’t always the case. Firefox, my favorite web browser, still does this, but it is anonymous. It can also be turned off completely. Some of the former cannot be turned off at all…Windows. Majority of current systems, programs, and apps can be adjusted in their settings to limit or disable the sending of this information.
Install anti-tracking add-ons to web browsers. Disable cookies/third-party cookies.
Web browsers can have add-ons installed into them that do various things. These things can range from changing the format and how the browser is presented, to blocking ads and trackers, which is what this will focus on. Popular ad blockers like “Ublock Origin” and “AdBlock” block the following:
Ads from showing.
Trackers and finger printers.
Third-party cookies.
Some web browsers are starting to implement built in blockers, like Firefox and Brave!
Cookies are a tool that web pages and big tech use to track your usage on the internet to better target ads to you. They are placed directly onto your computer. Cookies, or in this case 1st -party cookies, are not always used in this way. They save log in information for web pages, allow you to still access a saved cart on shopping sites…etc. Not using them at all can even prevent websites from working entirely. With Cookies, disabling all of them can make browsing the web more of a challenge depending on where you usually go. On the flip side, third-party cookies, however, should always be disabled. These 3rd – party cookies are cookies that services have placed on web pages in addition to the useful 1st-party cookies we discussed. These are primarily for tracking and advertising; the primary purpose being to harvest your data.
Ensure mobile device is clearing photo meta data before you post it.
When an image is taken, more than just what you captured is saved in that image. A digital print of where, when and the camera settings are also captured with the picture. If you do not remove this data, when you post the image online, that meta data is posted with it. You can check your photos for saved location data by swiping up on the image in the photo’s app on either iPhone or Google phones. You can check images on a desktop for metadata using programs like “exiftool”, which pulls the metadata and presents it to you within the exiftool program.
On mobile, to combat this, you need to limit the shared hardware and location data in the settings of your device. When you download phone applications, you give these apps access to various areas of your device. A lot of the time, apps ask you to give the permissions when downloaded, or if they do not, they are usually listed in the app store. Another note, it is good to pay attention to what an app is accessing when you download it. A mobile game probably does not need access to your camera, or photos. Apps that try to access parts of your device it should not need is indicative of that app doing more than what is advertised. This is NOT GOOD.
On desktops, metadata can also be cleared using meta data tools like exiftool. You may need to tailor how you do it based on your operating system, but a link of how to use the tool will be linked at the end of this post.
Use a VPN (Virtual Private Network)
On a local network, anyone with the right software can analyze the network and see what all the users are doing. Where they are browsing and, in some cases (HTTP websites), even information they enter on the website. HTTP is “Hypertext Transfer Protocol”. It is an application layer (OSI model) protocol that computers and web browsers use to communicate. The HTTP is not encrypted, which means anyone analyzing network traffic can see in plain text the information going back and forth from a computer to a website. If you log into an HTTP website, people on your network could see your log in name and password. Same goes for anything you communicate to the website.
HTTPS is the new standard. A lot of websites are now using HTTPS instead of HTTP, so most of the time you do not have to worry. HTTPS is the encrypted version of HTTP. When interacting with an HTTPS website, your network traffic to that website cannot be read in plane text, so there is little need to worry about people seeing your information through a sniffer. One way you can tell if you are on an HTTP or HTTPS website is to look for a small lock icon next to your URL address bar in your web browser. If there is a lock, HTTPS is in use. If there is not a lock, HTTP is in use.
A VPN or Virtual Private Network eliminates the ability of sniffing your network traffic entirely. All your traffic, instead of going to its destination, will first go to the host of the VPN and then from there it will go to its destination. People who are network sniffing will only be able to see that your traffic goes to the VPN host and not your destination. On the other end of the traffic, a destination website will not be able to identify (not without a lot of effort) where the traffic is originating from. They will see that the incoming traffic is coming from the host VPN and not your public IP address.
Use a different web browser.
As with everything, some services are better than others and some services have trade-offs. Google Chrome is a quick browser, but it is RAM intensive, and they collect a ton of your information. Try using Firefox or Brave, which are much more privacy focused than Google Chrome. Firefox and Brave have built in utilities that block trackers and are conscious about what happens with your data. As said above, data collection can entirely be turned off with these two web browsers, and Firefox, will delete anything it collects after 30 days. Apple’s Safari is also getting better about their privacy, but they still do a bit of data collection for themselves.
If you want to take this step to the next level, try using a deep web browser like Tor, Freenet or i2P. The most popular, Tor aka “The Onion Router”, uses a traffic routing system much like peeling an onion (hence its name). People set up relays all over the world. Internet traffic goes through three relays before arriving at its destination. These browsers can also access hidden internet services which people call The Deep Web. Normal browsers do not have the ability to access these, but Brave has Tor integrated into its browser. How well this works is still a bit in question by me, but I also have not tried very hard at getting it to work either. These services are very anonymous because of the relays involved. Tor acts a lot like its own VPN because of how it works. A small trade off using these kinds of browsers is the decrease in speed. Since the traffic must go to several places before it gets to its destination, it is much slower in comparison to Firefox or Chrome.
The deep web is notorious for illegal activity, but it is nothing to be afraid of!! A lot of illegal activity also happens on the clear net and a lot of normal activity happens on these hidden services. These web browsers are incredibly important for users who are ruled by oppressive governments. They allow these people to get out to the rest of the world to let everyone know what is happening. They can also enjoy the benefits of the normal internet, instead of their local web services. Accessing hidden internet services IS NOT ILLEGAL and using these kinds of browsers is not illegal either. They are perfectly legal, and trying them are great for learning, even if it is not something someone wanted to use permanently.
Use a different operating system.
Getting more into the weeds, you can switch operating systems entirely. Microsoft and even ChromeOS are not the only operating systems, and they are notorious for data collection. MacOS is better in its own way when it comes to privacy. They are incredibly good about keeping other people out, but Apple still collects information on their own customers.
Another operating system that holds a whopping <2% of the computer market is called Linux. Linux is the core of hundreds of different types of operating systems, many of which are free. These different types of Linux are known as distributions, or “distros” for short. Linux is open source, meaning that the code involved is available to be analyzed and edited by the users. This is also why there are so many different distributions. People take some from others, tweak it, and then release it as under a different name. People can also build their own Linux machine from complete scratch. Many of these Linux distributions have some incredible desktop environments and graphical interfaces, some I think, being better than the popular Windows. Linux, unless you want it to be, is not a command line operating system anymore. These desktop environments are also endlessly customizable. One day you can have a desktop environment that looks like Windows, and a couple hours later you can have something that looks like a Mac desktop! It is all up to the user, but I digress.
Linux tends to be much more privacy oriented because of its user base. A lot of people who use Linux want their computer to do what they want it to do and nothing more. They do not want the operating system sending information to a server about how it is used in the background. If a distribution of Linux is caught doing this, users will tell the community, and people who do not like this can stop using it. In a sense, they have a checks and balances system! Majority of Linux distros entail a lot more privacy than Windows, Chrome, and Mac by default, but there is a solution for people who want even more. Some distributions are extremely privacy focused. The distributions commonly associate with privacy are TailsOS, ParrotOS, and QuebesOS.
Use a privacy operating system on a USB drive.
People who want the absolute most privacy when it comes to computing combine all these previous steps into this last one. All the computing is done off a USB drive that clears its data every time the jump drive is disconnected. A popular combination is TailsOS running the TOR browser on a USB drive. There is no hard drive data stored, no web browsing data stored, and little traceability (not impossible though) as to what webpages you accessed.
The Wrap Up
A lot of information in a short period of time! You may be wondering, “okay, so what should I actually do?” I do not expect the ordinary everyday computer user to change their operating system and start using a browser that can access hidden services. What I do recommend though, is to switch your web browser to Firefox or Brave, install an ad blocking extension, and go through your current device and adjust its privacy settings to the most private options. For mobile devices, I recommend always keeping your location services off until you need them. It takes less than five seconds to flip it off and on using voice commands (on iPhones anyways).
We are so very excited to announce that Salina Media Connection has allowed us to do Tech Talk Tuesdays!!
We will be educating people on everything from Storage Spaces for your computers to Security Cameras for your protection. So far we have made 4 videos and we are working on our 5th today!! Stay tuned to learn more about what we will talk about!
More and more people are migrating to the Chrome OS platform and this may cause issue with drivers and related software compared to Windows. So we have decided to help you out with a step-by-step guide!
How to Guide: How to Set up your Printer with a Chromebook
How To Set Up Your Printer With A Chromebook
How To Get Your Printer Set Up
You can print directly from your Chromebook by using most printers that can connect to a wired or Wi-Fi network.
Tip: A USB cable can also be used to connect your Chromebook and printer together. When a cable is used, a notification will be displayed. Follow the onscreen instructions. If your printer is connected to a Chromebook directly then it will not need to be connected to a Wi-Fi network.
Step 1: Connect your printer to the internet
Turn your printer on.
Connect your printer to an internet network. For further assistance, follow the instructions provided by your printer manufacturer.
Turn your Chromebook on and sign in.
Connect the Chromebook with the same internet network that your printer is connected to.
Step 2: Print out a page
To print a document, image, or page that you viewing, press the keys Ctrl + p.
Navigate to “Destination” and then choose the Down Arrow.
Choose “See more”
Select your printer. Tip: There are some printers that will show up automatically on the list. If your printer does not appear on this list, then choose Manage.
Choose Print.
How to add a printer to a Chromebook
Choose the time on the bottom right.
Choose Settings.
Choose Advanced on the bottom.
Choose Printers under Printing.
Under the section “Available printers to save, choose Save next to your printer.
Check to make sure your printer appears on the top under the “Saved printers” section.
Advanced printer configuration
If you are unable to automatically save your printer, the advanced setup process can be used.
Choose Set up next to your printer’s name.
Choose your printer’s manufacturer and model in the box that is displayed.
Check the label on your printer to find this information.
Choose Add.
Check under “Saved printers” on the top to make sure your printer appears.
You can specify your printer’s PPD if your printer is not displayed in the model or manufacture drop-down menus.
PostScript Printer Description (PPD)
PPD files are used by Chromebooks to support printers. These files differ from printer drivers. They inform a Chromebook how a specific printer model can be supported.
Select Browse in the box appearing next to “specify your printer PPD.”
Select your printer PPD and then choose Open.
Important: Chromebooks support .gzip or .ppd file formats with up to a 250 KB file size.
How to manually add a printer
If your printer is not displayed under the section “Available printers to save,” your printer can also be manually added.
Important: If you are using a Chromebook at school or work, and cannot add a new printer on your own, contact the administrator.
Choose the time on the bottom right.
Choose Settings.
Choose Advanced on the bottom.
Choose Printers under Printing.
Choose Add Printer under Add Printer.
Enter information on your printer
Name: Enter the name of your printer
Address: Enter the IP address of your printer
Protocol: The supported protocol for most printers is IPP.
Queue: It is ipp/print for most printers.
Choose Add.
If you cannot automatically set up your printer, you can continue following the steps on-screen for advanced printer configuration and PPD files.
How to fix problems with setting up your printer
You have your printer set up, but it will not print.
Choose the time on the bottom right.
Choose Settings.
Choose Advanced on the bottom.
Choose Printers under Printing.
Choose More and then Edit next to your printer’s name.
Ensure that all of the information on your printer is right, with no misspellings or typos.
If all of your printer information is accurate, try to remove and re-add your printer:
Choose More and then Remove next to your printer’s name
Set your printer up once again.
Your printer will not connect with Wi-Fi
Turn off your printer and then back on again.
Try connecting to Wi-Fi again.
Contact your printer manufacturer for assistance if your printer still will not connect with Wi-Fi.
Credit to respective owners of this guide, fair use.
Recently, JAB IT PC has partnered up with File Savers Data Recovery to become the only File Saver authorized service center in Kansas!
File Savers can recover from desktop and laptop hard drives, phone and tablet hard drives, jump (flash) drives, external hard drives, solid state drives, camera cards, and more! Please contact us and we will get the process started to recover your data. We will handle the everything for you, just bring in your computer, laptop, phone, or other device or drive and we will send to File Savers. Once they have the drive we will reach out to you to discuss the estimate and how you would like to proceed. File Savers has a “No recover, no fee” policy, so if they can’t recover your data, you will not be charged. And as an added bonus, once we discuss your options, you can decide not to move forward and we will send your drive back to you, no charge (for their services up to that point). Please click on the File Savers link below for more information or email or call us at jason@jabitpc.com or 785-577-1659 for more information!
Yes….We Can Recover That!
Clicking
Smashed
Beeping
Broken
Buzzing
Unrecognized
Dead/Not Spinning
File’s won’t open
Electrical Failures
Deleted
Flood/Water Damage
Formatted
Dropped
Blue/Black screen
Fire
Crashes or Freezes
Why Choose File Savers to Rescue Your IMPORTANT Data?
Highest Success Rates:We wont stop until we have exhausted all solutions to recover your data.
Beyond Certified: Going above traditional training to solve the most complicated situations.
No Data No Charge: We stand behind our work. Guaranteed to recover data or there’s no charge.
ISO 5 Clean Room: So dust and debris won’t enter your HDD’s during the recovery process.
Trusted & Secure: HIPPA & PCI compliant so you can trust your data is always safe and secure.
Fastest Service: 24/7 Emergency Service available so we can have your data back in your hands fast.
Experienced Engineers: Means we have seen it all! If it’s possible to recover, we’ll recover it.
Custom Tools & Techniques: Proprietary tools & techniques to help us recover data others can’t.
IMPORTANT Data Recovery Tips
Power Off Drive
____________________________
Power off your desktop hard drive!
This is the number one thing you
can do to prevent further damage
& increase your chance of a
successful recovery!
POWER OFF YOUR DESKTOP DRIVE!
If your desktop drive is unrecognized
or making unusual noises, it has likely
sustained a serious head crash.
Powering off your hard drive now may
prevent more catastrophic damage
that can make your files unrecoverable.
If your data has been accidentally deleted
or formatted or your files are missing,
it’s important to power off your computer
to stop those files from being overwritten.
Even surfing the internet writes data to
your hard drive. Any usage of your computer
will quickly overwrite the data you are
hoping to recover. Once data has been
overwritten, it can’t be recovered.
Water Damage
____________________________
DO NOT DRY OUT YOUR DESKTOP DRIVE!
The platters of your hard drive are metal.
Drying out your hard drive causes corrosion
and will quickly make your data impossible
to recover. If your hard drive was submerged
in water, place the desktop drive inside a
sealed airtight zip lock bag and get it to our
lab ASAP to increase your chance of a
successful recovery of your data.
Official Rules for the “Springbean Jellybean Contest” event. How to Enter Contest Event Information Event Prizes JAB IT LLC will be giving away over a thousan...
Increasing Online Privacy Tech Talk #5 with Salina Media Connection! In this tech talk we cover increasing and maintaining your online privacy. We start with si...