Many people have got this misconception that privacy and security doesn't go hand by hand but it's wrong ! Privacy & security are the major matrix through which we can measure data breaches and data security.
As i have started a primer on internet privacy , i will classify this into various parts :
1. What are the biggest privacy concerns over the internet ?
2. What are the steps need to be taken to make our data safe & secure ?
3. How we can have privacy over internet by using cryptography.
When it comes to cryptography why should we use it ,how it gives privacy and security ?
To understand internet tracking and privacy concerns over the internet we need to understand how internet actually works and how all the free services over the internet functions and how data collection is being done over the internet .
This primer is a long series which covers every aspect of internet security and privacy starting with browsers ,how we optimize them , what are the extensions we use, what are the cryptographic implementations we need to implement in order to secure our data in our machines
VPNs, TOR, Proxies, pros and cons of it, social networks, cookies, phishing, spam and scams over the internet .........
So lets explore the Internet in a different way !!
As i have started a primer on internet privacy , i will classify this into various parts :
1. What are the biggest privacy concerns over the internet ?
2. What are the steps need to be taken to make our data safe & secure ?
3. How we can have privacy over internet by using cryptography.
When it comes to cryptography why should we use it ,how it gives privacy and security ?
To understand internet tracking and privacy concerns over the internet we need to understand how internet actually works and how all the free services over the internet functions and how data collection is being done over the internet .
This primer is a long series which covers every aspect of internet security and privacy starting with browsers ,how we optimize them , what are the extensions we use, what are the cryptographic implementations we need to implement in order to secure our data in our machines
VPNs, TOR, Proxies, pros and cons of it, social networks, cookies, phishing, spam and scams over the internet .........
So lets explore the Internet in a different way !!
Comments
Post a Comment