{"id":48,"date":"2021-12-22T10:54:38","date_gmt":"2021-12-22T15:54:38","guid":{"rendered":"https:\/\/opentextbc.ca\/comptech\/chapter\/privacy-online-presence\/"},"modified":"2022-10-05T13:50:10","modified_gmt":"2022-10-05T17:50:10","slug":"privacy-online-presence","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/comptech\/chapter\/privacy-online-presence\/","title":{"raw":"Privacy &amp; Online Presence","rendered":"Privacy &amp; Online Presence"},"content":{"raw":"[caption id=\"\" align=\"aligncenter\" width=\"374\"]<img src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2021\/12\/image38.png\" alt=\"A cartoon showing a group of people conversing, perhaps at a party. This sections discusses issues around sharing information but also keeping important information private.\" width=\"374\" height=\"499\"> Figure 8.1 Managing your privacy and online presence[\/caption]\n\nSome companies provide us with free access to things like email, social media, etc. in exchange for showing us advertising. These companies are interested in knowing as much as possible about us (e.g. gender, age, income, etc.) in order to show us advertising that is targeted to our particular demographic. This collection of our personal information can be either seen as intrusive, or as useful (since the ads are more relevant), or somewhere in between. There is information we can purposely put online for others, and then there is information we can inadvertently leave behind when we do things such as search the web. You will want to make a conscious decision as to how to balance your online presence with your privacy. There are a number of factors that impact your online privacy and presence.\n<h1>Web Browsing Privacy<\/h1>\n<h2>Browser Cookies<\/h2>\nWeb browser cookies are a small text file that records information about your visit to a web site. The next time you return to the web site, the browser reads the cookie file. Similar to a fortune cookie, a browser cookie contains a small amount of text or a message. A few facts about cookies:\n<ul>\n \t<li>Cookies aren\u2019t malicious, they can\u2019t harm your computer like malware potentially could.<\/li>\n \t<li>Cookies\u2019 primary purpose is customization of web pages the next time you interact with or return to the site.<\/li>\n \t<li>Cookies can\u2019t steal information about you, they only know what you do on the website or what you tell them.\n<ul>\n \t<li>For example, if on a website you look at a web page selling a particular pair of shoes, a cookie can remember that.<\/li>\n \t<li>If the web site asks for you to type your name or a username, it can remember that. Cookies don\u2019t have the ability to look at other files on your computer to try and figure out what your name is, so if the web site knows your name, you must have told the website this information.<\/li>\n<\/ul>\n<\/li>\n \t<li>Cookies are only read by the website that created them, so in theory they weren\u2019t designed to share information between websites (website developers found a clever way around this - third party cookies)<\/li>\n<\/ul>\n<h2>First and Third Party Cookies<\/h2>\n<ul>\n \t<li>First party cookies are created by the website you set out to visit.<\/li>\n \t<li>Third party cookies are created when the website you visit temporarily redirects you to a cookie tracking website.\n<ul>\n \t<li>If you visit another web site that uses the same third party cookie tracking website, then information effectively passes from one web site to the other. This is how, for example an advertisement for the clothing you were looking at buying on one web site shows up in an advertisement on a different website that you look at.<\/li>\n \t<li>Third party tracking cookies are considered a privacy issue, and government legislation has made many websites obtain your consent before they use a cookie on a site you visit.<\/li>\n \t<li>Third party tracking cookies are on the way out. The Safari and Firefox web browsers started blocking them in 2020, and the Chrome browser will also phase them out by 2022.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Clearing Your Browsing History<\/h2>\nWhen you browse the web, your web browser keeps certain information:\n<ul>\n \t<li>Cache. The browser cache keeps images and text from web pages you have recently visited. It\u2019s primary purpose is to make your web browsing faster. If you revisit a web page you have recently visited, the browser will pull web page information from the cache, rather than going to the website to get it. It\u2019s faster to retrieve information from the cache than from the Internet, so having a cache speeds up the browsing experience.<\/li>\n \t<li>History. Your browser history is a list of websites that you have visited. When you start typing the address of a website, you may see suggestions as to what website you may want, your browser history is playing a part in generating these suggestions - it assumes if you have been to a site once, you may want to go back again.<\/li>\n \t<li>Cookies. As previously discussed, a cookie is a small text file that records information about your visit to a web site, such as your username and\/or pages you looked at.<\/li>\n<\/ul>\n<h3>Why would I want to clear my browser history?<\/h3>\nYou might have been using a computer other than your own (e.g. coffee shop, library), and for privacy reasons, you might want to clear your history. Another reason could be if a web page you have previously visited isn\u2019t loading properly, clearing the history may solve that problem. In general, if you have your own device (phone, tablet, laptop), most people don\u2019t bother clearing their browser history.\n<h3>How do I clear my browser history?<\/h3>\nIn your browser (e.g. Firefox, Safari, Chrome, Edge, etc.) there typically is a \u201csettings\u201d menu, and somewhere in that menu will be the option to clear the history. To get the specific steps for your particular browser, search for the words \u201cclear browser history\u201d and add the name of your browser to the search.\n\n[caption id=\"attachment_47\" align=\"aligncenter\" width=\"1362\"]<img class=\"wp-image-45 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image37.png\" alt=\"A screen capture of the settings for Microsoft Edge where History and Cookies can be cleared\" width=\"1362\" height=\"379\"> Figure 8.2 edge:\/\/settings\/privacy[\/caption]\n<h3>What happens when my browser history is cleared?<\/h3>\nDepending on your browser, you may need to select each of the three main areas to clear, or they may be cleared in a single step. Here\u2019s what to expect if you clear each of the areas:\n<ul>\n \t<li>Cache. If you have a slower Internet connection, it may look like your browser is a bit slower than it used to be until the cache is rebuilt.<\/li>\n \t<li>History. Initially, you won\u2019t see the most relevant autocomplete suggestions of sites you may want to visit, but your history will rebuild itself over time.<\/li>\n \t<li>Cookies. For any websites that you had chosen \u201cremember me\u201d, you will likely need to put in your username again the next time you log into the site again.<\/li>\n<\/ul>\n<h2>Private Mode in Web Browsers<\/h2>\nSo what if you would like to visit a particular website and don\u2019t want that website as part of your browsing history, but you don\u2019t want to clear your entire browsing history? Perhaps you are on your lunch break at work, and don\u2019t want the details of your visit to an online shopping site recorded by the browser. The way to accomplish this is to switch to your browser\u2019s \u201cprivate\u201d browsing mode. Different browsers have slightly different names for their private browsing mode:\n<div>\n<table style=\"width: 100%; height: 193px;\"><caption>Table 8.1 Private Browsing Labels<\/caption>\n<tbody>\n<tr style=\"height: 35px;\">\n<th style=\"height: 35px;\" scope=\"col\">Browser<\/th>\n<th style=\"height: 35px;\" scope=\"col\">Name for Private Browsing<\/th>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px;\">Firefox<\/td>\n<td style=\"height: 35px;\">Private<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px;\">Chrome<\/td>\n<td style=\"height: 35px;\">Incognito<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px;\">Safari<\/td>\n<td style=\"height: 35px;\">Private<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px;\">Edge<\/td>\n<td style=\"height: 35px;\">InPrivate<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\nGenerally speaking, for each of these browsers look for three dots, three lines or a new window tab near the top right corner of the browser, clicking on this will open a menu, and then you can open a new window in a private browsing mode.\n<h2>Private Browsers<\/h2>\nThe private browsing mode in the popular browsers provides some extra security in that your web history is not saved on the computer you are using; however, your IP address is still trackable (which can be traced - with some effort - to your physical location). If you want an extra level of anonymity, you could download a special browser for this purpose, such as Tor or Brave. These browsers not only hide your history, they mask your IP address and physical location from the websites you visit by routing your browsing through several servers before it reaches your destination. These connections are also encrypted to increase anonymity.\n<h2>VPNs (Virtual Private Networks)<\/h2>\nSome people use a VPN provider to enhance online privacy. Websites know the IP (Internet Protocol) address of people who visit the website. An IP address has an associated real world location. You can visit a website such as <a href=\"https:\/\/whatismyipaddress.com\/\">What Is My IP Address<\/a> and see your IP address, as well as your approximate location on a map.\n\nVPNs act as an intermediary between you and the website you visit, so the website sees the VPN\u2019s IP address, rather than seeing your IP address. So once your VPN connection is established, your Internet traffic emerges without signs of who you are or where you're connecting from.\n\nIf you are considering using a VPN for privacy reasons, check your VPN's user agreement to see if the provider keeps logs of your online activities. If they do, look for another VPN.\n\nMost VPN services charge for their services; however, there are some free VPN services (they will show ads in your app).\n\nThe quality (and privacy policies) of VPN providers varies widely. Search the Internet for current reviews on VPN providers and do some research before selecting one.\n<h2>The Dark Web &amp; TOR (The Onion Router)<\/h2>\n[caption id=\"attachment_47\" align=\"aligncenter\" width=\"600\"]<img class=\"wp-image-46\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image13.png\" alt=\"Cartoon of an iceberg, two thirds of which is underwater, labeled to show that the Internet most people use is like the visible part of the iceberg, with the Deep and Dark Webs being the even larger unseen parts.\" width=\"600\" height=\"425\"> Figure 8.3 The Surface Web, Deep Web &amp; Dark Web[\/caption]\n\nThe dark web makes up less than 1% of the web and is designed to provide anonymity for users and website owners. You can\u2019t access the dark web with a normal web browser, you need a special browser - TOR (The Onion Router).\n\nLike the Internet, the core principles behind the TOR network were developed by the US Military. \u201cOnion routing\u201d was designed to protect military intelligence communications online.\n\nThe dark web is a popular platform for:\n<ul>\n \t<li>Those living in countries where they face imprisonment for criticizing their government - journalists, activists, and non-government news agencies.<\/li>\n \t<li>Users behind government firewalls who wish to anonymously access information (other than that provided by the state).<\/li>\n \t<li>Whistleblowers and information-leakers, for example, Edward Snowden.<\/li>\n \t<li>Activists and revolutionaries (like the hacking group Anonymous). The dark web serves as a platform where activists can organize in secret.<\/li>\n \t<li>Illegal activities such as drug purchases, stolen credit cards, pirated movies and much more.<\/li>\n<\/ul>\nThe dark web can be a dangerous place for the general internet user, even if they are not involved in any of the illegal activities that occur there. Search the Internet for more information about risks and precautions for the dark web if you intend to access it.\n<h1>Social Media Privacy Issues<\/h1>\nSocial media platforms (such as Facebook, LinkedIn, etc.), are websites where you can share details about your life online with family, friends and\/or the public.\n\nOne of the single biggest issues with social media is that the default privacy settings are typically too broad from a privacy perspective (you end up sharing more details than you expect with a broader audience than you expect).\n\nDetails that you make public can be \u201cscraped\u201d (collected using software that simulates a human surfing the web, which then records this information) from these websites without the need to hack into them, as the privacy settings on people\u2019s social media accounts have categorized this data as public rather than private. The use of automated computer programs to do the scraping can result in large amounts of data on many users being available.\n\nIn 2021, personal data from 500 million LinkedIn users (about \u2154 of the company's users) was \u201cscraped\u201d and made for sale online.\n\nAlso in 2021, Facebook saw scraped data from about 533 million users posted in an online forum. The data included users: full names, location, email addresses and other information.\n\nIn order to protect your privacy, and your personal details so they are not used by a \u201cbad actor\u201d with malicious intent, you can:\n\nlimit the audience of your posts (e.g friends only, rather than making them public).\n<ul>\n \t<li>take a look at your social media platform \u201csettings\u201d and limit how much of your information is made public or shared.<\/li>\n \t<li>scale back on details in your profile. For example,\n<ul>\n \t<li>you can leave out your birth date or your birth year, just provide one piece of that information, not both.<\/li>\n \t<li>be careful about adding family members as that information could reveal your mother's maiden name, which is often used as a security question.<\/li>\n \t<li>do not list your mobile phone number publicly, as this phone number is often used in two factor authentication when you log into websites such as your bank, and there are ways in which mobile phone text messages can be intercepted.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h1>Online Presence<\/h1>\n[caption id=\"attachment_47\" align=\"aligncenter\" width=\"499\"]<img class=\"wp-image-47 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image16.png\" alt=\"A map of Internet apps with links between them. The Internet can be very useful for promoting yourself in the job market.\" width=\"499\" height=\"437\"> Figure 8.4 It\u2019s a good idea to have a professional online presence.[\/caption]\n\nAs part of the hiring process for many companies, the Human Resources (HR) department often surveys the online presence of potential job applicants. There have been numerous instances of the top candidate for a job not being offered the job after their online presence has been searched. It\u2019s prudent for you to search your own name using a search engine, and see what you can find. In order to provide a professional online presence for search engines to find, you may wish to consider:\n<h2>ePortfolios<\/h2>\nStudents in college or university may create an ePortfolio during the course of their studies. An ePortfolio is a collection of work (evidence) in an electronic format that showcases learning or accomplishments. It can become a type of enhanced r\u00e9sum\u00e9. For example, instead of just saying you write clearly and know how to use software to produce brochures, take a brochure you have produced in class (or at your job) and include that in your ePortfolio. If you don\u2019t already have an ePortfolio, search the words \u201cfree ePortfolio\u201d to locate some websites that will allow you to publish one at no charge.\n<h2>Social Media<\/h2>\nIf you don\u2019t have a social media presence, potential employers may wonder if your technology skills are lacking, even if you have consciously made the choice not to have one for privacy reasons.\n\nConsider using a professional networking site (such as LinkedIn or others) to establish and maintain professional contacts, and it can also be a way to either find work or further your career. Search for a \u201cLinkedIn tutorial\u201d, to learn how to enhance your online presence.\n\nIf you use social media such as Facebook or Twitter, consider having two accounts: one personal, one professional. Reserve the personal account for family and friends, and keep the privacy setting high so that only family and friends can see the posts. With your professional accounts, lower privacy settings could allow a more public view of your posts (which could be beneficial in future job searches), so keep all your posts professional and work-related on this account.\n<h2>Websites and Blogs<\/h2>\nWould you prefer to use a website or blog to project your professional image rather than using social media? There are many free services available, and for a small fee you can register an Internet domain name and host your web site without any advertisements.\n<h3>Media Attributions<\/h3>\n<ul>\n \t<li>\u00a0<a href=\"https:\/\/www.flickr.com\/photos\/32641069@N00\/4281052958\">\"Social media as art\"<\/a> by <a href=\"https:\/\/www.flickr.com\/photos\/32641069@N00\">SFview<\/a> is licensed under a\u00a0<a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/?ref=ccsearch&amp;atype=rich\">CC BY-NC-SA 2.0 licence.<\/a><\/li>\n \t<li>edge:\/\/settings\/privacy <a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/intellectualproperty\/copyright\/permissions\">Used with permission from Microsoft<\/a><\/li>\n<\/ul>\n<ul>\n \t<li>\u00a0\"<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Iceberg_of_Webs.svg\">The Surface Web, Deep Web &amp; Dark Web<\/a>\" by <a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Ranjithsiji\">Ranjithsij.<\/a> Modified by<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Flori4nK\"> Flori4nK<\/a> for a more accurate representation is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/deed.en\"><span class=\"cc-license-identifier\">CC BY-SA 4.0 licence.<\/span><\/a><\/li>\n \t<li><a href=\"https:\/\/www.flickr.com\/photos\/7849372@N04\/3582297307\">\"Social media dataflows\"<\/a> by <a href=\"https:\/\/www.flickr.com\/photos\/7849372@N04\">Anne Helmond<\/a> is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/?ref=ccsearch&amp;atype=rich\">CC BY-NC-ND 2.0<\/a><\/li>\n<\/ul>","rendered":"<figure style=\"width: 374px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2021\/12\/image38.png\" alt=\"A cartoon showing a group of people conversing, perhaps at a party. This sections discusses issues around sharing information but also keeping important information private.\" width=\"374\" height=\"499\" \/><figcaption class=\"wp-caption-text\">Figure 8.1 Managing your privacy and online presence<\/figcaption><\/figure>\n<p>Some companies provide us with free access to things like email, social media, etc. in exchange for showing us advertising. These companies are interested in knowing as much as possible about us (e.g. gender, age, income, etc.) in order to show us advertising that is targeted to our particular demographic. This collection of our personal information can be either seen as intrusive, or as useful (since the ads are more relevant), or somewhere in between. There is information we can purposely put online for others, and then there is information we can inadvertently leave behind when we do things such as search the web. You will want to make a conscious decision as to how to balance your online presence with your privacy. There are a number of factors that impact your online privacy and presence.<\/p>\n<h1>Web Browsing Privacy<\/h1>\n<h2>Browser Cookies<\/h2>\n<p>Web browser cookies are a small text file that records information about your visit to a web site. The next time you return to the web site, the browser reads the cookie file. Similar to a fortune cookie, a browser cookie contains a small amount of text or a message. A few facts about cookies:<\/p>\n<ul>\n<li>Cookies aren\u2019t malicious, they can\u2019t harm your computer like malware potentially could.<\/li>\n<li>Cookies\u2019 primary purpose is customization of web pages the next time you interact with or return to the site.<\/li>\n<li>Cookies can\u2019t steal information about you, they only know what you do on the website or what you tell them.\n<ul>\n<li>For example, if on a website you look at a web page selling a particular pair of shoes, a cookie can remember that.<\/li>\n<li>If the web site asks for you to type your name or a username, it can remember that. Cookies don\u2019t have the ability to look at other files on your computer to try and figure out what your name is, so if the web site knows your name, you must have told the website this information.<\/li>\n<\/ul>\n<\/li>\n<li>Cookies are only read by the website that created them, so in theory they weren\u2019t designed to share information between websites (website developers found a clever way around this &#8211; third party cookies)<\/li>\n<\/ul>\n<h2>First and Third Party Cookies<\/h2>\n<ul>\n<li>First party cookies are created by the website you set out to visit.<\/li>\n<li>Third party cookies are created when the website you visit temporarily redirects you to a cookie tracking website.\n<ul>\n<li>If you visit another web site that uses the same third party cookie tracking website, then information effectively passes from one web site to the other. This is how, for example an advertisement for the clothing you were looking at buying on one web site shows up in an advertisement on a different website that you look at.<\/li>\n<li>Third party tracking cookies are considered a privacy issue, and government legislation has made many websites obtain your consent before they use a cookie on a site you visit.<\/li>\n<li>Third party tracking cookies are on the way out. The Safari and Firefox web browsers started blocking them in 2020, and the Chrome browser will also phase them out by 2022.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Clearing Your Browsing History<\/h2>\n<p>When you browse the web, your web browser keeps certain information:<\/p>\n<ul>\n<li>Cache. The browser cache keeps images and text from web pages you have recently visited. It\u2019s primary purpose is to make your web browsing faster. If you revisit a web page you have recently visited, the browser will pull web page information from the cache, rather than going to the website to get it. It\u2019s faster to retrieve information from the cache than from the Internet, so having a cache speeds up the browsing experience.<\/li>\n<li>History. Your browser history is a list of websites that you have visited. When you start typing the address of a website, you may see suggestions as to what website you may want, your browser history is playing a part in generating these suggestions &#8211; it assumes if you have been to a site once, you may want to go back again.<\/li>\n<li>Cookies. As previously discussed, a cookie is a small text file that records information about your visit to a web site, such as your username and\/or pages you looked at.<\/li>\n<\/ul>\n<h3>Why would I want to clear my browser history?<\/h3>\n<p>You might have been using a computer other than your own (e.g. coffee shop, library), and for privacy reasons, you might want to clear your history. Another reason could be if a web page you have previously visited isn\u2019t loading properly, clearing the history may solve that problem. In general, if you have your own device (phone, tablet, laptop), most people don\u2019t bother clearing their browser history.<\/p>\n<h3>How do I clear my browser history?<\/h3>\n<p>In your browser (e.g. Firefox, Safari, Chrome, Edge, etc.) there typically is a \u201csettings\u201d menu, and somewhere in that menu will be the option to clear the history. To get the specific steps for your particular browser, search for the words \u201cclear browser history\u201d and add the name of your browser to the search.<\/p>\n<figure id=\"attachment_47\" aria-describedby=\"caption-attachment-47\" style=\"width: 1362px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-45 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image37.png\" alt=\"A screen capture of the settings for Microsoft Edge where History and Cookies can be cleared\" width=\"1362\" height=\"379\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image37.png 1362w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image37-300x83.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image37-1024x285.png 1024w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image37-768x214.png 768w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image37-65x18.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image37-225x63.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image37-350x97.png 350w\" sizes=\"auto, (max-width: 1362px) 100vw, 1362px\" \/><figcaption id=\"caption-attachment-47\" class=\"wp-caption-text\">Figure 8.2 edge:\/\/settings\/privacy<\/figcaption><\/figure>\n<h3>What happens when my browser history is cleared?<\/h3>\n<p>Depending on your browser, you may need to select each of the three main areas to clear, or they may be cleared in a single step. Here\u2019s what to expect if you clear each of the areas:<\/p>\n<ul>\n<li>Cache. If you have a slower Internet connection, it may look like your browser is a bit slower than it used to be until the cache is rebuilt.<\/li>\n<li>History. Initially, you won\u2019t see the most relevant autocomplete suggestions of sites you may want to visit, but your history will rebuild itself over time.<\/li>\n<li>Cookies. For any websites that you had chosen \u201cremember me\u201d, you will likely need to put in your username again the next time you log into the site again.<\/li>\n<\/ul>\n<h2>Private Mode in Web Browsers<\/h2>\n<p>So what if you would like to visit a particular website and don\u2019t want that website as part of your browsing history, but you don\u2019t want to clear your entire browsing history? Perhaps you are on your lunch break at work, and don\u2019t want the details of your visit to an online shopping site recorded by the browser. The way to accomplish this is to switch to your browser\u2019s \u201cprivate\u201d browsing mode. Different browsers have slightly different names for their private browsing mode:<\/p>\n<div>\n<table style=\"width: 100%; height: 193px;\">\n<caption>Table 8.1 Private Browsing Labels<\/caption>\n<tbody>\n<tr style=\"height: 35px;\">\n<th style=\"height: 35px;\" scope=\"col\">Browser<\/th>\n<th style=\"height: 35px;\" scope=\"col\">Name for Private Browsing<\/th>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px;\">Firefox<\/td>\n<td style=\"height: 35px;\">Private<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px;\">Chrome<\/td>\n<td style=\"height: 35px;\">Incognito<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px;\">Safari<\/td>\n<td style=\"height: 35px;\">Private<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"height: 35px;\">Edge<\/td>\n<td style=\"height: 35px;\">InPrivate<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Generally speaking, for each of these browsers look for three dots, three lines or a new window tab near the top right corner of the browser, clicking on this will open a menu, and then you can open a new window in a private browsing mode.<\/p>\n<h2>Private Browsers<\/h2>\n<p>The private browsing mode in the popular browsers provides some extra security in that your web history is not saved on the computer you are using; however, your IP address is still trackable (which can be traced &#8211; with some effort &#8211; to your physical location). If you want an extra level of anonymity, you could download a special browser for this purpose, such as Tor or Brave. These browsers not only hide your history, they mask your IP address and physical location from the websites you visit by routing your browsing through several servers before it reaches your destination. These connections are also encrypted to increase anonymity.<\/p>\n<h2>VPNs (Virtual Private Networks)<\/h2>\n<p>Some people use a VPN provider to enhance online privacy. Websites know the IP (Internet Protocol) address of people who visit the website. An IP address has an associated real world location. You can visit a website such as <a href=\"https:\/\/whatismyipaddress.com\/\">What Is My IP Address<\/a> and see your IP address, as well as your approximate location on a map.<\/p>\n<p>VPNs act as an intermediary between you and the website you visit, so the website sees the VPN\u2019s IP address, rather than seeing your IP address. So once your VPN connection is established, your Internet traffic emerges without signs of who you are or where you&#8217;re connecting from.<\/p>\n<p>If you are considering using a VPN for privacy reasons, check your VPN&#8217;s user agreement to see if the provider keeps logs of your online activities. If they do, look for another VPN.<\/p>\n<p>Most VPN services charge for their services; however, there are some free VPN services (they will show ads in your app).<\/p>\n<p>The quality (and privacy policies) of VPN providers varies widely. Search the Internet for current reviews on VPN providers and do some research before selecting one.<\/p>\n<h2>The Dark Web &amp; TOR (The Onion Router)<\/h2>\n<figure id=\"attachment_47\" aria-describedby=\"caption-attachment-47\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-46\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image13.png\" alt=\"Cartoon of an iceberg, two thirds of which is underwater, labeled to show that the Internet most people use is like the visible part of the iceberg, with the Deep and Dark Webs being the even larger unseen parts.\" width=\"600\" height=\"425\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image13.png 1200w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image13-300x212.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image13-1024x724.png 1024w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image13-768x543.png 768w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image13-65x46.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image13-225x159.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image13-350x248.png 350w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption id=\"caption-attachment-47\" class=\"wp-caption-text\">Figure 8.3 The Surface Web, Deep Web &amp; Dark Web<\/figcaption><\/figure>\n<p>The dark web makes up less than 1% of the web and is designed to provide anonymity for users and website owners. You can\u2019t access the dark web with a normal web browser, you need a special browser &#8211; TOR (The Onion Router).<\/p>\n<p>Like the Internet, the core principles behind the TOR network were developed by the US Military. \u201cOnion routing\u201d was designed to protect military intelligence communications online.<\/p>\n<p>The dark web is a popular platform for:<\/p>\n<ul>\n<li>Those living in countries where they face imprisonment for criticizing their government &#8211; journalists, activists, and non-government news agencies.<\/li>\n<li>Users behind government firewalls who wish to anonymously access information (other than that provided by the state).<\/li>\n<li>Whistleblowers and information-leakers, for example, Edward Snowden.<\/li>\n<li>Activists and revolutionaries (like the hacking group Anonymous). The dark web serves as a platform where activists can organize in secret.<\/li>\n<li>Illegal activities such as drug purchases, stolen credit cards, pirated movies and much more.<\/li>\n<\/ul>\n<p>The dark web can be a dangerous place for the general internet user, even if they are not involved in any of the illegal activities that occur there. Search the Internet for more information about risks and precautions for the dark web if you intend to access it.<\/p>\n<h1>Social Media Privacy Issues<\/h1>\n<p>Social media platforms (such as Facebook, LinkedIn, etc.), are websites where you can share details about your life online with family, friends and\/or the public.<\/p>\n<p>One of the single biggest issues with social media is that the default privacy settings are typically too broad from a privacy perspective (you end up sharing more details than you expect with a broader audience than you expect).<\/p>\n<p>Details that you make public can be \u201cscraped\u201d (collected using software that simulates a human surfing the web, which then records this information) from these websites without the need to hack into them, as the privacy settings on people\u2019s social media accounts have categorized this data as public rather than private. The use of automated computer programs to do the scraping can result in large amounts of data on many users being available.<\/p>\n<p>In 2021, personal data from 500 million LinkedIn users (about \u2154 of the company&#8217;s users) was \u201cscraped\u201d and made for sale online.<\/p>\n<p>Also in 2021, Facebook saw scraped data from about 533 million users posted in an online forum. The data included users: full names, location, email addresses and other information.<\/p>\n<p>In order to protect your privacy, and your personal details so they are not used by a \u201cbad actor\u201d with malicious intent, you can:<\/p>\n<p>limit the audience of your posts (e.g friends only, rather than making them public).<\/p>\n<ul>\n<li>take a look at your social media platform \u201csettings\u201d and limit how much of your information is made public or shared.<\/li>\n<li>scale back on details in your profile. For example,\n<ul>\n<li>you can leave out your birth date or your birth year, just provide one piece of that information, not both.<\/li>\n<li>be careful about adding family members as that information could reveal your mother&#8217;s maiden name, which is often used as a security question.<\/li>\n<li>do not list your mobile phone number publicly, as this phone number is often used in two factor authentication when you log into websites such as your bank, and there are ways in which mobile phone text messages can be intercepted.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h1>Online Presence<\/h1>\n<figure id=\"attachment_47\" aria-describedby=\"caption-attachment-47\" style=\"width: 499px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-47 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image16.png\" alt=\"A map of Internet apps with links between them. The Internet can be very useful for promoting yourself in the job market.\" width=\"499\" height=\"437\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image16.png 499w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image16-300x263.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image16-65x57.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image16-225x197.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image16-350x307.png 350w\" sizes=\"auto, (max-width: 499px) 100vw, 499px\" \/><figcaption id=\"caption-attachment-47\" class=\"wp-caption-text\">Figure 8.4 It\u2019s a good idea to have a professional online presence.<\/figcaption><\/figure>\n<p>As part of the hiring process for many companies, the Human Resources (HR) department often surveys the online presence of potential job applicants. There have been numerous instances of the top candidate for a job not being offered the job after their online presence has been searched. It\u2019s prudent for you to search your own name using a search engine, and see what you can find. In order to provide a professional online presence for search engines to find, you may wish to consider:<\/p>\n<h2>ePortfolios<\/h2>\n<p>Students in college or university may create an ePortfolio during the course of their studies. An ePortfolio is a collection of work (evidence) in an electronic format that showcases learning or accomplishments. It can become a type of enhanced r\u00e9sum\u00e9. For example, instead of just saying you write clearly and know how to use software to produce brochures, take a brochure you have produced in class (or at your job) and include that in your ePortfolio. If you don\u2019t already have an ePortfolio, search the words \u201cfree ePortfolio\u201d to locate some websites that will allow you to publish one at no charge.<\/p>\n<h2>Social Media<\/h2>\n<p>If you don\u2019t have a social media presence, potential employers may wonder if your technology skills are lacking, even if you have consciously made the choice not to have one for privacy reasons.<\/p>\n<p>Consider using a professional networking site (such as LinkedIn or others) to establish and maintain professional contacts, and it can also be a way to either find work or further your career. Search for a \u201cLinkedIn tutorial\u201d, to learn how to enhance your online presence.<\/p>\n<p>If you use social media such as Facebook or Twitter, consider having two accounts: one personal, one professional. Reserve the personal account for family and friends, and keep the privacy setting high so that only family and friends can see the posts. With your professional accounts, lower privacy settings could allow a more public view of your posts (which could be beneficial in future job searches), so keep all your posts professional and work-related on this account.<\/p>\n<h2>Websites and Blogs<\/h2>\n<p>Would you prefer to use a website or blog to project your professional image rather than using social media? There are many free services available, and for a small fee you can register an Internet domain name and host your web site without any advertisements.<\/p>\n<h3>Media Attributions<\/h3>\n<ul>\n<li>\u00a0<a href=\"https:\/\/www.flickr.com\/photos\/32641069@N00\/4281052958\">&#8220;Social media as art&#8221;<\/a> by <a href=\"https:\/\/www.flickr.com\/photos\/32641069@N00\">SFview<\/a> is licensed under a\u00a0<a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/?ref=ccsearch&amp;atype=rich\">CC BY-NC-SA 2.0 licence.<\/a><\/li>\n<li>edge:\/\/settings\/privacy <a href=\"https:\/\/www.microsoft.com\/en-us\/legal\/intellectualproperty\/copyright\/permissions\">Used with permission from Microsoft<\/a><\/li>\n<\/ul>\n<ul>\n<li>\u00a0&#8220;<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Iceberg_of_Webs.svg\">The Surface Web, Deep Web &amp; Dark Web<\/a>&#8221; by <a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Ranjithsiji\">Ranjithsij.<\/a> Modified by<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Flori4nK\"> Flori4nK<\/a> for a more accurate representation is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/deed.en\"><span class=\"cc-license-identifier\">CC BY-SA 4.0 licence.<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.flickr.com\/photos\/7849372@N04\/3582297307\">&#8220;Social media dataflows&#8221;<\/a> by <a href=\"https:\/\/www.flickr.com\/photos\/7849372@N04\">Anne Helmond<\/a> is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/?ref=ccsearch&amp;atype=rich\">CC BY-NC-ND 2.0<\/a><\/li>\n<\/ul>\n","protected":false},"author":123,"menu_order":8,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-48","chapter","type-chapter","status-publish","hentry"],"part":18,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/users\/123"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/48\/revisions"}],"predecessor-version":[{"id":49,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/48\/revisions\/49"}],"part":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/parts\/18"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/48\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/media?parent=48"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapter-type?post=48"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/contributor?post=48"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/license?post=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}