Privacy comes first
Privacy is the beginning of free-speech. It's not about secrecy, but it is the ability to selectively display the best version of ourselves. Within speech and communication in general, context plays a major role. The only way to get positive results from the efforts of communicating is by having the liberty to choose what to transmit and when to do it. Without privacy, communication is dead, there's no suspense and nothing to say.
All activity communicates something to an audience, even if no words are used. That is why curtains are a great symbol of privacy, closing curtains and opening curtains differentiate the occasion. This is why the American constitution defends privacy in it's fourth amendment, so that it can defend free speech in it's first amendment.
Subscribe to Slingshot VPN, no personal data involved.
As the world became shorter with the telegraph and telecommunications that followed, as our livelihoods became more and more dependent on the internet, the subject and importance of privacy has ever increased. There can be no security in the cyber-world without a minimum level of privacy. People must trust a provider, and many times the Internet Service Provider (ISP) or men-in-the-middle can't be trusted. Please choose Slingshot VPN as your friend in this battle.
What goes on online
To live soundly and morally, integrity and security is required, but this is a challenge in today's world as contemporary society grow asymmetric and disproportional. We face gigantic powerful organisations that do not carry our best interests, and we face day-to-day threats from small actors and criminals. The need to learn about privacy in our current world is major. Our practical life depends on digital means, easily exploitable. When attacked, our life suffers deep harm with can include financial and civil losses.
It is important to defend our privacy when online from both small and close threats and large threat actors alike. Slingshot VPN provides a service that helps in all these cases. We invite you to educate yourself, your loved ones and your community on privacy, what results it brings and how it can be lost when under attack.
No personal data involved.
When a hacker or a predator threatens a victim online, the likelihood of success is certain and unfortunately it is very difficult to protect oneself. Instead, it is important to lessen your appeal as potential target to criminals, before the threat arises. Targeted attacks can use a myriad of tools and techniques, many of which are easily available even to small threat actors. Besides targeted attacks, we are constantly under attack in a non-directed way. Predators online will constantly spread attack vectors to harvest profits from the weaker and unprotected. The devices and networks we use should be protected.
Through proximity, a hacker can find its way inside our digital systems. Public Wi-fi networks and public computer networks, when used without a VPN are subject to package sniffing and traffic interception. It is very easy to set up man in the middle attacks for users of public networks. If no trustworthy VPN is available, we strongly recommend that you either avoid public networks or do not use any of your passwords and accounts. If your device is already logged on to online services (such as a smartphone that constantly checks emails, receives push notifications or is connected to social media), please consider avoiding public networks or using a trusted VPN such as Slingshot VPN.
Threat actors also constantly spread phishing messages to gain personal data, login credentials and full access to devices. Protection from phishing requires constant vigilance when receiving messages. Scams will also use messages as vectors and the interaction with the criminals can continue through other means of communication.
The same damage done by phishing can be done by adware, unwanted ads displayed whilst accessing web content. It is more difficult to protect oneself from adware, but navigating with a trusted VPN can filter out many of these attacks, and this is a good reason to use a Slingshot VPN even when navigating through your own ISP (Internet Service Provider).
Malware (a.k.a. computer viruses, trojans and worms) are malicious software that seek profit from getting into your devices. Malware uses a series of techniques to hide itself in the system. Once in the system, malware can leak data and gain further access and privileges into the system, install more software, and gain access to other devices. Malware sends out beacons and make use of C2 (Command-and-Control instructions). This technique, as well as the previously mentioned are extremely common and easy to use by naive and experienced actors.
Ransomware are common malicious software that cryptograph data in a system with its own keys, so that the legitimate owner is unable to access it. Criminals will often ask for payment as ransom for the keys to the data.
This plethora of attacks make all individuals businesses and supply chains susceptible to cyber attack. The many steps that manufacturers of hardware and software take to produce the devices used by us are threatened by malicious actors seeking to jeopardise the security of what is being used as the devices and software is being produced.
In addition to the techniques mentioned above, large threat actors have other sophisticated means of damaging us. Large threat actors include state or state-sponsored groups who perform attack campaigns called Advanced Persistent Threats (APTs) remaining undetected by the whole security community for long periods of time on a large scale.
State departments and very large companies also participate in mass surveillance, cancellations and censorship. Trusted VPN Services, such as Slingshot VPN, can be useful to mitigate the damage done by these large predators, as we offer exits to internet traffic in several different countries and hide the original IP address that is given by the ISP. Following this system, large corporations collect less user metadata and have less leverage on their advertisement systems and AI training. Governments doing open surveillance, on international collaboration (in alliances such as the Five Eyes) or covertly also receive less data on their surveillance mechanisms.
We hope this panoramic vision raised initial awareness and generated curiosity in privacy education. We face threats from small actors and very large actors, and our devices and network are not protected enough. It is essential to improve our cyber defences to enable a sound and moral life in today's reality.
Questions and feedback on this article, please:
Further reading:
What is a VPN?
Values matter when choosing service providers
Our Futuristic Vision Document
About Slingshot Security
External resources:
Electronic Frontier Foundation (EFF)
The EFF is a non-profit group founded in San Francisco in 1990. It is an activist collective fighting against governments and corporations to preserve privacy and individual freedom on the internet.
Brave
"Brave is on a mission to protect privacy online, by providing a suite of internet privacy tools—including our browser and search engine—that shield you from the ads, trackers, and other creepy stuff trying to follow you across the web."
Privacy Guides dot org
Privacy Guides is a socially motivated website that provides information for protecting people's data security and privacy. Their mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor people's online activity.
Privacy Tools dot io
A website source for privacy tools. Privacy Tools dot io holds information on software, services and privacy guides to fight surveillance with encryption for improved internet privacy.
WireGuard
WireGuard is an open-source VPN protocol developed by Jason A. Donenfeld. WireGuard development is supported by donations from companies who deploy it to their networks. It's source code is open and free software, small in volume and can be easily read and audited by security experts. SplingshotVPN provides WireGuard service.
Questions and feedback on this article, please: