If reactions were to go by, the news that the State demanded private information about Kenyans from social networking service company Facebook is unwelcome.
In a recently released transparency report, Facebook said it had seen a spike on such requests in the first half of 2019.
The Uhuru Kenyatta-led administration asked Facebook five times to divulge information related to user accounts. Worryingly, no proper legal channels were followed in making four of the five requests.
In the one demand the requisite procedure was followed, Facebook complied. It, however, did not reveal which account was affected, only noting it was a legal process request.
Social media platforms routinely provide data to law enforcement on specific persons.
“Facebook responds to government requests for data in accordance with applicable law and our terms of service. Each and every request we receive is carefully reviewed for legal sufficiency and we may reject or require greater specificity on requests that appear overly broad or vague,” the social networking giant said.
The demands are not limited to Kenya. The governments of all the countries were Facebook content is not restricted asked to snoop on users’ data.
The United States made 50,714 user data requests of 82,461 users/accounts in the half-year period. India was second with 22,684 requests for user data of 33,324 users/accounts.
Privacy now an illusion
This new development is once again shinning the spotlight on the internet and social media — the global record of our streams of consciousness — is anything ever private?
Governments are snooping. Vulnerability to identity theft and fraud is at an all-time high. Does this mean that the age of personal privacy is over?
While it would be a mistake to think that the data we store online can ever be 100 per cent safe, it would also be an error to assume that we can’t make them more secure.
Here some simple precautions you can take to preserve your privacy online.
Disable cloud storage
The risk of say losing all our photographs has forced us to heavily rely on cloud computing. It is a booming business and increasingly smartphones are automatically uploading data to remote servers.
If you do not want sensitive data to land on malicious hands, turn off such automatic uploads and only back up those you want. Encrypt the back-up data with a strong password. Hackers will find it hard to get in.
You have probably asked yourself, what makes a good password. Experts say the key is in length and not complexity. Essentially, the an easy-to-remember password such as Girlsloveorinde is better than Qp1!9. Hackers will take way longer to get that passwords as there are more total possible combinations of 15 characters than six.
A survey by Ars Technica found that 22 per cent of ‘strong’ eight-character passwords that contained numbers and symbols could be cracked after 10 billion guesses – compared with only 12 per cent of 16 character passwords.
Magic of VPN
Effective virtual private networks (VPN) are not free. They are, however, a gem in scrambling your online data activity when you are on a public network. Eavesdroppers will find it hard to keep track of your passwords, locations, browsing history among others.
Enable two factor authentication
Also known as multi-factor authentication (MFA), it is an additional security layer that doesn’t guarantee access from a standard password.
When you enter the correct password on a website, it won’t immediately offer you access to your account – instead it might trigger an automated call or text message to your mobile phone that requires you to punch in a PIN to complete the sign-in process.
Confirming the identity twice should be more secure than once.
Use private search engines
Most browsers have their own search engines. The searches you key are often tracked under the guise of building a database to give you quicker and better search experiences.
Unknown to you, these searches then can be traced to your personal identity by linking them to your computer, account, or IP address.
Private search engines do not personalise search results.
Are you reading this article on a computer, check the url (uniform resource locator) on the browser, does it start with “http” or “https”? If it is http, it means that the connection between you and the website is open and anyone can see what you are viewing.
There is a lock icon on the address bar, switch it on and forever keep it so. If your favourite browser doesn’t have that feature, download a browser extension that helps you encrypt your web browsing.
Watch Out for Phishing
Phishing employs psychological analysis and social engineering to trick users into clicking a malicious link. This malicious link can contain anything from viruses to cryptojackers.
Beware of messages from people you don’t know. Most importantly, remember that if it’s too good to be true, it most likely is.
You must have ignored a system update on your phone or computer at least once –maybe you are out of reach of free Wi-Fi and isn’t ready to spend use all your data on an update ‘you can live without’.
Updates often fix many vulnerabilities that could jeopardize your online privacy. You can alternatives turn on the auto-update feature on your device and worry less about constantly checking if developers have sent a new version.
Suffer the minor inconvenience updates cause early rather than risk getting caught in the whirlwind of problems hackers can cause if you should get targeted.
If you don’t want it seen, do not post it
The golden rule about ensuring your online privacy is watching what you share on social media. Avoid giving your phone if you don’t want it known. Avoid telling your location if you do not want anyone to know.
It can only be a secret if it stays within you.
Do not miss out on the latest news. Join the Standard Digital Telegram channel HERE.
Internet securityHackingCybersecuritySocial media
Credit: Source link