Anonymity on smartphones – is that possible?

Hardly anything is as valuable as the personal data of a person or a company. You can see that from the sheer amount of money companies and states put into collecting data, the struggle to find BIG DATA analysts, and of course the seriousness with which the EU and many other states approach data protection. The more data you have collected, the more money you can earn with this data. No wonder that more and more people are starting to deal with questions regarding the privacy of their personal information.

  • Who collected all the data about me?
  • Do I have control over what happens to my data?
  • How can I protect myself from data rage in the future?
  • How much of myself do I want to disclose to the Internet, businesses and the state?

All questions that are worth asking. Without a certain commitment and knowledge of data protection, you can easily reveal a lot of yourself carelessly.

Brief instructions for protecting your data on your smartphone:

  1. Use a VPN or TOR when you connect to the internet
  2. Check what permissions apps have
  3. Give apps and services as little information as possible about you.

Never heard of VPNs and TOR? There is more information here:

  • This can be a VPN (virtual private network)
  • TOR can do that

    Can I use my smartphone 100% anonymously?

    There is actually a way that makes the use of smartphones 100% anonymous. You only have to do without SIM card, WiFi and the Internet. This means that the smartphone is almost 100% useless, but you are still traveling anonymously.

    All those who require at least a certain usability have to cut back on the anonymity of their smartphone use. Some company will always collect certain information about you and your usage habits. It starts with your SIM card provider or the Google Playstore.

    If you have a cell phone contract to use telephony and the Internet, your provider has at least the information you gave him when the contract was signed. If you do not use a VPN or other encryption methods for your internet use, then there is also information about which websites and apps you use. On the one hand, due to legal constraints on data storage (keyword " data retention ") and on the other hand, because it is worth knowing as much as possible about you and your habits. With tailor-made advertising, big data can finally be used to earn a lot of money.

    Google also collects your usage data diligently when you use services such as the Playstore. For example, did you know that if you do not deactivate location recording, Google will record your location and prepare it for you? In this way, you can see for each day of the month or year where you have been and for how long. Although this data can be deleted, there have been occasional data losses in large companies in recent years.

    What options are there for protecting your data on your smartphone?

    1. An easy way to protect data from the eyes of network operators and fraudsters is to use a VPN that encrypts your data and thus makes it invisible to providers and third parties.
    2. In addition, you can also turn off the data octopus Google by using alternative app stores that do not require registration. However, it should be said here that you should take special care to use a trustworthy app store and only download trusted apps.
    3. Many apps require permissions during installation, which are only used to collect data about you. Why, for example, does an app for funny pictures from the Internet need access to the location of your device, your contacts and call history? If possible, you should only give apps the necessary permissions. If you have any doubts, because too many permissions are required, you should better refrain from using them.

    So far for the most important ways to protect yourself from the prying eyes of third parties. What do you think, is the protection of your own data important or do the advantages of carefree use of the Internet outweigh?

    The anonymity contribution on smartphones – is that possible? first appeared on Xiaomist .

    https://ift.tt/3eUmb6w