6.1 KiB
InternetPrivacySafety
Important Notes
- As of now, this guide is very Windows-oriented. This should not be a huge issue, as most referenced tools have Linux and OS X varietes.
- I have no affliiation to any of the services I recommend, this isn't an advertisment.
- Some knowledge of internet safety and privacy is important for pirates. Though I will mention important aspects and tools in the first section of this guide, do more research on it yourself. A few great starting points are:
As I'm sure you're aware, digital piracy of copyrighted material is illegal, to varying degrees depending on where you live. I highly recommend reading up on copyright enforcement in your country. But generally speaking, so long as you only intend to download and not upload content, and take precautionary measures, you will be golden. Copyright enforcement is sparce for end-users such as you and I, with the exception of torrenting. But you will be given proper warning about torrenting in my Movies and TV Piracy Guide.
Ad-blocking
I make do with the ad-blocker built into the Brave browser, but I cannot recommend enough to you uBlock Origin, a browser extension that can block ads. Installation instructions are within the link. It is very feature rich, and so if you are only looking to block ads, do not bother with the many configurations. After installing, it should be enabled by default.
Sandboxes and Virtual Machines
Just downloaded pirated software or a game, and don't entirely trust the source you got it from? While I cannot recommend downloading from sources you don't entirely trust, if you insist on it, sandbox software and virtual machines can make it safer.
Sandboxes
A sandbox creates an isolated environment on your computer. Running programs inside of one prevents the program from effecting other parts of your system. I recommend using Sandboxie. After installation, using it is as simple as finding the program you want to run sandboxed, right clicking it, and hitting "Run Sandboxed".
Virutal Machines
A virtual machine can run a second, virtual computer within your real computer. Though a different concept, you can use a virtual machine for the same purposes as a sandbox. If you accidentally download and run a program with viruses, only the virtual machine will be infected, not your physical system. It's a bit more technical, and requires more processing power, but could be useful as a dedicated space for pirated software. I recommend VirtualBox. Here are a few guides to get you started:
- Official Documentation
- The Beginner's Guide to Creating Virtual Machines with VirtualBox
- A Complete Guide to Using VirtualBox
Virtual Private Networks (VPN)
From Wikipedia:
But that's a little technical for some people. What you need to know, is that a VPN can protect your location and identity from sites and tools you use, by changing your IP Address. While it sounds like a godsend, it's crucial to remember that there is no such thing as complete anonymity on the internet. Because your VPN provider can still see your data, a VPN is only as secure as it's provider is trustworthy. Despite it's insecurities, VPNs can still be helpful and even necessary in specific situations. Namely while torrenting, but more on that in my Movies and TV Piracy Guide. Please review this information about VPNs before purchasing one or discounting them altogether.
If you decide a VPN would be useful for you, please purchase one. Free VPN providers are significantly more likely to dishonor no-log policies and sell your data. Refer to That One Privacy Guy's VPN comparison chart when choosing one. Once you've purchased a VPN and installed the application for it, use is usually as simple as clicking 1 button to enable it. Personally, I recommend ProtonVPN.
The Onion Project (TOR)
Not to be confused with torrenting, Tor is a computer network that serves to keep it's users anonymous. When you browse the internet with Tor, your internet traffic is sent through 3 of Tor's computers, called Tor relays, before it reaches it's intended destination. This design ensures that no 2 of the relays know about the other, so that traffic cannot be traced back to you. Rest assured, this is a secure by design system. Issues typically only occur when it's users are careless. When used properly, Tor is an extremely rare case where near complete anonymity can be achieved. If you want to use Tor, you MUST be conscious of how to use it properly. Learn more about that here.
Tor is primarily used with the Tor browser. Please understand that when using the Tor browser, only your browser data is being encrypted. Other data sent through other apps on your device will not be encrypted with Tor. If Tor is blocked in your area, or if you don't want your internet provider to know that you're using Tor, read up on Tor Bridges before you install Tor.
To learn more about Tor and how it works: Myth-busting Tor.