Privacy Protection 101: The Online Invisibility Game

In the opening move, you’ll use “stealth” tools to disable Big Bro’s web tracking capability.

Creating an on-line refuge is inexpensive and uncomplicated. The following measures will start derailing Big Bro’s data sweeper. A few simple steps will give you control over Big Brother’s access to your personal information and communications.

Finding Privacy in the Age of Mass Surveillance

Big Brother will be stymied if you refuse to cooperate with him. (Equally important: You’ll lower your exposure to cybercriminals, identity thieves and hackers when you end your cooperation with Big Bro.)

First, you’ll want to avoid Five Eyes’ primary corporate partners. In particular, don’t cooperate with Microsoft or Google (click here to understand why this is important).

Essential: Avoid Chrome and Microsoft Internet Explorer

This is absolutely necessary: Do not use Chrome or Internet Explorer. These browsers are basically spyware and function as primary uptake points for Big Bro’s data sweeper. (See The BillyGate Affair to understand why you should avoid Chrome and Internet Explorer.)

Open your control panel. Use “add/remove program” to get rid of Chrome and Internet Explorer.

Then start using Mozilla’s Firefox browser (more on this later). The non-profit Mozilla Foundation is resolutely dedicated to Internet privacy and computer security. (But don’t assume Firefox is actually secure when it’s online. Nothing really is. Download it at

After you have Firefox up and running, go to “options.” Under “privacy,” select “never remember history.” After you restart the browser, this setting will make it more difficult for eavesdroppers to identify you. (Do this even if you use the “Private Window” option.)

The Second Essential Step: Use the “Airgap” Method

The basic “airgap” concept is simple: Don’t expose your work or personal data to the Internet.

For the best protection, keep all personal data and work on a thumb drive and maintain a backup. Always unplug your personal data thumb drive before you connect to the Internet.

Then take time to remove all personal data from your Internet-access computer (more on this later). If you stay with Windows for Internet access, you might want to reinstall your operating system. That will give you a fresh start. You can be assured that you’ve left no personal tracks that can be accessed by the bad guys (i.e., Big Bro, his collaborators and other hackers).

(Note: Some of the “stealth” measures we share are adapted from The BillyGate Affair, an investigative report. As BillyGate explains, stealth tools allowed deep penetration into Big Bro’s tracking apparatus. It was a sting/counter-sting operation that led to the discovery of extensive criminal capabilities at Microsoft and Google. The crimes were undoubtedly committed with help from the NSA. For details, see The BillyGate Affair.)

3 Replies to “Privacy Protection 101: The Online Invisibility Game”

  1. Hello my lovᥱd ߋne! I wish too say that this post is awesome, great ԝritten and
    come with approximately all ѕignificant infos. I would like to look mօre рosts like this .

  2. Howdy very nice website!! Guy .. Excellent ..
    Superb .. I will bookmark your web site and take the
    feeds also? I’m glad to seek out numerous helpful info here
    within the publish, we’d like develop more strategies on this regard, thank
    you for sharing. . . . . .

Leave a Reply

Your email address will not be published. Required fields are marked *