You are previewing The Smart Girl's Guide to Privacy.
O'Reilly logo
The Smart Girl's Guide to Privacy

Book Description

The Smart Girl's Guide to Privacy teaches you how to protect yourself online.

Table of Contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Brief Contents
  5. Contents in Detail
  6. 1. Get Smart
    1. Take the Online Privacy Test
    2. Eight Privacy Tips to Use Right Now
    3. Targets and Nontargets
    4. Losing Your Privacy
      1. Ways You Can Lose Your Privacy
    5. Protect Yourself Right Now
      1. Tape Over Your Webcam
      2. Lock Your Phone, Computer, and Tablet
      3. Do a Privacy Check-Up
      4. Don’t Email Your ID
      5. Use a Password Manager and Install an Antitheft App
    6. Be the Firewall
  7. 2. But It’s Just My Phone Number
    1. You Control What You Share
    2. Private Spaces and Activities
    3. Lock Down Your Personally Identifying Information
      1. Red Alert List
      2. Yellow Alert List
      3. Green List
      4. Information-Sharing Guidelines
    4. He Said, She Said
    5. Worst-Case Scenario
  8. 3. You Got Hacked
    1. One Compromised Account to Rule Them All
    2. What Honan Did Wrong
    3. Hack-Proof Your Life
      1. Make Your Address Hard to Find
      2. Don’t Link Major Accounts
      3. Don’t Use One Service for Everything
      4. Back Up Your Everything: Your Contacts, Your Files, Your Photos
      5. Encrypt Your Computer’s Hard Drive
    4. What to Do When You’ve Been Attacked
      1. Recover Your Accounts and Data
      2. When a Service Gets Hacked
    5. If Your Financial Information May Have Been Exposed in a Data Breach
    6. How to Change Your Email Address
      1. Choose a New Home
      2. Set Up Forwarding
      3. Move In
      4. Update Your Accounts
      5. Tell Everyone
  9. 4. Female Trouble
    1. Recovering from Harassment
      1. When Will It Stop?
      2. Staying Strong
    2. Fighting Back
      1. Navigating the Legal System
      2. Getting a Restraining Order
    3. Getting Your Private Photos Offline
      1. Doing It Yourself
      2. If You’re a Minor
      3. Outsourcing the Work
    4. Preventative Maintenance
  10. 5. Identity Theft
    1. Signs of Identity Theft
    2. Run, Don’t Walk
      1. Place a Fraud Alert
      2. Order Free Credit Reports
      3. File an Identity Theft Report
      4. Contact the IRS
      5. Alert Businesses
    3. Don’t Let It Happen to You
      1. Prevent Identity Theft
      2. Avoid Phishing Attacks
      3. If Your Phone or Computer Is Stolen
      4. Install an Antitheft Tracking App
      5. Permanently Delete Information from Your Device
  11. 6. How to Share
    1. Social Media Checklist
      1. Sharing Only What You Want
      2. Friending
    2. But I Can’t Give Up Facebook (or Instagram, or Twitter, or FourSquare, or . . .)
    3. Quit Humping My Leg, Facebook
      1. Location Information in Photos
      2. Be Smart About Checking In
    4. Controlling What You Share with Google and Google+
      1. Managing Your Google+ Profile
      2. Locking Down the Privacy Settings on Your New Phone
    5. Safely Disposing of Old Devices
  12. 7. People-Search Websites
    1. But I’m Not That Interesting
    2. The Dangers Lurking in People-Finder Sites
    3. How People-Finder Sites Get Your Information
    4. It Sounds Like There’s Nothing I Can Do, So Why Do Anything?
  13. 8. Dating and Sexytime
    1. Make a Smart Dating Profile
    2. Screen Out Scammers and Stalkers
    3. Make the Internet Wear a Condom
    4. Private Time Online: Browsing Privately and Securing Your Sensitive Information
      1. Search Engine Creep
      2. Cookies
      3. Leave No Trace
      4. Keep Your Sensitive Files Private
      5. Erase Files Completely
      6. Make Your Browser Private
      7. Do Not Track
      8. Private Browsing
    5. How to Tell If Someone Was on Your Computer
  14. 9. Ninja Tricks
    1. Ninja Your Credit Cards
    2. Ninja Move: Freeze Your Credit
    3. Stealth Out Your Mailing Address
    4. Stealth Out Your Phone Number
    5. Ninja Tricks: Encrypt Your Private Communication
      1. Protecting Your Email
      2. Keeping Your Chats Private
      3. Encrypting Your Internet Activity
    6. Ninja Choke Hold: Strong, Easy Privacy Apps
    7. Ninja Your IP Address
      1. Use Tor
      2. Use a VPN
    8. Get Hard-core: Make a Data Silo
  15. 10. I Hate Passwords
    1. How People Steal Passwords
    2. But I Have to Share My Password
    3. Password Fu
  16. Resources
    1. Chapter 1: Get Smart
      1. Antitheft Apps (see also Chapter 5)
      2. Antitracking Plug-ins and Extensions (see also Chapter 8)
      3. Password Managers (see also Chapter 10)
      4. Searching Your Name (see also Chapter 7)
    2. Chapter 2: But It’s Just My Phone Number
      1. Red Alert List
      2. Yellow Alert List
      3. Green List
    3. Chapter 3: You Got Hacked
      1. Account Recovery
      2. Backup Services and Products
      3. Create an Account with a New Email Provider
      4. Encryption Products
      5. Encryption Programs
      6. Place a Fraud Alert
    4. Chapter 4: Female Trouble
      1. Counseling, Therapy, and Support
      2. DMCA Takedown Request Services
      3. Outsourcing
      4. Reputation Services and Image Removal
      5. Revenge Porn Support Organizations
    5. Chapter 5: Identity Theft
      1. Antitheft Tracking Apps
      2. FTC Identity Theft Report
      3. Place a Fraud Alert and Get Copies of Your Credit Reports
      4. Place a Security Freeze on Your Credit
    6. Chapter 6: How to Share
      1. Social Media Privacy Settings
      2. Photo Sharing Site Privacy Settings
    7. Chapter 7: People-Search Websites
      1. Find Tracking Companies
      2. People-Finder Sites
      3. Opt Out of Data Mining
    8. Chapter 8: Dating and Sexytime
      1. Browser Plug-ins and Extensions
      2. Browser Security Settings
    9. Chapter 9: Ninja Tricks
      1. Credit Freezes and Fraud Alerts
      2. Prepaid Credit Cards/Gift Cards
      3. OpenPGP Encryption
      4. OTR
      5. Recommended Privacy Apps
      6. Tor (The Onion Router)
      7. VoIP
    10. Chapter 10: I Hate Passwords
      1. Password Generators
      2. Password Managers
  17. Index
  18. Footnotes
    1. 1. Get Smart
    2. 3. You Got Hacked
    3. 5. Identity Theft
    4. 9. Ninja Tricks
    5. 10. I Hate Passwords
  19. About the Author