Operating Systems
The three major operating systems used currently are Windows, Linux, and Mac. Each operating system has its own unique security issues.
Windows and Mac require users to create an online accounts to access the operating system because of licensing and both collect massive amounts of data about usage. This data includes but is not limited to Search History, Programs Downloaded or Opened, IP Addresses, Typed Text, Approximate Location and many more private details. Those two operating systems also use passive and active listening in order to collect what you are talking about to “target” you with better advertisements i.e. selling your information to the highest bidder.
Linux is the only major operating system that is open source and easy to audit for security. There are many distributions of Linux but Ubuntu is the most user friendly. It uses a familiar interface to access software, has the highest compatibility with current computers, and a large user and support network that makes a user a smaller target in the internet ecosystem.
Privacy Tools
Virtual Private Networks (VPNs) provide a secure tunnel, and data encryption, between your device and the VPN server. The VPN provides security of your data and makes it difficult for websites to find your true location, gathering data on you, and identifying your location. This tool is not going to provide you anonymity but it will increase your security and is part of a basic set of tools that should be used when protecting your privacy.
Data breaches are very common and with those breaches come your usernames and passwords. Most people use the same set of one to four passwords which creates a large vulnerability in the security of your data. Password managers are one of many ways to increase your personal security and password protection. There are desktop and mobile password manager applications as well as physical password managers and finally, two-factor authentication applications that require a password and code.
Web browsers come in many shapes and sizes, the most common being Edge, Chrome, Safari and Firefox. Out of those four, Firefox is the most secure without modifications. The Chromium-based Brave is a secure alternative to Google Chrome and then to browse the dark web, Tor is the best option. Within Firefox, there are many add-ons to protect your internet experience further. Some add-ons and extensions block ads and tracking scripts, containerize website cookies, VPNs, etc. Choosing the right browser makes a difference when it comes to your operational security.
Virtual Machines (VM) provide even further operational security because it mimics a computer within a computer. The advantage of using a VM is that you can effectively have many computers on one computer. The VM emulates a specific operating system, which in turn means that a computer can have Linux, Mac, and Windows operating systems working at the same time but it can also provide an Android emulator that can be used like a regular mobile phone with the appropriate voice over IP applications. Additionally, VMs can be installed on the computer or run from a live USB flash drive that makes any computer usable while still maintaining security. VMs isolate sensitive computer usage from other parts of the computers, strengthening your privacy.