Quote:
Originally Posted by npita
...The best thing to do (for both providers and clients) is...(3) Don't give out personal identifying information...
|
But that is exactly one piece of information in the screening process. was my point in my little vendetta regarding this isse.
but the OP's intention is more a discussion on computer security i assume.
generally, i recommend NOT to lurk or exchange information at your place of work - even using a thumb drive and or portable apps, as they do leave some traces.
e.g. booting your computer with a thumb drive will usually give it another name within the network or it will drop out of the network. a good example is a typical windows machine in a classical windows domain.
then you boot the machine with a linux thumb drive. as a result, your machine will be logically outside the domain network. this is visible because the mac-adress still is present in a topology monitor. mac-adress (network adapter address) -> windows client id from inventory -> john doe.
the thumbdrive will be visible in the windows registry in the hklm hive under the p&p enumerator data.
most applications even of portable drives use the temp directory either %userprofile%...temp or %system%...temp.
often the data remains in that directory and even after deletion some metadata can be recovered (typically file names from ntfs directory information). cookies are allocated to host names in the browser cache. this leaves the clues again.
my recommendation is to use a browser capable phone, smartphone or ultra portable or machines like ipad that run off the public g3 or g4 network.
data storage online:
use a service that provides basic virtual disk services (e.g. skydrive from microsoft). keep 'critical information' either only in your brain or store it encrypted on said virtual online drive. do not share the encryption key.
always set up e-mail service for your hobby in another country than your residence. set up a second e-mail account on a different service and have that one fetch all e-mail from the first one periodically, including removal from first account. only read e-mail from the second account. and delete it.
during setup of the accounts, go through a proxy server.
DO NOT use calendar/appointment/contact features of social networks. the TOS change very often and during such change, the privacy settings are often reset to public or absolute private is removed as an option.
social neworks have a tendency to 'lose' data....accidentally intentionally.