Last week, we looked at the possibility of privacy on the internet, and the sad state of current affairs where seemingly every major Internet company wants to deny us that possibility.
No matter what internet-connected device you use, the principles of attaining privacy and the safety it enables are pretty much the same: closing and locking the doors. If you are a member of the “I don’t have anything to hide, so I don’t care,” crowd, read on; you may not be beyond hope. So, without further editorializing, let’s look at how some modicum of privacy and safety can be achieved, first, with Microsoft’s Windows 11 operating system.
kAmw@H J@FC 4@>AFE6C 92D 366? D6E FA 56E6C>:?6D 9@H J@F H:== 2446DD D@>6 @7 E96 D6EE:?8D :?G@=G65] {@@
kAmx7 J@F 2C6 F?7@CEF?2E6 6?@F89 E@ 92G6 366? EC:46 2?5 A2DDH@C5X 2D A2CE @7 D6EE:?8 FA (:?5@HD “ 7@C E96 7:CDE E:>6[ |:4C@D@7E 😀 DE@C:?8 J@FC 3C@HD:?8 9:DE@CJ[ =@42E:@? 52E2[ D62C49 9:DE@CJ 2?5 @E96C :E6>D 😕 EH@ 5:776C6?E A=246Di @?=:?6 😕 “E96 4=@F5” @? E96:C 4@>AFE6CD[ 2?5 😕 J@FC 4@>AFE6C[ 2D H6==] *@F H:== ?665 E@ E6?5 E@ 3@E9 2C62D]k^Am
kAmx7 J@F 92G6 2 |:4C@D@7E 244@F?E[ E92EUCDBF@jD ~z[ 3FE J@FC 4@>AFE6C D9@F=5 ?@E 36 E:65 E@ :E] %@ 2446DD J@FC U=5BF@j!C:G24J s2D93@2C5UC5BF@j 2?5 492?86 H92E |:4C@D@7E DE@C6D 23@FE J@F @?=:?6[ 8@ E@ k2 9C67lQ9EEAi^^244@F?E]>:4C@D@7E]4@>^AC:G24JQm244@F?E]>:4C@D@7E]4@>^AC:G24Jk^2m 2?5 D:8? :?] x H@F=5 G:D:E 6G6CJ D64E:@? 96C6[ 4=62C 6G6CJE9:?8 @FE 2?5 D6E 6G6CJE9:?8 E@ U=5BF@j~77]UC5BF@j q6 DFC6 E@ 2=D@ D6E 2== !6CD@?2=:K65 p5D D64E:@?D E@ U=5BF@j~77]UC5BF@jk^Am
kAm%FC? J@FC 2EE6?E:@? ?6IE E@ E96 4@>AFE6C :ED6=7] u:CDE[ >2A=6E6=J FA\E@\52E6] ‘:D:E E96 (:?5@HD `_ $6EE:?8D D64E:@? >6?E:@?65 23@G6 2?5 4=:46E6C65 4@??64E:@?D[” 2?5 “}@E:7J >6 E@ C6DE2CE]” $4C@== 5@H? 2?5 5:D23=6 “s6=:G6CJ ~AE:>:K2E:@?] x8?@C6 6G6CJE9:?8 6=D6 2?5 4=:4
kAmx7 E96 4@>AFE6C :D?’E 2=C625J 4964@C6 FA52E6D 2G2:=23=6] x8?@C6 >6DD286D E92E D2J J@F’C6 FA\E@\52E6j 4=:42
kAmp7E6C FA52E:?8[ 8@ E@ E96 $6EE:?8D D64E:@? 282:?[ 2?5 G:D:E p44@F?ED] *@F H2?E E@ 36 FD:?8 2 “{@42=” 244@F?E[ ?@E 2 |:4C@D@7E 244@F?E] x7 J@F ?665 E@[ D6=64E “$:8? x? ~AE:@?D” E@ E6== :E E@ DH:E49 E@ 2 =@42= 244@F?E 2?5 7@==@H E96 :?DECF4E:@?D] v:G6 E96 244@F?E 2 ?2>6 H:E9@FE 2?J DA246D 😕 :E] *@F 42? FD6 E96 D2>6 A2DDH@C5 @C !x} 2D 367@C6[ :7 J@F =:2J D9@H 2 D42CJ >6DD286 23@FE D:8?:?8 @FE @7 J@FC |:4C@D@7E 244@F?E[ H9:49 😀 6I24E=J H92E J@F H2?E E@ 5@i D:8? @FE]k^Am
kAm}6IE[ G:D:E $6EE:?8D 282:?[ 2?5 8@ E@ “!C:G24J 2?5 $64FC:EJ]” %9:D 😀 H96C6 E9:?8D DE2CE E@ 86E :?E6C6DE:?8] ~? E96 =67E D:56 @7 E96 D4C66?[ J@F H:== D66 ?F>6C@FD D64E:@?D E92E 2==@H J@F E@ 27764E G2C:@FD AC:G24J\C6=2E65 :E6>D]k^Am
kAmv6?6C2==J DA626C2 2?5 |:4C@A9@?6[ 2?5 E92E’D @?=J :7 J@F 2C6 5@:?8 +@@>[ $:=2C @?=:?6 >66E:?8D] !]$]i :7 x’G6 H@CAFE6C[ x’G6 2=C625J 5@?6 2== @7 E96D6 E9:?8D]k^Am
kAmr@?E:?F65 ?6IE H66AFE6CD D9@F=5 8@ E@86E96C]k^Am