Social Media Means
Photo by Brett Jordan Pexels Logo Photo: Brett Jordan

Can someone see my Google searches?

Yes, they can. It is best to use security tools: VPNs, HTTPS proxies, and the Tor browser to keep your searches private from them.

Can you get blacklisted for returning too many items?
Can you get blacklisted for returning too many items?

Eleven percent of all purchases are returned; some online stores see 30 percent of their sales returned. It's created a massive secondary market,...

Read More »
Is it rude to ghost an interview?
Is it rude to ghost an interview?

Ghosting after the interview is a common practice among employers who don't want to call back their potential employees. It's not only rude and...

Read More »

Your data has become incredibly precious, surpassing even the value of oil . That’s why it is essential to review browsing habits – especially since more than just ISPs are going after your data. With that in mind, let’s find out how to keep your online privacy. Internet service providers (ISPs) can see more of what you do online than almost anyone. They can track your browsing history easily, and, in some cases, they can share that data with third parties.

Who can see your browsing history, and how much?

Many would love to get their hands on your data. Here are a few that you should keep in mind:

Internet service providers

ISPs can see your whole internet activity as your devices send DNS (Domain Name System) requests to their servers. Simply said, these requests are like the phonebook of the internet, using URLs (links) instead of numbers.

Here is some information your provider can see:

Your current location;

The devices you use;

The content you watch;

Websites you visit and how long you stay there;

What you download ;

What exactly you do on sites that use the outdated HTTP (Hypertext Transfer Protocol). HTTPS (Hypertext Transfer Protocol Secure) is much more reliable.

ISPs collect information about you for a variety of reasons like:

Complying with data retention laws – They track and provide data to the government for investigations, most often copyright violations. Imposing censorship – In restrictive countries like China , governments require ISPs to block access to sites that criticize the regime or go against state religion. Bandwidth throttling – It means decreasing the connection speed when accessing specific web pages or services. Selling data to marketing companies – Your web activity can be used to predict your online behavior and to personalize ads.

Can you request ISPs to provide the data collected from you?

Yes, but that would fail. ISPs deny customer data requests to retrieve their internet history as their number would be astronomical. That means increased costs and labor shortage for these providers. So, it’s easier to refuse, and they don’t want to share the details in the first place as the content might be shocking. Also, ISP tracking varies by provider and data retention laws. Some countries require providers to keep logs for 6 months, others up to a year. That’s why it’s best to check your ISP’s terms of service and privacy policy to find out. Yet, this can still be challenging, as legal language is usually pretty confusing. However, note that selling data to third parties is illegal (with exceptions like the US).

Government institutions

Lately, distrust in governments has risen sky-high, and not without reason. They might have more data about you than you think.

So, here’s some of the information relevant to the government:

Do you need a degree to be a social media manager?
Do you need a degree to be a social media manager?

An in-demand role, Social Media Manager positions typically require a bachelor's degree in marketing, public relations or similar. According to...

Read More »
What qualifications do you need to be a social media specialist?
What qualifications do you need to be a social media specialist?

The top 11 must-have skills for a social media specialist An awareness of trends. ... Great time management and planning. ... A love of community,...

Read More »

Places you visit often – Your workplace, home address, etc. are used to find any changes in your schedule if you are suspected of illegal activity. Your lifestyle – Hobbies like cycling and jogging are just peachy but interest in subjects like chemistry can be viewed as ‘terroristic’ tendencies. People close to you – Friends and family can be checked for criminal records and how they could influence your behavior. Your communication tools and online calls – Whatsapp, Messenger, you name it. The content you send, and differences from the usual can be used against you. Your search queries – Searching specific topics ( How to make a bomb? How to make a nuclear missile? ) can make you a suspect. Yes, even if searched as a joke as people do that for fun or clout.

How is your information used by the government?

Here are a few ways authorities use your data:

Fighting crime – Governments use the data to track the movements, online banking, and build suspected criminals’ profiles. Repressing and influencing opinions – Dissidents can be persecuted or even imprisoned for speaking out against the authorities in more extreme cases. Blocking specific pages – Any sites that go against ideas of the authorities or public opinion or state religion. Porn, gambling, and social media sites are the most common examples. Even though most governments claim their monitoring is for just causes, we have barely scratched the surface. We will never really know the true extent of their tracking. That’s why it’s essential to remain vigilant of what you do online and protect yourself.

Hackers

The word ‘hacker’ frightens many like a boogeyman under the bed. But are hackers as dangerous as people think?

Well, the short answer is yes. Hackers can gain access to your browser history in various ways: Hacking into company databases – They can get login details into your accounts like Google, which stores your Google Chrome browsing history. Installing malware – Malicious files created by cybercriminals float around the internet, and if they find their way into your devices, there is plenty of data for the taking. Breaking into your network – Hackers can easily access your devices when connected to the same network. This especially applies to public Wi-Fi. Exploiting security loopholes – Outdated operating systems, weak passwords, and unencrypted devices are easy to crack with the right software.

Here are a few examples of how hackers can exploit your data:

Blackmail – Demanding money for not exposing controversial details.

Payment card fraud – Using your cards or opening new ones under your name to spend your funds. Impersonation – Creating a personality profile for scamming people close to you via phishing or in other ways after analyzing your browsing history. Black market sales – Selling your data to the highest bidder on the dark web.

What is the qualification for Google job?
What is the qualification for Google job?

- Bachelor's degree in Computer Science, a related technical field or equivalent practical experience. - 2 years of experience in web development...

Read More »
What do I write in skills for resume?
What do I write in skills for resume?

What are the best job skills on a resume? Computer proficiency. Leadership experience. Communication skills. Organizational know-how. People...

Read More »

The critical thing to remember is that hackers are not boogeymen but a real threat.

Search engines

A search engine is a place where everyone’s online journey begins, and it’s no wonder that collecting data about you is easy for it. The search terms you enter, and every link you click connects you to something. For example, Google is a tech giant that owns databases just as huge. All Google services are tied to your Google account and are paid for with money from targeted advertising. That means Google is what it is today because it shares your data with advertisers. This leads us to a creepy yet logical conclusion: nobody knows you better than Google, not even your mom.

Websites and apps

Have you ever seen a pop-up asking to allow cookies? Probably more than once or twice. They are helpful, sure. The same site loads faster next time you come by. But this is also the main way websites track you. They can see which specific store pages you visited to show targeted ads just for you. Apps, on the other hand, ask for permissions on first bootup or when using certain features. For example, dating apps and Google Maps require GPS. Almost all apps require storage permissions. Some apps even ask you for bizarre permissions that are irrelevant for use. Like an e-book app asking for camera or phonebook permissions. Beware of such apps as they are intended to scam you and don’t deliver on their promises. So, make sure you only accept sound requests. If you have time, check out your apps’ privacy policy and privacy settings. See if it’s possible to reduce your digital footprint.

Can people see what was searched on their Wi-Fi network?

Yes, they can. Public Wi-Fi is especially dangerous because it is an open network. Anyone can connect to it and exploit it. But don’t be deceived. Network administrators can use private networks for monitoring your browsing activity too. Be it your landlord, boss, or family member, they can see everything as long as they control the network. Wired connections (via Ethernet cable), on the other hand, are a little safer than Wi-Fi, so grab a cable instead when possible.

Can someone see my search history on Incognito?

Private browsing (or Incognito mode) is safer than usual since your web browser doesn’t save your browsing history, secured forms, cookies, and temporary files.

How did Google help society?
How did Google help society?

Google enabled free searches of words or terms, making all manner of information instantly retrievable even if you did not know where it was...

Read More »
Which gender is most honest?
Which gender is most honest?

women The results showed that women were more honest than men in general, but depending on the nature of the dishonest behavior, they could behave...

Read More »
What are the 5 income classes?
What are the 5 income classes?

Breaking Down Economic Class by Income From that data, they split earners into different classes such as poor, lower-middle class, middle class,...

Read More »
Which type of digital marketing makes the most money?
Which type of digital marketing makes the most money?

Highest-paying remote digital marketing jobs: Social Media Manager (SMM) ... eCommerce Developer (Shopify, Magento) ... Brand Manager. ......

Read More »