You are currently viewing the Canada version of the site.
Would you like to switch to your local site?
22 MIN READ TIME

security & privacy

BOOST SECURITY & PRIVACY ONLINE

Nick Peers explains how to lock down your identity and data online

© VERTIGO3D/ISTOCK/GETTY IMAGES PLUS

THESE DAYS your privacy and security have never been under greater threat, particularly when venturing online. Whether you’re worried about malicious individuals, gangs of hackers, or even your own government, there’s never been a better time to take the steps necessary to lock down your data and modify your online behavior to protect yourself and your loved ones from the less salubrious side of the internet.

We won’t go over old ground in this feature, we hope you’ve taken our previous advice and have strong security software in place on your computer, and are already protecting your online accounts with strong, randomly generated passwords. What we will do is help you take the next steps to tighten things further.

You’ll gain practical advice on strengthening network security and employing VPNs to not only secure your online traffic but allow you to dial into your home network securely when on the road. You’ll discover how to generate disposable email addresses to protect your actual address from future data breaches, plus we’ll show you how to browse more safely, encrypt data for more secure cloud storage, and tighten email and messaging security. It’s all here, so turn the page and start taking back control.

LET’S START BY LOCKING down your online accounts. You should already be using some form of password manager to generate and store strong passwords—at least 12 characters in length combining alphanumeric characters and symbols. But if you’re truly looking to lock down your online accounts, there’s more to do.

First, make sure you only store minimal personal information in your online account—if possible, no more than email and password. It may be fiddly having to input your card details each time you check out, but this slight inconvenience far outweighs having all your personal data stolen through a data breach.

In fact, you can go one step further. While it’s almost certain your email address has already been exposed by a password breach somewhere down the line (don’t believe us? Visit https:// haveibeenpwned.com/and don’t panic if or when your email address is flagged up), you can minimize its future exposure by switching to disposable email addresses. These special email addresses are designed to be used specifically for online accounts (see the box for details on how they work).

While you can manually create and use aliases via an email relay’s own online portal, look to see if your password manager can link into your chosen service to generate random email addresses when setting up new accounts. The following example shows how to combine Anonaddy with our favorite password manager Bitwarden (or VaultWarden, its self-hosted variant).

First, sign up for a free account at https://app.anonaddy.com/register. Once you’re verified, you’ll find yourself at its main dashboard. Click your username in the top right corner, select Settings, and scroll down to the API section to generate a new token. Copy this to the clipboard, then open the Bitwarden browser plugin and click the Generator button at the bottom. Make sure ‘Username’ and ‘Forwarded email alias’ are both selected, choose AnonAddy, and paste the token into the API Access Token field. Finally, change the Domain field so it reads username. anonaddy.me (substituting username with your AnonAddy username) to allow you to set up unlimited email aliases with a free account.

Every time you come to sign up for an account, simply go into Bitwarden first to generate a random AnonAddy alias and strong password. Once saved, paste or autofill this into the relevant fields and your email address will remain safely hidden. Logging into your AnonAddy account should confirm the email has been generated—click the edit button under the Alias field if you want to provide a description that explains exactly which account the alias is linked to.

“ It may be fiddly having to input your card details, but it outweighs having your personal data stolen through a data breach.

Email relaying services like AnonAddy help protect your email address.
© ANONADDY

STORE YOUR DATA ONLINE

There’s one compelling reason for storing your personal data in the cloud: it’s secured in an off-site location that would survive fire or theft in your home. The problem lies with the security and privacy of that data. As with all cloud-hosted material, you must ask yourself: who am I trusting my data with, and what steps have they put in place to keep it private?

Unlock this article and much more with
You can enjoy:
Enjoy this edition in full
Instant access to 600+ titles
Thousands of back issues
No contract or commitment
Try for $1.39
SUBSCRIBE NOW
30 day trial, then just $13.99 / month. Cancel anytime. New subscribers only.


Learn more
Pocketmags Plus
Pocketmags Plus

This article is from...


View Issues
Maximum PC
January 2023
VIEW IN STORE

Other Articles in this Issue


editorial
MID-RANGE MONSTER
Guy Cocker LAST MONTH, I went all-out on
QUICKSTART
GPU War Heats Up
The next generation of cards finally go head-to-head
FASTEST HARD DRIVES EVER
© INTEL, AMD, SEAGATE SEAGATE’S SECOND GENERATION of
ZEN 4’S V-CACHE CHIP DUE SOON
But they will be limited to eight-core
Tech Triumphs and Tragedies
A monthly snapshot of what’s good and bad in tech
WORLD RECORD OVERCLOCK
Fastest ever desktop processor now 8.8GHz
META LOSES 11,000 STAFF
Layoffs spike across entire tech industry
Intel’s FakeCatcher
© META, INTEL, CSA VIA WIKIMEDIA, DEEPFAKES, VIDEOS
The Internet on One Fiber
A new data transfer record using a single
Smart Homes to get Smarter
One problem with smart homes is they aren’t
Understanding Power and Efficiency
Jarred Walton CREATING A MODERN microprocessor involves myriad
THE LIST
THE BEST 4K TVS FOR PC GAMING
The GPU pricing paradox
Jeremy Laird SOMETHING ODD IS GOING ON in
LETTERS
DOCTOR
THIS MONTH THE DOCTOR TACKLES...
LETTERS
WE TACKLE TOUGH READER QUESTIONS ON...
THE BUILDS
THIS MONTH’S STREET PRICES...
MAXIMUM PC
THE SLICK AND SUBTLE 4090 RIG
Building with the best for less
AMD RDNA 3 ARCHITECTURAL DEEP DIVE
Taking a dip in the pool with the upcoming RX 7900-series
RETRO EMULATION
The Maximum PC team all have their own favorite retro memories. Jonni Bidwell helps you relive yours
RELIVE PAST COMPUTERS
A roundup of some of the retro computers that made us smile (and occasionally swear)
RETRO GAMING ON THE PC
If you’re struggling to source a Pi, or
RETRO GAMING ON THE Pi
Set up RetroPie and set a course for nostalgic reverie.
SETTING UP RETROPIE
1. DOWNLOAD PI IMAGER We usually recommend Balena
THOSE MAGNIFICENT MACHINES OF THE 1980s
The eight-bit machines managed to do a huge amount with little memory and CPUs that could barely cope with long division
16-BIT HITS
For many gamers, the golden age of computing was characterized by the Amiga 500 and Atari ST
R&D
HOW TO STEP-BY-STEP GUIDES TO IMPROVING YOUR PC
TIP OF THE MONTH
AUTOPSY THIS MONTH WE DISSECT...
Xbox Adaptive Controller
Streamline and speed up your PC
YOU’LL NEED THIS
How to Colorize B&W Photos in Photoshop
YOU’LL NEED THIS
LAB NOTES
Nvidia nonchalance A reader is perplexed by the
IN THE LAB
GeForce RTX 4080 Founders Edition
Does it measure up to the RTX 4090?
Velocity Micro Raptor Z95
Top-end components, overclocked for your pleasure
Sapphire Radeon RX 6700
Strong competition for Intel’s Arc
Asus ROG Strix Z790-A Gaming WiFi D4
Good value Raptor Lake motherboard
Asus ZenWiFi XT9
Affordable mesh system that doesn’t disappoint
Samsung Odyssey Ark
A magnificent monitor for mad money
SteelSeries Aerox 5 Wireless
Does this ultra-light mouse live up to its price?
SureFire Harrier 360
Bang for your buck or just thumping bass?
HyperX Pulsefire Haste Wireless
Marvelous eSports mouse at a decent price
Call of Duty: Modern Warfare II (2022)
Task Force 141 is back for another global terrorist hunt
Authy vs. Google Authenticator
Which is the better two-factor authentication app?
Chat
X
Pocketmags Support