Privacy / Security Tips against Google's tracking of YOU

uncleyap

Alfrescian
Loyal
Joined
Jul 11, 2008
Messages
5,769
Points
48
1. Note all Google's related sites: google gmail picasa youtube blogger etc

2. minimize your session time, never stay logged in more than necessary, never never stay logged in all time.

3. Andriod users are forced to supply google ID and you know that you are dead-meat once your phone is turned on, your tracking is never stopped.

4. kept flushing your browser cookies as many times as possible (ALL of cookies related to google's sites) best flush all cookies and all history.

5. the minimum number of flush must be at least: * just before login to any Google ID, & * just after log out from any google ID. Better to flush once after any (include non-login) session on any google sites, this includes any google search, youtube, map, translate etc.

6. Android users - AVOID using handphone to access any google sites. You are tracked.

7. Android users - never setup your actual gmail ID nor Youtube ID inside your phone. keep more than one google ID, and only a rare use one on Android phone. Do more important things on a Linux PC properly configured.

8. Keep changing your Google ID, especially those in Android phones, abandon old IDs periodically and register new ones. Cut their tracking traces.

;)
 
Google and other Web exploiter giants track your activities for commercial exploitations. Cookies are their important links and you would be amazed what they can do.

They are LINKING up and forming profiles of users. Who you contact, what you search & click, what you blog, what video you watch, how long you stay on each sites and on what pages. Where you go, (google MAP & Andriod) spend (google wallet), your languages, Ads that you would have different levels of interest. Your icon / face your photos (picasa) your video, = WHO YOU ARE.

Faces can be recognized by software easily. Also your voice (google talk) The giants are secretly analyzing. Face and voice gestures / moods relations can also be recognized by software.

They WILL sell their valuable info and betray you. The info they collect can be obtained or hacked away from them by some capable organizations.
 
Back
Top