Five ways to generate disposable information to protect your identity on the Internet

Identity theft on the Internet is fashionable. As reported in StatisticBrain, there are between 12 and 15 million victims a year, with economic losses amounting to about 5000 dollars per person. Media such as MakeUseOf details different ways in which it can occur. We ourselves have talked about how the lack of security in data protection takes its toll.

You can not control all potential threats 100%, but you are interested in covering your tracks as much as possible. Minimizing risk is the key, and for you to do so we offer you five ways to use disposable information to protect your identity on the Internet.

Names and Addresses

Unless you need to, never enter your real name or address on a website. You never know what could happen, but in the worst case someone can discover that information and get to you. And if that happens, you will not notice until it’s too late.

That’s why you’re interested in using a fake name and address, like the ones you can get with Fake Name Generator. Through this website, you can create complete identities that you can use instead of yours. The details you can enter include addresses, GPS locations, credit card numbers, work life and more. It is quite impressive.

Use and Pull Phone Numbers

Suppose you just bought a new computer, and you want to sell the old one on any ad website or on eBay. On the one hand, it would be advisable to give a phone number in case a potential buyer wants to ask you something about the product. On the other hand, is it really necessary that you make it public?

Of course not. The best you can use is a phone number created ad-hoc, which you can undo when you no longer need it. A great choice for this is the Hushed Burner Number, an application available for iOS and Android that can generate phone numbers for 40 countries that are associated with your real device and also have their own voicemail.

Of course, it has a small problem: it is a payment service. It has monthly subscriptions, annual and also with payment per minute of use.

You may also like to read another article on NetDigEdu: Google, turns back to privacy: What the GPS of your phone says about you without you noticing?

Temporary Email Addresses

Let’s talk about an uncomfortable truth about spam: there is no way to avoid it. When you make your email address public in some way, even to create an account in a web service, spammers will be able to find it and fill it with publicity.

Worse: if spammers can find your email address, so can any malicious actor. If a hacker with bad intentions finds your email address, then you can access everything you have stored in your inbox. And as such, you can get access to a huge amount of sensitive information, especially if you use the same password everywhere.

With a temporary email address you can solve this problem. We recommend using 10MinuteMail, which creates an inbox that self-destructs after ten minutes (although you can increase this amount of time if you need it).

Use and throw user credentials

Before we talked about registering an account to access a service. Perhaps you are interested in knowing that sometimes you may not need to do it, since you can use one already created by someone and shared for public use. This is how BugMeNot works.

There are restrictions on which accounts can be shared : websites with paywall, community-operated sites, and banking and e-commerce. If what you are looking for does not fit into this description, then you are in luck. This way you can get as far as you want with a registered account, without having to do it yourself or expose your data.

Anonymous File Sharing

If there is something else you should keep secret, apart from your personal data, it is the files you share with friends and family on the Internet. There is not much risk of someone extracting your identity from shared files (unless one of them contains something that can be used to identify you, such as photos of you), but it is a good idea to use an anonymous service to protect your privacy.

There are many hosting services that delete files after a period of time, ranging from 24 hours to 30 days and even more, but we will recommend you to Send Anywhere. Why? Because anything you have shared is deleted as soon as the person to whom you send it downloads.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.