Share on Social Media:

How to Remove Your Digital Ex

Divorce or breakup can be heartbreaking. And the heartbreak can prove all the more intense if we’re unable to avoid contact with our exes- or reminders of life with them. So if you’ve suffered a breakup, then, how can you remove your ex from your digital life?

Wisconsin Court System - Court services - For the public - Self-help law  center

Block or Unfollow Your Ex

This would seem to be elementary. Most of us, though, find it difficult to suppress curiosity about our exes. Still, we have to discipline ourselves to avoid searching their profiles. If we do search them, we train the Facebook, Twitter, or Instagram algorithms to show us more about them, and this is also true of inquiries on browser search engines such as Google, Safari, or Firefox.

You may also have to mute friends or family members (temporarily, of course) who often share photos of your ex. This tells the algorithms you want to avoid these people, and your feed will feature different posts.

Remove Memories from Your Tablets, Phones, and Social Media

If you own one of the newer iPhones, this will be easy. In iOS 14, you’ll find a tool labelled Suggest Fewer Memories Like This. To activate it, open the Photos tab. Tap the For You icon, and you’ll find a list labelled Memory. Choose one you want to eliminate. You’ll find three dots next to your choice. Hit these, and you’ll be shown two options: Delete Memory and Suggest Fewer Memories Like This.

In Facebook, you’ll find the Hide People option on the left side of the Memories page.

Google Photos offers the options of hiding people, pets, or even particular dates- so you can avoid painful reminders of anniversaries. Find the Photos app, scroll to Photo Settings, and open the Memories tab. When you find it, hit the Hide People or Pets or Hide Date icons.

Monitor Your Smart Home Devices

If you neglect this step, you’re begging for trouble. Out of concern for privacy, we recommend NOT acquiring an Alexa or Siri device in the first place. If you do have one, though, and you can’t bear to part with it, at least exercise caution with it. An ex could activate the device remotely- even when you’re away from your home.

Kim Komando, a web expert who bills herself “Your Digital Goddess”, says she’s heard more stories than she can count about exes connecting to WiFi systems of old mates and bugging their routers. Even worse, it’s legal in most jurisdictions to hack WiFi.

Remove or Audit Old Accounts

Some web services, such as iCloud and Google Drive, allow access by exes to sensitive data, including text and photos, so you may have to contact the provider to remove your ex’s access. Exercise special vigilance in monitoring shared paid services, and ejecting your ex if necessary.

Change Your Passwords and Security Questions

Kim Komando suggests changing your passwords to any old accounts if there’s even a chance your ex still has them. And don’t forget the security questions. Even in a casual relationship, partners are likely remember important events in each other’s histories.

For paid services, such as Netflix, you may need additional steps after changing passwords. Check the box marked Require All Devices to Sign in Again with New Password. You’ll have to log in again, but your privacy- and avoiding additional expense- is worth the inconvenience.

************************************************************************************

If you want to remove your ex from your online activity, these suggestions will help. Remember: eternal vigilance is the price of privacy.

1-855-216-0185

One of the most important aspects of online security is a reliable internet connection. For the best deals in internet service, contact Satellite Country. We can help. Call now.

1-855-216-0185

Share on Social Media:

How can you protect your anonymity online?

A famous New Yorker cartoon from the dawn of the internet age features two dogs at a computer. One says to the other: “On the internet, nobody knows you’re a dog.” On the web, anonymity was virtually guaranteed.

Related image

Those canines might not be so confident about online privacy now. With each passing month, we get more disquieting news that others are spying on our web traffic. It was governments at first. But in the last few years we have learned that Google, Amazon, Microsoft, and Facebook have been tracking our web usage so they can show us targeted ads. Trolls and stalkers have learned how to find the real identities behind user names we adopt for online comments.

Does this mean we should abandon hope for online anonymity? If we want to maintain our privacy, do we have to stay off of the internet?

In truth, there is only one guarantee of absolute anonymity. We’d have to stay offline entirely.

Short of this, we’re taking on some risk. Still, there are several ways to hold our odds of exposure and I D theft to a bare minimum. I will cover two of them here:

TOR, Proxies, and VPNs

One of the most effective ways to mask identity and location is to appear to be someone else at a different location. For this, you’ll need a virtual private network (VPN) or a proxy server. Not only can they mask your identity, they can enable surfing in other countries like the natives.

VPN services are easy to find. They protect traffic between your computer and internet servers, and they will mask your IP location and address. Suppose that , while working from home, you connect through your employer’s VPN. Websites will track your activity to corporate headquarters, not to your home.

For more advanced security, you may want a proxy server, a computer that redirects your web traffic. Like a VPN, it will mask your IP address. The proxy server also caches internet requests and responses, which will speed connection for your return visits to your favorite sites.

TOR is sometimes called ‘the onion router’ for its multiple layers of protection for anonymity. It provides a network of routes for data requests and downloads.

A few years ago, Edward Snowden revealed that the NSA had been spying on web traffic, giving special attention to TOR. But the NSA was only able to monitor its ‘exit nodes’. The agency could track what TOR was being used for, but couldn’t identify users.

Browser Security

How do you know your browser isn’t informing on you? Some, most notably Google Chrome, have been especially aggressive in tracking user traffic. Usually, the purpose of vacuuming up this data is advertising. You can’t be sure, though, that your web footprint will never be used for more sinister purposes. Since Google and Facebook have been caught censoring information for political reasons, it pays to be careful.

You can block your browsers ability to store your passwords. Of course, this can be inconvenient, since you probably have a separate password for each web service you use. A password manager can cache your passwords so you don’t have to remember them. Some password managers are free.

You could also activate your browser’s anonymous surfing mode. For Microsoft’s Explorer and Edge, it’s called In Private. For Firefox, it’s called Private Browsing, and for Chrome, it’s called Incognito. Activating the anonymous mode will block the browser from keeping records of websites you visit, your downloads, cookies, passwords, and cached material. Your browser may also offer a Do Not Track option in its settings bar. If it does, you’d be wise to activate it.

Anonymity through Browser Choice

Some browsers are better than others at protecting user anonymity.

Google is notorious for vacuuming up user data for use in targeted advertising. Bing and Yahoo also are aggressive in collecting user data.

Comodo Dragon, Comodo IceDragon, and Epic use Google’s Chromium rendering engine, but they don’t share user information with Google. DuckDuckGo, Brave, and Opera do not use Google, Bing, or Yahoo search engines. They don’t track your web usage or sell your data.

Stealth modes and specialized browsers won’t provide perfect web security. But they can keep websites from sending unrequested info to your computer, info that other sites can read to discern your surfing habits.

More to Come…

There are other steps you can take to protect your anonymity online. We will spell out these additional steps in another post.

 

(For the best internet connection, talk to us. We can help.)