Identity theft on the Internet is in vogue. As published in StatisticBrain, there are between 12 and 15 million victims a year, with economic losses worth around 5,000 euros per person. In media like MakeUseOf different ways in which it can happen are detailed. We ourselves have talked about how the lack of security in data protection takes its toll.
You can’t control all potential threats 100%, but you do want to cover your tracks as much as possible. Minimizing risk is the key, and so that you can do it we offer you five ways to use disposable information to protect your identity on the Internet.
Disposable names and addresses
Unless it is necessary, never enter your real name or address on a web. You never know what could happen, but in the worst case, someone can discover that information and reach you. And if that happens, you won’t find out until it’s too late.
That is why you are interested in using a fake name and address, like the ones you can get with Fake Name Generator. Through this website you can create complete identities that you can use instead of yours. Details you can enter include addresses, GPS locations, credit card numbers, work life, and much more. It is quite impressive.
Throwaway phone numbers
Let’s say you just bought a new computer, and you want to sell your old one on any ad site or on eBay. On the one hand, it would be advisable to give a phone number in case a potential buyer wants to ask you something about the product. On the other hand, Is it really necessary that you make it public?
Obviously not. The best you can use is a phone number created ad-hoc, which you can get rid of when you no longer need it. A great option for this is Hushed Burner Number, an application available for iOS and Android that can generate phone numbers for 40 countries, which are associated with your real device and also have their own voicemail.
Of course, it has a small drawback: it is a paid service. It has monthly, annual subscriptions and also with payment per minute of use.
Temporary email addresses
Let’s talk about an uncomfortable truth about spam: There’s no way to avoid it. When you make your email address public in any way, even if it’s to create an account on a web service, spammers will be able to find it and fill it with advertising.
Worse yet: if spammers can find your email address, they can too any malicious actor. If a malicious hacker finds your email address, then they can access everything you have stored in your inbox. And as such, you can gain access to a huge amount of sensitive information, especially if you use the same password everywhere.
With a temporary email address you can fix this problem. We recommend using 10MinuteMail, which creates an inbox that self-destructs after ten minutes (although you can increase this amount of time if you need to).
Disposable user credentials
Before we talked about registering an account to access a service. You may be interested to know that sometimes you may not need to do it, since you can use one already created by someone and that is shared for public use. This is how BugMeNot works.
There are restrictions on which accounts can be shared: websites with paywalls, community-operated sites, and banking and e-commerce. If what you are looking for does not fall within this description, then you are in luck. So you can get where you want with a registered account, without having to do it yourself or expose your data.
Anonymous file sharing
If there is anything else you should keep secret, apart from your personal data, it is the files you share with friends and family In Internet. There is not much risk of someone extracting your identity from shared files (unless one of them contains something that can be used to identify you, such as photos of yourself), but it is a good idea to use an anonymous service to protect your privacy.
There are many hosting services that files are deleted after a period of time, which ranges from 24 hours to 30 days and even more, but we are going to recommend Send Anywhere. Why? Because anything you’ve shared is deleted as soon as the person you’re sending it to downloads it.
Image | TheDigitalWay
In Genbeta | Minecraft and LinkedIn, keys to identify the alleged author of the Mirai botnet