Author Archives: J. Hawthorne

Why Gamers Should Keep Their Antivirus On

Some disable their antivirus before playing online games because they believe it gives them smooth gameplay, the highest FPS (frames per second) possible, and reduced lag.

Some functions of antivirus software can indeed interfere with your gaming experience, such as scheduled system scans, notifications of stopped threats, or virus database updates.

Disabling antivirus software might seem like a viable option in the short term. But at the end of the day, it can’t be justified due to advancements in antivirus software and the introduction of “gaming mode.”

Studies have shown that the normal functions of antivirus that monitor for viruses and malware don’t diminish system performance when you’re playing games.

Keeping your PC protected with antivirus software during gaming sessions helps you avoid many threats that are specifically affecting the world of online gaming.

The Rise of Online Gaming

Once dismissed as a fad, online games have become the dominant form of entertainment. Did you know that online gaming revenue dwarfs both movie box office and recorded music revenue?

Games like Minecraft and Fortnite have hundreds of millions of active users alone.

Harnessing the power of the internet has changed gaming forever. It’s opened up astounding creative possibilities for game developers.

Online gaming also exposes people to a variety of dangers. The internet has provided the means for these threats. The explosion in popularity of gaming has made gamers an attractive group to target for bad actors.

Gaming Mode to the Rescue

To give gamers the best possible experience while keeping their systems safe, a lot of security software offers “gaming mode.”

This ensures that scans and updates are delayed until the gaming session Is over. Additionally, gamers aren’t interrupted by notifications when it’s enabled.

Gaming mode is one of the top features gamers should look for in antivirus software. Understandably, people don’t want to compromise gameplay to protect their PC, and with this feature, they don’t have to.

Bad Tech Experiences Dictating Future Actions

Some gamers have experienced headaches with antivirus and games conflicting in the past, thus it’s driven them to disable their antivirus to avoid reliving them.

One surefire way to make antivirus a nuisance is to install third-party antivirus software while keeping Windows Defender enabled. In this case, two is not better than one. Having two security solutions running won’t double or even increase the level of protection. However, it will almost certainly double the number of scans, notifications, and actions taken by each piece of antivirus software.

It never hurts to check how your antivirus is configured to make sure it considers your gaming habits. A full system scan once per week is sufficient for many, and it’s far less likely to interrupt a gaming session than daily scans. Schedule scans at a time when you don’t play games.

Forgetting to Reenable Your Antivirus

Another reason disabling your antivirus isn’t a good strategy is there’s always the possibility that you forget to reenable it after a gaming session. Let’s face it, after a particularly long or intense stretch of gaming, it’s easy to exit the game and move on to thoughts that couldn’t be further than your antivirus software.

You can certainly forget to disable “gaming mode” in your antivirus too. However, your PC is still well-protected if you do.

Common Threats that Gamers Face

Phishing: Many are familiar with phishing as it relates to email, social media, and the web. Fewer people are aware that scammers also use gaming platforms or even the games themselves to trick people. If someone messages you and asks for confidential information it isn’t legitimate no matter how credible they may appear at first glance.

Malware: Here’s another reason to avoid downloading cheats: it’s a common way to get malware. Malware can integrate itself into legitimate pages, so it can be tricky to spot.

Viruses and trojanized games: Some files that are labeled as games aren’t games at all, they’re viruses. These trojanized titles can be found on shady websites offering free games and even legit app stores at times. On online stores, check the date of release and read the game’s reviews to confirm it’s genuine. Beware of players you don’t know offering you in-game equipment, weapons, or downloads. They could be using bait to infect your PC.

Data breaches: Any website you have an account with can be hit with a data breach. This means that cybercriminals have successfully stolen private data from a massive list of a company’s customers. The games you play and gaming platforms you use don’t need to be affected for this to become a threat. The data can be used for credential stuffing. This is when hackers use data obtained from a breach to attempt to get into your gaming account.

Spyware: It isn’t always individuals and other players you need to defend yourself from, it’s also untrustworthy gaming operations. Spyware is deployed to track the actions of unsuspecting gamers. It then can be sold to third parties they’ve never interacted with.

In-game currency theft: If you’re dedicated to an MMO and have amassed an in-game fortune and legendary items, this one is for you. Some bad actors are breaking into people’s accounts specifically to get a hold of their inventory and in-game currency. Players who have invested countless hours into advancing their characters should protect their accounts accordingly with unique, particularly strong passwords.

Conclusion

Disabling your antivirus during online gaming sessions isn’t the solution it may seem to be. If there’s a time you need that protection the most, it’s when exploring online worlds.

Check to see if your antivirus supports “gaming mode.” Once you get into the habit of using it, you’ll wonder how you managed to live without it.

How to Protect Your Privacy When Playing Online Games

From MMORPGs to battle royale shooters, it’s fun and thrilling for gamers to immerse themselves in a digital world filled with millions of other players.

Once an online game reaches the highest level of popularity it becomes like a world of its own—with its economy, massive variety of items, and culture. And while most of the dangers and challenges are merely a part of the game, there are also real threats gamers need to protect themselves from.

Online privacy is a hot topic these days. When digital experiences provided by social media, games, and apps exploded in popularity your average person wasn’t ready for the privacy ramifications of it all.

Like most tech companies, gaming companies want to collect data about their customers to improve their games, to better understand what gamers want, and of course to increase profits by selling the data or using the data themselves.

Savvy gamers are now deciding for themselves how much data collection is too much. More than ever, gaming platforms like Steam, PSN, and Xbox Live are giving people the tools to protect their privacy and specify which data they’re comfortable sharing and which data they aren’t.

So, let’s dive in. Here are the things you can do to improve your privacy in online video games.

Tweak Your Privacy Settings

When it comes to privacy settings, there’s almost always room for improvement from the default settings.

You need to drill down into menus and sometimes make decisions that prioritize either privacy or features and convenience.

Thankfully, once you tackle it, you’re in good shape for years to come until the gaming platform you use overhauls its approach to managing privacy.

To learn how to tweak your game console settings, see LetMeBy’s guide to protecting your privacy on PS5 and protecting your privacy on Xbox Series X/S.

Unlink Your Social Media

Many big game companies such as Blizzard Entertainment and Bethesda Softworks allow their users to connect their social media accounts to their gaming accounts.

It might seem like an interesting feature to explore if you post content about gaming, but linking to social media may grant the game company access to parts of your personal data such as your name, profile photo, or even what you post and in-game conversations.

It’s almost always preferable to log in with a password specific to that gaming account rather than something like Facebook as there is typically a privacy cost.

Keep Your Antivirus Active and Up-to-Date

Good virus protection is always a must on Windows, but for avid online gamers, it’s even more essential.

Some gamers disable their antivirus software to play online or don’t protect their PC at all because they believe it affects performance. Studies have found that in four out of five cases there’s no reduction in frames-per-second (FPS) when playing games with security software running. And in the rare case it has an effect, it’s not a noticeable one.

The hurdle is antivirus software can sometimes launch automated actions that interfere with your gaming experience. Some examples of this are antivirus database updates, notifications of stopped threats, or scheduled hard drive scans.

Choose antivirus solutions that allow you to delay updates and scans while you play games. Some security software such as Kaspersky [Amazon] have a game mode to ensure it doesn’t start using system resources during an intense boss fight.

Manually Block Data Collection

The services that collect data about you during a gaming session are stealthy indeed. These processes take place in the background so you don’t ever notice them.

Windows users have the power to block servers from collecting data about them. Open up your hosts file and add the IP address and hostname associated with the service you want to block.

Managing these connections manually requires research and tech skills, but you can’t always achieve the desired effect from the game or platform privacy settings. At times it’s better to take matters into your own hands.

Don’t Save Your Credit Card Info

Gaming platforms and consoles make it easy for people to save their credit card info for future purchases. Simply put, it’s more likely you’ll make purchases if you can do it in a few clicks. And companies like getting those frictionless sales.

While it’s no doubt convenient to have your credit card on file, it has risks that come along with it. If somebody gains access to your account, they could manage to collect your credit card info or even make purchases.

More and more, credit card companies are requiring confirmation that changes to your card are genuine. However, it’s still best to play it safe and enter your card info each time you shop for new games.

Use a VPN

VPNs create a secure tunnel in which all data flows between your internet connection and your gaming device.

Your real IP address is hidden and replaced with the IP associated with the VPN service. This makes it either difficult or impossible for companies and malicious users to pinpoint your location or gather data about you.

If you’re looking for a VPN, see LetMeBy’s top 3 VPN picks here. Alternatively, if you’re low on time, here are the VPNs most commonly recommended to gamers on this blog:

Avoid Using Cheats

Offering players cheats has become a common tactic used to trick unsuspecting gamers.

Here’s how it’s done.

Players looking for cheats and hacks will Google terms that bring them to an untrustworthy website. The site could use aggressive and misleading tactics to get players to click ads, complete surveys, or download malicious files.

Additionally, the cheat tool itself could use covert methods such as malware to obtain private data or it could use phishing to gain access to the gamer’s account.

Never download cheats as it not only goes against the terms of service in online games, it also puts your private data at risk. If you choose to download mods, do so from legit apps such as Steam or Epic Games and never from third-party websites.

Conclusion

Online gaming opens up incredible possibilities for players to compete and collaborate with other gamers, explore breathtaking environments, and acquire items that give their character a distinctive appearance.

It’s important to keep in mind that online games have greater risks as well.

There’s always a population of players looking for new ways to cheat and break the rules for their own gain. Online gaming has become so widespread that players are attractive targets for cybercriminals. On top of everything, many big gaming companies have become prying eyes.

Better online privacy doesn’t happen on its own. It’s something gamers need to strive for. And if you do, there’s a good chance your future self will thank you.

Brave Browser vs. Firefox: Which Is Best for Privacy?

First released in 2004, Firefox has long been an alternative for people who want to venture beyond the obvious web browser choices.

Firefox was once a popular browser, but its user base has largely moved on. In 2010, roughly 30% of internet users browsed with Firefox. Today, it’s dropped dramatically to under 3%.

Brave’s market share is much smaller than that with a mere 0.05% using it on desktop.

Right now, the vast majority are satisfied with what Apple, Google, and Microsoft have to offer.

There’s no doubt that Safari, Chrome, and Edge are capable. However, if you’re looking to level up your online privacy one of the first things to consider changing is your web browser. Mainstream browsers have many strengths and advantages, but top-tier privacy generally isn’t one of them.

Both Firefox and Brave put privacy front and center and use it to differentiate themselves from their much larger competitors.

Under the Hood

Before getting into the nitty gritty it’s helpful to know about the foundation these browsers are built on.

Brave is built on Chromium which is Google’s open-source browser. Thus, in terms of the technology that powers it, it has a lot more in common with Chrome than Firefox. Think of it like Chromium is the engine but its feature set is based on a philosophy that puts emphasis on user privacy.

Firefox is a unique platform and ecosystem developed by Mozilla. Web browsers that are developed from the ground up are a rarity. Many alternative browsers such as Opera are powered by Chromium. Also, typically browsers are built by corporations, but Firefox is made by a foundation. Mozilla is focused on principals such as keeping the internet open and accessible to all. Firefox is part of its family of products it calls “privacy-first.”

Now, let’s dig deeper into each browser’s privacy features and how they perform in the real world to determine which one is right for you.

Tracker Blocking

Brave features tracker blocking out of the box with ‘Brave Shields.’

In the browser, you can click the Brave logo to the right of the address bar to quickly view stats about blocked trackers and ads. This is a handy way to see how many trackers are on websites you frequently visit. A small number that specifies the number of trackers blocked also appears on top of the logo which is nice since it saves you a second or two.

Firefox for desktop has what it calls ‘Enhanced Tracking Protection.’

By clicking on the shield icon to the left of the address bar in Firefox you get a little report about known trackers on the websites you visit. At first glance, the presentation isn’t as slick as Brave’s. However, by clicking through to its ‘Protections Dashboard’ you’re greeted with a breakdown of all the types of trackers it blocked throughout the week.

Verdict: Tie

Brave and Firefox block trackers and cookies comprehensively. In fact, one Redditor tested them with d3ward’s website and Adblock Tester and both were given a score of 100%.

When Brave and Firefox’s websites get into the specifics of what’s blocked, they emphasize different things. For example, Brave optimizes scripts that can affect performance, and it catches third parties that use cloaking to try to bypass ad blockers.

Firefox pays special attention to social media trackers in its reports. It also blocks cryptomining which is malware nefarious websites use to employ their visitors’ computers to mine crypto for them.

Private Window

Often private window features are only for local privacy. In other words, they exclude websites you visited from your history when it’s enabled. Additionally, there aren’t other traces left over from browsing such as search bar entries, cookies, and cached files.

Brave goes a step beyond with its Private Window. Uniquely, it comes with two different variations. First, is its normal Private Window that stops sites from being added to the list in the History menu. Second, is its Private Window which uses Tor to hide your identity with incredible thoroughness. It does come at the cost of loading speed. So, it’s a tool you’ll only want to use when online anonymity is a critical factor.

Firefox has a Private Window feature that’s pretty much identical to the one found in mainstream browsers such as Chrome’s incognito mode. It performs its function of enhancing local privacy admirably. But it does nothing to boost your anonymity online versus regular browsing.

Verdict: Brave Wins

Brave’s ability to browse with Tor might go unnoticed by many, but it actually makes private browsing truly anonymous as the name implies. Tor offers its own browser as well but this is the perfect way for people to get their feet wet.

Fingerprinting

Many websites and online services use digital fingerprinting to identity devices. It gathers data about your operating system, browser, your hardware setup, screen resolution, etc. Some of these items may seem insignificant but when they’re all added together it’s a reliable way to pinpoint you.

Sites such as Cover Your Tracks and Browser Leaks will test your browser to see how big your digital footprint really is.

Brave did the best in tests since it dynamically changes fingerprint data to make it difficult or impossible to track its users. Essentially, the fingerprint data is there, but it’s useless to its recipients.

Firefox has a persistent fingerprint. Rebooting your system or relaunching your browser won’t improve matters.

Verdict: Brave Wins

VPN Features

Changing your browser is often the first step on the road towards better online privacy. Getting a VPN is the second.

VPNs sit between the internet and your device so true anonymity can be achieved. They offer the highest level of encryption so your location and actions can’t be tracked by companies and third parties.

Brave offers a paid VPN service called Brave VPN. It’s powered by Guardian and it protects five devices.

Firefox also has a VPN product called Mozilla VPN. It’s developed directly by Mozilla and like Brave’s offering, it can be installed on five devices.

Verdict: Tie

You can use any VPN service with Brave or Firefox. You merely have to install the associated VPN app to create a protected connection in any applications you use. If you’re interested in taking advantage of this feature, be sure to view the top 3 VPNs recommended by LetMeBy here.

Conclusion

Firefox and Brave are both excellent browsers that live up to their claims of putting privacy first. They are nearly neck and neck when it comes to their implementation of most privacy features. However, Brave has an edge due to its fingerprinting capabilities and integration of Tor in its Private Window.

Overall, Brave’s user experience feels a bit more modern. Firefox has kept up but its roots as a browser that’s been around since the mid-2000s are apparent in its user interface at times. Some may notice that Brave’s performance is snappy as it utilizes RAM very efficiently.

On the other side of the coin, Firefox is well-established and widely supported. It plays nice with pretty much any website.

Crypto Isn’t Anonymous and Exchanges Are a Big Part of It

If you asked a person on the street if cryptocurrency is anonymous many would say yes.

It certainly looks anonymous. A Bitcoin address is a long string of randomly generated letters and numbers. If you were to send a friend Bitcoin you wouldn’t see their name anywhere during the process. And your friend who received it wouldn’t see who it came from.

In actuality, crypto is pseudo-anonymous. Anybody can look up an address on the public blockchain and see a full history of the transactions that have been made. They just don’t know who the people are behind those transactions.

Cybercriminals have been tracked down through their crypto addresses time and time again by blockchain forensics firms that have aided authorities. Thus, while it isn’t straightforward to associate a crypto address with a real person it can be done reliably by specialists.

The first thing you need when you get into crypto is an account at an exchange like Coinbase or Kraken. Since they’re the entry point, they’ve been given the role of making sure their customers are real people. Unfortunately, that means online privacy has become a pipedream for crypto investors.

So, Why Do Exchanges Need to Confirm Your Identity Exactly?

Crypto exchanges have been scrambling in recent years to stay compliant with government regulations. Since then, they have become more vigilant about confirming that customers are who they claim to be.

Crypto exchanges routinely ask users to provide ID and take a selfie to verify their identity. Verification could be necessary to complete any meaningful action, such as creating an account, transferring crypto to a wallet on the exchange, or withdrawing crypto.

The reasons for identity verification can be vague or even misleading on their websites.

When faced with the question of why it’s necessary, Binance puts it back on the customer. In their support center, users are met with a list of justifications. They could have accessed their account with multiple IP addresses, not completed face verification, or not enabled two-factor authentication.

Uphold simply tells customers that providing ID and a selfie helps them verify your identity, and keep their platform secure.

To give credit where it’s due, Coinbase wins for transparency on this. They confirm that the primary reason it’s done is for compliance:

“Coinbase uses identity verification in order to comply with Know Your Customer (KYC) laws. KYC is a way to identify and confirm that a customer is who they say they are. It’s a multi-step process that helps prevent the creation and use of fraudulent accounts.”

Have Regulators Taken Away Crypto’s Superpower of Pseudo Anonymity?

We’ve covered that crypto isn’t truly anonymous, but that doesn’t mean its pseudo-anonymity isn’t useful or desirable.

Cryptocurrency provides the ability to make peer-to-peer transactions that are the closest thing we have to digital cash.

Once you put an institution between you and the recipient, it takes away what’s great about crypto. One could argue that it’s even less anonymous than traditional finance when it’s used like that.

The technology itself cannot be regulated. So, exchanges and crypto on-ramps have been given the task of keeping tabs on their customers. If people keep using these services like banks to store their coins, they’ll act more and more like banks.

When Sharing Your Personal Data Isn’t Worth the Risk

The fewer exchanges that have your photo ID, the better. You may trust the company, but people need to consider the possibility of your personal data being intercepted by a nefarious third party.

Crypto exchanges are common targets for cybercriminals. And these days, the personal data of crypto investors is a valuable asset.

Be strategic about which exchanges you choose to use. Many have opened accounts to get access to hot new coins and then rarely or never accessed these platforms after the hype settled down. Determine what you need going forward and close the accounts that aren’t necessary.

Get Your Coins Off of Exchanges!

“Not your keys, not your coins” is a popular phrase used by crypto enthusiasts. When you have your crypto on an exchange, guess who controls the keys? Hint: it isn’t you.

Exchanges are not banks. They’re best used as an on-ramp and for trading and that’s it. If there’s a security event, some exchanges attempt to reimburse their customers’ losses, but it’s certainly not guaranteed nor insured by FDIC.

Finding a way to secure your coins and put them into cold storage requires technical chops, knowledge, and in some cases, the right gadgets. Additionally, crypto exchanges typically charge withdrawal fees on top of the network fees associated with the coin. Thus, there are barriers in place that make people put off securing their coins.

Whatever you have to do, it’s almost always worth it. Get your coins off of exchanges. Consider picking up a Trezor One [Amazon] or Ledger Nano S [Amazon] for long-term storage.

Conclusion

Bitcoin was created so people could be their own bank. Instead, exchanges have become the banks for crypto assets at the cost of the privacy of its holders.

It’s time to reconsider how we use crypto exchanges. Customers have to share their ID and take a selfie to confirm their identity. The question is: how safe is our personal data in their hands?

Online Privacy Has Become “Very Creepy” Says Mozilla

If you ever felt we’ve come dangerously close to George Orwell’s dystopian vision in 1984, you’re on to something. Big Brother isn’t watching but the products we use every day and the companies behind them certainly are.

They’re best known for their web browser, Firefox, but Mozilla is also an online privacy watchdog. Since 2017 they’ve been reviewing products and assessing what data is collected and who it’s being shared with.

Their annual consumer Creep-O-Meter takes all those findings, distills them, and gives you a big-picture view of the current state of digital privacy and where we’re headed.

According to the oversized, shocked emoji on their site, things aren’t looking good. The state of digital privacy is “very creepy.”

The Good News: Online Security Has Improved

The report isn’t all doom and gloom.

More companies are using encryption and giving their customers automatic updates. So, while companies are hungry for personal data, and they’re typically sharing it to make additional revenue, the data is generally sent securely. That means it’s much harder for third parties to intercept personal data illegitimately.

It’s important to remember that companies might not always make decisions that put their customers first but they’re not the threat. Rather, consumers should be most concerned about nefarious third parties that steal private data.

The Bad: Long Privacy Policies and Products that Don’t Work Offline

If you’ve skipped privacy policies, skimmed others, and occasionally read sections of them, you’re in the majority.

Insanely long privacy policies that no human possibly has time to read are the norm. If you’re ambitious enough to go through one, the legal jargon and lack of clarity may give you just as many questions as answers.

A machine learning analysis found that since 1996 the typical privacy policy has grown to over 4,000 words.

Another growing trend is products that need an internet connection to operate, with no “offline mode.”

Devices use so many online services today that it’s tricky to give people a decent user experience without the internet. And since there isn’t much incentive for companies to offer the ability to go offline, many companies have given up on the idea.

Going offline is the simplest, most effective way to protect your private data. When apps and gadgets neither offer a way to use them offline nor manage privacy settings, customers are left with a choice: accept data practices they might not be comfortable with or stop using them entirely.

New Cars Are the Creepiest Products

Perhaps the biggest shocker of all is that 100% of car makers failed to pass Mozilla’s privacy test.

If you’re looking for car brands that are slightly less aggressive about collecting and using your personal data, you won’t find much. All the big auto manufacturers are practically moving in lockstep.

Nissan won for the highest creep factor. The Japan-based company collects data about “sexual activity, health diagnosis data, and genetic information” according to Mozilla.

And when it comes to overall privacy with the most room for improvement, Tesla took the cake. Tesla was given an “X” in every category in their report about the state of privacy in car brands.

Most Gadgets Have Mics and Cameras

Perhaps it’s just too tempting to harvest data about customers when all the tools are built right into the products. Over 90% of gadgets, apps, and cars have a mic, a camera, or both.

The products with the highest “creepiness” may surprise you. Gaming consoles, smart video doorbells, smart speakers, and GPS watches were common near the top of Mozilla’s “Privacy Not Included” list.

Video call apps such as Apple’s Facetime were some of the worst when it comes to data privacy policies.

Quick Tips to Take Control of Your Privacy

  • Opt-out: When you install apps, you could be given the opportunity to limit or stop data collection and sharing. If privacy settings are available, poke around and see if you can make changes that will improve your online privacy.
  • Check permissions and deny access as needed: Android and iOS allow you to manage which apps have access to your location, contacts, camera, etc. as well as in what circumstances they’re permitted to access them. It’s a good practice to review these permissions every now and again.
  • Clear private data companies have about you: Tech companies such as Google and Meta allow you to delete your personal data they store on their servers. If you continue to use their services, they’ll resume collecting data in most cases but at least you’ll start fresh.
  • Use a VPN: Add a layer of anonymity and encryption between your device and the internet with a virtual private network. It allows you to easily hide your IP address which is one of the key ways you are identified online. Learn about the top 3 VPN services here.
  • Delete apps you’re not using: It may be surprising to some, but apps you don’t even use can still collect data about you. Old apps that haven’t received security updates may contain personal information that is low-hanging fruit for data thieves.
  • Read the privacy policy: No, not the privacy policy, right? It might be duller reading material than the phonebook, but if you use an app or product every day it’s important to know how it handles your data.

Conclusion

The smart technology we have in our homes has added efficiency to our lives and connected us to the world, but it has its costs.

More than ever companies are using their products to collect and share the personal data of their customers. The big data industry provides lucrative opportunities to manufacturers. Tough economic times have corporations looking for alternative revenue sources.

Before you set up an “always on” device in your home such as a smart speaker or smart video doorbell, consider if the upside outweighs the downside. Products in certain categories have privacy drawbacks across the board.