Author Archives: J. Hawthorne

Brave Browser vs. Firefox: Which Is Best for Privacy?

First released in 2004, Firefox has long been an alternative for people who want to venture beyond the obvious web browser choices.

Firefox was once a popular browser, but its user base has largely moved on. In 2010, roughly 30% of internet users browsed with Firefox. Today, it’s dropped dramatically to under 3%.

Brave’s market share is much smaller than that with a mere 0.05% using it on desktop.

Right now, the vast majority are satisfied with what Apple, Google, and Microsoft have to offer.

There’s no doubt that Safari, Chrome, and Edge are capable. However, if you’re looking to level up your online privacy one of the first things to consider changing is your web browser. Mainstream browsers have many strengths and advantages, but top-tier privacy generally isn’t one of them.

Both Firefox and Brave put privacy front and center and use it to differentiate themselves from their much larger competitors.

Under the Hood

Before getting into the nitty gritty it’s helpful to know about the foundation these browsers are built on.

Brave is built on Chromium which is Google’s open-source browser. Thus, in terms of the technology that powers it, it has a lot more in common with Chrome than Firefox. Think of it like Chromium is the engine but its feature set is based on a philosophy that puts emphasis on user privacy.

Firefox is a unique platform and ecosystem developed by Mozilla. Web browsers that are developed from the ground up are a rarity. Many alternative browsers such as Opera are powered by Chromium. Also, typically browsers are built by corporations, but Firefox is made by a foundation. Mozilla is focused on principals such as keeping the internet open and accessible to all. Firefox is part of its family of products it calls “privacy-first.”

Now, let’s dig deeper into each browser’s privacy features and how they perform in the real world to determine which one is right for you.

Tracker Blocking

Brave features tracker blocking out of the box with ‘Brave Shields.’

In the browser, you can click the Brave logo to the right of the address bar to quickly view stats about blocked trackers and ads. This is a handy way to see how many trackers are on websites you frequently visit. A small number that specifies the number of trackers blocked also appears on top of the logo which is nice since it saves you a second or two.

Firefox for desktop has what it calls ‘Enhanced Tracking Protection.’

By clicking on the shield icon to the left of the address bar in Firefox you get a little report about known trackers on the websites you visit. At first glance, the presentation isn’t as slick as Brave’s. However, by clicking through to its ‘Protections Dashboard’ you’re greeted with a breakdown of all the types of trackers it blocked throughout the week.

Verdict: Tie

Brave and Firefox block trackers and cookies comprehensively. In fact, one Redditor tested them with d3ward’s website and Adblock Tester and both were given a score of 100%.

When Brave and Firefox’s websites get into the specifics of what’s blocked, they emphasize different things. For example, Brave optimizes scripts that can affect performance, and it catches third parties that use cloaking to try to bypass ad blockers.

Firefox pays special attention to social media trackers in its reports. It also blocks cryptomining which is malware nefarious websites use to employ their visitors’ computers to mine crypto for them.

Private Window

Often private window features are only for local privacy. In other words, they exclude websites you visited from your history when it’s enabled. Additionally, there aren’t other traces left over from browsing such as search bar entries, cookies, and cached files.

Brave goes a step beyond with its Private Window. Uniquely, it comes with two different variations. First, is its normal Private Window that stops sites from being added to the list in the History menu. Second, is its Private Window which uses Tor to hide your identity with incredible thoroughness. It does come at the cost of loading speed. So, it’s a tool you’ll only want to use when online anonymity is a critical factor.

Firefox has a Private Window feature that’s pretty much identical to the one found in mainstream browsers such as Chrome’s incognito mode. It performs its function of enhancing local privacy admirably. But it does nothing to boost your anonymity online versus regular browsing.

Verdict: Brave Wins

Brave’s ability to browse with Tor might go unnoticed by many, but it actually makes private browsing truly anonymous as the name implies. Tor offers its own browser as well but this is the perfect way for people to get their feet wet.

Fingerprinting

Many websites and online services use digital fingerprinting to identity devices. It gathers data about your operating system, browser, your hardware setup, screen resolution, etc. Some of these items may seem insignificant but when they’re all added together it’s a reliable way to pinpoint you.

Sites such as Cover Your Tracks and Browser Leaks will test your browser to see how big your digital footprint really is.

Brave did the best in tests since it dynamically changes fingerprint data to make it difficult or impossible to track its users. Essentially, the fingerprint data is there, but it’s useless to its recipients.

Firefox has a persistent fingerprint. Rebooting your system or relaunching your browser won’t improve matters.

Verdict: Brave Wins

VPN Features

Changing your browser is often the first step on the road towards better online privacy. Getting a VPN is the second.

VPNs sit between the internet and your device so true anonymity can be achieved. They offer the highest level of encryption so your location and actions can’t be tracked by companies and third parties.

Brave offers a paid VPN service called Brave VPN. It’s powered by Guardian and it protects five devices.

Firefox also has a VPN product called Mozilla VPN. It’s developed directly by Mozilla and like Brave’s offering, it can be installed on five devices.

Verdict: Tie

You can use any VPN service with Brave or Firefox. You merely have to install the associated VPN app to create a protected connection in any applications you use. If you’re interested in taking advantage of this feature, be sure to view the top 3 VPNs recommended by LetMeBy here.

Conclusion

Firefox and Brave are both excellent browsers that live up to their claims of putting privacy first. They are nearly neck and neck when it comes to their implementation of most privacy features. However, Brave has an edge due to its fingerprinting capabilities and integration of Tor in its Private Window.

Overall, Brave’s user experience feels a bit more modern. Firefox has kept up but its roots as a browser that’s been around since the mid-2000s are apparent in its user interface at times. Some may notice that Brave’s performance is snappy as it utilizes RAM very efficiently.

On the other side of the coin, Firefox is well-established and widely supported. It plays nice with pretty much any website.

Crypto Isn’t Anonymous and Exchanges Are a Big Part of It

If you asked a person on the street if cryptocurrency is anonymous many would say yes.

It certainly looks anonymous. A Bitcoin address is a long string of randomly generated letters and numbers. If you were to send a friend Bitcoin you wouldn’t see their name anywhere during the process. And your friend who received it wouldn’t see who it came from.

In actuality, crypto is pseudo-anonymous. Anybody can look up an address on the public blockchain and see a full history of the transactions that have been made. They just don’t know who the people are behind those transactions.

Cybercriminals have been tracked down through their crypto addresses time and time again by blockchain forensics firms that have aided authorities. Thus, while it isn’t straightforward to associate a crypto address with a real person it can be done reliably by specialists.

The first thing you need when you get into crypto is an account at an exchange like Coinbase or Kraken. Since they’re the entry point, they’ve been given the role of making sure their customers are real people. Unfortunately, that means online privacy has become a pipedream for crypto investors.

So, Why Do Exchanges Need to Confirm Your Identity Exactly?

Crypto exchanges have been scrambling in recent years to stay compliant with government regulations. Since then, they have become more vigilant about confirming that customers are who they claim to be.

Crypto exchanges routinely ask users to provide ID and take a selfie to verify their identity. Verification could be necessary to complete any meaningful action, such as creating an account, transferring crypto to a wallet on the exchange, or withdrawing crypto.

The reasons for identity verification can be vague or even misleading on their websites.

When faced with the question of why it’s necessary, Binance puts it back on the customer. In their support center, users are met with a list of justifications. They could have accessed their account with multiple IP addresses, not completed face verification, or not enabled two-factor authentication.

Uphold simply tells customers that providing ID and a selfie helps them verify your identity, and keep their platform secure.

To give credit where it’s due, Coinbase wins for transparency on this. They confirm that the primary reason it’s done is for compliance:

“Coinbase uses identity verification in order to comply with Know Your Customer (KYC) laws. KYC is a way to identify and confirm that a customer is who they say they are. It’s a multi-step process that helps prevent the creation and use of fraudulent accounts.”

Have Regulators Taken Away Crypto’s Superpower of Pseudo Anonymity?

We’ve covered that crypto isn’t truly anonymous, but that doesn’t mean its pseudo-anonymity isn’t useful or desirable.

Cryptocurrency provides the ability to make peer-to-peer transactions that are the closest thing we have to digital cash.

Once you put an institution between you and the recipient, it takes away what’s great about crypto. One could argue that it’s even less anonymous than traditional finance when it’s used like that.

The technology itself cannot be regulated. So, exchanges and crypto on-ramps have been given the task of keeping tabs on their customers. If people keep using these services like banks to store their coins, they’ll act more and more like banks.

When Sharing Your Personal Data Isn’t Worth the Risk

The fewer exchanges that have your photo ID, the better. You may trust the company, but people need to consider the possibility of your personal data being intercepted by a nefarious third party.

Crypto exchanges are common targets for cybercriminals. And these days, the personal data of crypto investors is a valuable asset.

Be strategic about which exchanges you choose to use. Many have opened accounts to get access to hot new coins and then rarely or never accessed these platforms after the hype settled down. Determine what you need going forward and close the accounts that aren’t necessary.

Get Your Coins Off of Exchanges!

“Not your keys, not your coins” is a popular phrase used by crypto enthusiasts. When you have your crypto on an exchange, guess who controls the keys? Hint: it isn’t you.

Exchanges are not banks. They’re best used as an on-ramp and for trading and that’s it. If there’s a security event, some exchanges attempt to reimburse their customers’ losses, but it’s certainly not guaranteed nor insured by FDIC.

Finding a way to secure your coins and put them into cold storage requires technical chops, knowledge, and in some cases, the right gadgets. Additionally, crypto exchanges typically charge withdrawal fees on top of the network fees associated with the coin. Thus, there are barriers in place that make people put off securing their coins.

Whatever you have to do, it’s almost always worth it. Get your coins off of exchanges. Consider picking up a Trezor One [Amazon] or Ledger Nano S [Amazon] for long-term storage.

Conclusion

Bitcoin was created so people could be their own bank. Instead, exchanges have become the banks for crypto assets at the cost of the privacy of its holders.

It’s time to reconsider how we use crypto exchanges. Customers have to share their ID and take a selfie to confirm their identity. The question is: how safe is our personal data in their hands?

Online Privacy Has Become “Very Creepy” Says Mozilla

If you ever felt we’ve come dangerously close to George Orwell’s dystopian vision in 1984, you’re on to something. Big Brother isn’t watching but the products we use every day and the companies behind them certainly are.

They’re best known for their web browser, Firefox, but Mozilla is also an online privacy watchdog. Since 2017 they’ve been reviewing products and assessing what data is collected and who it’s being shared with.

Their annual consumer Creep-O-Meter takes all those findings, distills them, and gives you a big-picture view of the current state of digital privacy and where we’re headed.

According to the oversized, shocked emoji on their site, things aren’t looking good. The state of digital privacy is “very creepy.”

The Good News: Online Security Has Improved

The report isn’t all doom and gloom.

More companies are using encryption and giving their customers automatic updates. So, while companies are hungry for personal data, and they’re typically sharing it to make additional revenue, the data is generally sent securely. That means it’s much harder for third parties to intercept personal data illegitimately.

It’s important to remember that companies might not always make decisions that put their customers first but they’re not the threat. Rather, consumers should be most concerned about nefarious third parties that steal private data.

The Bad: Long Privacy Policies and Products that Don’t Work Offline

If you’ve skipped privacy policies, skimmed others, and occasionally read sections of them, you’re in the majority.

Insanely long privacy policies that no human possibly has time to read are the norm. If you’re ambitious enough to go through one, the legal jargon and lack of clarity may give you just as many questions as answers.

A machine learning analysis found that since 1996 the typical privacy policy has grown to over 4,000 words.

Another growing trend is products that need an internet connection to operate, with no “offline mode.”

Devices use so many online services today that it’s tricky to give people a decent user experience without the internet. And since there isn’t much incentive for companies to offer the ability to go offline, many companies have given up on the idea.

Going offline is the simplest, most effective way to protect your private data. When apps and gadgets neither offer a way to use them offline nor manage privacy settings, customers are left with a choice: accept data practices they might not be comfortable with or stop using them entirely.

New Cars Are the Creepiest Products

Perhaps the biggest shocker of all is that 100% of car makers failed to pass Mozilla’s privacy test.

If you’re looking for car brands that are slightly less aggressive about collecting and using your personal data, you won’t find much. All the big auto manufacturers are practically moving in lockstep.

Nissan won for the highest creep factor. The Japan-based company collects data about “sexual activity, health diagnosis data, and genetic information” according to Mozilla.

And when it comes to overall privacy with the most room for improvement, Tesla took the cake. Tesla was given an “X” in every category in their report about the state of privacy in car brands.

Most Gadgets Have Mics and Cameras

Perhaps it’s just too tempting to harvest data about customers when all the tools are built right into the products. Over 90% of gadgets, apps, and cars have a mic, a camera, or both.

The products with the highest “creepiness” may surprise you. Gaming consoles, smart video doorbells, smart speakers, and GPS watches were common near the top of Mozilla’s “Privacy Not Included” list.

Video call apps such as Apple’s Facetime were some of the worst when it comes to data privacy policies.

Quick Tips to Take Control of Your Privacy

  • Opt-out: When you install apps, you could be given the opportunity to limit or stop data collection and sharing. If privacy settings are available, poke around and see if you can make changes that will improve your online privacy.
  • Check permissions and deny access as needed: Android and iOS allow you to manage which apps have access to your location, contacts, camera, etc. as well as in what circumstances they’re permitted to access them. It’s a good practice to review these permissions every now and again.
  • Clear private data companies have about you: Tech companies such as Google and Meta allow you to delete your personal data they store on their servers. If you continue to use their services, they’ll resume collecting data in most cases but at least you’ll start fresh.
  • Use a VPN: Add a layer of anonymity and encryption between your device and the internet with a virtual private network. It allows you to easily hide your IP address which is one of the key ways you are identified online. Learn about the top 3 VPN services here.
  • Delete apps you’re not using: It may be surprising to some, but apps you don’t even use can still collect data about you. Old apps that haven’t received security updates may contain personal information that is low-hanging fruit for data thieves.
  • Read the privacy policy: No, not the privacy policy, right? It might be duller reading material than the phonebook, but if you use an app or product every day it’s important to know how it handles your data.

Conclusion

The smart technology we have in our homes has added efficiency to our lives and connected us to the world, but it has its costs.

More than ever companies are using their products to collect and share the personal data of their customers. The big data industry provides lucrative opportunities to manufacturers. Tough economic times have corporations looking for alternative revenue sources.

Before you set up an “always on” device in your home such as a smart speaker or smart video doorbell, consider if the upside outweighs the downside. Products in certain categories have privacy drawbacks across the board.

Casual Games like Minecraft Have Tons of Cheaters

Online shooters have a long history of issues with cheaters. When gamers start their rants about cheating, they often describe getting swiftly and unfairly shot down in Call of Duty, Fortnite, or Apex Legends.

This may be a surprise to some: Casual games actually have an even bigger problem with cheaters than shooters.

According to a recent study by Surfshark, casual titles are at the top of the list of games with the most interest in cheating methods. Minecraft, Among Us, Roblox, and The Sims 4 all made their top 10.

They created the list by adding the total number of views on YouTube videos that showed people how to cheat for a given game. It’s not the most accurate method, as a game’s ranking is just as dependent on its overall popularity as people’s intention to cheat. Still, the data gives us a good indication of the total population of cheaters in each game.

Cheaters in Minecraft

Created by the Swedish game developer Mojang Studio, Minecraft [Amazon] is a gaming sensation nobody could have predicted. It’s simple in its approach while most other popular video games embrace realistic graphics and complex storylines. In Minecraft, players build their surroundings and learn to survive and possibly thrive in pre-generated worlds.

According to the metrics tracking site Activeplayer.io, Minecraft has over 168 million active players per month. Surfshark found there were 30,560,700 YouTube views associated with cheating in Minecraft. So, if cheaters watched an average of 10 videos that would mean there are roughly 3,056,070 of them.

Minecraft offers astonishing possibilities, and for players who still want more, there are over 100,000 mods available. Mods are fun and harmless in single-player mode, but when mods are used in multiplayer it becomes a source of frustration for other players.

Cheaters in Among Us

Among Us is an online multiplayer social deduction game developed by Innersloth. It’s a murder mystery game in which one to three players are randomly chosen as imposters. Players explore a spaceship named “The Skeld,” the headquarters of the company MIRA, a research base on the planet Polus, or an Airship. You work together with online players to determine who can be trusted, and who can’t.

According to the metrics tracking site Activeplayer.io, Among Us has over 49 million active players per month. Surfshark found there were 15,984,835 YouTube views associated with cheating in Among Us. So, if cheaters watched an average of 10 videos that would mean there are roughly 1,598,484 of them.

There are two main paths Among Us cheaters can take. The first is when players covertly communicate with other players who are actually their friends. Even if the cheater’s character is dead or not on the other player’s team, they share tips about who the impostor is or who it isn’t. The second path is to hack the game. Cheaters use this method to kill everyone instantly, find out who’s an impostor, or allow their character to move insanely fast.

Cheaters in Roblox

Roblox is a game within a game. Its creator system turns everyday people into game creators. Games like Work at a Pizza Place, Hide and Seek Extreme, Pet Simulator X, and Jailbreak put players in novel scenarios they don’t experience in mainstream titles. It is community-focused in terms of competing in challenges as well. In fact, Roblox games can support up to 100 players.

According to the metrics tracking site Activeplayer.io, Roblox has over 201 million active players per month. Surfshark found there were 10,835,172 YouTube views associated with cheating in Roblox. So, if cheaters watched an average of 10 videos that would mean there are roughly 1,083,517 of them.

Roblox cheaters buy or obtain scripts that let them do things in the game that are normally impossible. These exploits allow them to fly around, walk through walls, teleport, shoot through walls, and do other strange actions.

Cheaters in The Sims 4

The Sims 4 [Amazon] is a social simulation game that replicates everyday life and makes even the mundane fun. Players can build and furnish a home for their characters aka “Sims,” dress them and send them out into the world to start their career, hang out in the city, or visit a horse ranch. Completing objectives is optional, with the main focus of the game being on making choices and exploring the interactive environment.

According to its publisher EA, The Sims 4 has over 70 million active players. Surfshark found there were 10,808,200 YouTube views associated with cheating in The Sims 4. So, if cheaters watched an average of 10 videos that would mean there are roughly 1,080,820 of them.

Players can cheat on their significant others in The Sims, but this is about the other kind of cheating! The Sims 4 features built-in cheat codes that allow players to gain money, improve their skills instantly, escape death, and a lot more. As if that wasn’t enough there’s a vast number of fan-made mods available as well.

Conclusion

Shooters and RPGs are top genres when it comes to the number of people who use exploits to cheat. However, the casual genre is king.

Cheaters typically can’t do anything to harm players outside the game, but they’re still an annoying menace.

Every popular online game has cheaters so don’t let it dissuade you from enjoying your favourite games. Most game developers work hard to make sure cheaters don’t ruin the experience for everyone.

Why New Cars are a Privacy Nightmare

What do you think about when you picture a young couple in a convertible with big smiles, sunglasses, and the wind blowing through their hair?

Many associate cars with freedom. Cars represent the freedom to go wherever you want, and experience all life has to offer.

The world has changed dramatically since that idea was established. Today’s cars are more like computers on wheels.

Savvy folks are aware of the privacy pitfalls of smartphones, social media, and online games. Far fewer think about the fact that their new car collects data about them, sells that data, and offers limited to no way to opt out of it.

Now for the cringey part: Some car manufacturers are even interested in the sex life of their customers.

How can it be this bad? Here’s a theory:

The Haze of Innovation

People are enthralled with their smart cars.

Companies like Tesla are innovating in a big way in the space, and the uptick in advancement in the industry is a relatively new phenomenon. Thus, certain realities like the lack of online privacy in new cars haven’t quite hit the average customer’s radar.

Smartphones and social media have been around long enough for the blind enthusiasm to dim. Tech companies recognize that giving people greater control of their online privacy is responsible and ultimately good for business.

Car manufacturers can get away with not-so-hot online privacy policies because it’s still the early days. However, history has taught us that eventually, consumers will demand better privacy, and in time, car manufacturers will be forced to rethink their approach.

Rapid Advancement in Auto Tech

Your first car was likely a way to get from point A to point B. My, how times have changed.

From the rise of electric vehicles to the promise of fully autonomous cars, advancement in the auto industry is incredible right now.

Electric car sales are reaching new heights. In the second quarter of 2023, nearly 300,000 EVs (fully electric vehicles) were sold in the U.S. alone.

The computers in Telsa’s vehicles are so powerful that they can run video games. And we’re not talking mobile games with low requirements. Telsa’s CEO Elon Musk demonstrated the capabilities of its Model S Plaid by playing Cyberpunk 2077 [Amazon]. He stated their computer hardware offered “PS5-level performance.”

Unfortunately, growing pains come along with the innovation.

Computer hardware and software this advanced are new things in cars. It’s going to take time to perfect the fine points. To your typical customer, online privacy doesn’t have that wow factor that software features do. And it’s the wow factor that sells cars. Thus, privacy is not a top priority for auto manufacturers yet.

Mozilla’s Study Roasts the Auto Industry for Its Approach to Privacy

A recent study on the state of privacy of car brands pulled no punches. Mozilla went as far as to say new cars are a “privacy nightmare on wheels.”

Every brand, from Ford and Volkswagen to Toyota, failed their privacy test.

Researchers found that sensors, microphones, cameras, connected devices, and phones are being deployed to gather some pretty questionable data about customers.

They put it like this: “(It) can collect deeply personal data such as sexual activity, immigration status, race, facial expressions, weight, health and genetic information, and where you drive.”

Wondering how that information can possibly relate to driving, navigating, and the services you use on the road?

Well, it doesn’t. And that leads us to the next topic: What they actually do with the data.

76% of Car Companies Sell Your Data

Corporations are always looking for new revenue centers that offset the challenges they face. And gathering data about consumers is big business.

Data is a $300 billion-a-year industry. And it employs 3 million people in the U.S.

While some of the data is used for the auto manufacturer’s own research, marketing, or business purposes, Mozilla found that 84% of them sell it or share it. It then gets into the hands of service providers, data brokers, and other businesses.

By digging deep into their terms of service, they also found that 56% can share your information with the government or law enforcement.

Car Brands Are Largely the Same with It Comes to Privacy

Mozilla created a chart that compares car brands for privacy. Companies with a failing grade were given an ‘X’ for the following categories: data use, data control, track record, security, and AI.

Brands largely weren’t that different in their approach to privacy across the board.

The major brands you’ve heard of mostly received four dings out of five. Subaru, BMW, Fiat, Jeep, Chrysler, and Dodge faired a bit better with three dings. And Tesla was the only one to get an ‘X’ in every single category.

California Probes Internet-Connected Cars

The Wild West in data practices for new cars is not going to last.

California recently revealed that privacy regulators would probe the data practices of newer cars that are connected to the internet.

The California Privacy Protection Agency was established in 2020 by a ballot initiative that beefed up the California Consumer Privacy Act of 2018.

It’s a start, and this may set a precedent for other states to follow.

Conclusion

The current CEO of Ford Motor Company revealed the following: “We know everyone who breaks the law, we know when you’re doing it. We have GPS in your car, so we know what you’re doing.”

The vast majority of people are law-abiding citizens. Do auto manufacturers really need to have this level of power to probe their customers at will?

Considering the less-than-stellar grades by Mozilla’s report, the auto industry has a thing or two to learn about using technology responsibly. Just because you can do it, doesn’t mean you should.

Once customers become more aware of data privacy in connected cars, manufacturers will be able to out-compete each other by employing better practices. Let’s hope that’s the next step in this technological revolution, rather than the big players moving in lockstep.