• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » How to Decrease the Chance of Data Theft Via Indian Government

By Abhishek Ghosh April 1, 2018 8:02 am Updated on April 1, 2018

How to Decrease the Chance of Data Theft Via Indian Government

Advertisement

Indian Government can not recruit high end brains is a good point but there is no reason to feel that Indian Government employees are morons. Highly intelligent crook may fake as moron. Proof Does Not Exist By Certain IT Habits Decrease the Chance of Hacker Intrusion. Exactly Like the Era Before Edward Snowden in America, it is Not Possible To Proof That Your Data is Stolen. Here is How to Decrease the Chance of Data Theft Via Indian Government. Via means where Indian Governmental System is not directly selling data. As the persons who works as employees or are third parties, they can simply deliberately keep backdoor to help the hacker. Your data has value as your future generation can earn significant and their security is important. It is good habit to keep an eye on Richard Stallman’s personal website (stallman.org) and official websites of Free Software Foundation (FSF) and GNU. Their sayings, methods will be perfect than that of ours. Principle of security is increasing difficulty to retrieve data to trace back. Indians still have some ways to avoid mass surveillance, data theft which Americans possibly does not have. There are zillion of articles on possible mass surveillance procedures by Indian Government :

Vim
1
2
3
https://en.wikipedia.org/wiki/Mass_surveillance_in_India
https://www.quora.com/What-is-the-status-of-government-surveillance-in-India
https://www.ibtimes.co.uk/indias-proposed-mass-surveillance-programme-seen-blow-internet-freedom-1605802

It is not our opinion that Indian Government can act to help data theft, mass surveillance, the ideas are nothing new and published on notable websites.

 

How to Decrease the Chance of Data Theft Via Indian Government

 

Many a times we suggest to restrict usage of non-Free Software and Non-Libre/Non Open Source Hardware. Minimize using all listed suspected American companies related to PRISM and listed by Richard Stallman :

Advertisement

---

Vim
1
https://stallman.org/

Avoid using smartphone running Android, specially do not roam with a Smartphone. Google can have relationship with American Government to supply your movement and co-share your data with Indian Government. It is normal to have an itching to use navigation Google Maps with car. You can use just an image map and Open Source hardware made GPS to find your location. Navigation with Google Maps is better restricted to risky places like trekking.

Avoid using all possible digital payments and use cash to pay. Prefer real life purchase over online shops. When you are purchasing a product with whatever digital way, your location data and habit of purchase can be recorded. There are agents who works to pay your bills, it is convenient and confusing to data collection system when you work via agents. You can withdraw money from your bank using demand draft or cheque to pay the agents.

In order to increase your data security, you need to spend more, your apparent convenience becoming lesser.

Most important way of mass surveillance is packet sniffing via internet service provider. You have these vulnerable layers :

  1. ISP
  2. JavaScript on websites and Apps
  3. Your computer hardware
  4. Your computer operating system
  5. The software you are using

To make the security higher, we need public Wi-Fi or internet in some way which does not trace back to who is paying. It is difficult work to find such way.

To avoid JavaScript on website, we can use command line tools like wget, curl to download a webpage and read offline. There are also some text based browsers which are Free Software, we talked about Links browser. You should avoid downloading images unless there is need – we can track images from CDN.

Using really working VPN costs higher and very difficult to setup. Suppose, if our connection from ISP is to server in America via SSH, then from that server connection is to server in Sweden, then from Sweden the connection uses a VPN, the connection becomes slower but becomes costly to trace back. Of course, you have to chance the server providers and servers regularly else whole month’s data will be easy to trace out.

It is beyond doubt that using a safer GNU/Linux provides security. Hardware backdoor is worst enemies of security which open source hardware breaks down to easy ways.

Tor provides safety, but safety is only when the above basic security protocols are followed.

Avoid bigger shopping malls with surveillance cameras. If you purchase good number of items from a wholesale dealer, normally you’ll get rebate. 50-70% discount exists only for older stock and defective items.

Do not keep huge money on “wallets”. Laws of succession of those are not easy. If you suddenly die, it will be difficult to get back those money.

If you use smartphone for various payments, use from one location only, try to use fake locations. It is good if you have multiple houses – of course it is not safe to pay in the house you live.

How to increase savings? There are peoples who buy certified gold coin. You can buy from them with original receipt and packaging. They makes profit with long term investment. Ornamental gold is not of bullion grade and invariably there will be lesser return of investment. Gold and land are always great as long term investment.

How to Decrease the Chance of Data Theft Via Indian Government

 

How Black Hat Hacker Decrease the Chance of Data Theft

 

They are experts of networking and electronics. They can run Man-in-the-Middle Attack on various Government servers and use them as their servers to protect identity. It is not possible for general work to use their ways which they employ for defacing Government websites. If few military servers used in that way, it becomes very difficult to retrieve data to find out person. Hackers exploit human nature of suspiciousness. It is funny to watch defacing of Governmental websites but it is not funny if they find a backdoor of a financial institution and empty your account.

 

Why Governments Are Running Behind to Steal Data?

 

These Governments are not of good monarchs who won war with sword fight. These Governments are not families but persons. Some persons can have immediate intention to supply data for marketing analysis. Long term target can be watching a family for their lands, gold. Some family virtually become free of successors after a time, after many natural deaths. Those families worked in Government can watch those families for many generation to somehow get grip on their properties. We are seeing only one person of a family in a post. We can not calculate about their forefathers & their dangerous distant relatives. It is not possible to think out all ways for a gentleman. They will say that Donald Trump’s forefathers whipped humans to earn huge, they need “democracy”. Their target is Donald Trump’s forefathers wealth.

 

Conclusion

 

Neither we have intention to make the readers apprehensive psychotic nor fuel them to take gun. Our essential work is to warn you of “bad technologies”, “risk technologies” which may potentially abused. It is quite risky to publish these kind of articles. Few years back an Indian newspaper reporter made contact with author (he is Wikipedia admin of a regional language Wikipedia) followed by email from US Senate for “informal tea meeting” with consulate general to discuss impact of social network. US Government actually read the articles published on this website against mass surveillance by NSA. We told you how they try to analyze persons.

We are amazed to watch that general Indian citizens has increased awareness of data theft. Government is publishing “Aadhaar is safe” is pathetic idea to broadcast that some peoples has doubt of data of finger print & eye scan :

Vim
1
https://www.businesstoday.in/current/economy-politics/aadhaar-uidai-face-authentication-id-safety-feature-july-1/story/268085.html

As next steps of awareness, citizens should know about Richard Stallman, Edward Snowden, Free Software, Open Source Hardware to silently fight. It is unforgettable how Facebook, Google denied of supplying data to US Government in PRISM the day before Edward Snowden’s information was made public.

This Article Has Been Shared 253 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to How to Decrease the Chance of Data Theft Via Indian Government

  • What is DANE Protocol?

    What is DANE Protocol? DANE is a network protocol intended to secure in a way so that the used certificates of domain can not be substituted.

  • iptables Basics : Chapter 1

    IPTables Basics Chapter 1 is Intended For the New Blank Cloud Server or Dedicated Server Users. It is Must to Read Before Executing Commands.

  • iptables Basics : Chapter 2, Fail2Ban

    This is Era of Automation. iptables Rules Can Be Automated With Interactive Package Fail2Ban Which iptables Basics Chapter 2 Will Explain.

  • What is CAA DNS Record And How to Add?

    CA/Browser Forum voted to make CAA mandatory which be in action by September 2017. Here is Our Guide Around CAA DNS Record And How to Add It.

  • HTTPS Everywhere Atlas Vs HSTS Preload List

    In This Article We Have Explained Real Life Matters Around HTTPS Everywhere Atlas Vs HSTS Preload List For the WebMasters and Developers.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023
  • What is a Data Mesh? January 25, 2023
  • What is Vehicular Ad-Hoc Network? January 24, 2023
  • Difference Between Panel Light, COB Light, Track Light January 21, 2023

About This Article

Cite this article as: Abhishek Ghosh, "How to Decrease the Chance of Data Theft Via Indian Government," in The Customize Windows, April 1, 2018, January 29, 2023, https://thecustomizewindows.com/2018/04/how-to-decrease-the-chance-of-data-theft-via-indian-goverment/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT