Now Reading
Using Sandbox to prevent keylogging and data tracking

Using Sandbox to prevent keylogging and data tracking

by irleaksOctober 14, 2015

Sandboxing is an important security technique that isolates programs, preventing malicious or malfunctioning programs from damaging or snooping on the rest of your computer. The software you use is already sandboxing much of the code you run every day.

You can also create sandboxes of your own to test or analyze software in a protected environment where it won’t be able to do any damage to the rest of your system.

We use  360 total security for Windows and for Linux there is an app too , there are even apps for your Smartphone.

Facebook is the biggest culprit besides the NSA in keylogging and data tracking.  You need to protect yourself.  For Android we use tinfoil for Facebook, which is a dedicated facebook and facebook messaging app fully sandboxed.

For Windows 360 total security has a toolbox,  you can click sandbox and run any app that accesses the internet.  How do you think Snowden is tweeting.  He is using sandbox program, and a private secure web browser and probably using tails, onion and tor all together behind some firewall.

We have different browsers for different applications.  For google mail, we only use one chrome broswer sandboxed in private mode.  We have another browser (firefox) we use for web browsing anything, sandboxed in private mode. For Facebook we use palemoon browser sandboxed in private browsing and for Twitter, we use comodo dragon browser in private browsing sandboxed.

We go to 360 total security, toolbox, sandbox and open our app, one at at time.  If you are using tails, this process is even more secure, because tails, using onion and tor to secure your network.

Never, Never use gmail, or twitter, or facebook, or web browsing in the same browser with any combination.  This will double protect everything you are doing from spying eyes.

We have even installed keylogging protection software on our Windows machines.  If we are doing anything totally secure, like encrypted emails, chating, we use the tails USB or tails installed on a computer.  For files we never want anyone to have access to, we use a tails based laptop that has never been connected to the internet.

Doing these things helps you keep your information private.

For more information read our document 

About The Author