Tools and tasks
In the field of security, it is essential to be able to back up your data securely. Backup is now supported by all standard operating systems within system applications, so the key is to choose the location or media to which you want to back up. Alternative tools include Bvckup 2, Aomei Backupper, and Acronis True Image. If you are backing up only selected documents that are not too large, cloud storage such as Google Drive or OneDrive may be a good choice.
Interestingly, users sometimes deal with backing up a regular computer, but they pay much less attention to mobile devices. While in the case of iOS, iCloud takes care of synchronization (and therefore also the backup), if it has enough space for Android, it is necessary to set up backup.
It is also helpful if the data, especially sensitive data, is encrypted so that no unauthorized person can access it. It is possible to use VeraCrypt, BitLocker, or Crypt4Free (but also many others), which allow you to encrypt files or entire disks efficiently. Such protected data can then be backed up, for example, to cloud storage (for example, Mega.nz can be considered an extremely secure option), which supports end-to-end encryption. This ensures that the server operator does not have access to the data or only to their encrypted form.
Passwords are a significant weakness in security. While on mobile phones, it is already quite common for authentication to use a fingerprint in typical applications or web services. One of the possible (and often usable) solutions is to use a digital keychain, which is used to store passwords. For such work, you can use, for example, LastPass, KeePass, or Bitwarden. These applications are suitable because you can then work with long and demanding passwords and easily use almost any number of passwords, for example, for each online service. In the event of a password leak on the part of a specific service, the security risk is minimized.
It is advisable to consider when it pays to use incognito mode within web browsers, which does not store any browsing information. However, at the same time, the user is still relatively well localized or identifiable by IP for servers. However, there is no long-term storage of cookies. However, it is possible (and appropriate) to control or regulate them in a certain way. Examples are browser add-ons, such as the robust EditThisCookie for Chrome or the simple Vanilla Cookie Manager and Cookie Manager.
It is possible to use the so-called digital identity systems for single sign-on to the services - today, the most widespread Google account and Facebook account, but if you want to work more with your privacy, you can use MojeID or international OpenID. These tools provide the ability to log in to various services without giving a password to those services. All you have to do is log in to your digital identity system.
In terms of ensuring anonymity on the Internet, it is possible to use technologies that are associated with Onion routing, especially the Tor network. It is not possible to trace the IP address and, therefore, the identity of the user. It thus becomes anonymous not only for the server to which it wants to connect but also for someone who wants to monitor network traffic (for example, a national regulator, secret service, etc.). It is also possible to connect to Tor via Tor Browser, which makes all network browsing both easy and anonymous at the same time.