Как уменьшить цифровой след в интернете: несколько действенных способов

When registering on social networks and applications, it is better to use a specially created email and phone number

It is impossible to completely hide your activity on the Internet, but you can make it less noticeable. To do this, you need to use a specially created email and phone number when registering on social networks and applications. This was stated by Ilona Kokova, leading system architect of information security at MTS Web Services.

A digital footprint is information that a person leaves about themselves and their actions on the Internet. Visiting websites, posting on social networks, communicating on forums, subscribing to newsletters, filling out online forms - all this forms an active digital footprint.

It is impossible to completely hide your activity on the network, but you can try to reduce the amount of information. When registering on social networks and applications, you should use a specially created email address and a separate phone number. It is recommended not to publish too much personal information, and even better - to make your profile private and delete old accounts, as well as unsubscribe from unnecessary mailings.
Ilona Kokova, leading system architect of information security at MTS Web Services

To protect your data, you can prohibit saving cookies and browsing history on websites. Use only secure sites with HTTPS. Regularly clear advertising settings on your phone, in browsers, and social networks. Avoid public Wi-Fi networks and turn off GPS and Bluetooth when they are not needed.

Several methods are used to collect a digital footprint:

  1. Cookies on websites remember how you registered and which pages you viewed.
  2. Analyzing IP addresses helps determine your location and Internet provider.
  3. Beacon devices transmit signals that can be received through mobile applications or Bluetooth/Wi-Fi. They collect information about your activity in programs and send notifications about discounts and events.

Earlier it became known that attackers are increasingly hacking smart devices in homes. They find weaknesses, guess passwords, download malware, and turn gadgets into part of a large network controlled by hackers. Infected devices begin to "act" without the knowledge of their owners. For example, they can send requests to advertising sites to increase the number of clicks, or arrange DDoS attacks, overloading servers.

Read materials on the topic:

The longest DDoS attack in 2024 lasted more than four days

Fraudsters attack Russians through secret Telegram chats

T-Bank has implemented the domestic authentication system Safetech instead of Microsoft keys

"Stopfake": Muscovites will test a service to protect against cyber fraud