{"id":9700,"date":"2015-09-03T09:30:56","date_gmt":"2015-09-03T13:30:56","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=9700"},"modified":"2020-02-26T11:02:46","modified_gmt":"2020-02-26T16:02:46","slug":"securing-intimate-activities","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/securing-intimate-activities\/9700\/","title":{"rendered":"Securing intimate activities: Don&#8217;t let your spicy stories leak online"},"content":{"rendered":"<p>The Ashley Madison scandal reached its peak when <a href=\"https:\/\/www.kaspersky.com\/blog\/ashley-madison-data-finally-leaked\/9620\/\" target=\"_blank\" rel=\"noopener nofollow\">hackers published private users data on the darknet<\/a>. Allegedly <a href=\"http:\/\/www.reuters.com\/article\/2015\/08\/24\/ashleymadison-cybersecurity-idUSKCN0QT1OH20150824\" target=\"_blank\" rel=\"noopener nofollow\">two suicides followed the incident<\/a> and the sticky situation turned out to be fatal. We can giggle unstoppably about cheaters receiving just deserts but no one has canceled the inalienable human right to privacy.<\/p>\n<p>Whoever you are \u2014 an official hiding an affair, a decent citizen logging on a dating site or even a free-thinking spouse buying a new sex toy for a partner \u2014you\u2019d prefer to keep these private. Here are 6 simple steps on how not to get discovered the next time you have fun.<\/p>\n<p>https:\/\/twitter.com\/kaspersky\/status\/634349398198218752<\/p>\n<p><strong>1. Never use your main email or corporate email addresses<\/strong>. In case of data leak your colleagues might be surprised to find you in the list of fun-loving people. If you have an official position, inquisitorial Internet nerds will surely browse through the leaked data and reveal their findings \u2014 just as they did with the Ashley Madison clients.<\/p>\n<p>https:\/\/twitter.com\/MisterMetokur\/status\/633748154450513921<\/p>\n<p><strong>2. If possible, pay in cash or use gift card<\/strong>s (bought beforehand with cash) to be sure that a seller does not record your name and address and you preserve the anonymity. At least, you can use a one-time virtual card to protect your main card account from hackers.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Why Germans pay cash for almost everything <a href=\"http:\/\/t.co\/CPXRSfEY4e\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/CPXRSfEY4e<\/a> <a href=\"http:\/\/t.co\/HeJ1W9h8Zh\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/HeJ1W9h8Zh<\/a><\/p>\n<p>\u2014 Quartz (@qz) <a href=\"https:\/\/twitter.com\/qz\/status\/609289370785460225?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 12, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>3. Linking your profiles on a website with your Facebook and\/or Instagram accounts is not a very good idea<\/strong>. Mainly because of burglars and fraudsters. People often post status updates when they go on vacation, check in at the airport or publish photos with newly bought goods, <a href=\"http:\/\/timesofindia.indiatimes.com\/life-style\/home-garden\/Burglars-might-check-into-your-house-too\/articleshow\/47488667.cms\" target=\"_blank\" rel=\"noopener nofollow\">including jewelry<\/a> and gadgets. Doing this is a perfect way to <a href=\"http:\/\/www.ibtimes.com\/how-burglars-use-facebook-target-vacationing-homeowners-1341325\" target=\"_blank\" rel=\"noopener nofollow\">invite burglars into your house<\/a> or ask a fraudster out to a date. Maybe, it\u2019s time to think of <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-privacy-settings-video\/4623\/\" target=\"_blank\" rel=\"noopener nofollow\">fortifying your Facebook with proper privacy settings<\/a>?<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Posting your vacation details on Facebook could open your home to burglars. <a href=\"http:\/\/t.co\/B7nafAqGYy\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/B7nafAqGYy<\/a><\/p>\n<p>\u2014 Intl. Business Times (@IBTimes) <a href=\"https:\/\/twitter.com\/IBTimes\/status\/355326921900433412?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 11, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>4. If you need super privacy, don\u2019t use your real surname<\/strong>. Restrict yourself to a name only or choose a nickname. Having your last name and photo, anybody can easily find you on Facebook. Or LinkedIn. You can keep your FB profile private, but it doesn\u2019t make sense when it comes to LI.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Securing intimate activities: Don\u2019t let your spicy stories leak online #privacy #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FpBo2&amp;text=Securing+intimate+activities%3A+Don%26%238217%3Bt+let+your+spicy+stories+leak+online+%23privacy+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>5. Don\u2019t believe people on a dating site<\/strong>. A sexy blonde can easily turn out to be a bored bearded man or robot. Do you remember the <a href=\"http:\/\/gizmodo.com\/almost-none-of-the-women-in-the-ashley-madison-database-1725558944\" target=\"_blank\" rel=\"noopener nofollow\">actual number of women on Ashley Madison<\/a>? Of the sdvertized 37 million registered users, only about 12,000 of active accounts belonged to real women. Most of the others, as it turned out, were either men or bots.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">EXCLUSIVE: Meeting a woman on <a href=\"https:\/\/twitter.com\/hashtag\/AshleyMadison?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#AshleyMadison<\/a> as likely as 2026 World Cup in space <a href=\"http:\/\/t.co\/VpMnnKlpp5\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/VpMnnKlpp5<\/a> <a href=\"http:\/\/t.co\/XqRQErV3UP\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/XqRQErV3UP<\/a><\/p>\n<p>\u2014 The Sun (@TheSun) <a href=\"https:\/\/twitter.com\/TheSun\/status\/637659225817284608?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 29, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>6. Many companies would try to fish your personal data out of your browser<\/strong>, including search history, location and other private things. And they would not ask your permission. Want to stop them? The best measure you can take is to rely on professional solutions. And of course, <a href=\"https:\/\/www.kaspersky.com\/advert\/multi-device-security?redef=1&amp;THRU&amp;reseller=gl_KDpost_pro_ona_smm__onl_b2c_kasperskydaily_lnk____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> is quite the catch, because its Private Browsing feature guarantees that your personal data will not leave your device until you permit it.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The superpower of protection: Kaspersky Lab 2016 product line is here <a href=\"https:\/\/t.co\/8R0wgJaw2w\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/8R0wgJaw2w<\/a> <a href=\"http:\/\/t.co\/mdvJBo82Pv\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/mdvJBo82Pv<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/626777461523652608?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 30, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Unfortunately, the majority of dating sites, intimate shops and other piquant web resources have very poor security. If they cannot offer safety we should care about it on our own \u2014 or regret of our frivolity afterwards.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rulebook for freethinking people: how not to get made the next time you log on Ashley Madison or buy goods in a sex shop online.<\/p>\n","protected":false},"author":522,"featured_media":9702,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1788,9],"tags":[1210,1167,78,961,43,914,192,97,1168],"class_list":{"0":"post-9700","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"category-tips","10":"tag-ashley-madison","11":"tag-dating-sites","12":"tag-hackers","13":"tag-leaks","14":"tag-privacy","15":"tag-private-data","16":"tag-protection","17":"tag-security-2","18":"tag-sensitive-data"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/securing-intimate-activities\/9700\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/securing-intimate-activities\/5911\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/securing-intimate-activities\/6147\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/securing-intimate-activities\/6750\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/securing-intimate-activities\/6504\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/securing-intimate-activities\/8758\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/securing-intimate-activities\/5337\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/securing-intimate-activities\/5665\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/securing-intimate-activities\/6081\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/securing-intimate-activities\/8766\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/securing-intimate-activities\/8758\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/securing-intimate-activities\/9700\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/securing-intimate-activities\/9700\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ashley-madison\/","name":"Ashley Madison"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=9700"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9700\/revisions"}],"predecessor-version":[{"id":33555,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/9700\/revisions\/33555"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/9702"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=9700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=9700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=9700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}