{"id":6680,"date":"2023-05-30T12:02:31","date_gmt":"2023-05-30T09:02:31","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=6680"},"modified":"2023-05-31T12:03:35","modified_gmt":"2023-05-31T09:03:35","slug":"turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/","title":{"rendered":"Turning on stealth mode: 5 simple strategies for staying under the radar online"},"content":{"rendered":"\n<p>We\u2019ve all lost count of how many times we\u2019ve entered our email address and phone number to sign up for an online service, access a website or an app, read the news or log into any of the social media accounts most of us have. Put bluntly, our contact information is all over the internet.<\/p>\n\n\n\n<p>At the same time, being safe and private online can be hard work and time-consuming, mainly if we have to think about managing settings and what information we want to share every single time we&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/01\/27\/tick-box-what-consider-agreeing-privacy-policy\/\">sign up for a new service<\/a>&nbsp;or make an online purchase. It becomes overwhelming and could definitely be made more efficient.<\/p>\n\n\n\n<p>Can we make it easier? Just like taking Sunday evening to prep some meals for the week, we can spend some time today to protect our online privacy for the months ahead!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Disposable and temporary: the art of online camouflage<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Temporary email address and a secondary inbox<\/h3>\n\n\n\n<p>As most websites require an email address to register, most of us will simply enter our primary email address. Why would we need more than one inbox anyway? The reality, however, suggests otherwise. When we register a new account or even just input our email to access restricted content, we are most often also agreeing to the transfer of our contact information from a certain service to another for marketing purposes.<\/p>\n\n\n\n<p>But it doesn\u2019t have to be that way. What to do instead?<\/p>\n\n\n\n<p><strong>Strategy 1:<\/strong>&nbsp;Use a disposable email address \u2013 for things you don\u2019t really care that much about.<\/p>\n\n\n\n<p>A number of disposable email services let you use a temporary email that self-destructs after a set period of time. This comes in particularly handy for one-time use, for example when you are asked to submit an email address to access restricted content, but don\u2019t necessarily want to run the risk of being bombarded by marketing communications and spam.<\/p>\n\n\n\n<p>A caveat applies, however, and we can\u2019t stress this enough: it\u2019s not a good idea to use these services for any communications that may involve truly sensitive data.<\/p>\n\n\n\n<p><strong>Strategy 2:<\/strong>&nbsp;Create a secondary email address for logins and important newsletters.<\/p>\n\n\n\n<p>For all government, banking and other key contacts, use an end-to-end encrypted email service as&nbsp;<a href=\"https:\/\/proton.me\/mail\" target=\"_blank\" rel=\"noreferrer noopener\">ProtonMail<\/a>. Don\u2019t use your primary email address for anything other than staying in touch with your friends and family. This will keep your inbox organized, free of spam and protected from data leaks in case a service you\u2019re registered with suffers a data breach.<\/p>\n\n\n\n<p>Alternatively, you can also use a feature such as&nbsp;<a href=\"https:\/\/support.apple.com\/en-us\/HT210425\" target=\"_blank\" rel=\"noreferrer noopener\">Apple\u2019s Hide My Email<\/a>&nbsp;to sign up for a service without giving away your real email. Apple creates a unique address that masks your real address and provides it to the service you\u2019re signing up to. All emails will then be forwarded automatically from the masked account to yours. While Android does not yet offer a similar feature, there are a few alternatives, such as&nbsp;<a href=\"https:\/\/relay.firefox.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Firefox Relay<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The burner phone number<\/h3>\n\n\n\n<p>Along with email addresses, your phone number is a must-have to register and log into a number of websites, to receive timed passwords that confirm your identity or even for online retailers to hand over your contact details to delivery services.<\/p>\n\n\n\n<p>All in all, your phone number is everywhere, so no wonder most of us already receive random texts and&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2023\/03\/10\/common-whatsapp-scams-how-avoid\/\" target=\"_blank\" rel=\"noreferrer noopener\">WhatsApp scam<\/a>&nbsp;attempts.<\/p>\n\n\n\n<p><strong>Strategy 3:<\/strong>&nbsp;Get a cheap prepaid SIM card.<\/p>\n\n\n\n<p>Usually, this is a cheap card that you only have to top up with a few bucks every few months to keep it on and, in most countries, you are not required to show an ID to use it. The purpose is to use this phone number for all your online needs: You can link it to social media accounts, use it for parcel tracking numbers, share with potential dates you meet online and use it for general anonymity.<\/p>\n\n\n\n<p>Meanwhile, your real primary number should only be shared with family, friends and government or financial institutions. Because you use the burner number for your online purposes, if you get a call, you can immediately assume it is a scam and, most likely, some website you were registered at suffered a data breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Single-use bank cards<\/h3>\n\n\n\n<p>Buying online can be really convenient, no doubt! We just need to enter the website, choose what we want and usually we already have our banking card details stored from a previous purchase. All good. Unless there\u2019s a data breach affecting the details saved on that website that compromises our card details or we fall victim to a&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2023\/01\/17\/venmo-scams-how-stay-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">nasty social engineering scam<\/a>!<\/p>\n\n\n\n<p><strong>Strategy 4:<\/strong>&nbsp;Go for single-use, virtual cards.<\/p>\n\n\n\n<p>Many banks, mainly those based on mobile applications, offer virtual cards instead, or as an additional option on top of the physical card. And most of these banks will also offer disposable single-use cards that are connected to your real card. Once you&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/11\/25\/know-payment-options-how-shop-pay-safely-holiday-season\/\">make a purchase with a single-use card<\/a>, the bank system will detect the movement, destroy those card details and automatically generate new ones ready for the next purchase. Because this is a randomized card, hackers won\u2019t be able to track your real information.<\/p>\n\n\n\n<p>And in case you\u2019re wondering about refunds, the sellers can still return the money through the same single-purchase card details to your account.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/05\/disposable_card_revolut.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/05\/disposable_card_revolut-472x1024.png\" alt=\"\" class=\"wp-image-173733\"\/><\/a><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Two-factor authentication and one-time codes<\/h3>\n\n\n\n<p>Most online services these days allow \u2013 and recommend \u2013 the use of&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2019\/12\/13\/2fa-double-down-your-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a>&nbsp;(2FA). That is, apart from entering your password, you can also be required to perform an extra authentication step. This way, if someone steals your password, they still won\u2019t be able to log in without the 2FA code in their hands.<\/p>\n\n\n\n<p><strong>Strategy 5:<\/strong>&nbsp;Use app-generated 2FA passcodes.<\/p>\n\n\n\n<p>Most often, 2FA involves sending an SMS message to your phone number (hopefully your burner phone) with a one-time passcode (OTP). You only need to type it in where requested to prove your identity. Another \u2013 and better \u2013 way relies on using authentication apps such as Microsoft Authenticator. Under their privacy settings, most websites offer the possibility to generate a QR or alphanumeric code that can be input on the authenticator app; in turn, the app will generate a temporary code that works just like an OTP.<\/p>\n\n\n\n<p>This second method is something you might want to get used to \u2013 and not just because&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2023\/03\/20\/twitter-free-sms-2fa-secure-account\/\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter stopped supporting SMS-borne 2FA for non-paying users<\/a>&nbsp;recently.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.welivesecurity.com\/2023\/05\/10\/stealth-mode-5-simple-strategies-staying-under-radar-online\/microsoft_authenticator_login\/\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/05\/microsoft_authenticator_login-472x1024.png\" alt=\"\"\/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.welivesecurity.com\/2023\/05\/10\/stealth-mode-5-simple-strategies-staying-under-radar-online\/google_authenticator_login\/\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2023\/05\/google_authenticator_login-472x1024.png\" alt=\"\"\/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Let\u2019s recap!<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create temporary email accounts for when you need to cross a restricted content wall that requests your email address for further access.<\/li>\n\n\n\n<li>Use a reputable email provider, such as Gmail or Outlook, to create a secondary account that you use for online services and website signups.<\/li>\n\n\n\n<li>Get a burner number to avoid getting SMS and scam calls.<\/li>\n\n\n\n<li>Use virtual disposable banking cards that are self-destroyed after a single use.<\/li>\n\n\n\n<li>Use one-time codes for two-factor authentication on top of a&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/videos\/make-strong-password\/\" target=\"_blank\" rel=\"noreferrer noopener\">strong and unique password<\/a>.<\/li>\n<\/ul>\n\n\n\n<p>Embracing your online privacy as part of your normal routine will make it feel seamless and natural, taking away the feeling of burden and constant doubt about whether you\u2019re doing enough to protect your digital life. Overall, using email addresses, phone numbers and cards that are not directly linked to you is also a great way to&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2022\/08\/23\/personal-data-all-over-internet-7-steps-cleaning-up-online-presence\/\" target=\"_blank\" rel=\"noreferrer noopener\">minimize your digital footprint<\/a>&nbsp;and slash the risk of being the&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2021\/11\/22\/what-do-if-you-receive-data-breach-notice\/\" target=\"_blank\" rel=\"noreferrer noopener\">victim of a data breach<\/a>&nbsp;or scam. Finally, there\u2019s just as much we as users can do to prevent malicious activity; it is always advisable to use digital security software that protects you from other potential risks and attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve all lost count of how many times we\u2019ve entered our email address and phone number to sign up for an online service, access a website or an app, read the news or log into any of the social media accounts most of us have. Put bluntly, our contact information is all over the internet.<\/p>\n","protected":false},"author":5,"featured_media":6683,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[167],"tags":[],"class_list":["post-6680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Turning on stealth mode: 5 simple strategies for staying under the radar online - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Turning on stealth mode: 5 simple strategies for staying under the radar online\" \/>\n<meta property=\"og:description\" content=\"We\u2019ve all lost count of how many times we\u2019ve entered our email address and phone number to sign up for an online service, access a website or an app, read the news or log into any of the social media accounts most of us have. Put bluntly, our contact information is all over the internet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-30T09:02:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T09:03:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/05\/1200x628.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Turning on stealth mode: 5 simple strategies for staying under the radar online\",\"datePublished\":\"2023-05-30T09:02:31+00:00\",\"dateModified\":\"2023-05-31T09:03:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/\"},\"wordCount\":1296,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/1200x628.jpg\",\"articleSection\":[\"privacy\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/\",\"name\":\"Turning on stealth mode: 5 simple strategies for staying under the radar online - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/1200x628.jpg\",\"datePublished\":\"2023-05-30T09:02:31+00:00\",\"dateModified\":\"2023-05-31T09:03:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/1200x628.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/1200x628.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Turning on stealth mode: 5 simple strategies for staying under the radar online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/05\\\/30\\\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Turning on stealth mode: 5 simple strategies for staying under the radar online - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/","og_locale":"en_US","og_type":"article","og_title":"Turning on stealth mode: 5 simple strategies for staying under the radar online","og_description":"We\u2019ve all lost count of how many times we\u2019ve entered our email address and phone number to sign up for an online service, access a website or an app, read the news or log into any of the social media accounts most of us have. Put bluntly, our contact information is all over the internet.","og_url":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2023-05-30T09:02:31+00:00","article_modified_time":"2023-05-31T09:03:35+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/05\/1200x628.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Turning on stealth mode: 5 simple strategies for staying under the radar online","datePublished":"2023-05-30T09:02:31+00:00","dateModified":"2023-05-31T09:03:35+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/"},"wordCount":1296,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/05\/1200x628.jpg","articleSection":["privacy"],"inLanguage":"en-US","copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/","url":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/","name":"Turning on stealth mode: 5 simple strategies for staying under the radar online - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/05\/1200x628.jpg","datePublished":"2023-05-30T09:02:31+00:00","dateModified":"2023-05-31T09:03:35+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/05\/1200x628.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/05\/1200x628.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Turning on stealth mode: 5 simple strategies for staying under the radar online"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/05\/30\/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=6680"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6680\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/6683"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=6680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=6680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=6680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}