Adobe Flash has a long history of security vulnerabilities, but uninstalling it completely can make many sites unusable. A good middle ground is to enable click-to-play, which will allow you to selectively use Flash. You can whitelist specific websites, choose to allow all plugins on a page during a specific site visit, or just click on grey boxes with Flash content when you want to play a specific video.


You’ll want to avoid using Flash Player on sketchy sites you’ve never heard of (especially those without https), but be aware that even sites you trust can be vulnerable, since many serve content from third-party ad network partners. If a popular site is infected with malicious advertising, you’re still somewhat vulnerable, but limiting Flash usage to sites you select will lower your risk. Additionally, enabling click-to-play will improve your browsing experience by making things faster to load, improving your battery life, and by decreasing ads and pop-ups.


For specific details on how to set up click-to-play for Google Chrome and Mozilla Firefox, follow the instructions here: https://freedom.press/blog/2015/07/block-flash-with-click-to-play. Safari, Internet Explorer, or Opera are not as up-to-date as other browsers, but if you need to use them for work, you can still use click-to-play by following the instructions here: http://www.howtogeek.com/188059/how-to-enable-click-to-play-plugins-in-every-web-browser/

Yael Grauer is a freelance tech journalist covering online privacy and surveillance for WIRED, Forbes, Slate, and other publications. Find her at http://yaelwrites.com or on Twitter @yaelwrites, and check out her free ebook on staying safer online at https://yaelwrites.com/saferonline.pdf.

Check out more digital hygiene tips:

  1. Removing public data
  2. Privacy protection on domain names
  3. Https everywhere
  4. Anonymous “Tor” cloak or VPN
  5. Prepare for a DDos attack
  6. Two-step verification
  7. Privacy plug-ins/cookies
  8. Third-party permissions
  9. Image “hidden pixels”
  10. Links and attachments
  11. Install patches and updates
  12. Use a password manager/strong password
  13. Strengthen security questions
  14. Encrypt hard drive/backup data
  15. Click to play
  16. Use end-to-end encryption

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s