Hey there, digital warriors! Ever feel like your every click, search, and even your late-night meme scrolling is being tracked? Well, spoiler alert: it probably is. Welcome to some notes and refreshers from "Data Defiance: Taking Back Your Internet Privacy." So, strap on your tinfoil hats, or... you know, just your regular headphones, and let's dive into the murky waters of online privacy and security.
Privacy Basics: The Creepy Crawlies of Data Collection
Ever get that unnerving feeling when your phone suggests you need new socks? That’s just the tip of the data iceberg. Let’s break it down.
- Data Harvesting: This is the casual eavesdropping of the digital world. Think of it as data salad - your internet searches, social media use, and app activity all tossed together, usually without you truly realizing you signed the consent form.
- Data Mining: Picture a digital private detective snooping around for tidbits of information, using bots to gather specific data straight from the source.
- Data Aggregation: This is where all the juicy info gets compiled into a rich profile, the digital equivalent of a celebrity bio. Your data is collected, merged, and voilà, you're now a product information merchants can buy and sell.
Secure Yourself: Passwords and Two-Factor Authentication
Ready to take back control? Start with your passwords. No more birthdays or pet names, folks. Aim for random sequences, unless your cat’s name is XyZ#1234*@!, in which case, you’re golden. Better yet, use a password manager to keep your digital keyring safely locked away. There are links to a couple after this post.
Next up, embrace two-factor authentication like it’s the air you breathe. When logging in, it’ll ask for something you physically have, like a text on your phone. Think of it as an extra bouncer outside your digital club.
The Great Wall of Secure Communications
Texting is modern-day Morse code, but not all messages are as secure as you’d hope. Ditch SMS and MMS for an encrypted messaging app like Signal for some spy-level secrecy. And for email, consider encrypted services like ProtonMail. They’re like mailing a postcard in an iron vault.
Navigating the Web: Browsing, Searching, & VPNs
Surfing the web is akin to walking naked in Times Square – you’re seen a lot. Cover up with a VPN, your personal digital invisibility cloak. It masks your IP address and encrypts your data – like making your digital diary gibberish to prying eyes.
When searching, choose private search engines like DuckDuckGo. If your searches are a digital footprint, this is an eraser, wiping away advertisers’ and data brokers’ ability to track your every move.
Social Media: Privacy Settings Bootcamp
Ah, social media, the joyous theater of oversharing. Dive deep into privacy settings and tighten them up. It’s like childproofing your home, but for meddling marketers. Don’t post your home address or vacation plans – keep some mystery alive.
Portable Privacy: Phones & Devices
Your phone is a pocket spy that tattles. Lock it with a PIN, not with a thumbprint of face ID (especially if you fear muggings). If you use “Find My” features, know they’re both a boon for retrieving lost devices and a buzzkill for privacy purists.
Beyond the Basics: Gaming, Voice Assistants, and Cars
Video games are privacy’s unexpected nemesis – those consoles know when you’re button-mashing in annoyance. Make use of privacy settings and avoid in-game chats for personal information.
Voice assistants might seem helpful, but they record everything, like parakeets waiting to be rewarded with crackers (or data).
And those smart cars? In-car infotainment systems love to chatter with your phone. Beware of privacy potholes, especially with rentals.
Stay Vigilant, Stay Private
There you have it, a whirlwind refresher of our internet privacy special. In this age of digital surveillance, remember, knowledge is power. Stay paranoid, stay informed, and keep fighting the good fight.
This has been your guide to Data Defiance. New insights fresh every Monday – because who doesn’t love starting the week with a healthy dose of critical defiance? Until next time, keep those shields up and information safe!
Links & Resources
Choosing the VPN That's Right for You | Surveillance Self-Defense (EFF)
Proton: Privacy by default - Mail, VPN, Calendar, Password Manager & more
Bitwarden: Password Manager for Business, Enterprise & Personal
Incogni - Delete your data from the web
Share this post