Banner image courtesy of Bernard Hermant
Do you ever stop to think about where all of the most sensitive things associated with you and shared with the online network go? Who accesses them, and for what purpose? Is this interest in the information you possess in your genuine, good interest? If these inquiries have given you pause, you might be one of the almost 9 in 10 internet users who are concerned about how their online, private data is approached by governments and how it contributes to the development of AI robots. In 2023, the percentage of people worried about what governments and companies do with the data gathered from users revolved around 71%, respectively 81%; but that was before AI capabilities were enhanced to the point of making illegal tracking possible or cyberattacks child’s play.
Way too many individuals admit to caring about their privacy only to choose the rapid and “free” gateway to a website or app, accepting whatever the terms and conditions box states for the sake of instant gratification. We hope you’re drifting away from this category, in case you are, too, innocently generous with data collectors when you’re browsing as if you were late for the party. How to do so, you may ask?

By using privacy tools
Your password can be a hacker’s goldmine when breached, and you might not even find out about the incident – not until you see the real-world consequences. Importantly, the problems can be either immediate or long-term, and can span multiple possibilities. Malevolent actors can log into your email, banking account, or social media, make loans and utility accounts in your name, or expose personal docs, photos, and messages you considered very well concealed online, to name a few.
We’re not to strike fear in you, but to remind you that a combination of MFA, randomly picked strong passwords, and most importantly, a password manager, can save you all the above-mentioned trouble. Now, a word on password managers. These are digital tools in the form of software or apps that securely store and manage users’ passwords, allowing those like you to use strong, unique credentials for every account without the burdensome stress of having to remember them all (which would understandably be impossible if you respect the password hygiene rules). Expect to have options like password storing and auto-filling, and even premium ones like password sharing and note securing. You can easily install one no matter your previous experience with privacy tools, because modern apps are by default designed with the non-technical user in mind, offering intuitive interfaces and easily digestible guidelines.
Other effective privacy tools you can start using today include:
- VPNs (Virtual Private Networks) – these tools have spiked in popularity for their masking of the IP address, online activity, and location. Importantly, experts debate their effectiveness in bypassing age verification systems.
- Data removal tools – gaining traction among privacy-aware individuals looking to delete personal data from the internet, with their success rate mainly shaped by the service provider and the platform targeted.
- Encrypted message apps – WhatsApp, Signal, and other such platforms take pride in securing user interactions from prying eyes via end-to-end encryption systems.
By having one or two extra identities
Assuming it’s the first time you access an app or website, why should you offer them your real age, location, name, etc.? You can always have an email alias – an alternate email you use when you don’t want to reveal your identity to the interlocutor. Some email services even give throwaway addresses under the security and settings preferences. Even better, some third-party services empower users to create more aliases with superior privacy features.
You can also use services like Google Voice to build disposable phone numbers, independent of your actual identity. When you’re concerned that a seller or store can’t protect your data, using email aliases can add an extra layer of protection.
By trimming your service and app time
Why keep using a site that has failed to earn and maintain your trust? Many people have abandoned platforms like X, TikTok, and Instagram once they became concerned about how their sensitive data is handled. If you fear that yours will fail you, just close your account and block the site or delete the app – peace of mind is the sweetest feeling, and lack of it might indicate you’re not browsing in the safest place.
Another top idea is to check your smartphone for out-of-use services and apps and delete them before they become problematic.
By knowing the most important privacy settings
Opening your browser’s or smartphone’s privacy page to turn off every box might be irresistibly tempting after reading all this. But instead of boosting security, you might simply be over-egging the pudding. The crucial settings to go through involve cross-site tracking and access to your microphone, camera, and location. You’ll find your security and privacy settings in the “Security and Privacy” section in System Preferences for Mac, and on Windows, in the Start menu, at the “Settings” side.
Turning on some general settings might make your device “stronger” by restricting access for some people or companies to your device. Generally, turning your Automatic Login off and your firewalls on are advisable practices, as well as ensuring your software is updating automatically and using cloud solutions to back up your files.
By staying vigilant
Don’t let stuffy privacy policies fool you – they’re essential and good to read, but there are also multiple examples of must-give permissions that allow you or not to carry out rudimentary tasks that can be mistreated. Cloud storage apps need some pretty intimidating permissions to do their job. Meanwhile, AI devs and agents are collecting data indiscriminately, ignoring privacy policies – and why not, the law itself.
Sometimes, sharing means not caring when giving away personal data – or at least not gifting it consciously. You’re making an important decision anytime you decide to trust an online service with your information, so second-guess whether your targeted ones deserve your trust. When the answer is negative, feel encouraged to start looking for other substituents elsewhere.