<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Privacy Guides</title><description>Privacy Guides is the most popular &amp; trustworthy non-profit privacy resource to find privacy tools and learn about protecting your digital life.</description><link>https://www.privacyguides.org/articles/</link><atom:link href="https://www.privacyguides.org/articles/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/privacyguides/privacyguides.org</docs><language>en</language> <pubDate>Mon, 03 Feb 2025 18:39:21 -0000</pubDate> <lastBuildDate>Mon, 03 Feb 2025 18:39:21 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Privacy Guides</title><link>https://www.privacyguides.org/articles/</link> </image> <item> <title>The Future of Privacy: How Governments Shape Your Digital Life</title> <author>Em</author> <category>Opinion</category> <description>&lt;h1 id=&#34;the-future-of-privacy-how-governments-shape-your-digital-life&#34;&gt;The Future of Privacy: How Governments Shape Your Digital Life&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Black and white photo of a street post at night. The street post has some ripped stickers on it and a stencilled graffiti saying Big Data is Watching You.&#34; src=&#34;../../../../assets/images/the-future-of-privacy/cover.webp&#34; /&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: ev / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Data privacy is a vast subject that encompasses so much. Some might think it is a niche focus interesting only a few. But in reality, it is a wide-ranging field influenced by intricate relationships between politics, law, technology, and much more. Further, it affects &lt;strong&gt;everyone&lt;/strong&gt; in one way or another, whether they care about it or not.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;I routinely read articles discussing changes in politics on the advocacy side of data privacy. Then, I read articles talking about changes in regulations on the legal side of data privacy. And then, I see all the articles and guides presenting new tools and privacy features on the tech side of data privacy. Of course, all of this is linked together.&lt;/p&gt;&lt;p&gt;Let&#39;s talk about how politics, law, and technological features are intertwined, all at once.&lt;/p&gt;&lt;h2 id=&#34;privacy-laws-are-always-one-election-away-from-getting-better-or-worse&#34;&gt;Privacy laws are always one election away from getting better, or worse&lt;/h2&gt;&lt;p&gt;Each change in government can have a serious effect on data privacy legislation. Privacy is a politically charged field. For example, authoritarian regimes might want to remove or weaken privacy rights to exert strict control over their population. While democratic governments generally bring more freedom and protections to its citizens, including privacy rights. It&#39;s important to keep in mind who in the past has bettered citizen rights and protections, and who has actively worked to undermine civil rights.&lt;/p&gt;&lt;p&gt;Each time a new government takes power, its values will be put forward and influence legislation in place, or legislation not in place yet. While the Western world has benefited from some improvements in data privacy law for the past few years, we must consider these gains are fragile and protections could get removed or lessened at any time.&lt;/p&gt;&lt;p&gt;Unfortunately, it seems there is currently a political push towards deregulation, mass surveillance, and a focus on corporate gains. This is &lt;strong&gt;extremely worrisome for the future of privacy rights&lt;/strong&gt;, human rights, and individual liberties.&lt;/p&gt;&lt;p&gt;Following politics and advocating for better privacy rights and legislation is essential in improving access to privacy tools and features around the world. Privacy is never politically neutral.&lt;/p&gt;&lt;h2 id=&#34;the-tools-you-use-might-depend-on-government-funding&#34;&gt;The tools you use might depend on government funding&lt;/h2&gt;&lt;p&gt;Many &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;privacy tools&lt;/a&gt; we use depend at least partially on government funding or on other tools which depend on government funding. This is especially true for open-source nonprofit organizations needing some (usually) more stable income, in addition to donations.&lt;/p&gt;&lt;h3 id=&#34;which-privacy-and-security-tools-could-be-impacted&#34;&gt;Which privacy and security tools could be impacted&lt;/h3&gt;&lt;p&gt;One notable example of a privacy-related project receiving government funding is the &lt;a href=&#34;https://www.torproject.org/&#34;&gt;Tor Project&lt;/a&gt;. If this source of funding &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/executive-order-state-department-sideswipes-freedom-tools-threatens-censorship&#34;&gt;were cut off&lt;/a&gt;, the impact on Tor could be quite detrimental, not only to the Tor Project but to all projects relying on Tor as well. Many privacy-focus software are built around the &lt;a href=&#34;https://en.wikipedia.org/wiki/Tor_(network)&#34;&gt;Tor network&lt;/a&gt;. To name only a few, whistleblowing software such as &lt;a href=&#34;https://hushline.app/&#34;&gt;Hush Line&lt;/a&gt; and &lt;a href=&#34;https://securedrop.org/&#34;&gt;SecureDrop&lt;/a&gt; both utilize the Tor network to harden privacy. &lt;a href=&#34;https://briarproject.org/&#34;&gt;Briar&lt;/a&gt;, &lt;a href=&#34;https://cwtch.im/&#34;&gt;Cwtch&lt;/a&gt;, and &lt;a href=&#34;https://simplex.chat/&#34;&gt;SimpleX&lt;/a&gt;, are examples of messaging applications also using Tor to add a layer of security and privacy to communications. &lt;strong&gt;Tor is critical infrastructure&lt;/strong&gt; in the world of data privacy.&lt;/p&gt;&lt;p&gt;Another important project receiving government funding is &lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let&#39;s Encrypt&lt;/a&gt;. Let&#39;s Encrypt is a nonprofit Certificate Authority providing &lt;a href=&#34;https://en.wikipedia.org/wiki/Transport_Layer_Security&#34;&gt;&lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt;&lt;/a&gt; certificates to websites. It is run by the Internet Security Research Group (ISRG), which &lt;a href=&#34;https://www.abetterinternet.org/sponsors/&#34;&gt;receives funding&lt;/a&gt; from the Sovereign Tech Agency, &lt;a href=&#34;https://www.sovereign.tech/faq&#34;&gt;supported by&lt;/a&gt; the German Federal Ministry for Economic Affairs and Climate Action. The ISRG also receives funding from the &lt;a href=&#34;https://www.opentech.fund/&#34;&gt;Open Technology Fund&lt;/a&gt; (OTF), which receives the &lt;a href=&#34;https://www.opentech.fund/about/about-our-funding/&#34;&gt;majority&lt;/a&gt; of its funding from the United States government, through the U.S. Agency for Global Media.&lt;/p&gt;&lt;p&gt;In current events, last month an &lt;a href=&#34;https://web.archive.org/web/20250131165539/https://new.nsf.gov/executive-orders&#34;&gt;executive order&lt;/a&gt; in the United States from the Trump administration led the National Science Foundation (NSF) to &lt;a href=&#34;https://www.npr.org/sections/shots-health-news/2025/01/27/nx-s1-5276342/nsf-freezes-grant-review-trump-executive-orders-dei-science&#34;&gt;freeze grant reviews&lt;/a&gt;. This is currently impacting many important projects in the tech world, &lt;a href=&#34;https://www.linkedin.com/posts/sethmlarson_national-science-foundation-freezes-grant-activity-7290072485423656960-n2eJ/&#34;&gt;including&lt;/a&gt; the Python Software Foundation (PSF). &lt;strong&gt;The repercussions of this freeze could be devastating for many open-source projects, in privacy and beyond.&lt;/strong&gt;&lt;/p&gt;&lt;h3 id=&#34;government-funding-should-support-civil-liberties-and-protections&#34;&gt;Government funding should support civil liberties and protections&lt;/h3&gt;&lt;p&gt;Governments funding nonprofit projects and organizations working on improving human rights, civil liberties, and technological security and safety is a good thing. This can bring an important source of stable income to nonprofit projects that could not stay afloat solely from donations.&lt;/p&gt;&lt;p&gt;However, this dependency can become precarious when governments aren&#39;t working for the good of the people anymore, and when organizations rely too heavily on such support, making them vulnerable to change in power. Such a change of regime can have devastating repercussions on the privacy tools we use.&lt;/p&gt;&lt;h2 id=&#34;the-gdpr-gave-you-deletion-features-in-your-apps&#34;&gt;The &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; gave you deletion features in your apps&lt;/h2&gt;&lt;p&gt;On the good side of regulatory influence, there are regulations like the &lt;a href=&#34;https://gdpr-info.eu/&#34;&gt;General Data Protection Regulation&lt;/a&gt; (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;). Saying the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; revolutionized the world of data privacy would not be an overstatement. While many privacy regulations pre-date the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;, in the Western world none had the scope nor the grit the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; has.&lt;/p&gt;&lt;h3 id=&#34;what-is-the-gdpr&#34;&gt;What is the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;&lt;/h3&gt;&lt;p&gt;The &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; is a data privacy regulation that was adopted by the European Union (EU) in 2016 and became effective in May 2018. Its scope encompasses all of the EU member states as well as all the countries part of the European Economic Area (&lt;abbr title=&#34;European Economic Area&#34;&gt;EEA&lt;/abbr&gt;), which together count 30 countries to this day. The United Kingdom also uses an &lt;a href=&#34;https://www.gdpreu.org/differences-between-the-uk-and-eu-gdpr-regulations/&#34;&gt;amended version&lt;/a&gt; of the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; post-Brexit.&lt;/p&gt;&lt;p&gt;However, the reach of the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; isn&#39;t limited to Europe. Every organization based &lt;em&gt;outside of the EU&lt;/em&gt; that is offering goods or services to, or is monitoring the behavior of, individuals located in the EU &lt;a href=&#34;https://commission.europa.eu/law/law-topic/data-protection/rules-business-and-organisations/application-regulation/who-does-data-protection-law-apply_en&#34;&gt;must comply&lt;/a&gt; as well. This means that &lt;strong&gt;most organizations operating worldwide, regardless of where they are located in the world, must comply&lt;/strong&gt; with the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;.&lt;/p&gt;&lt;p&gt;As is often the case with data privacy laws, it took a few years before &lt;a href=&#34;https://www.gdprsummary.com/gdpr-definitions/data-subject/&#34;&gt;Data Subjects&lt;/a&gt; (your legal designation under the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;) noticed any concrete changes. One change that has become prominent in the past few years, and is likely a direct product of the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;, is data deletion features within apps and accounts.&lt;/p&gt;&lt;h3 id=&#34;what-does-the-gdpr-have-to-do-with-data-deletion-features&#34;&gt;What does the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; have to do with data deletion features&lt;/h3&gt;&lt;p&gt;An important right granted by the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; to Data Subjects is the &lt;a href=&#34;https://gdpr-info.eu/art-17-gdpr/&#34;&gt;Right to Erasure&lt;/a&gt; (or the Right to be Forgotten). Other legislation such as the &lt;a href=&#34;https://www.oag.ca.gov/privacy/ccpa&#34;&gt;California Consumer Privacy Act&lt;/a&gt; (CCPA) calls for a similar right, the &lt;em&gt;Right to Delete&lt;/em&gt;. This and similar rights have existed before, but through the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; and its enforcement it has affected technology in a much broader and impactful way.&lt;/p&gt;&lt;p&gt;Slowly since 2018, applications requiring accounts have started to implement data deletion and account deletion features within the account itself. A probable reason for this is that due to the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;, and a now &lt;a href=&#34;https://iapp.org/resources/article/us-state-privacy-legislation-tracker/&#34;&gt;growing number&lt;/a&gt; of privacy regulations from various states in the United States, organizations are obligated to respond to Data Subject &lt;a href=&#34;https://www.gdprsummary.com/data-subject-rights/&#34;&gt;requests&lt;/a&gt; to get their personal data deleted. Managing this can be quite cumbersome for organizations. The burden of answering and implementing each data deletion request manually is often not worth the value of the data itself. Organizations with enough resources have simply added it as an internal product feature. This makes data deletion requests manageable by each Data Subject themselves (at least partially), freeing the organization from legally having to answer each individual request. When implemented properly, this is what we can call a win-win situation.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Request to delete&lt;/p&gt;&lt;p&gt;Unfortunately, not all applications have integrated automatic deletion features internally (yet). Additionally, some applications and accounts will allow you to delete information only partially this way.&lt;/p&gt;&lt;p&gt;If you wish to exercise or have questions related to your Right to Erasure or Right to Delete, first consult your local privacy regulation to check if you have this right as a &lt;em&gt;Data Subject&lt;/em&gt;, &lt;em&gt;Individual,&lt;/em&gt; or &lt;em&gt;Consumer&lt;/em&gt;. Then, you can contact the organization&#39;s &lt;em&gt;Privacy Officer&lt;/em&gt; with your request. You can usually find information about an organization&#39;s designated &lt;em&gt;Privacy Officer&lt;/em&gt; by reading its privacy policy or privacy notice. In any case, it never hurts to ask.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;chat-control-wants-to-break-end-to-end-encryption&#34;&gt;Chat Control wants to break end-to-end encryption&lt;/h2&gt;&lt;p&gt;If you are not European, please bear with me. First of all, everyone outside of Europe should care about what is happening in Europe, regardless. But even if you don&#39;t care, you should know &lt;strong&gt;this kind of mass surveillance proposition will inevitably leak west&lt;/strong&gt;, and if adopted will affect us all globally.&lt;/p&gt;&lt;h3 id=&#34;what-is-chat-control&#34;&gt;What is Chat Control&lt;/h3&gt;&lt;p&gt;In 2021, the EU &lt;a href=&#34;https://www.patrick-breyer.de/en/chatcontrol-european-parliament-approves-mass-surveillance-of-private-communications/&#34;&gt;approved a derogation&lt;/a&gt; to the &lt;a href=&#34;https://en.wikipedia.org/wiki/EPrivacy_Directive&#34;&gt;ePrivacy Directive&lt;/a&gt; to allow communication service providers to scan all exchanged messages to detect child sexual abuse material (CSAM). Although this first derogation was not mandatory, some policymakers kept pushing with new propositions.&lt;/p&gt;&lt;p&gt;A year later, a &lt;a href=&#34;https://edri.org/wp-content/uploads/2022/10/EDRi-Position-Paper-CSAR-short.pdf&#34;&gt;new regulation&lt;/a&gt; (CSAR) was proposed by the European Commissioner for Home Affairs to make scanning messages for CSAM &lt;em&gt;mandatory&lt;/em&gt; for all EU countries, and also allow them to &lt;strong&gt;break end-to-end encryption&lt;/strong&gt;. In 2023, the UK passed a similar legislation called the &lt;a href=&#34;https://hackaday.com/2023/10/29/the-uk-online-safety-bill-becomes-law-what-does-it-mean/&#34;&gt;Online Safety Act&lt;/a&gt;. These types of messaging mass scanning regulations have been called by critics &lt;em&gt;Chat Control&lt;/em&gt;.&lt;/p&gt;&lt;h3 id=&#34;why-is-chat-control-horrible-for-privacy-and-for-children&#34;&gt;Why is Chat Control horrible for privacy, and for children&lt;/h3&gt;&lt;p&gt;Such legislation might sound like a noble cause at first, but consider this: Scanning all messages exchanged for any reason treats everyone like a criminal, no matter what. &lt;strong&gt;This is not hunting criminals, this is mass surveillance.&lt;/strong&gt; Not only is this horrifying for privacy rights, but it also endangers democracy. Once a system to mass monitor all written communications is implemented to (supposedly) stop CSAM, new topics to detect, block, and report could be added anytime, and by any future governments. There is nothing that would prevent much less reasonable topics from being added to the list to be filtered out at a later date.&lt;/p&gt;&lt;p&gt;Chat Control would hurt everyone, &lt;a href=&#34;https://digitalcommons.law.uw.edu/wlr/vol99/iss1/9/&#34;&gt;including the children&lt;/a&gt;. Not only would mass scanning of all messages be &lt;a href=&#34;https://volteuropa.org/news/chat-control-wont-protect-children&#34;&gt;ineffective&lt;/a&gt; at reducing CSAM, but it would endanger the children even further by also scanning their communications. Because yes, children also communicate online. Parents also communicate sensitive information about their children online, with trusted family or doctors. All this data would get scanned and collected, only &lt;a href=&#34;https://techcrunch.com/2025/01/28/powerschool-begins-notifying-students-and-teachers-after-massive-data-breach/&#34;&gt;one breach away&lt;/a&gt; from being made public.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Protecting the children&lt;/em&gt; is a pretext regularly used to implement abusive regulations undermining individual liberties and protections. Do not get fooled by this demagogical stratagem. &lt;strong&gt;Chat Control is the opposite of protecting the children.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Chat Control would only lead to destroying the end-to-end encryption messaging features that are protecting us and the children so well already. Criminals exploiting children would simply move to underground channels, unbothered.&lt;/p&gt;&lt;h3 id=&#34;who-opposes-chat-control&#34;&gt;Who opposes Chat Control&lt;/h3&gt;&lt;p&gt;Thankfully, opposition from experts and advocates alike has been strong. To name only a few, Meredith Whittaker, president of the Signal Foundation which develops the messaging app &lt;a href=&#34;https://signal.org/&#34;&gt;Signal&lt;/a&gt;, has taken &lt;a href=&#34;https://signal.org/blog/uk-online-safety-bill/&#34;&gt;a clear stand&lt;/a&gt; against Chat Control. The Electronic Frontier Foundation has also &lt;a href=&#34;https://www.eff.org/deeplinks/2024/06/now-eu-council-should-finally-understand-no-one-wants-chat-control&#34;&gt;firmly opposed&lt;/a&gt; Chat Control legislation. In the UK, the Open Rights Group has led &lt;a href=&#34;https://www.openrightsgroup.org/campaign/save-encryption/&#34;&gt;powerful campaigns&lt;/a&gt; to fight against the Online Safety Act. In Europe, privacy advocacy organization &lt;a href=&#34;https://noyb.eu/en/noyb-files-complaint-against-eu-commission-over-targeted-chat-control-ads&#34;&gt;noyb&lt;/a&gt; and former Member of the European Parliament Patrick Breyer have both been fervent defenders of privacy rights &lt;a href=&#34;https://www.patrick-breyer.de/en/posts/messaging-and-chat-control/&#34;&gt;raising relentless resistance&lt;/a&gt; to Chat Control.&lt;/p&gt;&lt;p&gt;Harmful policies such as Chat Control are a direct example of how politics can affect laws that can cause &lt;strong&gt;unimaginable damage&lt;/strong&gt; to the privacy-preserving technologies we use every day.&lt;/p&gt;&lt;h2 id=&#34;age-verification-wants-to-collect-your-sensitive-data&#34;&gt;Age Verification wants to collect your sensitive data&lt;/h2&gt;&lt;p&gt;Another potent example of the &lt;em&gt;protecting-the-children stratagem&lt;/em&gt; to undermine privacy rights is &lt;a href=&#34;https://www.jonaharagon.com/posts/age-verification-is-incompatible-with-the-internet/&#34;&gt;Age Verification legislation&lt;/a&gt;. In the past few years, this idea of controlling which online content should be accessible to children has raised new proposals around the world.&lt;/p&gt;&lt;p&gt;Age Verification policies generally start with the premise that some content should not be accessible to children online. Again, this could seem like a reasonable idea at first. Nobody would debate that children should be shielded from some type of content. Sadly, we have all witnessed how horrifying the internet can be at times. However, both the premise and methodology to achieve this goal are wrong.&lt;/p&gt;&lt;h3 id=&#34;who-will-decide-what-content-should-be-walled-online&#34;&gt;Who will decide what content should be walled online?&lt;/h3&gt;&lt;p&gt;First of all, even putting aside the fact that there is plenty of disturbing content accessible &lt;em&gt;outside&lt;/em&gt; the internet (newspapers, television, movies, radio, advertising, etc), who would be &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/impact-age-verification-measures-goes-beyond-porn-sites&#34;&gt;the deciders&lt;/a&gt; of which specific content can be accessed by children or not? This can be extremely problematic, to say the least.&lt;/p&gt;&lt;p&gt;There is no objective measure to decide on this, and what might be deemed appropriate by one might not be by another. More importantly in the context of our discussion, what one government might judge appropriate might be very different from the next or previous administration.&lt;/p&gt;&lt;p&gt;This is again &lt;strong&gt;a dangerous slippery slope opening the door wide to authoritarian policies&lt;/strong&gt;.&lt;/p&gt;&lt;h3 id=&#34;age-verification-undermines-privacy-and-security&#34;&gt;Age Verification undermines privacy and security&lt;/h3&gt;&lt;p&gt;Secondly, &lt;a href=&#34;https://www.woodhullfoundation.org/fact-checked/online-age-verification-is-not-the-same-as-flashing-your-id-at-a-liquor-store/&#34;&gt;how can age be verified online&lt;/a&gt;? Of course by collecting more data, on everyone. Age Verification policies don&#39;t affect only the children, they affect everyone who wants to access content online. If a website is deemed to display content that should not be accessed by children, the only way to enforce this rule would be to ask for some form of official identity verification from all adults who want to access it.&lt;/p&gt;&lt;p&gt;Proponents of these regulations often refer to &#34;age assurance processes&#34; and suppose these processes to be undoubtedly secure. Anyone familiar with data security will understand how naive this approach is. I will not go into the details here, but you probably can already see how having each private website (or third-party processor) collect such sensitive information from each visitor is horrendous for privacy rights, and data security as well. Of course, these websites or third-party &#34;age assurance processors&#34; will unavoidably become a large treasure trove for thieves, and their sensitive data will be &lt;a href=&#34;https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/&#34;&gt;inevitably leaked or stolen&lt;/a&gt; sooner rather than later.&lt;/p&gt;&lt;p&gt;Age Verification is one of the biggest privacy threats online. Continuing in this direction could ultimately lead to the end of pseudonymous browsing. Additionally, this could also mean the end of your official ID having any value at all. After all, what unique identification value does a piece of ID keep after it has been leaked in a thousand different data breaches? Maybe even one day bought on a &lt;a href=&#34;https://en.wikipedia.org/wiki/Darknet_market&#34;&gt;darknet market&lt;/a&gt; by a curious teenager in need of accessing some website...&lt;/p&gt;&lt;h3 id=&#34;age-verification-is-already-here-sadly&#34;&gt;Age Verification is already here, sadly&lt;/h3&gt;&lt;p&gt;Regrettably, this is not a hypothetical scare. Age Verification legislation has already passed in &lt;a href=&#34;https://www.thehindu.com/news/international/what-is-australias-online-safety-amendment-about-explained/article69026251.ece&#34;&gt;Australia&lt;/a&gt;, in the &lt;a href=&#34;https://www.ofcom.org.uk/online-safety/protecting-children/age-checks-to-protect-children-online/&#34;&gt;UK&lt;/a&gt;, as well as in &lt;a href=&#34;https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/&#34;&gt;many U.S. states&lt;/a&gt;. It is also on the table federally in the &lt;a href=&#34;https://www.eff.org/deeplinks/2024/10/eff-new-york-age-verification-threatens-everyones-speech-and-privacy&#34;&gt;United States&lt;/a&gt;, &lt;a href=&#34;https://www.eff.org/deeplinks/2024/09/canadas-leaders-must-reject-overbroad-age-verification-bill&#34;&gt;Canada&lt;/a&gt;, &lt;a href=&#34;https://www.politico.eu/article/france-doubles-down-on-social-media-age-limit-at-15/&#34;&gt;France&lt;/a&gt;, &lt;a href=&#34;https://www.euractiv.com/section/politics/news/norwegian-government-sets-15-year-age-limit-for-using-social-media/&#34;&gt;Norway&lt;/a&gt;, and &lt;a href=&#34;https://digital-strategy.ec.europa.eu/en/funding/call-tenders-development-consultancy-and-support-age-verification-solution&#34;&gt;Europe&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;There is some &lt;a href=&#34;https://www.eff.org/deeplinks/2024/12/global-age-verification-measures-2024-year-review&#34;&gt;tenacious opposition&lt;/a&gt; to Age Verification policies from digital rights and free speech advocates. Unfortunately, there is also a strong push in support of Age Verification from the rapidly growing &#34;age assurance&#34; and identity verification &lt;a href=&#34;https://avpassociation.com/thought-leadership/2025-the-year-of-implementation-for-age-assurance/&#34;&gt;industry&lt;/a&gt;, and from many governments worldwide &lt;strong&gt;moving towards a surveillance state&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Again, government values are deciding on digital features that impact our data privacy in disastrous ways. If you want to &lt;strong&gt;take a stand against Age Verification&lt;/strong&gt;, you can join the &lt;a href=&#34;https://www.stoponlineidchecks.org/&#34;&gt;Stop Online ID Checks&lt;/a&gt; campaign from the nonprofit organization Fight for the Future.&lt;/p&gt;&lt;h2 id=&#34;the-future-of-privacy&#34;&gt;The future of privacy&lt;/h2&gt;&lt;p&gt;There&#39;s a lot to be worrying about in today&#39;s privacy landscape. Unfortunately, recent political tendencies in the Western world make it difficult to stay optimistic. The trend toward authoritarian regimes and surveillance capitalism is bad news for the future of privacy around the globe.&lt;/p&gt;&lt;p&gt;There is no question that privacy is intrinsically intertwined with politics, and can therefore never be politically neutral. The latest decisions taken by the new U.S. administration running full speed into deregulation and defunding, growing pressure in Europe to break end-to-end encryption in favor of a surveillance state, and invasive age verification policies to censor the web and collect even more data on every netizen is admittedly frightening.&lt;/p&gt;&lt;p&gt;But one thing frightens me even more than all of this. One thing that could end privacy rights, forever. This threat to privacy is never far and always looming.&lt;/p&gt;&lt;p&gt;This threat is giving up.&lt;/p&gt;&lt;p&gt;Despite all the gloom menacing privacy rights, &lt;strong&gt;privacy will never be dead as long as we stand up to defend it&lt;/strong&gt;. Governments might have the power to remove our privacy rights on paper and proclaim privacy features illegal. But the people have the power to keep pushing for better privacy rights and to keep developing even more robust and more accessible privacy tools.&lt;/p&gt;&lt;p&gt;We must continue to advocate loudly for privacy rights and &lt;em&gt;all&lt;/em&gt; human rights every chance we have. The fight for better privacy rights is only over when we give up.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Do not give up.&lt;/strong&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/02/03/the-future-of-privacy/</link> <pubDate>Mon, 03 Feb 2025 18:28:03 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/02/03/the-future-of-privacy/</guid> </item> <item> <title>EasyOptOuts Review &amp; Real-World Test</title> <author>Jonah Aragon</author> <category>People-Search Sites</category> <category>Reviews</category> <description>&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;EasyOptOuts logo&#34; itemprop=&#34;image&#34; src=&#34;../../../../assets/img/data-broker-removals/easyoptouts.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;EasyOptOuts.com&lt;/strong&gt; is a $19.99/year &lt;a href=&#34;https://www.privacyguides.org/en/data-broker-removals/&#34;&gt;people-search site removal service&lt;/a&gt; which will search a number of different data broker sites and automatically submit opt-out requests on your behalf. They will perform the first search and removal process immediately, and then re-run the process every 4 months in case your data shows up on new sites over time.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button&#34; href=&#34;https://easyoptouts.com&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Homepage&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://easyoptouts.com/privacy&#34; title=&#34;Privacy Policy&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M8 2c1.981 0 3.671.992 4.933 2.078 1.27 1.091 2.187 2.345 2.637 3.023a1.62 1.62 0 0 1 0 1.798c-.45.678-1.367 1.932-2.637 3.023C11.67 13.008 9.981 14 8 14s-3.671-.992-4.933-2.078C1.797 10.83.88 9.576.43 8.898a1.62 1.62 0 0 1 0-1.798c.45-.677 1.367-1.931 2.637-3.022C4.33 2.992 6.019 2 8 2M1.679 7.932a.12.12 0 0 0 0 .136c.411.622 1.241 1.75 2.366 2.717C5.176 11.758 6.527 12.5 8 12.5s2.825-.742 3.955-1.715c1.124-.967 1.954-2.096 2.366-2.717a.12.12 0 0 0 0-.136c-.412-.621-1.242-1.75-2.366-2.717C10.824 4.242 9.473 3.5 8 3.5s-2.825.742-3.955 1.715c-1.124.967-1.954 2.096-2.366 2.717M8 10a2 2 0 1 1-.001-3.999A2 2 0 0 1 8 10&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&lt;p&gt;People-search sites represent an immense privacy risk to the majority of Americans. For many, sensitive personal information such as your address, phone number, email, and age is a simple internet search away. While there is unfortunately no federal regulation in place to protect your data, many of these companies will remove your information from their public databases upon request. EasyOptOuts is a low-cost online service which automates these opt-out requests, saving you time and removing the need to constantly monitor new sites/databases for your personal information on a regular basis.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Privacy Guides&lt;/em&gt; selected this service for review based on community reviews and various reporting from organizations including &lt;a href=&#34;https://discuss.privacyguides.net/t/consumer-reports-evaluating-people-search-site-removal-services/19948&#34;&gt;Consumer Reports&lt;/a&gt;. In our best judgement, EasyOptOuts services consistently received the most positive feedback and results in terms of efficacy, so we prioritized its testing over other similar services due to our limited budget.&lt;/p&gt;&lt;p&gt;The EasyOptOuts subscription was paid for by Privacy Guides. &lt;em&gt;Privacy Guides&lt;/em&gt; did not contact EasyOptOuts regarding this review, or request free/discounted services before conducting this review.&lt;/p&gt;&lt;h2 id=&#34;methodology&#34;&gt;Methodology&lt;/h2&gt;&lt;p&gt;&lt;em&gt;Privacy Guides&lt;/em&gt; conducted this review with 2 volunteer subjects who agreed to allow us to use EasyOptOuts to attempt to remove their personal information from public people-search sites, then evaluate those results. Our subjects:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Are US citizens&lt;/li&gt;&lt;li&gt;Have never used a people-search removal service&lt;/li&gt;&lt;li&gt;Have never manually opted-out of people-search sites&lt;/li&gt;&lt;li&gt;Are homeowners&lt;/li&gt;&lt;li&gt;Do not live in a state with specific privacy regulations related to data brokers or people-search sites&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The information we provided to EasyOptOuts:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;First and last name&lt;/li&gt;&lt;li&gt;Maiden name (if applicable)&lt;/li&gt;&lt;li&gt;Birth year&lt;/li&gt;&lt;li&gt;Current street address&lt;/li&gt;&lt;li&gt;Most recent previous address (if applicable)&lt;/li&gt;&lt;li&gt;Current phone number(s)&lt;/li&gt;&lt;li&gt;Current email address&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;We did not provide the names of relatives as requested by EasyOptOuts, as they were not volunteers for this review. This is one potential limitation with our evaluation to keep in mind.&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Disclaimer&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Please note that this review is not intended to be a comprehensive evaluation of EasyOptOuts, as we are conducting this test with a very limited sample size.&lt;/strong&gt; We do not consider our results to be statistically significant. Rather, this review should be taken as an additional &#34;real-world&#34; data point for you to consider when evaluating this service. We encourage you to seek out other independent reporting to consider as well before making any purchase decision.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;initial-search&#34;&gt;Initial Search&lt;/h2&gt;&lt;p&gt;&lt;em&gt;Privacy Guides&lt;/em&gt; performed an initial search for personal information for each of our subjects on Google by searching for their first and last name in quotes, plus their current city and state (for example, &lt;code&gt;&#34;Jane Doe&#34; Chicago IL&lt;/code&gt;). We then counted the number of unique results which contained their personal information in the title or description shown in Google.&lt;/p&gt;&lt;p&gt;Using standard engine search results is one of the most common methods of discovering personal information, and typically represents the greatest risk to most people, so measuring the number of search engine results that are removed as a result of the opt-out process is one of our highest priority measurements.&lt;/p&gt;&lt;div class=&#34;grid&#34;&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person A (11 Google results):&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;411.com&lt;/li&gt;&lt;li&gt;thatsthem.com&lt;/li&gt;&lt;li&gt;blockshopper.com*&lt;/li&gt;&lt;li&gt;fastpeoplesearch.com&lt;/li&gt;&lt;li&gt;usphonebook.com&lt;/li&gt;&lt;li&gt;spokeo.com&lt;/li&gt;&lt;li&gt;truepeoplesearch.com&lt;/li&gt;&lt;li&gt;information.com&lt;/li&gt;&lt;li&gt;peoplesearch.com*&lt;/li&gt;&lt;li&gt;radaris.com&lt;/li&gt;&lt;li&gt;peoplefinders.com&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person B (10 Google results):&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;whitepages.com&lt;/li&gt;&lt;li&gt;truepeoplesearch.com&lt;/li&gt;&lt;li&gt;usphonebook.com&lt;/li&gt;&lt;li&gt;fastpeoplesearch.com&lt;/li&gt;&lt;li&gt;spokeo.com&lt;/li&gt;&lt;li&gt;radaris.com&lt;/li&gt;&lt;li&gt;information.com&lt;/li&gt;&lt;li&gt;thatsthem.com&lt;/li&gt;&lt;li&gt;idcrawl.com*&lt;/li&gt;&lt;li&gt;peekyou.com*&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;We also performed a manual search for their information on 15 different &#34;high-priority&#34; data brokers. These brokers represent either the most commonly used people-search sites, and/or cover a large number of people-search sites with their databases, so having your data removed from these companies can have an outsized positive effect on your overall privacy.&lt;/p&gt;&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Service&lt;/th&gt;&lt;th&gt;Person A&lt;/th&gt;&lt;th&gt;Person B&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;advancedbackgroundchecks.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;beenverified.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;checkpeople.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;clustrmaps.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;dataveria.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;gladiknow.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;infotracer.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;intelius.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;peekyou.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;publicdatausa.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;radaris.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;spokeo.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;thatsthem.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;usphonebook.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;spyfly.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Remaining Results&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;100%&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;100%&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;It should be noted that EasyOptOuts does not claim or advertise that they have the ability to opt you out of some of the websites above, so we do not expect 100% coverage. However, the site compatibility of EasyOptOuts &lt;em&gt;is&lt;/em&gt; a real-world limitation of the service we think you should consider before making a decision, so we intentionally did not limit our review to only the sites they advertise support for. The sites EasyOptOuts does &lt;em&gt;not&lt;/em&gt; advertise support for are marked with an asterisk (*).&lt;/p&gt;&lt;h2 id=&#34;user-experience&#34;&gt;User Experience&lt;/h2&gt;&lt;p&gt;Registering a new account with EasyOptOuts was a very simple and easy-to-follow process. Their website does a great job explaining what is happening and why they need the data they&#39;re requesting at every step. Many of the fields are required, including your first and last name, year of birth, and precise street address. However, including your email addresses, phone numbers, and names of relatives in the search are optional. This is to be generally expected, as your precise data is needed to perform opt-out requests in the majority of cases. However, some competitors do allow you to provide a little less information, such as only your city/state instead of your exact current address, at the expense of potentially being less effective.&lt;/p&gt;&lt;p&gt;The only payment processor in use by EasyOptOuts is PayPal, but they&#39;ve enabled the option to accept credit card payments without an actual PayPal account. PayPal does default to creating a new account for you with this information, so if you want to avoid that you should uncheck the &#34;Save info &amp;amp; create your PayPal account&#34; option at checkout.&lt;/p&gt;&lt;p&gt;We received a notification that the opt-out process had been completed approximately 1.5 hours after payment. This is much faster than many similar services will submit opt-out requests. However, as they note in the notification email: &#34;Some sites remove data quickly, but some take weeks,&#34; so while the initial requests have been made, it will still take some time for them to actually go into effect.&lt;/p&gt;&lt;p&gt;EasyOptOuts is able to provide its service at a much lower price point than competitors like Optery or DeleteMe because they have no manual/human intervention at any point in the opt-out process. This limits the amount of websites they are able to support, however. In fact, their emailed report explicitly recommends manually opting-out of PeopleConnect (Intelius) sites at &lt;a href=&#34;https://suppression.peopleconnect.us/login&#34;&gt;https://suppression.peopleconnect.us/login&lt;/a&gt; because they are not able to do so with their automated systems.&lt;/p&gt;&lt;h2 id=&#34;1-week&#34;&gt;1 Week&lt;/h2&gt;&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Service&lt;/th&gt;&lt;th&gt;Person A&lt;/th&gt;&lt;th&gt;Person B&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;advancedbackgroundchecks.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;beenverified.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;checkpeople.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;clustrmaps.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;dataveria.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;gladiknow.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;infotracer.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;intelius.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;peekyou.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;publicdatausa.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;radaris.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;spokeo.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;thatsthem.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;usphonebook.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;spyfly.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Remaining Results&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;33%&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;46%&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;It should be noted that some of these websites included &#34;sponsored links&#34; to &lt;em&gt;other&lt;/em&gt; data-brokers in their search results. For example, while both people&#39;s data was removed from advancedbackgroundchecks.com&#39;s own internal database, the search results on advancedbackgroundchecks.com still included a sponsored link to their data on truthfinder.com, one of the websites operated separately by PeopleConnect which EasyOptOuts does not support. This means that manual intervention is still very important when using EasyOptOuts, to cover larger services like PeopleConnect which require more complex interaction.&lt;/p&gt;&lt;p&gt;On Google we saw some reduction, but many results with sensitive information remained. This is something we&#39;ll monitor for future updates, as these results drop from Google&#39;s caches. Once again, the sites EasyOptOuts does not advertise support for are marked with an asterisk (*) in all of these tables.&lt;/p&gt;&lt;div class=&#34;grid&#34;&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person A (8 Google results):&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;thatsthem.com&lt;/li&gt;&lt;li&gt;blockshopper.com*&lt;/li&gt;&lt;li&gt;fastpeoplesearch.com&lt;/li&gt;&lt;li&gt;usphonebook.com&lt;/li&gt;&lt;li&gt;information.com&lt;/li&gt;&lt;li&gt;peoplesearch.com*&lt;/li&gt;&lt;li&gt;radaris.com&lt;/li&gt;&lt;li&gt;fastpeoplesearch.com&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person B (6 Google results):&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;truepeoplesearch.com&lt;/li&gt;&lt;li&gt;usphonebook.com&lt;/li&gt;&lt;li&gt;information.com&lt;/li&gt;&lt;li&gt;fastpeoplesearch.com&lt;/li&gt;&lt;li&gt;thatsthem.com&lt;/li&gt;&lt;li&gt;peekyou.com*&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;h2 id=&#34;1-month&#34;&gt;1 Month&lt;/h2&gt;&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Service&lt;/th&gt;&lt;th&gt;Person A&lt;/th&gt;&lt;th&gt;Person B&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;advancedbackgroundchecks.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;beenverified.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;checkpeople.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;clustrmaps.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;dataveria.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;gladiknow.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;infotracer.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;intelius.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;peekyou.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;publicdatausa.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;radaris.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;spokeo.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;:&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;thatsthem.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;usphonebook.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;spyfly.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Remaining Results&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;20%&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;33%&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;Once again, we also searched for their information on Google, and we noticed a reduction in exposure to basic search engines as we expected:&lt;/p&gt;&lt;div class=&#34;grid&#34;&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person A (4 Google results):&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;thatsthem.com&lt;/li&gt;&lt;li&gt;blockshopper.com*&lt;/li&gt;&lt;li&gt;fastpeoplesearch.com&lt;/li&gt;&lt;li&gt;peoplesearch.com*&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person B (2 Google results):&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;thatsthem.com&lt;/li&gt;&lt;li&gt;peekyou.com*&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;h2 id=&#34;3-months&#34;&gt;3 Months&lt;/h2&gt;&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Service&lt;/th&gt;&lt;th&gt;Person A&lt;/th&gt;&lt;th&gt;Person B&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;advancedbackgroundchecks.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;beenverified.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;checkpeople.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;clustrmaps.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;dataveria.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;gladiknow.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;infotracer.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;intelius.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;peekyou.com*&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Found&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;publicdatausa.com&lt;sup id=&#34;fnref:1&#34;&gt;&lt;a class=&#34;footnote-ref&#34; href=&#34;#fn:1&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;radaris.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;spokeo.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;:&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;thatsthem.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;usphonebook.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;spyfly.com&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;td&gt;&lt;img alt=&#34;✅&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/2705.svg&#34; title=&#34;:white_check_mark:&#34; /&gt; Removed&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Remaining Results&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;13%&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;23%&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;Once again, the sites EasyOptOuts does not advertise support for are marked with an asterisk (*). Finally, we searched for their information on Google, and there were no results from websites supported by EasyOptOuts remaining:&lt;/p&gt;&lt;div class=&#34;grid&#34;&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person A (1 Google result):&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;blockshopper.com*&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person B (2 Google results):&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;idcrawl.com*&lt;/li&gt;&lt;li&gt;peekyou.com*&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;h2 id=&#34;additional-sites&#34;&gt;Additional Sites&lt;/h2&gt;&lt;p&gt;In addition to the websites we performed an &lt;a href=&#34;#initial-search&#34;&gt;initial search&lt;/a&gt; with, the EasyOptOuts report we received claimed to find and remove our participants&#39; data from the following websites. While &lt;em&gt;Privacy Guides&lt;/em&gt; did not search all of these sites in advance of the test to validate these results independently, searching tens or hundreds of smaller sites &lt;em&gt;is&lt;/em&gt; one of the key advantages of using an automated service like EasyOptOuts.&lt;/p&gt;&lt;div class=&#34;grid&#34;&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person A:&lt;/strong&gt;&lt;/p&gt;&lt;details class=&#34;warning&#34;&gt;&lt;summary&gt;We found your information and performed opt outs for the following 112 sites&lt;/summary&gt;&lt;ul&gt;&lt;li&gt;411.com&lt;/li&gt;&lt;li&gt;advancedbackgroundchecks.com&lt;/li&gt;&lt;li&gt;arrestwarrant.org&lt;/li&gt;&lt;li&gt;backgroundcheck.run&lt;/li&gt;&lt;li&gt;backgroundcheckers.net&lt;/li&gt;&lt;li&gt;beenverified.com&lt;/li&gt;&lt;li&gt;bumper.com, covered by beenverified.com&lt;/li&gt;&lt;li&gt;centeda.com&lt;/li&gt;&lt;li&gt;checkpeople.com&lt;/li&gt;&lt;li&gt;checksecrets.com&lt;/li&gt;&lt;li&gt;clubset.com&lt;/li&gt;&lt;li&gt;clustrmaps.com&lt;/li&gt;&lt;li&gt;councilon.com&lt;/li&gt;&lt;li&gt;courtcasefinder.com&lt;/li&gt;&lt;li&gt;curadvisor.com&lt;/li&gt;&lt;li&gt;cyberbackgroundchecks.com&lt;/li&gt;&lt;li&gt;dataveria.com&lt;/li&gt;&lt;li&gt;familytreenow.com&lt;/li&gt;&lt;li&gt;fastbackgroundcheck.com&lt;/li&gt;&lt;li&gt;fastpeoplesearch.com&lt;/li&gt;&lt;li&gt;findpeoplesearch.com&lt;/li&gt;&lt;li&gt;freepeoplesearch.com&lt;/li&gt;&lt;li&gt;gladiknow.com&lt;/li&gt;&lt;li&gt;golookup.com&lt;/li&gt;&lt;li&gt;goreversephone.com&lt;/li&gt;&lt;li&gt;govwarrantsearch.org&lt;/li&gt;&lt;li&gt;hudwayglass.com&lt;/li&gt;&lt;li&gt;information.com&lt;/li&gt;&lt;li&gt;infotracer.com&lt;/li&gt;&lt;li&gt;inmatessearcher.com&lt;/li&gt;&lt;li&gt;kidslivesafe.com&lt;/li&gt;&lt;li&gt;kwold.com&lt;/li&gt;&lt;li&gt;mugshotlook.com&lt;/li&gt;&lt;li&gt;mylife.com&lt;/li&gt;&lt;li&gt;neighbor.report&lt;/li&gt;&lt;li&gt;neighborwho.com&lt;/li&gt;&lt;li&gt;newenglandfacts.com&lt;/li&gt;&lt;li&gt;numberguru.com&lt;/li&gt;&lt;li&gt;nuwber.com&lt;/li&gt;&lt;li&gt;officialusa.com&lt;/li&gt;&lt;li&gt;ownerly.com&lt;/li&gt;&lt;li&gt;people-background-check.com&lt;/li&gt;&lt;li&gt;people-wizard.com&lt;/li&gt;&lt;li&gt;peoplebyname.com&lt;/li&gt;&lt;li&gt;peoplechk.com&lt;/li&gt;&lt;li&gt;peoplefinders.com&lt;/li&gt;&lt;li&gt;peoplelooker.com&lt;/li&gt;&lt;li&gt;peoplesearch123.com&lt;/li&gt;&lt;li&gt;peoplesearcher.com&lt;/li&gt;&lt;li&gt;peoplesearchnow.com&lt;/li&gt;&lt;li&gt;peoplesearchusa.org&lt;/li&gt;&lt;li&gt;peoplesmart.com&lt;/li&gt;&lt;li&gt;peopleswhizr.com&lt;/li&gt;&lt;li&gt;peopleswiz.com&lt;/li&gt;&lt;li&gt;peopleswizard.com&lt;/li&gt;&lt;li&gt;peoplewhiz.com&lt;/li&gt;&lt;li&gt;peoplewhiz.net&lt;/li&gt;&lt;li&gt;peoplewhized.com&lt;/li&gt;&lt;li&gt;peoplewhized.net&lt;/li&gt;&lt;li&gt;peoplewhizr.com&lt;/li&gt;&lt;li&gt;peoplewhizr.net&lt;/li&gt;&lt;li&gt;peoplewiz.com&lt;/li&gt;&lt;li&gt;peoplewizard.net&lt;/li&gt;&lt;li&gt;peoplewizr.com&lt;/li&gt;&lt;li&gt;personsearchers.com&lt;/li&gt;&lt;li&gt;persontrust.com&lt;/li&gt;&lt;li&gt;privaterecords.net&lt;/li&gt;&lt;li&gt;privatereports.com&lt;/li&gt;&lt;li&gt;pub360.com&lt;/li&gt;&lt;li&gt;publicdatacheck.com&lt;/li&gt;&lt;li&gt;publicinfoservices.com&lt;/li&gt;&lt;li&gt;publicrecordreports.com&lt;/li&gt;&lt;li&gt;publicsearcher.com&lt;/li&gt;&lt;li&gt;quickpeopletrace.com&lt;/li&gt;&lt;li&gt;radaris.com&lt;/li&gt;&lt;li&gt;recordsfinder.com&lt;/li&gt;&lt;li&gt;rehold.com&lt;/li&gt;&lt;li&gt;reunion.com&lt;/li&gt;&lt;li&gt;reverselookupaphonenumber.com&lt;/li&gt;&lt;li&gt;reversephonecheck.com&lt;/li&gt;&lt;li&gt;sealedrecords.net&lt;/li&gt;&lt;li&gt;searchpeoplefree.com&lt;/li&gt;&lt;li&gt;searchpublicrecords.com&lt;/li&gt;&lt;li&gt;searchquarry.com&lt;/li&gt;&lt;li&gt;secretinfo.org&lt;/li&gt;&lt;li&gt;smartbackgroundchecks.com&lt;/li&gt;&lt;li&gt;spydialer.com&lt;/li&gt;&lt;li&gt;spyfly.com&lt;/li&gt;&lt;li&gt;staterecords.org&lt;/li&gt;&lt;li&gt;telephonedirectories.us&lt;/li&gt;&lt;li&gt;texasarrests.org&lt;/li&gt;&lt;li&gt;texasarrestwarrants.org&lt;/li&gt;&lt;li&gt;thatsthem.com&lt;/li&gt;&lt;li&gt;truepeoplesearch.com&lt;/li&gt;&lt;li&gt;truthrecord.org&lt;/li&gt;&lt;li&gt;unmask.com&lt;/li&gt;&lt;li&gt;usa-people-search.com&lt;/li&gt;&lt;li&gt;usatrace.com&lt;/li&gt;&lt;li&gt;usphonebook.com&lt;/li&gt;&lt;li&gt;usrecords.net&lt;/li&gt;&lt;li&gt;uswarrants.org&lt;/li&gt;&lt;li&gt;vehiclerelatedrecords.com&lt;/li&gt;&lt;li&gt;verecor.com&lt;/li&gt;&lt;li&gt;vericora.com&lt;/li&gt;&lt;li&gt;veriforia.com&lt;/li&gt;&lt;li&gt;verifyrecords.com&lt;/li&gt;&lt;li&gt;veripages.com&lt;/li&gt;&lt;li&gt;virtory.com&lt;/li&gt;&lt;li&gt;weinform.org&lt;/li&gt;&lt;li&gt;wellnut.com&lt;/li&gt;&lt;li&gt;whitepages.com&lt;/li&gt;&lt;li&gt;yellowbook.com&lt;/li&gt;&lt;/ul&gt;&lt;/details&gt;&lt;details class=&#34;info&#34;&gt;&lt;summary&gt;We checked the following 10 sites, but didn&#39;t find any personal information, so we didn&#39;t perform opt outs&lt;/summary&gt;&lt;ul&gt;&lt;li&gt;americaphonebook.com&lt;/li&gt;&lt;li&gt;floridaresidentsdirectory.com&lt;/li&gt;&lt;li&gt;freepeopledirectory.com&lt;/li&gt;&lt;li&gt;northcarolinaresidentdatabase.com&lt;/li&gt;&lt;li&gt;ohioresidentdatabase.com&lt;/li&gt;&lt;li&gt;peoplewin.com&lt;/li&gt;&lt;li&gt;selfie.network&lt;/li&gt;&lt;li&gt;selfie.systems&lt;/li&gt;&lt;li&gt;spokeo.com&lt;/li&gt;&lt;li&gt;unitedstatesphonebook.com&lt;/li&gt;&lt;/ul&gt;&lt;/details&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;strong&gt;Person B:&lt;/strong&gt;&lt;/p&gt;&lt;details class=&#34;warning&#34;&gt;&lt;summary&gt;We found your information and performed opt outs for the following 107 sites&lt;/summary&gt;&lt;ul&gt;&lt;li&gt;411.com&lt;/li&gt;&lt;li&gt;advancedbackgroundchecks.com&lt;/li&gt;&lt;li&gt;arrestwarrant.org&lt;/li&gt;&lt;li&gt;backgroundcheck.run&lt;/li&gt;&lt;li&gt;backgroundcheckers.net&lt;/li&gt;&lt;li&gt;beenverified.com&lt;/li&gt;&lt;li&gt;bumper.com, covered by beenverified.com&lt;/li&gt;&lt;li&gt;centeda.com&lt;/li&gt;&lt;li&gt;checkpeople.com&lt;/li&gt;&lt;li&gt;checksecrets.com&lt;/li&gt;&lt;li&gt;clubset.com&lt;/li&gt;&lt;li&gt;councilon.com&lt;/li&gt;&lt;li&gt;courtcasefinder.com&lt;/li&gt;&lt;li&gt;curadvisor.com&lt;/li&gt;&lt;li&gt;cyberbackgroundchecks.com&lt;/li&gt;&lt;li&gt;dataveria.com&lt;/li&gt;&lt;li&gt;familytreenow.com&lt;/li&gt;&lt;li&gt;fastbackgroundcheck.com&lt;/li&gt;&lt;li&gt;fastpeoplesearch.com&lt;/li&gt;&lt;li&gt;findpeoplesearch.com&lt;/li&gt;&lt;li&gt;freepeoplesearch.com&lt;/li&gt;&lt;li&gt;gladiknow.com&lt;/li&gt;&lt;li&gt;golookup.com&lt;/li&gt;&lt;li&gt;goreversephone.com&lt;/li&gt;&lt;li&gt;govwarrantsearch.org&lt;/li&gt;&lt;li&gt;hudwayglass.com&lt;/li&gt;&lt;li&gt;information.com&lt;/li&gt;&lt;li&gt;infotracer.com&lt;/li&gt;&lt;li&gt;inmatessearcher.com&lt;/li&gt;&lt;li&gt;kidslivesafe.com&lt;/li&gt;&lt;li&gt;kwold.com&lt;/li&gt;&lt;li&gt;mugshotlook.com&lt;/li&gt;&lt;li&gt;neighborwho.com&lt;/li&gt;&lt;li&gt;newenglandfacts.com&lt;/li&gt;&lt;li&gt;numberguru.com&lt;/li&gt;&lt;li&gt;nuwber.com&lt;/li&gt;&lt;li&gt;ownerly.com&lt;/li&gt;&lt;li&gt;people-background-check.com&lt;/li&gt;&lt;li&gt;people-wizard.com&lt;/li&gt;&lt;li&gt;peoplebyname.com&lt;/li&gt;&lt;li&gt;peoplechk.com&lt;/li&gt;&lt;li&gt;peoplefinders.com&lt;/li&gt;&lt;li&gt;peoplelooker.com&lt;/li&gt;&lt;li&gt;peoplesearch123.com&lt;/li&gt;&lt;li&gt;peoplesearcher.com&lt;/li&gt;&lt;li&gt;peoplesearchnow.com&lt;/li&gt;&lt;li&gt;peoplesearchusa.org&lt;/li&gt;&lt;li&gt;peoplesmart.com&lt;/li&gt;&lt;li&gt;peopleswhizr.com&lt;/li&gt;&lt;li&gt;peopleswiz.com&lt;/li&gt;&lt;li&gt;peopleswizard.com&lt;/li&gt;&lt;li&gt;peoplewhiz.com&lt;/li&gt;&lt;li&gt;peoplewhiz.net&lt;/li&gt;&lt;li&gt;peoplewhized.com&lt;/li&gt;&lt;li&gt;peoplewhized.net&lt;/li&gt;&lt;li&gt;peoplewhizr.com&lt;/li&gt;&lt;li&gt;peoplewhizr.net&lt;/li&gt;&lt;li&gt;peoplewiz.com&lt;/li&gt;&lt;li&gt;peoplewizard.net&lt;/li&gt;&lt;li&gt;peoplewizr.com&lt;/li&gt;&lt;li&gt;personsearchers.com&lt;/li&gt;&lt;li&gt;persontrust.com&lt;/li&gt;&lt;li&gt;privaterecords.net&lt;/li&gt;&lt;li&gt;privatereports.com&lt;/li&gt;&lt;li&gt;pub360.com&lt;/li&gt;&lt;li&gt;publicdatacheck.com&lt;/li&gt;&lt;li&gt;publicinfoservices.com&lt;/li&gt;&lt;li&gt;publicrecordreports.com&lt;/li&gt;&lt;li&gt;publicsearcher.com&lt;/li&gt;&lt;li&gt;quickpeopletrace.com&lt;/li&gt;&lt;li&gt;radaris.com&lt;/li&gt;&lt;li&gt;recordsfinder.com&lt;/li&gt;&lt;li&gt;rehold.com&lt;/li&gt;&lt;li&gt;reverselookupaphonenumber.com&lt;/li&gt;&lt;li&gt;reversephonecheck.com&lt;/li&gt;&lt;li&gt;sealedrecords.net&lt;/li&gt;&lt;li&gt;searchpeoplefree.com&lt;/li&gt;&lt;li&gt;searchpublicrecords.com&lt;/li&gt;&lt;li&gt;searchquarry.com&lt;/li&gt;&lt;li&gt;secretinfo.org&lt;/li&gt;&lt;li&gt;smartbackgroundchecks.com&lt;/li&gt;&lt;li&gt;spydialer.com&lt;/li&gt;&lt;li&gt;spyfly.com&lt;/li&gt;&lt;li&gt;staterecords.org&lt;/li&gt;&lt;li&gt;telephonedirectories.us&lt;/li&gt;&lt;li&gt;texasarrests.org&lt;/li&gt;&lt;li&gt;texasarrestwarrants.org&lt;/li&gt;&lt;li&gt;thatsthem.com&lt;/li&gt;&lt;li&gt;truepeoplesearch.com&lt;/li&gt;&lt;li&gt;truthrecord.org&lt;/li&gt;&lt;li&gt;unmask.com&lt;/li&gt;&lt;li&gt;usa-people-search.com&lt;/li&gt;&lt;li&gt;usatrace.com&lt;/li&gt;&lt;li&gt;usphonebook.com&lt;/li&gt;&lt;li&gt;usrecords.net&lt;/li&gt;&lt;li&gt;uswarrants.org&lt;/li&gt;&lt;li&gt;vehiclerelatedrecords.com&lt;/li&gt;&lt;li&gt;verecor.com&lt;/li&gt;&lt;li&gt;vericora.com&lt;/li&gt;&lt;li&gt;veriforia.com&lt;/li&gt;&lt;li&gt;verifyrecords.com&lt;/li&gt;&lt;li&gt;veripages.com&lt;/li&gt;&lt;li&gt;virtory.com&lt;/li&gt;&lt;li&gt;weinform.org&lt;/li&gt;&lt;li&gt;wellnut.com&lt;/li&gt;&lt;li&gt;whitepages.com&lt;/li&gt;&lt;li&gt;yellowbook.com&lt;/li&gt;&lt;/ul&gt;&lt;/details&gt;&lt;details class=&#34;info&#34;&gt;&lt;summary&gt;We checked the following 15 sites, but didn&#39;t find any personal information, so we didn&#39;t perform opt outs&lt;/summary&gt;&lt;ul&gt;&lt;li&gt;americaphonebook.com&lt;/li&gt;&lt;li&gt;clustrmaps.com&lt;/li&gt;&lt;li&gt;floridaresidentsdirectory.com&lt;/li&gt;&lt;li&gt;freepeopledirectory.com&lt;/li&gt;&lt;li&gt;mylife.com&lt;/li&gt;&lt;li&gt;neighbor.report&lt;/li&gt;&lt;li&gt;northcarolinaresidentdatabase.com&lt;/li&gt;&lt;li&gt;officialusa.com&lt;/li&gt;&lt;li&gt;ohioresidentdatabase.com&lt;/li&gt;&lt;li&gt;peoplewin.com&lt;/li&gt;&lt;li&gt;reunion.com&lt;/li&gt;&lt;li&gt;selfie.network&lt;/li&gt;&lt;li&gt;selfie.systems&lt;/li&gt;&lt;li&gt;spokeo.com&lt;/li&gt;&lt;li&gt;unitedstatesphonebook.com&lt;/li&gt;&lt;/ul&gt;&lt;/details&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;In addition, for all subscriptions EasyOptOuts says that &#34;the following 10 sites aren&#39;t freely searchable. We always perform opt outs for them:&#34;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;acxiom.com&lt;/li&gt;&lt;li&gt;adstradata.com&lt;/li&gt;&lt;li&gt;archives.com&lt;/li&gt;&lt;li&gt;backgroundalert.com (searchable, but covered by lexisnexis.com, which isn&#39;t searchable)&lt;/li&gt;&lt;li&gt;idtrue.com (searchable, but covered by lexisnexis.com, which isn&#39;t searchable)&lt;/li&gt;&lt;li&gt;lexisnexis.com&lt;/li&gt;&lt;li&gt;oracle.com&lt;/li&gt;&lt;li&gt;pipl.com&lt;/li&gt;&lt;li&gt;thomsonreuters.com&lt;/li&gt;&lt;li&gt;us.epsilon.com&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;What this means is that EasyOptOuts will send the personal information you provide to these websites &lt;em&gt;regardless&lt;/em&gt; of whether they have your information in the first place. While this is an unfortunate necessity if you want to ensure your data is removed from as many databases as possible, we would like to see this provided as an &lt;em&gt;option&lt;/em&gt; during EasyOptOuts&#39; registration process for people who would like to avoid this behavior.&lt;/p&gt;&lt;h2 id=&#34;evaluation&#34;&gt;Evaluation&lt;/h2&gt;&lt;p&gt;For our final evaluation, we will look at how many of the initial Google search engine results are no longer listed after 3 months, how many results from the 15 data brokers we initially measured were removed, and how many results from the subset of the 15 data brokers that EasyOptOuts advertises support for (13 total) were removed.&lt;/p&gt;&lt;p&gt;The first two results are intended to benchmark the &#34;real-world efficacy&#34; of EasyOptOuts, i.e. how much of an impact you will immediately notice while using the service. The third result is intended to benchmark how well EasyOptOuts lives up to their own marketing claims.&lt;/p&gt;&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Person A&lt;/th&gt;&lt;th&gt;Person B&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Percentage of Google search results removed&lt;/td&gt;&lt;td&gt;90%&lt;/td&gt;&lt;td&gt;80%&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Percentage of high-priority data brokers removed&lt;/td&gt;&lt;td&gt;86%&lt;/td&gt;&lt;td&gt;73%&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Percentage of &lt;em&gt;compatible&lt;/em&gt; high-priority data brokers removed&lt;/td&gt;&lt;td&gt;100%&lt;/td&gt;&lt;td&gt;84%&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;Based on these results, I consider EasyOptOuts to be well worth the money. It made a substantial difference in the amount of real-world exposure for both subjects, with relatively little effort required. The amount of data remaining publicly accessible is a very manageable amount that can be manually dealt with afterward.&lt;/p&gt;&lt;p&gt;It isn&#39;t a perfect service, and even our limited testing shows that your mileage may vary depending on your individual circumstances, but any reduction in the amount of data publicly available about you is a good thing, and if you&#39;re in the United States this is certainly an option worth considering.&lt;/p&gt;&lt;div class=&#34;footnote&#34;&gt;&lt;hr /&gt;&lt;ol&gt;&lt;li id=&#34;fn:1&#34;&gt;&lt;p&gt;While writing this article, EasyOptOuts added support for &lt;em&gt;publicdatausa.com&lt;/em&gt;. This was first applicable during the &#34;3 month&#34; test, where we noticed the opt-out was successful.&amp;#160;&lt;a class=&#34;footnote-backref&#34; href=&#34;#fnref:1&#34; title=&#34;Jump back to footnote 1 in the text&#34;&gt;&amp;#8617;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;</description><link>https://www.privacyguides.org/articles/2025/02/03/easyoptouts-review/</link> <pubDate>Mon, 03 Feb 2025 16:11:02 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/02/03/easyoptouts-review/</guid> </item> <item> <title>Using Tails When Your World Doesn&#39;t Feel Safe Anymore</title> <author>Em</author> <category>Tutorials</category> <description>&lt;h1 id=&#34;using-tails-when-your-world-doesnt-feel-safe-anymore&#34;&gt;Using Tails When Your World Doesn&#39;t Feel Safe Anymore&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Photo of a hand plugging a USB stick into a laptop and the Tails logo under it.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/cover.webp&#34; /&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Aleksander Dumała / Pexels&lt;/small&gt;&lt;/p&gt;&lt;p&gt;There is a growing number of people who no longer feel safe in their own home or country. Whatever the reason, many people might not feel safe to browse certain topics online. With all the information getting collected for each internet search, it is difficult to access sometime vital information without leaving a trace. These digital footprints might not threaten your personal safety if you are living with a supportive family, and in a democratic and free country. However, there are situations where someone might be put in great danger simply for looking at a website.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;While this guide will be applicable to many, I am writing this article with these groups in mind:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Victims of domestic violence,&lt;/li&gt;&lt;li&gt;Trans and queer individuals living in a hostile environment, and&lt;/li&gt;&lt;li&gt;Democracy and human rights activists located in regions adverse to their cause.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;This article will help people in such situations learn how to browse the internet and use a computer in a more protected and anonymous way, in order to stay safe from harm.&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;A warning for those at very high risk&lt;/p&gt;&lt;p&gt;If you feel at very high risk in your home or country, and the device you are currently using to read this article could be accessed by a person or group meaning you harm, I recommend you ask a &lt;em&gt;trusted ally&lt;/em&gt; who does not experience the same level of threat to complete this tutorial for you on their device instead. This will help with minimizing any digital traces left on your device that could endanger you.&lt;/p&gt;&lt;p&gt;Then, I recommend that &lt;strong&gt;you erase your browsing history (ideally, delete this and related websites only) and clear your browser&#39;s cache and cookies&lt;/strong&gt;. If you have a Google account and used Google to find this article, also make sure to &lt;a href=&#34;https://support.google.com/websearch/answer/6096136&#34;&gt;&lt;strong&gt;delete your Google search history&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Once you have securely reached out to a trusted ally to request their help, and erased your browser&#39;s data for this site, do not consult this article again &lt;em&gt;if the digital traces of it might put you in danger&lt;/em&gt;.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;If you are completing this installation for someone else, or if the device your are currently using cannot put you at risk, here&#39;s why, when, and how you can install and use the portable system Tails:&lt;/p&gt;&lt;h2 id=&#34;what-is-tails&#34;&gt;What is Tails?&lt;/h2&gt;&lt;p&gt;&lt;img alt=&#34;Illustration of the Tails logo.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-logo-flat-inverted.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Tails / Tor Project&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Tails is a portable &lt;em&gt;operating system&lt;/em&gt; (a type of software like Windows and macOS) that is especially designed to minimize your digital footprints while using it.&lt;/p&gt;&lt;p&gt;The name is an acronym for &#34;The Amnesic Incognito Live System&#34;. It is kept on a USB stick and resets itself entirely after each use (except if you enable its encrypted password-protected &lt;a href=&#34;https://tails.net/doc/persistent_storage/index.en.html&#34;&gt;Persistent Storage&lt;/a&gt;). What is done on Tails does not leave any digital traces on the computer it is plugged into, hence &#34;amnesic.&#34;&lt;/p&gt;&lt;p&gt;Additionally, Tails comes with pre-installed applications that will help increase your security and privacy online. When accessing the internet from Tails, your traffic will be automatically rerouted through the &lt;a href=&#34;https://www.privacyguides.org/en/advanced/tor-overview/&#34;&gt;Tor network&lt;/a&gt;. This is a special network that makes it very difficult to identify your location or the websites you access, even from your Internet Service Provider (&lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;).&lt;/p&gt;&lt;p&gt;However, unless you configure the &lt;a href=&#34;https://tails.net/doc/anonymous_internet/tor/index.en.html#hiding&#34;&gt;Tor bridge&lt;/a&gt; option to hide this, your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; will know you have been using Tor, although they will not know which websites in particular you have visited through Tor. It could have been anything. I personally use Tor when I have to visit Google Maps, just to protect my data from Google&#39;s advertising.&lt;/p&gt;&lt;h2 id=&#34;why-you-might-want-to-use-tails&#34;&gt;Why you might want to use Tails&lt;/h2&gt;&lt;p&gt;There are many good and legitimate reasons for using Tails. Here are a few examples from the scenarios I am considering in this article:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;A victim of domestic violence who needs a secure way to research and communicate with shelters or other supportive resources to plan a safe escape, without leaving traces of their activities on a device accessible to the perpetrator.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;A trans or queer individual who lives with an unsupportive or hostile family and wishes to research trans or queer-related topics online, find communities, or access supportive resources without leaving any digital traces of their activities on a family device.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;A democracy or human rights activist who organizes protests, communicate information online, or carry on any other activities that might have been declared unauthorized by an oppressive regime.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Any other situations where browsing the web or using a device anonymously might be necessary to protect someone&#39;s safety.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;h2 id=&#34;when-to-use-tails-and-when-not-to-use-tails&#34;&gt;When to use Tails, and when not to use Tails&lt;/h2&gt;&lt;p&gt;Tails protects some data very well, but it will not magically protect everything. Before using it, read carefully what it can help you with and what it cannot do.&lt;/p&gt;&lt;h3 id=&#34;when-using-tails-might-help-you&#34;&gt;When using Tails might help you&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Browsing the web without leaving traces on your main computer.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Using a computer without leaving traces of your activities on your main computer.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Storing information and processing files in an encrypted way, away from your main computer.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Hiding which websites you visit from your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; by using Tor, without leaving traces on your main computer.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;what-you-should-be-careful-about&#34;&gt;What you should be careful about&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Remember that unless you enable the Tor bridge, your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; will know you have accessed the Tor network. Your government could request this information from your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;. Be careful if this can put you in danger in your country. If you are not using Tails from a public Wi-Fi network, and if revealing to your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; that you are using Tor could be dangerous to you, you should &lt;a href=&#34;https://tails.net/doc/anonymous_internet/tor/index.en.html#hiding&#34;&gt;enable the Tor bridge option&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Tails cannot protect your anonymity if while using Tails you log into an account that you have already been identified with, or have used outside of Tails. While using Tails, &lt;strong&gt;do not log into anything that you have logged in outside of Tails&lt;/strong&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;If you communicate with others or create an account within Tails, be mindful not to share any personal details that could identify you while using Tails.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;If you share any files, be careful to &lt;strong&gt;remove thoroughly any metadata&lt;/strong&gt; that could identify you from the file.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;If you share any pictures or videos, be extremely cautious with removing metadata and examining the picture or video to make sure no reflections or other details could inadvertently identify you.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Do not to reuse any usernames, pseudonyms, email addresses, phone numbers, profile pictures, passwords, or any other information that you have used outside of Tails.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Do not do anything that could identify you while using Tails. Assume that everything you do while using Tails could be linked together.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Be careful with using any mobile data network to connect to the internet. Information related to &lt;a href=&#34;https://tails.net/doc/anonymous_internet/no-wifi/index.en.html&#34;&gt;your mobile device could identify you&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;A very powerful adversary, such as a government, could potentially reidentify some information despite you using Tails. Read more about Tails&#39; limitations here: &lt;a href=&#34;https://tails.net/doc/about/warnings/index.en.html&#34;&gt;https://tails.net/doc/about/warnings/index.en.html&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;when-you-should-not-use-tails&#34;&gt;When you should &lt;strong&gt;not&lt;/strong&gt; use Tails&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;If someone finding your Tails USB stick could put you in worse danger than not using it at all.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;If you have not enabled the Tor bridge option, and your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; or government finding out you have accessed Tor could put you in worse danger than not using it at all.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;When the computer you are using Tails with might be &lt;a href=&#34;https://tails.net/doc/about/warnings/computer/index.en.html&#34;&gt;compromised at the firmware or hardware level&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;When there are cameras in your environment recording your activity on this computer.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;If your computer cannot securely boot from an external USB stick.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2 id=&#34;installing-tails&#34;&gt;Installing Tails&lt;/h2&gt;&lt;p&gt;Before you start, make sure that:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;The device you use for the installation is free from malware or spyware.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;There is no recording software such as &lt;a href=&#34;https://allthings.how/how-to-turn-off-windows-recall-ai-feature-in-windows-11-copilot-plus-pcs/&#34;&gt;Windows Recall&lt;/a&gt; running. If there is, disable or pause it and delete your visit of this website from it.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;You have a USB stick with a storage capacity of at least 8 GB. Ideally, I recommend using a fresh and new USB stick, but if this is not accessible to you, make sure you can erase this USB stick entirely and that the files on it were not sensitive or revealing information. Assume your USB stick could get seized later on and these deleted files could potentially get restored.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;If you complete this installation for someone else, or if it is safe for you to do so (ordering online leaves a lot of digital footprints!), you may be interested in using a USB stick that looks more like a banal object. You can easily find cheap USB sticks on popular online stores that look like innocuous cartoon keychain charms, for example.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;h3 id=&#34;what-youll-need&#34;&gt;What you&#39;ll need&lt;/h3&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; USB stick with a storage capacity of at least 8 GB.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; A computer with a port compatible with your USB stick (both for installation and usage).&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; A computer running one of these operating systems: Apple computer with &lt;em&gt;Intel&lt;/em&gt; processor (not M1-M2-M3) running macOS version 10.10 or later, PC with at least 2 GB of RAM running Windows 7 or later, PC with at least 2 GB of RAM running Linux.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Capacity to install new software on the computer you are using for the installation.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; At least 1-2 hours of free time when you are safe and free from threats.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Hardware incompatibility&lt;/p&gt;&lt;p&gt;You might experience some hardware incompatibilities while running Tails (this is common for Linux-based software on Mac devices). If this happens, you will need to use &lt;strong&gt;a wired (or dongle) mouse, a wired (or dongle) keyboard, and a Wi-Fi adapter or an internet access you can plug in directly from an &lt;a href=&#34;https://simple.wikipedia.org/wiki/Ethernet&#34;&gt;Ethernet cable&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;If you need a Wi-Fi adapter, you will find a list of adapters compatible with Tails at the bottom of this page: &lt;a href=&#34;https://tails.net/doc/anonymous_internet/no-wifi/index.en.html&#34;&gt;https://tails.net/doc/anonymous_internet/no-wifi/index.en.html&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Be very careful if you decide to use mobile phone connectivity, however. The data linked to your mobile device could de-anonymize you, even while using Tails. More information on this here: &lt;a href=&#34;https://tails.net/doc/anonymous_internet/no-wifi/index.en.html&#34;&gt;https://tails.net/doc/anonymous_internet/no-wifi/index.en.html&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Delete your traces afterward&lt;/p&gt;&lt;p&gt;Depending on your situation, you might want to delete the traces of this installation after. See a To-Do list for this on &lt;a href=&#34;#step-9-delete-the-installation-traces&#34;&gt;Step 9&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;About this tutorial&lt;/p&gt;&lt;p&gt;I am going to walk you through a &lt;strong&gt;step-by-step through the process for an installation from macOS&lt;/strong&gt;. If you are using a computer running Windows or Linux, the steps will be similar, but the windows appearances and warnings will vary. The steps to boot from an external USB stick will also vary.&lt;/p&gt;&lt;p&gt;You might decide to reference the &lt;a href=&#34;https://tails.net/install/index.en.html&#34;&gt;guides from the Tails website&lt;/a&gt; instead. Tails&#39; installation guides are excellent.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;If you encounter any issues during the installation or running processes, you can try to find support specific to your issue here: &lt;a href=&#34;https://tails.net/support/index.en.html&#34;&gt;https://tails.net/support/index.en.html&lt;/a&gt;&lt;/p&gt;&lt;h3 id=&#34;step-1-download-tails&#34;&gt;Step 1: Download Tails&lt;/h3&gt;&lt;p&gt;Visit this website and select your installation computer&#39;s operating system: &lt;a href=&#34;https://tails.net/install/&#34;&gt;https://tails.net/install/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a browser window showing Tails&#39; installation page.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-1.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;Scroll down to the &#34;&lt;strong&gt;Download Tails&lt;/strong&gt;&#34; section and click on the green download button. Make sure to save the installation file in a folder where you can find it back easily and not forget to &lt;strong&gt;delete it afterwards&lt;/strong&gt;.&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Warning&lt;/p&gt;&lt;p&gt;Do not save this file on your USB stick!&lt;/p&gt;&lt;/div&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Always install the latest version of Tails&lt;/p&gt;&lt;p&gt;The download link is not shared directly here because you should always make sure to download and install &lt;a href=&#34;https://tails.net/doc/upgrade/&#34;&gt;the most recent version of Tails&lt;/a&gt;. If you read this article at a later date, the version number you will be installing will likely be higher than the number shown here.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a browser window showing Tails&#39; download step.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-2.png&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;step-2-verify-the-file-you-just-downloaded&#34;&gt;Step 2: Verify the file you just downloaded&lt;/h3&gt;&lt;p&gt;Scroll down to &#34;&lt;strong&gt;Verify your download&lt;/strong&gt;&#34; and click on &#34;&lt;strong&gt;Select your download to verify...&lt;/strong&gt;&#34;&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Do not skip this step!&lt;/p&gt;&lt;p&gt;This step is important to ensure the file you just downloaded has not been tampered with or corrupted during the process.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a browser window showing Tails&#39; verification step.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-3.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;Once the verification is completed (this might take a few minutes), you should see a green checkmark with &#34;&lt;strong&gt;Verification successful!&lt;/strong&gt;&#34; followed by the file name. If you do not see this, delete the file and repeat &lt;a href=&#34;#step-1-download-tails&#34;&gt;Step 1&lt;/a&gt; and &lt;a href=&#34;#step-2-verify-the-file-you-just-downloaded&#34;&gt;Step 2&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a browser window showing Tails&#39; successful verification with file name.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-4.png&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;step-3-download-and-install-balenaetcher&#34;&gt;Step 3: Download and install balenaEtcher&lt;/h3&gt;&lt;p&gt;You will need this free software in order to install Tails on your USB stick.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Reminder&lt;/p&gt;&lt;p&gt;Make sure the USB stick you have has a storage capacity of at least 8 GB, and does not store any files you wish to keep. Ideally, use a fresh never-used-before USB stick.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;You can download &lt;em&gt;balenaEtcher&lt;/em&gt; from this link: &lt;a href=&#34;https://tails.net/etcher/balenaEtcher.dmg&#34;&gt;https://tails.net/etcher/balenaEtcher.dmg&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Open the folder where you downloaded the &lt;em&gt;balenaEtcher&lt;/em&gt; installation file (keep it open to delete this file after the installation is completed), and double-click on the &#34;&lt;strong&gt;balenaEtcher.dmg&lt;/strong&gt;&#34; file. Drag the &#34;&lt;strong&gt;balenaEtcher.app&lt;/strong&gt;&#34; icon over the &#34;&lt;strong&gt;Applications&lt;/strong&gt;&#34; folder icon when prompted from the window below:&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a macOS application installation window for balenaEtcher.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-5.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;Once the file is copied to you &#34;&lt;strong&gt;Applications&lt;/strong&gt;&#34; folder, go on your computer&#39;s desktop and right-click on the &#34;&lt;strong&gt;balenaEtcher&lt;/strong&gt;&#34; icon. Select &#39;&lt;strong&gt;Eject &#34;balenaEtcher&#34;&lt;/strong&gt;&#39;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a desktop showing the balenaEtcher installation icon and a macOS menu with the option to Eject balenaEtcher.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-6.png&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;step-4-install-tails-on-your-usb-stick-using-balenaetcher&#34;&gt;Step 4: Install Tails on your USB stick using balenaEtcher&lt;/h3&gt;&lt;p&gt;4.1. Open your Mac&#39;s &#34;&lt;strong&gt;Applications&lt;/strong&gt;&#34; folder and double-click on &#34;&lt;strong&gt;balenaEtcher.app&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;p&gt;Depending on your macOS version, your Mac might open a popup window saying &#39;&lt;strong&gt;Verifying &#34;balenaEtcher.app&#34;...&lt;/strong&gt;&#39;. This is normal, let it complete its verification. Next, you will likely see another popup window with &#39;&lt;strong&gt;&#34;balenaEtcher.app” is an app downloaded from the Internet. Are you sure you want to open it?&lt;/strong&gt;&#39;. Click &#34;&lt;strong&gt;Open&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a macOS popup with a verifying loading bar.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-7.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a macOS popup with a warning message with the options to Cancel or Open.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-8.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;4.2. Open &lt;em&gt;balenaEtcher&lt;/em&gt; and click on the settings gear button on the upper-right. Disable the option &#34;&lt;strong&gt;Anonymously report errors and usage statistics to balena.io&lt;/strong&gt;&#34;, then click &#34;&lt;strong&gt;OK&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a balenaEtcher window showing a gear icon on the upper-right, and a disabled option to share anonymous error reports.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-9.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;4.3. Eject and unplug any other external USB stick(s) or external USB drive(s) that might be plugged into your computer if possible, and plug in the USB stick you wish to erase and install Tails on.&lt;/p&gt;&lt;p&gt;4.4. Once it is plugged in, return to &lt;em&gt;balenaEtcher&lt;/em&gt; and click on the &#34;&lt;strong&gt;Flash from file&lt;/strong&gt;&#34; blue button on the left. You will be prompted to select a file. Select the Tails &#34;&lt;strong&gt;.img&lt;/strong&gt;&#34; file you have downloaded and verified earlier.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a balenaEtcher window showing 3 buttons. The button on the left is blue and labeled Flash from file.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-10.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;4.5. Click on the &#34;&lt;strong&gt;Select target&lt;/strong&gt;&#34; blue button in the middle, and select your USB stick.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a balenaEtcher window showing 3 buttons. The button in the middle is blue and labeled &amp;quot;Select target&amp;quot;.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-11.png&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Caution! Select the correct USB stick!&lt;/p&gt;&lt;p&gt;Make sure you are not selecting a USB stick or drive different from the one you wish to erase for Tails. &lt;strong&gt;All data on the USB stick or drive you select will be permanently lost. Be careful!&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a balenaEtcher window inside a menu with one or more checkboxes. One checkbox is selected next to a USB stick name and description.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-12.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;4.6. Once you have verified that all the information is correct, click on the &#34;&lt;strong&gt;Flash!&lt;/strong&gt;&#34; blue button on the right.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a balenaEtcher window showing 3 buttons. The button on the right is blue and labeled &amp;quot;Flash!&amp;quot;.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-13.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;You will see a &lt;em&gt;balenaEtcher&lt;/em&gt; popup window saying: &#34;&lt;strong&gt;balenaEtcher needs privileged access in order to flash disks. Type your password to allow this.&lt;/strong&gt;&#34;. Type your computer&#39;s password and click &#34;&lt;strong&gt;Ok&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a macOS popup warning with a password field.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-14.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;Depending on the version of macOS you use, you might see another popup window saying &#39;&lt;strong&gt;&#34;balenaEtcher.app&#34; would like to access files on a removable volume.&lt;/strong&gt;&#39;. Click &#34;&lt;strong&gt;OK&lt;/strong&gt;&#34; and wait for the installation to start.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a macOS popup warning with the options to &amp;quot;Don&#39;t Allow&amp;quot; or &amp;quot;OK&amp;quot;.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-15.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;While Tails is getting installed, you should see a window that looks like this with &#34;&lt;strong&gt;Flashing...&lt;/strong&gt;&#34;. The operation might take a few minutes. Do not interrupt this process!&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a balenaEtcher window showing on the left a Flashing progression bar.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-16.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;4.7. Once Flashing is completed, you will see &lt;em&gt;balenaEtcher&lt;/em&gt; validating the installation with &#34;&lt;strong&gt;Validating...&lt;/strong&gt;&#34;. This process should be quick.&lt;/p&gt;&lt;div class=&#34;admonition failure&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Failed validation&lt;/p&gt;&lt;p&gt;If the validation fails, close &lt;em&gt;balenaEtcher&lt;/em&gt;, eject your USB stick, and try the installation process again from &lt;a href=&#34;#step-4-install-tails-on-your-usb-stick-using-balenaetcher&#34;&gt;Step 4&lt;/a&gt;. You may also want to try with a different USB port or a different USB stick.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a balenaEtcher window showing on the left a Validating progression bar.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-17.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;Once the installation is completed successfully, you should see a window like this with &#34;&lt;strong&gt;Flash Completed!&lt;/strong&gt;&#34; on the left. You can now close &lt;em&gt;balenaEtcher&lt;/em&gt; and unplug your USB stick.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Unreadable USB&lt;/p&gt;&lt;p&gt;If you see a notification about a USB stick that appears to be unreadable, click &#34;&lt;strong&gt;Eject&lt;/strong&gt;&#34; and unplug your USB stick.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a balenaEtcher window showing on the left a green checkmark with &amp;quot;Flash Completed!&amp;quot;.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-installation-mac-18.png&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;step-5-continue-this-tutorial-from-paper-or-from-another-device-if-you-can-do-so-safely&#34;&gt;Step 5: Continue this tutorial from paper or from another device (if you can do so safely)&lt;/h3&gt;&lt;p&gt;For the rest of this tutorial, you will have to shut down the computer you will be using or testing Tails with. If this is the same computer you are currently using, you will need an aternative way to keep following along with the instructions. Make sure you either:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Note the rest of the instructions in advance on something that will be easy to delete/erase/destroy after.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Open this article on a mobile device where it is not dangerous for you to visit this page.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;step-6-boot-your-computer-from-your-tails-usb-stick&#34;&gt;Step 6: Boot your computer from your Tails USB stick&lt;/h3&gt;&lt;details class=&#34;warning&#34;&gt;&lt;summary&gt;Warning: If the computer running Tails is a Mac with a T2 Security Chip (2018-2020):&lt;/summary&gt;&lt;p&gt;If the computer you will be using Tails with is a &lt;a href=&#34;https://support.apple.com/en-us/103265&#34;&gt;Mac with a T2 Security Chip&lt;/a&gt;, and you receive the following message (or similar) when trying to boot your Mac from your Tails USB stick:&lt;/p&gt;&lt;p&gt;&lt;code&gt;Security settings do not allow this Mac to use an external startup disk.&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Here&#39;s how to modify options in your Mac&#39;s &lt;a href=&#34;https://support.apple.com/en-us/102522&#34;&gt;Startup Security Utility&lt;/a&gt; to make this works:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Turn off your Mac, then turn it on again and right away press and hold &lt;strong&gt;Command(⌘)+R&lt;/strong&gt;, this will enter your Mac&#39;s recovery mode. The startup process will take longer than usual and you will see the screen flashing a few times, this is normal.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;You will see a &#34;&lt;strong&gt;Language&lt;/strong&gt;&#34; menu appear, select a language then click on the arrow at the bottom-right.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;If your computer has multiple volumes (disks), you will be required to select one, then click &#34;&lt;strong&gt;Next&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;You will need to select a user you know the password for and enter it, then click &#34;&lt;strong&gt;Next&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Once you see a window with 4 options, select none of these and instead go to the upper-left menu to select the &#34;&lt;strong&gt;Utilities&lt;/strong&gt;&#34; drop-menu, then select &#34;&lt;strong&gt;Startup Security Utility&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;You will see an &#34;&lt;strong&gt;Authentication Needed&lt;/strong&gt;&#34; window appear and you will need to enter your macOS user password again.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Once you see the &#34;&lt;strong&gt;Startup Security Utility&lt;/strong&gt;&#34; window with 5 options, in the &#34;&lt;strong&gt;Secure Boot&lt;/strong&gt;&#34; section select &#34;&lt;strong&gt;No Security&lt;/strong&gt;&#34; and in the &#34;&lt;strong&gt;External Boot&lt;/strong&gt;&#34; or &#34;&lt;strong&gt;Allowed Boot Media&lt;/strong&gt;&#34; section select &#34;&lt;strong&gt;Allow booting from external or removable media&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Security warning!&lt;/p&gt;&lt;p&gt;This reduces the security of your device because your computer could boot from anything else as well. You could &#34;Turn On Firmware Password&#34; at the top to mitigate this, however, if others use this device, I would recommend that you do not do this. Enabling a firmware password would require this new password to be entered &lt;a href=&#34;https://support.apple.com/en-us/102384&#34;&gt;each time this device starts from a different disk&lt;/a&gt;. This could raise a lot of suspicions if there was no password before.&lt;/p&gt;&lt;p&gt;Moreover, if you ever lose this password, you would be entirely locked out of this device and require an in-person service at the Apple Store to be able to keep using it.&lt;/p&gt;&lt;p&gt;If you want to hide that you are using Tails from the people near you, I would recommend you do &lt;strong&gt;not&lt;/strong&gt; turn on firmware password. However, do know this could increase some security risks for this device.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a macOS &amp;quot;Startup Security Utility&amp;quot; window from the recovery mode. In the &amp;quot;Secure Boot&amp;quot; section the option &amp;quot;No Security&amp;quot; is selected. In the &amp;quot;External Boot&amp;quot; section the option &amp;quot;Allow booting from external media&amp;quot; is selected.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/mac-startup-security-utility.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Screenshot: Tails / Tor Project&lt;/small&gt;&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Quit Recovery Mode&lt;/p&gt;&lt;p&gt;Once you have modified your &#34;&lt;strong&gt;Startup Security Utility&lt;/strong&gt;&#34; options, click on the drop-down Apple menu (apple icon) of the upper-left, then select &#34;&lt;strong&gt;Shut Down&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;/div&gt;&lt;/details&gt;&lt;p&gt;To boot from your Tails USB stick:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;From macOS:&lt;/strong&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Shut down your computer.&lt;/li&gt;&lt;li&gt;Plug in your Tails USB stick.&lt;/li&gt;&lt;li&gt;Turn on your Mac, then right away press and hold the &#34;&lt;strong&gt;Option&lt;/strong&gt;&#34; key (⌥ or Alt key) until you see a loading bar or a disks menu.&lt;/li&gt;&lt;li&gt;When you see a disks menu, select the yellow disk called &#34;&lt;strong&gt;EFI Boot&lt;/strong&gt;&#34; or &#34;&lt;strong&gt;Windows&lt;/strong&gt;&#34;.&lt;/li&gt;&lt;/ol&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;No disks menu?&lt;/p&gt;&lt;p&gt;If you do not see this disks menu, wait 2-3 minutes, shut down your computer, unplug your USB stick, plug it in another port if you can, and start the boot process over.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;strong&gt;From Windows 8 or 10:&lt;/strong&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;From Windows or the sign-in screen, click on the &#34;&lt;strong&gt;Start&lt;/strong&gt;&#34; button.&lt;/li&gt;&lt;li&gt;While you choose &#34;&lt;strong&gt;Power&lt;/strong&gt;&#34; &amp;gt; &#34;&lt;strong&gt;Restart&lt;/strong&gt;&#34;, press and hold the &#34;&lt;strong&gt;Shift&lt;/strong&gt;&#34; key.&lt;/li&gt;&lt;li&gt;Once you get to the &#34;&lt;strong&gt;Choose and option&lt;/strong&gt;&#34; screen, select &#34;&lt;strong&gt;Use a device&lt;/strong&gt;&#34;&lt;/li&gt;&lt;li&gt;In &#34;&lt;strong&gt;Use a device&lt;/strong&gt;&#34;, select &#34;&lt;strong&gt;Boot Menu&lt;/strong&gt;&#34; and plug in your Tails USB stick while Windows is shutting down.&lt;/li&gt;&lt;/ol&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Boot Step 3: No device selection menu?&lt;/p&gt;&lt;p&gt;If you do not see this, follow these instructions from Tails: &lt;a href=&#34;https://tails.net/doc/first_steps/start/pc/index.en.html#boot-menu-key&#34;&gt;https://tails.net/doc/first_steps/start/pc/index.en.html#boot-menu-key&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Boot Step 4: No boot menu?&lt;/p&gt;&lt;p&gt;If Windows does not display a &#34;&lt;strong&gt;Boot Menu&lt;/strong&gt;&#34;, plug in your Tails USB stick then select it directly from the list of devices. Press &#34;&lt;strong&gt;Enter&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;strong&gt;From Linux:&lt;/strong&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Shut down your computer.&lt;/li&gt;&lt;li&gt;Plug in your Tails USB stick.&lt;/li&gt;&lt;li&gt;Identify the Boot Menu key for your specific computer manufacturer. You can see a list of the most common ones here: &lt;a href=&#34;https://tails.net/doc/first_steps/start/pc/index.en.html#boot-menu-key&#34;&gt;https://tails.net/doc/first_steps/start/pc/index.en.html#boot-menu-key&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Turn on your computer and immediately press and hold this identified Boot Menu key.&lt;/li&gt;&lt;/ol&gt;&lt;h2 id=&#34;starting-and-using-tails&#34;&gt;Starting and using Tails&lt;/h2&gt;&lt;p&gt;If the installation was successful and the process of booting from the USB stick went well, you will see Tails starting. You will see some grey screens, you will see some flashes, you will see some black screen with lots of white text rolling down very quickly!&lt;/p&gt;&lt;p&gt;Don&#39;t panic! This is normal &lt;img alt=&#34;👍&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f44d.svg&#34; title=&#34;:thumbsup:&#34; /&gt;&lt;/p&gt;&lt;p&gt;Once Tails has started, you will see a top menu bar with a blue wallpaper. It might take a few minutes before you see a window popping up there, this is also normal. Be patient.&lt;/p&gt;&lt;p&gt;The first window you should see is a window saying &#34;&lt;strong&gt;Welcome to Tails!&lt;/strong&gt;&#34;&lt;/p&gt;&lt;p&gt;There, you will see language options, the &lt;a href=&#34;https://tails.net/doc/persistent_storage/index.en.html&#34;&gt;Persistent Storage&lt;/a&gt; option, and Additional Settings options.&lt;/p&gt;&lt;div class=&#34;admonition bug&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;No keyboard! No mouse!&lt;/p&gt;&lt;p&gt;At this point you might realize your mouse and/or keyboard are not working. If this happens, you can use a wired (or dongle) mouse and a wired (or dongle) keyboard to fix this problem quickly. If you plug a peripheral in and it is still not working, leave all peripherals plugged in and restart Tails (see &lt;a href=&#34;#step-6-boot-your-computer-from-your-tails-usb-stick&#34;&gt;Step 6&lt;/a&gt;).&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;using-persistent-storage&#34;&gt;Using Persistent Storage&lt;/h3&gt;&lt;p&gt;Make sure to test this feature works well multiple times before storing anything of value there. If you forget the Persistent Storage&#39;s password or if a bug occurs, you might no be able to access these files anymore. Know that you also have the option to plug in a separate (ideally encrypted) USB stick to store files on it, even while using Tails. If you encounter a problem when using Tails&#39; Persistent Storage feature, you can troubleshoot it here: &lt;a href=&#34;https://tails.net/doc/persistent_storage/fsck/index.en.html&#34;&gt;https://tails.net/doc/persistent_storage/fsck/index.en.html&lt;/a&gt;&lt;/p&gt;&lt;p&gt;If you decide to setup Persistent Storage:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Choose a long passphrase that is &lt;strong&gt;not&lt;/strong&gt; something known like music lyrics or movie quotes. Choose something you do not usually say/write and that you could not Google. Choose &lt;strong&gt;something long and unique&lt;/strong&gt;, that nobody else has used before, and that you will be able to remember well. Practice this passphrase in your head regularly.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;After setting up Persistent Storage, you will see a window like this with additional options:&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a window within Tails titled &amp;quot;Persistent Storage&amp;quot; and showing various options.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-usage-persistentstorage.png&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;connecting-to-the-internet&#34;&gt;Connecting to the internet&lt;/h3&gt;&lt;p&gt;Make sure that your Wi-Fi card, Wi-Fi adapter, or Ethernet cable is plugged in and working. On the upper-right menu bar, click on the onion icon and select &#34;&lt;strong&gt;Open Tor Connection Assistant&lt;/strong&gt;&#34;. You will see a &#34;&lt;strong&gt;Tor Connection&lt;/strong&gt;&#34; window appear with a few options. If it is not dangerous for you to have your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; or government know you are using the Tor network, choose &#34;&lt;strong&gt;Connect to Tor automatically&lt;/strong&gt;&#34; then click on &#34;&lt;strong&gt;Connect to Tor&lt;/strong&gt;&#34;.&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Danger!&lt;/p&gt;&lt;p&gt;If using Tor is dangerous for you, read more about the other options before deciding anything.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a window within Tails titled &amp;quot;Tor Connection&amp;quot; and showing various options.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-usage-torconnection.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;If the connection is successful, you should see this window and you will be ready to browse the internet anonymously:&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a window within Tails titled &amp;quot;Tor Connection&amp;quot; indicating the connection to Tor was successful. There is a button at the bottom labeled &amp;quot;Start Tor Browser&amp;quot;.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-usage-torconnection-successful.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot within Tails showing the Tor Browser application displaying the onion version of the Privacy Guides website.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-usage-privacyguides-onion.png&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;sharing-files-with-others&#34;&gt;Sharing files with others&lt;/h3&gt;&lt;p&gt;There is a lot of great applications already installed on Tails to help you! You will find them listed in the &#34;&lt;strong&gt;Applications&lt;/strong&gt;&#34; drop-menu on the upper-left top bar. One of these applications is &lt;a href=&#34;https://onionshare.org/&#34;&gt;OnionShare&lt;/a&gt;, which you can use to share files with others anonymously.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot within Tails showing the application OnionShare open.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-usage-onionshare.png&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;storing-passwords&#34;&gt;Storing passwords&lt;/h3&gt;&lt;p&gt;If you are using the Persistent Storage with Tails, and need to store passwords, you can use the pre-installed &lt;a href=&#34;https://keepassxc.org/&#34;&gt;KeePassXC&lt;/a&gt; application. This application will store your passwords encrypted, locally-only, and protected by a main password (ideally, a &lt;strong&gt;passphrase&lt;/strong&gt;). Be careful however if you store important passwords in there. Remember that if a bug occurs or if you forget your Persistent Storage&#39;s password, you could lose access to all of it.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot within Tails showing the application KeePassXC open.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-usage-keepassxc.png&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;shutting-down-tails&#34;&gt;Shutting down Tails&lt;/h3&gt;&lt;p&gt;When you are done using Tails, you should always &lt;strong&gt;shut it down and unplug the USB stick&lt;/strong&gt; after.&lt;/p&gt;&lt;p&gt;To shut Tails down, click on the upper-right menu on the top bar, the one with the battery icon. Then click on &#34;&lt;strong&gt;Power Off&lt;/strong&gt;&#34; at the bottom-right of the drop-menu box. Wait for the screen to turn black, then unplug your Tails USB stick.&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;In Case of Emergency!&lt;/p&gt;&lt;p&gt;In case of emergency, you can shut down Tails quickly by directly unplugging the USB stick while it is still running. This will effectively reset Tails like a normal shut down &lt;strong&gt;IF&lt;/strong&gt; it was not in &#34;Suspend&#34; state. More on this here: &lt;a href=&#34;https://tails.net/contribute/design/memory_erasure/&#34;&gt;https://tails.net/contribute/design/memory_erasure/&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Shutting down Tails by physically unplugging it while it is still running &lt;a href=&#34;https://tails.net/doc/first_steps/shutdown/index.en.html&#34;&gt;could potentially damage your Persistent Storage&lt;/a&gt;. Only use this feature in case of emergency, and shut down Tails using the &#34;&lt;strong&gt;Power Off&lt;/strong&gt;&#34; menu option whenever possible.&lt;/p&gt;&lt;h2 id=&#34;final-notes&#34;&gt;Final notes&lt;/h2&gt;&lt;p&gt;Remember to delete the traces of this installation from the computer you used, once you have verified that everything works properly.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;You should also remember to:&lt;/strong&gt;&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Delete the browsing history for these websites (this article, the Tails web pages, and any other related pages you have visited).&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Delete cookies for these websites (or all cookies).&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Delete the site data and cache for these websites (or all sites data).&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; If logged into your Google account, &lt;a href=&#34;https://support.google.com/websearch/answer/6096136&#34;&gt;delete your Google search history&lt;/a&gt; for these websites.&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Delete &lt;em&gt;balenaEtcher&lt;/em&gt;, both the software and the installation files (after verifying your Tails is operational).&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Delete &lt;em&gt;balenaEtcher&lt;/em&gt; from the recently used applications list.&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Empty your computer&#39;s trash bin.&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Once you have completed this list and verified your installation, reboot your computer.&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;consider-supporting-tails-and-the-tor-project&#34;&gt;Consider supporting Tails and the Tor Project&lt;/h3&gt;&lt;p&gt;Finally, if you are not personally at risk of harm by reading this article or by getting associated with Tails, I strongly encourage you to support this incredible project by donating to Tails or to the Tor Project. Tools like Tails and Tor help a lot of people in very vulnerable situations. Your support means a lot to non-profit organizations like the Tor Project to improve and maintain these tools.&lt;/p&gt;&lt;p&gt;Thank you for helping yourself and others to stay safe &lt;img alt=&#34;💜&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f49c.svg&#34; title=&#34;:purple_heart:&#34; /&gt;&lt;/p&gt;&lt;p&gt;Support Tails (if it is safe for you to do so): &lt;a href=&#34;https://tails.net/donate/&#34;&gt;https://tails.net/donate/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Support the Tor Project (if it is safe for you to do so): &lt;a href=&#34;https://donate.torproject.org/&#34;&gt;https://donate.torproject.org/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot within Tails showing the Tor Browser application displaying the Tails website welcome page.&#34; src=&#34;../../../../assets/images/installing-and-using-tails/tails-usage-tailswebsite.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Unless credited otherwise, all screenshots from: Privacy Guides&lt;/small&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/01/29/installing-and-using-tails/</link> <pubDate>Tue, 28 Jan 2025 03:26:21 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/01/29/installing-and-using-tails/</guid> </item> <item> <title>The Protesters&#39; Guide to Smartphone Security</title> <author>Jonah Aragon</author> <category>Tutorials</category> <description>&lt;h1 id=&#34;the-protesters-guide-to-smartphone-security&#34;&gt;The Protesters&#39; Guide to Smartphone Security&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Article cover photo showing a phone icon over a protest&#34; src=&#34;../../../../assets/images/activists-guide-securing-your-smartphone/cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Koshu Kunii / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;For most protesters, activists, and journalists, your smartphone is an essential tool you depend on for organizing with your peers, accessing and distributing information, and helping others. It also represents a great risk, as a tool that is easily appropriated by authorities for targeted and mass surveillance.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;The perennial question when it comes to protests is whether you should bring your phone at all. If you leave your phone at home, that is probably the safest your data will get, and you will be at very low risk of being tracked by mass surveillance tools. On the other hand, your phone is a critical resource when it comes to coordinating with others, getting updates on the protest from social media, or simply documenting what is going on with your phone&#39;s camera.&lt;/p&gt;&lt;p&gt;If possible, bringing a separate device like a &#34;burner phone,&#34; an old phone you can reset, or even a regular old-fashioned camera is a much better option than bringing your primary phone. Any data you don&#39;t bring with you can&#39;t be taken from you at the scene.&lt;/p&gt;&lt;p&gt;However, getting access to or affording devices like these aren&#39;t a realistic option for many people. Whether you decide to take your smartphone or a secondary smartphone with you to the event, this guide will cover how to maximize that device&#39;s security and minimize risks to your privacy.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Update (2025-01-27):&lt;/strong&gt; This article has been updated based on some community &lt;a href=&#34;https://discuss.privacyguides.net/t/24316&#34;&gt;feedback&lt;/a&gt;, notably I added the &lt;a href=&#34;#burner-phones&#34;&gt;Burner Phones&lt;/a&gt;, &lt;a href=&#34;#minimize-your-stored-data&#34;&gt;Minimize Your Stored Data&lt;/a&gt;, &lt;a href=&#34;#use-public-wi-fi&#34;&gt;Use Public Wi-Fi&lt;/a&gt;, and &lt;a href=&#34;#check-your-keyboard&#34;&gt;Check Your Keyboard&lt;/a&gt; sections.&lt;/p&gt;&lt;h2 id=&#34;your-risks-at-a-protest&#34;&gt;Your Risks at a Protest&lt;/h2&gt;&lt;p&gt;There are plenty of risks you should consider if you use your smartphone at a protest. We are going to try and cover the following in this guide:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Losing your device.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Authorities confiscating your smartphone.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Service disruption, either due to intentional interference by authorities or caused by networks being overloaded by large groups of people.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Targeted surveillance:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Disrupting your service.&lt;/li&gt;&lt;li&gt;Blocking delivery of calls/&lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; to your number.&lt;/li&gt;&lt;li&gt;Monitoring your unencrypted traffic.&lt;/li&gt;&lt;li&gt;Monitoring communications over local radios like walkie-talkies, etc.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Mass surveillance:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Interference with web services. Popular communication platforms like Twitter or TikTok could be throttled or blocked.&lt;/li&gt;&lt;li&gt;Interference with messengers and voice services like Signal or WhatsApp.&lt;/li&gt;&lt;li&gt;Authorities could use public Wi-Fi networks in the area to monitor traffic and identify nearby devices.&lt;/li&gt;&lt;li&gt;Cell phone companies could provide records to authorities of devices near cell towers in the area to track and identify protesters.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;Like all of our guides, we are going to cover the general best practices and provide helpful tips, but your individual situation may be different. You should always research and plan according to what you specifically are doing, and if you need legal advice you should always consult a qualified and licensed attorney.&lt;/p&gt;&lt;h2 id=&#34;burner-phones&#34;&gt;&#34;Burner Phones&#34;&lt;/h2&gt;&lt;p&gt;Cell phones are generally tracked by law enforcement using two identifiers:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Your &lt;strong&gt;&lt;abbr title=&#34;International Mobile Subscriber Identity&#34;&gt;IMSI&lt;/abbr&gt;&lt;/strong&gt;, which uniquely identifies your &lt;abbr title=&#34;Subscriber Identity Module&#34;&gt;SIM&lt;/abbr&gt; card&lt;/li&gt;&lt;li&gt;Your &lt;strong&gt;&lt;abbr title=&#34;International Mobile Equipment Identity&#34;&gt;IMEI&lt;/abbr&gt;&lt;/strong&gt;, which uniquely identifies your phone&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;Thus, simply using a prepaid &lt;abbr title=&#34;Subscriber Identity Module&#34;&gt;SIM&lt;/abbr&gt; in your primary/personal device is not a foolproof method of avoiding tracking, because your &lt;abbr title=&#34;International Mobile Equipment Identity&#34;&gt;IMEI&lt;/abbr&gt; is still correlatable between networks.&lt;/p&gt;&lt;p&gt;Buying a secondary, disposable device is an option that will provide you with much greater protection than bringing your personal device. However, if the threat you face is serious enough that you feel the need to do this, you should strongly consider not bringing a phone at all. Properly securing a disposable/burner phone is fairly challenging and may not be worth it.&lt;/p&gt;&lt;p&gt;If you &lt;em&gt;do&lt;/em&gt; buy a secondary device for this purpose, you should buy it in-person, with &lt;strong&gt;cash&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Do not activate or power it on at home&lt;/strong&gt;. The location of a phone is tracked by network carriers for at least a year at minimum, but you should assume that location history is just kept forever. Therefore, you should activate and set up the device in a very public place that is not significant to your daily life, then always keep it powered off at locations associated with you. You don&#39;t want the phone&#39;s location to ever be recorded at your home or workplace.&lt;/p&gt;&lt;p&gt;If possible, you should try to purchase and set up this phone well in advance. This certainly depends on your plans, but spreading out your purchase, activation, and use of the device makes it less easy to detect. It also makes it less likely that the store you bought the phone from still has security footage of your purchase.&lt;/p&gt;&lt;p&gt;You will also want to make sure you do not identify yourself when purchasing a cellular plan. This is highly dependent on your country, but many prepaid plans will not require any identification to activate. There are also some global eSIM providers which will accept payment without the need to identify yourself to them.&lt;/p&gt;&lt;p&gt;One last thing: Your secondary device should still be a reasonably modern smartphone. The security measures we cover below regarding &lt;a href=&#34;#consider-your-phones-security-patches&#34;&gt;hardware and software security&lt;/a&gt; still apply. Smartphones are more secure against the sort of threats that activists are likely to face—such as someone trying to crack into your device&#39;s data—than a simple/feature/&#34;dumb&#34; phone will be. They also have many more options for secure &amp;amp; encrypted communication methods that we&#39;ll cover below as well.&lt;/p&gt;&lt;p&gt;Using a secondary device only at the protest allows you to leave your primary device powered on and at home. This potentially provides some plausible deniability, if someone requests the location of your phone during the time of the event later.&lt;/p&gt;&lt;h2 id=&#34;secure-your-device&#34;&gt;Secure Your Device&lt;/h2&gt;&lt;p&gt;If your phone falls into the wrong hands, the information on it could be hugely damaging to yourself or others. Make sure you&#39;ve taken the necessary steps to prevent it from being broken into.&lt;/p&gt;&lt;h3 id=&#34;use-a-strong-screen-lock&#34;&gt;Use a Strong Screen Lock&lt;/h3&gt;&lt;p&gt;At a bare minimum, you should use a 6-digit PIN, but ideally you should protect your phone with an alphanumeric passphrase. This prevents people from trivially accessing your data, and additionally protects your data with strong encryption.&lt;/p&gt;&lt;p&gt;Barring a massive security exploit (more on this &lt;a href=&#34;#consider-your-phones-security-patches&#34;&gt;later&lt;/a&gt;), most law enforcement tools work by essentially brute-forcing your PIN, running tons of guesses until it gets one right. This makes a long and unique passphrase your strongest protection against your data being stolen by people in possession of your device.&lt;/p&gt;&lt;p&gt;In the United States and many other countries it is legal to refuse to unlock your phone or provide your passcode to law enforcement. &lt;strong&gt;Know your rights&lt;/strong&gt; wherever you&#39;re located before attending a protest, so you aren&#39;t blindly following orders later.&lt;/p&gt;&lt;h3 id=&#34;disable-biometic-authentication&#34;&gt;Disable Biometic Authentication&lt;/h3&gt;&lt;p&gt;We commonly recommend using biometric features like Face ID or Touch ID to prevent &#34;shoulder surfing&#34; attacks, where an attacker steals your PIN by discreetly watching you enter it, or where your PIN is recorded by surveillance cameras in the area.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;However&lt;/strong&gt;, in this situation it may make more sense to disable biometric authentication. Authorities are trained and known to use biometrics quickly to forcefully unlock your device, so you should be mindful of this fact when deciding what to do. If you disable biometrics, be wary of shoulder surfing attacks and prying eyes by obscuring or covering your phone whenever you unlock it.&lt;/p&gt;&lt;p&gt;Whatever you do, make sure you know how to quickly shut down your phone or disable biometrics at a moment&#39;s notice. Many phones have begun replacing the standard &#34;hold down the power button&#34; function with voice assistants or other features, so practice performing the actual shutdown method beforehand to familiarize yourself.&lt;/p&gt;&lt;p&gt;Modern iPhones require you to hold down the side button and either volume button before the power-off slider appears. Even if you don&#39;t get a chance to slide to power off, getting to this screen will at least disable biometric authentication, making your phone a bit more secure than it otherwise might be.&lt;/p&gt;&lt;p&gt;In the United States, it is still a legal gray area when it comes to whether law enforcement can force you to use biometrics, but many court decisions have leaned toward saying they &lt;strong&gt;can&lt;/strong&gt; compel you to use your fingerprint. Using a passphrase and disabling biometrics gives you more robust 5th Amendment rights. In other countries you should again familiarize yourself with your rights in this scenario, so that you can make the most informed decision.&lt;/p&gt;&lt;h3 id=&#34;hide-your-notifications&#34;&gt;Hide Your Notifications&lt;/h3&gt;&lt;p&gt;Even with your device locked, law enforcement can see everything you&#39;re up to simply by scrolling through your notifications. Reducing the amount of information accessible on the lock screen improves your security and the security of those you&#39;re messaging, so make sure your notifications are only visible when your device is unlocked.&lt;/p&gt;&lt;p&gt;On an iPhone:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Notifications&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Show Previews&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Never&lt;/strong&gt; (or, &lt;strong&gt;When Unlocked&lt;/strong&gt;)&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;On Android:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Notifications&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Touch &lt;strong&gt;Notifications on lock screen&lt;/strong&gt;&lt;ul&gt;&lt;li&gt;Select &lt;strong&gt;Don&#39;t show any notifications&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Switch &lt;strong&gt;Sensitive notifications&lt;/strong&gt; to &lt;strong&gt;off&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;&lt;h3 id=&#34;minimize-your-stored-data&#34;&gt;Minimize Your Stored Data&lt;/h3&gt;&lt;p&gt;The best way to protect your data is to not have it on your phone in the first place. If you&#39;re using a secondary device, simply don&#39;t install anything other than what will be absolutely necessary during the protest, like a secure messenger.&lt;/p&gt;&lt;p&gt;Otherwise, delete any cloud storage apps you don&#39;t need access to during the protest. If you&#39;re able to delete an app and then download it later and log in without experiencing any data loss, then that app probably doesn&#39;t &lt;em&gt;need&lt;/em&gt; to be on your phone all the time.&lt;/p&gt;&lt;p&gt;Some &lt;a href=&#34;https://www.privacyguides.org/en/passwords/&#34;&gt;password managers&lt;/a&gt; have the option to temporarily remove certain vaults from your devices, 1Password calls this &lt;a href=&#34;https://support.1password.com/travel-mode/&#34;&gt;Travel Mode&lt;/a&gt; for example. You can do this manually as well, by having a separate password manager or vault with only the essentials you will need at the time, and removing your primary password manager from your device for the duration of the event.&lt;/p&gt;&lt;h3 id=&#34;disable-lock-screen-actions&#34;&gt;Disable Lock Screen Actions&lt;/h3&gt;&lt;p&gt;In a similar vein, any functionality you have enabled while your device is unlocked can pose a security risk. It is always best practice to reduce your &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt; by disabling these options whenever possible. Even though these features are typically designed to not pose a security risk to your data, they have been known to be exploited in the past to bypass lock screens and other security features.&lt;/p&gt;&lt;p&gt;On an iPhone:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Face ID &amp;amp; Passcode&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Scroll to the &lt;strong&gt;Allow Access When Locked&lt;/strong&gt; section&lt;/li&gt;&lt;li&gt;Switch all features you don&#39;t need &lt;strong&gt;off&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;On Android, disabling functionality while the phone is locked will vary widely by manufacturer. Some like Samsung provide more flexible options in their lock screen settings, but others like Google do not provide the option to disable the quick settings panel or other similar features.&lt;/p&gt;&lt;h3 id=&#34;avoid-external-storage&#34;&gt;Avoid External Storage&lt;/h3&gt;&lt;p&gt;Your Android phone might have the option to store files or photos on a microSD card, but these cards are not always subject to the same encryption standards as your phone&#39;s built-in storage. You should check whether your microSD card can be encrypted in your phone&#39;s settings, although this will prevent it from being read by other devices like your computer later.&lt;/p&gt;&lt;p&gt;Additionally, even &lt;em&gt;if&lt;/em&gt; it&#39;s encrypted, it still won&#39;t benefit from the same security protections that your phone&#39;s built-in storage provides, such as advanced brute-force protections. Ideally you should remove all external storage devices from your phone during the event, and save photos, videos, and other files to your phone&#39;s encrypted internal storage.&lt;/p&gt;&lt;h3 id=&#34;consider-your-phones-security-patches&#34;&gt;Consider Your Phone&#39;s Security Patches&lt;/h3&gt;&lt;p&gt;Exploits against smartphones are discovered on a very regular basis, and spyware companies that work with law enforcement—like Cellebrite—abuse these exploits to crack into stolen devices. If your phone is no longer receiving regular updates from its manufacturer, you are in a very dangerous position as you may be vulnerable to the exploits used.&lt;/p&gt;&lt;p&gt;In general, we consider the latest iPhone and latest Google Pixel to be the most secured against this sort of threat. You can increase your security further by using a &lt;a href=&#34;https://www.privacyguides.org/en/android/distributions/&#34;&gt;hardened alternative operating system&lt;/a&gt; on your Google Pixel.&lt;/p&gt;&lt;p&gt;Robust security information about phones from other manufacturers is less common. If you use a different device you may still consider the risks to be worth it, but if confiscation is of &lt;em&gt;particular&lt;/em&gt; concern to you, or especially if your phone no longer receives security patches, you may want to consider leaving the phone at home.&lt;/p&gt;&lt;h2 id=&#34;protect-against-surveillance&#34;&gt;Protect Against Surveillance&lt;/h2&gt;&lt;h3 id=&#34;disable-airdrop&#34;&gt;Disable AirDrop&lt;/h3&gt;&lt;p&gt;One of the most innocuous features enabled on millions of iPhones is also one of the most dangerous for those seeking to protect their privacy in public. Apple&#39;s AirDrop protocol &lt;a href=&#34;https://www.usenix.org/system/files/sec21-heinrich.pdf&#34;&gt;uses&lt;/a&gt; trivially bypassed security measures that authorities like the Chinese government have openly &lt;a href=&#34;https://arstechnica.com/security/2024/01/hackers-can-id-unique-apple-airdrop-users-chinese-authorities-claim-to-do-just-that/&#34;&gt;bragged&lt;/a&gt; about cracking to identify users since at least 2022.&lt;/p&gt;&lt;p&gt;You should assume that any device with AirDrop enabled is constantly broadcasting your name, email address, and phone number to everyone around you, &lt;strong&gt;even if&lt;/strong&gt; you have it set to &#34;Contacts Only.&#34; Apple has known about this &lt;a href=&#34;https://www.macrumors.com/2021/04/23/airdrop-researchers-security-flaw/&#34;&gt;flaw&lt;/a&gt; since 2019 and has not issued any fix.&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Open the &lt;strong&gt;Settings&lt;/strong&gt; app&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;General&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;AirDrop&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Receiving Off&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;&lt;h3 id=&#34;lock-down-your-network&#34;&gt;Lock Down Your Network&lt;/h3&gt;&lt;p&gt;Your phone signals can be used to track you even if you don&#39;t make a call or send a text. Some law enforcement agencies use &#34;stingrays,&#34; devices which can impersonate a cell tower to track visitors to an area. It is speculated that more advanced ones can intercept unencrypted text messages and phone calls as well, making the use of an &lt;a href=&#34;#use-signal&#34;&gt;encrypted messenger&lt;/a&gt; during the event even more critical.&lt;/p&gt;&lt;p&gt;While the capabilities of the most modern ones isn&#39;t fully known, you should definitely protect yourself from the subset of stingrays which abuse the lower security standards of older, 2G networks.&lt;/p&gt;&lt;p&gt;On Android:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Network &amp;amp; internet&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;SIMs&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select your carrier or &lt;abbr title=&#34;Subscriber Identity Module&#34;&gt;SIM&lt;/abbr&gt; card&lt;/li&gt;&lt;li&gt;Switch &lt;strong&gt;Allow 2G&lt;/strong&gt; to &lt;strong&gt;off&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;You might also consider installing Privacy Cell (&lt;a href=&#34;https://f-droid.org/en/packages/com.stoutner.privacycell/&#34;&gt;F-Droid&lt;/a&gt; / &lt;a href=&#34;https://play.google.com/store/apps/details?id=com.stoutner.privacycell&#34;&gt;Google Play&lt;/a&gt;), an app that tells you whether you are connected to a cell network using the most modern security. Even the &#34;5G&#34; indicator on your phone alone doesn&#39;t guarantee you are using the latest-generation protocol.&lt;/p&gt;&lt;p&gt;On iPhone:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Privacy &amp;amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Lockdown Mode&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Turn On Lockdown Mode&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;Note that enabling &lt;a href=&#34;https://www.privacyguides.org/articles/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode&#34;&gt;Lockdown Mode&lt;/a&gt; on an iPhone will change a variety of settings to harden its security. Many of them are smart improvements, but certain apps and features &lt;a href=&#34;https://support.apple.com/HT212650&#34;&gt;won&#39;t work&lt;/a&gt; normally, so read the previous links here for more details.&lt;/p&gt;&lt;h3 id=&#34;use-airplane-mode-frequently&#34;&gt;Use Airplane Mode Frequently&lt;/h3&gt;&lt;p&gt;Even after mitigating the risks of 2G networks, your cellular activity can still be tracked. If not by law enforcement then by your carrier, who will likely be responsive to law enforcement&#39;s requests for data after the fact.&lt;/p&gt;&lt;p&gt;To prevent this, you should keep your phone turned off or use Airplane Mode to disable cellular connections whenever possible. Ideally you should only connect to networks in an emergency situation to communicate with others in your group, otherwise keeping messages and network transmissions to a minimum is key.&lt;/p&gt;&lt;p&gt;If you absolutely need internet connectivity and it&#39;s possible, you should keep Airplane Mode on and connect to a public Wi-Fi network instead, which brings me to:&lt;/p&gt;&lt;h3 id=&#34;use-public-wi-fi&#34;&gt;Use Public Wi-Fi&lt;/h3&gt;&lt;p&gt;If you&#39;re able, scope out businesses in the area that provide public Wi-Fi in advance. This is better than using cellular service, because less information about your device is shared with Wi-Fi networks as opposed to cell towers. Most modern phones support &lt;abbr title=&#34;Media Access Control&#34;&gt;MAC&lt;/abbr&gt; address randomization, which makes it even harder to correlate your cell phone&#39;s connections between different Wi-Fi access points.&lt;/p&gt;&lt;p&gt;There is a danger that public Wi-Fi services will be set up by authorities or others in the area to track protesters. You could consider using a &lt;a href=&#34;https://www.privacyguides.org/en/vpn/&#34;&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; service&lt;/a&gt; while connected to them to minimize the amount of metadata about your traffic that the Wi-Fi operator is able to collect.&lt;/p&gt;&lt;h3 id=&#34;disable-location-services&#34;&gt;Disable Location Services&lt;/h3&gt;&lt;p&gt;If you have to keep your device powered on and connected, you can at least minimize the number of parties who have access to your location data. Be mindful of apps that you choose to share your location with, and consider disabling location services entirely while you&#39;re at the event.&lt;/p&gt;&lt;p&gt;On an iPhone:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Privacy &amp;amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Location Services&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Switch &lt;strong&gt;Location Services&lt;/strong&gt; to &lt;strong&gt;off&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;On Android:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Navigate to &lt;strong&gt;Location&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Switch &lt;strong&gt;Use location&lt;/strong&gt; to &lt;strong&gt;off&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;If you use an Android phone, you should also check your Google account settings to &lt;a href=&#34;https://support.google.com/accounts/answer/3118687&#34;&gt;ensure location history is disabled&lt;/a&gt;. Google is frequently tapped by law enforcement to provide location data, because they don&#39;t protect your personal information with strong, zero-knowledge encryption.&lt;/p&gt;&lt;h3 id=&#34;check-your-keyboard&#34;&gt;Check Your Keyboard&lt;/h3&gt;&lt;p&gt;An often overlooked security risk is the software keyboard installed on your device. The best encrypted messenger in the world is no match for all of your inputs being read by third-parties as you type them.&lt;/p&gt;&lt;p&gt;If you are on &lt;a href=&#34;#consider-your-phones-security-patches&#34;&gt;GrapheneOS&lt;/a&gt;, the default keyboard from &lt;abbr title=&#34;Android Open Source Project&#34;&gt;AOSP&lt;/abbr&gt; that it comes with makes no internet connections, so if you don&#39;t install a third-party keyboard you should be fine. Most other Android users are using Google&#39;s &lt;em&gt;Gboard&lt;/em&gt;, which does make internet connections you may decide you don&#39;t trust, so you could consider installing an offline alternative. iOS users are able to control whether their third-party keyboard has network access in their system settings, although it may be wiser to not install a third-party keyboard in the first place.&lt;/p&gt;&lt;p&gt;This is &lt;a href=&#34;https://xcancel.com/RealSexyCyborg/status/1197695344575799296&#34;&gt;particularly relevant&lt;/a&gt; to people typing in languages like Chinese or others where you use an Input Method Editor (IME) to convert Latin letters to characters in the target language. These IMEs are very often third-party apps that have full internet access.&lt;/p&gt;&lt;h2 id=&#34;other-tips&#34;&gt;Other Tips&lt;/h2&gt;&lt;h3 id=&#34;use-signal&#34;&gt;Use Signal&lt;/h3&gt;&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/#signal&#34;&gt;&lt;strong&gt;Signal&lt;/strong&gt;&lt;/a&gt; is the most secure app for sending text messages and making voice calls with others. It is also impossible to configure Signal to lower its encryption security or other security standards, so you know that everyone in your group is using settings that are safe by default.&lt;/p&gt;&lt;p&gt;You should turn on disappearing messages with a reasonably short interval for sensitive communications. You can do this by default in the Privacy section of Signal&#39;s app settings, and you can also do it on a per-conversation basis in each conversation&#39;s settings panel. This way there is a time limit for an attacker to crack your phone and extract your messages before they permanently disappear.&lt;/p&gt;&lt;p&gt;Signal is battle-tested for this situation. &lt;a href=&#34;https://signal.org/bigbrother/&#34;&gt;Signal has responded to 6 government requests&lt;/a&gt; since 2016, and in each case the only information they were able to provide was at most:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Whether the user was registered with Signal&lt;/li&gt;&lt;li&gt;When that user registered with Signal&lt;/li&gt;&lt;li&gt;When that user connected to Signal last&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;Keep in mind that using Signal could still expose your phone&#39;s location, simply due to making a network request as we covered above. You should still keep your phone in &lt;a href=&#34;#use-airplane-mode-frequently&#34;&gt;Airplane Mode&lt;/a&gt; and minimize the use of Signal or any other networked app during the event.&lt;/p&gt;&lt;p&gt;There &lt;em&gt;are&lt;/em&gt; other &lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/&#34;&gt;encrypted messengers&lt;/a&gt;, some of them even making use of technologies developed by Signal. However, they all come with trade-offs that could easily compromise your security. WhatsApp and Facebook Messenger are end-to-end encrypted for example, but they collect copious amounts of &lt;em&gt;metadata&lt;/em&gt; about your messages, such as who you&#39;re sending them to, when you&#39;re sending them, your location when you&#39;re sending them, etc. Apple&#39;s iMessage service in the Messages app has strong encryption but similar metadata concerns, and only works if everyone in your group has an iPhone.&lt;/p&gt;&lt;h3 id=&#34;protect-your-access-to-information&#34;&gt;Protect Your Access to Information&lt;/h3&gt;&lt;p&gt;Phones can be easily lost, taken, broken, or they can simply run out of juice. Bring a spare mobile battery or a charged power bank with you, and try to minimize your phone usage to preserve power. You should also make sure your mobile plan is topped up and you have enough mobile data prior to the event.&lt;/p&gt;&lt;p&gt;You should also write down the number of an emergency contact or a lawyer on a physical piece of paper, or &lt;a href=&#34;https://xcancel.com/madeleine_rae/status/1266528386878443522&#34;&gt;even&lt;/a&gt; in Sharpie on your arm. You&#39;ll want this information easily accessible if you&#39;re arrested regardless of your phone&#39;s state or location.&lt;/p&gt;&lt;h3 id=&#34;change-your-camera-settings&#34;&gt;Change Your Camera Settings&lt;/h3&gt;&lt;p&gt;Check your camera settings for things which may draw unwanted attention, like the flash or a shutter sound. You should go through these settings in advance and configure it for the safest possible use.&lt;/p&gt;&lt;h3 id=&#34;back-up-your-data&#34;&gt;Back Up Your Data&lt;/h3&gt;&lt;p&gt;You should be prepared to have your phone taken or lost during a protest. You can limit the potential costs and headache to you if this happens by making sure you have an updated, encrypted backup of your data.&lt;/p&gt;&lt;p&gt;If you have an iPhone, you can make a local backup to a macOS computer or a Windows computer with iTunes. You can also back up to iCloud, but these backups are only secure if you enable &lt;a href=&#34;https://www.privacyguides.org/en/os/ios-overview/#icloud&#34;&gt;Advanced Data Protection&lt;/a&gt; on your iCloud account. We strongly encourage &lt;a href=&#34;https://support.apple.com/en-us/108756&#34;&gt;enabling Advanced Data Protection&lt;/a&gt; for all iCloud users in any case, as it protects not only device backups but most iCloud account data as well.&lt;/p&gt;&lt;p&gt;The backup situation on Android is not nearly as robust unfortunately, but you can back up photos and files with a variety of services. If you use an online backup service we recommend choosing one with strong, zero-knowledge encryption so that the service provider is unable to access your data.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/photo-management/&#34;&gt;Recommended Photo Backup Services&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/cloud/&#34;&gt;Recommended Cloud Drive Services&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/file-sharing/&#34;&gt;Recommended File Sync Services&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2 id=&#34;at-the-protest&#34;&gt;At The Protest&lt;/h2&gt;&lt;h3 id=&#34;keep-your-device-locked&#34;&gt;Keep Your Device Locked&lt;/h3&gt;&lt;p&gt;You should always use your camera to take pictures or videos while your phone is locked, in case your device is taken while filming. This is easier if you&#39;ve &lt;a href=&#34;#disable-biometic-authentication&#34;&gt;disabled biometrics&lt;/a&gt;, because Face ID or similar features might unlock your device automatically when you don&#39;t want that to happen.&lt;/p&gt;&lt;p&gt;On an iPhone you can hold down the camera icon on the lock screen to open the camera without unlocking your device. You could also configure the Action Button to open the camera, or use the dedicated camera button on the latest iPhone model.&lt;/p&gt;&lt;p&gt;On a Google Pixel and most other Android devices, double-tapping the power button will open the camera without needing to unlock your device.&lt;/p&gt;&lt;p&gt;You should learn and/or set up device shortcuts to do things quickly, ideally while the device remains locked whenever possible, and ensure you&#39;re familiar with the shortcuts before the event.&lt;/p&gt;&lt;h3 id=&#34;have-a-backup-communications-network&#34;&gt;Have a Backup Communications Network&lt;/h3&gt;&lt;p&gt;In the event of an internet blackout, it might be a good idea to have a backup network prepared, organized with other attendees. Messaging apps like &lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/#briar&#34;&gt;Briar&lt;/a&gt; can operate in a local mesh mode, connecting to other devices in the area with Bluetooth or local Wi-Fi connections instead of relying on centralized internet services. Another newer option is &lt;a href=&#34;https://meshtastic.org/&#34;&gt;Meshtastic&lt;/a&gt;, which uses peer-to-peer/mesh radio that is much more reliable than using either Wi-Fi or Bluetooth, but requires purchasing dedicated hardware that you connect to your phone.&lt;/p&gt;&lt;p&gt;You might also want to consider local radios like walkie-talkies, although keep in mind these devices are nearly always unencrypted and can be easily monitored by others, so you won&#39;t want to use them to transmit sensitive information.&lt;/p&gt;&lt;h2 id=&#34;after-the-event&#34;&gt;After The Event&lt;/h2&gt;&lt;h3 id=&#34;if-your-phone-was-taken&#34;&gt;If Your Phone Was Taken&lt;/h3&gt;&lt;p&gt;If you lose your phone, you may be able to locate or wipe your phone remotely depending on the model. Here are some instructions for common devices you can try:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://support.google.com/android/answer/3265955?hl=en&#34;&gt;Finding a lost Android device&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://support.apple.com/en-us/104978&#34;&gt;Finding a lost iPhone&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;If you were logged in to any online services on your phone, you should try and get them signed out. On many social media websites for example, you can go to your account&#39;s settings to see what devices are signed in and revoke their access remotely.&lt;/p&gt;&lt;p&gt;Please be aware of the &lt;strong&gt;legal consequences&lt;/strong&gt; of these actions. Wiping your device or revoking online account access could lead to obstruction of justice or destruction of evidence charges in some jurisdictions. You should always speak with your licensed attorney before deciding how to proceed. If your phone was taken by law enforcement you may have legal recourse to get it back.&lt;/p&gt;&lt;h3 id=&#34;be-mindful-of-others&#34;&gt;Be Mindful of Others&lt;/h3&gt;&lt;p&gt;If you post your photos online, be mindful of identifiable faces or other characteristics of your fellow protesters or bystanders. Law enforcement or vigilantes use these photos to track down other attendees and arrest or harass them.&lt;/p&gt;&lt;p&gt;To prevent this, you can obscure the faces of anyone in the image. Most phones have &lt;a href=&#34;https://www.privacyguides.org/en/os/ios-overview/#redacting-elements-in-images&#34;&gt;built-in photo editing tools&lt;/a&gt; that allow you to draw on an image. Blurring can sometimes be reversed, so blocking it out entirely is generally preferable.&lt;/p&gt;&lt;p&gt;Be careful of the editing tools you use, and don&#39;t select highlighters or other semi-transparent editing tools. Even if you scribble over an area of a photo multiple times with a dark/black &#34;highlighter&#34; tool until it &lt;em&gt;appears&lt;/em&gt; black, that can often be reversed with photo editing software by adjusting the contrast of the image. Using a shape/rectangle tool to draw a black box over areas you wish to redact is much better than trying to manually cross out image elements with drawing tools.&lt;/p&gt;&lt;p&gt;The Signal app also has built-in tools for photo editing and blurring. You can send a photo to yourself in the &#34;Notes to Self&#34; chat, then save the edited image from that chat for sharing. Signal also automatically removes photo metadata, so if you use it you&#39;re already covered with our next section:&lt;/p&gt;&lt;h3 id=&#34;scrub-photo-metadata&#34;&gt;Scrub Photo Metadata&lt;/h3&gt;&lt;p&gt;Photos have hidden information, or &lt;em&gt;metadata&lt;/em&gt;, embedded in them which include the type of phone/camera you used, the photo&#39;s location, and other potentially sensitive data.&lt;/p&gt;&lt;p&gt;You should use a &lt;a href=&#34;https://www.privacyguides.org/en/data-redaction/&#34;&gt;metadata removal tool&lt;/a&gt; to remove this data from images before you share them with others. If you send a photo to someone using Signal, that app removes this metadata automatically.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/01/23/activists-guide-securing-your-smartphone/</link> <pubDate>Mon, 27 Jan 2025 20:00:00 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/01/23/activists-guide-securing-your-smartphone/</guid> </item> <item> <title>Choosing the Right Messenger</title> <author>Dan Arel</author> <category>Instant Messengers</category> <category>Opinion</category> <description>&lt;h1 id=&#34;choosing-the-right-messenger&#34;&gt;Choosing the Right Messenger&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&amp;quot;Choosing The Right Messenger&amp;quot; cover image&#34; src=&#34;../../../../assets/images/choosing-the-right-messenger/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;One of the most common questions users have when it comes to privacy is about messaging services. It seems almost all of them mention some level of privacy or encryption to entice the user to sign up for their service, but how can you be sure you’re using the most secure, privacy respecting platform?&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;The answer actually lies in one’s &lt;a href=&#34;https://www.privacyguides.org/basics/threat-modeling/&#34;&gt;threat model&lt;/a&gt;, which is often an ignored step in choosing all privacy related apps and services, meaning a lot of users limit their internet and communication experience because they believe they need Edward Snowden level privacy settings.&lt;/p&gt;&lt;p&gt;The truth is, each user needs to decide what their privacy goals are. Is your goal to stop corporations from tracking you, targeting you, and profiting from your data? Or, are you are trying to hide communications from the government or law enforcement, which is common for journalists and activists who want to protect their sources or communications from government eyes?&lt;/p&gt;&lt;p&gt;Once you understand your goals you can start to look at messengers and their upsides and downsides, and it’s important to remember, there is no perfect solution. Each service, no matter how secure can be compromised, because at the end of the day, you’re dealing with other humans who can screenshot, copy, or forward your messages to parties you did not intend to see them. So, it’s also important to know who you are messaging, verifying their keys, and ensuring that you place the utmost trust in them with the content you are sending.&lt;/p&gt;&lt;p&gt;If your goal is to simply avoid corporate tracking and the harvesting of your data from your communications, you can eliminate apps such as Facebook Messenger and WhatsApp, both services owned by Facebook and while offering encrypted messaging (optional in Messenger), Facebook &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://www.digitaltrends.com/social-media/facebook-reads-messenger-messages/&#34;&gt;reads your non-encrypted messages&lt;/a&gt;, and WhatsApp has &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://www.forbes.com/sites/zakdoffman/2019/05/14/whatsapps-cybersecurity-breach-phones-hit-with-israeli-spyware-over-voice-calls/#734cec155549&#34;&gt;fallen victim&lt;/a&gt; to security breaches.&lt;/p&gt;&lt;p&gt;For this type of user, your options are much more wide as you may be more willing to share your email address or phone number at signup and can be less concerned with metadata (we will get to that shortly), and you want to look for a messenger that simply isn’t scanning your content or behavior to sell it.&lt;/p&gt;&lt;p&gt;If your goal is to evade more massive state-sponsored surveillance programs, the aforementioned apps are out of the question, but so are many others.&lt;/p&gt;&lt;p&gt;This is because when it comes to these apps, and other like it, you don’t own the encryption keys, the service does, so they are able to decrypt your messages, for their own use, or for the use of government officials who request it. This is something important you’ll want to remember as you choose the messenger that is right for you.&lt;/p&gt;&lt;p&gt;Even Apple’s iMessage, which is encrypted, while more secure than Facebook’s offerings, still control the keys and can access your messages if necessary. Apple does also collect data based on your behavior, so while using iMessage isn’t the same as handing your data over to Facebook, you’re still messaging with a variety of privacy vulnerabilities. On Android, you’re using &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; messages which are even less secure and can be &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin&#34;&gt;easily hijacked&lt;/a&gt; by someone with just enough know-how.&lt;/p&gt;&lt;h2 id=&#34;metadata&#34;&gt;Metadata&lt;/h2&gt;&lt;p&gt;One important aspect of messaging apps you need to be sure of is what kind of &lt;a href=&#34;https://ssd.eff.org/en/glossary/metadata&#34;&gt;metadata&lt;/a&gt; it exposes, what is encrypted and what isn’t.&lt;/p&gt;&lt;p&gt;Wire, a popular encrypted messenger app has always been criticized for its decision not to encrypt user metadata, such as the date and time of registration, &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; geographical coordinates, and the date and time of creation, creator, name, and list of participants in a conversation.&lt;/p&gt;&lt;p&gt;Metadata can be used to place you in a certain location, speaking to a certain person and can be used against you by law enforcement, even if they have no idea and no access to what the conversation was about.&lt;/p&gt;&lt;p&gt;Apps such as Signal, or Wickr encrypt metadata, making the conversations between two or more parties more secure and harder to track individual users with.&lt;/p&gt;&lt;p&gt;When it comes to avoiding corporate data mining, your metadata won’t be as useful, especially if you’re using a service that is not profiting from your data to begin with. For those avoiding state-sponsored surveillance, &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://theintercept.com/2019/08/04/whistleblowers-surveillance-fbi-trump/&#34;&gt;metadata can be a killer&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;encryption&#34;&gt;Encryption&lt;/h2&gt;&lt;p&gt;This article will not get into the complexities of the best kinds of end-to-end encryption (&lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;), but ensuring your messenger has it, that must be discussed.&lt;/p&gt;&lt;p&gt;The popular messaging app Telegram has come under fire the most for this. Telegram says on their homepage that, “Telegram messages are heavily encrypted and can self-destruct.” Yet, this statement is only partially true. Yes, you can set your messages to self-destruct, a great privacy feature for some, and yes, they do offer encryption, but what they don’t tell users is that encryption isn’t turned on by default.&lt;/p&gt;&lt;p&gt;In an &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://gizmodo.com/why-you-should-stop-using-telegram-right-now-1782557415&#34;&gt;interview&lt;/a&gt; with Gizmodo, Christopher Soghoian, Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union said that, &#34;There are many Telegram users who think they are communicating in an [end-to-end] encrypted way, when they’re not because they don’t realize that they have to turn on an additional setting,” he continued to say that while he’s happy they offer the encryption, it’s not useful if it’s turned off.&lt;/p&gt;&lt;p&gt;Apps such as Signal, Keybase, and Wickr offer &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; by default. Less popular but quickly growing apps such as Element, offer &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; but like Telegram, have not made it a default setting, though the Matrix.org team has &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://github.com/vector-im/element-web/issues/6779&#34;&gt;said&lt;/a&gt; that default encryption is on their road map.&lt;/p&gt;&lt;p&gt;Ensuring your conversations and metadata are &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; is one of the best practices you can have when choosing a messenger.&lt;/p&gt;&lt;h2 id=&#34;registration-process&#34;&gt;Registration Process&lt;/h2&gt;&lt;p&gt;When it comes to your goals and threat model, you will need to decide how much, if any, information you’re willing to give this company on signup. Do they require a phone number and or &lt;abbr title=&#34;Subscriber Identity Module&#34;&gt;SIM&lt;/abbr&gt; card? Do they require an email address, or do they allow completely anonymous signups, and how anonymous is anonymous? Are they storing that info (remember the metadata) unencrypted?&lt;/p&gt;&lt;p&gt;Giving up your phone number or email won’t be a big deal for many, as any good privacy policy will state they won’t use it for any purpose other than those you’ve granted permission for. Yet, for those avoiding state-sponsored surveillance, you may have a regularly changing number, no number, or would rather not risk giving that information up. Same goes for email.&lt;/p&gt;&lt;p&gt;So, you will want to find a service that fits this need. While Signal is currently testing signup without a phone number, currently you’re unable to do so. Element, Wickr, many &lt;abbr title=&#34;Extensible Messaging and Presence Protocol&#34;&gt;XMPP&lt;/abbr&gt; services, don’t require anything but choosing a username.&lt;/p&gt;&lt;h2 id=&#34;source-code&#34;&gt;Source Code&lt;/h2&gt;&lt;p&gt;Open source may be the most used phrase in all of privacy and security, and for good reason. It’s really helpful to be able to review the source code of the product you’re trusting. Experts can look for backdoors, leaks, and other bugs. Organizations that opt to open source their code are showing good faith effort to increase trust between them and the user.&lt;/p&gt;&lt;p&gt;Yet, open source can also limit your options, again, depending on your threat model and goals. Signal, Wire, and Keybase all offer open source repositories of their applications, and sometimes even the server software itself.&lt;/p&gt;&lt;p&gt;Open source also doesn’t mean secure. This is often misunderstood, and people hear open source and assume it must be good. Look at the apps code you want to use, you don’t need to be able to check it, but are others? An open source app that no one follows, or contributes to is no more or less secure than a closed source app.&lt;/p&gt;&lt;p&gt;Wickr, Threema, and others are closed source. They don’t offer the ability to check the source, but that doesn’t immediately rule them out either. When the Electronic Frontier Foundation (EFF) had a comparison chart for messenger apps, it gave Wickr 5-stars. This doesn’t mean it’s perfect for someone like Snowden, but for those avoiding Facebook and Google, it could be a usable option.&lt;/p&gt;&lt;p&gt;It’s also important to remember there’s no way to check that someone is always using the source code in their repository in the app or server you’re downloading from the Apple Store or Google Play. When it comes to this, reputation becomes a key player in your decision, as does trust, which we will get to next.&lt;/p&gt;&lt;p&gt;If you’re unsure what to do here, it’s always a safe bet to stick with open source that has a large contributor base and strong reputation. It’s always best to use open source options when they are available and only recommend closed source when there isn’t a usable open source option. This is generally a good way to pick a messenger app as well.&lt;/p&gt;&lt;h2 id=&#34;ownership-trust&#34;&gt;Ownership &amp;amp; Trust&lt;/h2&gt;&lt;p&gt;An often overlooked, but increasingly important part of choosing a secure messenger is, who owns the company that’s providing your service? What would the gain or lose from selling your data and who does the company answer to?&lt;/p&gt;&lt;p&gt;Wire &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://blog.privacytools.io/delisting-wire/&#34;&gt;recently lost&lt;/a&gt; a great deal of trust and standing in the privacy world because they quietly sold their company and moved it to the US. They also changed parts of their privacy policy making it harder for users to tell when Wire would share customer data. They did all of this while never updating their current users of such changes, either to the change of the privacy policy, or the move to the US.&lt;/p&gt;&lt;p&gt;Wire also took in more than $8 million in venture capital funding. So now, users wanted to know more about who owned their data and what jurisdictional rights were changing with the move from Europe to the United States?&lt;/p&gt;&lt;p&gt;These are questions we must ask of all services. Wire now has investors to answer to who will want a return on their millions of dollars.&lt;/p&gt;&lt;p&gt;Signal on the other hand is a &lt;a href=&#34;https://signal.org/blog/signal-foundation/&#34;&gt;non-profit&lt;/a&gt; which does not rely on investors and instead relies on donations, sponsorships, and grants. Because of their non-profit status in the US, they must also be highly transparent about not only where the money comes from, but how they spend it. So, users can see where this money goes, and who it’s going to.&lt;/p&gt;&lt;p&gt;Matrix.org (the service Element uses) runs a similar business model as Signal, located in the UK instead of the US, they reply on donations, partnerships, and grants. Matrix.org is heavily supported by New Vector, a venture capital backed company, however, Matrix.org as a non-profit is transparent about its spending, income, and influences.&lt;/p&gt;&lt;p&gt;Not all services are non-profit, and that should not rule them out immediately. You can also follow their funding goals. Wire lost credibility because instead of simply relying on user signups, they wanted to be the next Skype for Business and wanted to build a larger enough user base to get the attention of investors. Meanwhile apps such as Wickr, while for-profit, is transparent about taking limited investors to become sustainable on subscriptions.&lt;/p&gt;&lt;p&gt;This can take some time, because it’s important to know who the investors are, and what the organizational goals are. Will they eventually need to resort to data harvesting to sustain itself, if they do, and you decide to leave the platform, will you leave behind data you don’t want them to get their hands on?&lt;/p&gt;&lt;h2 id=&#34;making-your-choice&#34;&gt;Making Your Choice&lt;/h2&gt;&lt;p&gt;Now it’s time to choose a messenger and no one can do that for you. Popularity will need to play a role here, there’s no point in joining the new up and coming messenger service if you don’t have a single contact using it as well. One reason Telegram has been so popular is they have managed to convince more than 100 million people to sign up. If you sign in today, you’ll likely see a group of your friends in there. Signal isn’t as far behind, and others are catching up.&lt;/p&gt;&lt;p&gt;You’ll need to decide who you trust, and who your other contacts trust, and then compare all of that with your goals and your threat model. How much information are you willing to give on signup, does metadata matter to your threat model, and is the service you’re choosing likely to sell itself to the highest bidder once enough people sign up?&lt;/p&gt;&lt;p&gt;The important thing to remember is there is no one size fits all for messengers, and that each user must decide what is best for them. If someone is an avid WhatsApp or Facebook Messenger user, even Telegram is a step in the right direction. Yet, if that user is concerned with more than just giving data over to Facebook, they may need to look at more secure options.&lt;/p&gt;&lt;p&gt;Ensure you keep your messenger apps up to date. You don’t want to discover you’ve been compromised because a bug found in version 1 was fixed in version 2 but you didn’t bother upgrading your apps.&lt;/p&gt;&lt;p&gt;One last piece of advice is that users need to be diligent and never become complacent in their decision. You must be willing to change services if the goals and values of your messenger of choice change in a way that no longer match yours. Look for news of sales, mergers, or acquisitions that could compromise the organization.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;em&gt;Dan Arel is a journalist, author, and privacy advocate. This article was originally published to &lt;a href=&#34;https://hackernoon.com/choosing-the-right-messenger-mm3x2z47&#34;&gt;Hacker Noon&lt;/a&gt; on November 27th, 2019.&lt;/em&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2019/11/27/choosing-the-right-messenger/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2019/11/27/choosing-the-right-messenger/</guid> </item> <item> <title>Delisting Startpage From Privacy Guides</title> <author>Niek de Wilde</author> <category>Announcements</category> <category>Search Engines</category> <description>&lt;h1 id=&#34;delisting-startpage-from-privacy-guides&#34;&gt;Delisting Startpage From Privacy Guides&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&amp;quot;Delisting Startpage&amp;quot; cover image&#34; src=&#34;../../../../assets/images/delisting-startpage/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Privacy Guides | Photo: Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Dear &lt;em&gt;Privacy Guides&lt;/em&gt; Community,&lt;/p&gt;&lt;p&gt;On the 15th of October, it was &lt;a href=&#34;https://web.archive.org/web/20201127034309/https://www.reddit.com/r/privacy/comments/di5rn3/startpage_is_now_owned_by_an_advertising_company/&#34;&gt;brought to our attention&lt;/a&gt; that Startpage.com was reportedly (partially?) taken over by a company called the Privacy One Group, which is in turn owned by a company called System1. We found this quite remarkable as the two companies seem to have conflicting business models.&lt;!-- more --&gt; Startpage has been known for basing their advertisements on what their users enter in their search bar. System1 on the other hand, is a pay-per-click advertising company that &#34;&lt;a href=&#34;https://web.archive.org/web/20201127034309/https://www.bizjournals.com/losangeles/news/2017/09/20/system1-raises-270-million-for-consumer-intent.html&#34;&gt;has developed a pre-targeting platform that identifies and unlocks consumer intent across channels including social, native, email, search, market research and lead generation rather than relying solely on what consumers enter into search boxes.&lt;/a&gt;&#34;&lt;/p&gt;&lt;p&gt;We reached out to System1 CEO &lt;a href=&#34;https://web.archive.org/web/20201127034309/https://finance.yahoo.com/news/system1-appoints-ian-weingarten-ceo-185700741.html&#34;&gt;Ian Weingarten&lt;/a&gt; for an explanation. We received a very general response that did not address key questions.&lt;/p&gt;&lt;p&gt;Seemingly prompted by our ongoing concerns, Startpage released a public letter addressed to us from their CEO, and hosted a &lt;a href=&#34;https://web.archive.org/web/20201127034309/https://www.reddit.com/r/StartpageSearch/comments/djshn3/hello_reddit_startpage_mod_team/&#34;&gt;Q&amp;amp;A&lt;/a&gt; on their Subreddit to try and explain the situation. While some of our questions were answered, we noted that the company seemed to be evasive, essentially restating information from a previously published &lt;a href=&#34;https://web.archive.org/web/20201127034309/https://www.startpage.com/blog/company-updates/startpage-and-privacy-one-group/&#34;&gt;blog post&lt;/a&gt; or posting the same response to different questions. People had to really dig to get answers and puzzle all information together, instead of getting a clearly explained and comprehensive answer from the start. Requests for clarification to some important questions went ignored.&lt;/p&gt;&lt;p&gt;Because of the conflicting business model and the unusual way the company reacted, claiming to be fully transparent but being evasive at the same time, we have no choice but to de-list Startpage from our recommendations until it is fully transparent about its new ownership and data processing. Remaining questions include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The % of Startpage and Surfboard Holding B.V. (the Startpage holding company) System1 acquired in December 2018.&lt;/li&gt;&lt;li&gt;The current % ownership by System1 at the time of the audit (and any other major owners).&lt;/li&gt;&lt;li&gt;Information about Privacy One Group Ltd. Where is it registered and in what city, state and country does it operate? (We have not been able to verify registration information.)&lt;/li&gt;&lt;li&gt;A diagram of data flows, including flows to outside organizations, like System1, Privacy One etc.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This de-listing does not necessarily mean Startpage is violating its privacy policy. We have no evidence of that. But because there are still so many unanswered questions, we can no longer recommend the service with good confidence. If Startpage aims to be re-considered, they will have to answer the questions above, preferably along with an explanation of why it took them so long to get proper answers out to the public.&lt;/p&gt;&lt;p&gt;Sincerely,Blacklight447&lt;em&gt;Privacy Guides&lt;/em&gt;&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;strong&gt;2020-05-03:&lt;/strong&gt; Startpage has answered all of our questions for them and has clarified their policies. We have decided to recommend their service again, and you can read our latest &lt;a href=&#34;../../../../2020/05/03/relisting-startpage/&#34;&gt;announcement&lt;/a&gt; for more details.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;2023-10-23:&lt;/strong&gt; This post has been edited to reflect the team&#39;s move from &lt;a href=&#34;https://www.privacyguides.org/en/about/privacytools/&#34;&gt;PrivacyTools&lt;/a&gt; to Privacy Guides.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2019/11/12/delisting-startpage/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2019/11/12/delisting-startpage/</guid> </item> <item> <title>Delisting Wire From Privacy Guides</title> <author>Dan Arel</author> <category>Announcements</category> <category>Instant Messengers</category> <description>&lt;h1 id=&#34;delisting-wire-from-privacy-guides&#34;&gt;Delisting Wire From Privacy Guides&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&amp;quot;Delisting Wire&amp;quot; cover image&#34; src=&#34;../../../../assets/images/delisting-wire/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;It has recently come to the attention of the &lt;em&gt;Privacy Guides&lt;/em&gt; team that &lt;strong&gt;Wire&lt;/strong&gt;, the popular end-to-end encryption messaging platform &lt;a href=&#34;https://web.archive.org/web/20201128215737/https://forum.privacytools.io/t/wire-swiss-gmbh-is-now-owned-by-a-usa-holding-company/1932&#34;&gt;has been sold or moved to a US company&lt;/a&gt;. After a week of questioning, Wire finally confirmed they had changed holding companies and would now be a US based company in a move they called “simple and pragmatic,” as they worked to expand their foothold in the enterprise market. This also came alongside the news that Wire had accepted more than $8 million in Venture Capital (VC) funding from Morpheus Ventures, as well as other investors.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;Morpheus Ventures holds a &lt;a href=&#34;https://web.archive.org/web/20201128215737/https://morpheus.com/portfolio/&#34;&gt;portfolio&lt;/a&gt; including companies in healthcare, voice AI, life insurance, and retail customer data analytics: All sectors that have historically used invasive data collection methods to survive. Why would a VC with a portfolio centered on consumer data want to invest in a company whose mission claims to protect that very same information?&lt;/p&gt;&lt;p&gt;Earlier this year, Wire announced they had entered a partnership with &lt;a href=&#34;https://web.archive.org/web/20201128215737/https://www.globenewswire.com/news-release/2019/07/10/1880912/0/en/Wire-and-FedResults-Partner-to-Offer-End-to-End-Encrypted-Collaboration-Platform-to-Government-Agencies.html&#34;&gt;FedResults&lt;/a&gt;, in a move that would bring Wire&#39;s secure messaging platform to US federal agencies. This raised a few eyebrows, but did not alarm the privacy community as Wire remained Swiss based and beholden to Switzerland&#39;s strict privacy laws. Today however, while much of Wire&#39;s business will continue to be run out of their Swiss offices, with new US-based ownership it is not entirely clear how much jurisdiction the United States will have over Wire data.&lt;/p&gt;&lt;p&gt;This is alarming because it is well known that Wire &lt;a href=&#34;https://web.archive.org/web/20201128215737/https://www.vice.com/en_us/article/gvzw5x/secure-messaging-app-wire-stores-everyone-youve-ever-contacted-in-plain-text&#34;&gt;stores unencrypted metadata&lt;/a&gt; for every user.&lt;/p&gt;&lt;p&gt;In an interview with &lt;a href=&#34;https://web.archive.org/web/20201128215737/https://techcrunch.com/2019/11/13/messaging-app-wire-confirms-8-2m-raise-responds-to-privacy-concerns-after-moving-holding-company-to-the-us/&#34;&gt;TechCrunch&lt;/a&gt;, Wire CEO Morten Brøgger said of privacy laws: “We are in Switzerland, which has the best privacy laws in the world” — it’s subject to Europe’s General Data Protection Regulation framework (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;) on top of its own local laws — “and Wire now belongs to a new group holding, but there no change in control.” [sic]&lt;/p&gt;&lt;p&gt;Even if he is correct, the move and statement do bring up further questions. With Wire now being a US company with contracts partnering it with US federal authorities, will those authorities now have leverage to compel Wire to give up metadata on users? Wire has investors to answer to and will not be able to risk losing large deals with clients like the US federal government. This is of course a hypothetical situation, but one to be considered nonetheless as we decide which services to recommend on &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;&lt;em&gt;Privacy Guides&lt;/em&gt;&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Wire also quietly made an adjustment to its own privacy policy. A &lt;a href=&#34;https://web.archive.org/web/20180324221043/https://wire.com/en/legal/#privacy-7&#34;&gt;previous version&lt;/a&gt; of the policy (July 18, 2017) stated it would only share user data when required by law. Now (Updated September 1, 2018), it reads they will share user data when &#34;necessary.&#34; What does necessary mean, and necessary to whom? Necessary to law enforcement, shareholders, or advertisers? The word &#34;necessary&#34; is an alarming change because &#34;necessary&#34; is purposefully vague terminology that could conceivably be used as a tool to justify any action. This change doesn&#39;t leave the user with much confidence as to when the company may share your data.&lt;/p&gt;&lt;p&gt;Yet another red flag, and one of the more important ones to us, was is that Wire decided not to disclose this policy change to its users, and when asked why, Brøgger was flippant in his response, stating: “Our evaluation was that this was not necessary. Was it right or wrong? I don’t know.”&lt;/p&gt;&lt;p&gt;We feel we do know, and the answer was that it was wrong. Privacy and security are not built solely on strong technology, but on trust. Yes, we can review Wire&#39;s open source code on GitHub, but we can&#39;t ever be sure that code is the same exact code that runs on their servers in practice. Yet, we have trusted them in the past because Wire had built a trustworthy reputation for themselves. We now feel that Wire has lost this reputation. By deciding to withhold information regarding its ownership and policies from its users, Wire has broken the trust our community has placed in it, and worse yet sounds almost dismissive of the worries voiced by the privacy community that had long held them in high regard.&lt;/p&gt;&lt;p&gt;Because of these ongoing concerns, and this break in trust in Wire&#39;s organization, &lt;em&gt;Privacy Guides&lt;/em&gt; has made the decision to remove Wire from its recommendations. It is worth noting that does not necessarily mean Wire is unsafe, but we believe it is our duty to recommend products that we as a team feel comfortable standing behind. We need to believe in the security, privacy, and integrity of our recommendations, and we no longer feel we can do that with Wire at this time.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;strong&gt;2023-10-23:&lt;/strong&gt; This post has been edited to reflect the team&#39;s move from &lt;a href=&#34;https://www.privacyguides.org/en/about/privacytools/&#34;&gt;PrivacyTools&lt;/a&gt; to Privacy Guides.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2019/11/19/delisting-wire/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2019/11/19/delisting-wire/</guid> </item> <item> <title>Firefox Privacy: 2021 Update</title> <author>Daniel Gray</author> <category>Browsers</category> <category>Firefox</category> <category>Reviews</category> <description>&lt;h1 id=&#34;firefox-privacy-2021-update&#34;&gt;Firefox Privacy: 2021 Update&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Firefox Privacy cover&#34; src=&#34;../../../../assets/images/firefox-privacy/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;A lot changed between 2019 and now, not least in regards to Firefox. Since our last post, Mozilla has &lt;a href=&#34;https://blog.mozilla.org/en/products/firefox/latest-firefox-rolls-out-enhanced-tracking-protection-2-0-blocking-redirect-trackers-by-default/&#34;&gt;improved&lt;/a&gt; privacy with &lt;a href=&#34;https://blog.mozilla.org/en/products/firefox/firefox-now-available-with-enhanced-tracking-protection-by-default/&#34;&gt;Enhanced Tracking Protection (ETP)&lt;/a&gt;. Earlier this year Mozilla introduced &lt;a href=&#34;https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/&#34;&gt;Total Cookie Protection&lt;/a&gt; (Dynamic First Party Isolation dFPI). This was then further tightened with &lt;a href=&#34;https://blog.mozilla.org/security/2021/08/10/firefox-91-introduces-enhanced-cookie-clearing/&#34;&gt;Enhanced Cookie Clearing&lt;/a&gt;. We’re also looking very forward to &lt;a href=&#34;https://blog.mozilla.org/security/2021/05/18/introducing-site-isolation-in-firefox/&#34;&gt;Site Isolation&lt;/a&gt; (code named Fission) being enabled by default in the coming releases.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;Now that so many privacy features are built into the browser, there is little need for extensions made by third-party developers. Accordingly, we have updated our very outdated &lt;a href=&#34;https://www.privacyguides.org/desktop-browsers/&#34;&gt;browser&lt;/a&gt; section. If you’ve got an old browser profile we suggest &lt;strong&gt;creating a new one&lt;/strong&gt;. Some of the old advice may make your browser &lt;em&gt;more&lt;/em&gt; unique.&lt;/p&gt;&lt;h2 id=&#34;privacy-tweaks-aboutconfig&#34;&gt;Privacy Tweaks “about:config”&lt;/h2&gt;&lt;p&gt;We’re no longer recommending that users set &lt;code&gt;about:config&lt;/code&gt; switches manually. Those switches need to be up to date and continuously maintained. They should be studied before blindly making modifications. Sometimes their behaviour changes in between Firefox releases, is superseded by other keys or they are removed entirely. We do not see any point in duplicating the efforts of the community &lt;a href=&#34;https://github.com/arkenfox/user.js&#34;&gt;Arkenfox&lt;/a&gt; project. Arkenfox has very good documentation in their &lt;a href=&#34;https://github.com/arkenfox/user.js/wiki&#34;&gt;wiki&lt;/a&gt; and we use it ourselves.&lt;/p&gt;&lt;h2 id=&#34;localcdn-and-decentraleyes&#34;&gt;LocalCDN and Decentraleyes&lt;/h2&gt;&lt;p&gt;These extensions aren’t required with Total Cookie Protection (&lt;abbr title=&#34;Transmission Control Protocol&#34;&gt;TCP&lt;/abbr&gt;), which is enabled if you’ve set Enhanced Tracking Protection (ETP) to &lt;strong&gt;Strict&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Replacing scripts on CDNs with local versions is not a comprehensive solution and is a form of &lt;a href=&#34;https://www.ranum.com/security/computer_security/editorials/dumb/&#34;&gt;enumeration of badness&lt;/a&gt;. While it may work with some scripts that are included it doesn’t help with most other third-party connections.&lt;/p&gt;&lt;p&gt;CDN extensions never really improved privacy as far as sharing your &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address was concerned and their usage is fingerprintable as this Tor Project developer &lt;a href=&#34;https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/22089#note_2639603&#34;&gt;points out&lt;/a&gt;. They are the wrong tool for the job and are not a substitute for a good &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; or Tor. Its worth noting the &lt;a href=&#34;https://git.synz.io/Synzvato/decentraleyes/-/tree/master/resources&#34;&gt;resources&lt;/a&gt; for Decentraleyes are hugely out of date and would not be likely used anyway.&lt;/p&gt;&lt;h2 id=&#34;neaturls-and-clearurls&#34;&gt;NeatURLs and ClearURLS&lt;/h2&gt;&lt;p&gt;Previously we recommended ClearURLs to remove tracking parameters from URLs you might visit. These extensions are no longer needed with uBlock Origin’s &lt;a href=&#34;https://github.com/gorhill/uBlock/wiki/Static-filter-syntax#removeparam&#34;&gt;&lt;code&gt;removeparam&lt;/code&gt;&lt;/a&gt; feature.&lt;/p&gt;&lt;h2 id=&#34;https-everywhere&#34;&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; Everywhere&lt;/h2&gt;&lt;p&gt;The EFF announced back in September they were &lt;a href=&#34;https://www.eff.org/deeplinks/2021/09/https-actually-everywhere&#34;&gt;deprecating &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;-Everywhere&lt;/a&gt; as most browsers now have an &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;-Only feature. We are pleased to see privacy features built into the browser and Firefox 91 introduced &lt;a href=&#34;https://blog.mozilla.org/security/2021/08/10/firefox-91-introduces-https-by-default-in-private-browsing/&#34;&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; by Default in Private Browsing&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;multi-account-containers-and-temporary-containers&#34;&gt;Multi Account Containers and Temporary Containers&lt;/h2&gt;&lt;p&gt;Container extensions aren’t as important as they used to be for privacy now that we have &lt;a href=&#34;https://blog.mozilla.org/security/2021/02/23/total-cookie-protection/&#34;&gt;Total Cookie Protection&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Multi Account Container will still have some use if you use &lt;a href=&#34;https://en.wikipedia.org/wiki/Mozilla_VPN&#34;&gt;Mozilla &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/a&gt; as it is going to be &lt;a href=&#34;https://github.com/mozilla/multi-account-containers/issues/2210&#34;&gt;integrated&lt;/a&gt; allowing you to configure specified containers to use a particular &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; server. Another use might be if you want to login to multiple accounts on the same domain.&lt;/p&gt;&lt;h2 id=&#34;just-in-time-compilation-jit&#34;&gt;Just-In-Time Compilation (JIT)&lt;/h2&gt;&lt;p&gt;What is “Disable JIT” in Bromite? This option disables the JavaScript performance feature &lt;a href=&#34;https://en.wikipedia.org/wiki/Just-in-time_compilation&#34;&gt;JIT&lt;/a&gt;. It can increase security but at the cost of performance. Those trade-offs vary wildly and are explored in &lt;a href=&#34;https://microsoftedge.github.io/edgevr/posts/Super-Duper-Secure-Mode/&#34;&gt;this&lt;/a&gt; publication by Johnathan Norman from the Microsoft Edge team. This option is very much a security vs performance option.&lt;/p&gt;&lt;h2 id=&#34;mozilla-browsers-on-android&#34;&gt;Mozilla browsers on Android&lt;/h2&gt;&lt;p&gt;We don’t recommend any Mozilla based browsers on Android. This is because we don’t feel that &lt;a href=&#34;https://mozilla.github.io/geckoview&#34;&gt;GeckoView&lt;/a&gt; is quite as secure as it could be as it doesn’t support &lt;a href=&#34;https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture&#34;&gt;site isolation&lt;/a&gt;, soon to be coming in desktop browsers or &lt;a href=&#34;https://bugzilla.mozilla.org/show_bug.cgi?id=1565196&#34;&gt;isolated processes&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;We also noticed that there isn’t an option for &lt;a href=&#34;https://github.com/mozilla-mobile/fenix/issues/16952#issuecomment-907960218&#34;&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;-Only mode&lt;/a&gt;. The only way to get something similar is to install the &lt;a href=&#34;https://www.eff.org/deeplinks/2021/09/https-actually-everywhere&#34;&gt;deprecated&lt;/a&gt; extension &lt;a href=&#34;https://www.eff.org/https-everywhere&#34;&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; Everywhere&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;There are places which Firefox on Android shines for example browsing news websites where you may want to &lt;em&gt;partially&lt;/em&gt; load some JavaScript (but not all) using medium or hard &lt;a href=&#34;https://github.com/gorhill/uBlock/wiki/Blocking-mode&#34;&gt;blocking mode&lt;/a&gt;. The &lt;a href=&#34;https://support.mozilla.org/en-US/kb/view-articles-reader-view-firefox-android&#34;&gt;reader view&lt;/a&gt; is also pretty cool. We expect things will change in the future, so we’re keeping a close eye on this.&lt;/p&gt;&lt;h2 id=&#34;fingerprinting&#34;&gt;Fingerprinting&lt;/h2&gt;&lt;p&gt;Firefox has the ability to block known third party &lt;a href=&#34;https://blog.mozilla.org/security/2020/01/07/firefox-72-fingerprinting/&#34;&gt;fingerprinting resources&lt;/a&gt;. Mozilla has &lt;a href=&#34;https://support.mozilla.org/kb/firefox-protection-against-fingerprinting&#34;&gt;advanced protection&lt;/a&gt; against fingerprinting (RFP is enabled with Arkenfox).&lt;/p&gt;&lt;p&gt;We do not recommend extensions that promise to change your &lt;a href=&#34;https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead/&#34;&gt;browser fingerprint&lt;/a&gt;. Some of those extensions &lt;a href=&#34;https://www.cse.chalmers.se/~andrei/codaspy17.pdf&#34;&gt;are detectable&lt;/a&gt; by websites through JavaScript and &lt;a href=&#34;https://hal.archives-ouvertes.fr/hal-03152176/file/style-fingerprinting-usenix.pdf&#34;&gt;CSS&lt;/a&gt; methods, particularly those which inject anything into the web content.&lt;/p&gt;&lt;p&gt;This includes &lt;strong&gt;all&lt;/strong&gt; extensions that try to change the user agent or other browser behaviour to prevent fingerprinting. We see these often recommended on Reddit and would like to say that they will likely make you more unique and can be circumvented. Arkenfox has &lt;a href=&#34;https://github.com/arkenfox/user.js/wiki/4.1-Extensions&#34;&gt;a good list&lt;/a&gt; of extensions you could use, and a list of ones you &lt;a href=&#34;https://github.com/arkenfox/user.js/wiki/4.1-Extensions#-dont-bother&#34;&gt;needn&#39;t bother with&lt;/a&gt;. We also like to say testing sites which show you how unique you are in a set of users are often using hugely tainted results that are not indicative of real-world usage.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;em&gt;Special thanks to &lt;a href=&#34;https://github.com/Thorin-Oakenpants&#34;&gt;Thorin-Oakenpants&lt;/a&gt; and &lt;a href=&#34;https://tommytran.io&#34;&gt;Tommy&lt;/a&gt; for their help with providing advice and further documentation during the research phase.&lt;/em&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2021/12/01/firefox-privacy-2021-update/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2021/12/01/firefox-privacy-2021-update/</guid> </item> <item> <title>Firefox Privacy: Tips and Tricks for Better Browsing</title> <author>Jonah Aragon</author> <category>Browsers</category> <category>Firefox</category> <category>Reviews</category> <description>&lt;h1 id=&#34;firefox-privacy-tips-and-tricks-for-better-browsing&#34;&gt;Firefox Privacy: Tips and Tricks for Better Browsing&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&amp;quot;Firefox Privacy&amp;quot; cover image&#34; src=&#34;../../../../assets/images/firefox-privacy/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Mozilla Firefox is one of the most popular web browsers around, and for good reason. It&#39;s fast, secure, open-source, and it&#39;s backed by an organization that actually respects your privacy. Unlike many other Chrome alternatives and forks, it has a massive development team behind it that publishes new updates on a constant, regular basis. Regular updates doesn&#39;t only mean shiny new features, it means you&#39;ll also receive security updates that will keep you protected as you browse the web.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;Because of all of this, &lt;a href=&#34;https://www.privacyguides.org/desktop-browsers/#firefox&#34;&gt;we recommend Firefox&lt;/a&gt; as our general-purpose browser for most users. It&#39;s the best alternative to Chrome and Edge for privacy conscious individuals.&lt;/p&gt;&lt;p&gt;Firefox is fantastic out of the box, but where it really shines is customizability. By adjusting Firefox privacy settings and using helpful add-ons, you can increase your privacy and security even further. Making those changes is what we&#39;re going to go over in this Firefox privacy guide.&lt;/p&gt;&lt;p&gt;Before we get started, there&#39;s a couple things that should be noted that are not only applicable to this guide, but privacy in general:&lt;/p&gt;&lt;h2 id=&#34;considerations&#34;&gt;Considerations&lt;/h2&gt;&lt;p&gt;Protecting your privacy online is a tricky proposition, there are so many factors to take into consideration on an individual basis for any one guide or site to cover comprehensively. You will need to take into account things like threat modeling and your general preferences before making any changes or following any recommendations.&lt;/p&gt;&lt;h3 id=&#34;threat-modeling&#34;&gt;Threat Modeling&lt;/h3&gt;&lt;p&gt;What is &lt;a href=&#34;https://www.privacyguides.org/basics/threat-modeling/&#34;&gt;threat modeling&lt;/a&gt;? Consider who you&#39;re trying to keep your data hidden from. Do you need to keep your information hidden from the government, or just the average stranger? Maybe you are just looking to alternatives to Big Tech like Google and Facebook. You&#39;ll also want to consider how much time and resources you want to spend hiding your data from those &#34;threats&#34;. Some solutions might not be feasible from a financial or time standpoint and you&#39;ll have to make compromises. Taking all those questions into account creates a basic threat model for you to work with.&lt;/p&gt;&lt;p&gt;We want to publish a more complete guide on threat modeling in the future, so stay tuned to this blog for further updates. But for now, just keep those thoughts in the back of your mind as we go through this article. Not every solution might be for you, or conversely you may need to pay more attention to certain areas we aren&#39;t able to cover completely.&lt;/p&gt;&lt;h3 id=&#34;browser-fingerprinting&#34;&gt;Browser Fingerprinting&lt;/h3&gt;&lt;p&gt;Another consideration is your browser&#39;s fingerprint. When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using more common tracking tools, like cookies.&lt;/p&gt;&lt;p&gt;That&#39;s right, add-ons contribute to your fingerprint. Another thing a lot of people miss when they are setting up their browser is that more is not always the best solution to their problems. You don&#39;t need to use every add-on and tweak we recommend installed, and the more you configure the greater chance there is that your browser will appear more unique to websites. Think about your specific situation and pick and choose the add-ons and tweaks we recommend only if you think they will help you.&lt;/p&gt;&lt;h2 id=&#34;firefox-privacy-settings&#34;&gt;Firefox Privacy Settings&lt;/h2&gt;&lt;p&gt;We&#39;ll start off with the easy solutions. Firefox has a number of privacy settings built in, no add-ons necessary! Open your Options page (Preferences on macOS) and we&#39;ll go through them one at a time.&lt;/p&gt;&lt;h3 id=&#34;dns-over-https&#34;&gt;&lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; over &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;&lt;/h3&gt;&lt;p&gt;&lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; (or the Domain Name System) is what your browser uses to turn domain names like &lt;code&gt;privacyguides.org&lt;/code&gt; into &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; addresses like &lt;code&gt;65.109.20.157&lt;/code&gt;. Because computers can only make connections to &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; addresses, it&#39;s necessary to use &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; every time you visit a new domain. But &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; is unencrypted by default, that means everyone on your network (including your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;) can view what domains you&#39;re looking up, and in some situations even change the &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; answers to redirect you to their own websites! Encrypting your &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; traffic can shield your queries and add some additional protection to your browsing.&lt;/p&gt;&lt;p&gt;Encrypted &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; takes many forms: &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; over &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; (&lt;abbr title=&#34;DNS over HTTPS&#34;&gt;DoH&lt;/abbr&gt;), &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; over &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt;, DNSCrypt, etc., but they all accomplish the same thing. They keep your &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; queries private from your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;, and they make sure they aren&#39;t tampered with in transit between your &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; provider. Fortunately, Firefox recently added native &lt;abbr title=&#34;DNS over HTTPS&#34;&gt;DoH&lt;/abbr&gt; support to the browser. On the &lt;strong&gt;General&lt;/strong&gt; page of your preferences, scroll down to and open &lt;strong&gt;Network Settings&lt;/strong&gt;. At the bottom of the window you will be able to select &#34;Enable &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; over &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;&#34; and choose a provider.&lt;/p&gt;&lt;p&gt;Keep in mind that by using &lt;abbr title=&#34;DNS over HTTPS&#34;&gt;DoH&lt;/abbr&gt; you&#39;re sending all your queries to a single provider, probably Cloudflare unless you choose &lt;a href=&#34;https://www.privacyguides.org/dns/&#34;&gt;another provider&lt;/a&gt; that supports &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; over &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;. While it may add some privacy protection from your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;, you&#39;re only shifting that trust to the &lt;abbr title=&#34;DNS over HTTPS&#34;&gt;DoH&lt;/abbr&gt; provider. Make sure that&#39;s something you want to do.&lt;/p&gt;&lt;p&gt;It should also be noted that even with &lt;abbr title=&#34;DNS over HTTPS&#34;&gt;DoH&lt;/abbr&gt;, your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; will still be able to see what domain you&#39;re connecting to because of a technology called Server Name Indication (&lt;abbr title=&#34;Server Name Indication&#34;&gt;SNI&lt;/abbr&gt;). Until &lt;abbr title=&#34;Server Name Indication&#34;&gt;SNI&lt;/abbr&gt; is encrypted as well, there&#39;s no getting around it. Encrypted &lt;abbr title=&#34;Server Name Indication&#34;&gt;SNI&lt;/abbr&gt; (eSNI) is in the works — and can actually be &lt;a href=&#34;https://blog.cloudflare.com/encrypt-that-sni-firefox-edition/&#34;&gt;enabled on Firefox&lt;/a&gt; today — but it only works with a small number of servers, mainly ones operated by Cloudflare, so its use is limited currently. Therefore, while &lt;abbr title=&#34;DNS over HTTPS&#34;&gt;DoH&lt;/abbr&gt; provides some additional privacy and integrity protections, its use as a privacy tool is limited until other supplemental tools like eSNI and &lt;a href=&#34;https://www.icann.org/resources/pages/dnssec-what-is-it-why-important-2019-03-05-en&#34;&gt;&lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt;&lt;/a&gt; are finalized and implemented.&lt;/p&gt;&lt;h3 id=&#34;change-your-search-engine&#34;&gt;Change Your Search Engine&lt;/h3&gt;&lt;p&gt;This is an easy one. In the &lt;strong&gt;Search&lt;/strong&gt; tab, change your &lt;strong&gt;Default Search Engine&lt;/strong&gt; to something other than Google. Out of the built-in options, DuckDuckGo is the most privacy respecting service, but there&#39;s a number of &lt;a href=&#34;https://www.privacyguides.org/search-engines/&#34;&gt;search engines we would recommend&lt;/a&gt; that can be easily installed as well.&lt;/p&gt;&lt;h3 id=&#34;enhanced-tracking-protection&#34;&gt;Enhanced Tracking Protection&lt;/h3&gt;&lt;p&gt;Now we&#39;ll delve into the biggest set of options for people like us, Firefox&#39;s &lt;strong&gt;Privacy &amp;amp; Security&lt;/strong&gt; tab. First up is their &lt;strong&gt;Enhanced Tracking Protection&lt;/strong&gt;. This set of filters is set to Standard by default, but we&#39;ll want to change it to Strict for more comprehensive coverage.&lt;/p&gt;&lt;p&gt;In rare occasions, Strict browsing protections might cause some of the websites you visit to not function properly. But there&#39;s no need to worry! If you suspect the Strict browsing protection is breaking a website you visit frequently, you can disable it on a site by site basis with the shield icon in the address bar.&lt;/p&gt;&lt;p&gt;Disabling Enhanced Tracking Protection will of course decrease your privacy on that site, so you will have consider whether that&#39;s something you are willing to compromise on, on a site-by-site basis.&lt;/p&gt;&lt;p&gt;Another benefit of Firefox&#39;s Enhanced Tracking Protection is that it can actually speed up your browsing! Advertising networks and social media embeds can sometimes make your browser download huge files just to show an ad or a like button, and blocking those out trims the fat, in a sense.&lt;/p&gt;&lt;h3 id=&#34;disabling-telemetrics&#34;&gt;Disabling Telemetrics&lt;/h3&gt;&lt;p&gt;When you use Firefox, Mozilla collects information about what you do, what kind of extensions you have installed, and various other aspects of your browser. While they claim to do this in a privacy-respecting way, sending as little data as possible is always preferred from a privacy standpoint, so we would go ahead and uncheck all the boxes under &lt;strong&gt;Firefox Data Collection and Use&lt;/strong&gt; just to be safe.&lt;/p&gt;&lt;h3 id=&#34;clearing-cookies-and-site-data&#34;&gt;Clearing Cookies and Site Data&lt;/h3&gt;&lt;p&gt;This one is for more advanced users, so if you don&#39;t understand what this is doing you can skip this section. Firefox provides the option to delete all your cookies and site data every time Firefox is closed. Cookies and site data are little pieces of information sites store in your browser, and they have a myriad of uses. They are used for things like keeping you logged in and saving your website preferences, but they also can be used to track you across different websites. By deleting your cookies regularly, your browser will appear clean to websites, making you harder to track.&lt;/p&gt;&lt;p&gt;This will likely log you out of websites quite often, so make sure that&#39;s an inconvenience you&#39;re willing to put up with for enhanced privacy.&lt;/p&gt;&lt;h2 id=&#34;firefox-privacy-add-ons&#34;&gt;Firefox Privacy Add-Ons&lt;/h2&gt;&lt;p&gt;Of course, just the browser settings alone won&#39;t go quite far enough to protect your privacy. Mozilla has made a lot of compromises in order to provide a more functional browsing experience for the average user, which is completely understandable. But, we can take it even further with some browser add-ons that prevent tracking and make your experience more private and secure.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/desktop-browsers/#ublock-origin&#34;&gt;We recommend a number of fantastic add-ons&lt;/a&gt; for Firefox, nine at the time of writing, but they aren&#39;t all necessary for everyone. Some of them provide redundant functionality to each other, and some of them accomplish similar tasks to the settings we&#39;ve enabled above.&lt;/p&gt;&lt;p&gt;When you are installing add-ons for Firefox, consider whether you actually need them for your personal browsing. Remember that fingerprinting warning from earlier? Adding as many extensions as possible might make you stand out more, which is not the goal.&lt;/p&gt;&lt;p&gt;Keeping all that in mind, there are three add-ons I would consider necessary for virtually every user:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;uBlock Origin&lt;/li&gt;&lt;li&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; Everywhere&lt;/li&gt;&lt;li&gt;Decentraleyes&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Out of the box, these add-ons only complement the settings we&#39;ve described in this article already, and they have sane defaults that won&#39;t break the sites you visit.&lt;/p&gt;&lt;h3 id=&#34;ublock-origin&#34;&gt;uBlock Origin&lt;/h3&gt;&lt;p&gt;&lt;a href=&#34;https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/&#34;&gt;&lt;strong&gt;uBlock Origin&lt;/strong&gt;&lt;/a&gt; is an efficient ad- and tracker-blocker that is easy on memory, and yet can load and enforce thousands more filters than competing blockers. We trust it because it is completely open-source. Additionally, unlike its competitors it has no monetization strategy: There&#39;s no &#34;Acceptable&#34; ads program or a similar whitelist like many other adblockers feature.&lt;/p&gt;&lt;h3 id=&#34;https-everywhere&#34;&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; Everywhere&lt;/h3&gt;&lt;p&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; is the secure, encrypted version of &lt;abbr title=&#34;Hypertext Transfer Protocol&#34;&gt;HTTP&lt;/abbr&gt;. When you see an address starting with &lt;code&gt;https://&lt;/code&gt; along with the padlock in your browser&#39;s address bar, you know that your connection to the website is completely secure. This is of course important when you&#39;re logging into websites and sending your passwords and emails in a form. But it also prevents people on your network and your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; from snooping in on what you&#39;re reading, or changing the contents of an unencrypted webpage to whatever they want.&lt;/p&gt;&lt;p&gt;Therefore, &lt;a href=&#34;https://www.eff.org/https-everywhere&#34;&gt;&lt;strong&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; Everywhere&lt;/strong&gt;&lt;/a&gt; is a must-have extension, all it does is upgrade your &lt;abbr title=&#34;Hypertext Transfer Protocol&#34;&gt;HTTP&lt;/abbr&gt; connections to &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; wherever possible. And because it works silently in the background, you probably will never notice it! We trust &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; Everywhere because it is completely open-source, and is developed by the Electronic Frontier Foundation, a non-profit dedicated to private and secure technologies.&lt;/p&gt;&lt;p&gt;Of course, it only works with sites that support &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; on the server&#39;s side, so you&#39;ll still need to keep an eye on your address bar to make sure you&#39;re securely connected. But fortunately more and more websites have implemented &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; thanks to the advent of free certificates from organizations like Let&#39;s Encrypt.&lt;/p&gt;&lt;h3 id=&#34;decentraleyes&#34;&gt;Decentraleyes&lt;/h3&gt;&lt;p&gt;When you connect to many websites, your browser is most likely making connections to a myriad of &#34;Content Delivery Networks&#34; like Google Fonts, Akamai, and Cloudflare, to download fonts and Javascript that make the website run. This generally makes websites look and feel better, but it means you&#39;re constantly making connections to these servers, allowing them to build a fairly accurate tracking profile of you.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://addons.mozilla.org/en-US/firefox/addon/decentraleyes&#34;&gt;&lt;strong&gt;Decentraleyes&lt;/strong&gt;&lt;/a&gt; works by impersonating those CDNs locally in your browser. When a website wants to download a program like jQuery, instead of connecting to a remote CDN Decentraleyes will serve the file from its own cache of files. This means that you&#39;ll won&#39;t have to make remote CDN connections for the files that Decentraleyes supports, and therefore the remote CDNs can&#39;t track your browser. Because everything is stored locally instead of on a far away server, Decentraleyes has the added benefit of speeding up your browsing as well. Everything happens instantly, and you won&#39;t see a difference in the websites you visit.&lt;/p&gt;&lt;h3 id=&#34;additional-privacy-add-ons&#34;&gt;Additional Privacy Add-Ons&lt;/h3&gt;&lt;p&gt;There is of course more functionality that can be achieved at the expense of more time spent configuring your browser and reduced website functionality. If you&#39;re looking for the most privacy options possible however, they may be for you. Check out our &lt;a href=&#34;https://www.privacyguides.org/desktop-browsers/&#34;&gt;desktop browsers recommendations page&lt;/a&gt; for further information and additional resources.&lt;/p&gt;&lt;h2 id=&#34;more-privacy-functionality&#34;&gt;More Privacy Functionality&lt;/h2&gt;&lt;p&gt;Firefox has developed a number of other privacy tools that can be used to enhance your privacy or security. They may be worth looking into, but they have some drawbacks that would prevent me from recommending them outright.&lt;/p&gt;&lt;h3 id=&#34;firefox-private-network&#34;&gt;Firefox Private Network&lt;/h3&gt;&lt;p&gt;Firefox Private Network is a new extension developed by Mozilla that serves as a &lt;a href=&#34;https://www.privacyguides.org/basics/vpn-overview/&#34;&gt;Virtual Private Network&lt;/a&gt; (&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;), securing you on public WiFi networks and other situations where you might trust Mozilla more than the &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; or network administrator. It is free in beta, but will likely be available at some subscription pricing once the test pilot ends.&lt;/p&gt;&lt;p&gt;Firefox Private Network is still just a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, and there are a number of drawbacks you would want to consider before using it. We wrote an entire article on &lt;a href=&#34;https://www.jonaharagon.com/posts/choosing-a-vpn/&#34;&gt;choosing a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider&lt;/a&gt; that is worth a read, but it boils down to the fact that your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider will be able to see your web traffic. All you are accomplishing is shifting the trust from your network to the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider, in this case &lt;em&gt;Cloudflare&lt;/em&gt;, the operators behind this service.&lt;/p&gt;&lt;p&gt;Additionally, unlike a traditional &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, only data through the Firefox browser is protected, not every app on your machine. This means that it won&#39;t adequately protect you from many of the threats people typically want to protect against when they use a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, like &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; leaks.&lt;/p&gt;&lt;p&gt;And finally, Cloudflare and Mozilla are both US companies. There are a number of concerns with entrusting internet traffic to the US and other fourteen eyes countries that should not be overlooked.&lt;/p&gt;&lt;p&gt;If you require a Virtual Private Network, we would look elsewhere. There are a number of &lt;a href=&#34;https://www.privacyguides.org/vpn/&#34;&gt;recommended providers&lt;/a&gt; like Mullvad that will provide a better experience at a low cost.&lt;/p&gt;&lt;h3 id=&#34;multi-account-containers&#34;&gt;Multi-Account Containers&lt;/h3&gt;&lt;p&gt;Mozilla has an in-house add-on called &lt;a href=&#34;https://support.mozilla.org/en-US/kb/containers&#34;&gt;Multi-Account Containers&lt;/a&gt; that allows you to isolate websites from each other. For example, you could have Facebook in a container separate from your other browsing. In this situation, Facebook would only be able to set cookies with your profile on sites within the container, keeping your other browsing protected.&lt;/p&gt;&lt;p&gt;A containers setup may be a good alternative to techniques like regularly deleting cookies, but requires a lot of manual intervention to setup and maintain. If you want complete control of what websites can do in your browser, it&#39;s definitely worth looking into, but we wouldn&#39;t call it a necessary addition by any means.&lt;/p&gt;&lt;h2 id=&#34;additional-resources&#34;&gt;Additional Resources&lt;/h2&gt;&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/desktop-browsers/&#34;&gt;Desktop Browsers (Privacy Guides)&lt;/a&gt; — Our comprehensive set of recommendations for browsers and tweaks you can make to enhance your privacy is a great next step for more advanced users looking to protect their privacy online.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://github.com/arkenfox/user.js&#34;&gt;arkenfox user.js&lt;/a&gt; — For more advanced users, the arkenfox user.js is a &#34;configuration file that can control hundreds of Firefox settings [...] which aims to provide as much privacy and enhanced security as possible, and to reduce tracking and fingerprinting as much as possible - while minimizing any loss of functionality and breakage&#34;.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.mozilla.org/en-US/privacy/&#34;&gt;Mozilla&#39;s Privacy Policy&lt;/a&gt; — Of course, we always recommend reading through the privacy statement of any organization you deal with, and Mozilla is no exception.&lt;/p&gt;&lt;h2 id=&#34;firefox-privacy-summary&#34;&gt;Firefox Privacy Summary&lt;/h2&gt;&lt;p&gt;In conclusion, we believe that Firefox is the most promising browser for privacy-conscious individuals. The non-profit behind it seems truly dedicated to promoting user control and privacy, and the good defaults coupled with the sheer customizability of the browser allow you to truly protect your information when you browse the web.&lt;/p&gt;&lt;p&gt;For more Firefox privacy-related information, or for recommendations for non-desktop platforms, give our full page on &lt;a href=&#34;https://www.privacyguides.org/desktop-browsers/&#34;&gt;web browsers&lt;/a&gt; a read.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2019/11/09/firefox-privacy/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2019/11/09/firefox-privacy/</guid> </item> <item> <title>&#34;Privacy-Preserving&#34; Attribution: Mozilla Disappoints Us Yet Again</title> <author>Jonah Aragon</author> <category>Firefox</category> <category>Mozilla</category> <category>News</category> <description>&lt;h1 id=&#34;privacy-preserving-attribution-mozilla-disappoints-us-yet-again&#34;&gt;&#34;Privacy-Preserving&#34; Attribution: Mozilla Disappoints Us Yet Again&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&#34; src=&#34;../../../../assets/images/mozilla-disappoints-us-yet-again-2/cover.jpeg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image: Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&#34;No shady privacy policies or back doors for advertisers&#34; proclaims the Firefox homepage, but that&#39;s no longer true in Firefox 128.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Less than a month after &lt;a href=&#34;https://discuss.privacyguides.net/t/mozilla-acquires-anonym-raising-the-bar-for-privacy-preserving-digital-advertising/18936&#34;&gt;acquiring the AdTech company Anonym&lt;/a&gt;, Mozilla has added special software co-authored by Meta and built for the advertising industry directly to the latest release of Firefox, in an experimental trial you have to opt out of manually. This &#34;Privacy-Preserving Attribution&#34; (PPA) API adds another tool to the arsenal of tracking features that advertisers can use, which is thwarted by traditional content blocking extensions.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;It seems that 6 years after the &lt;a href=&#34;https://www.theverge.com/2017/12/16/16784628/mozilla-mr-robot-arg-plugin-firefox-looking-glass&#34;&gt;Mr. Robot extension debacle&lt;/a&gt;, Mozilla still hasn&#39;t learned their lesson about sneaking unwanted advertising and features onto our computers.&lt;/p&gt;&lt;p&gt;We already know from Google&#39;s &lt;a href=&#34;https://www.eff.org/deeplinks/2019/08/dont-play-googles-privacy-sandbox-1&#34;&gt;Privacy Sandbox&lt;/a&gt; that simply adding &#34;privacy&#34; to the name of your feature does not make it private. While Mozilla claims that the &#34;Privacy-Preserving&#34; attribution aims to provide a more privacy-friendly alternative to ad tracking, there are a plethora of issues with this new (anti-)feature that are worth examining:&lt;/p&gt;&lt;h2 id=&#34;misaligned-incentives&#34;&gt;Misaligned Incentives&lt;/h2&gt;&lt;p&gt;Mozilla&#39;s decision to implement PPA in Firefox highlights a growing trend among user agents (browsers) to grant preferential treatment to the advertising industry over all other businesses.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;All&lt;/strong&gt; websites on the internet—including ad networks!—are &lt;strong&gt;guests&lt;/strong&gt; on our computers, and the content they provide are merely suggestions for a user agent to interpret and show us how it chooses. This has always been a fundamental truth of how the internet works, and enables many great things: from highly-accessible text-based web browsers to the ability to &lt;a href=&#34;https://www.privacyguides.org/en/browser-extensions/&#34;&gt;block trackers&lt;/a&gt; and other unwanted bloat on the websites you visit. By baking in software that&#39;s tailor-made for the advertising industry, Mozilla is wrongly asserting that the advertising industry has a legitimate interest in collecting your data and tracking you across the internet over all other parties, including over your own interests.&lt;/p&gt;&lt;p&gt;The advertising industry and &lt;a href=&#34;https://discuss.privacyguides.net/t/ublock-origin-lite/15329/11&#34;&gt;Google&lt;/a&gt; in particular have been trying their hardest to reverse this dynamic, to turn browsers into a locked-down piece of viewing software under the total control of the servers it&#39;s accessing. Mozilla is the organization meant to protect us from the ever-encroaching desires of industry to control and track what we see online, but instead they&#39;re continually giving in to the idea that user agents should serve website operators and ad-tracking networks instead of users.&lt;/p&gt;&lt;h2 id=&#34;lack-of-consent&#34;&gt;Lack of Consent&lt;/h2&gt;&lt;p&gt;Mozilla constantly fails to understand the basic concept of consent. Firefox developers seem to see their position as shepherds, herding the uninformed masses towards choices they interpret to be &#34;good for them.&#34; Firefox users are not a captive audience that needs to be coddled, they are generally full-grown adult computer users who need to be listened to.&lt;/p&gt;&lt;p&gt;One Mozilla developer claimed that explaining PPA would be too challenging, so they had to opt users in by default.&lt;/p&gt;&lt;iframe src=&#34;https://mastodon.social/@Schouten_B/112784434152717689/embed&#34; class=&#34;mastodon-embed&#34; style=&#34;max-width: 100%; border: 0&#34; width=&#34;400&#34; allowfullscreen=&#34;allowfullscreen&#34;&gt;&lt;/iframe&gt;&lt;script src=&#34;https://mastodon.social/embed.js&#34; async=&#34;async&#34;&gt;&lt;/script&gt;&lt;iframe src=&#34;https://mastodon.social/@Schouten_B/112784608473016028/embed&#34; class=&#34;mastodon-embed&#34; style=&#34;max-width: 100%; border: 0&#34; width=&#34;400&#34; allowfullscreen=&#34;allowfullscreen&#34;&gt;&lt;/iframe&gt;&lt;script src=&#34;https://mastodon.social/embed.js&#34; async=&#34;async&#34;&gt;&lt;/script&gt;&lt;p&gt;The reality is that it isn&#39;t simply a &lt;em&gt;privileged minority&lt;/em&gt; of users who care about surveillance tracking software being built in to their browsers.&lt;/p&gt;&lt;p&gt;Firefox users are &lt;strong&gt;fully&lt;/strong&gt; capable of understanding basic concepts like tracking, and can make an informed decision about whether they want their browser to track them. Mozilla refuses to acknowledge this, because it&#39;s in their best (financial) interest to get as many people as possible to use this feature.&lt;/p&gt;&lt;p&gt;At the end of the day, Mozilla &lt;strong&gt;knows&lt;/strong&gt; this feature isn&#39;t something that Firefox users want. If they truly believed this was the one path away from the constant data theft perpetuated by the advertising industry, they would&#39;ve announced this loudly and proudly. They could&#39;ve given the privacy and general Firefox communities ample time to scrutinize the protocol beforehand.&lt;/p&gt;&lt;p&gt;Instead, they buried the announcement in a two sentence blurb at the bottom of the release notes, 5 months after they posted a very brief &lt;a href=&#34;https://blog.mozilla.org/en/mozilla/privacy-preserving-attribution-for-advertising/&#34;&gt;blog post&lt;/a&gt; talking about this technology which was likely ignored by the vast majority of Firefox users.&lt;/p&gt;&lt;h2 id=&#34;false-privacy&#34;&gt;False Privacy&lt;/h2&gt;&lt;p&gt;Let&#39;s ignore all of this though, and say you don&#39;t care that Mozilla is selling out to advertisers, as long as the feature is actually more private than the current status quo. PPA still isn&#39;t the answer we are looking for.&lt;/p&gt;&lt;p&gt;The simple truth is that the &#34;Distributed Aggregation Protocol&#34; Mozilla is using here is &lt;strong&gt;not private by design.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The way it works is that individual browsers report their behavior to a data aggregation server (operated by Mozilla), then that server reports the aggregated data to an advertiser&#39;s server. The &#34;advertising network&#34; only receives aggregated data with differential privacy, but the aggregation server still knows the behavior of individual browsers!&lt;/p&gt;&lt;p&gt;This is essentially a semantic trick Mozilla is trying to pull, by claiming the advertiser can&#39;t infer the behavior of individual browsers by re-defining part of the advertising network to not be the advertiser.&lt;/p&gt;&lt;p&gt;It is extremely disingenuous for Mozilla to claim that Firefox is adding technical measures to protect your privacy, when the reality is that your privacy is only being protected by social measures. In this particular case, Mozilla and their partner behind this technology, the ISRG (responsible for Let&#39;s Encrypt), could trivially collude to compromise your privacy.&lt;/p&gt;&lt;h2 id=&#34;uselessness&#34;&gt;Uselessness&lt;/h2&gt;&lt;p&gt;Finally, there is no reason for this technology to exist in the first place, because tracking aggregate ad conversions like this &lt;strong&gt;can already be done&lt;/strong&gt; by websites without cookies and without invading privacy, using basic web technology.&lt;/p&gt;&lt;p&gt;All an advertisement has to do is link to a unique URL: Instead of linking to &lt;code&gt;example.com&lt;/code&gt; one could link to &lt;code&gt;example.com/ad01&lt;/code&gt;, and the website operator simply has to track how many people visit the &lt;code&gt;ad01&lt;/code&gt; page on their end.&lt;/p&gt;&lt;p&gt;In contrast to the amazingly complex PPA setup Mozilla is pushing, this is a perfectly viable alternative that advertisers could easily adopt today. The reason they do not is simply because they have an insatiable need for as much of your data as possible.&lt;/p&gt;&lt;h2 id=&#34;disabling-ppa&#34;&gt;Disabling PPA&lt;/h2&gt;&lt;p&gt;Firefox users should disable this feature:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Open Firefox&#39;s settings page at &lt;code&gt;about:preferences&lt;/code&gt;&lt;/li&gt;&lt;li&gt;In the Privacy &amp;amp; Security panel, find the &lt;em&gt;Website Advertising Preferences&lt;/em&gt; section.&lt;/li&gt;&lt;li&gt;Uncheck the box labeled &lt;strong&gt;Allow websites to perform privacy-preserving ad measurement.&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;There are also plenty of other &lt;a href=&#34;https://www.privacyguides.org/en/desktop-browsers/&#34;&gt;web browsers&lt;/a&gt; you could choose from, if you&#39;re growing tired of Mozilla&#39;s behavior in recent months. Between their foray into generative AI and their business acquisitions in the advertising industry itself, I certainly wouldn&#39;t blame you.&lt;/p&gt;&lt;p&gt;PPA is an additional privacy &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt; that has no value for end users whatsoever, as its sole purpose is to give data to the advertising industry for nothing in return. Instead of focusing their efforts on compromising with advertisers, Mozilla could work to actively block unwanted data collection. Because they aren&#39;t blocking any of the myriad of ways advertisers currently track you, Mozilla is not acting in your best interest here.&lt;/p&gt;&lt;p&gt;For a browser and organization which has built its reputation entirely on protecting user privacy, these moves are really eroding the trust of its core user base. We hope that Mozilla will listen to the overwhelming user feedback surrounding this feature and their other endeavors, and consider whether these recent actions are aligned with their core mission of putting users first.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;a href=&#34;https://discuss.privacyguides.net/t/privacy-preserving-attribution-mozilla-disappoints-us-yet-again/19467/2&#34;&gt;Discuss this article on our forum&lt;/a&gt;, or leave a comment below.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2024/07/14/mozilla-disappoints-us-yet-again-2/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2024/07/14/mozilla-disappoints-us-yet-again-2/</guid> </item> <item> <title>Privacy Guides Partners With MAGIC Grants 501(c)(3)</title> <author>Jonah Aragon</author> <category>Announcements</category> <description>&lt;h1 id=&#34;privacy-guides-partners-with-magic-grants-501c3&#34;&gt;Privacy Guides Partners With MAGIC Grants 501(c)(3)&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&#34; src=&#34;../../../../assets/images/privacy-guides-partners-with-magic-grants-501-c-3/magicblog.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides&lt;/small&gt;&lt;/p&gt;&lt;p&gt;In February, the OpenCollective Foundation (OCF)—&lt;a href=&#34;https://blog.privacyguides.org/2019/10/31/weve-joined-the-open-collective-foundation/&#34;&gt;our fiscal host of 4 years&lt;/a&gt;—sent us an email to &lt;a href=&#34;https://docs.opencollective.foundation/&#34;&gt;announce&lt;/a&gt; that they would be shutting down, and they would no longer be able to collect donations on our behalf (or for any of the hundreds of projects they provided fiscal hosting services to). We immediately began to consider multiple options for the future of this project, including forming our own non-profit or finding another &lt;a href=&#34;https://en.wikipedia.org/wiki/Fiscal_sponsorship&#34;&gt;fiscal host&lt;/a&gt;.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;We&#39;re excited to announce a &lt;a href=&#34;https://magicgrants.org/2024/07/22/Privacy-Guides-Fund&#34;&gt;partnership&lt;/a&gt; with MAGIC Grants, a Public 501(c)(3) charity with the mission of supporting privacy projects like ours and providing undergraduate scholarships for students interested in cryptocurrencies and privacy. They will immediately take over all of the operations previously provided by OCF, including accepting donations on our behalf, handling any of our accounting and taxes, reimbursing team members and volunteers, and taking legal ownership of assets like our domains and servers.&lt;/p&gt;&lt;p&gt;This last point is important, because we want to ensure Privacy Guides is never fully reliant on a single individual like myself. This setup ensures Privacy Guides never strays from its mission of providing free and accessible privacy and security resources to protect consumers.&lt;/p&gt;&lt;p&gt;Of course, all of our projects including the &lt;a href=&#34;https://github.com/privacyguides/privacyguides.org&#34;&gt;open-source&lt;/a&gt; Privacy Guides website, our communities, and this blog remain editorially independent and volunteer led. This partnership only affects our administrative platform behind the scenes.&lt;/p&gt;&lt;p&gt;MAGIC Grants was the right choice for our project for a number of reasons:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;They are a 501(c)(3) non-profit, which allows us to retain our tax deductible status in the United States, and means there are legal safeguards in place to prevent Privacy Guides from being used for personal profit.&lt;/li&gt;&lt;li&gt;They&#39;ve provided us with a great deal of flexibility and independence over how we run our project, and added many safeguards to ensure the current Privacy Guides team retains ultimate control over the project. This means that nothing about Privacy Guides will change, now or in the future, due to outside influence.&lt;/li&gt;&lt;li&gt;They&#39;ve generously offered to provide their services to us for no fee, in support of our shared core mission of creating great educational materials.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;Finally, unlike OCF, MAGIC Grants is extremely flexible when it comes to accepting cryptocurrencies. Previously we have not been able to accept cryptocurrency donations, because OCF did not have the accounting tools in place to handle such transactions. MAGIC Grants is highly experienced in the cryptocurrency—and especially &lt;a href=&#34;https://www.privacyguides.org/en/cryptocurrency/&#34;&gt;Monero&lt;/a&gt;—space, and we will be able to accept completely private donations through that very soon.&lt;/p&gt;&lt;p&gt;Donations to Privacy Guides are considered restricted contributions which may only be used under the &lt;a href=&#34;https://magicgrants.org/funds/privacy_guides/&#34;&gt;Privacy Guides Fund agreement&lt;/a&gt; we have with MAGIC Grants, and not for any of MAGIC Grants’ other endeavors. You can make a general donation to MAGIC Grants on their &lt;a href=&#34;https://magicgrants.org/contribute/&#34;&gt;website&lt;/a&gt;.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;We considered forming our own organization, but estimated that the initial costs to do so would meet or exceed our current annual budget, which wasn&#39;t financially viable. We have reserved the right to spin off as an independent non-profit, or to transfer to another fiscal host in the future, if we feel it would be beneficial to do so.&lt;/p&gt;&lt;p&gt;Running this network of websites and services for free to the public is a time-consuming and costly endeavor. We do it because we believe it is the right thing to do, not because we are looking to make a profit. Any contributions have been either used to pay our expenses or saved in a reserve for expansion or times of need.&lt;/p&gt;&lt;p&gt;Your support of this project will help us keep our servers running and pay for other various expenses accrued by the team while developing this community. We do not operate Privacy Guides for personal profit, and all funds will be used to further our mission in one form or another.&lt;/p&gt;&lt;p&gt;If you like what we do, please consider contributing to our project at &lt;a href=&#34;https://www.privacyguides.org/en/about/donate/&#34;&gt;https://www.privacyguides.org/en/about/donate/&lt;/a&gt;.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;Read more about the &lt;a href=&#34;https://magicgrants.org/2024/07/22/Privacy-Guides-Fund&#34;&gt;Privacy Guides Fund announcement&lt;/a&gt; on MAGIC Grants&#39; blog.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2024/07/22/privacy-guides-partners-with-magic-grants-501-c-3/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2024/07/22/privacy-guides-partners-with-magic-grants-501-c-3/</guid> </item> <item> <title>Relisting Startpage.com</title> <author>Privacy Guides</author> <category>Announcements</category> <category>Search Engines</category> <description>&lt;h1 id=&#34;relisting-startpagecom&#34;&gt;Relisting Startpage.com&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&amp;quot;Relisting Startpage&amp;quot; cover image&#34; src=&#34;../../../../assets/images/relisting-startpage/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Privacy Guides&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Dear &lt;em&gt;Privacy Guides&lt;/em&gt; Community,&lt;/p&gt;&lt;p&gt;In October 2019, we learned that System1 had become the majority shareholder in Startpage.com via a new System1 subsidiary, Privacy One Group. Due to the uncertainty surrounding the acquisition and the initial lack of clear communication from the Startpage team towards the privacy community, we were forced to delist Startpage from our &lt;a href=&#34;https://www.privacyguides.org/en/search-engines/&#34;&gt;search engine recommendations&lt;/a&gt;.&lt;!-- more --&gt; In an &lt;a href=&#34;../../../../2019/11/12/delisting-startpage/&#34;&gt;explanatory blog post&lt;/a&gt;, we asked for more clarity surrounding the situation, stating:&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;...there are still so many unanswered questions, we can no longer recommend the service with good confidence. If Startpage aims to be re-considered, they will have to answer the questions above, preferably along with an explanation of why it took them so long to get proper answers out to the public.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;Shortly after this, the &lt;em&gt;Privacy Guides&lt;/em&gt; team was able to get an open line of communication with Startpage.com CEO Robert Beens, who vocalized his regret for not answering our questions more quickly and providing more clarity to the community from the start. From their perspective nothing fundamental had changed due to the acquisition, except that they would now have the resources to market Startpage efficiently thanks to System1. Unfortunately, Startpage failed to put themselves in the place of their users, and understand that their lack of transparancy at the beginning would erode the trust they shared with the privacy community.&lt;/p&gt;&lt;p&gt;By December, Startpage had &lt;a href=&#34;https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1562#issue-737&#34;&gt;responded&lt;/a&gt; to our questions. More recently they also clarified that &lt;a href=&#34;https://web.archive.org/web/20201110100140/https://system1.com/terms/privacy-policy&#34;&gt;System1&#39;s privacy policy&lt;/a&gt; does not relate to Startpage; Startpage&#39;s privacy policy remains &lt;a href=&#34;https://web.archive.org/web/20201110100140/https://www.startpage.com/en/privacy-policy/&#34;&gt;unchanged&lt;/a&gt;:&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;Having a new shareholder in the company will not change any aspect of the privacy we offer. We are a Dutch company and will continue to be so, fully complying with Dutch and EU privacy regulations (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;). We don’t store or share any personal data. No change either. Our clear privacy policy will stay the same. Management / founders (including myself) continue to have an important stake in the company and will continue to be fully committed to our privacy mission!&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;They also created new support pages clarifying the privacy implications of System1&#39;s relationship with Startpage:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://web.archive.org/web/20201110100140/https://support.startpage.com/index.php?/Knowledgebase/Article/View/1277/0/startpage-ceo-robert-beens-discusses-the-investment-from-privacy-one--system1&#34;&gt;Startpage CEO Robert Beens discusses the investment from Privacy One / System1&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://web.archive.org/web/20201110100140/https://support.startpage.com/index.php?/Knowledgebase/Article/View/1275/0/what-is-startpages-relationship-with-privacy-onesystem1-and-what-does-this-mean-for-my-privacy-protections&#34;&gt;What is Startpage&#39;s relationship with Privacy One/System1 and what does this mean for my privacy protections?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://web.archive.org/web/20201110100140/https://support.startpage.com/index.php?/Knowledgebase/Article/View/1276/0/what-is-the-startpage-privacy-guarding-data-flow&#34;&gt;What is the Startpage privacy-guarding data flow?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Additionally, Beens joined an &lt;a href=&#34;https://invidio.us/watch?v=h-3fW0w2ayg&#34;&gt;interview&lt;/a&gt; with Techlore in February answering his questions and further questions from the privacy community.&lt;/p&gt;&lt;p&gt;We prepared a &lt;a href=&#34;https://code.privacyguides.dev/privacyguides/privacytools.io/pulls/1592&#34;&gt;merge request&lt;/a&gt; in December for relisting Startpage in case we decided to do so, but did not have plans to merge it until the whole team felt confident (which we knew would take time). 5 months later, we sync&#39;d up as a team, and decided to re-list them (with a warning explaining these events) which you can now find on our website &lt;a href=&#34;https://web.archive.org/web/20201110100140/https://www.privacytools.io/providers/search-engines&#34;&gt;here&lt;/a&gt;. Our confidence and trust in Startpage has grown, and we&#39;re appreciative of Startpage&#39;s cooperation and willingness to address the concerns of our community.&lt;/p&gt;&lt;p&gt;We also hope this encourages any services that may end up being delisted for one reason or another to take action and improve themselves in this same fashion. We don&#39;t like delisting the services we&#39;ve previously trusted and recommended, and we are always happy to see when steps are taken to regain community trust.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;strong&gt;2023-10-23:&lt;/strong&gt; This post has been edited to reflect the team&#39;s move from &lt;a href=&#34;https://www.privacyguides.org/en/about/privacytools/&#34;&gt;PrivacyTools&lt;/a&gt; to Privacy Guides.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2020/05/03/relisting-startpage/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2020/05/03/relisting-startpage/</guid> </item> <item> <title>Security, Privacy, and Anonymity</title> <author>Nate Bartram</author> <category>Opinion</category> <category>Security</category> <description>&lt;h1 id=&#34;security-privacy-and-anonymity&#34;&gt;Security, Privacy, and Anonymity&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&#34; src=&#34;../../../../assets/images/security-privacy-anonymity/cover.jpeg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image: Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;We may think that we know the differences between privacy, security and anonymity, however we often mix them up. People will often criticize a product or service as “not private” when they really mean “not anonymous.” Privacy, security, and anonymity often complement each other, but they are not always dependent on each other, and they are definitely not the same thing. A service can be private without being anonymous, or even secure without being private. Which one should you prioritize?&lt;!-- more --&gt; To some extent, there are no wrong answers. It really comes down to your threat model and what your desired goal is. It is perfectly fine to pick a product that provides privacy even though it doesn&#39;t provide anonymity. Furthermore, it&#39;s okay to pick a product that doesn&#39;t provide security if it does provide one of the other features. The important thing is that you need to be aware what these products and services are and aren’t offering you so that you can use them correctly.&lt;/p&gt;&lt;p&gt;There’s lots of ways to define privacy, security, and anonymity. Someone showed me &lt;a href=&#34;https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452&#34;&gt;this&lt;/a&gt; definition and I really liked it. It seems to pretty much hit the nail on the head when applying these terms specifically to data privacy and cybersecurity:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Anonymity&lt;/strong&gt;: &lt;em&gt;The sender and/or recipient&#39;s real ID is unknown&lt;/em&gt;&lt;/p&gt;&lt;p&gt;In the real world this could be a secret admirer sending a Valentine&#39;s Day card. Online this could be when ones &#34;footprints&#34; cannot lead back to the poster: e.g. Tor.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Privacy&lt;/strong&gt;: &lt;em&gt;The contents of the message can only be seen/heard by the intended recipient(s)&lt;/em&gt;&lt;/p&gt;&lt;p&gt;In the real world this could be a whispered conversation between two people in the middle of Siberia. Online this could be a Signal message, which is end-to-end encrypted and only the recipient &amp;amp; sender can read the contents.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Security&lt;/strong&gt; (in the context of privacy/anonymity): &lt;em&gt;The parties involved are who they say they are&lt;/em&gt;&lt;/p&gt;&lt;p&gt;In the real world this could be something unique and verifiable such as a passport or fingerprints. Online this could be certificates or &lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt; signatures.&lt;/p&gt;&lt;p&gt;These topics often overlap: Privacy can help your security because if people don&#39;t know information about you, they can&#39;t effectively target you. For example, an attacker that doesn&#39;t know who you bank with cannot know which bank to target. Security can protect your privacy by forcibly controlling who has access to that information about you. Let’s take a few examples:&lt;/p&gt;&lt;h2 id=&#34;security-without-privacy-or-anonymity&#34;&gt;Security without Privacy or Anonymity&lt;/h2&gt;&lt;p&gt;The most obvious example of this that comes to mind is Google. Google has had almost no major data breaches in all their years of existence, yet they know almost everything about everyone to the point that the former CEO Eric Schmidt remarked &#34;&lt;a href=&#34;https://web.archive.org/web/20210729190743/https://www.zdnet.com/article/google-even-knows-what-youre-thinking/&#34;&gt;We can more or less know what you&#39;re thinking about.&lt;/a&gt;&#34; Google offers world-class security with zero privacy or anonymity.&lt;/p&gt;&lt;h2 id=&#34;security-and-some-privacy-without-anonymity&#34;&gt;Security and Some Privacy without Anonymity&lt;/h2&gt;&lt;p&gt;Consider the renowned encrypted messaging app Signal. Because your phone number is required, you can be unmasked by a court order or even a web search depending on the phone number you use. However, Signal is renowned for having some of the best security in the world, and the content of your messages and the information you transfer will be protected and controlled even if your identity is not. Top-notch security and privacy over the content of your messages, but anonymity cannot be guaranteed.&lt;/p&gt;&lt;h2 id=&#34;anonymity-without-security&#34;&gt;Anonymity without Security&lt;/h2&gt;&lt;p&gt;Cash is a great example of this. Paying for a product in cash preserves your anonymity - unless the business requires it, you don&#39;t have to give any kind of information at all. Yet, you have no security if the seller doesn&#39;t deliver the item (unless you have a receipt). You have no protection from fraud or anything like that.&lt;/p&gt;&lt;h2 id=&#34;security-with-privacy-and-anonymity&#34;&gt;Security with Privacy and Anonymity&lt;/h2&gt;&lt;p&gt;&lt;abbr title=&#34;Extensible Messaging and Presence Protocol&#34;&gt;XMPP&lt;/abbr&gt; is arguably the best example of this. &lt;abbr title=&#34;Extensible Messaging and Presence Protocol&#34;&gt;XMPP&lt;/abbr&gt; allows you to sign up without any real information, over a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; or Tor connection for total anonymity. Additionally, the conversations can be protected by OMEMO encryption, meaning the data itself is also private. When used properly, this is as closed to perfect as you can get, if a bit user-unfriendly. (&lt;strong&gt;Editor&#39;s note&lt;/strong&gt;: &lt;abbr title=&#34;Extensible Messaging and Presence Protocol&#34;&gt;XMPP&lt;/abbr&gt; is not officially endorsed by Privacy Guides for the reasons listed &lt;a href=&#34;https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1854&#34;&gt;here&lt;/a&gt;.)&lt;/p&gt;&lt;h2 id=&#34;closing-thoughts&#34;&gt;Closing Thoughts&lt;/h2&gt;&lt;p&gt;These three concepts are not necessarily dependent on each other. A secure product does not guarantee privacy, a private product does not guarantee security, and anonymity does not guarantee either. As I said before, there is nothing wrong with valuing one facet over another. It&#39;s also okay to use Signal even though it doesn&#39;t give you total anonymity. Just be sure you understand how a product is meant to be used and where it both shines and falls short. It would be awful to use Google thinking that it will give your communications total privacy and then your financial details get stolen by a &lt;a href=&#34;https://web.archive.org/web/20210729190743/https://nypost.com/2020/09/23/shopify-says-rogue-employees-may-have-stolen-customer-data/&#34;&gt;rogue employee&lt;/a&gt;. Or if you used a service like Signal to organize protests in a hostile country only to be arrested once your phone number is unmasked. Know the limitations of the services you choose and decide what features are important to you. It’s also important to know that privacy and security are sliding scales. This could be an entire blog post on its own. Think of passwords. Any password – even “password” - is technically more secure than no password at all. But a 16-character randomly-generated password is even more secure than “password.” Sometimes it’s okay to find a solution that offers a blend – less privacy in one area in exchange for more security in another, or vice versa. Once again, it all comes back to your threat model, your needs, and your resources.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;em&gt;Originally published on &lt;a href=&#34;https://web.archive.org/web/20210729190743/https://thenewoil.xyz/privsecanon.html&#34;&gt;The New Oil&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2021/02/23/security-privacy-anonymity/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2021/02/23/security-privacy-anonymity/</guid> </item> <item> <title>The Trouble With VPN and Privacy Review Sites</title> <author>Jonah Aragon</author> <category>News</category> <category>VPN</category> <description>&lt;h1 id=&#34;the-trouble-with-vpn-and-privacy-review-sites&#34;&gt;The Trouble With &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; and Privacy Review Sites&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&amp;quot;Unbiased Reviews&amp;quot; cover image&#34; src=&#34;../../../../assets/images/the-trouble-with-vpn-and-privacy-review-sites/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;There’s a massive problem in the privacy world. Websites, social media accounts, and other platforms are constantly popping up out of nowhere, telling you to buy &lt;em&gt;The Greatest Service Ever&lt;/em&gt; in order to solve all your privacy woes, whatever that may be. These websites often employ marketing teams to make sure their “reviews” are what you see first when you begin your research. Some of them are even operated by &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers themselves, operating under anonymous business entities to hide their bias, or doing it right out in the open, hoping you’ll mistake their advertising-filled press releases and blogs as insider knowledge of the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; space.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;When a seemingly “unbiased review” on a site is merely a paid advertisement in disguise, that website is breaking their reader’s trust. From a consumer’s point of view, affiliate marketing and other paid promotional techniques like this make it near impossible to know when a review is genuine or not.&lt;/p&gt;&lt;p&gt;This isn’t going to be a lengthy blog post on advertising being bad, far from it. In fact, many of the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers we recommend on &lt;em&gt;Privacy Guides&lt;/em&gt; engage in responsible advertising across various platforms. The key is transparency: Their advertisements should &lt;em&gt;look like advertisements&lt;/em&gt;, and nothing else.&lt;/p&gt;&lt;p&gt;I’m really looking to take the time here and identify “the bad” sites and resources that use these techniques to profit off a community just looking for reliable answers. Lots of sites like these will claim they’re acting in your best interest, but they’re just here to make money.&lt;/p&gt;&lt;p&gt;One common thing I’ll see on these sites is a ranked list of providers that are ostensibly the best ones to choose from. These sites have supposedly done all the work for you, so you can just click and go, assured you’re making the right choices.&lt;/p&gt;&lt;p&gt;So here’s my issue with ranking &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers: Let’s face it, &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers are all offering the same service, and they will either protect your information or they won’t. Ranking providers like this only serves as an easy way to guide users to a certain choice (in this case, the choice that will make the reviewers the most money).&lt;/p&gt;&lt;p&gt;Let’s look at one of these “review” sites for example, which will go unnamed for the purposes of this article. On their homepage they prominently list 10 providers as the “best” &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; services, in this order:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;NordVPN&lt;/li&gt;&lt;li&gt;Surfshark&lt;/li&gt;&lt;li&gt;ExpressVPN&lt;/li&gt;&lt;li&gt;PerfectPrivacy&lt;/li&gt;&lt;li&gt;IPVanish&lt;/li&gt;&lt;li&gt;Mullvad&lt;/li&gt;&lt;li&gt;CyberGhost&lt;/li&gt;&lt;li&gt;Trust.Zone&lt;/li&gt;&lt;li&gt;ibVPN&lt;/li&gt;&lt;li&gt;Private Internet Access&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;To their credit, this review site also helpfully included an advertising disclosure in their footer. On this fairly well hidden away page, they note that they participate in affiliate programs from 8 providers, as follows:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;NordVPN&lt;/li&gt;&lt;li&gt;SurfShark&lt;/li&gt;&lt;li&gt;ExpressVPN&lt;/li&gt;&lt;li&gt;Perfect-Privacy&lt;/li&gt;&lt;li&gt;IPVanish&lt;/li&gt;&lt;li&gt;CyberGhost&lt;/li&gt;&lt;li&gt;Trust.Zone&lt;/li&gt;&lt;li&gt;Private Internet Access&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;Hmm&lt;/em&gt;. Look familiar? Of the 73 providers this site had reviewed at the time of writing this article, &lt;strong&gt;all eight&lt;/strong&gt; of the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers paying this review site happened to make their top 10 recommendations. In fact, you’d have to scroll down to #6 before you found a provider that wouldn’t pay them, practically buried.&lt;/p&gt;&lt;p&gt;Furthermore, their list includes NordVPN, a company &lt;a href=&#34;https://techcrunch.com/2019/10/21/nordvpn-confirms-it-was-hacked/&#34;&gt;notable for not disclosing security breaches&lt;/a&gt; in a timely fashion, and ExpressVPN, a provider &lt;a href=&#34;https://www.goldenfrog.com/blog/some-providers-use-weak-1024-bit-keys-vyprvpn-explains-why-its-strong-keys-matter&#34;&gt;notable for using weak 1024-bit encryption keys&lt;/a&gt; to protect their users. By any objective standard, these providers do not deserve to be included in a top 10 recommendations list for securing anybody’s information. This review site in particular claims to have set criteria for their recommendations, but this just demonstrates that any criteria can be adjusted to fit any goal you may have.&lt;/p&gt;&lt;p&gt;If these sites truly wanted to be helpful, they would consolidate all the relevant information and present it to their users without making the choice for them. A provider is going to be better or worse for every user depending on their particular situation, and encouraging making an informed choice between options presented equally is far more beneficial to putting one over the other in a largely arbitrary fashion.&lt;/p&gt;&lt;p&gt;But that isn’t to say they should just throw all the providers in a big table and call it a day. Almost worse than the ranking scheme above is when sites provide out of context lists of providers, often just with pricing and a link. Sometimes they will link you to a full review (more on that in a bit), but for the most part these sites just expect you to follow their recommendations blindly.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Image of a review site with mostly affiliated recommendations&#34; src=&#34;../../../../assets/images/the-trouble-with-vpn-and-privacy-review-sites/image1.png&#34; title=&#34;Affiliate links and discounts galore! This is a different site than before, but look at the familiar faces we’re seeing…&#34; /&gt;&lt;/p&gt;&lt;p&gt;These read like advertisements, because they usually are. Once again we see the usual suspects — NordVPN, ExpressVPN… — paraded as the gold standard in the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; space, not out of any inherent value, but based on the value of their affiliate programs. To further this point, let’s take a look at how much each of the five providers above will pay you for a referral (on a one-month plan).&lt;/p&gt;&lt;ol&gt;&lt;li&gt;ExpressVPN: $13 for first month&lt;/li&gt;&lt;li&gt;NordVPN: $11.95 for first month&lt;/li&gt;&lt;li&gt;VPNArea: $4.95 for first month&lt;/li&gt;&lt;li&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;.ac: $2.90 for first month&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;em&gt;Unfortunately, Perfect Privacy would not share their commission rates publicly, but if anyone has any information on that I’d be happy to receive it. What I will say is that based on the information above, I would not be surprised if it fell right between ExpressVPN and NordVPN’s rates. Their one-month plan costs $12.99, so assuming a 100% match on the first month (the standard from NordVPN and ExpressVPN) that would add up quite nicely.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;Once again, we see a lineup of providers ordered in a way that &lt;em&gt;conveniently&lt;/em&gt; pays the most to the website owner. And therein lies the issue with affiliate programs. Once you begin receiving financial compensation &lt;em&gt;on a per-signup basis&lt;/em&gt;, you are now motivated to push the most users to the sites that pay more on a monthly basis, rather than the sites that will actually help the user.&lt;/p&gt;&lt;p&gt;Occasionally, these recommendations are coupled with a “review” that is supposedly independent and unbiased, but in reality are simply more marketing tools to persuade you towards their opinions. In most cases, these reviewers will simply copy the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider’s own press releases and even media, presenting their advertising as fact to their readers. These reviews are always hidden away as well, with main navigation links directing users towards the more affiliate-link-laden lists and tables that they’d much rather you browse. The true value of these review articles is the &lt;a href=&#34;https://www.pcmag.com/news/367640/how-a-vpn-review-site-dominated-google-search-with-a-scam&#34;&gt;Search Engine Optimization (SEO) advantage they bring&lt;/a&gt; in the rankings on Google, and not much more. More traffic = More clicks, at the expense of good, independent content and integrity.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Originally, this article contained a section about how ‘ThatOnePrivacySite’ was the last bastion of a hope in the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; review world. However, that has since sold out to ‘Safety Detectives’, a site guilty of using all the affiliate tricks mentioned above. Goes to show, eh?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;At &lt;a href=&#34;https://privacyguides.org/&#34;&gt;Privacy Guides&lt;/a&gt;, we’ve developed a set list of criteria, and we make that abundantly clear when you read our list of &lt;a href=&#34;https://privacyguides.org/vpn/&#34;&gt;recommended &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers&lt;/a&gt;. We also refrain from using affiliate links. As we’ve discussed, they are fundamentally flawed ways to market a service, and using them would break the trust our community has in our recommendations.&lt;/p&gt;&lt;p&gt;We do have a sponsorship program, but all of our finances are handled in an incredibly transparent fashion. As a non-profit organization, the funding we receive cannot be used for private profit, and our community can see both where we receive money from and how it is being spent thanks to &lt;a href=&#34;https://opencollective.com/privacyguides&#34;&gt;Open Collective.&lt;/a&gt; Additionally, the recommendations on our site are handled by an entirely separate team of editors and contributors than the administrative team such as myself that handles the sponsorships and finances. The editors have sole control over our recommendations and operate entirely independently and on a volunteer-basis to ensure the choices we make are for the benefit of the privacy community over one individual.&lt;/p&gt;&lt;p&gt;Ultimately, as a matter of policy our sponsors have no say over our recommendations, or whether they are recommended or a competitor is removed. We have given our community vast access to our website and internal workings to keep us in check and ensure we’re staying true to our word. This separation of management and editors is a strategy that has served the media industry well for decades, and makes all of our team and organization a more credible and trustworthy source of information.&lt;/p&gt;&lt;h2 id=&#34;summary&#34;&gt;Summary&lt;/h2&gt;&lt;p&gt;We have a lot of points we want to get across. The current landscape of privacy reviewers and “experts” weighing in on topics regarding the very companies that pay for their reviews is morally reprehensible, and just another way for big tech companies to collect all of our data more easily.&lt;/p&gt;&lt;p&gt;Review sites should make it abundantly clear when their reviews are paid for by the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; companies in any fashion, whether that be via affiliate programs or good old-fashioned sponsorships. This can’t be via a hidden-away disclosure in the footer or not published at all, but &lt;em&gt;clear&lt;/em&gt; and &lt;em&gt;close in proximity&lt;/em&gt; to the claims published on their site. &lt;strong&gt;Customers are not expecting or seeking out these disclosures&lt;/strong&gt; when they visit review sites, and can’t be expected to immediately discern whether you’re speaking from a place of unbiased fact, or from a place with the greatest financial incentive. Better yet, they should reconsider their entire business model. Our site is based solely on a community donation model that still keeps us sustained. It’s the more difficult way to build a site to be sure, actually working to gain the trust of a huge community, but the difference in quality and integrity is remarkable.&lt;/p&gt;&lt;p&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers should consider spending less money on paid reviews, and more money on securing and validating their infrastructure. Regular security audits are one fantastic way for companies to demonstrate their dedication to keeping their users secure. We strongly believe &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; services should consider our criteria, especially in regard to the ownership of their organization. Your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider should not be hiding away in Panama controlled by anonymous leadership. While you &lt;em&gt;as a user&lt;/em&gt; deserve privacy, transparency should be &lt;em&gt;required&lt;/em&gt; of providers if you are expected to trust them. I would not give my money to some anonymous overseas investor, why would I give all of my internet traffic to some anonymous overseas administrator?&lt;/p&gt;&lt;p&gt;Finally, when you’re choosing a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider, do your own research. &lt;a href=&#34;https://www.jonaharagon.com/posts/understanding-vpns/&#34;&gt;Understand what a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; actually does for you&lt;/a&gt;. &lt;a href=&#34;https://www.pcmag.com/article/371839/what-does-a-vpn-security-audit-really-prove&#34;&gt;Understand what it is a security audit proves&lt;/a&gt;, find out who owns and operates the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; service you want to use, and make sure their policies and technologies reflect your values. &lt;a href=&#34;https://www.jonaharagon.com/posts/choosing-a-vpn/&#34;&gt;Ultimately gathering the information yourself&lt;/a&gt; and making an informed decision is the only way to make sure your privacy is being respected.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/</guid> </item> <item> <title>Welcome to Privacy Guides</title> <author>Jonah Aragon</author> <author>Daniel Gray</author> <author>Freddy</author> <category>Announcements</category> <category>Privacy Guides</category> <description>&lt;h1 id=&#34;welcome-to-privacy-guides&#34;&gt;Welcome to Privacy Guides&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Privacy Guides cover image&#34; src=&#34;../../../../assets/brand/images/png/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides&lt;/small&gt;&lt;/p&gt;&lt;p&gt;We are excited to announce the launch of &lt;a href=&#34;https://www.privacyguides.org/&#34;&gt;Privacy Guides&lt;/a&gt; and &lt;a href=&#34;https://www.reddit.com/r/PrivacyGuides/&#34;&gt;r/PrivacyGuides&lt;/a&gt;, and welcome the privacy community to participate in our crowdsourced software recommendations and share tips and tricks for keeping your data safe online. Our goal is to be a central resource for privacy and security-related tips that are usable by anybody, and to carry on the trusted legacy of PrivacyTools.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;As we &lt;a href=&#34;https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/&#34;&gt;announced&lt;/a&gt; on the PrivacyTools blog in July, we made the decision to migrate off our former privacytools.io domain for various reasons, including an inability to contact the current domain holder for over a year and &lt;a href=&#34;http://www.thedarksideof.io/&#34;&gt;growing&lt;/a&gt; &lt;a href=&#34;https://fortune.com/2020/08/31/crypto-fraud-io-domain-chagos-islands-uk-colonialism-cryptocurrency/&#34;&gt;issues&lt;/a&gt; &lt;a href=&#34;https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1324&#34;&gt;with the .IO top-level domain&lt;/a&gt;. As attempts to regain ownership of the domain have proven fruitless, we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to &lt;a href=&#34;https://www.privacyguides.org/&#34;&gt;www.privacyguides.org&lt;/a&gt;, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc.&lt;/p&gt;&lt;p&gt;We chose the name Privacy Guides because it represents two things for us as an organization: An expansion beyond simple recommendation lists, and a goal of acting as the trusted guides to anyone newly learning about protecting their personal data.&lt;/p&gt;&lt;p&gt;As a name, it moves us past recommendations of various tools and focuses us more on the bigger picture. We want to provide more &lt;em&gt;education&lt;/em&gt; — rather than &lt;em&gt;direction&lt;/em&gt; — surrounding privacy-related topics. You can see the very beginnings of this work in our new page on &lt;a href=&#34;https://www.privacyguides.org/basics/threat-modeling/&#34;&gt;threat modeling&lt;/a&gt;, or our &lt;a href=&#34;https://www.privacyguides.org/vpn&#34;&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/a&gt; and &lt;a href=&#34;https://www.privacyguides.org/email&#34;&gt;Email Provider&lt;/a&gt; recommendations, but this is just the start of what we eventually hope to accomplish.&lt;/p&gt;&lt;h2 id=&#34;website-development&#34;&gt;Website Development&lt;/h2&gt;&lt;p&gt;Our project has always been community-oriented and open-sourced. The source code for PrivacyTools is currently archived at &lt;a href=&#34;https://code.privacyguides.dev/privacyguides/privacytools.io&#34;&gt;https://code.privacyguides.dev/privacyguides/privacytools.io&lt;/a&gt;. This repository will remain online as an archive of everything on PrivacyTools up to this transition.&lt;/p&gt;&lt;p&gt;The source code for our new website is available at &lt;a href=&#34;https://github.com/privacyguides/privacyguides.org&#34;&gt;https://github.com/privacyguides/privacyguides.org&lt;/a&gt;. All updates from PrivacyTools have been merged into this new repository, and this is where all future work will take place.&lt;/p&gt;&lt;h2 id=&#34;services&#34;&gt;Services&lt;/h2&gt;&lt;p&gt;PrivacyTools also runs a number of online services in use by many users. Some of these services are federated, namely Mastodon, Matrix, and PeerTube. Due to the technical nature of federation, it is impossible for us to change the domain name on these services, and because we cannot guarantee the future of the privacytools.io domain name we will be shutting down these services in the coming months.&lt;/p&gt;&lt;p&gt;We strongly urge users of these services to migrate to alternative providers in the near future. We hope that we will be able to provide enough time to make this as seamless of a transition as possible for our users.&lt;/p&gt;&lt;p&gt;At this time we do not plan on launching public Matrix, Mastodon, or PeerTube instances under the Privacy Guides domain. Any users affected by this transition can get in touch with &lt;a href=&#34;https://matrix.to/#/@jonah:aragon.sh&#34;&gt;@jonah:aragon.sh&lt;/a&gt; on Matrix if any assistance is needed.&lt;/p&gt;&lt;p&gt;Other services being operated by PrivacyTools currently will be discontinued. This includes Searx, WriteFreely, and GhostBin.&lt;/p&gt;&lt;p&gt;Our future direction for online services is uncertain, but will be a longer-term discussion within our community after our work is complete on this initial transition. We are very aware that whatever direction we move from here will have to be done in a way that is sustainable in the very long term.&lt;/p&gt;&lt;h2 id=&#34;rprivacyguides&#34;&gt;r/PrivacyGuides&lt;/h2&gt;&lt;p&gt;PrivacyTools has a sizable community on Reddit, but to ensure a unified image we have created a new Subreddit at &lt;a href=&#34;https://www.reddit.com/r/PrivacyGuides/&#34;&gt;r/PrivacyGuides&lt;/a&gt; that we encourage all Reddit users to join.&lt;/p&gt;&lt;p&gt;In the coming weeks our current plan is to wind down discussions on r/privacytoolsIO. We will be opening r/PrivacyGuides to lots of the discussions most people are used to shortly, but encouraging general “privacy news” or headline-type posts to be posted on &lt;a href=&#34;https://www.reddit.com/r/privacy/&#34;&gt;r/Privacy&lt;/a&gt; instead. In our eyes, r/Privacy is the “who/what/when/where” of the privacy community on Reddit, the best place to find the latest news and information; while r/PrivacyGuides is the “how”: a place to share and discuss tools, tips, tricks, and other advice. We think focusing on these strong points will serve to strengthen both communities, and we hope the good moderators of r/Privacy agree.&lt;/p&gt;&lt;h2 id=&#34;final-thoughts&#34;&gt;Final Thoughts&lt;/h2&gt;&lt;p&gt;The former active team at PrivacyTools universally agrees on this direction towards Privacy Guides, and will be working exclusively on Privacy Guides rather than any “PrivacyTools” related projects. We intend to redirect PriavcyTools to new Privacy Guides properties for as long as possible, and archive existing PrivacyTools work as a pre-transition snapshot.&lt;/p&gt;&lt;p&gt;Privacy Guides additionally welcomes back PrivacyTools’ former sysadmin &lt;a href=&#34;https://twitter.com/JonahAragon&#34;&gt;Jonah&lt;/a&gt;, who will be joining the project’s leadership team.&lt;/p&gt;&lt;p&gt;We are not accepting sponsorships or donations at this time, while we work out our financial plan. We will be in touch with existing sponsors on PrivacyTools’ OpenCollective to determine what the best way forward is soon.&lt;/p&gt;&lt;p&gt;We are all very excited about this new brand and direction, and hope to have your continued support through all of this. If you have any questions, concerns, or suggestions, please reach out to us. We are always happy to receive guidance and input from our community! ❤&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Privacy Guides&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;is a socially motivated website that provides information for protecting your data security and privacy.&lt;/em&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://www.reddit.com/r/privacyguides&#34;&gt;Join r/PrivacyGuides on Reddit&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://twitter.com/privacy_guides&#34;&gt;Follow @privacy_guides on Twitter&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://github.com/privacyguides/privacyguides.org&#34;&gt;Collaborate with us on GitHub&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://matrix.to/#/#privacyguides:aragon.sh&#34;&gt;Join our chat on Matrix&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/articles/2021/09/14/welcome-to-privacy-guides/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2021/09/14/welcome-to-privacy-guides/</guid> </item> <item> <title>We&#39;ve Joined the Open Collective Foundation 501(c)(3)</title> <author>Jonah Aragon</author> <category>Announcements</category> <category>Privacy Guides</category> <description>&lt;h1 id=&#34;weve-joined-the-open-collective-foundation-501c3&#34;&gt;We&#39;ve Joined the Open Collective Foundation 501(c)(3)&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Privacy Guides cover image&#34; src=&#34;../../../../assets/brand/images/png/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides&lt;/small&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org&#34;&gt;Privacy Guides&lt;/a&gt; provides knowledge, recommendations, and services to protect you against global mass surveillance programs and encourage self-control of your data online. Our website is free of advertisements and is not affiliated with any listed providers, because we believe that our ability to recommend solutions without receiving financial kickbacks is incredibly important in remaining unbiased.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;However, we have always accepted and solicited financial contributions from our community. Running this network of websites and services for free to the public is a time-consuming and costly endeavor. We do it because we believe it is the right thing to do, not because we are looking to make a profit. Any contributions have been either used to pay our expenses or saved in a reserve for expansion or times of need.&lt;/p&gt;&lt;p&gt;Today we are building on our transparency efforts by joining OpenCollective, a platform which will allow us to accept contributions and create expenses completely transparently. We are being sponsored by a fiscal host, the Open Collective Foundation, a nonprofit organization whose mission is to promote access to educational resources like ours.&lt;/p&gt;&lt;p&gt;The Open Collective Foundation is a 501(c)(3) organization that is collecting these contributions on our behalf. Because of this, contributions to Privacy Guides through OpenCollective are &lt;strong&gt;tax-deductible&lt;/strong&gt; for US taxpayers.&lt;/p&gt;&lt;p&gt;Your support of this project will help us keep our servers running and pay for other various expenses accrued by the team while developing this community platform. We do not operate Privacy Guides for personal profit, and all funds will be used to further our mission in one form or another.&lt;/p&gt;&lt;p&gt;Please consider contributing at &lt;a href=&#34;https://opencollective.com/privacyguides&#34;&gt;opencollective.com/privacyguides&lt;/a&gt; if you like what we do.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2019/10/31/weve-joined-the-open-collective-foundation/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2019/10/31/weve-joined-the-open-collective-foundation/</guid> </item> <item> <title>Why I Decided to Run a Tor Relay</title> <author>Sam Howell</author> <category>Opinion</category> <category>Self-Hosting</category> <category>Tor</category> <description>&lt;h1 id=&#34;why-i-decided-to-run-a-tor-relay&#34;&gt;Why I Decided to Run a Tor Relay&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Tor graphic&#34; src=&#34;../../../../assets/images/why-i-run-a-tor-relay/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Tor Project&lt;/small&gt;&lt;/p&gt;&lt;p&gt;It makes me smile when I come across someone struggling with the decision of whether to get a &lt;a href=&#34;https://www.privacyguides.org/vpn/&#34;&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/a&gt;. It makes me smile not because of the indecision and relative lack of knowledge, but because it wasn&#39;t so long ago I was in exactly the same position—perceiving VPNs to be some kind of extreme measure only the paranoid and the criminal resorted to. How wrong I was.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;In just a few months I&#39;ve come to realize that something like a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; is in fact a basic measure one might take in the effort to more freely roam the Internet—tainted as it is by censorship, surveillance and many other forms of state control. So where do you go from realizing these issues if you know them to be the threats that they are to democracy and freedom? You seek to &lt;em&gt;take control&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;You discover the &lt;a href=&#34;https://www.torproject.org/&#34;&gt;Tor Project&lt;/a&gt;—or rather, you learn more about a network that&#39;s been around for years and for years has suffered the type of reputation which only blinds everyday people from its incredible potential for positive change in numerous oppressed countries around the world.&lt;/p&gt;&lt;p&gt;At the time of writing there are over 6,300 Tor relays, and I like to think this number will continue to grow steadily. Each one—no matter its uptime, bandwidth or overall reputation, or whether it’s a Guard, Middle or Exit—each one is the direct result of an individual deciding to sacrifice money, time and effort for the cause of fighting for a freer Internet: enabling millions of users—journalists, bloggers, whistleblowers, activists and everyday people like you and I—to communicate anonymously, and therefore safely, wherever we are in the world.&lt;/p&gt;&lt;p&gt;Like many others, at first I was unsure about running my own relay. The usual doubts and questions arose: surely it&#39;s too difficult; I don’t know much about servers, and it’s surely expensive and beyond my skill-set to configure one as a Tor relay. But then I watched this talk (&lt;a href=&#34;https://invidious.privacyguides.net/watch?v=Wl5OQz0Ko8c&#34;&gt;Invidious Link&lt;/a&gt;, &lt;a href=&#34;https://youtube.com/watch?v=Wl5OQz0Ko8c&#34;&gt;YouTube Link&lt;/a&gt;) by the articulate, intelligent and passionate Tor Project developer Jacob Appelbaum (if you do nothing else today, watch it).&lt;/p&gt;&lt;p&gt;Jacob couldn’t have made a better case for direct action, requesting of the audience:&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;Raise your hand if you think anonymity is something that is good, and you think is a fundamental human right that we should all have...Now raise your hand if you want to do something about it...Now keep your hand up if you’re going to run a Tor relay...Everybody that put your hand down, why aren’t you running a Tor relay? You can do something about it right now.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;And this is when it struck me, as I hope it struck many others at that talk: Am I doing enough? Can I claim to take this subject seriously if I’m not willing to invest the effort to really &lt;em&gt;be a part&lt;/em&gt; of the solution? Not simply to donate money—which of course is still a great way to contribute—but to truly, technologically support the Tor network.&lt;/p&gt;&lt;p&gt;It struck me that I have enough money, time and access to the right information to run my own relay. So it begged the question: Why &lt;em&gt;wouldn’t&lt;/em&gt; I?&lt;/p&gt;&lt;p&gt;At the time of writing my relay has been flagged ‘valid’, ‘running’ and ‘fast’ and is on track to have relayed around 750GB by the end of the month. It feels good. It feels really good.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;em&gt;Sam is an elearning designer and privacy advocate interested in free (libre) software and how it can protect civil liberties. This article was &lt;a href=&#34;https://web.archive.org/web/20200508115203/https://samhowell.uk/dark/blog/blog-Tor_Relay.html&#34;&gt;originally published&lt;/a&gt; on my personal blog at &lt;a href=&#34;https://samhowell.uk&#34;&gt;samhowell.uk&lt;/a&gt;, on February 15th, 2019.&lt;/em&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2020/05/04/why-i-run-a-tor-relay/</link> <pubDate>Thu, 23 Jan 2025 19:08:51 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2020/05/04/why-i-run-a-tor-relay/</guid> </item> <item> <title>Privacy Guides Hires Three Staff Members</title> <author>Niek de Wilde</author> <category>Announcements</category> <category>Privacy Guides</category> <description>&lt;h1 id=&#34;privacy-guides-hires-three-staff-members&#34;&gt;Privacy Guides Hires Three Staff Members&lt;/h1&gt;&lt;p&gt;At Privacy Guides, we are always looking for ways to be more effective at our mission of promoting privacy and security for everyone. To help us grow, reach a broader audience, and provide more high quality educational resources, we are thrilled to announce the hiring of three talented individuals to our team! Each of them brings a strong passion to their respective roles, and we are excited about working with them.&lt;!-- more --&gt;&lt;/p&gt;&lt;h2 id=&#34;em-journalist&#34;&gt;Em – Journalist&lt;/h2&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;&#34; src=&#34;https://forum-cdn.privacyguides.net/user_avatar/discuss.privacyguides.net/ematprivacyguides/288/8211_2.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;We’re excited to welcome Em (she/her), our new journalist, who will play an important role in taking our &lt;a href=&#34;https://www.privacyguides.org/articles/&#34;&gt;articles&lt;/a&gt; to the next level. She will be focusing on creating in-depth, interesting posts that explore the most important topics in the world of online privacy, security, and digital rights. Em will also conduct interviews with experts in the industry, analyze reports and studies, and produce investigative news stories to keep our readers informed.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Em is a privacy advocate and public‑interest technologist who has been fervently defending privacy rights online (and offline) since 2018. Her work focuses on raising awareness and informing the public and organizations on data privacy tools, practices, and regulations. She is a passionate writer and thorough investigator, continuously working on ways to improve adoption of better privacy practices, and regularly creating educational material to make protective tools accessible to the groups who need them most.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;Em is also a human rights activist who deeply values inclusivity, diversity, accessibility, and software for the public good. In her free time, you can find Em on Mastodon sharing privacy tips or boosting photos of cats and moss.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@Em0nM4stodon&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20.94 14c-.28 1.41-2.44 2.96-4.97 3.26-1.31.15-2.6.3-3.97.24-2.25-.11-4-.54-4-.54v.62c.32 2.22 2.22 2.35 4.03 2.42 1.82.05 3.44-.46 3.44-.46l.08 1.65s-1.28.68-3.55.81c-1.25.07-2.81-.03-4.62-.5-3.92-1.05-4.6-5.24-4.7-9.5l-.01-3.43c0-4.34 2.83-5.61 2.83-5.61C6.95 2.3 9.41 2 11.97 2h.06c2.56 0 5.02.3 6.47.96 0 0 2.83 1.27 2.83 5.61 0 0 .04 3.21-.39 5.43M18 8.91c0-1.08-.3-1.91-.85-2.56-.56-.63-1.3-.96-2.23-.96-1.06 0-1.87.41-2.42 1.23l-.5.88-.5-.88c-.56-.82-1.36-1.23-2.43-1.23-.92 0-1.66.33-2.23.96C6.29 7 6 7.83 6 8.91v5.26h2.1V9.06c0-1.06.45-1.62 1.36-1.62 1 0 1.5.65 1.5 1.93v2.79h2.07V9.37c0-1.28.5-1.93 1.51-1.93.9 0 1.35.56 1.35 1.62v5.11H18z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Follow Em at @Em0nM4stodon@infosec.exchange&lt;/a&gt;&lt;/p&gt;&lt;h2 id=&#34;jordan-content-producer&#34;&gt;Jordan – Content Producer&lt;/h2&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;&#34; src=&#34;https://forum-cdn.privacyguides.net/user_avatar/discuss.privacyguides.net/jordan/288/7793_2.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;We also welcome Jordan Warne (they/them), our new content producer who will manage our channels on various video platforms! Jordan has a strong background in video production and content strategy, and we’re confident that they will help us expand our reach and connect with a broader audience. Through informative, easy-to-understand videos, Jordan will simplify complex privacy topics and keep our community engaged. Expect a significantly larger presence on our &lt;a href=&#34;https://neat.tube/c/privacyguides/videos&#34;&gt;PeerTube&lt;/a&gt; and &lt;a href=&#34;https://www.youtube.com/@privacyguides&#34;&gt;YouTube&lt;/a&gt; channels in the coming months!&lt;/p&gt;&lt;p&gt;&lt;em&gt;Jordan is a passionate creative with an education in both cybersecurity and photography. Having completed a Diploma of Digital Imaging at Billy Blue College of Design, Jordan is equipped with the skills and experience to take Privacy Guides&#39; video content to the next level. Having recently completed a Diploma of Information Technology (Cybersecurity) Jordan has the unique skillset to simplify complex cybersecurity topics and turn them into engaging and approachable content.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;Outside producing high-quality videos, Jordan enjoys exploring the Australian bush, capturing intricate details of its flora and fauna through photography.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://social.lol/@jw&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20.94 14c-.28 1.41-2.44 2.96-4.97 3.26-1.31.15-2.6.3-3.97.24-2.25-.11-4-.54-4-.54v.62c.32 2.22 2.22 2.35 4.03 2.42 1.82.05 3.44-.46 3.44-.46l.08 1.65s-1.28.68-3.55.81c-1.25.07-2.81-.03-4.62-.5-3.92-1.05-4.6-5.24-4.7-9.5l-.01-3.43c0-4.34 2.83-5.61 2.83-5.61C6.95 2.3 9.41 2 11.97 2h.06c2.56 0 5.02.3 6.47.96 0 0 2.83 1.27 2.83 5.61 0 0 .04 3.21-.39 5.43M18 8.91c0-1.08-.3-1.91-.85-2.56-.56-.63-1.3-.96-2.23-.96-1.06 0-1.87.41-2.42 1.23l-.5.88-.5-.88c-.56-.82-1.36-1.23-2.43-1.23-.92 0-1.66.33-2.23.96C6.29 7 6 7.83 6 8.91v5.26h2.1V9.06c0-1.06.45-1.62 1.36-1.62 1 0 1.5.65 1.5 1.93v2.79h2.07V9.37c0-1.28.5-1.93 1.51-1.93.9 0 1.35.56 1.35 1.62v5.11H18z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Follow Jordan at @jw@social.lol&lt;/a&gt;&lt;/p&gt;&lt;h2 id=&#34;kevin-intern&#34;&gt;Kevin – Intern&lt;/h2&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;&#34; src=&#34;https://forum-cdn.privacyguides.net/user_avatar/discuss.privacyguides.net/kevpham/288/8198_2.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;Last but not least, we are excited to start working with Kevin Pham (he/him), our new intern focused on community &amp;amp; news, who will support both Em and Jordan in their roles while also engaging with our community across all platforms. His enthusiasm for digital privacy and his commitment to helping others make him a perfect fit for our team. He will help with managing our community, and interact with our growing online community to ensure that everyone has a voice. Kevin’s passion and eagerness to learn will no doubt contribute greatly to our mission.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Kevin is a senior at Tufts University studying Political Science and Science &amp;amp; Technology Studies. Originally from Florida, he is now freezing up in the greater Boston area. Kevin is passionate about usable security and privacy for vulnerable populations. He has previously worked with Freedom of the Press Foundation&#39;s Digital Security Team and Cornell Tech&#39;s Clinic to End Tech Abuse to help journalists and domestic violence survivors alike.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;em&gt;Besides doomscrolling on social media, he loves cooking new recipes, reading philosophy essays, and perpetuating his caffeine addiction with Vietnamese coffee. Please feel free to reach out to him to discuss anything regarding best operational security practices and threat modeling...or just say hi!&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://mastodon.social/@kevpham&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20.94 14c-.28 1.41-2.44 2.96-4.97 3.26-1.31.15-2.6.3-3.97.24-2.25-.11-4-.54-4-.54v.62c.32 2.22 2.22 2.35 4.03 2.42 1.82.05 3.44-.46 3.44-.46l.08 1.65s-1.28.68-3.55.81c-1.25.07-2.81-.03-4.62-.5-3.92-1.05-4.6-5.24-4.7-9.5l-.01-3.43c0-4.34 2.83-5.61 2.83-5.61C6.95 2.3 9.41 2 11.97 2h.06c2.56 0 5.02.3 6.47.96 0 0 2.83 1.27 2.83 5.61 0 0 .04 3.21-.39 5.43M18 8.91c0-1.08-.3-1.91-.85-2.56-.56-.63-1.3-.96-2.23-.96-1.06 0-1.87.41-2.42 1.23l-.5.88-.5-.88c-.56-.82-1.36-1.23-2.43-1.23-.92 0-1.66.33-2.23.96C6.29 7 6 7.83 6 8.91v5.26h2.1V9.06c0-1.06.45-1.62 1.36-1.62 1 0 1.5.65 1.5 1.93v2.79h2.07V9.37c0-1.28.5-1.93 1.51-1.93.9 0 1.35.56 1.35 1.62v5.11H18z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Follow Kevin at @kevpham@mastodon.social&lt;/a&gt;&lt;/p&gt;&lt;h2 id=&#34;what-this-means-for-privacy-guides&#34;&gt;What This Means for Privacy Guides&lt;/h2&gt;&lt;p&gt;The expansion of the Privacy Guides team continues our commitment to provide the best quality resources and information on privacy and security. With Em’s investigative work, Jordan’s video content, and Kevin’s hands-on support, we look forward to communicating easy to understand and factual information with a broader audience.&lt;/p&gt;&lt;p&gt;We’re excited to see how these talented people will help Privacy Guides continue to grow, and we look forward to the amazing work they will contribute in the coming months.&lt;/p&gt;&lt;p&gt;Thank you for being a part of our community, and stay tuned for the exciting new content and updates that will be coming your way soon!Welcome aboard, Em, Jordan, and Kevin! Let’s make privacy accessible for everyone. 🚀&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://mastodon.neat.computer/@privacyguides&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20.94 14c-.28 1.41-2.44 2.96-4.97 3.26-1.31.15-2.6.3-3.97.24-2.25-.11-4-.54-4-.54v.62c.32 2.22 2.22 2.35 4.03 2.42 1.82.05 3.44-.46 3.44-.46l.08 1.65s-1.28.68-3.55.81c-1.25.07-2.81-.03-4.62-.5-3.92-1.05-4.6-5.24-4.7-9.5l-.01-3.43c0-4.34 2.83-5.61 2.83-5.61C6.95 2.3 9.41 2 11.97 2h.06c2.56 0 5.02.3 6.47.96 0 0 2.83 1.27 2.83 5.61 0 0 .04 3.21-.39 5.43M18 8.91c0-1.08-.3-1.91-.85-2.56-.56-.63-1.3-.96-2.23-.96-1.06 0-1.87.41-2.42 1.23l-.5.88-.5-.88c-.56-.82-1.36-1.23-2.43-1.23-.92 0-1.66.33-2.23.96C6.29 7 6 7.83 6 8.91v5.26h2.1V9.06c0-1.06.45-1.62 1.36-1.62 1 0 1.5.65 1.5 1.93v2.79h2.07V9.37c0-1.28.5-1.93 1.51-1.93.9 0 1.35.56 1.35 1.62v5.11H18z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Follow Privacy Guides at @privacyguides@neat.computer&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/@privacyguides&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m10 15 5.19-3L10 9zm11.56-7.83c.13.47.22 1.1.28 1.9.07.8.1 1.49.1 2.09L22 12c0 2.19-.16 3.8-.44 4.83-.25.9-.83 1.48-1.73 1.73-.47.13-1.33.22-2.65.28-1.3.07-2.49.1-3.59.1L12 19c-4.19 0-6.8-.16-7.83-.44-.9-.25-1.48-.83-1.73-1.73-.13-.47-.22-1.1-.28-1.9-.07-.8-.1-1.49-.1-2.09L2 12c0-2.19.16-3.8.44-4.83.25-.9.83-1.48 1.73-1.73.47-.13 1.33-.22 2.65-.28 1.3-.07 2.49-.1 3.59-.1L12 5c4.19 0 6.8.16 7.83.44.9.25 1.48.83 1.73 1.73&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Subscribe to Privacy Guides on YouTube&lt;/a&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/01/17/privacy-guides-hires-three-staff-members/</link> <pubDate>Fri, 17 Jan 2025 12:52:52 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/01/17/privacy-guides-hires-three-staff-members/</guid> </item> <item> <title>State of the Web App: Current Woes and Promising Futures</title> <author>fria</author> <category>IWA</category> <category>Opinion</category> <category>PWA</category> <category>Web</category> <description>&lt;h1 id=&#34;state-of-the-web-app-current-woes-and-promising-futures&#34;&gt;State of the Web App: Current Woes and Promising Futures&lt;/h1&gt;&lt;p&gt;The concept of a &lt;a href=&#34;https://developer.mozilla.org/en-US/docs/Web/Progressive_web_apps&#34;&gt;progressive web app&lt;/a&gt; is enticing: an application using web technologies that is inherently cross platform (since it runs in a browser) and acts like a native app, even functioning offline. Support for PWAs in traditionally locked-down platforms like iOS means that PWAs can give users the freedom to install apps without having to go through Apple’s App Store. But there are problems with web content that PWAs haven&#39;t solved.&lt;!-- more --&gt;&lt;/p&gt;&lt;h2 id=&#34;current-web-based-apps&#34;&gt;Current Web-Based Apps&lt;/h2&gt;&lt;p&gt;Attempts at similar things have been made before, the most infamous of which is &lt;a href=&#34;https://www.electronjs.org&#34;&gt;Electron&lt;/a&gt;. Electron is a software framework that allows developers to easily create cross-platform apps by essentially bundling an entire Chromium browser in with the app. This approach has its &lt;a href=&#34;https://usa.kaspersky.com/blog/electron-framework-security-issues/28952/?srsltid=AfmBOor_UcYY-84soHz5K2ULTmhlX44-DsIfJp_StotBrusD63MweSGO&#34;&gt;drawbacks&lt;/a&gt;, though. Browsers have huge &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt; so it&#39;s important to keep them updated with the latest security fixes, but many Electron apps ship outdated versions, leaving those apps vulnerable. Each Electron app has its own version of Chromium with its own &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt;, amounting to a performance and security nightmare. In contrast, PWAs use the browser that you already have installed, so as long as you keep it updated, all your apps will have the latest security fixes.&lt;/p&gt;&lt;p&gt;So why isn&#39;t every Electron app shipping as a &lt;abbr title=&#34;Progressive Web App&#34;&gt;PWA&lt;/abbr&gt;? The answer is an age-old problem with web content: the fact that you have to trust the server fully. You make an HTML GET request and you&#39;re served the content (i.e., the site&#39;s HTML, CSS, and JavaScript), but if the server is compromised, you&#39;ll be served a compromised website. You also need to rely on the security of &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; name resolution and the &lt;a href=&#34;https://www.digicert.com/blog/what-is-a-certificate-authority&#34;&gt;certificate authority&lt;/a&gt; system. This is a huge problem for security-sensitive applications like messengers. An attacker that gains access to their server—even just temporarily—could distribute compromised clients to millions of people, potentially breaking &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; or executing a host of other malicious actions.&lt;/p&gt;&lt;h2 id=&#34;improving-web-apps&#34;&gt;Improving Web Apps&lt;/h2&gt;&lt;p&gt;A typical native app is downloaded onto your computer from some kind of trusted place like an app store and only receives updates when the developers push them out. Additionally, there&#39;s usually a process of checks and verification before that happens, like Apple&#39;s &lt;a href=&#34;https://developer.apple.com/distribute/app-review&#34;&gt;App Review&lt;/a&gt; and the Google Play &lt;a href=&#34;https://support.google.com/googleplay/android-developer/answer/9859455&#34;&gt;App Review&lt;/a&gt; process. In contrast to PWAs, with which the threat of an attacker with server access constantly looms, it&#39;s much more difficult to target a particular person. In other words, a malicious app update is much less likely to escape scrutiny than a highly targeted attack via compromised servers.&lt;/p&gt;&lt;p&gt;Isolated Web Apps (IWAs) build on the work done on PWAs and &lt;a href=&#34;https://github.com/WICG/webpackage&#34;&gt;Web Packaging&lt;/a&gt;. They are a specification that allows web content to be distributed offline outside of a browser, much like a traditional app. It can be signed just like a regular app too, allowing you to verify that it came from the proper place and hasn&#39;t been modified. You could install an IWA from your favorite app store just like any other app and have the same security assurances. This would be incredibly useful in allowing for cross-platform &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; web apps that don&#39;t need to trust a server every time you use them.&lt;/p&gt;&lt;p&gt;Google &lt;a href=&#34;https://chromeos.dev/en/web/isolated-web-apps&#34;&gt;distinguishes&lt;/a&gt; between the drive by web, PWAs, and IWAs. The drive by web requires more conservative access to the system as the most accessible and is therefore least trusted. PWAs are a bit more trusted and can integrate a bit more deeply into the system as a result. IWAs are the most trusted and, as such, can have deeper access into the system and more powerful capabilities.&lt;/p&gt;&lt;figure&gt;&lt;p&gt;&lt;img alt=&#34;Diagram showing the drive by web, a PWA, and then a dotted line separating them from IWAs&#34; src=&#34;../../../../assets/images/pwa-vs-iwa/iwa-diagram.png&#34; /&gt; &lt;/p&gt;&lt;figcaption&gt;source: &lt;a href=&#34;https://chromeos.dev/en/web/isolated-web-apps&#34;&gt;chromeos.dev&lt;/a&gt;&lt;/figcaption&gt;&lt;/figure&gt;&lt;p&gt;This higher security assurance from isolated and signed web applications and the inherently more trusted nature of a natively installed app will allow for IWAs to safely access APIs which wouldn&#39;t be safe to allow normal websites to access, like &lt;a href=&#34;https://github.com/WICG/direct-sockets/blob/main/docs/explainer.md&#34;&gt;Direct Sockets&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;IWAs use a totally new &lt;a href=&#34;https://github.com/WICG/isolated-web-apps/blob/main/Scheme.md&#34;&gt;URL scheme&lt;/a&gt; since they&#39;re not relying on &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; certificate authorities or &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt;. They&#39;re totally isolated from each other and the web using enforced Content Security Policy and Cross-Origin Isolation, hence the name.&lt;/p&gt;&lt;h2 id=&#34;issues&#34;&gt;Issues&lt;/h2&gt;&lt;p&gt;The &lt;a href=&#34;https://www.w3.org&#34;&gt;Worldwide Web Consortium&lt;/a&gt; currently has an open issue on their GitHub for IWAs with some interesting discussions that are worth checking out. There are some &lt;a href=&#34;https://github.com/w3ctag/design-reviews/issues/842#issuecomment-1989631915&#34;&gt;criticisms&lt;/a&gt; of IWAs, at least in their current form. A big point of contention is giving IWAs access to more powerful features like raw &lt;abbr title=&#34;Transmission Control Protocol&#34;&gt;TCP&lt;/abbr&gt; and &lt;abbr title=&#34;User Datagram Protocol&#34;&gt;UDP&lt;/abbr&gt; socket access, similar to what a natively installed app might be able to do, which Martin Thomson at Mozilla argues is dangerous even with user consent. Martin wrote a nice in-depth &lt;a href=&#34;https://lowentropy.net/posts/bundles&#34;&gt;article&lt;/a&gt; on bundling web content that&#39;s worth checking out on their website. It&#39;ll be a long process of iterating on the design before a version of this idea that&#39;s secure and available across browsers.&lt;/p&gt;&lt;p&gt;Right now, Chrome ships the feature &lt;a href=&#34;https://chromestatus.com/feature/5146307550248960&#34;&gt;enabled by default&lt;/a&gt; but only on ChromeOS for admin-controlled machines and select development partners of Google. Safari and Firefox haven&#39;t implemented the feature, with &lt;a href=&#34;https://github.com/mozilla/standards-positions/issues/799#issuecomment-2342084330&#34;&gt;Firefox&lt;/a&gt; taking a stance against it. Perhaps in its trial run, the technology will prove its potential, or maybe IWAs aren&#39;t the best solution after all and another attempt at improving web apps will come along. I&#39;ll be watching with great interest either way.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2024/11/30/pwa-vs-iwa/</link> <pubDate>Thu, 21 Nov 2024 19:38:31 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2024/11/30/pwa-vs-iwa/</guid> </item> <item> <title>Where are all the Multi-Party Relays?</title> <author>fria</author> <category>MPR</category> <category>Opinion</category> <category>VPN</category> <description>&lt;h1 id=&#34;where-are-all-the-multi-party-relays&#34;&gt;Where are all the Multi-Party Relays?&lt;/h1&gt;&lt;p&gt;Multi-Party Relays (MPRs) are a technology that aims to provide better privacy protections than VPNs do. MPRs showed a lot of promise when they first emerged, but years later there are fewer options than ever. What happened?&lt;!-- more --&gt;&lt;/p&gt;&lt;h2 id=&#34;traditional-vpns&#34;&gt;Traditional VPNs&lt;/h2&gt;&lt;p&gt;The original purpose of Virtual Private Networks (VPNs) was to access a network privately when you&#39;re not physically there, with encryption in between, so you can securely access your files or manage your network from wherever you are. It extends the security you&#39;d expect from being physically at your LAN to anywhere you are.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/en/basics/vpn-overview&#34;&gt;Commercial VPNs&lt;/a&gt; like Proton &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; use this technology to allow you to connect to &lt;em&gt;their&lt;/em&gt; network, and then connect to your destination. This keeps sites and services you connect to from knowing your real &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address and using it as a metric to track you. But there&#39;s a problem here: you now need to fully trust your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider in the same way you need to trust your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; with all your internet traffic. This &#34;shifting trust&#34; problem has haunted VPNs for as long as they&#39;ve been marketed as a privacy product. It&#39;s clear that a better solution is needed.&lt;/p&gt;&lt;h2 id=&#34;the-alternative-tor&#34;&gt;The Alternative: Tor&lt;/h2&gt;&lt;p&gt;Mix networks like &lt;a href=&#34;https://www.privacyguides.org/en/advanced/tor-overview&#34;&gt;Tor&lt;/a&gt; have solved this problem by decoupling the sender from the destination. No relay along the path has all the information: the entry (or &lt;em&gt;guard&lt;/em&gt;) relay knows who you are but not where you&#39;re going, the middle relay knows the other two relays, and the exit relay knows the destination but not the sender. There&#39;s also separate encryption between each relay.&lt;/p&gt;&lt;figure&gt;&lt;p&gt;&lt;img alt=&#34;Tor path showing your device connecting to an entry node, middle node, and exit node before reaching the destination website&#34; src=&#34;https://www.privacyguides.org/en/assets/img/how-tor-works/tor-path.svg#only-light&#34; /&gt; &lt;img alt=&#34;Tor path showing your device connecting to an entry node, middle node, and exit node before reaching the destination website&#34; src=&#34;https://www.privacyguides.org/en/assets/img/how-tor-works/tor-path-dark.svg#only-dark&#34; /&gt; &lt;/p&gt;&lt;figcaption&gt;Tor circuit pathway&lt;/figcaption&gt;&lt;/figure&gt;&lt;p&gt;Tor provides great privacy properties, but the relays are run by volunteers, so they can be extremely slow and unreliable. Anyone who&#39;s tried to download a file while connected to Tor knows how painful it can be. Even normal browsing can be slow, with potentially minutes collectively wasted on loading times in any given browsing session. Tor is hands down the most private way to &lt;a href=&#34;https://www.privacyguides.org/en/tor&#34;&gt;browse the web&lt;/a&gt;, and if your threat model calls for it there is no substitute. But for &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; users who want better privacy, an obvious next step is a paid solution where you have access to fast and reliable servers like on a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, and &lt;em&gt;also&lt;/em&gt; separation between who you are and what you&#39;re connecting to.&lt;/p&gt;&lt;h2 id=&#34;a-solution-multi-party-relays&#34;&gt;A Solution: Multi-Party Relays&lt;/h2&gt;&lt;p&gt;Enter Multi-Party Relays. Services like iCloud Private Relay and (the unfortunately discontinued) INVISV Multi-Party Relay take inspiration from mix networks like Tor and separate the sender from the destination using two relays operated by different parties, as the name implies. There&#39;s separate encryption between each relay as well. MPRs &lt;em&gt;do&lt;/em&gt; require you to trust that the two parties don&#39;t collaborate to correlate your traffic, so keep that in mind.&lt;/p&gt;&lt;p&gt;Typically, the first relay is controlled by the provider (either Apple or INVISV in the previous examples), and the second relay is controlled by another company such as Fastly or Cloudflare. These are big names, so you won&#39;t need to worry about reliability.&lt;/p&gt;&lt;figure&gt;&lt;p&gt;&lt;img alt=&#34;A diagram showing how your IP address is known to your ISP and Apple, and the server you&#39;re accessing is known to Cloudflare and the destination, in the case of iCloud Private Relay&#34; src=&#34;../../../../assets/images/where-are-all-the-mprs/icloud-private-relay.png&#34; /&gt; &lt;/p&gt;&lt;figcaption&gt;source: &lt;a href=&#34;https://blog.cloudflare.com/icloud-private-relay/&#34;&gt;blog.cloudflare.com&lt;/a&gt;&lt;/figcaption&gt;&lt;/figure&gt;&lt;p&gt;They also provide &lt;em&gt;speed&lt;/em&gt;. Private Relay uses the &lt;abbr title=&#34;A network protocol based on UDP, but aiming to combine the speed of UDP with the reliability of TCP.&#34;&gt;QUIC&lt;/abbr&gt; protocol and as a result it&#39;s lightning fast. You wouldn&#39;t even know you were connecting to two servers in between your cat videos. The reliability is so good that I forget I even have it on. It even integrates with Safari and gives you a different &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address for different websites, similar to Tor&#39;s stream isolation.&lt;/p&gt;&lt;p&gt;So why haven&#39;t MPRs taken off? INVISV&#39;s Pretty Good Phone Privacy service never seemed to make it out of &lt;a href=&#34;https://invisv.com/pgpp/#pgpp-release-notes&#34;&gt;beta&lt;/a&gt;. INVISV &lt;a href=&#34;https://invisv.com/articles/vivaldi-privacy-guard&#34;&gt;partnered&lt;/a&gt; with Vivaldi, but I can&#39;t seem to find any mention of it in the Vivaldi settings or on their website outside of the original &lt;a href=&#34;https://vivaldi.com/blog/desktop/privacy-guard-your-privacy-matters-vivaldi-browser-snapshot-3319-12/&#34;&gt;announcement&lt;/a&gt;. INVISV ultimately &lt;a href=&#34;https://invisv.com/articles/service_shutdown.html&#34;&gt;shut down&lt;/a&gt; their service back in June. I hope to see more from them in the future because they were providing something that currently isn&#39;t possible to get anymore on Android.&lt;/p&gt;&lt;p&gt;That leaves &lt;a href=&#34;https://support.apple.com/en-us/102602&#34;&gt;iCloud Private Relay&lt;/a&gt; as the only commercial offering that I&#39;m aware of, but it&#39;s limited to Apple devices only. Great for Apple users, but everyone else is left high and dry. As is Apple&#39;s way, they didn&#39;t want any extra inconvenience from using their service, so they restrict you to your real country and timezone. You don&#39;t have the same freedom to choose a server wherever in the world you want like a &lt;a href=&#34;https://www.privacyguides.org/en/vpn&#34;&gt;traditional &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; service&lt;/a&gt; would allow.&lt;/p&gt;&lt;p&gt;There is one more honorary mention: &lt;a href=&#34;https://blog.cloudflare.com/stronger-than-a-promise-proving-oblivious-http-privacy-properties&#34;&gt;OHTTP&lt;/a&gt;. It&#39;s a new protocol with a design based on the same principles as those of MPRs: two servers, a relay and a gateway, that decouple the sender from the destination. It&#39;s already seeing use by large companies to maintain user privacy for things like Google&#39;s Safe Browsing and Apple&#39;s new Safari Highlights feature. Unfortunately, it&#39;s not quite comparable to MPRs. According to Cloudflare:&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;OHTTP is not a general purpose proxy protocol: it&#39;s fit for purpose, aimed at transactional interactions between clients and servers (such as app-level APIs).&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;So it can&#39;t cover all the traffic on your device. Still, it&#39;s a promising protocol and I hope it becomes more widespread.&lt;/p&gt;&lt;p&gt;It really is a shame to see such a promising technology go so underutilized. Perhaps &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; companies could make their own MPR product and fill the gap in the market. Only time will tell.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2024/11/17/where-are-all-the-mprs/</link> <pubDate>Wed, 13 Nov 2024 20:11:32 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2024/11/17/where-are-all-the-mprs/</guid> </item> </channel></rss>