10 Low Tech Ways To Protect Your Privacy Online


Despite the seemingly endless hack attacks, and a recent Pew study showing, that Americans feel powerless to protect themselves against intrusions on their online privacy, few Americans do much in the way of adopting privacy enhancing measures.

One privacy advocate has some advice. “Resistance is not futile if you are not aiming for 100 percent perfection,” says Nico Sell, co-founder of encrypted messaging service Wickr and organizer of hacker conference Def Con. Here are ten low-tech tips to reduce your digital footprint and exposure.

1) Self Censor: Search

The problem: Search engines, such as Google have built their business models on selling keywords, from user searches to advertisers, so searches are never private.

The solution: Do not ask Google anything you would not be comfortable sharing publicly. By self-censoring, you limit the information Google can sell advertisers. For highly sensitive searches, such as health queries, go offline and ask your doctor. Avoid searching on Google altogether, says Adi Kamdar, an activist with the non-profit Electronic Frontier Foundation.

“You could also use search tools that don’t collect data about you, such as DuckDuckGo.” Looking for an alternative to Gmail? Protonmail is a free service offering end-to-end encryption so all your info is converted into code and protected from intruders, from when you hit send to when the email is read. It cannot access your emails, sell your data to advertisers, or turn emails over to the government.

2) Mess with the System: Your Data

The problem: Data brokers are building a digital profile on you to sell you targeted ads.

The solution: Send mixed messages to search engines and the data brokers who harvest information from those searches. For example, when you pull up Google Maps to find the nearest hipster coffee shop, search for something out of character. “I often do searches for chainsaws, I also put into Google Maps wrong addresses just to gum up the system,” says Sell. Limit the amount of personal information you share online including birthdays, phone numbers, and addresses. If your birthday is already on Facebook, which Sell considers “a major breach of privacy,” make up a fake birthday and spread it around to make it harder for thieves to steal your identity.

3) Eye Spy: Cameras

The problem: Cameras embedded in phones, tablets, smart TVs and security systems can be hijacked by hackers and turned into spy-cams (and the footage used for blackmail). “A kid could turn that on in half an hour; it’s a well-known extortion technique,” says Sell.

The solution: Cover all your inner-facing cameras with electrical tape or a sticker, easily removable for when you want to snap a picture or FaceTime. “It’s an easy way to prevent this from happening, and also a nice conversation starter to talk to people about personal privacy from the government, hackers, etc.,” says Kamdar.

What about Dropcam or other cloud-connected cameras? “Oh my god, please don’t do that,” says Sell, adding, “If you must, unplug it when you aren’t using it.”

4) Do Not Track: Phones

The problem: Cell phones are connected to carrier networks. Carrier networks collect detailed up-to-the-minute records of your location, so you can make and receive calls, texts, and emails.

The solution: When you not not making calls, Sell suggests keeping your phone in a Faraday Cage, a metallic box that blocks electricity and electrostatic forces. Here is a low-tech low-cost option: Make your own by wrapping your cell phone in foil and sealing it in a plastic bag. If you think that is one step too far, Kamdar suggests simply being smart about how much information you give away, “Be aware of the fact that your smartphone is a tracking device; not only is Verizon getting my location information, but I have location services enabled on Google, Facebook, and probably other apps,” says Kamdar. Many applications actively monitor users’ locations, sending that information back to their creators, who are building business models on selling your data. Kamdar suggests to, “Be mindful about what you install and when you use it. Every month or two, take a look at the apps on your phone and uninstall the ones you aren’t really using.”

5) The Hackers Are Listening

The problem: Hackers can hijack the mic in your smartphone and turn it into a listening device. “We teach the kids to eavesdrop on a phone call with $500 and a backpack,” says Sell.

The solution: When you not listening to music, plug your headphone jack. A low-tech solution is to cut off the tip of old headphones, and insert the pin-shaped plug into the device.

6) Wifi Is Hostile: Avoid Unknown Public Networks

The problem: People think they are safe when logging on to a password-protected network, but public wifi is easily hacked.

The solution: Travelers beware! Only connect to public wifi if you know it is secure. For an added layer of security when connecting to wifi in a hotel, restaurant, cafe or airport, Kamdar has this advice: “Use things like Virtual Public Networks and be aware of what connections are encrypted and what are not.” VPN’s encrypt your Internet traffic, helping to prevent hackers from browsing activity and capturing passwords. Alternatively, use a personal hot spot, such as a Mifi device. While no security is foolproof to a determined hacker, you can reduce your exposure and make it harder for hackers to target you.

7) Careful with Social: Skip Geo-Tags

The problem: Compulsive Instagrammer? Most users post most photos close to home, inadvertently making private information, such as home addresses, known to the public. At the same time, there are entire companies whose business models are built on scraping the web for photos, analyzing the geotags and selling that information to advertisers.

The solution: Turn off geotagging when you post photos and status updates. “Though services like Facebook and Twitter do that automatically, they probably collect the information for themselves,” said Kamdar. And remember, says Sell, “once you share something on most free services like, Twitter’s Vine or Facebook’s Instagram or even Snapchat, you are granting lifetime control of that information to someone else, “the privacy settings aren’t going to save you.”

8) New Devices?

The problem: Smartphones, laptops, and computers contain a portable goldmine of valuable personal information. This is like catnip for identity thieves and data brokers.

The solution: When getting rid of a device, wipe it properly so personal photos and data are permanently removed. Using the built-in delete function is usually not enough, because most of the time hard drives can be reconstructed using readily available software. Use specialized services to properly delete information. Sell recommends Wickr’s file shredder for mobile devices. If you want to be extra safe, as The Guardian newspaper did with the Snowden files, smash up your hard drive.

9) The Apps Are Watching: Skip Automatic Updates

The problem: Users configure applications privacy settings. However, those settings can change with updates.

The solution: Update each application individually. Configure privacy settings, so you do not default to the most public options. Kamdar advises users to “be aware of what privacy settings are being changed when you update an app. App updates often contain crucial security updates, but sometimes they simply add unnecessary features.”

10) Decrease Your Digital Footprint

The problem: Data has become so valuable to businesses. Many are asking for information they do not strictly need, such as date of birth and Social Security numbers.

The solution: Always question why you are being asked to hand over that information. Do not give it up unless absolutely necessary. As Sell says, it’s about “not being the low hanging fruit, not being the sucker.”

Reprinted by permission.

Image credit: CC by Senorhorst Jahnsen

About the author: Harriet Taylor

Harriet Taylor is a Field Producer for CNBC LA. She lives in Los Angeles, CA.

You are seconds away from signing up for the hottest list in New York Tech!

Join the millions and keep up with the stories shaping entrepreneurship. Sign up today.