Nine Basic Steps To Better Protect Your Data Privacy

Seriously, these are really basic

Ryan Ozonian
Private Parts - by Ryan Ozonian
6 min readAug 15, 2018

--

1. Care

There’s a reason why caring about your privacy is the first action on this list. And that reason isn’t because I’m trying to be sentimental . As I’ve stated before, there are plenty of people who don’t care about their data privacy, ostensibly because they’ve got “nothing to hide”. But the fact that you’ve at least taken the time to do a bit of your own research and reassert your autonomy is the first step in data sobriety. As is the case with most everything else, there are certain things that are out of your control with regard to keeping your data private. But there is plenty that you can do to take an extra precaution or two. This list is a good starting point for those of you who at least care enough to acknowledge how serious of an issue protecting your data really is.

2. Use a private browser or mode

For those of you who’ve never searched your ex’s name or for the latest erectile dysfunction pill using an incognito window (also known as a private window), it basically allows you to search the Internet without leaving too many tracks. Think of it like a wave at the beach that erases some of your footprints everytime you close the window. It’s not perfect. People can still gain access to your browsing history using routers, firewalls, and proxy servers but it’s something to keep in mind, especially anytime you’re using a computer that isn’t yours. For more complete private browsing, you’ll have to use a the TOR browser (anonymizes your web traffic) and a VPN connection (more on this later) linked to a trustworthy provider.

3. Turn off location services

You’ve probably noticed a small pop window open everytime you download a new app asking you if the app can have access to your location. Chances are without even blinking you accepted and started searching for the closest Chinese restaurant. First of all, that’s ok. Sometimes you’re hungover and you’d sign away your entire life savings for an egg roll. But consider this: Google’s location services keeps track of everything. And by everything I mean it knows when you left your house to go to work, how long it took you to get there and whether you stopped to get a cup of coffee on your way. It has not yet figured out how to determine when to expect your next bowel movement but chances are that’s only a few more software updates away. Unfortunately, as of writing this the LA Times reported that that turning off location services doesn’t necessarily mean that Google has stopped tracking all of your movements but it does mean that it has stopped taking inventory of everywhere you’ve gone. To prevent Google from tracking you completely, you’ll have to turn off a setting called “Web & App Activity” and which is enabled by default.

4. Use encrypted messaging apps

Encrypted messaging typically provides end-to-end encryption for user-to-user text messaging. It basically prevents anyone from monitoring your digital conversations while they’re in transit. To put it quite simply, It’s like taking a message on a piece of paper and ripping it up into a million different pieces so that no one outside from the intended receiver of said message can read it. There is however, one encrypted messaging product takes that piece of paper and sets it completely on fire so that even the pieces can’t be found. And it’s aptly named DUST ;).

5. Unplug

Admittedly, this piece of advice is a bit tedious but if you’re concerned about your Amazon Alexa, your Google Home or any other device that’s equipped with a microphone listening to your conversations or strange private soliloquies, consider unplugging the device when you’re not using it. Again, tedious I know. But did you know that some of these devices keep voice logs of your actual voice everytime you ask them a question? In other words, the other morning when you told Google Home to fuck off before asking about the weather, you should at least be aware that your explicit voice memo was recorded, stored and potentially judged.

6. Establish a disassociated email

It’s tempting to use one email for everything and it’s even more convenient for said email to closely resemble your legal name. Don’t give in to this temptation. Why? Because I’m telling you not to. And because chances are if someone wants to hack into your online banking accounts the first place they’ll start is with your email. If your email is basically your name verbatim, well, you’ve given them the ideal place to start. It may not seem age appropriate but as it turns out, when it comes to important online accounts, surfandturf5000@gmail.com is actually quite smart.

7. Use VPN

Stay with me for a second and try not to let your eyes roll back as you switch over to your Amazon shopping cart. VPN which stands for virtual private network isn’t the data nerd privacy boogeyman you might have thought. Still, rather than explain the intricacies of how a VPN works, I’ll tell it to you like this: The internet is public so everything you send and receive is, in theory, vulnerable to being hacked. A VPN however allows two computers to send and receive messages as though they were hardwired together. In other words, it creates a secure tunnel that outside actors can’t get access to. Now, if you’re thinking that sounds good, but I’m not a computer nerd and I don’t have time to set that up. Well, you don’t have to. This site will do it for you.

8. Use two step authentication

Chances are if you have an iPhone or you use Gmail, you’re already aware of two step authentication. But it still seemed important enough to include on this list. What is it? Basically it’s a second level of verification for any of your online accounts. Like when you get a text message code to use in addition to entering your username and password for signing into your online bank account.

9. Don’t let your devices talk to strangers

It can be tempting because a public wifi is how you survive in a Starbucks coffee shop. But allowing your device to connect to the nearest most convenient WiFi or Bluetooth connection isn’t much different than eating the half eaten burger and french fries leftover by the people who were dining at the restaurant just before you sat down. Sure, chances are there’s nothing in there that could poison you but it’s not impossible. So to avoid connecting to potentially hazardous public WiFi connections, especially when you’re not meaning to, you should turn off the WiFi feature on your phone when you’re not using it. And while you’re at it, turn the Bluetooth off too. Just in case, y’know someone’s trying to hack into your phone and download those curated private pics you haven’t yet magnified and sent over to your latest Tinder match.

Don’t say I didn’t warn you.

Follow Me

Twitter
LinkedIn

Practice Safe Texting — Use Dust

Dust Website

--

--

Ryan Ozonian
Private Parts - by Ryan Ozonian

CEO & Co-Founder of Dust Messenger — passionate entrepreneur building a new digital world based on trust