mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-07-04 02:22:38 +00:00
Compare commits
8 Commits
2025.02.14
...
kpham42-ge
Author | SHA1 | Date | |
---|---|---|---|
8c35d23547 | |||
cf6da63bc6 | |||
9a2aca08c0 | |||
b9eac4bf34 | |||
0dee9ea677 | |||
e0e2407f80 | |||
b88588bda4
|
|||
c11661c0be |
BIN
blog/assets/images/privacy-is-not-dead/cover.webp
Normal file
BIN
blog/assets/images/privacy-is-not-dead/cover.webp
Normal file
Binary file not shown.
After Width: | Height: | Size: 273 KiB |
45
blog/posts/privacy-is-not-dead.md
Normal file
45
blog/posts/privacy-is-not-dead.md
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
---
|
||||||
|
date:
|
||||||
|
created: 2025-02-17T20:00:00
|
||||||
|
categories:
|
||||||
|
- Opinion
|
||||||
|
authors:
|
||||||
|
- em
|
||||||
|
description: Privacy is only dead if we let it die. Be careful about the all-or-nothing mindset in data privacy, it can do more damage than good to the cause. While striving for improvements, do not forget to cheer and celebrate each small win.
|
||||||
|
schema_type: OpinionNewsArticle
|
||||||
|
preview:
|
||||||
|
color: "#28323F"
|
||||||
|
text_color: "#FFD06F"
|
||||||
|
site_logo: privacy-guides-logo-notext-darkbg.svg
|
||||||
|
---
|
||||||
|
# No, Privacy is Not Dead: Beware the All-or-Nothing Mindset
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
<small aria-hidden="true">Photo: Markus Spiske / Pexels</small>
|
||||||
|
|
||||||
|
In my work as a privacy advocate, I regularly encounter two types of discourse that I find very damaging to privacy as a whole. The first one is the idea that *privacy is dead*, implying it's not worth putting any effort to protect personal data anymore. This is the abdication mindset. This attitude is the one that scares me the most because without giving it a fight then of course the battle is lost in advance. **Like a self-fulfilling prophecy, privacy is dead if you let it die.**<!-- more -->
|
||||||
|
|
||||||
|
All human rights have seen advancements and improvements in history through long battles and hard-earned victories. There needs to be people willing to fight in order to win the fight. Losing a human right is easy. Protecting a human right always requires lots of effort.
|
||||||
|
|
||||||
|
The second mindset I want to bring up might seem like the diametric opposite, but in fact often leads to the same outcome overtime, and feeds the aforementioned. It's the mindset assuming that for anything to have value in data privacy it needs to be 100% perfectly private and secure.
|
||||||
|
|
||||||
|
While it's true we should strive to build better privacy-focused tools and practices every day, it's extremely important to keep an open mind and a nuanced approach in data privacy.
|
||||||
|
|
||||||
|
Now to be precise, I'm absolutely *not* talking about criticisms of false claims and snake oil. There's a lot of snake oil in data privacy and every misleading information and gimmick product should be exposed and severely condemned publicly.
|
||||||
|
|
||||||
|
What I'm talking about here is different. I'm referring to the idea that if a *good* product/tool/practice isn't perfect it isn't worth using it. This mindset is missing such an important point. The point isn't to make privacy perfect. The point here is to **reduce harm and improve privacy by small increments** at a pace that is realistically sustainable for an average person.
|
||||||
|
|
||||||
|
Here's a concrete example: Let's say your friend just told you they moved their communications from SMS to Signal. This is something to celebrate! Your friend just improved their data privacy a lot by deciding to start [using Signal instead of SMS](https://www.privacyguides.org/videos/2025/01/24/its-time-to-stop-using-sms-heres-why/). It is absolutely *not* the time to tell your friend things like "Okay, but you're not even using Firefox!" Cherish the win, encourage your friend to embrace Signal and appreciate the new protections it offers. Once your friend is comfortable with Signal, then you can slowly bring a new idea: "Hey Friend! I'm so glad we can communicate with Signal now, this is wonderful! I'd love to introduce you to this new browser now, I think you'd like it too!"
|
||||||
|
|
||||||
|
Help people move slowly but surely in the right direction, at their own pace, and with lots of positive reinforcements.
|
||||||
|
|
||||||
|
Another example of the same issue: Let's say someone posts on social media they just discovered (or recommend) this great PrivacyProduct™️ and love it! This is fantastic! This person just improved their privacy by starting to use a tool (or recommending a tool) that is *more* private than the previous one. Again, this is something to celebrate. It is absolutely *not* the time to reply something like "But this PrivacyProduct™️ logs your IP! Maybe it's end-to-end encrypted, but they log your IP! You should instead use this OtherPrivacyProduct™️ that is much less usable, has none of the features you need, and you will definitely hate it, but it's so much more private!"
|
||||||
|
|
||||||
|
When someone replies things like that, it only has the effect of discouraging people from adopting new tools that improve their privacy. **This sort of reply makes them want to stop sharing their enthusiasm about data privacy and go back to their old ways.** Even worse, this often has the effect of planting doubt in the minds of everyone else around who were also thinking about migrating from BigTechProduct™️ to the better PrivacyProduct™️. **This doubt brings inertia**, and with inertia they will just stay with BigTechProduct™️, and their privacy is now *much* worse for it.
|
||||||
|
|
||||||
|
I understand that we are all very passionate about data privacy and would love others to move so much faster to meet us here. But our impatience can sometimes create more damage to the cause. It is critical to push hard for privacy rights and practices with *governments* and *organizations*. Yes, push hard there, be relentless. Institutions only listen to the people when the people scream. But with *individuals*, when someone shares their excitement for data privacy, when someone shares their PrivacyProduct™️ recommendation that, even if imperfect, is still a great tool without misleading information, then **we should all celebrate and support this**.
|
||||||
|
|
||||||
|
Privacy isn't just about the tools we use. Privacy is a culture we need to build. Cultures come with mindsets and customs. I would love to see the privacy community thrive and celebrate together every win we get. **Tolerate imperfection and treasure improvement.** Every little step on the path to better privacy rights and better privacy practices is a win.
|
||||||
|
|
||||||
|
Celebrate and cheer loudly each little privacy win. This is how we all win.
|
69
docs/getting-started/big-tech.md
Normal file
69
docs/getting-started/big-tech.md
Normal file
@ -0,0 +1,69 @@
|
|||||||
|
---
|
||||||
|
title: Avoiding Big Tech
|
||||||
|
icon: material/domain
|
||||||
|
---
|
||||||
|
|
||||||
|
If you hop on YouTube or scroll through Amazon nowadays, you can tell how reliant Big Tech companies are on advertising. After all, [almost $500 billion](https://www.dentsu.com/news-releases/ad-spend-growth-tracks-ahead-of-the-economy) was spent on online advertising in 2024 alone. This figure demonstrates the extent to which these companies depend on targeted ads to increase profit margins, often at the expense of privacy and security.
|
||||||
|
|
||||||
|
Online advertisements are not like older television commercials. Modern digital technologies such as cookies, recommendation algorithms, and browser fingerprinting help these companies create [individualized profiles of their users](https://www.amnesty.org/en/latest/campaigns/2022/02/what-is-big-techs-surveillance-based-business-model/). By obtaining information on your browsing activity and interests, you may receive increasingly relevant advertisements. Given enough time, [Big Tech will know you more than you know yourself](https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/).
|
||||||
|
|
||||||
|
Creep factor aside, Big Tech tracking goes far beyond targeted advertising. These companies may also collect analytics data to improve their products, implement quality-of-life features that increase data collection, or record user activity to prevent abuse. Despite being an obvious business decision for most corporate executives, all this could be exploited by bad actors to harm your safety. Excessive data collection supports government surveillance through [legal subpoenas](https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html) and scammers through [data breaches](https://blog.knowbe4.com/scam-of-the-week-fbi-warns-against-data-breach-extortion)
|
||||||
|
|
||||||
|
In short, there is no such thing as **free** when using Big Tech services.
|
||||||
|
|
||||||
|
## What is Big Tech?
|
||||||
|
|
||||||
|
There is no strict definition of what constitutes "Big Tech". Generally, the term refers to these [five American corporations](https://www.nytimes.com/interactive/2019/11/13/magazine/internet-platform.html): Alphabet, Amazon, Apple,
|
||||||
|
Meta, and Microsoft. Unlike other companies, they have established near-monopolies across different software and hardware markets. It has become almost impossible to not have some point used their services regardless of where you live. However, there are countless tech alternatives with comparable functionality, with [many being located outside the United States](https://www.privacyguides.org/articles/2025/03/19/private-european-alternatives/).
|
||||||
|
|
||||||
|
Interested in learning more? This table includes a simplified overview of each Big Tech corporation and their user-facing services.
|
||||||
|
|
||||||
|
**Alphabet** - Browser, Email, Cloud Storage, Hardware, Operating System, Messaging, Social Media, Entertainment, Music, Navigation
|
||||||
|
|
||||||
|
**Meta** - Social Media, Hardware, Messaging, E-Commerce, Entertainment
|
||||||
|
|
||||||
|
**Apple** - Browser, Email, Hardware, Cloud Storage, Messaging, Operating System, Entertainment, Music, Navigation
|
||||||
|
**Amazon** - Hardware, Cloud Storage, Entertainment, Music, E-Commerce
|
||||||
|
|
||||||
|
**Microsoft** - Operating System, Browser, Email, Hardware, Cloud Storage, Entertainment, Search Engine
|
||||||
|
|
||||||
|
## Why Avoid Big Tech?
|
||||||
|
|
||||||
|
Let's be honest, escaping Big Tech is difficult. Perhaps you oppose Big Tech based on [ideology](https://www.gnu.org/philosophy/floss-and-foss.en.html), or you could be scared of the [capabilities of targeted advertising](https://www.privacyguides.org/en/basics/common-threats/#surveillance-as-a-business-model). Removing yourself from Big Tech could also mean missing out on [shared group chats](https://ieeexplore.ieee.org/document/7958575/) or [tailored social media feeds](https://www.nytimes.com/2021/12/05/business/media/tiktok-algorithm.html). Remember that everyone's journey is different; there is no need to transition from Big Tech at the expense of your comfort or productivity. Any effort, no matter how small, takes us one step closer to digital freedom.
|
||||||
|
|
||||||
|
## Best Practices
|
||||||
|
|
||||||
|
### 1. Harm Reduction
|
||||||
|
|
||||||
|
This approach allows you to retain some level of privacy without abandoning certain Big Tech services or products. While not a perfect solution, harm reduction can minimize data collection if a complete transition is not possible.
|
||||||
|
|
||||||
|
#### Reconfigure Account Settings
|
||||||
|
|
||||||
|
Take some time to figure out which apps or accounts you must keep. Go to their settings and disable anything that may be privacy-harmful. Ensure that your location data, usage history, and targeted advertising is turned off.
|
||||||
|
|
||||||
|
#### Use a VPN
|
||||||
|
|
||||||
|
A [VPN provider](https://www.privacyguides.org/en/basics/vpn-overview/) could protect your browsing habits. A VPN helps obscure your real IP address from the website you are visiting. Providers like [Mullvad and Proton](https://www.privacyguides.org/en/vpn/) have a DNS filtering feature that blocks advertisements and trackers.
|
||||||
|
#### Change Browsers
|
||||||
|
|
||||||
|
Even with a VPN, Big Tech corporations can still spy on you with techniques such as fingerprinting and advertising cookies. While [clearing your browsing data](https://www.privacyguides.org/articles/2025/02/13/clearing-browsing-data/) is an obvious remediation, you should switch browsers entirely. Privacy Guides recommends [Brave Browser](https://www.privacyguides.org/en/desktop-browsers/#brave-browser) and [Mullvad Browser](https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser) for everyday use.
|
||||||
|
### 2. Consider Alternatives
|
||||||
|
|
||||||
|
You can't just delete your accounts without finding suitable alternatives! If you are ready to make the final push, these tips can help you fully decouple yourself from Big Tech ecosystems.
|
||||||
|
|
||||||
|
#### Providers
|
||||||
|
|
||||||
|
Chances are, Apple and Google are the main providers for your [cloud storage](https://www.privacyguides.org/en/cloud/), photo management, [email](https://www.privacyguides.org/en/email/), and [search engine](https://www.privacyguides.org/en/search-engines/) needs. Thankfully, Privacy Guides has a detailed list of [recommendations](https://www.privacyguides.org/en/tools/) to replace them with.
|
||||||
|
|
||||||
|
#### Software
|
||||||
|
|
||||||
|
Imagine going a day without Microsoft Office, Google Maps, OneNote, or even iMessage! Whether you are a [working professional](https://www.privacyguides.org/en/office-suites/), [hiking enthusiast](https://www.privacyguides.org/en/maps/), [university student](https://www.privacyguides.org/en/notebooks/), or [activist](https://www.privacyguides.org/en/real-time-communication/), these apps can bolster your productivity and keep you connected with hobbies.
|
||||||
|
|
||||||
|
#### Hardware
|
||||||
|
|
||||||
|
Thankfully, you can completely replace your computer's [operating system](https://www.privacyguides.org/en/os/) with a free and open source alternative called [Linux](https://www.privacyguides.org/en/desktop/). Since there are hundreds of Linux distributions, beginners can become confused when choosing one. For the best security and timely updates, We recommend first-time Linux users to install [Fedora](https://fedoraproject.org/). If you are planning to buy a new computer, learn more [here](https://www.privacyguides.org/en/basics/hardware/).
|
||||||
|
As for smartphones, Privacy Guides advises [purchasing supported Google Pixel models](https://www.privacyguides.org/en/mobile-phones/) and [replacing the stock operating system with Graphene OS](https://www.privacyguides.org/en/android/distributions/). This removes Google services from your phone entirely. If a new device is not possible, you should avoid installing other custom ROMs as [basic security features](https://www.privacyguides.org/en/os/android-overview/#security-protections) like Verified Boot would be disabled.
|
||||||
|
|
||||||
|
#### Delete Your Data
|
||||||
|
|
||||||
|
Now, it is time to [delete your accounts](https://www.privacyguides.org/en/basics/account-deletion/). Each company will have different procedures for data deletion; make sure to read through the appropriate customer support pages before doing so. If you live in a jurisdiction with a detailed deletion request policy, such as the European Union, follow the established procedures on their privacy policy for a straightforward deletion process.
|
4
docs/getting-started/censorship-avoidance.md
Normal file
4
docs/getting-started/censorship-avoidance.md
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
title: Bypassing Censorship
|
||||||
|
icon: material/eye-off
|
||||||
|
---
|
4
docs/getting-started/digital-rights.md
Normal file
4
docs/getting-started/digital-rights.md
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
title: Digital Rights and Freedoms
|
||||||
|
icon: material/horse-human
|
||||||
|
---
|
4
docs/getting-started/digital-security.md
Normal file
4
docs/getting-started/digital-security.md
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
title: Cybersecurity
|
||||||
|
icon: material/lock
|
||||||
|
---
|
256
docs/getting-started/index.md
Normal file
256
docs/getting-started/index.md
Normal file
@ -0,0 +1,256 @@
|
|||||||
|
---
|
||||||
|
title: "Getting Started"
|
||||||
|
hide:
|
||||||
|
- navigation
|
||||||
|
---
|
||||||
|
|
||||||
|
You've probably encountered this website because you are interested in improving your digital privacy and security.
|
||||||
|
|
||||||
|
It's easy to feel overwhelmed. Many YouTubers make money from fearmongering and selling incomplete solutions, and many blogs on this subject are overwhelmingly long, narrowly-focused, and give "recommendations" based on whichever VPN company is paying them the most for referrals that week.
|
||||||
|
|
||||||
|
Our approach is different. We are going to *guide* you through every step, and our community is here to provide help along the way.
|
||||||
|
|
||||||
|
The effort to protect your rights can feel futile at first, but it **is** important. You are doing a great thing, both for yourself and for others who benefit from everyone caring about privacy.
|
||||||
|
|
||||||
|
Let's get started.
|
||||||
|
|
||||||
|
## Why this matters
|
||||||
|
|
||||||
|
> Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, our right to privacy hasn't always been upheld. In several dictatorships, it still isn't.
|
||||||
|
>
|
||||||
|
> Generations before ours fought for our right to privacy. ==Privacy is a human right, inherent to all of us==, that we are entitled to (without discrimination).
|
||||||
|
|
||||||
|
Unfortunately, governments and corporations have always tried to erode this right wherever they can, and the frequency of these attacks on your personal privacy and freedom has been increasing at an astounding rate, especially since the advent of social media.
|
||||||
|
|
||||||
|
In an ideal world, you would have legal protections from this overreach, and it is important to support the people and organizations who are fighting to get these rights enshrined in law. However, in the meantime it is just as important to take personal action, both to protect yourself and to demonstrate to others that this is something worth caring about.
|
||||||
|
|
||||||
|
> A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
|
||||||
|
>
|
||||||
|
> ==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
|
||||||
|
|
||||||
|
Throughout our *Getting Started* section, we are going to link out to other guides on the website, like so:
|
||||||
|
|
||||||
|
[:material-book-outline: Why Privacy Matters](../basics/why-privacy-matters.md){ class="md-button" }
|
||||||
|
|
||||||
|
Feel free to read these articles and then return here, or simply note them for reference later. It is not critical to learn everything right off the bat, but they may answer lingering questions or provide more insight if you are interested in the details.
|
||||||
|
|
||||||
|
## First steps
|
||||||
|
|
||||||
|
Digital privacy is built on a foundation of best security practices. We are going to dive into more specific scenarios in a bit, but the following are things that **everyone** should do:
|
||||||
|
|
||||||
|
### :material-numeric-1-box: Use a password manager
|
||||||
|
|
||||||
|
<div class="grid" markdown>
|
||||||
|
|
||||||
|
<div markdown>
|
||||||
|
|
||||||
|
The single best thing you can do to protect yourself from hackers is to stop reusing the same password.
|
||||||
|
|
||||||
|
Unfortunately, just changing a few characters in your "usual password" for different sites is not enough, and it's hard to keep track of as well!
|
||||||
|
|
||||||
|
The best way to be secure is to have a **completely random and unique** password for every website.
|
||||||
|
|
||||||
|
We aren't good at creating random passwords ourselves though, and this is where a [password manager](../passwords.md) comes in.
|
||||||
|
|
||||||
|
A good password manager will give you a button to generate a new password whenever you make a new account, and then save that password in its database. **You never even need to know what the password is** (although you can always look if you need to).
|
||||||
|
|
||||||
|
Gone are the days of writing down all your passwords in a notebook or trying to remember what variations of your old password you used on which websites.
|
||||||
|
|
||||||
|
If we're being honest, this may be the most challenging thing we will ever recommend you do. To secure all your existing accounts, there is no getting around the fact that you will need to log in to each of them and change your password to one generated by your new password manager.
|
||||||
|
|
||||||
|
This will take time, but know that it is well worth the trouble, and the time you'll save in the future by just hitting a button to log in to your accounts and never having to go through the "Forgot Password?" rigmarole again will more than make up for it.
|
||||||
|
|
||||||
|
Just get it out of the way now, update your accounts, and come back here when you're finished.
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div markdown>
|
||||||
|
|
||||||
|
<div class="admonition tip" markdown>
|
||||||
|
<p class="admonition-title">Password manager recommendations</p>
|
||||||
|
|
||||||
|
Almost any password manager from a reputable company is better than none, but the best will support multiple platforms (so you aren't locked into a single operating system or walled garden), have a long track record of proven security and audits, and be conscientious about the data they collect.
|
||||||
|
|
||||||
|
We've made a list of our favorites, but if you still want us to pick for you, we think { .twemoji loading=lazy } [**Bitwarden**](../passwords.md#bitwarden) is best suited for most people, and { .twemoji loading=lazy } [**KeePassXC**](../passwords.md#keepassxc) is a great alternative if you feel more "techy."
|
||||||
|
|
||||||
|
[:material-form-textbox-password: All Recommendations](../passwords.md){ class="md-button" }
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
### :material-numeric-2-box: Update your software
|
||||||
|
|
||||||
|
<div class="grid" markdown>
|
||||||
|
|
||||||
|
<div markdown>
|
||||||
|
|
||||||
|
We know, software updates are annoying. They are time-consuming, and sometimes they break things that you've been using for years.
|
||||||
|
|
||||||
|
They are also **critical** for keeping you safe from malware and vulnerabilities.
|
||||||
|
|
||||||
|
Check your operating system for updates now, and install them if you're behind. You should also enable automatic updates, to keep you protected going forward.
|
||||||
|
|
||||||
|
Your operating system is the interface between the hardware you own and the software you run, meaning it requires a massive amount of trust to keep both of these things safe.
|
||||||
|
|
||||||
|
If it is compromised, it's game-over for your security, regardless of any [secure, private, and encrypted software](../tools.md) you run on it.
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div markdown>
|
||||||
|
|
||||||
|
<div class="admonition tip" markdown>
|
||||||
|
<p class="admonition-title">Operating system recommendations</p>
|
||||||
|
|
||||||
|
Updates *can* be inconvenient, but this is often a matter of your operating system not respecting you and your workflows.
|
||||||
|
|
||||||
|
Later in this guide, we are going to talk about alternative operating systems for PCs and mobile devices that *are* more respectful of you and your time. Switching to one of those will likely make updates a breeze, because they care more about security and stability than pushing whatever the latest AI copilot product they've just released is.
|
||||||
|
|
||||||
|
Even if you never end up switching though, automatic updates are still a necessity, and we strongly recommend enabling them on any platform.
|
||||||
|
|
||||||
|
[:material-tape-drive: Other Operating Systems](../desktop.md){ class="md-button" }
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
### :material-numeric-3-box: Install an ad blocker
|
||||||
|
|
||||||
|
<div class="grid" markdown>
|
||||||
|
|
||||||
|
<div markdown>
|
||||||
|
|
||||||
|
Advertisements aren't just annoying, they are one of the most prevalent attack vectors on the internet.
|
||||||
|
|
||||||
|
Internet advertisements are commonly used to deliver malware straight to your devices, or to trick you into giving away your personal or financial information.
|
||||||
|
|
||||||
|
This is **not** simply a matter of being gullible or not. Some of these advertisements are completely indistinguishable from legitimate sources. Google allows advertisers to [create fake search results](https://www.bleepingcomputer.com/news/security/google-ad-for-gimporg-served-info-stealing-malware-via-lookalike-site/) that completely match the website you're looking for, including the official domain name.
|
||||||
|
|
||||||
|
Even ignoring the advertisements that try to trick you, it is a massive security risk to run any "untrusted code" on your computer at all, which is exactly what JavaScript-based advertisements do.
|
||||||
|
|
||||||
|
Minimizing the amount of content you are downloading and running makes you much safer, and it speeds up your browsing at the same time! This is especially true if you have strict data caps on your internet plan, and can't afford to waste valuable megabytes on massive banner ad images.
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div markdown>
|
||||||
|
|
||||||
|
<div class="admonition tip" markdown>
|
||||||
|
<p class="admonition-title">Content blocking recommendations</p>
|
||||||
|
|
||||||
|
In most web browsers, you can install { .twemoji loading=lazy } [**uBlock Origin Lite**](../browser-extensions.md#ublock-origin-lite) for decent protection against these threats.
|
||||||
|
|
||||||
|
In later parts of this guide we are going to talk about alternative browsers and ad blocking extensions which might provide you with even more protections, but until then you should just install this on the browser you're using right now.
|
||||||
|
|
||||||
|
[:material-puzzle-outline: All Recommendations](../browser-extensions.md){ class="md-button" }
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
## What next?
|
||||||
|
|
||||||
|
Everyone likes a simple checklist, but here's the thing: Everyone's situation is different, and the solutions you're looking for will differ accordingly.
|
||||||
|
|
||||||
|
This is the most common pitfall we see people fall into. They will ask online communities about the best things to do to protect their privacy, and receive countless conflicting and unrealistic recommendations. This happens because everyone has a different idea of what's best, and they're not wrong! However, what's best for them isn't necessarily what's best for you.
|
||||||
|
|
||||||
|
Deciding what risks you want to protect against and finding protections against those risks is called **threat modeling**, and it's an important skill when it comes to protecting your privacy and security. We've written a more detailed guide on threat modeling, which you can read now or come back to later, but in the meantime you should think about what you *really* care about. **Why did you come to *privacyguides.org* in the first place?**
|
||||||
|
|
||||||
|
[:material-book-outline: Threat Modeling](../basics/threat-modeling.md){ class="md-button" }
|
||||||
|
|
||||||
|
To move on to the next part of this guide, you should choose the **most** important thing to you from the options below. You aren't meant to follow **all** of these guides, they are tailored to your specific situation.
|
||||||
|
|
||||||
|
<div class="grid cards" markdown>
|
||||||
|
|
||||||
|
- :material-domain:{ .lg .middle } I want to avoid ***Big Tech* tracking**
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
It's right to worry about companies like Facebook and Google siphoning your data to make a quick buck off you.
|
||||||
|
|
||||||
|
The societal dangers of hyper-targeted advertising is well known now, and really it's just plain creepy. These companies are less sophisticated than you might think though, and there *are* ways to avoid them.
|
||||||
|
|
||||||
|
[Big Tech :material-arrow-right:](big-tech.md)
|
||||||
|
|
||||||
|
- :material-bank-outline:{ .lg .middle } I'm worried about **mass surveillance** programs
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
Government mass surveillance programs have been extensively proven and documented, and there is no debate that they still exist. However, they are typically easy to thwart, because they rely on simple data collection programs that can be applied to massive populations at once.
|
||||||
|
|
||||||
|
Note that this guide is **not** intended for people who might be specifically targeted by their government. There is a huge difference between being caught up in dragnet mass surveillance programs, and actually being a person of interest.
|
||||||
|
|
||||||
|
[Mass Surveillance :material-arrow-right:](mass-surveillance.md)
|
||||||
|
|
||||||
|
- :material-eye-off:{ .lg .middle } I need to bypass **censorship**
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
todo
|
||||||
|
|
||||||
|
[Censorship Avoidance :material-arrow-right:](censorship-avoidance.md)
|
||||||
|
|
||||||
|
- :material-lock:{ .lg .middle } I am worried about my **security** and vulnerabilities
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
todo
|
||||||
|
|
||||||
|
[Digital Security :material-arrow-right:](digital-security.md)
|
||||||
|
|
||||||
|
- :material-book:{ .lg .middle } I need to safely **publish information anonymously**
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
todo
|
||||||
|
|
||||||
|
[Publishing :material-arrow-right:](publishing.md)
|
||||||
|
|
||||||
|
- :material-account-search:{ .lg .middle } I need to protect myself from **stalkers** or the public
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
todo
|
||||||
|
|
||||||
|
[Stalking/Abuse :material-arrow-right:](stalking-abuse.md)
|
||||||
|
|
||||||
|
- :material-target-account:{ .lg .middle } I may be the victim of a **targeted hack**/attack
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
todo
|
||||||
|
|
||||||
|
[Targeted Attacks :material-arrow-right:](targeted-attacks.md)
|
||||||
|
|
||||||
|
- :material-horse-human:{ .lg .middle } I want to defend my rights and freedoms
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
Maybe you aren't worried about a specific threat at all. You could be perfectly safe, but still deeply care about your rights to privacy and advocacy for digital rights and freedoms.
|
||||||
|
|
||||||
|
That's awesome! People like you who demand and promote privacy even when your immediate personal gain might be small are crucial for making companies make more privacy-conscious decisions in future products, in stopping the erosion of our liberties by governments, and in helping keep other people who need privacy *immediately* safe and protected.
|
||||||
|
|
||||||
|
[Digital Rights and Freedoms :material-arrow-right:](digital-rights.md)
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
We know it will be tempting to say that you care about all of these things. They are indeed all legitimate problems! We still really encourage you to truly consider what you *most* care about and go from there. We will set you up to consider other scenarios afterward :slight_smile:
|
||||||
|
|
||||||
|
## Further questions
|
||||||
|
|
||||||
|
Do you not think any of our pre-made guides are right for you? That is all right, we've created a general [knowledge base](../basics/why-privacy-matters.md) to help you understand privacy and security concepts more generally, and then apply those skills to any situation.
|
||||||
|
|
||||||
|
If you run into any problems or questions, you should ask us on our forum. We can't make a starter guide for everyone, but we can help guide you in the best way forward. When asking a question on our forum, it's important to include the following details:
|
||||||
|
|
||||||
|
1. **What is your goal?** Tell us why you joined and what you are trying to do.
|
||||||
|
2. **What have you already tried?** We don't want to waste your time if you already know something won't work. Tell us what you've encountered already and **why** it didn't work for you.
|
||||||
|
3. **Be sure to ask a specific question.** We can't read minds, so ask us what you're wondering directly, not just for general and generic advice. If your post doesn't have a question mark in it, it might not be something we can help with.
|
||||||
|
|
||||||
|
Also, if you think we should add a guide to this page, suggest one on our forum too! If you have a general idea of what we should cover that we aren't already, we can look into it and publish a guide for the benefit of future readers.
|
||||||
|
|
||||||
|
[:simple-discourse: Join our community forum](https://discuss.privacyguides.net){ class="md-button md-button--primary" }
|
4
docs/getting-started/mass-surveillance.md
Normal file
4
docs/getting-started/mass-surveillance.md
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
title: Mass Surveillance Programs
|
||||||
|
icon: material/bank-outline
|
||||||
|
---
|
4
docs/getting-started/publishing.md
Normal file
4
docs/getting-started/publishing.md
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
title: Publishing Information
|
||||||
|
icon: material/book
|
||||||
|
---
|
4
docs/getting-started/stalking-abuse.md
Normal file
4
docs/getting-started/stalking-abuse.md
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
title: Stalking / Abuse
|
||||||
|
icon: material/account-search
|
||||||
|
---
|
4
docs/getting-started/targeted-attacks.md
Normal file
4
docs/getting-started/targeted-attacks.md
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
title: Targeted Attacks
|
||||||
|
icon: material/target-account
|
||||||
|
---
|
10
mkdocs.yml
10
mkdocs.yml
@ -366,6 +366,16 @@ markdown_extensions:
|
|||||||
|
|
||||||
nav:
|
nav:
|
||||||
- !ENV [NAV_HOME, "Home"]: "index.md"
|
- !ENV [NAV_HOME, "Home"]: "index.md"
|
||||||
|
- !ENV [NAV_GETTING_STARTED, "Getting Started"]:
|
||||||
|
- "getting-started/index.md"
|
||||||
|
- "getting-started/big-tech.md"
|
||||||
|
- "getting-started/mass-surveillance.md"
|
||||||
|
- "getting-started/censorship-avoidance.md"
|
||||||
|
- "getting-started/digital-security.md"
|
||||||
|
- "getting-started/publishing.md"
|
||||||
|
- "getting-started/stalking-abuse.md"
|
||||||
|
- "getting-started/targeted-attacks.md"
|
||||||
|
- "getting-started/digital-rights.md"
|
||||||
- !ENV [NAV_KNOWLEDGE_BASE, "Knowledge Base"]:
|
- !ENV [NAV_KNOWLEDGE_BASE, "Knowledge Base"]:
|
||||||
- "basics/why-privacy-matters.md"
|
- "basics/why-privacy-matters.md"
|
||||||
- "basics/threat-modeling.md"
|
- "basics/threat-modeling.md"
|
||||||
|
@ -219,8 +219,10 @@
|
|||||||
<li class="md-nav__item">
|
<li class="md-nav__item">
|
||||||
<span class="md-nav__link">
|
<span class="md-nav__link">
|
||||||
<span>
|
<span>
|
||||||
This is an opinion piece.
|
<small>
|
||||||
The views expressed in this article are the author's own and do not necessarily reflect the views of Privacy Guides and its editorial team.
|
This is an opinion piece.
|
||||||
|
The views expressed in this article are the author's own and do not necessarily reflect the views of Privacy Guides and its editorial team.
|
||||||
|
</small>
|
||||||
</span>
|
</span>
|
||||||
</span>
|
</span>
|
||||||
</li>
|
</li>
|
||||||
|
@ -18,8 +18,40 @@ definitions:
|
|||||||
material/book-open-page-variant
|
material/book-open-page-variant
|
||||||
{%- endif -%}
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &page_color >-
|
||||||
|
{%- if page.meta.preview and page.meta.preview.color -%}
|
||||||
|
{{- page.meta.preview.color -}}
|
||||||
|
{%- else -%}
|
||||||
|
#FFD06F
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &text_color >-
|
||||||
|
{%- if page.meta.preview and page.meta.preview.text_color -%}
|
||||||
|
{{- page.meta.preview.text_color -}}
|
||||||
|
{%- else -%}
|
||||||
|
#2d2d2d
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &background_transparency >-
|
||||||
|
{%- if page.meta.preview and page.meta.preview.color -%}
|
||||||
|
{{- page.meta.preview.color -}}99
|
||||||
|
{%- else -%}
|
||||||
|
#FFD06F99
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &icon_transparency >-
|
||||||
|
{%- if page.meta.preview and page.meta.preview.text_color -%}
|
||||||
|
{{- page.meta.preview.text_color -}}33
|
||||||
|
{%- else -%}
|
||||||
|
#00000033
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
- &logo >-
|
- &logo >-
|
||||||
theme/assets/brand/logos/svg/logo/privacy-guides-logo-notext-colorbg.svg
|
{%- if page.meta.preview and page.meta.preview.site_logo -%}
|
||||||
|
theme/assets/brand/logos/svg/logo/{{- page.meta.preview.site_logo -}}
|
||||||
|
{%- else -%}
|
||||||
|
theme/assets/brand/logos/svg/logo/privacy-guides-logo-notext-colorbg.svg
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
- &updated_time >-
|
- &updated_time >-
|
||||||
{% if page.config.date.updated %}
|
{% if page.config.date.updated %}
|
||||||
@ -80,7 +112,7 @@ size: { width: 1200, height: 630 }
|
|||||||
layers:
|
layers:
|
||||||
# Background
|
# Background
|
||||||
- background:
|
- background:
|
||||||
color: "#FFD06F"
|
color: *page_color
|
||||||
|
|
||||||
- size: { width: 512, height: 512 }
|
- size: { width: 512, height: 512 }
|
||||||
offset: { x: 600, y: 59 }
|
offset: { x: 600, y: 59 }
|
||||||
@ -88,14 +120,14 @@ layers:
|
|||||||
image: *page_logo
|
image: *page_logo
|
||||||
|
|
||||||
- background:
|
- background:
|
||||||
color: "#FFD06F99"
|
color: *background_transparency
|
||||||
|
|
||||||
# Page icon
|
# Page icon
|
||||||
- size: { width: 630, height: 630 }
|
- size: { width: 630, height: 630 }
|
||||||
offset: { x: 570, y: 0 }
|
offset: { x: 570, y: 0 }
|
||||||
icon:
|
icon:
|
||||||
value: *page_icon
|
value: *page_icon
|
||||||
color: "#00000033"
|
color: *icon_transparency
|
||||||
|
|
||||||
# Logo
|
# Logo
|
||||||
- size: { width: 64, height: 64 }
|
- size: { width: 64, height: 64 }
|
||||||
@ -108,20 +140,20 @@ layers:
|
|||||||
offset: { x: 160, y: 78 }
|
offset: { x: 160, y: 78 }
|
||||||
typography:
|
typography:
|
||||||
content: *site_name
|
content: *site_name
|
||||||
color: "#2d2d2d"
|
color: *text_color
|
||||||
font:
|
font:
|
||||||
family: Bagnard
|
family: Bagnard
|
||||||
style: Bold
|
style: Bold
|
||||||
|
|
||||||
# Page title
|
# Page title
|
||||||
- size: { width: 864, height: 256 }
|
- size: { width: 864, height: 360 }
|
||||||
offset: { x: 62, y: 192 }
|
offset: { x: 62, y: 192 }
|
||||||
typography:
|
typography:
|
||||||
content: *page_title
|
content: *page_title
|
||||||
align: start
|
align: start
|
||||||
color: "#2d2d2d"
|
color: *text_color
|
||||||
line:
|
line:
|
||||||
amount: 3
|
amount: 4
|
||||||
height: 1.5
|
height: 1.5
|
||||||
font:
|
font:
|
||||||
family: Bagnard
|
family: Bagnard
|
||||||
|
Reference in New Issue
Block a user