mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-07-24 12:21:09 +00:00
Compare commits
1 Commits
kpham42-ge
...
kpham42-ge
Author | SHA1 | Date | |
---|---|---|---|
![]() |
11ebcfd7fe |
@@ -2,68 +2,3 @@
|
||||
title: Avoiding Big Tech
|
||||
icon: material/domain
|
||||
---
|
||||
|
||||
If you hop on YouTube or scroll through Amazon nowadays, you can tell how reliant Big Tech companies are on advertising. After all, [almost $500 billion](https://www.dentsu.com/news-releases/ad-spend-growth-tracks-ahead-of-the-economy) was spent on online advertising in 2024 alone. This figure demonstrates the extent to which these companies depend on targeted ads to increase profit margins, often at the expense of privacy and security.
|
||||
|
||||
Online advertisements are not like older television commercials. Modern digital technologies such as cookies, recommendation algorithms, and browser fingerprinting help these companies create [individualized profiles of their users](https://www.amnesty.org/en/latest/campaigns/2022/02/what-is-big-techs-surveillance-based-business-model/). By obtaining information on your browsing activity and interests, you may receive increasingly relevant advertisements. Given enough time, [Big Tech will know you more than you know yourself](https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/).
|
||||
|
||||
Creep factor aside, Big Tech tracking goes far beyond targeted advertising. These companies may also collect analytics data to improve their products, implement quality-of-life features that increase data collection, or record user activity to prevent abuse. Despite being an obvious business decision for most corporate executives, all this could be exploited by bad actors to harm your safety. Excessive data collection supports government surveillance through [legal subpoenas](https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html) and scammers through [data breaches](https://blog.knowbe4.com/scam-of-the-week-fbi-warns-against-data-breach-extortion)
|
||||
|
||||
In short, there is no such thing as **free** when using Big Tech services.
|
||||
|
||||
## What is Big Tech?
|
||||
|
||||
There is no strict definition of what constitutes "Big Tech". Generally, the term refers to these [five American corporations](https://www.nytimes.com/interactive/2019/11/13/magazine/internet-platform.html): Alphabet, Amazon, Apple,
|
||||
Meta, and Microsoft. Unlike other companies, they have established near-monopolies across different software and hardware markets. It has become almost impossible to not have some point used their services regardless of where you live. However, there are countless tech alternatives with comparable functionality, with [many being located outside the United States](https://www.privacyguides.org/articles/2025/03/19/private-european-alternatives/).
|
||||
|
||||
Interested in learning more? This table includes a simplified overview of each Big Tech corporation and their user-facing services.
|
||||
|
||||
**Alphabet** - Browser, Email, Cloud Storage, Hardware, Operating System, Messaging, Social Media, Entertainment, Music, Navigation
|
||||
|
||||
**Meta** - Social Media, Hardware, Messaging, E-Commerce, Entertainment
|
||||
|
||||
**Apple** - Browser, Email, Hardware, Cloud Storage, Messaging, Operating System, Entertainment, Music, Navigation
|
||||
**Amazon** - Hardware, Cloud Storage, Entertainment, Music, E-Commerce
|
||||
|
||||
**Microsoft** - Operating System, Browser, Email, Hardware, Cloud Storage, Entertainment, Search Engine
|
||||
|
||||
## Why Avoid Big Tech?
|
||||
|
||||
Let's be honest, escaping Big Tech is difficult. Perhaps you oppose Big Tech based on [ideology](https://www.gnu.org/philosophy/floss-and-foss.en.html), or you could be scared of the [capabilities of targeted advertising](https://www.privacyguides.org/en/basics/common-threats/#surveillance-as-a-business-model). Removing yourself from Big Tech could also mean missing out on [shared group chats](https://ieeexplore.ieee.org/document/7958575/) or [tailored social media feeds](https://www.nytimes.com/2021/12/05/business/media/tiktok-algorithm.html). Remember that everyone's journey is different; there is no need to transition from Big Tech at the expense of your comfort or productivity. Any effort, no matter how small, takes us one step closer to digital freedom.
|
||||
|
||||
## Best Practices
|
||||
|
||||
### 1. Harm Reduction
|
||||
|
||||
This approach allows you to retain some level of privacy without abandoning certain Big Tech services or products. While not a perfect solution, harm reduction can minimize data collection if a complete transition is not possible.
|
||||
|
||||
#### Reconfigure Account Settings
|
||||
|
||||
Take some time to figure out which apps or accounts you must keep. Go to their settings and disable anything that may be privacy-harmful. Ensure that your location data, usage history, and targeted advertising is turned off.
|
||||
|
||||
#### Use a VPN
|
||||
|
||||
A [VPN provider](https://www.privacyguides.org/en/basics/vpn-overview/) could protect your browsing habits. A VPN helps obscure your real IP address from the website you are visiting. Providers like [Mullvad and Proton](https://www.privacyguides.org/en/vpn/) have a DNS filtering feature that blocks advertisements and trackers.
|
||||
#### Change Browsers
|
||||
|
||||
Even with a VPN, Big Tech corporations can still spy on you with techniques such as fingerprinting and advertising cookies. While [clearing your browsing data](https://www.privacyguides.org/articles/2025/02/13/clearing-browsing-data/) is an obvious remediation, you should switch browsers entirely. Privacy Guides recommends [Brave Browser](https://www.privacyguides.org/en/desktop-browsers/#brave-browser) and [Mullvad Browser](https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser) for everyday use.
|
||||
### 2. Consider Alternatives
|
||||
|
||||
You can't just delete your accounts without finding suitable alternatives! If you are ready to make the final push, these tips can help you fully decouple yourself from Big Tech ecosystems.
|
||||
|
||||
#### Providers
|
||||
|
||||
Chances are, Apple and Google are the main providers for your [cloud storage](https://www.privacyguides.org/en/cloud/), photo management, [email](https://www.privacyguides.org/en/email/), and [search engine](https://www.privacyguides.org/en/search-engines/) needs. Thankfully, Privacy Guides has a detailed list of [recommendations](https://www.privacyguides.org/en/tools/) to replace them with.
|
||||
|
||||
#### Software
|
||||
|
||||
Imagine going a day without Microsoft Office, Google Maps, OneNote, or even iMessage! Whether you are a [working professional](https://www.privacyguides.org/en/office-suites/), [hiking enthusiast](https://www.privacyguides.org/en/maps/), [university student](https://www.privacyguides.org/en/notebooks/), or [activist](https://www.privacyguides.org/en/real-time-communication/), these apps can bolster your productivity and keep you connected with hobbies.
|
||||
|
||||
#### Hardware
|
||||
|
||||
Thankfully, you can completely replace your computer's [operating system](https://www.privacyguides.org/en/os/) with a free and open source alternative called [Linux](https://www.privacyguides.org/en/desktop/). Since there are hundreds of Linux distributions, beginners can become confused when choosing one. For the best security and timely updates, We recommend first-time Linux users to install [Fedora](https://fedoraproject.org/). If you are planning to buy a new computer, learn more [here](https://www.privacyguides.org/en/basics/hardware/).
|
||||
As for smartphones, Privacy Guides advises [purchasing supported Google Pixel models](https://www.privacyguides.org/en/mobile-phones/) and [replacing the stock operating system with Graphene OS](https://www.privacyguides.org/en/android/distributions/). This removes Google services from your phone entirely. If a new device is not possible, you should avoid installing other custom ROMs as [basic security features](https://www.privacyguides.org/en/os/android-overview/#security-protections) like Verified Boot would be disabled.
|
||||
|
||||
#### Delete Your Data
|
||||
|
||||
Now, it is time to [delete your accounts](https://www.privacyguides.org/en/basics/account-deletion/). Each company will have different procedures for data deletion; make sure to read through the appropriate customer support pages before doing so. If you live in a jurisdiction with a detailed deletion request policy, such as the European Union, follow the established procedures on their privacy policy for a straightforward deletion process.
|
||||
|
@@ -2,3 +2,43 @@
|
||||
title: Mass Surveillance Programs
|
||||
icon: material/bank-outline
|
||||
---
|
||||
|
||||
title: Avoiding Mass Surveillance
|
||||
icon: material/domain
|
||||
---
|
||||
|
||||
You are not being paranoid if government mass surveillance concerns you.
|
||||
|
||||
In 2013, an NSA contactor named Edward Snowden [leaked thousands of classified reports](https://www.pbs.org/wgbh/frontline/article/how-edward-snowden-leaked-thousands-of-nsa-documents/) detailing the bulk data collection practices operated by the United States intelligence community. Among them were two top secret programs operated by the National Security Agency: [PRISM](https://www.theverge.com/2013/7/17/4517480/nsa-spying-prism-surveillance-cheat-sheet) and [XKeyscore](https://arstechnica.com/information-technology/2013/08/building-a-panopticon-the-evolution-of-the-nsas-xkeyscore/). Although both were supposed to [target foreigners](https://www.nbcnews.com/politics/congress/section-702-foreign-intelligence-surveillance-act-congress-what-know-rcna96259), they ended up collecting the personal data of [millions of Americans](https://www.eff.org/pages/Incidental-collection) as well.
|
||||
|
||||
PRISM was a classified program that allowed the NSA to collect data directly from the data centers of major [U.S. tech companies](https://money.cnn.com/2013/06/07/technology/security/nsa-data-prism/index.html) like Google, Facebook, Apple, and Microsoft. This included emails, chat messages, video calls, and file transfers. What made PRISM troubling was how quietly and efficiently it worked. Cooperating companies provided direct access, often [without users knowing their data was being provided].
|
||||
|
||||
XKeyscore, on the other hand, was a "search engine" used to collect and analyze nearly everything a user does on the internet. It allowed analysts to search through emails, browsing histories, and social media activity in real time. XKeyscore could identify users by their browsing behavior or even [past associated usernames](https://www.lawfaremedia.org/article/nuts-and-bolts-xkeyscore), leading to the widespread use of techniques like [fingerprinting](https://www.techradar.com/features/browser-fingerprinting-explained) to identify and track people across the web.
|
||||
|
||||
## How Does Mass Surveillance Work?
|
||||
|
||||
Mass surveillance operates on the collection and analysis of vast amounts of data: both the content of communications and the digital trails people leave behind. Even when content is encrypted, surveillance programs can infer much through indirect means, relying heavily on [communications metadata](https://freedom.press/digisec/blog/metadata-102/) and [browser fingerprinting](https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead/).
|
||||
|
||||
To put it shortly, communications metadata refers to information that describes communications between two individuals. Many people mistake end-to-end encryption as foolproof; however, investigators may find the [circumstances](https://abcnews.go.com/blogs/headlines/2014/05/ex-nsa-chief-we-kill-people-based-on-metadata) of a given conservation useful even if they cannot read its content. Examples of this include send time, message size, subject headers, and even the IP addresses associated with a conversation.
|
||||
|
||||
Fingerprinting, on the other hand, is used to identify users based on the unique characteristics of their devices and software. Details like screen resolution, time zone, installed fonts, and browser extensions can create a unique profile that allows state actors to track individuals across websites and sessions. XKeyscore and similar tools use these methods to follow users, even if they try to hide behind anonymizing tools.
|
||||
|
||||
## Why avoid Mass Surveillance?
|
||||
|
||||
Mass surveillance can threaten the safety of journalists, activists, whistleblowers, and anyone with dissenting opinions. By minimizing your digital footprint and understanding how data is collected and shared, you protect your rights and make bulk data collection more expensive and less effective.
|
||||
|
||||
It thrives on convenience and passive data collection. Breaking that cycle means making intentional choices on how you browse the internet and communicate with other people.
|
||||
|
||||
## Best Practices
|
||||
|
||||
### 1. Utilize Anonymizing Software
|
||||
|
||||
To reduce your exposure to mass surveillance, adopting [anonymization software](https://www.privacyguides.org/en/advanced/tor-overview/) is one of the first steps. Start by masking your IP address and browsing behavior with tools like [Tor Browser](https://www.privacyguides.org/en/tor), or go even further with [Linux distributions](https://www.privacyguides.org/en/os/linux-overview/) such as [Tails or Whonix](https://www.privacyguides.org/en/desktop/) that route all traffic through Tor. For regular internet browsing, [virtual private network](https://www.privacyguides.org/en/vpn/) providers (VPNs) like Mullvad VPN or Proton VPN can help obscure your IP address from your internet service provider and visited websites; however, it does not enhance your anonymity at all. Your [browser](https://www.privacyguides.org/en/desktop-browsers/) also matters: Mullvad Browser and Brave offer increased protections against fingerprinting. Installing [browser extensions](https://www.privacyguides.org/en/browser-extensions/) like uBlock Origin can also protect you against malicious advertisements and trackers.
|
||||
|
||||
### 2. Reduce Communications Metadata
|
||||
|
||||
Even when your messages are encrypted, the metadata around your communications can still identify your identity and habits. That is why you should use [end-to-end encrypted messengers](https://www.privacyguides.org/en/real-time-communication/) designed with metadata reduction in mind. Signal, SimpleX, and Briar minimizes the exposure of metadata like who you're talking to and when. You should also consider [removing the metadata](https://www.privacyguides.org/en/data-redaction/) associated with the pictures or files you create before sending it online. When you must use email, [encrypted email providers](https://www.privacyguides.org/en/email/) such as Proton Mail and Tutanota help protect content data, while features like automatic message deletion and disabling read receipts or typing indicators further reduce metadata leakage.
|
||||
|
||||
### 3. Consider Jurisdiction
|
||||
|
||||
Where your data is stored can be just as important as how it’s stored. [Jurisdiction](https://www.techradar.com/vpn/why-does-vpn-jurisdiction-matter) affects which laws govern access to your data, so choosing services based in comparably privacy-respecting countries like Switzerland or Iceland can provide stronger protections. Conversely, avoid companies headquartered in surveillance-heavy countries if your threat model includes this factor. If you do not trust cloud-based services, consider [self-hosting](https://www.privacyguides.org/en/file-sharing/#nextcloud-client-server) your services with Nextcloud, which allows you to maintain greater control over your information. However, its end-to-end encryption implementation is [inferior](https://eprint.iacr.org/2024/546.pdf) compared to alternatives like [Proton Drive or Cryptpad](https://www.privacyguides.org/en/cloud/). Regardless, you should always stay informed about domestic and foreign laws that govern data retention and disclosure obligations.
|
||||
|
Reference in New Issue
Block a user