1
0
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2025-07-23 11:51:16 +00:00

Compare commits

..

6 Commits

Author SHA1 Message Date
Kevin Pham
8c35d23547 Update docs/getting-started/big-tech.md
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Signed-off-by: Kevin Pham <123699355+kpham42@users.noreply.github.com>
2025-04-14 13:40:36 -04:00
cf6da63bc6 Update docs/getting-started/big-tech.md
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Signed-off-by: Jonah Aragon <jonah@triplebit.net>
2025-04-11 22:51:15 -05:00
9a2aca08c0 Update big-tech.md
Signed-off-by: Jonah Aragon <jonah@privacyguides.org>
2025-04-11 22:50:36 -05:00
b9eac4bf34 Update docs/getting-started/big-tech.md
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Signed-off-by: Jonah Aragon <jonah@triplebit.net>
2025-04-11 22:50:17 -05:00
0dee9ea677 Apply suggestions from code review
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Signed-off-by: Jonah Aragon <jonah@triplebit.net>
2025-04-11 22:45:28 -05:00
Kevin Pham
e0e2407f80 Update big-tech.md
Added initial draft of big-tech.md

Signed-off-by: Kevin Pham <123699355+kpham42@users.noreply.github.com>
2025-03-28 17:04:18 -04:00
2 changed files with 65 additions and 50 deletions

View File

@@ -2,3 +2,68 @@
title: Avoiding Big Tech
icon: material/domain
---
If you hop on YouTube or scroll through Amazon nowadays, you can tell how reliant Big Tech companies are on advertising. After all, [almost $500 billion](https://www.dentsu.com/news-releases/ad-spend-growth-tracks-ahead-of-the-economy) was spent on online advertising in 2024 alone. This figure demonstrates the extent to which these companies depend on targeted ads to increase profit margins, often at the expense of privacy and security.
Online advertisements are not like older television commercials. Modern digital technologies such as cookies, recommendation algorithms, and browser fingerprinting help these companies create [individualized profiles of their users](https://www.amnesty.org/en/latest/campaigns/2022/02/what-is-big-techs-surveillance-based-business-model/). By obtaining information on your browsing activity and interests, you may receive increasingly relevant advertisements. Given enough time, [Big Tech will know you more than you know yourself](https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/).
Creep factor aside, Big Tech tracking goes far beyond targeted advertising. These companies may also collect analytics data to improve their products, implement quality-of-life features that increase data collection, or record user activity to prevent abuse. Despite being an obvious business decision for most corporate executives, all this could be exploited by bad actors to harm your safety. Excessive data collection supports government surveillance through [legal subpoenas](https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html) and scammers through [data breaches](https://blog.knowbe4.com/scam-of-the-week-fbi-warns-against-data-breach-extortion)
In short, there is no such thing as **free** when using Big Tech services.
## What is Big Tech?
There is no strict definition of what constitutes "Big Tech". Generally, the term refers to these [five American corporations](https://www.nytimes.com/interactive/2019/11/13/magazine/internet-platform.html): Alphabet, Amazon, Apple,
Meta, and Microsoft. Unlike other companies, they have established near-monopolies across different software and hardware markets. It has become almost impossible to not have some point used their services regardless of where you live. However, there are countless tech alternatives with comparable functionality, with [many being located outside the United States](https://www.privacyguides.org/articles/2025/03/19/private-european-alternatives/).
Interested in learning more? This table includes a simplified overview of each Big Tech corporation and their user-facing services.
**Alphabet** - Browser, Email, Cloud Storage, Hardware, Operating System, Messaging, Social Media, Entertainment, Music, Navigation
**Meta** - Social Media, Hardware, Messaging, E-Commerce, Entertainment
**Apple** - Browser, Email, Hardware, Cloud Storage, Messaging, Operating System, Entertainment, Music, Navigation
**Amazon** - Hardware, Cloud Storage, Entertainment, Music, E-Commerce
**Microsoft** - Operating System, Browser, Email, Hardware, Cloud Storage, Entertainment, Search Engine
## Why Avoid Big Tech?
Let's be honest, escaping Big Tech is difficult. Perhaps you oppose Big Tech based on [ideology](https://www.gnu.org/philosophy/floss-and-foss.en.html), or you could be scared of the [capabilities of targeted advertising](https://www.privacyguides.org/en/basics/common-threats/#surveillance-as-a-business-model). Removing yourself from Big Tech could also mean missing out on [shared group chats](https://ieeexplore.ieee.org/document/7958575/) or [tailored social media feeds](https://www.nytimes.com/2021/12/05/business/media/tiktok-algorithm.html). Remember that everyone's journey is different; there is no need to transition from Big Tech at the expense of your comfort or productivity. Any effort, no matter how small, takes us one step closer to digital freedom.
## Best Practices
### 1. Harm Reduction
This approach allows you to retain some level of privacy without abandoning certain Big Tech services or products. While not a perfect solution, harm reduction can minimize data collection if a complete transition is not possible.
#### Reconfigure Account Settings
Take some time to figure out which apps or accounts you must keep. Go to their settings and disable anything that may be privacy-harmful. Ensure that your location data, usage history, and targeted advertising is turned off.
#### Use a VPN
A [VPN provider](https://www.privacyguides.org/en/basics/vpn-overview/) could protect your browsing habits. A VPN helps obscure your real IP address from the website you are visiting. Providers like [Mullvad and Proton](https://www.privacyguides.org/en/vpn/) have a DNS filtering feature that blocks advertisements and trackers.
#### Change Browsers
Even with a VPN, Big Tech corporations can still spy on you with techniques such as fingerprinting and advertising cookies. While [clearing your browsing data](https://www.privacyguides.org/articles/2025/02/13/clearing-browsing-data/) is an obvious remediation, you should switch browsers entirely. Privacy Guides recommends [Brave Browser](https://www.privacyguides.org/en/desktop-browsers/#brave-browser) and [Mullvad Browser](https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser) for everyday use.
### 2. Consider Alternatives
You can't just delete your accounts without finding suitable alternatives! If you are ready to make the final push, these tips can help you fully decouple yourself from Big Tech ecosystems.
#### Providers
Chances are, Apple and Google are the main providers for your [cloud storage](https://www.privacyguides.org/en/cloud/), photo management, [email](https://www.privacyguides.org/en/email/), and [search engine](https://www.privacyguides.org/en/search-engines/) needs. Thankfully, Privacy Guides has a detailed list of [recommendations](https://www.privacyguides.org/en/tools/) to replace them with.
#### Software
Imagine going a day without Microsoft Office, Google Maps, OneNote, or even iMessage! Whether you are a [working professional](https://www.privacyguides.org/en/office-suites/), [hiking enthusiast](https://www.privacyguides.org/en/maps/), [university student](https://www.privacyguides.org/en/notebooks/), or [activist](https://www.privacyguides.org/en/real-time-communication/), these apps can bolster your productivity and keep you connected with hobbies.
#### Hardware
Thankfully, you can completely replace your computer's [operating system](https://www.privacyguides.org/en/os/) with a free and open source alternative called [Linux](https://www.privacyguides.org/en/desktop/). Since there are hundreds of Linux distributions, beginners can become confused when choosing one. For the best security and timely updates, We recommend first-time Linux users to install [Fedora](https://fedoraproject.org/). If you are planning to buy a new computer, learn more [here](https://www.privacyguides.org/en/basics/hardware/).
As for smartphones, Privacy Guides advises [purchasing supported Google Pixel models](https://www.privacyguides.org/en/mobile-phones/) and [replacing the stock operating system with Graphene OS](https://www.privacyguides.org/en/android/distributions/). This removes Google services from your phone entirely. If a new device is not possible, you should avoid installing other custom ROMs as [basic security features](https://www.privacyguides.org/en/os/android-overview/#security-protections) like Verified Boot would be disabled.
#### Delete Your Data
Now, it is time to [delete your accounts](https://www.privacyguides.org/en/basics/account-deletion/). Each company will have different procedures for data deletion; make sure to read through the appropriate customer support pages before doing so. If you live in a jurisdiction with a detailed deletion request policy, such as the European Union, follow the established procedures on their privacy policy for a straightforward deletion process.

View File

@@ -2,53 +2,3 @@
title: Publishing Information
icon: material/book
---
---
title: Publishing Information
icon: material/book
---
In 2021, a whistleblower named Frances Haugen leaked internal documents from Facebook, revealing how the company knowingly allowed misinformation and assisted in state-sponsored censorship. Known as the [Facebook Files](https://www.wsj.com/articles/the-facebook-files-11631713039), this leak was notable in how successful it was in preventing retaliation before Haugen publicly identified herself. While not confirmed, she most likely shared documents with the Wall Street Journal through [SecureDrop](https://securedrop.org/).
Her case is not unique. Whether you are a whistleblower, an investigative journalist, or an amateur blogger, the ability to publish safely is essential to a transparent society.
## Why Publish Anonymously?
In some countries, simply speaking out can result in criminal charges or loss-of-life. Even in relatively "free" societies, publishing critical information can attract legal threats, online harassment, or unwanted media attention. For example, [this hobbyist security researcher was sued](https://arstechnica.com/security/2024/08/city-of-columbus-sues-man-after-he-discloses-severity-of-ransomware-attack/) for documenting a ransomware attack on his own blog!
Anonymity enables freedom of speech by separating your voice from your identity. It helps protect you from retaliation while keeping the focus on the message.
## Best Practices
### 1. Use a Pseudonym
A pseudonym empowers you to maintain a consistent identity while separating your real-world persona from your published work. Choose a name (or Username) that has not been linked to you and use it exclusively for anonymous publishing.
Register [new accounts](https://www.privacyguides.org/en/basics/account-creation/) and [email](https://www.privacyguides.org/en/email/) addresses from devices and internet connections not associated with your identity. Avoid using the same writing style, login behavior, or online habits that could de-anonymize you. Remember that a pseudonym is only as strong as your ability to keep it separate.
In some cases, like in large newsrooms, you may need a public identity to establish credibility. If that is the case, shift your focus toward secure communication with confidential sources and protecting your operational security. Consider setting up a secure tipline instance for your organization.
### 2. Find a Platform
Where and how you publish matters. Here are a few options:
#### Create your Blog
Depending on your situation, you may be deciding between creating a website or using a third party platform like Substack or Medium. If you go with the former, [Ghost](https://ghost.org/) is an excellent open-source alternative to Substack. You can also create your own website through services like Wix or SquareSpace if your threat model allows it.
You can also consider running a Tor hidden service for an informal blog. This gives you control over hosting and minimizes reliance on third-party platforms. See [self-hosting resources](PLACEHOLDER) for guidance.
#### Use Alternative Social Media
[Social networks](https://www.privacyguides.org/en/social-networks/) can help you connect with a potential audience and gather feedback. Instead of X or Facebook, a decentralized and federated alternative like [Mastodon](https://joinmastodon.org/) can resist censorship from government actors. If you need help creating your first Mastodon account, read this resource here.
### Seek External Publishers
Many media outlets accept tips through a tipline, a system designed to receive anonymous submissions via Tor. This can be safer than publishing independently if you are sharing sensitive documents or exposing wrongdoing.
### 3. Compartmentalization
Compartmentalization involves isolating your publishing work from everything else. Whether youre using a pseudonym or your real name, never mix your activities. Instead of using apersonal laptop, purchase a dedicated laptop for your publishing work. When you decide to publish your final draft or upload your documents, do not log in from home or work networks. Instead, use an anonymous network like [Tor](https://www.privacyguides.org/en/tor/) over public wifi.
Furthermore, you should also install a anonymity or security-focused operatin system. When doing sensitive activities, boot from [Tails OS](https://www.privacyguides.org/en/desktop/#tails), an amnesiac Linux distribution that leaves no trace. For high-security daily usage, [Qubes OS](https://www.privacyguides.org/en/desktop/qubes) lets you compartmentalize your personal and work tasks in isolated virtual machines called qubes. If one of these virtual machines becomes compromised, you can always dispose of them.
Do not reuse passwords, emails, or browsing habits across different identities. Each project or pseudonym should exist in its own bubble. Compartmentalization ensures that you can safely publish your work without endangering your safety.