Digital Privacy - Pros, Cons, Tips and Tricks

How to protect and maintain your privacy? How to remove unwanted search results from Google? How your data is being collected, sold and used and much more. Most of us are daily internet users, not to mention smartphones and computers. Most of us accept Terms & Services and All Cookies daily without even thinking what’s hidden in fine print.

Of course we trade our consent to get better service on the platform, but is that really it? Considering all the big tech data mining scandals and how lucrative is the business of data brokers – the answer is a solid no.

In this article we will look at digital privacy from two perspectives – consumer and privacy nut. We will look at the predatory and manipulative aspects of it as well as those that make our lives more comfortable. In the end of the article we’ll look at accessible and not so accessible methods of improving and maintaining ones privacy. As well as deleting or burying unwanted data on the internet.

Introduction

Technology is continuously becoming a bigger part of our every day lives. So is the internet and social media. In addition now we have a variety of different “smart” devices like watches, monitors, lights and so on.

Watches for example are now able to collect your health metrics like heart rate, blood pressure and blood sugar. Not to mention the number of steps you make in a day and the locations you visit.

On one side all of this seems rather harmless and more convenient than anything. If we look only at the technology then yes, it indeed is harmless and convenient. Yet when we take into consideration factors like data mining, tracking, social media marketing and programming via algorithms – we suddenly start to notice how a list of potential problems and risks starts to form.

“But I don’t have anything to hide.”

This argument has been voiced more than many times, yet it can be countered rather easily. If you have nothing to hide, why don’t you upload your porn history and private messages on your Facebook feed? Having nothing incriminating to hide doesn’t mean that you want to be completely transparent about your daily activities with complete strangers. Well, when you don’t care about your digital privacy, that’s exactly what you’re doing. Sharing your personal information and activity with strangers who sell and exploit it.

Privacy Policies, Terms & Conditions, Terms of Service

Have you ever thought “Why are all those legal pages so long and why are they written in fine print?” The first reason is simple. The owners of the service want to protect themselves and make it close to impossible for you to sue them in case a need arises. Their primary aim here is to write down every possible thing you’re consenting to. So if a problem comes up they can say “But you agreed to it.” and legally, although maybe not morally, they will be in the right.

Fine print and overwhelming amounts of text are also used to discourage us from reading. Simply because they don’t want us to get into the nitty gritty details as that can potentially ward us off from their service. Instead they lure you in with inclusivity, “free” services and other “benefits” like improvements and personalisations. The sad reality is that it works. It works because we naturally gravitate towards communication and community. We want to be a part of something, whether it’s a group or a social media platform or a in. We’re willing to sacrifice our privacy and sometimes freedom just so we don’t feel excluded.

Legally speaking businesses are only required to state what data they’re collecting. There are no restrictions for what data they collect besides collecting data about children. Although even in case of those children, there are many loopholes that major services are using. Basically it’s okay to do whatever as long as it’s stated somewhere in fine print.

As a result we consent to whatever just to have access to a platform or a service without thinking too much about what we give in return. So what do we trade off? Our data. Interests, preferences, opinions, locations, details about education and income and much more. In a way internet is still Wild West in terms of regulations. There are some laws, but they are hard to enforce and big tech corporations have enough brain power and finances to utilise all the loopholes they can find. Even if they do get caught, they can easily settle the lawsuits for a fraction of what they have made through their suspicious actions. Nevertheless there are ways to have access to services and platforms without giving up too much of your personal information and privacy. Those tools and methods will be discussed later on in the article.

Data Brokers and Advertising

Our data is being collected, compiled, sold and used. The least harmful way our data is being used is for advertising. Platforms collect and compile the data. Then data brokers sell it to advertisers and those use it for various target marketing campaigns. Why I’m calling this use of data least harmful is because its only aim is to influence our consumption preferences. What shoes to buy or what hotel to book. As long as you have the ability to think critically and don’t follow through with every impulse to buy something – you’re in no danger

Most advertisers get their data directly from the platforms they’re advertising on. When that’s the case, none of our private information is being shown. We’re just numbers in audience groups that are linked to terms like “Avid news reader” and “In market for higher education”. Our names, addresses, emails and phone numbers aren’t being shown to those advertisers.

Personally I find this method of advertising convenient. If you know what you want, target marketing can occasionally save time. Here’s a personal example:

Me and my dad were sitting in the kitchen drinking coffee. The whole time we were conversing my phone laid in the middle of the table. At some point our conversation switched and he started telling me about an electronic table he wanted to buy  or build. About 15 minutes later I picked up my phone to check my Instagram messages. There was a story someone forwarded to me. After I watched that story an ad popped up. It was an ad for an electronic table with a Macbook on top of it. Just like the one dad described.

He didn’t buy it, but the fact that a perfectly fit option was shown to him minutes after he talked about it was impressive. In that exact case the data that was collected from our conversation was used in a harmless way. Yet the encounter illustrates well how in in depth the data is being collected and how it can be used for other more malicious intentions.

As there are people who steal wallets, there are people who buy and sell data that is more revealing than we would like. Names, addresses, emails, phone numbers, locations and in depth preferences and online activity. All those things can be extracted and sold either by those who are willing to compromise their integrity for higher profits or by hackers.

Data as means of manipulation

I think at this point it can’t be denied that big data is being used not only to influencing product consideration, but also to manipulate people. After all, nowadays platforms collect so much data they know users better than users know themselves.

Although malicious, big data is being used for various manipulations for a very simple reason. It works. If you know the interests, preferences, views and habits of a user, it’s rather easy to start tailoring content specifically for them. Technically you’re improving their experience, just with a subtle underlying message that benefits your agenda.

With data, proper marketing skills and access to the back-end of a platform (or enough funding) – it’s fairly simple to start feeding people biased information that will in turn sway their views and opinions in the desired direction.

We can see examples of such manipulations on Google where search suggestions differ based on location and political views. Yes, it can be attributed to what search terms are trending in that specific area at the time, yet believing only that would be ignorant to say the least. It would be evident that there’s no case to be made here, if the results only reflected what people are searching for. But here we’re discussing a case where search autofill suggestions are formed in a suggestive manner. 

Considering the shortening attention span of a statistical user and how popularity tops legitimacy on social media and search engines. The way social media and search engines are set up is creating biases in people instead of educating them.

Just like statistical data can be misrepresented in order to manipulate, the same can be done by fetching prioritised views and biased propaganda via search suggestions and social media. And yes, this may indeed sound like a conspiracy theory, yet that only because such things are hard to prove as they are hard to trace. Nevertheless the amount of court cases filed against major platforms give enough grounds to question their work ethics and the risks they pose to the public.

Here are some examples from traditional media and how different news networks are broadcasting the exact same narrative.

Cyber War

As we know the beauty of the internet is that it has no limits or boundaries. Yes, location based restrictions can be applied, though they are rather ineffective as those can be easily bypassed through VPN services. Yes, localised servers also exist, but those somewhat beat the purpose of the internet. Who would want to browse the internet localised only to their country? Russia has threatened to do just that and that claim has been met with a lot of scrutiny and scepticism.

So yes, your unprotected data can be used in cyber warfare as well.

Simple examples:

1. You can be targeted with biased ads and content.

2. Your data and personal information can be sold and used by the highest bidder.

3. Your personal information can be used for extortion.

4. Your photos and videos can be used in the production of DeepFakes.

5. “The Enemy” can spy on you and learn about your interests, views, preferences and habits.

TikTok as a potential tool in cyber warfare

TikTok is a very well programmed and addictive social media platform. It studies you via your behaviour on the app and at least has studied you via lurking in your phone. TikTok has been sued and almost banned in America because it was proven, that TikTok was collecting data not only from the in app activities, but also other apps, locations, keyboard strokes and so on.

TikTok algorithms also work differently based on where the user is located. In Americas and Europe TikTok algorithm promotes content that is impractical to say the least. Silly dances, lip-syncing and various dangerous challenges. In China on the other hand the app promotes achievements, quality content and self improvement. And as we’ve already noticed, social media does affect our mental health and social behaviour, so it wouldn’t be too difficult to see how such subtle programming could affect future generations of both regions differently.

Our experience with maintaining privacy and security

Decisive needs require decisive measures. At the time our requirements for privacy and security were rather high, so we had to do a lot of research and learn new skills to be able to provide for our needs. A lot of time went into studying cyber security and getting into the details of how Android operation systems worked. Some programming and soldering had to be learned and practiced as well. All that just to have secure and untethered phones that couldn’t be tracked, cracked or linked to a physical identity.

Back then we used CopperheadOS (which is now called GrapheneOS) on Nexus 6 devices. The OS was chosen because of its open source nature and some features like being untethered from Google and Facebook as well as being able to block or accept accesses which are usually accepted by default.

The phones were good because they were accessible, cheap and easy to pick apart. So we were able to remove all cameras, microphones, GPS, GSM, LTE and other modules. Passwords were set to 48 symbols including capital letters, numbers and other symbols. No social media apps, no search engines linked to Google. Only specific open source apps for encrypted communication. No emails or any personal information whatsoever. Only emails in use were generated by temporary mail generators and the same was done for phone numbers. We even had portable WIFI routers which were used with temporary SIM cards that we topped up with cash.

Of course our security measures weren’t the best, but we did the best we would with the means we had at the time. And to be honest we managed pretty well for quite some time. Of course later on we got our hands on some other more advanced devices that aren’t available to the wider public, but there’s no need to get into those details.

And although at some point our finite journey came to an end. There was one last occasion that put subtle smirks on all of our faces. During our court sessions when the evidence was being shown. There were no mentions of the phones or the data that was on them. Later on we found out that the police forces were simply unable to access them unless those who were arrested submitted their passwords willingly. Yet even then the information was only one sided.

I find it funny when I see drug dealers post pictures with money, guns or drugs on Instagram. Or how some talk about changing SIM cards or iPhones every week. My favourite ones are those who do their deals on social media and say “I use vague terms so it’s okay.” All while they use those same devices to access their personal social media accounts or take photos that keep all the EXIF data.

How to be in control of your data and privacy

One certain way to be in full control of your data is to stop producing it by going completely off grid. Yet for most of us that is an unrealistic solution. So instead lets talk about managing your data and privacy and how we can be more mindful of what information we’re willing to give away for digital commodities.

For starters

For beginners just understand that whatever you upload on the internet is nearly impossible to remove completely and rather hard to hide. Everything you do online leaves a digital footprint that’s linked to your device and accounts that are linked to your device. More apps and services you use, more data points and connections you create. Now most of them are harmless and only improve your online experience by optimising the content and user experience. Yet keep in mind that same data that is used to keep you entertained can be used to manipulate you.

1. Read the Terms & Conditions

Choose the platforms you want to be a part of wisely. If you’re going to spend a lot of time on it, take some time to read about it. Look up their terms of services, privacy policies and other documentations. If you’re able to, read about the back end of the platform if such information is available. Are you willing to give your information to that platform? Can that information be used against you later on?

2. Restrain from using personal information

If the service doesn’t require you to identify yourself, consider using a variation of your name or change something about it. Use incorrect birth date and other information. Unless it’s a well known and secure platform, don’t give it any bank details. Be mindful of what information the customer support can and can not ask from you. Validate that the URL is correct and the SSL Certificate is being used (HTTPS:// means SSL Certificate is applied). Watch out for phishing sites and other forms of scams.

3. Choose what you give access to

By now apps and platforms are required to ask for your consent before accessing other apps or functions on the device. Don’t blindly grant access, but read about what you’re consenting to. If for example a calculator app is requesting access to your camera or messages, maybe something is slightly off about it.

4. Turn off personalised ads

Various platforms like Twitter allow you to turn off personalised ads. Although by disabling that function you will get random ads that may not be of any interest to you – you cut out a small portion of manipulation that is being bestowed upon you on daily basis.

5. Turn off location tracking

You can do it globally or turn it off for specific apps. If an app doesn’t need your location to function – don’t give it access to it. Most apps collect that data by default when in reality they have no business knowing when and where their calculator app being used.

6. Use a VPN

VPN is good for concealing your location and IP. If you want to hide your identity and location while searching for things online. Or you just don’t want to get targeted ads about coffee machines after you googled something about coffee. It’s also good for accessing location restricted content on Netflix. 

7. Use other browsers and search engines

There are more search engines than just Google, Bing, Yahoo and Yandex. There’s DuckDuckGo (which I would no longer vouch for) and there’s my favourite Brave Browser with its own search engine, ad block and other fun features like mining localised crypto by viewing specific ads. Oh and then there’s good old Tor Browser.

8. Install an antivirus

There’s a lot of different antivirus software that can be installed on computers as well as smartphones. It’s a good way to keep an eye out for malware, viruses and spyware that can be injected into your machine via links, files and other means.

9. Turn off Save Password in your browser

If you’re reading this, you’re probably not a big cyber security geek. Therefore maybe it’s not the best idea for your probably insecure browser to have access to your passwords and card details.

10. Choose what you share online

As with sharing your personal information and bank details on the internet. Same goes for putting your personal life on display. Before you post something about yourself, your friends or relatives, take a moment to think. Should this information be shared online? Is there any way it could cause harm or discomfort later on? Maybe you shouldn’t post that picture where you’re posing with money or maybe don’t share the street you’re living on. Maybe your political views should remain private to you as well?

11. Update your devices and software

Yes updates may include internal features that may collect your data. But at least in this case you’re willingly giving it up for the service you’re using. On the other hand updates provide security improvements which protect you from external threats. Hackers can exploit old software, breach the security measures and access your data without your consent. And they most definitely will sell your information to people you won’t want to have it.

12. Don’t install sketchy applications

There are many weird apps and software that can be found on the internet. App Store and Google Play Store aren’t that safe either. Unless you really need the application, don’t install it. Even if you need it, look if it’s being updated often enough, read the reviews and do a couple Google searches to see if it has any negative articles about it or are there any alternatives to it. Sketchy software can be disguised as simple games or low quality utility apps. Without raising much suspicion, they may collect your data or interact with your device in ways you wouldn’t want it to.

Removing unwanted data from search engines

If you’ve been on the internet for a long time, chances are there are some things you’d like to remove. Maybe you’ve forgotten a password from your old social media account. Maybe there’s some article where you no longer want to be mentioned. Maybe an old awkward photo comes up when your name is being searched on Google.

There are some tools, resources and laws that can help you restore, remove or hide those things. Most of those tools are free and can be managed by you yourself, but when using those you’ll need some time and effort to see the results. On the other hand there are paid services which either cost a lot or have a decent monthly subscription model. Regardless I will share some of both so you can see and decide for yourself.

You can also email webmasters or customer supports directly. Write a legal paper referring to GDPR “Right to be forgotten” and send it. If they don’t act upon your request, you can file a lawsuit.

Follow on social media

Sources & Referencecs

Alex
Author: Alex

I’ve spend a decade working in advertising, social media and cultural industries, which have given me great insights into what’s going on behind the scenes.