Archives - Privacy


Explore alternatives to Facebook’s main mobile apps

Facebook and Messenger are two of the most common mobile apps, but they both ask for extensive permissions and consume a lot of battery. One alternative is to use the Facebook mobile website, which is less resource-intensive and minimalist. You can also find third-party messaging clients like Friendly that handle all of Messenger’s functionality in […]

Review your financial statements regularly for anomalies

Some malware and viruses can harvest the login information and personal details necessary to conduct fraudulent transactions in your name. For that reason, you should always scan your financial statements for any mysterious charges so you can alert the institution and take corrective steps like changing your passwords.

Carefully dispose of old devices and drives

You might have heard that deleting something from a device or hard disk drive doesn’t really erase it, and that’s true. Accordingly, be careful if you ever throw away a hard drive or resell an old PC since your old activities and files are theoretically still recoverable. It might make sense to use a deep […]

Check for evidence that your information is being encrypted

To prevent attackers from stealing your personal information, online submissions should be encrypted so that the appropriate recipient can only read it. Many sites use Secure Sockets Layer (SSL) or Hypertext Transport Protocol Secure (https). A lock icon in the bottom right corner of the window indicates that your information will be encrypted. Some sites […]

Don’t post photos of your boarding passes to social media

If you’re flying somewhere, you might feel compelled to post a photo or video of your boarding passes to a social network like Instagram. It’s a risky move, though, as strangers can use the information contained in its various codes to change your contact information with the airline or even alter your reservation. Handle your […]

Avoid getting too personal in emails

Just as it’s impossible to unring a bell, it’s difficult to control sensitive information divulged in emails, as it might be intercepted or surfaced in searches even long after the fact. Don’t share personally identifiable information over email if at all possible. In particular, do not hand it over in response to unsolicited requests from […]