Where to start
Your privacy checklist, ordered by impact.
Start at the top and work down. The easiest, highest-impact changes come first. Each step builds on the previous ones. You don't have to do everything — even the first five make a real difference.
Progress
0/31
0%
Your search queries reveal health concerns, political views, financial stress, and relationship problems. Google retains and profiles every search — it knows more about you than your closest friends.
2 minRiskYour phone's advertising ID (IDFA on iOS, GAID on Android) is a persistent identifier shared with every app. Location data brokers like Fog Data Science use it to build movement profiles sold to law enforcement. It's a social security number for ads.
2 minRiskSMS and standard messaging are plaintext for your carrier. WhatsApp has E2EE but Meta collects metadata (who, when, how often). Your messaging app choice determines who can read your conversations and who profits from the social graph they build.
10 minRiskWithout a password manager, you're reusing passwords or using weak ones. Credential stuffing attacks exploit exactly this — breached passwords from one site tried everywhere else. A password manager is the highest-leverage privacy tool you can adopt.
15 minRiskSMS 2FA is vulnerable to SIM swapping — a trivial social engineering attack where someone convinces your carrier to transfer your number. Not all 2FA is equal: SMS < TOTP < hardware keys.
10 minRiskUsing one email everywhere creates a universal identifier. A data breach at Service A exposes your presence on Service B. One address per service means zero cross-service correlation.
10 minRiskDNS queries are plaintext by default. Even with HTTPS, your ISP sees every domain you resolve. HTTPS encrypts the content of your connection, but the destination leaks through DNS — like sending a sealed letter with the address visible.
5 minRiskApple Notes, Google Keep, Notion, and Evernote can read your notes. Journals, passwords, medical notes, legal strategies — stored in plaintext on someone else's server. Your most private thoughts deserve encryption.
15 minRiskOver-permissioned apps harvest data far beyond their function. A flashlight app reading your contacts. A weather app tracking your location 24/7. Each unnecessary permission is a data exfiltration channel.
10 minRiskBrowser extensions can read every page you visit, modify requests, and exfiltrate data. The Stylish extension sold browsing history of 2M+ users. Each extension is a potential backdoor you installed yourself.
10 minRiskPrivate browsing only clears local history and cookies when you close the window. Your ISP, employer, and every site you visit still see everything. Google settled a $5B lawsuit over misleading users about this.
5 minRiskEven with end-to-end encryption, email metadata — who emailed whom, when, and subject lines — is visible to servers. Metadata reveals your social graph, communication patterns, and relationships. Everyone reads envelopes.
5 minRiskYour phone broadcasts the names of previously connected networks. An attacker nearby learns: "home_wifi_john", "Marriott_NYC", "hospital_guest". This is physical-world location history leaking from your pocket.
5 minRiskContacting a service to delete your data confirms you have an account. In adversarial contexts (journalist, activist), the deletion request itself is evidence of association. The privacy action reduces privacy.
5 minRiskFull-disk encryption on your phone is moot if iCloud or Google automatically backs up photos, messages, and app data in a form Apple/Google can access. Cloud backup is the #1 law enforcement access path. You encrypted your phone, then handed the keys to Apple.
15 minRiskGoogle Drive, Dropbox, and iCloud can read your files. They comply with law enforcement requests, train AI on your documents, and profile you for advertising. Cloud convenience without encryption means your files belong to someone else.
20 minRiskGmail scans email for ad targeting. But paid doesn't automatically mean private — some paid providers still log IP addresses, cooperate broadly with law enforcement, or lack real end-to-end encryption. Don't conflate 'paid' with 'private'.
20 minRiskEmail attachments are unencrypted. Google Drive sharing links expose your Google account. WeTransfer scans uploads. Sending a file 'quickly' often means sending it through a company that can read, scan, and retain it indefinitely.
5 minRiskGoogle Calendar knows your doctor appointments, therapy sessions, AA meetings, and custody schedules. Calendar metadata reveals health conditions, relationships, routines, and vulnerabilities — often more sensitive than email content.
20 minRisk'Sign in with Google/Facebook' gives the identity provider a log of every service you use and when. One account suspension cascades everywhere. Convenience is surveillance.
20 minRiskEven E2EE messengers leak metadata: who you talk to, when, how often, group memberships. WhatsApp encrypts content but Meta harvests everything else. As former NSA and CIA director Michael Hayden stated: 'We kill people based on metadata' — referring to drone targeting decisions informed by communications metadata. The content is secondary.
15 minRiskYour browser is as unique as a fingerprint — even without cookies. Canvas, WebGL, fonts, and screen resolution combine into a near-unique identifier that tracks you across sites.
15 minRiskThird-party cookies are dying, but tracking adapted. Fingerprinting, CNAME cloaking, bounce tracking, and login-based tracking (Google/Facebook SSO) replaced cookies. The tracking industry moves faster than regulation.
20 minRiskYour browser history is a medical record, a political profile, and a financial audit in one place. Visiting health sites, pharmacy pages, or support forums — all logged and potentially sold to data brokers, insurers, or employers.
15 minRiskA VPN shifts trust from your ISP to the VPN provider. 'No-log' is marketing unless independently audited. If the VPN logs, you've just moved surveillance from one entity to another — and potentially a less regulated one.
20 minRiskYour phone number is persistent, tied to real identity (SIM registration laws in EU), and used as recovery/2FA everywhere. SIM swap attacks exploit this. Phone numbers are more dangerous than email addresses as identifiers — and harder to change.
30 minRiskReusing usernames across platforms creates a public link graph. OSINT tools like Sherlock and Maigret automate this in seconds. Passwords get all the attention, but usernames are the overlooked attack surface — they're public by design.
20 minRiskStarting a VPN right after a news event, subscribing to encrypted email after a breakup, signing up for a health app after a diagnosis — the timing of subscriptions correlates with life events. Data brokers perform temporal correlation analysis.
10 minRiskEven with encrypted DNS, the TLS handshake's Server Name Indication (SNI) sends the destination domain in plaintext. Your ISP can still see which sites you visit. Encrypted Client Hello (ECH) fixes this, but adoption is patchy.
10 minRiskISP-provided routers often have remote management backdoors, outdated firmware, and default credentials. Everyone secures their laptop but nobody secures the box everything flows through. Your router is the weakest link.
30 minRiskStock Android phones home to Google constantly — location, app usage, diagnostics, Wi-Fi networks. De-Googled ROMs remove this telemetry while maintaining security. If you care about mobile privacy, this is the most impactful change.
60 minRisk
Tools set up? Protect the payment link too.
nullpay. severs the connection between your identity and the services you subscribe to.
Disclosure: NullPay is this site's product.