nullpay.
All practices

Where to start

Your privacy checklist, ordered by impact.

Start at the top and work down. The easiest, highest-impact changes come first. Each step builds on the previous ones. You don't have to do everything — even the first five make a real difference.

Progress

0/31

0%

  1. Private Search EngineBrowsingQuick win

    Your search queries reveal health concerns, political views, financial stress, and relationship problems. Google retains and profiles every search — it knows more about you than your closest friends.

  2. Disable Advertising IDDeviceQuick win

    Your phone's advertising ID (IDFA on iOS, GAID on Android) is a persistent identifier shared with every app. Location data brokers like Fog Data Science use it to build movement profiles sold to law enforcement. It's a social security number for ads.

  3. Encrypted MessagingMessagingQuick win

    SMS and standard messaging are plaintext for your carrier. WhatsApp has E2EE but Meta collects metadata (who, when, how often). Your messaging app choice determines who can read your conversations and who profits from the social graph they build.

  4. Password ManagerIdentityQuick win

    Without a password manager, you're reusing passwords or using weak ones. Credential stuffing attacks exploit exactly this — breached passwords from one site tried everywhere else. A password manager is the highest-leverage privacy tool you can adopt.

  5. 2FA HierarchyIdentityQuick win

    SMS 2FA is vulnerable to SIM swapping — a trivial social engineering attack where someone convinces your carrier to transfer your number. Not all 2FA is equal: SMS < TOTP < hardware keys.

  6. Email AliasesEmailQuick win

    Using one email everywhere creates a universal identifier. A data breach at Service A exposes your presence on Service B. One address per service means zero cross-service correlation.

  7. Encrypted DNSNetworkQuick win

    DNS queries are plaintext by default. Even with HTTPS, your ISP sees every domain you resolve. HTTPS encrypts the content of your connection, but the destination leaks through DNS — like sending a sealed letter with the address visible.

  8. Encrypted NotesStorage & NotesQuick win

    Apple Notes, Google Keep, Notion, and Evernote can read your notes. Journals, passwords, medical notes, legal strategies — stored in plaintext on someone else's server. Your most private thoughts deserve encryption.

  9. App Permissions AuditDeviceQuick win

    Over-permissioned apps harvest data far beyond their function. A flashlight app reading your contacts. A weather app tracking your location 24/7. Each unnecessary permission is a data exfiltration channel.

  10. Browser Extensions AuditBrowsingQuick win

    Browser extensions can read every page you visit, modify requests, and exfiltrate data. The Stylish extension sold browsing history of 2M+ users. Each extension is a potential backdoor you installed yourself.

  11. Private browsing only clears local history and cookies when you close the window. Your ISP, employer, and every site you visit still see everything. Google settled a $5B lawsuit over misleading users about this.

  12. Even with end-to-end encryption, email metadata — who emailed whom, when, and subject lines — is visible to servers. Metadata reveals your social graph, communication patterns, and relationships. Everyone reads envelopes.

  13. Wi-Fi Probe RequestsNetworkQuick win

    Your phone broadcasts the names of previously connected networks. An attacker nearby learns: "home_wifi_john", "Marriott_NYC", "hospital_guest". This is physical-world location history leaking from your pocket.

  14. Contacting a service to delete your data confirms you have an account. In adversarial contexts (journalist, activist), the deletion request itself is evidence of association. The privacy action reduces privacy.

  15. Cloud Backup AuditDeviceIntermediate

    Full-disk encryption on your phone is moot if iCloud or Google automatically backs up photos, messages, and app data in a form Apple/Google can access. Cloud backup is the #1 law enforcement access path. You encrypted your phone, then handed the keys to Apple.

  16. Encrypted Cloud StorageStorage & NotesIntermediate

    Google Drive, Dropbox, and iCloud can read your files. They comply with law enforcement requests, train AI on your documents, and profile you for advertising. Cloud convenience without encryption means your files belong to someone else.

  17. Gmail scans email for ad targeting. But paid doesn't automatically mean private — some paid providers still log IP addresses, cooperate broadly with law enforcement, or lack real end-to-end encryption. Don't conflate 'paid' with 'private'.

  18. Secure File SharingStorage & NotesQuick win

    Email attachments are unencrypted. Google Drive sharing links expose your Google account. WeTransfer scans uploads. Sending a file 'quickly' often means sending it through a company that can read, scan, and retain it indefinitely.

  19. Private CalendarStorage & NotesIntermediate

    Google Calendar knows your doctor appointments, therapy sessions, AA meetings, and custody schedules. Calendar metadata reveals health conditions, relationships, routines, and vulnerabilities — often more sensitive than email content.

  20. Social Login AuditIdentityIntermediate

    'Sign in with Google/Facebook' gives the identity provider a log of every service you use and when. One account suspension cascades everywhere. Convenience is surveillance.

  21. Messaging MetadataMessagingIntermediate

    Even E2EE messengers leak metadata: who you talk to, when, how often, group memberships. WhatsApp encrypts content but Meta harvests everything else. As former NSA and CIA director Michael Hayden stated: 'We kill people based on metadata' — referring to drone targeting decisions informed by communications metadata. The content is secondary.

  22. Browser FingerprintingBrowsingIntermediate

    Your browser is as unique as a fingerprint — even without cookies. Canvas, WebGL, fonts, and screen resolution combine into a near-unique identifier that tracks you across sites.

  23. Post-Cookie TrackingBrowsingIntermediate

    Third-party cookies are dying, but tracking adapted. Fingerprinting, CNAME cloaking, bounce tracking, and login-based tracking (Google/Facebook SSO) replaced cookies. The tracking industry moves faster than regulation.

  24. Browsing CompartmentalizationBrowsingIntermediate

    Your browser history is a medical record, a political profile, and a financial audit in one place. Visiting health sites, pharmacy pages, or support forums — all logged and potentially sold to data brokers, insurers, or employers.

  25. VPN Reality CheckNetworkIntermediate

    A VPN shifts trust from your ISP to the VPN provider. 'No-log' is marketing unless independently audited. If the VPN logs, you've just moved surveillance from one entity to another — and potentially a less regulated one.

  26. Phone Number HygieneDeviceIntermediate

    Your phone number is persistent, tied to real identity (SIM registration laws in EU), and used as recovery/2FA everywhere. SIM swap attacks exploit this. Phone numbers are more dangerous than email addresses as identifiers — and harder to change.

  27. The Username GraphIdentityIntermediate

    Reusing usernames across platforms creates a public link graph. OSINT tools like Sherlock and Maigret automate this in seconds. Passwords get all the attention, but usernames are the overlooked attack surface — they're public by design.

  28. Subscription Timing PrivacyPaymentIntermediate

    Starting a VPN right after a news event, subscribing to encrypted email after a breakup, signing up for a health app after a diagnosis — the timing of subscriptions correlates with life events. Data brokers perform temporal correlation analysis.

  29. Even with encrypted DNS, the TLS handshake's Server Name Indication (SNI) sends the destination domain in plaintext. Your ISP can still see which sites you visit. Encrypted Client Hello (ECH) fixes this, but adoption is patchy.

  30. Router SecurityNetworkAdvanced

    ISP-provided routers often have remote management backdoors, outdated firmware, and default credentials. Everyone secures their laptop but nobody secures the box everything flows through. Your router is the weakest link.

  31. De-Googled AndroidDeviceAdvanced

    Stock Android phones home to Google constantly — location, app usage, diagnostics, Wi-Fi networks. De-Googled ROMs remove this telemetry while maintaining security. If you care about mobile privacy, this is the most impactful change.

Tools set up? Protect the payment link too.

nullpay. severs the connection between your identity and the services you subscribe to.

Disclosure: NullPay is this site's product.