We interact with each other and store an increasing amount of data about our real-world lives on the internet. Despite an assumption of privacy and data ownership, we have little to no control over the systems and what’s done with our information. Companies use our data to influence us. It’s critical to understand internet privacy.
Why is online privacy important?
- Have private online space.
- Avoid rampant marketer tracking.
- Grow healthy online relationships.
- Avert pervasive government control.
- Force transparent law enforcement.
- Help prevent cybercrime victimization.
- Evolve your beliefs freely.
Let’s define these seven essential points in more detail. We’ve laid out actionable steps on what you can do to take control of your internet privacy.
Table of Contents
- 1. Personal Digital Space
- 2. Marketer Tracking
- 3. Comparison Culture and Social Reputation
- 4. Government Control
- 5. Unjust Law Enforcement / Civil Rights
- 6. Cybercrime
- 7. Second Chances
- Final Thoughts
1. Personal Digital Space
People need personal digital space to create, consume, and store data privately.
Your home is an essential private physical space where you can relax, entertain, and attend to life’s necessities.
Having privacy in your digital spaces is equally vital. Online privacy ensures we have places to create, think, explore, and learn without the intrusion or judgment of outside influence.
Previously limited to the physical world like schools and work, interconnected computers and mobile phones give us virtual spaces to attend to our minds and transact with each other at any time and any place.
Unlike your private physical space like the home, the digital realm is almost infinitely large.
What You Can Do
The best way to begin protecting your internet privacy is by limiting your digital footprint. Security researchers also refer to your digital footprint as an attack surface. It’s the number of possible points where an attacker can gain access to your information.
You can reduce your attack surface by:
- Limiting the number of new online accounts you open. For example, pause to consider the importance of a new website or service before signing up.
- Bringing online data offline. For example, pull photos to local storage and closing online accounts leveraging GDPR-type requests for full data deletion.
- Limiting future data you put online. For example, sensitive personal information like social security number, credit card data, medical records, etc. should remain offline or limited record sources.
There’s an inevitable need to keep a smaller digital footprint secure and private. Finding and switching to service providers that respect privacy and provide top-notch cybersecurity is like building a secure home where you feel safe and protected from the outside world.
You can also replace hardware and software and leverage recommended technologies that are privacy-centric.
2. Marketer Tracking
Users need not worry that marketers will track and profile them based on online habits.
Many of us are “banner blind” ignoring online advertisements. But occasionally, we’ve all experienced that creepily-relevant ad that shows up while surfing or watching a video.
While most users are concerned about online privacy, we’re also responding to personalized experiences. Sigmoid concluded that behavioral-targeted advertising converts 4% better.
And in fact, an Adlucent survey found that
71% of respondents said they would prefer ads that are tailored to their personalized interests and shopping habits.Adlucent, May 12, 2016
But as marketers follow us around the internet, they’re collecting details on us which we cannot control. Users are beginning to expect a degree of balance between profiling and privacy.
Users are already turning the tides as Statistica reported that ad-blocking rates were around 27% in 2018 and rising.
What You Can Do
The simplest thing you can do is to stop using web browsers offered by Big Tech like Google Chrome, Microsoft Edge, and Apple Safari.
More advanced users should opt for compartmentalization using multiple browsers, each for a different set of tasks.
Social interactions and relationships need respect to form without being exploited.
Humans aren’t great at judging things in isolation. Our minds look to compare things we come across either in a given moment or against our experiences.
Before the information age, we checked our status within our tribe (family, friends, neighbors) to those geographically nearest us. Sometimes we were pulled in by traditional media and advertising. But, we recognized the source and authenticity hanging a different set of values on those comparisons.
With the rise of social media, we assess our possessions, relationships, and choices against an ever-growing set of standards from far-reaching geographies and socio-economic levels by real people. The problem is that even these real-people posts on social networks are often sanitized and framed to look good online, which further slants away from an honest comparison.
Not only are we comparing ourselves to what others post, but we’re also freely giving away parts of our private lives to gain social reputation. To achieve this social currency, we’re over-sharing details of our personal lives, fueling our manipulation.
The oft-cited Cambridge Analytica scandal highlights how we are being influenced and manipulated at a deep level based on the information we freely release to social networks.
What You Can Do
We humans will keep comparing our lives to others as we have for generations.
Fortunately, Generation Z and Generation Alpha are already filtering their consumption of social media.
Millennials compare themselves more to peers and suffer from FOMO [fear of missing out] culture whereas Gen Z values individuality.-Lauren Durfy, Post Beyond
For Millennials and earlier generations, the simple solution to the growing problems hidden within comparison culture and social reputation scoring is to unplug from social networks. Try a social media detox moving towards not using social media at all.
Netflix has an excellent dissection of social media via its original documentary, The Social Dilemma.
4. Government Control
Governments need to respond to citizens instead of tracking and manipulating them.
The most straightforward example of government monitoring and control of citizens is mainland China’s Skynet and Social Credit System.
China’s Skynet is the largest video surveillance network in the world, with 416 million CCTV cameras tracking their 1.4 billion citizens, according to Comparitech. That’s close to 1 camera for every 3 people.
Skynet is an integral part of China’s Social Credit System, a broad and unified database tracking a point tally on each citizen. Negative factors reduce citizens’ access to public services, jobs, schools, travel, and financial system.
In addition to the Social Credit System, China is also cataloging the DNA of 70 million of its male citizens as reported by Springer Nature, ostensibly to deter and solve crime. The collection is voluntary, but refusal means that a person is added to a blacklist, depriving the citizen and his family of traveling or going to hospitals.
The American media compared the credit reporting agencies’ scoring to China’s Social Credit System, noting the social privilege similarities to a higher credit score.
What You Can Do
Government is a hard thing to control, especially when battling the history and structure of the institution.
The honest and best answer here is to immigrate to a country and municipality that values individual privacy and freedoms. You might also separate your citizenship and your residency to regain control over how governments treat you.
Check out this YouTube playlist from the Nomad Capitalist channel.
The other two alternatives are
- Stand with those groups fighting for personal privacy protection by either volunteering, contributing money, or offering your expertise and resources to their causes.
- Limit how much contact you have with the government. Restrict your business with intermediaries who frequently report to the government like banks and private companies that freely relinquish user personal information.
5. Unjust Law Enforcement / Civil Rights
Law enforcement needs to use facts and transparent actions instead of mined, derived, or prejudice evidence.
In 2020, NBC News reported on a Flordia resident who was the prime suspect in a burglary investigation. His local law enforcement compelled Google to release his location data, which showed his bicycling route passed the crime scene several times. This example of data mining led to an incorrect accusation at great personal expense.
A couple of years earlier, NBC also reported on uncover law enforcement using fake Facebook accounts to track protestors against the Facebook terms of service. An American Civil Liberties Union (ACLU) lawsuit was filed against the officer. While the legal foundations for the use of technology in investigations evolve, social media will continue to be a gray area for civil rights and privacy abuses.
What You Can Do
Be less convenient with your personal information. Don’t store personal information or telemetry like location in the cloud or with companies that are increasingly-compelled to hand over your data.
Leave your primary smartphone at home when attending public rallies. Consider using a secondary or burner phone to stay in contact.
Individuals need to know that low online privacy leads to cybercrime victimization.
Many of the world’s pre-information age crimes got a boost in efficiency and frequency as cybercriminals are now able to launch attacks remotely. Individuals now have to protect themselves from internet-based versions of:
- Financial Fraud: “when someone deprives you of your money, capital, or otherwise harms your financial health through deceptive, misleading, or other illegal practices.” (VictimConnect)
- Identity Theft: “a course of conduct directed at a specific person that would cause a reasonable person to feel fear.” (VictimConnect)
- Scams: “In cybersecurity, scams are attempts to obtain money or something else of value through dishonest means, mostly over the Internet, though sometimes with a phone call.” (Malwarebytes)
- Spam / Unwanted Mail: “undesired communication, often an email or call, that gets sent out in bulk.” (Malwarebytes)
- Cyber Stalking / Cyber Bullying: “the use of technology (most often, the Internet!) to make someone else afraid or concerned about their safety” (Cyberbullying.org)
- Property Damage: “injuries to a person’s property resulting from an act of nature, or from another person’s negligent or willful misconduct.” (Legal Dictionary) Property damage includes hardware and physical property that can be remotely damaged through internet-connected/internet of things (IoT) devices.
What You Can Do
Adequate operational security (how securely you use) with technology is the key to avoid being a victim of cybercrime. Here are some tips
- Store as little personal information like phone numbers, credit cards, etc. in online accounts.
- Refrain from storing personal data online or, at minimum, use data encryption to protect it.
- Keep your computers and mobile device operating systems and software/apps updated.
- Regularly scan your PC or laptop for malware and viruses.
- Ensure your devices are physically secured.
- Use strong passwords and two-factor authentication.
- Monitor your finances regularly.
- Scrutinize your email and text messages looking for odd patterns before clicking.
7. Second Chances
People need the room to mature and change their points of view through second chances.
We, as individuals, are not static in our thoughts and feelings. We evolve our point of view as we mature and gain life experience.
As we record our experiences and air our opinions online, we inevitably need a second chance….or third or fourth..to change how we view the world and move beyond our past selves.
Internet privacy supports this growth. When systems respect users properly, we’re afforded the ability to reinvent ourselves over time. In the instances where our private conversations or past mistakes return, we can reflect on them without the need to justify them to new audiences.
What You Can Do
Be compassionate towards others’ opinions and points of view.
On the receiving side, admit to your change of heart and steer conversations towards mutual understanding or “agree to disagree” without confrontational stances.
Alternatively, take care of what you post or send online. Know in advance the visibility of your content via privacy settings and the repercussions of possible data breaches.
Online privacy must become a forefront consideration as we move more of our lives into the Internet. In the same way we expect personal privacy in the offline world, we cannot have the same assumptions in the digital realm. We have to build our privacy into our online habits and our relationship with technology and the tech companies providing the solutions we use daily.
This video (28m58s@1x) is a complete guide for beginners and novice users, showing how better to control your internet privacy.