国产视频

The Thread

How to Protect Your Privacy Online: Five Tips from Tech Policy Experts

How to Protect Your Privacy Online_02202025
DrAfter123 via Getty Images / 国产视频

In today鈥檚 digital world, our personal data is more exposed than we may realize. Almost every click, like, or post leaves digital traces that advertisers can collect or buy, governments can access, and hackers could steal. Recently, growing concerns over the Department of Government Efficiency鈥檚 (DOGE) repeated access to the protected data of millions of Americans has renewed interest in how our private data is used.

Improving the security of your data online starts with It鈥檚 a simple but powerful idea: Only the information needed for a specific purpose should be created, stored, or shared by a platform or service. Platforms are incentivized to collect as much data as possible, even if that鈥檚 not in the users鈥 interest. Of course, to fully enjoy the modern internet, sharing some data is unavoidable. But data that doesn鈥檛 exist , stolen, sold, or misused. Protecting your privacy isn鈥檛 an all-or-nothing proposition鈥攅ven small steps can make a big difference.

In addition to making yourself less visible to advertisers, data minimization can help insulate you from the increasing threat of being used to , harass, or people. Taking proactive steps to protect your privacy online, where you can, is more important than ever.

Here are five practical actions to safeguard your privacy online.

1. Use End-to-End Encrypted Communication Tools

is the technical term for scrambling data so that only the intended recipients can read it. Encryption might sound highly technical, but many apps that provide encryption for messaging are simple to use.

Messaging apps offer varying levels of encryption, but Signal, an open-source, encrypted messaging service, is generally considered the gold standard by privacy experts. Take two recent examples. After recent revelations of a Chinese operation that , the Cybersecurity and Infrastructure Security Agency (CISA) . Similarly the have recommended using Signal for all day-to-day communications, including telephone calls.

Using encryption tools adds a vital layer of privacy, especially when sharing sensitive information.

2. Use Privacy-Focused Web Browsing Tools聽

Incorporating privacy tools into your everyday online habits is one of the easiest ways to protect your privacy. These tools limit tracking, reduce data collection, and give you more control over your digital footprint. While few tools are perfect, some are better than others. To start, you should:

  • Use privacy-focused browsers: Your browser is often the first point of contact for tracking technologies, including cookies, fingerprinting, and ads. Switching to a privacy-focused browser, such as Firefox, gives you built-in privacy protections, including ad-blocking, tracker prevention, and enhanced security. Note: Browsing in 鈥渋ncognito mode鈥 or 鈥減rivate mode鈥 and using a privacy-focused web browser are not equivalent. While incognito mode has some privacy benefits in that it deletes cookies and browsing history, preventing other users on the same computer from seeing your browsing history, determined websites can still track you.
  • Use privacy-focused search engines and browser extensions: Popular search engines like Google track your searches, build detailed profiles about you, and serve targeted ads based on that data. Privacy-focused search engines like DuckDuckGo and Startpage don鈥檛 collect your personal data or track your activity. For even more control, you might install privacy-enhancing browser extensions, including uBlock Origin, Privacy Badger, or HTTPS Everywhere.
  • Use disposable email services: Every time you sign up for a new service or website, you鈥檙e sharing your email address, which can be sold, leaked, or spammed. Using disposable email services鈥攕uch as ProtonMail, addy.io (formerly AnonAddy), or SimpleLogin鈥攁llows you to create temporary or alias addresses, protecting your personal email from being sold or leaked.

If you want to keep your data secure while accessing the internet, ditch the standard web browsers for one of the privacy-focused alternatives above.

3. Use a VPN

A (VPN) sends your internet traffic through one or more servers before sending it on to the wider internet, making it appear as if you鈥檙e browsing from a different location.聽VPNs should always be used on public Wi-Fi networks, which often and your data.

Using a VPN consistently everywhere else limits tracking, as many VPNs allow you to select where it looks like you鈥檙e coming from, and frequently changing your location can mask your true location. Be sure to choose a reputable VPN provider like Proton VPN, RiseupVPN, Mullvad, or ExpressVPN, as some free VPN services may lack encryption or sell user data, undermining their privacy purpose.

4. Limit Your Social Media Footprint

As major players in the surveillance economy, social media platforms collect massive amounts of personal data, which fuels targeted advertising. and events involving Musk鈥檚 own platform, X (formerly Twitter), have only . The risks now extend beyond tech corporations, as Musk鈥檚 ability to access private user information deepens these concerns鈥攅specially as AI makes it easier to target individuals.

To protect yourself:

  • Adjust your privacy settings on platforms like Facebook, Instagram, LinkedIn, and TikTok to limit data collection.
  • Consider switching to platforms with more user control, like or .
  • Be cautious about what you share publicly. Even seemingly harmless details like your location or your children鈥檚 school can be used maliciously鈥攅specially if you become a .
  • Clean up your digital history by deleting old posts. Regularly removing outdated content can help prevent it from being used against you.

Remember: Our social media presence can feel ephemeral, but most of what is shared on these platforms is available unless you delete it.

5. Review Permissions for Websites and Apps You Use (and Those You Don鈥檛)

It鈥檚 good practice to get into the habit of reviewing privacy settings on your web browser and favorite websites, including those endless cookie consent pop-ups. Wherever possible, disable features that track your location, monitor your behavior, or collect unnecessary data. (In short, reject the cookies!)

Additionally, apps you no longer use may still retain access to your personal data, including location and camera permissions, so regularly delete unused apps and revoke unnecessary permissions to limit data exposure. If you aren鈥檛 using an app, you should delete it鈥攅ven the ones pre-loaded on your phone. This simple action reduces the amount of data available for apps to collect and share.

For the apps you do keep, take the time to review and disable any unnecessary permissions. Does a weather app really need constant access to your location? Does a simple flashlight app need to access your microphone? Limiting permissions not only protects your privacy, but also reduces the risk of apps exploiting your data. By regularly deleting unused apps and managing permissions, you regain some control over how much personal information your devices expose.

Start Small, Make an Impact

These five steps are a starting point鈥攁nd while they might not cover every possible privacy measure, they offer impactful actions you can take right now. Privacy experts may debate the 鈥渢op five,鈥 but the key is to recognize that every small step adds up. These actions are relatively easy to implement and can go a long way in winning you back some privacy.

The lack of online privacy is by design, driven by tech companies that are trying to extract as much value from your data as possible. With technology billionaires鈥 growing influence in the government and the ongoing efforts to dismantle institutions and regulations that protect civil liberties, the stakes for our personal information are higher than ever. We must demand more from both technology companies and lawmakers, but in the meantime, these actions can help you regain some control over your digital footprint.

More 国产视频 the Authors

nat-meysenburg_person_image.jpeg
Nat Meysenburg

Technologist, Open Technology Institute

Sydney Saubestre
Sydney_Saubestre_1.original (1)
Sydney Saubestre

Senior Policy Analyst, Open Technology Institute, 国产视频

Programs/Projects/Initiatives

How to Protect Your Privacy Online: Five Tips from Tech Policy Experts