<?xml version="1.0" encoding="UTF-8" ?> <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel> <title>Privacy Guides</title><description>Privacy Guides is the most popular &amp; trustworthy non-profit privacy resource to find privacy tools and learn about protecting your digital life.</description><link>https://www.privacyguides.org/articles/</link><atom:link href="https://www.privacyguides.org/articles/feed_rss_updated.xml" rel="self" type="application/rss+xml" /> <docs>https://github.com/privacyguides/privacyguides.org</docs><language>en</language> <pubDate>Thu, 27 Nov 2025 18:02:57 -0000</pubDate> <lastBuildDate>Thu, 27 Nov 2025 18:02:57 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.7</generator> <image> <url>None</url> <title>Privacy Guides</title> <link>https://www.privacyguides.org/articles/</link> </image> <item> <title>Email Security: Where We Are and What the Future Holds</title> <author>fria</author> <category>Email</category> <category>Explainers</category> <description>&lt;p&gt;&lt;img alt=&#34;Email icon opening with an alert message inside&#34; src=&#34;../../../../assets/images/email-security/cover.png&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: fria / Privacy Guides&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Email is ubiquitous. If you want to function in modern society, you pretty much have to have an email address. What was originally just a simple protocol to send messages between machines has morphed beyond what it was originally intended for into the &lt;em&gt;de facto&lt;/em&gt; authentication, identity, and &#34;secure&#34; communication channel for almost all technology users today. It&#39;s been updated many times to fix security issues and there are more updates to come, but is it worth trying to fix a decades-old protocol, or should we scrap it all and start over?&lt;!-- more --&gt;&lt;/p&gt; &lt;h2 id=&#34;current-state-of-email-security&#34;&gt;Current State of Email Security&lt;/h2&gt; &lt;p&gt;The &lt;a href=&#34;https://www.rfc-editor.org/rfc/rfc5321.html&#34;&gt;&lt;strong&gt;Simple Mail Transport Protocol (&lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt;)&lt;/strong&gt;&lt;/a&gt; is the standard used to send emails.&lt;/p&gt; &lt;p&gt;Over the years, multiple protocols have been introduced to fix security issues and improve the usability of email, resulting in a complex mess that we&#39;re still feeling the consequences of to this day.&lt;/p&gt; &lt;h3 id=&#34;encryption&#34;&gt;Encryption&lt;/h3&gt; &lt;p&gt;By default, there&#39;s no encryption in &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt;. Not transport encryption or end-to-end encryption, it&#39;s just a plaintext protocol.&lt;/p&gt; &lt;p&gt;To remedy this, several solutions have been created.&lt;/p&gt; &lt;h4 id=&#34;starttls&#34;&gt;STARTTLS&lt;/h4&gt; &lt;p&gt;&lt;a href=&#34;https://www.rfc-editor.org/rfc/rfc3207&#34;&gt;STARTTLS&lt;/a&gt; is a command that allows email clients to negotiate &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; encryption. Importantly, the negotiation phase happens in plaintext which leaves it vulnerable to attackers.&lt;/p&gt; &lt;p&gt;STARTTLS allows a bit more flexibility at the cost of some security. Since you don&#39;t really know if the recipient&#39;s email client supports &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; or not, it allows you to continue with the &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; session anyway if you want to.&lt;/p&gt; &lt;p&gt;Since it&#39;s just using &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt;, STARTTLS can&#39;t provide &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;, just transport encryption. The encryption looks something like:&lt;/p&gt; &lt;p&gt;Encrypted between your email client and your &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; server → decrypted at your &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; server → Encrypted between your &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; server and recipient&#39;s &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; server → decrypted at recipient&#39;s &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; server → encrypted between their &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; server and their &lt;abbr title=&#34;Post Office Protocol 3&#34;&gt;POP3&lt;/abbr&gt;/&lt;abbr title=&#34;Internet Message Access Protocol&#34;&gt;IMAP&lt;/abbr&gt; server → decrypted at their &lt;abbr title=&#34;Post Office Protocol 3&#34;&gt;POP3&lt;/abbr&gt;/&lt;abbr title=&#34;Internet Message Access Protocol&#34;&gt;IMAP&lt;/abbr&gt; server → encrypted between their &lt;abbr title=&#34;Post Office Protocol 3&#34;&gt;POP3&lt;/abbr&gt;/&lt;abbr title=&#34;Internet Message Access Protocol&#34;&gt;IMAP&lt;/abbr&gt; server and their email client → decrypted by their email client.&lt;/p&gt; &lt;pre class=&#34;mermaid&#34;&gt;&lt;code&gt;flowchart LR A[Email Client] --&amp;gt;|Optional TLS Encryption| B(SMTP Server) B --&amp;gt; |Optional TLS Encryption| C(Other SMTP Server) C --&amp;gt;|Optional TLS Encryption| D[POP3 or IMAP Server] D --&amp;gt;|Optional TLS Encryption| F[Other Party&#39;s Email Client]&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;At each point in the process &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; encryption is not guaranteed. Now consider that you can have multiple recipients with their own &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; servers as well, and you start to see how flimsy this protection can be. And since the initial negotiation is in plaintext, an attacker can simply strip away the STARTTLS command, preventing a secure connection from being established.&lt;/p&gt; &lt;p&gt;Authentication is left to another protocol to solve, this just handles the transport encryption.&lt;/p&gt; &lt;h4 id=&#34;smtps&#34;&gt;SMTPS&lt;/h4&gt; &lt;p&gt;Also known as &#34;Implicit &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt;&#34; (as opposed to the &#34;Explicit &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt;&#34; of STARTTLS), SMTPS starts with an encrypted connection, similar to &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;, removing the potential for an adversary to downgrade the connection.&lt;/p&gt; &lt;p&gt;The &lt;a href=&#34;https://datatracker.ietf.org/doc/html/rfc8314&#34;&gt;current&lt;/a&gt; recommendations are to use port 465 for SMTPS and port 587 for STARTTLS. Unfortunately, these ports aren&#39;t standardized and thus there is disagreement and confusion about what port should be used for SMTPS.&lt;/p&gt; &lt;p&gt;In the past, ports 25, 465, 587, and 2525 have all been used for &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; at various points. This lack of a standardized port means that you end up with services using different ports and being unable to establish a secure connection. Particularly, there is still confusion in some email providers whether to use port 465 or port 587 for SMTPS, although the current recommendation is port 465.&lt;/p&gt; &lt;h4 id=&#34;pop3s&#34;&gt;POP3S&lt;/h4&gt; &lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Post_Office_Protocol&#34;&gt;Post Office Protocol version 3&lt;/a&gt; or &lt;abbr title=&#34;Post Office Protocol 3&#34;&gt;POP3&lt;/abbr&gt; is a protocol for retrieving mail from a mail server. It&#39;s one of the ways your email client can show you your mail.&lt;/p&gt; &lt;p&gt;&lt;abbr title=&#34;Post Office Protocol 3&#34;&gt;POP3&lt;/abbr&gt; also supports implicit &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; over port 995, so it can be encrypted by default as well.&lt;/p&gt; &lt;h4 id=&#34;imaps&#34;&gt;IMAPS&lt;/h4&gt; &lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Internet_Message_Access_Protocol&#34;&gt;Internet Message Access Protocol&lt;/a&gt; or &lt;abbr title=&#34;Internet Message Access Protocol&#34;&gt;IMAP&lt;/abbr&gt; is another protocol for retrieving mail from a mail server.&lt;/p&gt; &lt;p&gt;Like SMTPS and POP3s, &lt;abbr title=&#34;Internet Message Access Protocol&#34;&gt;IMAP&lt;/abbr&gt; supports implicit &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt;. The implicit &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; port is 993.&lt;/p&gt; &lt;h4 id=&#34;openpgp&#34;&gt;&lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt;&lt;/h4&gt; &lt;p&gt;The above features only protect the email in transit and don&#39;t protect against the email providers involved, which is a massive security issue if you don&#39;t trust your email provider. On top of that, you as a user have no control over which parts of the chain are encrypted. If you want to be sure that no party in between you and your recipient can read or alter your emails, you need to use end-to-end encryption. Unfortunately, by default, email doesn&#39;t support end-to-end encryption.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://www.openpgp.org/about/&#34;&gt;Pretty Good Privacy (&lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt;)&lt;/a&gt; was originally created in 1997 by &lt;a href=&#34;https://www.privacyguides.org/videos/2025/05/08/when-code-became-a-weapon/&#34;&gt;Phil Zimmerman&lt;/a&gt;. While originally proprietary software, an open source version of &lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt; called &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; has been standardized by the &lt;a href=&#34;https://www.rfc-editor.org/rfc/rfc9580.html&#34;&gt;IETF&lt;/a&gt;. As you can imagine from software originally conceived in the 90s, the user experience isn&#39;t the smoothest.&lt;/p&gt; &lt;p&gt;Unlike modern messengers like &lt;a href=&#34;https://signal.org&#34;&gt;Signal&lt;/a&gt;, &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; requires you to &lt;a href=&#34;https://dev.to/adityabhuyan/how-to-generate-your-own-public-and-secret-keys-for-pgp-encryption-1joh&#34;&gt;manually manage your keys&lt;/a&gt;. This is a problem not only because it&#39;s cumbersome, but the security of &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; rests on protecting the private key. If the private key is compromised, your messages are compromised.&lt;/p&gt; &lt;p&gt;&lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt; also lacks &lt;a href=&#34;https://en.wikipedia.org/wiki/Forward_secrecy&#34;&gt;forward secrecy&lt;/a&gt;, meaning that if your private key is ever exposed, all previous messages you&#39;ve ever sent using that key are also exposed. All it takes is a slight user error for a catastrophic compromise.&lt;/p&gt; &lt;p&gt;&lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt; encryption also usually doesn&#39;t encrypt important metadata like &lt;code&gt;To&lt;/code&gt;, &lt;code&gt;From&lt;/code&gt;, &lt;code&gt;Cc&lt;/code&gt;, &lt;code&gt;Date&lt;/code&gt;, and &lt;code&gt;Subject&lt;/code&gt;, stored in the &lt;a href=&#34;https://en.wikipedia.org/wiki/Email#Message_header&#34;&gt;email header&lt;/a&gt;; usually, only the body of the email is encrypted, which can be a major privacy issue. What the email is about, who you are, and who you&#39;re messaging can all be revealed even with &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;. Some email clients use their hidden headers that can reveal more data about you.&lt;/p&gt; &lt;h4 id=&#34;smime&#34;&gt;S/MIME&lt;/h4&gt; &lt;p&gt;Another common option for email encryption is &lt;a href=&#34;https://www.digicert.com/faq/email-trust/what-is-smime-or-encrypted-email&#34;&gt;S/MIME&lt;/a&gt;, or Secure/Multipurpose Internet Mail Extensions. S/MIME works a bit like &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;, using &lt;a href=&#34;https://www.ssl.com/faqs/what-is-an-x-509-certificate/&#34;&gt;X.509 digital certificates&lt;/a&gt; and &lt;a href=&#34;https://www.digicert.com/blog/what-is-a-certificate-authority&#34;&gt;certificate authorities&lt;/a&gt; to encrypt and verify the authenticity of emails.&lt;/p&gt; &lt;p&gt;While a step up from the manual keys of &lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt;, S/MIME is still a pain to use, particularly because it usually requires purchasing and managing a certificate from a CA, which can be expensive and annoying. S/MIME also lacks forward secrecy just like &lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt;, so if there&#39;s ever a compromise of your private key, all previously sent messages are also compromised.&lt;/p&gt; &lt;p&gt;These issues make S/MIME nonviable for most people outside business settings.&lt;/p&gt; &lt;h4 id=&#34;web-key-directory&#34;&gt;Web Key Directory&lt;/h4&gt; &lt;p&gt;A problem with &lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt; is getting your public key out to people without manually exchanging keys. This problem can be solved with Web Key Directory (&lt;abbr title=&#34;Web Key Directory&#34;&gt;WKD&lt;/abbr&gt;), which allows you to upload your public &lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt; key to a server and clients that want to send &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; emails to you can ask that server to send you their public key.&lt;/p&gt; &lt;p&gt;You can read more on our &lt;a href=&#34;https://www.privacyguides.org/en/basics/email-security/?h=email#what-is-the-web-key-directory-standard&#34;&gt;email security&lt;/a&gt; page.&lt;/p&gt; &lt;h3 id=&#34;authentication&#34;&gt;Authentication&lt;/h3&gt; &lt;p&gt;&lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; by default essentially has no authentication and allows spoofing the &lt;code&gt;MAIL FROM&lt;/code&gt; header. Your email client will just blindly accept whoever the sender says they are without any authentication. Luckily, there are several solutions for this.&lt;/p&gt; &lt;p&gt;There are multiple methods that email providers can implement to verify the authenticity of an email sender.&lt;/p&gt; &lt;h4 id=&#34;spf&#34;&gt;SPF&lt;/h4&gt; &lt;p&gt;The first solution implemented was &lt;a href=&#34;https://datatracker.ietf.org/doc/html/rfc7208&#34;&gt;Sender Policy Framework (SPF)&lt;/a&gt;. SPF uses &lt;a href=&#34;https://www.cloudflare.com/learning/dns/dns-records/dns-txt-record/&#34;&gt;&lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; TXT records&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Just like the name sounds, a &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; TXT record allows you to store text in a &lt;a href=&#34;https://www.cloudflare.com/learning/dns/dns-records/&#34;&gt;&lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; record&lt;/a&gt;. Here&#39;s an example of what a &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; TXT record might look like:&lt;/p&gt; &lt;table&gt; &lt;thead&gt; &lt;tr&gt; &lt;th&gt;example.com&lt;/th&gt; &lt;th&gt;record type&lt;/th&gt; &lt;th&gt;value&lt;/th&gt; &lt;th&gt;TTL&lt;/th&gt; &lt;/tr&gt; &lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;@&lt;/td&gt; &lt;td&gt;TXT&lt;/td&gt; &lt;td&gt;&#34;color=blue&#34;&lt;/td&gt; &lt;td&gt;99999&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;p&gt;SPF lists all the servers that are authorized to send from a specific domain. When an email is received, it checks the sending server against the list of authorized servers for that domain. An SPF record might look like this:&lt;/p&gt; &lt;table&gt; &lt;thead&gt; &lt;tr&gt; &lt;th&gt;example.com&lt;/th&gt; &lt;th&gt;record type&lt;/th&gt; &lt;th&gt;value&lt;/th&gt; &lt;th&gt;TTL&lt;/th&gt; &lt;/tr&gt; &lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;@&lt;/td&gt; &lt;td&gt;TXT&lt;/td&gt; &lt;td&gt;&#34;v=spf1 ip4:200.56.78.99 ip4:156.67.109.43 include:_spf.google.com -all&#34;&lt;/td&gt; &lt;td&gt;99999&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;p&gt;The &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; addresses are the ones that are authorized to send email from this domain. The &lt;code&gt;include:&lt;/code&gt; tag denotes what third-party domains are allowed to send email on behalf of &lt;code&gt;example.com&lt;/code&gt;. The third-party SPF record will be checked and included in the allowed &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; addresses.&lt;/p&gt; &lt;p&gt;While a good start, SPF still has several glaring weaknesses. Since it relies on &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt;, an attack on the &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; infrastructure could cause spoofed &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; data to be accepted.&lt;/p&gt; &lt;p&gt;Since SPF doesn&#39;t authenticate individual users, it&#39;s still possible for a sender to impersonate another user. SPF does not authenticate the &lt;code&gt;MAIL FROM&lt;/code&gt; header. If you try to send an email from a gmail.com domain, but the server doesn&#39;t match gmail.com, it will fail.&lt;/p&gt; &lt;p&gt;SPF has a few different modes, allowing for a hard fail, soft fail, or completely ignoring it. &lt;code&gt;-all&lt;/code&gt; means an email that fails will be rejected, &lt;code&gt;~all&lt;/code&gt; will mark emails that fail as insecure or spam but still send them, and &lt;code&gt;+all&lt;/code&gt; will specify that any server is allowed to send emails on behalf of your domain.&lt;/p&gt; &lt;p&gt;This flexibility, while convenient, allows for the security benefits of SPF to be completely undermined.&lt;/p&gt; &lt;h4 id=&#34;dkim&#34;&gt;DKIM&lt;/h4&gt; &lt;p&gt;&lt;a href=&#34;https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/&#34;&gt;DomainKeys Identified Mail (DKIM)&lt;/a&gt; relies on public key cryptography to verify the domain of an email.&lt;/p&gt; &lt;p&gt;Example of a DKIM &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; TXT record:&lt;/p&gt; &lt;table&gt; &lt;thead&gt; &lt;tr&gt; &lt;th&gt;name&lt;/th&gt; &lt;th&gt;record type&lt;/th&gt; &lt;th&gt;value&lt;/th&gt; &lt;th&gt;TTL&lt;/th&gt; &lt;/tr&gt; &lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;test-email._domainkey.example.com&lt;/td&gt; &lt;td&gt;TXT&lt;/td&gt; &lt;td&gt;&#34;v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtY+7sGVwvyS8w+3HgJk7EviazH+C4L8gV4gOJzAq9oKJjZ5En7LDEw3FqAh8C0M59c9sBQcC+Kj8VxMBY9y+E0Pm1fPK9V7sI3Gm7yE7Y9yU4uVZr8R3N+5z+qZ+7V76RU4oZ0mtSvw8m3pX1hZyHd7NZfXaFfKfgd18W5T7YQIDAQAB&#34;&lt;/td&gt; &lt;td&gt;9999&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;p&gt;DKIM records are stored under a specific name following the format&lt;/p&gt; &lt;p&gt;&lt;code&gt;[selector]_domainkey.[domain]&lt;/code&gt;&lt;/p&gt; &lt;p&gt;The public and private keys are generated by the email provider, such as gmail.com. The public key is stored in a publicly available &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; TXT record like the one seen above and is used by the receiver to verify messages. The private key is kept secret by the email provider.&lt;/p&gt; &lt;p&gt;Emails sent from the email provider contain a DKIM header with a signature generated from the private key and the content of the message. If the email message is altered or signed with the wrong key, when the receiver verifies the signature using the public key it will be obvious it was altered.&lt;/p&gt; &lt;p&gt;An example of a DKIM header:&lt;/p&gt; &lt;p&gt;&lt;code&gt;v=1; a=rsa-sha256; d=example.com; s=test-email; h=from:to:subject bh=uMixy0BsCqhbru4fqPZQdeZY5Pq865sNAnOAxNgUS0s=;b=LiIvJeRyqMo0gngiCygwpiKphJjYezb5kXBKCNj8DqRVcCk7obK6OUg4o+EufEbBtRYQfQhgIkx5m70IqA6dP+DBZUcsJyS9C+vm2xRK7qyHi2hUFpYS5pkeiNVoQk/Wk4wZG4tu/g+OA49mS7VX+64FXr79MPwOMRRmJ3lNwJU=&lt;/code&gt;&lt;/p&gt; &lt;p&gt;&lt;code&gt;v=&lt;/code&gt; shows the version of DKIM, currently version one is the latest (we&#39;ll come back to that later). &lt;code&gt;a=&lt;/code&gt; shows the algorithm used. &lt;code&gt;d=&lt;/code&gt; shows the domain of the sender. &lt;code&gt;s=&lt;/code&gt; denotes the selector that is used in the TXT record. &lt;code&gt;h=&lt;/code&gt; shows the headers that were used to create the signature. &lt;code&gt;bh=&lt;/code&gt; shows a hash of the body of the email. &lt;code&gt;b=&lt;/code&gt; is the signature computed from the listed headers and the hash of the body listed in &lt;code&gt;bh&lt;/code&gt;.&lt;/p&gt; &lt;p&gt;In this way, not only does DKIM provide assurance that the email was sent from the correct domain, it also protects the integrity of the message. However, since the keys are controlled by your email provider, it can&#39;t stop your email provider from tampering with your messages.&lt;/p&gt; &lt;p&gt;Note also that this has nothing to do with encryption of the message, only verifying the authenticity and sender. The message is still sent in plaintext unless another component encrypts it.&lt;/p&gt; &lt;h4 id=&#34;dmarc&#34;&gt;DMARC&lt;/h4&gt; &lt;p&gt;&lt;a href=&#34;https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/&#34;&gt;Domain-based Message Authentication Reporting and Conformance (DMARC)&lt;/a&gt; is an authentication method that builds on SPF and DKIM. DMARC tells a receiving email server what to do after checking the SPF and DKIM. If the email fails, the DMARC policy tells the receiver whether to mark it as spam, block it, or allow it through.&lt;/p&gt; &lt;p&gt;DMARC also uses TXT records. An example DMARC policy might look like&lt;/p&gt; &lt;p&gt;&lt;code&gt;v=DMARC1; p=quarantine; adkim=s; aspf=s;&lt;/code&gt;&lt;/p&gt; &lt;p&gt;The &lt;code&gt;v=&lt;/code&gt; shows the version of DMARC to use. The &lt;code&gt;p=&lt;/code&gt; shows what should be done with emails if they fail, in this case &lt;code&gt;quarantine&lt;/code&gt; means the receiver should put the email in the user&#39;s spam folder. &lt;code&gt;reject&lt;/code&gt; can be specified as well to show that emails that fail should be outright blocked. &lt;code&gt;adkim=&lt;/code&gt; tells how DKIM should be enforced, with &lt;code&gt;s&lt;/code&gt; meaning &#34;strict&#34;; for relaxed, &lt;code&gt;r&lt;/code&gt; is listed instead. Ditto for &lt;code&gt;aspf=&lt;/code&gt;.&lt;/p&gt; &lt;h4 id=&#34;dnssec&#34;&gt;&lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt;&lt;/h4&gt; &lt;p&gt;You may have noticed that all of these authentication methods rely on &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt;. Unfortunately, &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; wasn&#39;t designed to be secure when it was invented in the 1980s. Ironically, there&#39;s no authentication built into &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; by default, so by attacking &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt;, a malicious actor can &lt;a href=&#34;https://www.cloudflare.com/learning/dns/dns-cache-poisoning/&#34;&gt;poison&lt;/a&gt; your &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; cache with false information.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://www.sei.cmu.edu/blog/probable-cache-poisoning-of-mail-handling-domains/&#34;&gt;Researchers at CMU in 2014&lt;/a&gt; found that emails that were supposedly to be sent by Gmail, Yahoo!, and Outlook.com were actually being sent by a rogue email server. This is disastrous for security and breaks the entire email authentication system. There are many such cases of attacks on &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; infrastructure and many more &lt;a href=&#34;https://www.akamai.com/glossary/what-are-dns-attack-vectors&#34;&gt;possible attacks&lt;/a&gt; on &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt;.&lt;/p&gt; &lt;p&gt;The solution? &lt;a href=&#34;https://www.cloudflare.com/learning/dns/dnssec/how-dnssec-works/&#34;&gt;&lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt;&lt;/a&gt;. &lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt; uses digital signatures to verify the authenticity of the &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; response. Unfortunately, &lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt; isn&#39;t as widely used as it could be so &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; attacks are still a real threat.&lt;/p&gt; &lt;p&gt;&lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt; forms a &lt;a href=&#34;https://en.wikipedia.org/wiki/Chain_of_trust&#34;&gt;chain of trust&lt;/a&gt;, with each zone forming a parent/child relationship all the way up to the &lt;a href=&#34;https://www.cloudflare.com/learning/dns/glossary/dns-root-server/&#34;&gt;root zone&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;The public key infrastructure (PKI) that we rely on for things like &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; in browsers similarly relies on a chain of trust, but web PKI relies on many trusted entities whereas &lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt; effectively reduces it to one: the IANA which signs the root zone key in a &lt;a href=&#34;https://www.cloudflare.com/learning/dns/dnssec/root-signing-ceremony/&#34;&gt;root signing ceremony&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Effectively, &lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt; is designed so that you can be sure the results of a &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; query are accurate.&lt;/p&gt; &lt;h4 id=&#34;dane&#34;&gt;DANE&lt;/h4&gt; &lt;p&gt;&lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt;-Based Authentication of Named Entities or DANE applies the security of &lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt; to email. It forces &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; to be used and binds the &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; certificate to &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; names directly using TLSA, thus allowing email providers to bypass the certificate authority system relied on by &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;.&lt;/p&gt; &lt;h4 id=&#34;mta-sts&#34;&gt;MTA-STS&lt;/h4&gt; &lt;p&gt;&lt;a href=&#34;https://www.mailhardener.com/kb/mta-sts&#34;&gt;MTA-STS&lt;/a&gt; or Mail Transfer Agent Strict Transport Security is a way to force &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; connections for email and validate that the &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; is correct. Instead of &lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt;, MTA-STS relies on &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; and the web PKI to validate &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt;. It&#39;s not stored as a &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; record but instead an &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; server that serves the file.&lt;/p&gt; &lt;p&gt;You can think of MTA-STS like HSTS, HTML Strict Transport Security, which forces the use of &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; for websites. It&#39;s the same principal, just applied to email.&lt;/p&gt; &lt;p&gt;The extra reliance on web PKI introduces more trust than with &lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt;, but it&#39;s easier to implement and relies on the already-established infrastructure of the internet.&lt;/p&gt; &lt;p&gt;Both DANE and MTA-STS can be used together for a multilayered approach to email security.&lt;/p&gt; &lt;h3 id=&#34;general-security&#34;&gt;General Security&lt;/h3&gt; &lt;h4 id=&#34;email-as-a-backdoor-into-your-accounts&#34;&gt;Email as a Backdoor into Your Accounts&lt;/h4&gt; &lt;p&gt;Something seldom discussed is the fact that email is the default &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt; method for most accounts and also can be used to bypass your password through the password reset function on the login screen of most services. This essentially means the security of all of your accounts rests on the security of your email, which can be very shaky and lacks &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; usually. It&#39;s most comparable to &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt; which is also used a lot of the time as a method for getting into accounts when you forgot your password.&lt;/p&gt; &lt;p&gt;I touched on this a bit in my &lt;a href=&#34;../../../03/08/toward-a-passwordless-future/&#34;&gt;passkey article&lt;/a&gt;, but we need to stop relying on email for security critical applications and start using proper recovery methods like recovery codes. Email should be used for what it&#39;s intended for: sending messages and updates to people, announcements, etc.&lt;/p&gt; &lt;h4 id=&#34;third-party-clients&#34;&gt;Third-Party Clients&lt;/h4&gt; &lt;p&gt;Many email providers such as Gmail provide their own clients for you to view your inbox, send messages, etc. But many people choose to use third-party clients for their email needs.&lt;/p&gt; &lt;p&gt;While it&#39;s great that email can support that, it does mean you need to trust another party with your sensitive email and essentially the security of all of your accounts. Not to mention that email clients can have &lt;a href=&#34;https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/&#34;&gt;vulnerabilities&lt;/a&gt;, so you need to be very careful about which one you trust.&lt;/p&gt; &lt;h4 id=&#34;email-attack-surface&#34;&gt;Email Attack Surface&lt;/h4&gt; &lt;p&gt;A big part of the reason email clients can be so vulnerable to exploits is the vast &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt; afforded by things like JavaScript support in emails. This puts email clients dangerously close to the same territory as browsers in terms of &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt; but without the same level of scrutiny or hardening effort that goes into browsers.&lt;/p&gt; &lt;p&gt;Since almost anyone can email you at any time, you have to trust that your email client vendor is able to protect you against &lt;a href=&#34;https://www.csoonline.com/article/1308164/microsoft-outlook-flaw-opens-door-to-1-click-remote-code-execution-attacks.html&#34;&gt;vulnerabilities&lt;/a&gt; and also has timely patches when they&#39;re found.&lt;/p&gt; &lt;p&gt;Luckily, lots of email clients let you disable JavaScript and HTML if you want, but not all do, and email clients can have lots of other vulnerabilities as well not related to JavaScript.&lt;/p&gt; &lt;h2 id=&#34;future-of-email-security&#34;&gt;Future of Email Security&lt;/h2&gt; &lt;p&gt;It&#39;s been a multi-decade cross-industry effort to bring email up to snuff as a modern communication system, and we still have a long way to go. There&#39;s still efforts to improve the state of email security, so look out for these in the future.&lt;/p&gt; &lt;h3 id=&#34;improvements-to-openpgp&#34;&gt;Improvements to &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt;&lt;/h3&gt; &lt;p&gt;The IETF has a &lt;a href=&#34;https://datatracker.ietf.org/wg/openpgp/about/&#34;&gt;working group&lt;/a&gt; for &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; that wants to add many improvements to &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt;, including post-quantum encryption, forward secrecy, and usability improvements.&lt;/p&gt; &lt;p&gt;Key transparency is also a planned feature, similar to what apps like &lt;a href=&#34;https://scontent.xx.fbcdn.net/v/t39.8562-6/379264560_846690136905658_6336040801441930900_n.pdf?_nc_cat=108&amp;amp;ccb=1-7&amp;amp;_nc_sid=e280be&amp;amp;_nc_ohc=gNmDlLkE0DMQ7kNvwEyKONi&amp;amp;_nc_oc=AdmucQjSjoTw2nXUszYeZNStyUHGqvM2pj3oRVV7qI4xmLEJMmY2pUV29WcOnKC1KpA&amp;amp;_nc_zt=14&amp;amp;_nc_ht=scontent.xx&amp;amp;_nc_gid=5lSqV7L5iCqeiMSQDCwN0w&amp;amp;oh=00_AfXoxrF8ukQtSVZM_BCBDbveIDviQPfn0kDEV8pSbxX1SQ&amp;amp;oe=68AB9400&#34;&gt;WhatsApp&lt;/a&gt; have implemented. Key transparency systems use an append-only, auditable and tamper-evident log of keys that allows you to automatically verify the authenticity of whoever you&#39;re messaging with.&lt;/p&gt; &lt;p&gt;There&#39;s even a plan to add the ability to verify keys manually using QR codes, similar to how some messengers let you manually verify keys.&lt;/p&gt; &lt;h3 id=&#34;improvements-to-smime&#34;&gt;Improvements to S/MIME&lt;/h3&gt; &lt;p&gt;The &lt;a href=&#34;https://datatracker.ietf.org/wg/lamps/about/&#34;&gt;LAMPS&lt;/a&gt; working group is looking at adding post-quantum encryption to S/MIME to protect against future quantum computer threats. This would include &#34;dual-signature&#34; schemes combining traditional encryption with PG encryption, similar to how some messengers handle it.&lt;/p&gt; &lt;h3 id=&#34;dkim2&#34;&gt;DKIM2&lt;/h3&gt; &lt;p&gt;&lt;a href=&#34;https://www.ietf.org/archive/id/draft-gondwana-dkim2-motivation-00.html&#34;&gt;DKIM2&lt;/a&gt; is the planned next version of DKIM.&lt;/p&gt; &lt;p&gt;An issue with the current version of DKIM is a malicious actor taking emails signed with DKIM from a different domain and replaying them, spamming them out to thousands of people and eroding trust in the original domain. The new DKIM2 specification would force each hop the email takes along its path to sign it, so any issues will be the fault of the previous hop.&lt;/p&gt; &lt;p&gt;DKIM2 aims to simplify the protocol and make it more standardized. For example, in practice, the vast majority of DKIM is singed using relaxed methods, so DKIM2 will only support relaxed.&lt;/p&gt; &lt;p&gt;The fact that DKIM relies on an explicit list of headers as part of the signature, there is inconsistent signing of headers and some security-critical headers might not be signed. In order to prevent attackers from adding headers that weren&#39;t originally part of the email, providers would sign headers with no information in them. DKIM2 would specify a fixed set of headers in alignment with best practices, so there won&#39;t be a need to specify headers.&lt;/p&gt; &lt;h3 id=&#34;dmarcbis&#34;&gt;DMARCbis&lt;/h3&gt; &lt;p&gt;&lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-dmarc-dmarcbis/&#34;&gt;DMARCbis&lt;/a&gt; is a proposed updated version of DMARC.&lt;/p&gt; &lt;p&gt;The &lt;code&gt;pct&lt;/code&gt; tag is going away, which was a tag that would only allow a specified percentage of emails, say 50%, to be sent if they failed. Apparently, this wasn&#39;t implemented properly so now it&#39;s being replaced with the &lt;code&gt;t&lt;/code&gt; mode that is a binary pass or fail.&lt;/p&gt; &lt;p&gt;The new &lt;code&gt;np&lt;/code&gt; tag adds the ability to define what to do with a non-existent subdomain of a real domain. This will prevent cybercriminals from subverting DMARC by using a fake subdomain.&lt;/p&gt; &lt;p&gt;They are also adding &lt;a href=&#34;https://datatracker.ietf.org/doc/html/draft-ietf-dmarc-dmarcbis-41#name-conformance-requirements-fo&#34;&gt;requirements&lt;/a&gt; that mail providers must meet to fully conform to the specification, which should eliminate questions about best practices and how DMARC should be implemented.&lt;/p&gt; &lt;h3 id=&#34;deprecation-of-cleartext-email&#34;&gt;Deprecation of Cleartext Email&lt;/h3&gt; &lt;p&gt;Since there are now protocols in place to at least allow for transport encryption at every stage of the email process, providers should work on &lt;a href=&#34;https://datatracker.ietf.org/doc/html/rfc8314#section-4.1&#34;&gt;removing support&lt;/a&gt; for unencrypted email entirely.&lt;/p&gt; &lt;p&gt;Transport encryption between servers now should be the minimum expected for email services going into the future.&lt;/p&gt; &lt;h3 id=&#34;passkeys&#34;&gt;Passkeys&lt;/h3&gt; &lt;p&gt;The adoption of &lt;a href=&#34;https://fidoalliance.org/passkeys/&#34;&gt;passkeys&lt;/a&gt; will eliminate the need for email as a recovery method, since users won&#39;t have to remember passwords. Email can be used for what it was originally intended for: a method of communication and sending updates and announcements, nothing more. This will take a concerted effort from service providers though, and it seems for now most services that support passkeys still require and email for some reason. Here&#39;s hoping this changes in the future.&lt;/p&gt; &lt;p&gt;The adoption of passkeys will also make email services themselves more secure, since at the moment they act as a sort of de facto recovery method for all of our accounts. They should focus on deprecating passwords for improved security.&lt;/p&gt; &lt;h3 id=&#34;wider-adoption-of-dnssec&#34;&gt;Wider Adoption of &lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt;&lt;/h3&gt; &lt;p&gt;&lt;abbr title=&#34;Domain Name System Security Extensions&#34;&gt;DNSSEC&lt;/abbr&gt; should be universally adopted to prevent &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; poisoning attacks. This would drastically improve the security of email.&lt;/p&gt; &lt;h3 id=&#34;guidance-for-e2ee&#34;&gt;Guidance for &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;&lt;/h3&gt; &lt;p&gt;The usability of &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; in email is significantly lacking compared to other methods of communication, especially modern messengers like Signal that make the &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; very seamless and simple. The handling of &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; by email clients can also vary a lot and leave email users &lt;a href=&#34;https://efail.de&#34;&gt;vulnerable to bypasses&lt;/a&gt; for the &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;.&lt;/p&gt; &lt;p&gt;An &lt;a href=&#34;https://www.ietf.org/archive/id/draft-ietf-lamps-e2e-mail-guidance-17.html&#34;&gt;RFC&lt;/a&gt; to address usability issues and best practices for email clients exists, hopefully it can lead to a future of improved user experience and security in email.&lt;/p&gt; &lt;h3 id=&#34;smtp-end-to-end-encryption&#34;&gt;&lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; End-to-End Encryption&lt;/h3&gt; &lt;p&gt;The biggest obstacle in the way of email privacy is it&#39;s not &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; by default like most modern messengers we use daily. Some providers like Proton Mail will automatically encrypt emails between &lt;a href=&#34;https://proton.me/support/manage-encryption#:~:text=Proton%20Mail%20encrypts%20all%20emails%20sent%20between%20Proton%20accounts%20with%20end%2Dto%2Dend%20encryption%20(E2EE)&#34;&gt;Proton Mail&lt;/a&gt; users. The obvious next step is to build &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; into &lt;abbr title=&#34;Simple Mail Transfer Protocol&#34;&gt;SMTP&lt;/abbr&gt; itself.&lt;/p&gt; &lt;p&gt;An &lt;a href=&#34;https://dcrubro.com/files/smtp-ee2esign-latest.txt&#34;&gt;RFC proposal&lt;/a&gt; exists for just such an idea. I&#39;m hopeful something like this can be standardized and widely adopted, and finally bring email into the 21st century.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/11/15/email-security/</link> <pubDate>Sat, 15 Nov 2025 22:36:51 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/11/15/email-security/</guid> </item> <item> <title>Zero Trust: What Can We Learn for Our Personal Networks</title> <author>fria</author> <category>Explainers</category> <category>Networking</category> <category>Zero Trust</category> <description>&lt;h1 id=&#34;zero-trust-what-can-we-learn-for-our-personal-networks&#34;&gt;Zero Trust: What Can We Learn for Our Personal Networks&lt;/h1&gt; &lt;p&gt;You may have heard of &#34;Zero Trust&#34;, usually in relation to corporate networks. It&#39;s used a lot as a buzzword to sell cloud products to companies, but the overall concept is sound. Even though it seems complicated, I think we can learn from it for our personal home networks.&lt;!-- more --&gt;&lt;/p&gt; &lt;h2 id=&#34;previous-method&#34;&gt;Previous Method&lt;/h2&gt; &lt;p&gt;A traditional approach to security focuses heavily on protecting network access. You define a &#34;secure&#34; network that you control, usually with a &lt;a href=&#34;https://www.cisco.com/site/us/en/learn/topics/security/what-is-a-firewall.html#tabs-9da71fbd27-item-1288c79d71-tab&#34;&gt;firewall&lt;/a&gt; and/or a &lt;a href=&#34;https://www.cisco.com/site/us/en/learn/topics/networking/what-is-network-address-translation-nat.html#tabs-9da71fbd27-item-1288c79d71-tab&#34;&gt;&lt;abbr title=&#34;Network address translation&#34;&gt;NAT&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Anyone inside the secure network is considered trusted and has access to things such as network drives belonging to the organization, and other data.&lt;/p&gt; &lt;p&gt;Anyone outside the network is considered &#34;untrusted&#34; and are not given access to sensitive data.&lt;/p&gt; &lt;pre class=&#34;mermaid&#34;&gt;&lt;code&gt; graph LR A[Untrusted Traffic] -.-&amp;gt; B{Network Boundary}; B --&amp;gt; C[Network Drive]; C --&amp;gt; B; B --&amp;gt; D[User]; D --&amp;gt; B; B --&amp;gt; E[Printer]; E --&amp;gt; B;&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;This doesn&#39;t just include people physically inside the network, this also includes people connecting to the network over a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;. Once the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; spits you out, it&#39;s like you&#39;re physically there on the network, along with all the privileges that entails.&lt;/p&gt; &lt;h2 id=&#34;issues&#34;&gt;Issues&lt;/h2&gt; &lt;p&gt;You might notice this model leaves people on the network and the network itself highly vulnerable; once a malicious actor is inside the network, they can wreak havok and access troves of data and attack other users and devices.&lt;/p&gt; &lt;pre class=&#34;mermaid&#34;&gt;&lt;code&gt; graph LR A[Untrusted Traffic] -.-&amp;gt; B{Network Boundary}; B --&amp;gt; C[Network Drive]; C --&amp;gt; B; B --&amp;gt; D[User]; D --&amp;gt; B; B --&amp;gt; E[Printer]; E --&amp;gt; B; C --&amp;gt; F(Attacker); D --&amp;gt; F; E --&amp;gt; F;&lt;/code&gt;&lt;/pre&gt; &lt;p&gt;After getting past the network boundary, they can &lt;a href=&#34;https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/lateral-movement/&#34;&gt;move laterally &lt;/a&gt; and access deeper and more sensitive parts of the network.&lt;/p&gt; &lt;p&gt;How does an attacker get past the network boundary though?&lt;/p&gt; &lt;h3 id=&#34;virus&#34;&gt;Virus&lt;/h3&gt; &lt;p&gt;It&#39;s happened to us all at some point. Either through a malicious link, or maybe a fake program masquerading as a legitimate one, there&#39;s any number of ways a &#34;trusted&#34; machine can get infected with malware.&lt;/p&gt; &lt;p&gt;Once it is, as soon as that user connects to the network, it&#39;s open season to infect other devices on the network, access sensitive data, and cause all kinds of damage.&lt;/p&gt; &lt;p&gt;Unfortunately, technology isn&#39;t at a point where we can have 100% confidence that our devices aren&#39;t infected, which makes any &#34;trusted&#34; device, even if the user isn&#39;t malicious, a possible security threat.&lt;/p&gt; &lt;p&gt;This is especially relevant considering the rise in &lt;a href=&#34;https://market.biz/bring-your-own-device-byod-statistics/&#34;&gt;bring-your-own-device (BYOD)&lt;/a&gt; in workplaces. Devices that aren&#39;t set up by the organization can&#39;t be trusted to have the best security practices in place: automatic updates, restricted software installs, etc. For all you know, someone could be on your network with a laptop from 2004 running Windows Vista.&lt;/p&gt; &lt;h3 id=&#34;malicious-user&#34;&gt;Malicious User&lt;/h3&gt; &lt;p&gt;Of course, sometimes our &#34;trusted&#34; users &lt;em&gt;are&lt;/em&gt; malicious. &lt;a href=&#34;https://www.bbc.com/news/world-asia-china-64206950&#34;&gt;Corporate espionage&lt;/a&gt; is a very real threat. Even in your own home network, there&#39;s probably people you don&#39;t want to have access to your data.&lt;/p&gt; &lt;h3 id=&#34;stolen-credentials&#34;&gt;Stolen Credentials&lt;/h3&gt; &lt;p&gt;Sometimes credentials can get stolen, either through &lt;a href=&#34;https://consumer.ftc.gov/articles/how-recognize-avoid-phishing-scams&#34;&gt;phishing&lt;/a&gt;, &lt;a href=&#34;https://www.ibm.com/think/topics/social-engineering&#34;&gt;social engineering&lt;/a&gt;, or just plain irresponsible &lt;a href=&#34;https://www.thezebra.com/resources/home/dangers-of-sharing-passwords/&#34;&gt;credential sharing&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Whatever the case may be, users can&#39;t necessarilly be trusted to keep their credentials secure.&lt;/p&gt; &lt;p&gt;Passwords are, of course, the most vulnerable type of credentials to phishing and compromise in general.&lt;/p&gt; &lt;h3 id=&#34;offsite-devices&#34;&gt;Offsite Devices&lt;/h3&gt; &lt;p&gt;The reality today is, most of what we use isn&#39;t located on a network we control anymore. Whether it&#39;s a cloud service such as iCloud, streaming services, or even our own devices connecting remotely, the old model of trusting everything behind the network can&#39;t work when almost nothing &lt;em&gt;is&lt;/em&gt; behind the network.&lt;/p&gt; &lt;h2 id=&#34;zero-trust&#34;&gt;Zero Trust&lt;/h2&gt; &lt;p&gt;This is where &lt;a href=&#34;https://learn.microsoft.com/en-us/security/zero-trust/zero-trust-overview&#34;&gt;Zero Trust&lt;/a&gt; comes in.&lt;/p&gt; &lt;h3 id=&#34;verify&#34;&gt;Verify&lt;/h3&gt; &lt;p&gt;The motto here is &#34;&lt;strong&gt;never trust, always verify&lt;/strong&gt;&#34;. This means that you should never assume any device accessing any resource or performing any action is trusted. You should verify explicitly every time and using as many data points as you can.&lt;/p&gt; &lt;h3 id=&#34;principle-of-least-privilege&#34;&gt;Principle of Least Privilege&lt;/h3&gt; &lt;p&gt;The &lt;a href=&#34;https://www.cloudflare.com/learning/access-management/principle-of-least-privilege/&#34;&gt;Principle of Least Privelege&lt;/a&gt; states that a user should only have access to the bare minimum they need in order to do what they need to do, and no more.&lt;/p&gt; &lt;p&gt;In a corporate network, a sales associate doesn&#39;t need full control over the network. In your home network, grandpa probably doesn&#39;t need access to your password manager or your user account on your PC.&lt;/p&gt; &lt;h3 id=&#34;assume-breach&#34;&gt;Assume Breach&lt;/h3&gt; &lt;p&gt;Always assume the attackers are listening: use encryption whenever you can. Treat your internal network traffic like external traffic.&lt;/p&gt; &lt;p&gt;You never know what could be lurking. A single infected printer for example could be scanning your network for unencrypted traffic or holes in your device&#39;s firewall.&lt;/p&gt; &lt;h2 id=&#34;applying-these-lessons&#34;&gt;Applying These Lessons&lt;/h2&gt; &lt;p&gt;How do we apply all this to your home network?&lt;/p&gt; &lt;h3 id=&#34;user-authentication&#34;&gt;User Authentication&lt;/h3&gt; &lt;h4 id=&#34;segmentation&#34;&gt;Segmentation&lt;/h4&gt; &lt;p&gt;In order to verify who is allowed to access what, you need to segment everything out: if you have a shared family computer, make a separate user account for everyone. If you have shared accounts on services such as Netflix, see if they support everyone making their own account and accessing that way instead of sharing your password.&lt;/p&gt; &lt;p&gt;From now on, every person must explicitly verify who they are using their own credentials. You don&#39;t want to be able to access anyone else&#39;s data and you don&#39;t want them accessing your data either.&lt;/p&gt; &lt;p&gt;In line with the principle of least privilege, set everyone who doesn&#39;t need administrator access as a standard user. This will prevent them from having more access to the system than needed. You can even make separate administrator and standard accounts for yourself and only use the administrator one when you need it.&lt;/p&gt; &lt;p&gt;Make sure your router has an administrator password set and don&#39;t give it to everyone, just people who need to administer it.&lt;/p&gt; &lt;h4 id=&#34;two-factor-authentication&#34;&gt;Two-Factor Authentication&lt;/h4&gt; &lt;p&gt;Utilize two-factor authentication and biometrics whenever you can: they help ensure that the credentials haven&#39;t been stolen and the correct person is indeed accessing what they&#39;re allowed to access.&lt;/p&gt; &lt;h4 id=&#34;avoid-passwords&#34;&gt;Avoid Passwords&lt;/h4&gt; &lt;p&gt;Passwords can be easily phished, stolen, shared, or otherwise leave your custody. This is a big problem for Zero Trust. Whenever possible, use &lt;a href=&#34;https://www.passkeys.com&#34;&gt;passkeys&lt;/a&gt;, biometric authentication, &lt;a href=&#34;https://www.yubico.com/authentication-standards/fido2/&#34;&gt;hardware security keys&lt;/a&gt;, anything other than passwords to log in if it can be avoided.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://support.apple.com/guide/iphone/use-stolen-device-protection-iph17105538b/ios&#34;&gt;iOS&lt;/a&gt; and &lt;a href=&#34;https://support.google.com/android/answer/15146908?hl=en&#34;&gt;Android&lt;/a&gt; offer anti-theft features that require biometric authentication for certain sensitive actions: enable these so that someone who knows your phone password can&#39;t change these settings.&lt;/p&gt; &lt;h4 id=&#34;network-drives&#34;&gt;Network Drives&lt;/h4&gt; &lt;p&gt;If you have a shared network drive, consider moving to a cloud solution and using the sharing feature it offers such as &lt;a href=&#34;https://www.apple.com/family-sharing/&#34;&gt;iCloud family sharing&lt;/a&gt;. This will make it so that everyone needs to authenticate with their account before accessing data.&lt;/p&gt; &lt;p&gt;Remember that we&#39;re treating all network traffic as untrusted whether it originates from inside or outside your network.&lt;/p&gt; &lt;h4 id=&#34;encryption&#34;&gt;Encryption&lt;/h4&gt; &lt;p&gt;Make heavy use of encryption, especially end-to-end encryption. Enable &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; in services that support it such as iCloud &lt;a href=&#34;https://support.apple.com/en-us/108756&#34;&gt;Advanced Data Protection&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Many routers will allow you to use &lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt; encryption for accessing their web interface: enable this setting if it&#39;s available.&lt;/p&gt; &lt;h4 id=&#34;firewall&#34;&gt;Firewall&lt;/h4&gt; &lt;p&gt;Enable the firewall on your router of course, but don&#39;t rely on it to protect you.&lt;/p&gt; &lt;p&gt;Turn on the firewall for all devices on your network. You can tweak the settings as you see fit, but make sure it&#39;s the minimum you need in order to use the device properly. Most operating systems will give you a simple graphical user interface for changing firewall settings, so it shouldn&#39;t be too difficult.&lt;/p&gt; &lt;p&gt;For example, in Windows, you can set each network you connect to as either &lt;a href=&#34;https://support.microsoft.com/en-us/windows/firewall-and-network-protection-in-the-windows-security-app-ec0844f7-aebd-0583-67fe-601ecf5d774f&#34;&gt;Private or Public&lt;/a&gt;, with Public having stricter firewall rules. We&#39;re treating all networks as public networks, so set your home network to Public.&lt;/p&gt; &lt;h4 id=&#34;remove-unnecessary-devices&#34;&gt;Remove Unnecessary Devices&lt;/h4&gt; &lt;p&gt;In this day and age, many of us own too many smart devices. We have to ask ourselves if we really need a WiFi enabled toaster, or if the added &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt; isn&#39;t worth it.&lt;/p&gt; &lt;p&gt;Go through networked devices in your home and assess what&#39;s needed and what&#39;s not. These typically are a pain to keep updated and give you very little control over their security anyway. Each one represents another potential entrypoint into your network.&lt;/p&gt; &lt;h4 id=&#34;network-segmentation&#34;&gt;Network Segmentation&lt;/h4&gt; &lt;p&gt;An important part of Zero Trust is keeping devices &lt;a href=&#34;https://learn.microsoft.com/en-us/security/zero-trust/sfi/network-isolation?branch=main&#34;&gt;separated&lt;/a&gt; on your network. You don&#39;t necessarily need to go as granular as you&#39;d see on corporate networks, and a lot of consumer routers don&#39;t even let you anyway, but you can put devices you don&#39;t want anywhere near your sensitive data on the &lt;a href=&#34;https://www.netgear.com/hub/network/security/guest-wifi/&#34;&gt;guest network&lt;/a&gt; that most routers let you enable.&lt;/p&gt; &lt;p&gt;This will keep them separated from your personal devices with your sensitive data.&lt;/p&gt; &lt;h4 id=&#34;continuous-verification&#34;&gt;Continuous Verification&lt;/h4&gt; &lt;p&gt;Some devices, especially Windows devices, support continuous verification through biometrics. For example, you can set your Windows PC to &lt;a href=&#34;https://support.microsoft.com/en-us/windows/managing-presence-sensing-settings-in-windows-11-82285c93-440c-4e15-9081-c9e38c1290bb&#34;&gt;automatically lock itself&lt;/a&gt; when it detects you&#39;ve left.&lt;/p&gt; &lt;p&gt;Some devices also support &lt;a href=&#34;https://learn.microsoft.com/en-us/windows-hardware/design/device-experiences/sensors-presence-onlooker-detection&#34;&gt;onlooker detection&lt;/a&gt;, so when an unauthorized person is detected looking at your screen, it will turn off.&lt;/p&gt; &lt;p&gt;Unfortunately, this security feature isn&#39;t available on most devices. For devices that lack continuous verification, you can set the screen to turn off after a short timer. You can make use of &lt;a href=&#34;https://support.apple.com/en-us/102216&#34;&gt;attention aware&lt;/a&gt; features to keep your screen from dimming while you use it.&lt;/p&gt; &lt;h2 id=&#34;takeaways&#34;&gt;Takeaways&lt;/h2&gt; &lt;p&gt;While the average person won&#39;t be achieving the same level of granular isolation you might get on a modern, secure corporate network, we can take the overall concepts and apply them to our home networks fairly easily. I&#39;m sure there&#39;s plenty I missed, so feel free to let me know your ideas, and maybe I can even update this article in the future with your suggestions.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/10/23/zero-trust/</link> <pubDate>Thu, 23 Oct 2025 22:52:35 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/10/23/zero-trust/</guid> </item> <item> <title>Creating a Tricked-Out Monero Server with TrueNAS</title> <author>Justin Ehrenhofer</author> <category>Cryptocurrency</category> <category>Self-Hosting</category> <category>TrueNAS</category> <category>Tutorials</category> <description>&lt;h1 id=&#34;creating-a-tricked-out-monero-server-with-truenas&#34;&gt;Creating a Tricked-Out Monero Server with TrueNAS&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;A cover image for this post showing an illustration of a NAS and stacks of coins imprinted with the Monero logo&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides&lt;/small&gt;&lt;/p&gt; &lt;p&gt;In this guide, we will walk you through setting up a very powerful &lt;a href=&#34;https://www.privacyguides.org/en/cryptocurrency/#monero&#34;&gt;Monero&lt;/a&gt; server on TrueNAS. By completing these steps, you will be able to connect to your own self-hosted Monero node with the official Monero wallet and Cake Wallet, and you will be able to connect to your own self-hosted Monero LWS server with Edge Wallet and MyMonero.&lt;!-- more --&gt;&lt;/p&gt; &lt;div class=&#34;admonition note&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Guest Contributor&lt;/p&gt; &lt;p&gt;Please welcome Justin Ehrenhofer as a first-time guest contributor! Justin is the president of MAGIC Grants, a nonprofit which supports public cryptocurrency infrastructure and promotes privacy, and operates as Privacy Guides&#39; &lt;a href=&#34;../../../../2024/07/22/privacy-guides-partners-with-magic-grants-501-c-3/&#34;&gt;fiscal host&lt;/a&gt;. Privacy Guides does not publish guest posts in exchange for compensation, and this tutorial was independently reviewed by our editorial team prior to publication.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;This guide assumes that you are using TrueNAS for the first time. TrueNAS is an open-source operating system that is meant to function primarily as a NAS, and it supports running arbitrary Docker apps. &lt;a href=&#34;https://magicgrants.org&#34;&gt;MAGIC Grants&lt;/a&gt; spent the last few months making dedicated apps on the TrueNAS store to make this setup process simpler than starting from scratch.&lt;/p&gt; &lt;h2 id=&#34;advantages-of-running-your-own-node&#34;&gt;Advantages of Running Your Own Node&lt;/h2&gt; &lt;p&gt;Monero is a cryptocurrency with strong privacy properties by default, and it is the only cryptocurrency currently &lt;a href=&#34;https://www.privacyguides.org/en/cryptocurrency/&#34;&gt;recommended&lt;/a&gt; by Privacy Guides.&lt;/p&gt; &lt;p&gt;Despite Monero&#39;s privacy protections, your wallet needs to communicate with the rest of the Monero network. There are two main options:&lt;/p&gt; &lt;ol&gt; &lt;li&gt;Connecting to someone else&#39;s node; or&lt;/li&gt; &lt;li&gt;Connecting to your own node.&lt;/li&gt; &lt;/ol&gt; &lt;p&gt;By connecting to your own node, you do not need to reveal when you are using your wallet and what transactions you send to the node operator.&lt;/p&gt; &lt;p&gt;By following this guide, your transaction broadcasts will be protected with the Tor and/or I2P &lt;a href=&#34;https://www.privacyguides.org/en/alternative-networks/&#34;&gt;networks&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;In short, if you &lt;em&gt;can&lt;/em&gt; run your own node, you &lt;em&gt;should&lt;/em&gt; run your own node.&lt;/p&gt; &lt;h2 id=&#34;hardwaresoftware-recommendations&#34;&gt;Hardware/Software Recommendations&lt;/h2&gt; &lt;ul&gt; &lt;li&gt;A spare machine (e.g., an old desktop computer) with:&lt;ul&gt; &lt;li&gt;One or more SSDs with &amp;gt;100 GB of free space&lt;/li&gt; &lt;li&gt;4+ CPU cores&lt;/li&gt; &lt;li&gt;4GB+ of RAM&lt;/li&gt; &lt;li&gt;TrueNAS already installed&lt;/li&gt; &lt;/ul&gt; &lt;/li&gt; &lt;li&gt;A domain name (optional, for encrypted clearnet connections)&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;It&#39;s possible to undercut these recommendations, but please don&#39;t do that to yourself.&lt;/p&gt; &lt;h2 id=&#34;what-we-will-set-up&#34;&gt;What We Will Set Up&lt;/h2&gt; &lt;p&gt;All of these applications are optional. You can set up nearly any combination of these. For example, you can skip just the I2P app if you don&#39;t plan to use I2P.&lt;/p&gt; &lt;table&gt; &lt;thead&gt; &lt;tr&gt; &lt;th&gt;Software&lt;/th&gt; &lt;th&gt;Description&lt;/th&gt; &lt;th&gt;Purpose&lt;/th&gt; &lt;/tr&gt; &lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;Arti&lt;/td&gt; &lt;td&gt;A &lt;a href=&#34;https://www.privacyguides.org/en/advanced/tor-overview&#34;&gt;Tor&lt;/a&gt; client written in Rust.&lt;/td&gt; &lt;td&gt;Connect to Tor nodes, broadcast transactions over Tor, and connect to TrueNAS apps over Tor.&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;Java I2P&lt;/td&gt; &lt;td&gt;The officially distributed app to connect to the &lt;a href=&#34;https://www.privacyguides.org/en/alternative-networks/#i2p-the-invisible-internet-project&#34;&gt;I2P network&lt;/a&gt;.&lt;/td&gt; &lt;td&gt;Connect to I2P nodes, broadcast transactions over I2P, and connect to TrueNAS apps over I2P.&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;Monero Node&lt;/td&gt; &lt;td&gt;The officially distributed app for communicating with the Monero network.&lt;/td&gt; &lt;td&gt;The app provides the necessary information to send and receive Monero transactions. Most wallets (including the official Monero wallets and Cake Wallet) connect to Monero nodes.&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;Monero-LWS&lt;/td&gt; &lt;td&gt;A &#34;&lt;strong&gt;L&lt;/strong&gt;ight-&lt;strong&gt;W&lt;/strong&gt;allet &lt;strong&gt;S&lt;/strong&gt;erver&#34; that allows &#34;light-wallets&#34; to send and receive Monero transactions.&lt;/td&gt; &lt;td&gt;Monero light-wallet apps (including Edge Wallet and MyMonero) can connect to this server so that the wallet itself does not need to scan/sync Monero history; the server handles this scanning/syncing.&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;h2 id=&#34;configure-truenas-storage&#34;&gt;Configure TrueNAS Storage&lt;/h2&gt; &lt;p&gt;We will configure storage for the Monero blockchain, and we will use default storage settings for other purposes. If you are an advanced user, you can configure the storage yourself.&lt;/p&gt; &lt;h3 id=&#34;create-a-monero-pool&#34;&gt;Create a Monero Pool&lt;/h3&gt; &lt;p&gt;In TrueNAS, a pool is a collection of hard drives for a specific use-case. For simplicity, we will configure the entirety of a single &lt;abbr title=&#34;Solid-State Drive&#34;&gt;SSD&lt;/abbr&gt; for Monero&#39;s use.&lt;/p&gt; &lt;ol&gt; &lt;li&gt;Click &lt;strong&gt;Storage&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Create Pool&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Type &lt;code&gt;monero-pool&lt;/code&gt; for the name. Leave encryption disabled (this will only store public blockchain data). Click &lt;strong&gt;Next&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Choose the layout that you will be using. We will pick &lt;strong&gt;Stripe&lt;/strong&gt; in this guide.&lt;/li&gt; &lt;li&gt;Select the entire storage space for the &lt;abbr title=&#34;Solid-State Drive&#34;&gt;SSD&lt;/abbr&gt;. Click &lt;strong&gt;Next&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Skip all the remaining options for metadata, log, cache, spare, and dedup. Keep clicking &lt;strong&gt;Next&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Finish creating the pool by clicking &lt;strong&gt;Create Pool&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;h3 id=&#34;create-a-monero-dataset&#34;&gt;Create a Monero Dataset&lt;/h3&gt; &lt;p&gt;A dataset is effectively a folder inside a pool. We will make one folder for the Monero blockchain data:&lt;/p&gt; &lt;ol&gt; &lt;li&gt;Click &lt;strong&gt;Datasets&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click on the &lt;code&gt;monero-pool&lt;/code&gt; pool.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Add Dataset&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Set the name to &lt;code&gt;monero-blockchain&lt;/code&gt;&lt;/li&gt; &lt;li&gt;Set the dataset preset to &lt;strong&gt;Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot showing the Datasets list in TrueNAS&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/01-datasets.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;Next, we will assign the ownership of that folder to the &lt;code&gt;apps&lt;/code&gt; user:&lt;/p&gt; &lt;ol&gt; &lt;li&gt;While the &lt;code&gt;monero-blockchain&lt;/code&gt; dataset is selected, click &lt;strong&gt;Edit&lt;/strong&gt; under Permissions.&lt;/li&gt; &lt;li&gt;At the top, change the &lt;strong&gt;Owner&lt;/strong&gt; and &lt;strong&gt;Owner Group&lt;/strong&gt; from &lt;code&gt;root&lt;/code&gt; to &lt;code&gt;apps&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Check the boxes for &lt;strong&gt;Apply Owner&lt;/strong&gt; and &lt;strong&gt;Apply Group&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Check &lt;strong&gt;Apply permissions recursively&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Save Access Control List&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot showing the ACL settings for monero-blockchain&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/02-edit-acl.webp&#34; /&gt;&lt;/p&gt; &lt;h2 id=&#34;configure-arti-tor&#34;&gt;Configure Arti (Tor)&lt;/h2&gt; &lt;div class=&#34;admonition example&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Experimental software&lt;/p&gt; &lt;p&gt;Arti is experimental software. At the time of writing, Arti should not be used for privacy-critical applications. Connecting to your own Monero node is &#34;low risk&#34; in most circumstances. However, if you have very sensitive requirements you should not use Arti until it has been tested further by the community. By using Arti today, you are helping to make Arti better!&lt;/p&gt; &lt;/div&gt; &lt;ol&gt; &lt;li&gt;Click &lt;strong&gt;Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Discover Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Search for &lt;code&gt;Arti&lt;/code&gt;. Click on the &lt;strong&gt;Arti&lt;/strong&gt; app.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Install&lt;/strong&gt;. This will pull up a form.&lt;/li&gt; &lt;li&gt;Under &lt;strong&gt;Hidden Services&lt;/strong&gt;, click &lt;strong&gt;Add&lt;/strong&gt;. For each of the functions below that you want to support, create a new hidden service:&lt;ol&gt; &lt;li&gt;Monero Node (for incoming &lt;abbr title=&#34;Peer-to-Peer&#34;&gt;P2P&lt;/abbr&gt; connections)&lt;ol&gt; &lt;li&gt;Name: &lt;code&gt;monerodp2p&lt;/code&gt;&lt;/li&gt; &lt;li&gt;App Port: &lt;code&gt;18084&lt;/code&gt;&lt;/li&gt; &lt;li&gt;Hidden Service Port: &lt;code&gt;18084&lt;/code&gt;&lt;/li&gt; &lt;/ol&gt; &lt;/li&gt; &lt;li&gt;Monero Node (for incoming RPC (wallet) connections)&lt;ol&gt; &lt;li&gt;Name: &lt;code&gt;monerodrpc&lt;/code&gt;&lt;/li&gt; &lt;li&gt;App Port: &lt;code&gt;18089&lt;/code&gt;&lt;/li&gt; &lt;li&gt;Hidden Service Port: &lt;code&gt;18089&lt;/code&gt;&lt;/li&gt; &lt;/ol&gt; &lt;/li&gt; &lt;li&gt;Monero LWS&lt;ol&gt; &lt;li&gt;Name: &lt;code&gt;monerolws&lt;/code&gt;&lt;/li&gt; &lt;li&gt;App Port: &lt;code&gt;18090&lt;/code&gt;&lt;/li&gt; &lt;li&gt;Hidden Service Port: &lt;code&gt;18090&lt;/code&gt;&lt;/li&gt; &lt;/ol&gt; &lt;/li&gt; &lt;/ol&gt; &lt;/li&gt; &lt;li&gt;Leave the other settings as default. Click &lt;strong&gt;Install&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;p&gt;You will see the Applications screen after it installs. After the Arti app shows the status as &lt;strong&gt;Running&lt;/strong&gt;, click on the shell icon under Workloads and to the right of &lt;code&gt;arti – Running&lt;/code&gt; (not &lt;code&gt;config&lt;/code&gt; or &lt;code&gt;perms&lt;/code&gt;).&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot showing how to click the Arti shell icon&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/03-arti-shell.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;In the shell, type the command &lt;code&gt;arti hss --nickname monerodp2p onion-address&lt;/code&gt;. This will return a string that ends in &lt;code&gt;.onion&lt;/code&gt;. In notepad, Excel, or another app, save the &lt;code&gt;.onion&lt;/code&gt; address and the service it is associated with (&lt;code&gt;monerodp2p&lt;/code&gt;). You might need to copy from the shell with &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-control&#34;&gt;Ctrl&lt;/kbd&gt;&lt;span&gt;+&lt;/span&gt;&lt;kbd class=&#34;key-insert&#34;&gt;Ins&lt;/kbd&gt;&lt;/span&gt;.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot showing the command and response to get the onion address&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/04-arti-shell.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;Do this again for the following two commands as well:&lt;/p&gt; &lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;arti hss --nickname monerodrpc onion-address&lt;/span&gt; &lt;span class=&#34;go&#34;&gt;arti hss --nickname monerolws onion-address&lt;/span&gt; &lt;/code&gt;&lt;/pre&gt;&lt;/div&gt; &lt;p&gt;You should have three saved and unique &lt;code&gt;.onion&lt;/code&gt; addresses.&lt;/p&gt; &lt;h2 id=&#34;configure-i2p&#34;&gt;Configure I2P&lt;/h2&gt; &lt;ol&gt; &lt;li&gt;Click &lt;strong&gt;Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Discover Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Search for &lt;code&gt;I2P&lt;/code&gt;. Click on the &lt;strong&gt;I2P&lt;/strong&gt; app.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Install&lt;/strong&gt;. This will pull up a form.&lt;/li&gt; &lt;li&gt;Change the &lt;strong&gt;Port Bind Mode&lt;/strong&gt; for &lt;strong&gt;I2P &lt;abbr title=&#34;Hypertext Transfer Protocol&#34;&gt;HTTP&lt;/abbr&gt; Proxy Port&lt;/strong&gt; to &lt;code&gt;None&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Change the &lt;strong&gt;Port Bind Mode&lt;/strong&gt; for &lt;strong&gt;I2P &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; Proxy Port&lt;/strong&gt; to &lt;code&gt;None&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;To the right of &lt;strong&gt;Additional Ports&lt;/strong&gt;, click &lt;strong&gt;Add&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;In the newly exposed fields, set the Port Number as &lt;code&gt;4447&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;In the same newly exposed fields, set the Container Port as &lt;code&gt;4447&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Leave the other settings as default. Click &lt;strong&gt;Install&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot showing the I2P installation settings&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/05-i2p-install.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;You will see the Applications screen after it installs. After the Arti app shows the status as &lt;strong&gt;Running&lt;/strong&gt;, open a browser and direct it to the I2P configuration wizard. This is available at &lt;code&gt;&amp;lt;hostname&amp;gt;:7657&lt;/code&gt;, for example &lt;code&gt;192.168.1.100:7657&lt;/code&gt;.&lt;/p&gt; &lt;p&gt;Complete the initial I2P wizard using the default settings.&lt;/p&gt; &lt;h3 id=&#34;create-i2p-socks-proxy&#34;&gt;Create I2P SOCKS Proxy&lt;/h3&gt; &lt;ol&gt; &lt;li&gt;Click &lt;strong&gt;Local Tunnels&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click on the I2P &lt;abbr title=&#34;Hypertext Transfer Protocol&#34;&gt;HTTP&lt;/abbr&gt; Proxy.&lt;/li&gt; &lt;li&gt;Uncheck &lt;strong&gt;Automatically start tunnel when router starts&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;To the right of the I2P &lt;abbr title=&#34;Hypertext Transfer Protocol&#34;&gt;HTTP&lt;/abbr&gt; Proxy, click &lt;strong&gt;Stop&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click on the I2P &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; Proxy.&lt;/li&gt; &lt;li&gt;Uncheck &lt;strong&gt;Automatically start tunnel when router starts&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;To the right of the I2P &lt;abbr title=&#34;Hypertext Transfer Protocol&#34;&gt;HTTP&lt;/abbr&gt; Proxy, click &lt;strong&gt;Stop&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;At the bottom and to the right of &lt;strong&gt;New client tunnel:&lt;/strong&gt;, change the type in the dropdown from &lt;code&gt;Standard&lt;/code&gt; to &lt;code&gt;SOCKS 4/4a/5&lt;/code&gt; and click &lt;strong&gt;Create&lt;/strong&gt;.&lt;ol&gt; &lt;li&gt;Set the name as &lt;code&gt;monerod&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Check &lt;strong&gt;Automatically start tunnel when router starts&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Set the Access Point &lt;strong&gt;Port&lt;/strong&gt; to &lt;code&gt;4447&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Set &lt;strong&gt;Reachable by&lt;/strong&gt; to &lt;code&gt;0.0.0.0&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;/li&gt; &lt;/ol&gt; &lt;h3 id=&#34;create-i2p-hidden-services&#34;&gt;Create I2P Hidden Services&lt;/h3&gt; &lt;p&gt;There is an optional step below to reduce the hidden service tunnel length from the default of 3 to 1. This will substantially increase the reliability of the server at the cost of anonymity.&lt;/p&gt; &lt;p&gt;However, the server&#39;s connection to the I2P network for connecting to Monero wallets and the rest of the Monero network is typically not sensitive, unless you want to completely conceal that you are running a Monero node. Thus, most users will prefer the higher performance of the shorter tunnel length.&lt;/p&gt; &lt;p&gt;We do not recommend shortening the tunnel lengths for the I2P SOCKS Proxy (in the previous section above) on the other hand, since transaction broadcasts tend to be sensitive.&lt;/p&gt; &lt;ol&gt; &lt;li&gt;Under &lt;strong&gt;I2P Hidden Services&lt;/strong&gt; and to the right of &lt;strong&gt;New hidden service:&lt;/strong&gt;, change the type in the dropdown from &lt;code&gt;HTTP&lt;/code&gt; to &lt;code&gt;Standard&lt;/code&gt; and click &lt;strong&gt;Create&lt;/strong&gt;.&lt;ol&gt; &lt;li&gt;Set the name as &lt;code&gt;monerodp2p&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Check &lt;strong&gt;Automatically start tunnel when router starts&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Set the target host as the server&#39;s hostname, for example &lt;code&gt;192.168.1.100&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Set the target port as &lt;code&gt;18085&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;&lt;em&gt;Optional:&lt;/em&gt; Set the Tunnel Length Option to &lt;strong&gt;1 hop tunnel (low anonymity)&lt;/strong&gt; for better performance.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;/li&gt; &lt;li&gt;Create another &lt;code&gt;Standard&lt;/code&gt; hidden service.&lt;ol&gt; &lt;li&gt;Set the name as &lt;code&gt;monerodrpc&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Check &lt;strong&gt;Automatically start tunnel when router starts&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Set the target host as the server&#39;s hostname, for example &lt;code&gt;192.168.1.100&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Set the target port as &lt;code&gt;18089&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;&lt;em&gt;Optional:&lt;/em&gt; Set the Tunnel Length Option to &lt;strong&gt;1 hop tunnel (low anonymity)&lt;/strong&gt; for better performance.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;/li&gt; &lt;li&gt;Create another &lt;code&gt;Standard&lt;/code&gt; hidden service.&lt;ol&gt; &lt;li&gt;Set the name as &lt;code&gt;monerolws&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Check &lt;strong&gt;Automatically start tunnel when router starts&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Set the target host as the server&#39;s hostname, for example &lt;code&gt;192.168.1.100&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Set the target port as &lt;code&gt;18090&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;&lt;em&gt;Optional:&lt;/em&gt; Set the Tunnel Length Option to &lt;strong&gt;1 hop tunnel (low anonymity)&lt;/strong&gt; for better performance.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;/li&gt; &lt;/ol&gt; &lt;p&gt;You will see the three I2P Hidden Services that you configured. Under each, you will see a &lt;code&gt;.b32.i2p&lt;/code&gt; address after &lt;strong&gt;Destination:&lt;/strong&gt;. You will need to use the destination &lt;code&gt;.b32.i2p&lt;/code&gt; addresses in later steps (just like the &lt;code&gt;.onion&lt;/code&gt; addresses), so keep them handy.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot showing I2P Hidden Services settings&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/06-i2p-settings.webp&#34; /&gt;&lt;/p&gt; &lt;h2 id=&#34;configure-monero-node&#34;&gt;Configure Monero Node&lt;/h2&gt; &lt;h3 id=&#34;initial-setup&#34;&gt;Initial Setup&lt;/h3&gt; &lt;ol&gt; &lt;li&gt;Click &lt;strong&gt;Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Discover Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Search for &lt;code&gt;Monero Node&lt;/code&gt;. Click on the &lt;strong&gt;Monero Node&lt;/strong&gt; app.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Install&lt;/strong&gt;. This will pull up a form.&lt;/li&gt; &lt;li&gt;&lt;em&gt;Optional:&lt;/em&gt; Uncheck &lt;strong&gt;Prune the blockchain&lt;/strong&gt;. This will use significantly more storage.&lt;/li&gt; &lt;li&gt;Under &lt;strong&gt;Storage Configuration&lt;/strong&gt; and &lt;strong&gt;Blockchain storage location&lt;/strong&gt;, change the &lt;strong&gt;Type&lt;/strong&gt; from &lt;code&gt;ixVolume&lt;/code&gt; to &lt;code&gt;Host Path&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Under &lt;strong&gt;Host Path&lt;/strong&gt;, use the folder picker to select the &lt;code&gt;monero-blockchain&lt;/code&gt; dataset. This should usually be &lt;code&gt;/mnt/monero-pool/monero-blockchain&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;&lt;em&gt;Optional:&lt;/em&gt; Under &lt;strong&gt;Resources Configuration&lt;/strong&gt;, increase the CPU resource limits to as high of a value as possible for your system. This will help the node sync faster.&lt;/li&gt; &lt;li&gt;Leave the other settings as default. Click &lt;strong&gt;Install&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;h4 id=&#34;why-not-configure-tor-and-i2p-settings-to-begin-with&#34;&gt;Why not configure Tor and I2P settings to begin with?&lt;/h4&gt; &lt;p&gt;Some users may be sensitive to a privacy risk where your Tor and I2P addresses could be matched with your public IPV4 address while it is syncing. By waiting to configure these settings until after your node is already fully synced, we minimize this risk.&lt;/p&gt; &lt;h3 id=&#34;check-on-the-sync-status&#34;&gt;Check on the Sync Status&lt;/h3&gt; &lt;p&gt;It will take a day or more for most systems to fully sync the Monero blockchain from scratch.&lt;/p&gt; &lt;p&gt;To check the status, go to the app page and click on the &lt;code&gt;monerod&lt;/code&gt; app. Under Workloads and to the right of &lt;code&gt;monerod – Running&lt;/code&gt;, click on the shell icon.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot showing how to click the Monero Node shell icon&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/07-monero-shell.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;Type &lt;code&gt;monerod status&lt;/code&gt; and press enter.&lt;/p&gt; &lt;p&gt;If the status reports &lt;code&gt;Height: ####/#### (100.0%) on mainnet&lt;/code&gt;, then your node is fully synced. You can proceed to the next step.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot showing the Monero Node sync status command&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/08-monero-shell.webp&#34; /&gt;&lt;/p&gt; &lt;h3 id=&#34;add-tor-and-i2p&#34;&gt;Add Tor and I2P&lt;/h3&gt; &lt;p&gt;After your Monero node is fully synced, click on the &lt;code&gt;monerod&lt;/code&gt; app and then click &lt;strong&gt;Edit&lt;/strong&gt;. This will bring up the same form that you configured when installing the app.&lt;/p&gt; &lt;ol&gt; &lt;li&gt;Check &lt;strong&gt;Enable Tor connections&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Set the &lt;strong&gt;Tor &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt;&lt;/strong&gt; as your hostname, for example &lt;code&gt;192.168.1.100&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Set the &lt;strong&gt;Tor port&lt;/strong&gt; as &lt;code&gt;9150&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Check &lt;strong&gt;Enable inbound Tor connections&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Set the &lt;strong&gt;Inbound onion address&lt;/strong&gt; as the &lt;code&gt;.onion&lt;/code&gt; address for &lt;code&gt;monerodp2p&lt;/code&gt; that you observed earlier.&lt;/li&gt; &lt;li&gt;Check &lt;strong&gt;Enable inbound I2P connections&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Set the &lt;strong&gt;I2P &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt;&lt;/strong&gt; as your hostname, for example &lt;code&gt;192.168.1.100&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Set the &lt;strong&gt;I2P Port&lt;/strong&gt; as &lt;code&gt;4447&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Check &lt;strong&gt;Enable inbound I2P connections&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Set the &lt;strong&gt;Inbound I2P base32 address&lt;/strong&gt; as the &lt;code&gt;.b32.i2p&lt;/code&gt; address for &lt;code&gt;monerodp2p&lt;/code&gt; that you observed earlier.&lt;/li&gt; &lt;li&gt;If you wish to enable Monero LWS, under &lt;strong&gt;ZMQ RPC Port&lt;/strong&gt;, change the &lt;strong&gt;Port Bind Mode&lt;/strong&gt; from &lt;code&gt;None&lt;/code&gt; to &lt;code&gt;Publish port on the host for external access&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;If you wish to enable Monero LWS, under &lt;strong&gt;ZMQ Pub Port&lt;/strong&gt;, change the &lt;strong&gt;Port Bind Mode&lt;/strong&gt; from &lt;code&gt;None&lt;/code&gt; to &lt;code&gt;Publish port on the host for external access&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Under &lt;strong&gt;Tor inbound port&lt;/strong&gt;, change the &lt;strong&gt;Port Bind Mode&lt;/strong&gt; from &lt;code&gt;None&lt;/code&gt; to &lt;code&gt;Publish port on the host for external access&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Under &lt;strong&gt;I2P inbound port&lt;/strong&gt;, change the &lt;strong&gt;Port Bind Mode&lt;/strong&gt; from &lt;code&gt;None&lt;/code&gt; to &lt;code&gt;Publish port on the host for external access&lt;/code&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Update&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot showing the Monero Node install settings&#34; src=&#34;../../../../assets/images/monero-server-using-truenas/09-monero-install.webp&#34; /&gt;&lt;/p&gt; &lt;h2 id=&#34;configure-monero-lws&#34;&gt;Configure Monero LWS&lt;/h2&gt; &lt;p&gt;For security reasons, the Monero LWS app only accepts requests from allowlisted Monero addresses. Requests from other users will be rejected.&lt;/p&gt; &lt;ol&gt; &lt;li&gt;Click &lt;strong&gt;Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Discover Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Search for &lt;code&gt;Monero LWS&lt;/code&gt;. Click on the &lt;strong&gt;Monero LWS&lt;/strong&gt; app.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Install&lt;/strong&gt;. This will pull up a form.&lt;/li&gt; &lt;li&gt;Under &lt;strong&gt;Accounts&lt;/strong&gt;, you can add sets of allowlisted Monero wallets that will be supported by this server. Click &lt;strong&gt;Add&lt;/strong&gt; to add a wallet. For each wallet, include the &lt;code&gt;Address&lt;/code&gt;, &lt;code&gt;View Key&lt;/code&gt;, and &lt;code&gt;Restore Height&lt;/code&gt;. If a restore height is not provided, it will scan the entire blockchain (which is thorough but inefficient).&lt;/li&gt; &lt;li&gt;&lt;em&gt;Optional:&lt;/em&gt; Under &lt;strong&gt;Resources Configuration&lt;/strong&gt;, increase the CPU resource limits to as high of a value as possible for your system. This will help the server scan multiple wallets faster.&lt;/li&gt; &lt;li&gt;After you have added all the wallets, click &lt;strong&gt;Install&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;p&gt;You can add new Monero wallets in the future by adding them to the list of accounts.&lt;/p&gt; &lt;h2 id=&#34;configure-secure-clearnet-connections&#34;&gt;Configure Secure Clearnet Connections&lt;/h2&gt; &lt;p&gt;It is insecure to connect your wallet to your server over an unencrypted connection.&lt;/p&gt; &lt;p&gt;If you only configure your wallet to connect to your server over its I2P or Tor addresses, then you&#39;re all set. The connection is already encrypted.&lt;/p&gt; &lt;p&gt;There are different ways to connect to your node over an encrypted clearnet connection, each with their pros and cons:&lt;/p&gt; &lt;table&gt; &lt;thead&gt; &lt;tr&gt; &lt;th&gt;Method&lt;/th&gt; &lt;th&gt;Pros&lt;/th&gt; &lt;th&gt;Cons&lt;/th&gt; &lt;/tr&gt; &lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;Tor&lt;/td&gt; &lt;td&gt;No additional configuration necessary. Private. Secure. Reliable.&lt;/td&gt; &lt;td&gt;Slow for non-LWS wallets.&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;I2P&lt;/td&gt; &lt;td&gt;No additional configuration necessary. Private. Secure.&lt;/td&gt; &lt;td&gt;Slow. Unreliable.&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;Nginx Proxy Manager&lt;/td&gt; &lt;td&gt;High degree of user control. Secure. Reliable. Fast.&lt;/td&gt; &lt;td&gt;Requires a domain. Requires configuration.&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;Cloudflare Tunnels&lt;/td&gt; &lt;td&gt;Secure. Reliable. Fast. Easy to set up. Extra security settings.&lt;/td&gt; &lt;td&gt;Requires a domain. Decrypted traffic is shared with Cloudflare.&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;h3 id=&#34;nginx-proxy-manager-recommended&#34;&gt;Nginx Proxy Manager (Recommended)&lt;/h3&gt; &lt;ol&gt; &lt;li&gt;Click &lt;strong&gt;Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Discover Apps&lt;/strong&gt;.&lt;/li&gt; &lt;li&gt;Search for &lt;code&gt;Nginx Proxy Manager&lt;/code&gt;. Click on the &lt;strong&gt;Nginx Proxy Manager&lt;/strong&gt; app.&lt;/li&gt; &lt;li&gt;Click &lt;strong&gt;Install&lt;/strong&gt;. This will pull up a form.&lt;/li&gt; &lt;li&gt;Leave the settings as default. Click &lt;strong&gt;Install&lt;/strong&gt;.&lt;/li&gt; &lt;/ol&gt; &lt;p&gt;You will see the Applications screen after it installs. After the Nginx Proxy Manager app shows the status as &lt;strong&gt;Running&lt;/strong&gt;, open a browser to &lt;code&gt;&amp;lt;hostname&amp;gt;:30020&lt;/code&gt;, for example &lt;code&gt;192.168.1.100:30020&lt;/code&gt;.&lt;/p&gt; &lt;h4 id=&#34;configure-your-domain-and-router&#34;&gt;Configure Your Domain and Router&lt;/h4&gt; &lt;p&gt;You will need to create A and (optionally) AAAA records with your &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; provider that point to your public IPV4 and IPV6 &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; addresses, respectively. You will then need to forward the ports in your router to your TrueNAS hostname. These steps are out of scope for this guide.&lt;/p&gt; &lt;h4 id=&#34;add-proxy-hosts-to-nginx-proxy-manager&#34;&gt;Add Proxy Hosts to Nginx Proxy Manager&lt;/h4&gt; &lt;p&gt;From the Nginx Proxy Manager browser interface, click &lt;strong&gt;Hosts&lt;/strong&gt;, &lt;strong&gt;Proxy Hosts&lt;/strong&gt;, then &lt;strong&gt;Add Proxy Host&lt;/strong&gt;. We recommend creating proxy hosts as follows:&lt;/p&gt; &lt;table&gt; &lt;thead&gt; &lt;tr&gt; &lt;th&gt;Domain Name&lt;/th&gt; &lt;th&gt;Scheme&lt;/th&gt; &lt;th&gt;Forward Hostname / &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt;&lt;/th&gt; &lt;th&gt;Forward Port&lt;/th&gt; &lt;/tr&gt; &lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;&lt;code&gt;monerod-rpc.&amp;lt;domain&amp;gt;&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;code&gt;http&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;code&gt;&amp;lt;hostname&amp;gt;&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;code&gt;18089&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;code&gt;monero-lws.&amp;lt;domain&amp;gt;&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;code&gt;http&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;code&gt;&amp;lt;hostname&amp;gt;&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;code&gt;18090&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;p&gt;For each entry, enable &lt;strong&gt;Block common exploits&lt;/strong&gt;. Configure the SSL settings with &lt;strong&gt;Request a new SSL Certificate&lt;/strong&gt;, &lt;strong&gt;Force SSL&lt;/strong&gt; enabled, and &lt;strong&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol&#34;&gt;HTTP&lt;/abbr&gt;/2 Support&lt;/strong&gt; enabled.&lt;/p&gt; &lt;p&gt;Optionally assign an access list.&lt;/p&gt; &lt;p&gt;You should now be able to access these services using your domain!&lt;/p&gt; &lt;h2 id=&#34;a-note-about-clearnet-networking&#34;&gt;A Note About Clearnet Networking&lt;/h2&gt; &lt;p&gt;Making clearnet connections without encryption (without SSL/&lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt;) is insecure. This guide uses the Nginx Proxy Manager app to configure these secure connections, but you can alternatively use another approach such as Cloudflare Tunnels, Tailscale, or WireGuard.&lt;/p&gt; &lt;h2 id=&#34;what-about-bitcoin&#34;&gt;What About Bitcoin?&lt;/h2&gt; &lt;p&gt;Bitcoin is not recommended by Privacy Guides due to its very weak privacy properties by default. Nevertheless, MAGIC Grants has made several Bitcoin oriented applications in the TrueNAS store that you may benefit from if you need to use Bitcoin.&lt;/p&gt; &lt;h2 id=&#34;test-connections&#34;&gt;Test Connections&lt;/h2&gt; &lt;p&gt;We will test connections to our node over Tor using &lt;a href=&#34;https://cakewallet.com&#34;&gt;Cake Wallet&lt;/a&gt;, &lt;a href=&#34;https://edge.app&#34;&gt;Edge Wallet&lt;/a&gt;, and &lt;a href=&#34;https://orbot.app&#34;&gt;Orbot&lt;/a&gt;. Make sure you have these apps installed and already have Monero wallets set up.&lt;/p&gt; &lt;p&gt;Use &lt;strong&gt;Full Device &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/strong&gt; mode with Orbot for this guide.&lt;/p&gt; &lt;h3 id=&#34;test-with-cake-wallet&#34;&gt;Test with Cake Wallet&lt;/h3&gt; &lt;p&gt;Cake Wallet will connect to your Monero node. Follow &lt;a href=&#34;https://docs.cakewallet.com/features/advanced/tor-with-orbot/#switch-back-to-cake-wallet&#34;&gt;these steps&lt;/a&gt; to change the Monero node that Cake Wallet uses. Provide your &lt;code&gt;monerodrpc&lt;/code&gt; onion address for the Monero Node app as the node address, &lt;code&gt;18089&lt;/code&gt; as the port, no username, no password, and &lt;strong&gt;Use SSL&lt;/strong&gt; unchecked.&lt;/p&gt; &lt;p&gt;You should see a green dot next to this newly added node, and you should notice that your wallet is able to sync. Syncing performance to a Monero node over Tor is slow.&lt;/p&gt; &lt;h3 id=&#34;test-with-edge-wallet&#34;&gt;Test with Edge Wallet&lt;/h3&gt; &lt;p&gt;Edge Wallet will connect to your Monero-LWS server. In Edge Wallet, click on the upper right hamburger menu, then &lt;strong&gt;Settings&lt;/strong&gt;, then &lt;strong&gt;Asset Settings&lt;/strong&gt;, then &lt;strong&gt;Monero&lt;/strong&gt;. Select &lt;strong&gt;Custom Light Wallet Server&lt;/strong&gt; and provide your &lt;code&gt;monerolws&lt;/code&gt; onion address with the port. For example, &lt;code&gt;http://monerolws.onion:18090&lt;/code&gt;, replacing &lt;code&gt;monerolws.onion&lt;/code&gt; with your correct onion address.&lt;/p&gt; &lt;p&gt;Back in the main wallet overview, you should see that your Monero wallet is fully synced.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/06/12/monero-server-using-truenas/</link> <pubDate>Thu, 16 Oct 2025 19:07:20 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/06/12/monero-server-using-truenas/</guid> </item> <item> <title>Real-Name Policies: The War Against Pseudonymity</title> <author>Em</author> <author>Jordan Warne</author> <category>Explainers</category> <description>&lt;h1 id=&#34;real-name-policies-the-war-against-pseudonymity&#34;&gt;Real-Name Policies: The War Against Pseudonymity&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Filtered photo of a &amp;quot;Hello my name is&amp;quot; name-tag sticker on a street post. Over the space for the name is a black graffiti tag.&#34; src=&#34;../../../../assets/images/real-name-policies/realname-cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Photo: Marija Zaric / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Real-name policies have existed for well over a decade already, and the problems they cause aren&#39;t new. But these problems have become exponentially harmful in today&#39;s world, where real-name policies are coupled with monopolistic platforms, increased mass surveillance, AI technologies, and facial recognition capabilities. It&#39;s time to fight back against this unsafe and discriminatory privacy-invasive practice.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;Pseudonymity, or the use of a nickname or fictitious name online, has always been deeply valued on the internet. It grants people protections and freedoms that are often impossible to benefit from offline.&lt;/p&gt; &lt;p&gt;Women, and especially women who are part of male-dominated online communities, have regularly used pseudonyms to hide their gender online in order to protect themselves from sexual harassment, stalking, and physical violence even.&lt;/p&gt; &lt;p&gt;Transgender and gender-diverse people also regularly use pseudonyms for protection, or use new chosen names to explore their gender identity online.&lt;/p&gt; &lt;p&gt;Victims of domestic violence, victims of stalkers, activists, and even journalists often use pseudonyms to protect themselves from aggressors or oppressive regimes.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Pseudonymity saves lives.&lt;/strong&gt; And yet, it is constantly under attack.&lt;/p&gt; &lt;h2 id=&#34;what-are-real-name-policies-exactly&#34;&gt;What are real-name policies exactly?&lt;/h2&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Increasingly more platforms demand that users provide their legal name and official identifications in order to keep using a platform.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;So called &#34;real-name&#34; policies are platform policies requiring users and subscribers to sign up and display their &#34;real name,&#34; often equated to a &lt;em&gt;legal&lt;/em&gt; name.&lt;/p&gt; &lt;p&gt;Facebook for example claims not to require a legal name, but only the &#34;real&#34; name a person uses in their daily life. Yet, the social media giant regularly demands official IDs to verify this &#34;real&#34; name, effectively requiring people associate their account with their &lt;em&gt;legal&lt;/em&gt; identity.&lt;/p&gt; &lt;p&gt;Facebook has even repeatedly taken the liberty to decide which name was &#34;real&#34;, and changed the displayed name of users based on verification processes &lt;strong&gt;without any prior consent from users&lt;/strong&gt;. For people in vulnerable situations, this can be a &lt;em&gt;very&lt;/em&gt; dangerous practice.&lt;/p&gt; &lt;p&gt;Facebook is perhaps the most infamous platform implementing such discriminatory and intrusive policy, but sadly, it&#39;s not the only one.&lt;/p&gt; &lt;p&gt;&lt;span class=&#34;pullquote-source&#34;&gt;Increasingly more platforms demand that users provide their legal name and official identifications in order to keep using a platform.&lt;/span&gt; And this will likely be aggravated significantly by the recent trend for &lt;a href=&#34;https://www.privacyguides.org/videos/2025/08/15/age-verification-is-a-privacy-nightmare/&#34;&gt;age-verification&lt;/a&gt; policies.&lt;/p&gt; &lt;h3 id=&#34;explicit-and-implicit-policies&#34;&gt;Explicit and implicit policies&lt;/h3&gt; &lt;p&gt;There is always two levels of real-name policies: The name displayed publicly to everyone (explicitly required), and the name the platform has associated with the account in its database (implicitly associated).&lt;/p&gt; &lt;p&gt;While a requirement to expose one&#39;s legal name publicly has clear privacy risks, storing legal names without displaying it to other users is also problematic.&lt;/p&gt; &lt;p&gt;For explicit requirements, users who are obligated to display their legal name publicly are not only forced to create a permanent association of this account with their legal identity (with all the problems this can bring), but are also potentially exposing their identity and account to current or future attackers.&lt;/p&gt; &lt;p&gt;For example, this can and does enable stalkers to find their victims online (and offline) to cause them harm.&lt;/p&gt; &lt;p&gt;For implicit associations, as soon as a legal name is collected and associated with an account in the backend, whether from providing official documentation for age verification, account recovery, payment, or any other processes; this data is at risk of getting leaked or breached, and eventually shared publicly as well.&lt;/p&gt; &lt;p&gt;Once this data is &lt;a href=&#34;https://discuss.privacyguides.net/t/discord-data-breach-customers-personal-data-and-scanned-photo-ids-leaked/31904&#34;&gt;exposed&lt;/a&gt;, this account now also becomes permanently associated with a legal identity, publicly.&lt;/p&gt; &lt;p&gt;Even without having an openly stated real-name policy, platforms collecting official documentation—or otherwise storing legal names associated with accounts—can effectively end up exposing their users to similar risks.&lt;/p&gt; &lt;h3 id=&#34;what-is-a-real-name-anyway&#34;&gt;What is a real name anyway?&lt;/h3&gt; &lt;p&gt;Of course, your true &lt;em&gt;real&lt;/em&gt; name is whatever you decide others should call you. Only &lt;em&gt;you&lt;/em&gt; can decide this, and others should be respectful of your choice.&lt;/p&gt; &lt;p&gt;Your &lt;em&gt;legal&lt;/em&gt; name, however, is a &lt;strong&gt;data marker attached to your person that can be used to trace many of your activities online and offline&lt;/strong&gt;, with a high degree of precision going as far back as when you were born.&lt;/p&gt; &lt;p&gt;For everyone, but especially for vulnerable communities, exposing legal names on certain platforms can represent a significant risk. The &lt;a href=&#34;https://www.techradar.com/pro/vpn/using-your-real-name-on-social-media-heres-why-you-should-think-twice&#34;&gt;use of pseudonymity&lt;/a&gt; is a critical part of online safety, and people should be able to continue using this protective measure without raising suspicion.&lt;/p&gt; &lt;h2 id=&#34;who-is-impacted-the-most-by-real-name-policies&#34;&gt;Who is impacted the most by real-name policies?&lt;/h2&gt; &lt;p&gt;Everyone is impacted by real-name policies, but groups that are at higher risk of discrimination, violence, and online harassment are disproportionally harmed by them.&lt;/p&gt; &lt;p&gt;Moreover, anyone who for various reasons uses a name that doesn&#39;t match their official ID; has a legal name that doesn&#39;t match an expected American name pattern; needs to conceal their gender online for safety; or has to protect their identity online due to their work as an activist, journalist, dissident, or whistleblower can be severely impacted, silenced, and even endangered by requirements to provide a legal name online.&lt;/p&gt; &lt;h3 id=&#34;victims-of-domestic-violence&#34;&gt;Victims of domestic violence&lt;/h3&gt; &lt;p&gt;For many people, using pseudonyms isn&#39;t just a good privacy practice, but it can be a matter of life and death.&lt;/p&gt; &lt;p&gt;For anyone who is experiencing or has experienced domestic violence, creating a new online identity hidden from the perpetrator can be essential for survival, to prepare a safe escape, or to keep having access to essential support and resources.&lt;/p&gt; &lt;p&gt;When people are forced to only use one identity online, an identity attached to their legal identity, this empowers aggressors to find their victims, to silence them, to control them, and to harm them.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Technologies and policies are never neutral.&lt;/strong&gt; When policies and features make it difficult or impossible for vulnerable people to use these technologies safely, they are effectively excluding vulnerable people from the platforms.&lt;/p&gt; &lt;p&gt;Even if this might seem minor from the outside, when Big Tech becomes so monopolistic that it&#39;s almost impossible to fully avoid it in our daily lives, when someone cannot access social groups and support without a Facebook account, and can&#39;t find a new job without LinkedIn, then it&#39;s not just a minor problem anymore, it&#39;s a major problem.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Platforms and online services should be safely accessible to everyone.&lt;/strong&gt; And this includes allowing the use of protective pseudonymity without requiring legal identification that could put the most vulnerable in life-threatening situations.&lt;/p&gt; &lt;h3 id=&#34;victims-of-stalking&#34;&gt;Victims of stalking&lt;/h3&gt; &lt;p&gt;Similarly to victims of domestic violence, victims of stalking must protect their identity online to stay safe from their stalkers. When platforms obligate people to use their legal names, explicitly or implicitly, they directly endanger these victims.&lt;/p&gt; &lt;p&gt;If a stalker or an aggressor knows a victim&#39;s legal name (which is often the case), then it&#39;s trivial to find their account on any platforms and services, regardless of if they have blocked them on one.&lt;/p&gt; &lt;p&gt;A good protection to prevent severe harassment is to create alternative accounts using a different name or different pseudonym unknown to the aggressor. This can give victims the peace of mind of knowing their stalker will not be able to find them there.&lt;/p&gt; &lt;p&gt;For anyone tempted to argue real-name policies reduce the number of perpetrators, this isn&#39;t the case.&lt;/p&gt; &lt;p&gt;Stalkers and predators of all kind feel generally quite comfortable using their own legal names, this isn&#39;t a problem for them. They feel confident knowing that victims generally have little recourses and support, and that there will be no consequences for them even when their legal name is known.&lt;/p&gt; &lt;p&gt;Despite the claims, removing pseudonymity doesn&#39;t remove misbehavior online, this has been demonstrated &lt;a href=&#34;https://theconversation.com/online-abuse-banning-anonymous-social-media-accounts-is-not-the-answer-170224&#34;&gt;again&lt;/a&gt;, and &lt;a href=&#34;https://theconversation.com/online-anonymity-study-found-stable-pseudonyms-created-a-more-civil-environment-than-real-user-names-171374&#34;&gt;again&lt;/a&gt;, and &lt;a href=&#34;https://allabouteve.co.in/harassment-of-women-on-linkedin/&#34;&gt;again&lt;/a&gt;. Real-name policies don&#39;t reduce crime, it only restricts the victims&#39; ability to protect themselves from such crime.&lt;/p&gt; &lt;h3 id=&#34;activists-and-political-dissidents&#34;&gt;Activists and political dissidents&lt;/h3&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Pseudonyms are hardly modern phenomena, and it&#39;s fair to say democracy wouldn&#39;t exist without it.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;For activists and political dissidents around the world, using pseudonymity online can be a way to reclaim freedom of speech and criticize power in a safer way. Under oppressive regimes, online privacy can mean life or death.&lt;/p&gt; &lt;p&gt;This is another example showing how essential privacy rights are to democracy. &lt;strong&gt;Real-name policies facilitate censorship, discrimination, and political repression.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;A Honduran blogger using the pseudonym &lt;a href=&#34;https://lagringasblogicito.blogspot.com/2011/10/my-ripples-will-continue.html&#34;&gt;La Gringa&lt;/a&gt; used her blog and Facebook page to criticize the Central American government for years.&lt;/p&gt; &lt;p&gt;Protecting her legal identity is essential to allow her to speak freely and stay safe from state repression. This isn&#39;t an exaggeration, Honduras is one of the most dangerous country for journalists. The Committee to Protect Journalists (CPJ) &lt;a href=&#34;https://latamjournalismreview.org/articles/almost-five-years-after-murder-of-honduran-journalist-gabriel-hernandez-authorities-still-waiting-for-results-of-their-investigations/&#34;&gt;recorded&lt;/a&gt; that 37 press workers were killed in the country between 1992 and 2023. Of these murders, 90% were unpunished.&lt;/p&gt; &lt;p&gt;But Facebook silenced La Gringa with its real-name policy, requiring her to provide a copy of her official ID to continue advocating on the platform. Evidently, this request is asking her to put her life in danger and cannot be compromised on.&lt;/p&gt; &lt;p&gt;Facebook&#39;s policy is essentially silencing any dissident and marginalized voices in oppressive regimes.&lt;/p&gt; &lt;p&gt;By letting the community report infractions to Facebook&#39;s real-name policy, this effectively allows Facebook&#39;s rules to be weaponized against marginalized groups already plagued with constant discrimination.&lt;/p&gt; &lt;p&gt;It also empowers abusers to silence their victims, and sides with oppressive regimes around the world to censor any critics they might have.&lt;/p&gt; &lt;p&gt;As reporter Kevin Morris &lt;a href=&#34;https://www.dailydot.com/news/la-gringa-facebook-ban-real-id-dangerous-honduras/&#34;&gt;commented&lt;/a&gt; in his Daily Dot piece on the topic: &lt;span class=&#34;pullquote-source&#34;&gt;&#34;Pseudonyms are hardly modern phenomena, and it&#39;s fair to say democracy wouldn&#39;t exist without it.&#34;&lt;/span&gt;&lt;/p&gt; &lt;h3 id=&#34;women&#34;&gt;Women&lt;/h3&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;A site which requires real/verified names is automatically flagging itself as a potentially/probably unsafe space for women, or for anyone else at risk of harassment, violence, job discrimination, and the like.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;Women have long used pseudonyms on the internet in order to conceal their gender online, and spare themselves from the sexual harassment and discrimination omnipresent on some platforms. This is even more common in male-dominated communities like online gaming, for example.&lt;/p&gt; &lt;p&gt;It&#39;s not rare to hear some people claiming that &#34;there aren&#39;t any women in their online community.&#34; Well, there probably is.&lt;/p&gt; &lt;p&gt;Platforms allowing pseudonyms foster a culture of inclusivity where everyone can participate free from discrimination, regardless of their gender. Real-name policies encourage the opposite: platforms where participants are forced to either endure the abuse and compromise their physical safety, or be excluded entirely.&lt;/p&gt; &lt;p&gt;As pseudonymous author &lt;em&gt;skud&lt;/em&gt; &lt;a href=&#34;https://geekfeminismdotorg.wordpress.com/2010/06/10/hacker-news-and-pseudonymity/&#34;&gt;wrote&lt;/a&gt; for the &lt;em&gt;Geek Feminism&lt;/em&gt; blog in 2010:&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;[...] women online are regularly admonished to use pseudonyms to protect themselves. Many websites with a culture of pseudonymity [...] have a very high proportion of female members, perhaps in part because of the sense of privacy and security that pseudonymity brings. &lt;span class=&#34;pullquote-source&#34;&gt;A site which requires real/verified names is automatically flagging itself as a potentially/probably unsafe space for women, or for anyone else at risk of harassment, violence, job discrimination, and the like.&lt;/span&gt;&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Women aren&#39;t exactly a minority group. While platforms should be inclusive to everyone of course, including minority groups, enforcing a policy that obligates roughly 50% of the population to lower its safety protections in order to participate should be obviously unacceptable.&lt;/p&gt; &lt;h3 id=&#34;indigenous-people&#34;&gt;Indigenous people&lt;/h3&gt; &lt;p&gt;Notwithstanding its own policy, Facebook has regularly suspended accounts with legal names wrongly targeted as fake, based on criteria rooted in colonialism. Indigenous communities have been exceedingly impacted by Facebook&#39;s real-name policy, despite following all the platform&#39;s rules as requested.&lt;/p&gt; &lt;p&gt;In 2009, Facebook abruptly &lt;a href=&#34;https://ictnews.org/archive/facebook-no-friend-to-american-indian-names/&#34;&gt;cut off account access&lt;/a&gt; to an Indigenous American woman named Robin Kills The Enemy, wrongly accusing her of registering under a false name. But her name was authentic, and indeed her &lt;em&gt;legal&lt;/em&gt; name.&lt;/p&gt; &lt;p&gt;Facebook eventually reinstated her account, but only after a long process where she had to modify the spelling.&lt;/p&gt; &lt;p&gt;The burden shouldn&#39;t be on Indigenous people to have to prove their identity just because a US-based corporation can&#39;t seem to understand the global diversity of naming conventions.&lt;/p&gt; &lt;p&gt;Following Kills The Enemy&#39;s experience, a journalist started a Facebook group called &#34;Facebook: don&#39;t discriminate against Native surnames!!!&#34; that was joined by over a thousand people only a few days after its creation. Many users shared similar experiences and questioned the platform&#39;s treatment of Indigenous surnames.&lt;/p&gt; &lt;p&gt;Another woman named Melissa Holds The Enemy described a month-long process to recover her account.&lt;/p&gt; &lt;p&gt;An Indigenous man named Oglala Lakota Lance Brown Eyes had his account &lt;a href=&#34;https://colorlines.com/article/native-americans-say-facebook-accusing-them-using-fake-names/&#34;&gt;suspended&lt;/a&gt; by Facebook demanding his &#34;real&#34; name.&lt;/p&gt; &lt;p&gt;After Brown Eyes sent all the required proofs, Facebook decided without warning to Americanize his displayed name to &#34;Lance Brown.&#34; &lt;strong&gt;This is blatant racism.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;His name was eventually corrected and Facebook apologized, but only after Brown Eyes threatened the company with a class action lawsuit.&lt;/p&gt; &lt;p&gt;Dana Lone Hill also got her account suspended because of her Indigenous surname, and was forced to go through Facebook&#39;s intrusive verification process in order to recover her account.&lt;/p&gt; &lt;p&gt;The list goes on and on. Indigenous people have been forced by Facebook to modify and Americanize their &lt;em&gt;actual legal names&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;Many were forced to add hyphens, change the alphabet used, smash words together, or even remove parts of their legal name in order to please Facebook&#39;s arbitrary preferences, ignoring its own &#34;real-name&#34; policy.&lt;/p&gt; &lt;p&gt;This is yet another demonstration of systemic racism perpetrated by a monopolistic corporation quick to ignore the human rights and diversity of its users.&lt;/p&gt; &lt;h3 id=&#34;people-with-non-anglophone-names&#34;&gt;People with non-Anglophone names&lt;/h3&gt; &lt;p&gt;In another case, a woman from Japan named Hiroko Yoda &lt;a href=&#34;https://www.telegraph.co.uk/news/newstopics/howaboutthat/2632170/Woman-called-Yoda-blocked-from-Facebook.html&#34;&gt;wasn&#39;t able to sign up&lt;/a&gt; for a Facebook account due to her surname.&lt;/p&gt; &lt;p&gt;Despite being a common surname in Japan, it seems Facebook judged it more important to ban anyone trying to &#34;impersonate&#34; the popular Star Wars character.&lt;/p&gt; &lt;p&gt;Of course, the Star Wars character uses a Japanese name because its creator has drawn &lt;a href=&#34;https://en.wikipedia.org/wiki/Yoda#Creation&#34;&gt;inspiration&lt;/a&gt; from the Japanese culture. But Facebook still seems to somehow think that Star Wars comes first, and Japanese people must pay the price for daring to share a surname with the American Jedi.&lt;/p&gt; &lt;p&gt;A Facebook user from Hawaii named Chase Nahooikaikakeolamauloaokalani Silva also had his account suspended despite using his legal name.&lt;/p&gt; &lt;p&gt;As a proud Hawaiian, it was important for him to be able to display his Hawaiian given name. But Facebook just didn&#39;t like his &lt;em&gt;legal&lt;/em&gt; name.&lt;/p&gt; &lt;p&gt;Silva reported to &lt;a href=&#34;https://www.huffpost.com/entry/facebook-chase-nahooikaikakeolamauloaokalani-silva_n_5833248&#34;&gt;HuffPost&lt;/a&gt; that &#34;Facebook should not be able to dictate what your name is, what you go by, what you answer to,&#34; and he&#39;s right.&lt;/p&gt; &lt;p&gt;More broadly, Facebook&#39;s policy &lt;a href=&#34;https://en.wikipedia.org/wiki/Facebook_real-name_policy_controversy&#34;&gt;prohibits&lt;/a&gt; name with &#34;too many&#34; words, capital letters, or first names with initials. This assumes the default for names is the Americanized format of one first name, one (short) middle name, and one last name.&lt;/p&gt; &lt;p&gt;But this isn&#39;t a reality for most of the world. This extremely narrow vision of what a name should look like and how it should be formatted isn&#39;t compatible with many if not most cultures.&lt;/p&gt; &lt;p&gt;It&#39;s unbelievable (and unacceptable) that a platform with an estimated 2.28 billion active users, who seems to want to eat even more of the world every year, is being so ignorant of non-American cultures and global naming conventions in its policies and practices.&lt;/p&gt; &lt;h3 id=&#34;the-transgender-community&#34;&gt;The transgender community&lt;/h3&gt; &lt;p&gt;For transgender and gender-diverse individuals, their legal name may be a &#34;&lt;a href=&#34;https://en.wikipedia.org/wiki/Deadnaming&#34;&gt;dead name&lt;/a&gt;.&#34; A dead name is a name that they were assigned at birth but no longer identify with. Commonly, transgender people change their name as part of their gender transition.&lt;/p&gt; &lt;p&gt;In many countries around the world, there can be many bureaucratic hurdles required to change one&#39;s name, meaning that many trans people are unable to update their legal name to reflect their gender identity. Because they no longer identify with their dead name, keeping it private is of great importance for their mental health and safety.&lt;/p&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;23% of LGBTQ+ young people reported that they have been physically threatened or harmed in the past year due to either their sexual orientation or gender identity.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;Referring to a trans person with their dead name is considered offensive and often involves misgendering someone too. For transgender people, being called a name that they no longer identify with invokes feelings of depression, anxiety, gender dysphoria, and lack of acceptance.&lt;/p&gt; &lt;p&gt;Using someone&#39;s dead name signals that you don&#39;t respect their identity and that you don&#39;t care about them enough to use their new name.&lt;/p&gt; &lt;p&gt;Unfortunately, transgender people still face widespread discrimination, that&#39;s why &#34;dead naming&#34; can be incredibly dangerous. Revealing someone&#39;s gender identity or sexuality without their consent is called &#34;outing&#34;. By calling someone by their dead name, you may be inadvertently revealing someone is transgender. This can be not only traumatizing and frightening for the individual, but can also lead to violence or put this person in a dangerous situation.&lt;/p&gt; &lt;p&gt;The Trevor Project, a non-profit LGBTQ+ organization, conducts a yearly &lt;a href=&#34;https://www.thetrevorproject.org/survey-2024/?_hsmi=305272848&#34;&gt;survey&lt;/a&gt; on LGBTQ+ youth across the United States. In their 2024 release, they found that &lt;span class=&#34;pullquote-source&#34;&gt;&#34;23% of LGBTQ+ young people reported that they have been physically threatened or harmed in the past year due to either their sexual orientation or gender identity.&#34;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;This is why when real-name policies come in, requiring transgender people to use their legal name for their social media accounts, this could force them to &#34;come out&#34; by displaying a name that they no longer identify with, therefore revealing they are transgender. The National LGBTQ Institute on Intimate Partner Violence &lt;a href=&#34;https://lgbtqipvinstitute.org/coming-out-safely/&#34;&gt;describes&lt;/a&gt; &#34;coming out&#34; as an &#34;ongoing process, by which a person shares aspects of their identity with others.&#34;&lt;/p&gt; &lt;p&gt;Having aspects of their identity shared without their consent can put this person in significant physical danger because of unsupportive family members, friends, colleagues, and strangers. This is especially the case with LGBTQ+ youth, who are at heightened risk of online, verbal, physical harassment, or violence due to their identity.&lt;/p&gt; &lt;p&gt;Coming out can be a very daunting and scary process, particularly for transgender and gender-diverse people, and often can be an ongoing process over many years. In many cases, LGBTQ+ people choose instead to &lt;a href=&#34;https://www.stonewall.org.uk/news/new-research-shows-almost-40-of-lgbtq-employees-still-hide-their-identity-at-work&#34;&gt;hide their identity&lt;/a&gt; at social and work gatherings.&lt;/p&gt; &lt;p&gt;Platforms that enforce real-name policies take away the essential ability to control when and how that process plays out are nothing short of abusive. This might sound hyperbolic, however, &#34;outing&#34; is often used as a mean of control in abusive relationships to coerce an LGBTQ+ individual. The fact that social media platforms are exhibiting similar behavior is alarming.&lt;/p&gt; &lt;p&gt;Unfortunately, many websites don&#39;t allow updating the name attached to an account easily, often requiring to provide legal documentation showing proof that the name has been legally changed.&lt;/p&gt; &lt;p&gt;Having to provide your identification documents to use a website is not only terrible for your privacy, as it links your real life identity to your online account, it also puts your identity at risk.&lt;/p&gt; &lt;p&gt;Companies that process and verify identity documents are at a much higher risk of being targeted by malicious actors, because of the sensitive information they store and process.&lt;/p&gt; &lt;p&gt;One of the worst offenders of this is Facebook. They require everyone that signs up to use their legal name for their profile, and claim that this is to ensure safety on the platform so that everyone knows who they are talking to is who they say they are.&lt;/p&gt; &lt;p&gt;Many transgender and gender-diverse people use aliases on social media platforms to protect their identities and the identities of those around them, because they are more likely to be harassed or doxxed. Facebook&#39;s real-name policy has unforeseen consequences for these people, as one transgender Facebook user &lt;a href=&#34;https://www.dailydot.com/news/facebook-real-names-cracking-down-transgender/&#34;&gt;found out&lt;/a&gt;:&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;I woke up to find my Facebook account deleted. [...] I have had a Facebook since about 2007 or 2008. Other than when I was a kid and was afraid my parents would find out about my account (causing me to use an alias for a little while), my profile always bore my legal name. A week or so ago, however, I changed my display name to &#34;Arc Angel.&#34;&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Finally, because of the discrimination and danger that transgender people face in the real world, they often find refuge in online and internet communities. According to a report by &lt;a href=&#34;https://assets.hopelab.org/wp-content/uploads/2025/03/2025-Without-It-I-Wouldnt-Be-Here.pdf&#34;&gt;Hopelab&lt;/a&gt; of LGBTQ+ youth:&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;Transgender young people more often agree that their online communities and friendships were important or very important (84%) when they began to explore their sexuality or gender compared to cisgender LGBQ+ young people (71%).&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;This is why it’s so important that they are able to freely express themselves with a pseudonymous or anonymous identity. If every online platform required these users to use their legal name, this would be extremely dangerous for transgender and gender-diverse people who often rely on online spaces for community, friendship, and support.&lt;/p&gt; &lt;h3 id=&#34;lgbtq-people&#34;&gt;LGBTQ+ people&lt;/h3&gt; &lt;p&gt;Moreover, real-name policies disproportionately affect LGBTQ+ people, as they often prefer to not associate their legal name with their online activities. This is especially important for people living in countries where LGBTQ+ identities are &lt;a href=&#34;https://en.wikipedia.org/wiki/Criminalization_of_homosexuality&#34;&gt;criminalized by law&lt;/a&gt;, meaning they can be jailed (or worse) if they associate their online activities with their real life identity.&lt;/p&gt; &lt;p&gt;Unfortunately, it gets even worse: harassers and trolls have weaponized Facebook&#39;s real-name policy, and are using it to silence their victims by mass reporting them as using a fake name.&lt;/p&gt; &lt;p&gt;In an &lt;a href=&#34;https://www.eff.org/document/open-letter-facebook-about-its-real-names-policy&#34;&gt;open letter&lt;/a&gt; to Facebook about its real-name policy in 2015, many LGBTQ+ and digital rights organizations warned Facebook that this was being used to silence LGBTQ+ people:&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;Facebook users in the global LGBTQ community, South and Southeast Asia and the Middle East report that groups have deliberately organized (sometimes even coordinating via Facebook) to silence their targets using the &#34;Report Abuse&#34; button.&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Despite all the recommendations and warnings by LGBTQ+ organizations and digital rights groups more than ten years ago, Facebook is still standing strong in its intention to keep the platform a &#34;real name&#34; only space.&lt;/p&gt; &lt;p&gt;Their help center still &lt;a href=&#34;https://www.facebook.com/help/229715077154790/Names+allowed+on+Facebook/&#34;&gt;states&lt;/a&gt; that you can only use a name that appears on your official identification documents:&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;The name on your profile should be the name that your friends call you in everyday life. This name should also appear on a form of ID or document from our ID list.&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Many platforms have been trying to improve the way they handle this and allow for users to select a preferred name that is displayed instead of their legal name. This is an improvement, however it isn&#39;t without issues.&lt;/p&gt; &lt;p&gt;Platforms shouldn&#39;t require you to provide your legal name to begin with.&lt;/p&gt; &lt;h3 id=&#34;stage-performers-and-small-businesses&#34;&gt;Stage performers and small businesses&lt;/h3&gt; &lt;p&gt;In 2014, Facebook made the news for ramping up its real-name policy and suspending hundreds of accounts from marginalized and vulnerable people (more on this in the &lt;a href=&#34;#facebook&#34;&gt;next section&lt;/a&gt;). The platform was heavily criticized, and Facebook eventually reinstated many banned accounts.&lt;/p&gt; &lt;p&gt;At the time, drag performers were &lt;a href=&#34;https://www.cnn.com/2014/09/16/living/facebook-name-policy/&#34;&gt;severely impacted&lt;/a&gt; by the policy purge. Drag queen and activist Sister Roma reported having to change her Facebook profile to a legal name she had not used publicly for 27 years.&lt;/p&gt; &lt;p&gt;Retired burlesque dancer Blissom Booblé explained that using a pen name on Facebook was essential to continue her advocacy for LGBTQ+ homeless youth and to raise HIV awareness while staying free from discrimination at her workplace.&lt;/p&gt; &lt;p&gt;Drag queen Ruby Roo reluctantly complied with Facebook&#39;s policy in order to keep contact with his friends, but expressed concerns that people would not recognize him under his legal name. If nobody ever calls you by your legal name, does this still even count as your &#34;real&#34; name?&lt;/p&gt; &lt;p&gt;During an earlier purge in 2009, small-business entrepreneur Alicia Istanbul &lt;a href=&#34;https://www.sfgate.com/business/article/Real-users-caught-in-Facebook-fake-name-purge-3231397.php&#34;&gt;suddenly lost access&lt;/a&gt; to both her personal Facebook account and her jewelry design business page. Once this happens, the burden falls on users to carry on the lengthy and intrusive verification process to restore their accounts.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;There is no innocent until proven guilty with Big Tech.&lt;/strong&gt; This can represent significant losses in time and money for small businesses.&lt;/p&gt; &lt;p&gt;Additionally, many professionals such as teachers, doctors, therapists, and social workers regularly use pseudonyms so that clients and patients will not be able to find their personal accounts.&lt;/p&gt; &lt;p&gt;Everyone should have the right to separate their professional lives from their personal lives, and &lt;a href=&#34;../../../06/10/stay-safe-but-stay-connected/#pseudonymity&#34;&gt;using pseudonyms is a great practice&lt;/a&gt; to this effect.&lt;/p&gt; &lt;h3 id=&#34;everyone-else&#34;&gt;Everyone else&lt;/h3&gt; &lt;p&gt;Finally, everyone can be impacted negatively by real-name policies, not only marginalized or vulnerable groups.&lt;/p&gt; &lt;p&gt;Everyone should be able to choose the protections necessary for themselves, according to their own and unique &lt;a href=&#34;https://www.privacyguides.org/en/basics/threat-modeling/&#34;&gt;threat model&lt;/a&gt;. If someone decides it&#39;s safer or more comfortable for them to use a platform under a pseudonymous account, they should be able to do so freely.&lt;/p&gt; &lt;p&gt;Privacy is a basic human right, and it should be accessible to all without requiring any justification.&lt;/p&gt; &lt;p&gt;The normalization of real-name policies online, aggravated by the growing identity and age verification industry, will have devastating consequences for everyone, and for democracies everywhere. &lt;strong&gt;Real-name policies are authoritarian in nature and have a chilling effect on freedom of speech and other civil liberties.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;If we value privacy as a human right, we must push back against real-name policies, especially on social media.&lt;/p&gt; &lt;h2 id=&#34;where-are-real-name-policies&#34;&gt;Where are real-name policies?&lt;/h2&gt; &lt;p&gt;About ten years ago, pseudonymity became a heated news topic during the so-called &lt;a href=&#34;https://en.wikipedia.org/wiki/Nymwars&#34;&gt;Nymwars&lt;/a&gt;, the wars against pseudo&lt;em&gt;nyms&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;The term mostly refers to a series of conflicts related to real-name policies in the 2010s. It emerged in relation to waves of policy enforcement from Facebook, Google, and the video-game giant Blizzard.&lt;/p&gt; &lt;p&gt;With the increasing push for age verification and &#34;human authentication&#34; online, the Nymwars are sadly likely to make a comeback very soon. And for some platforms, the war just never stopped.&lt;/p&gt; &lt;p&gt;Sometimes, your legal name might be required online of course. For example, for governmental and financial services. But way too many platforms and services collect legal names when there really isn&#39;t any strong justifications for it.&lt;/p&gt; &lt;p&gt;While Facebook was mentioned abundantly in previous examples, this problem isn&#39;t limited to Meta&#39;s social media. You&#39;ve probably encountered real-name policies everywhere already, but here are some platforms (and even countries) that have been infamous for it:&lt;/p&gt; &lt;h3 id=&#34;facebook&#34;&gt;Facebook&lt;/h3&gt; &lt;p&gt;In 2014, Facebook &lt;a href=&#34;https://www.aclunc.org/blog/my-name-why-aclu-facebook-today&#34;&gt;made the news&lt;/a&gt; (again) for enforcing a &lt;a href=&#34;https://www.zdnet.com/article/facebook-nymwars-disproportionately-outing-lgbt-performers-users-furious/&#34;&gt;horrible policy&lt;/a&gt; (again) that was &lt;a href=&#34;https://www.eff.org/deeplinks/2014/09/facebooks-real-name-policy-can-cause-real-world-harm-lgbtq-community&#34;&gt;hurting&lt;/a&gt; marginalized and vulnerable groups the most (&lt;a href=&#34;https://www.hrc.org/news/metas-new-policies-how-they-endanger-lgbtq-communities-and-our-tips-for-staying-safe-online&#34;&gt;again&lt;/a&gt;).&lt;/p&gt; &lt;p&gt;Several human rights groups, including the Electronic Frontier Foundation, Human Rights Watch, and Access Now even joined the &lt;a href=&#34;https://www.accessnow.org/nameless-coalition-calls-on-facebook-to-change-its-real-name-policy/&#34;&gt;Nameless Coalition&lt;/a&gt; to demand changes to Facebook&#39;s policy.&lt;/p&gt; &lt;p&gt;Facebook presented this ramping up of their real-name policy enforcement as something important for &#34;authenticity&#34; online. Despite this dubitable claim, Facebook was in all likelihood simply worried about protecting its financial assets, as ever.&lt;/p&gt; &lt;p&gt;Back in 2012, Facebook&#39;s share price plummeted after a quarterly filing with the Securities and Exchange Commission &lt;a href=&#34;https://www.theguardian.com/technology/2012/aug/02/facebook-share-price-slumps-20-dollars&#34;&gt;revealed&lt;/a&gt; that an estimated 8.7% of accounts on the platform may be fake, and 5% of active accounts were duplicates (numbers that aren&#39;t really that alarming, actually). But this backlash from investors evidently scared Facebook enough to justify intensifying its policy enforcement for accounts using pseudonyms, or suspected of being fake, presumably in an attempt to soothe shareholders.&lt;/p&gt; &lt;p&gt;Despite the unpopularity of these policies, the real customer for Facebook isn&#39;t its users, but its advertisers (who demand access to your data, Facebook&#39;s true product).&lt;/p&gt; &lt;p&gt;Advertisers want some assurance that they are paying for &lt;em&gt;real&lt;/em&gt; humans to see their ads, otherwise this diminishes Facebook&#39;s value to them. &lt;strong&gt;It&#39;s important to remember that Facebook is, and has always been, an advertising company.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Despicably, Facebook even &lt;a href=&#34;https://thenextweb.com/news/facebook-now-wants-snitch-friends-arent-using-real-name&#34;&gt;encouraged&lt;/a&gt; people to &#34;snitch on [their] friends if they are not using their real name.&#34;&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;Please help us understand how people are using Facebook. Your response is anonymous and won&#39;t affect your friend&#39;s account. Is this your friend&#39;s real name?&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;This kind of prompt fosters mistrust and allows users to weaponize policies against people they simply don&#39;t like. Victims of these &#34;report attacks&#34; are often the most vulnerable and the most marginalized in our society. &lt;strong&gt;Real-name policies have nothing to do with safety, in fact, they&#39;re horrible for safety.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;A decade later, Facebook still encourages and enforces its real-name policy in order to protect its most valuable asset to sell: Your personal data.&lt;/p&gt; &lt;h3 id=&#34;linkedin&#34;&gt;LinkedIn&lt;/h3&gt; &lt;p&gt;LinkedIn is another well-known platform that enforces a real-name policy.&lt;/p&gt; &lt;p&gt;The employment-oriented social media states in its &lt;a href=&#34;https://www.linkedin.com/help/linkedin/answer/a1337288/names-allowed-on-profiles&#34;&gt;User Agreement&lt;/a&gt; that &#34;LinkedIn does not allow members to use pseudonyms, fake names, business names, associations, groups, email addresses, or special characters that do not reflect your real or preferred professional name.&#34;&lt;/p&gt; &lt;p&gt;It&#39;s unclear how LinkedIn would enforce or verify what is an allowed &#34;preferred professional name.&#34;&lt;/p&gt; &lt;p&gt;Although this might make slightly more sense on a platform focused on employment, the policy still excludes some professionals and industries that regularly work using pseudonyms, such as performers, writers, visual artists, activists, and privacy advocates even.&lt;/p&gt; &lt;p&gt;Additionally, the platform uses the same colonialist discrimination as Facebook, assuming that all names worldwide are composed of &#34;first, middle, and last names&#34; only.&lt;/p&gt; &lt;h3 id=&#34;google-quora-and-blizzard-abandoned-their-policies&#34;&gt;Google, Quora, and Blizzard abandoned their policies&lt;/h3&gt; &lt;p&gt;Google made the news in 2011 when it started implementing and enforcing its own real-name policy for its (now defunct) social media platform Google+, and by proxy for YouTube accounts when Google &lt;a href=&#34;https://www.theguardian.com/technology/2014/jul/16/youtube-trolls-google-real-name-commenter-policy&#34;&gt;migrated&lt;/a&gt; YouTube comments to a Google+ system in 2013.&lt;/p&gt; &lt;p&gt;The policy was &lt;a href=&#34;https://www.eff.org/deeplinks/2011/07/case-pseudonyms&#34;&gt;largely criticized&lt;/a&gt; after a wave of account suspensions, where some famous accounts were banned. In July 2014, Google &lt;a href=&#34;https://en.wikipedia.org/wiki/Nymwars#Google&#34;&gt;abandoned&lt;/a&gt; the policy altogether and removed restrictions on account names.&lt;/p&gt; &lt;p&gt;The question-answering social platform Quora also enforced a real-name policy for a long time.&lt;/p&gt; &lt;p&gt;Verification wasn&#39;t required, but names deemed &#34;false&#34; could be reported by the community. Again, this kind of reporting system facilitates abuse by allowing the weaponization of platform policies against marginalized groups.&lt;/p&gt; &lt;p&gt;Thankfully, Quora &lt;a href=&#34;https://quorablog.quora.com/Allowing-everyone-to-contribute-to-Quora&#34;&gt;eliminated&lt;/a&gt; the requirement to use a &#34;real&#34; name in 2021, and now allows users to register with protective pseudonyms.&lt;/p&gt; &lt;p&gt;The video-game developer Blizzard Entertainment spawned strong criticism online when the company &lt;a href=&#34;https://en.wikipedia.org/wiki/Blizzard_Entertainment#Privacy_controversy_and_Real_ID&#34;&gt;announced&lt;/a&gt; in 2010 that it would be implementing a real-name policy for Blizzard&#39;s forums.&lt;/p&gt; &lt;p&gt;Gamers were not amused. The community came together to fight back in force against the announced policy. Game magazines and forums were inundated with replies and condemnations.&lt;/p&gt; &lt;p&gt;At one point, a Blizzard employee trying to demonstrate that the policy &#34;wasn&#39;t a big deal&#34; willingly shared his real name on a public post. After this revelation, forum members started to post the employee&#39;s personal information, including his phone number, age, picture, home address, and even information related to his family members.&lt;/p&gt; &lt;p&gt;Other members were quick to share their own experiences and show how &lt;a href=&#34;https://web.archive.org/web/20100628055329/http://ve3d.ign.com/articles/news/55728/Is-Blizzards-Real-ID-Safe-Or-A-Playground-For-Sexual-Deviants&#34;&gt;unsafe&lt;/a&gt; a real-name policy would be. Following the powerful community backlash, Blizzard decided to cancel its plan for the invasive policy.&lt;/p&gt; &lt;h3 id=&#34;south-korea&#34;&gt;South Korea&lt;/h3&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Despite the enforcement of the system, the number of illegal or malicious postings online has not decreased.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;Terrifyingly, whole countries have enforced real-name policies online. In 2007, South Korea &lt;a href=&#34;https://www.koreatimes.co.kr/southkorea/20120823/online-real-name-system-unconstitutional&#34;&gt;implemented&lt;/a&gt; a name registration system for internet users in compliance with the country&#39;s Information Communications Law.&lt;/p&gt; &lt;p&gt;The law was initially enforced in an attempt to reduce malicious comments online, but &lt;strong&gt;was later ruled unconstitutional and revoked in 2012&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;The Constitutional Court said in its verdict that &#34;the system does not seem to have been beneficial to the public. &lt;span class=&#34;pullquote-source&#34;&gt;Despite the enforcement of the system, the number of illegal or malicious postings online has not decreased.&lt;/span&gt;&#34;&lt;/p&gt; &lt;h3 id=&#34;china&#34;&gt;China&lt;/h3&gt; &lt;p&gt;Sadly, not every country implementing such a system came to the same conclusion.&lt;/p&gt; &lt;p&gt;In China, the &lt;a href=&#34;https://en.wikipedia.org/wiki/Internet_real-name_system_in_China&#34;&gt;Internet real-name system&lt;/a&gt; obligates all internet service providers and online platforms to collect users&#39; legal names, ID numbers, and more. This affects services such as internet access, phone service, social media, instant messaging, microblogging, and online gaming.&lt;/p&gt; &lt;p&gt;In 2023, large Chinese platforms announced that they would make public the legal names of any accounts with over 500,000 followers.&lt;/p&gt; &lt;p&gt;In July 2025, China centralized this control further with the launch of the &lt;a href=&#34;https://en.wikipedia.org/wiki/National_online_identity_authentication&#34;&gt;national online identity authentication&lt;/a&gt; system, which requires citizens to submit their personal information in order to receive an &#34;Internet certificate&#34; to access online accounts.&lt;/p&gt; &lt;p&gt;This effectively imposes a real-name policy on &lt;em&gt;all&lt;/em&gt; internet services in the country, and makes this information accessible at all time by the government.&lt;/p&gt; &lt;p&gt;The new national cyber ID system has been &lt;a href=&#34;https://www.scmp.com/tech/tech-trends/article/3318302/china-rolls-out-voluntary-cyber-id-system-amid-concerns-over-privacy-censorship&#34;&gt;criticized&lt;/a&gt; over privacy and censorship concerns.&lt;/p&gt; &lt;p&gt;So far, it is not mandatory to share identity through the national online identity authentication (although services are still obligated to identity their users in other ways).&lt;/p&gt; &lt;p&gt;However, in a country where freedom of speech and access to information is increasingly restricted, it&#39;s easy to imagine the national real-name system could become obligatory everywhere soon.&lt;/p&gt; &lt;h2 id=&#34;real-name-policies-dont-make-the-web-safer&#34;&gt;Real-name policies don&#39;t make the web safer&lt;/h2&gt; &lt;p&gt;It has been demonstrated again and again that real-name policies do not reduce abuse and misbehavior online, and only end up harming the most vulnerable.&lt;/p&gt; &lt;p&gt;Despite the evidence and failed attempts, platform owners and policymakers obstinately continue to push for the implementation of these dangerous, authoritarian systems.&lt;/p&gt; &lt;p&gt;Platforms will often claim these policies are to protect users from harassment, but when action is required to truly protect users they refuse to act. Facebook, the most infamous platform for enforcing its real-name policy, &lt;a href=&#34;https://www.theverge.com/news/713976/online-harassment-meta-social-media-environmental-activists&#34;&gt;ranks the &lt;em&gt;worst&lt;/em&gt; for online harassment&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;So, who are these real-name policies truly protecting?&lt;/p&gt; &lt;p&gt;It&#39;s clear that, as is the case for other oppressive policies such as &lt;a href=&#34;../../../05/06/age-verification-wants-your-face/&#34;&gt;Age Verification&lt;/a&gt; and &lt;a href=&#34;../../../09/08/chat-control-must-be-stopped/&#34;&gt;Chat Control&lt;/a&gt;, &#34;safety&#34; is only an excuse for people to accept what this is truly about: &lt;strong&gt;Corporate profit and government control.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Unfortunately, as long as these platforms&#39; business model is to sell users&#39; data to advertisers and other stakeholders, there is no incentive for them to protect our privacy and our right to use protective pseudonyms, as the EFF&#39;s Director of Cybersecurity Eva Galperin aptly pointed out in her &lt;a href=&#34;https://www.youtube.com/watch?v=d5czLwsa-wE&#34;&gt;talk&lt;/a&gt; at the HOPE conference in 2012. &lt;strong&gt;More data just means more money to them.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;When governments impose similar invasive practices, it&#39;s a &lt;strong&gt;dangerous and slippery slope towards totalitarianism&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;Citizens need to be able to express their views freely online and criticize their government and its leaders without fear of reprisal. Real-name policies (explicit and implicit) are only a tool for censorship, and there is no democracy and no freedom under government censorship.&lt;/p&gt; &lt;p&gt;Fighting against policies attacking online pseudonymity, such as real-name policies, age-verification policies, and Chat Control proposals, isn&#39;t just a banal fight to keep using silly nicknames online. It&#39;s a battle for democracy, for civil liberties, and for human rights.&lt;/p&gt; &lt;h2 id=&#34;what-you-can-do-about-real-name-policies&#34;&gt;What you can do about real-name policies&lt;/h2&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://news.elenarossini.com/my-fediverse-starter-guide&#34;&gt;&lt;strong&gt;Choose better platforms&lt;/strong&gt;&lt;/a&gt; that do not require you to share your legal name and official IDs, such as &lt;a href=&#34;../../../07/15/mastodon-privacy-and-security/&#34;&gt;Mastodon&lt;/a&gt; or other platforms connected to the Fediverse.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://safetycrave.com/why-should-not-use-real-names-online/&#34;&gt;&lt;strong&gt;Inform yourself&lt;/strong&gt;&lt;/a&gt; on the dangers related to using legal names online, and share this information with others.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;../../../06/17/you-can-say-no/&#34;&gt;&lt;strong&gt;Say no&lt;/strong&gt;&lt;/a&gt; to sharing official documentation with commercial platforms when it isn&#39;t strictly required and when you can avoid it.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/videos/2025/03/14/stop-confusing-privacy-anonymity-and-security/&#34;&gt;&lt;strong&gt;Understand the difference&lt;/strong&gt;&lt;/a&gt; between privacy, security, anonymity, and pseudonymity.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;../../../06/10/stay-safe-but-stay-connected/#practices-and-tools-that-help-in-various-contexts&#34;&gt;&lt;strong&gt;Use pseudonyms&lt;/strong&gt;&lt;/a&gt; on platforms where you can. Use a pseudonym persistent across platforms if you want these accounts to be linked together for trust, or use different pseudonyms to keep them separated.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;Make your voice heard!&lt;/strong&gt; Contact your government representatives to let them know that privacy is important to you, and explain to them that pseudonymity is essential for safety, democracy, and free speech online. Complain against platforms using these invasive and exclusionary practices. Citizen action matters, and abusive policies can be reversed.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;div class=&#34;admonition info&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Remember that pseudonymity isn&#39;t anonymity&lt;/p&gt; &lt;p&gt;Keep in mind that only using a pseudonym isn&#39;t enough to make you anonymous online. There are many other ways to tie an identity together, such as &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; addresses, &lt;a href=&#34;https://www.privacyguides.org/videos/2025/09/12/what-is-browser-fingerprinting-and-how-to-stop-it/&#34;&gt;browser fingerprinting&lt;/a&gt;, photo comparison, facial recognition, and so on and so forth. Pseudonymity is a great practice to &lt;em&gt;improve&lt;/em&gt; your privacy and safety online, but alone it does have limitations.&lt;/p&gt; &lt;/div&gt;</description> <link>https://www.privacyguides.org/articles/2025/10/15/real-name-policies/</link> <pubDate>Wed, 15 Oct 2025 03:45:32 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/10/15/real-name-policies/</guid> </item> <item> <title>What is Differential Privacy?</title> <author>fria</author> <category>Explainers</category> <category>Privacy Enhancing Technologies</category> <description>&lt;h1 id=&#34;what-is-differential-privacy&#34;&gt;What is Differential Privacy?&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;&amp;quot;Differential Privacy&amp;quot; text with a series of ones and zeros being obscured with a blur filter&#34; src=&#34;../../../../assets/images/differential-privacy/cover.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Image: Privacy Guides / Jordan Warne&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Is it possible to collect data from a large group of people but protect each individual&#39;s privacy? In this entry of my series on &lt;a href=&#34;../../../../tags/#tag:privacy-enhancing-technologies&#34;&gt;privacy-enhancing technologies&lt;/a&gt;, we&#39;ll discuss differential privacy and how it can do just that.&lt;!-- more --&gt;&lt;/p&gt; &lt;h2 id=&#34;problem&#34;&gt;Problem&lt;/h2&gt; &lt;p&gt;It&#39;s useful to collect data from a large group of people. You can see trends in a population. But it requires a lot of individual people to give up personally identifiable information. Even things that seem innocuous like your gender can help identify you.&lt;/p&gt; &lt;p&gt;Latanya Sweeney in a &lt;a href=&#34;https://dataprivacylab.org/projects/identifiability/paper1.pdf&#34;&gt;paper&lt;/a&gt; from 2000 used U.S. Census data to try and re-identify people solely based on the metrics available to her. She found that 87% of Americans could be identified based on only 3 metrics: ZIP code, date of birth, and sex.&lt;/p&gt; &lt;p&gt;Obviously, being able to identify individuals based on publicly available data is a huge privacy issue.&lt;/p&gt; &lt;h2 id=&#34;history&#34;&gt;History&lt;/h2&gt; &lt;h3 id=&#34;before-differential-privacy&#34;&gt;Before Differential Privacy&lt;/h3&gt; &lt;p&gt;Being able to collect aggregate data is essential for research. It&#39;s what the U.S. Census does every 10 years.&lt;/p&gt; &lt;p&gt;Usually we&#39;re more interested in the data as a whole and not data of individual people as it can show trends and overall patterns in groups of people. However, in order to get that data we must collect it from individuals.&lt;/p&gt; &lt;p&gt;It was thought at first that simply &lt;a href=&#34;https://simons.berkeley.edu/news/differential-privacy-issues-policymakers#:~:text=Prior%20to%20the%20line%20of%20research%20that%20led%20to%20differential%20privacy%2C%20it%20was%20widely%20believed%20that%20anonymizing%20data%20was%20a%20relatively%20straightforward%20and%20sufficient%20solution%20to%20the%20privacy%20challenge.%20Statistical%20aggregates%20could%20be%20released%2C%20many%20people%20thought%2C%20without%20revealing%20underlying%20personally%20identifiable%20data.%20Data%20sets%20could%20be%20released%20to%20researchers%20scrubbed%20of%20names%2C%20but%20otherwise%20with%20rich%20individual%20information%2C%20and%20were%20thought%20to%20have%20been%20anonymized.&#34;&gt;removing names and other obviously identifying details&lt;/a&gt; from the data was enough to prevent re-identification, but &lt;a href=&#34;https://latanyasweeney.org/JLME.pdf&#34;&gt;Latanya Sweeney&lt;/a&gt; (a name that will pop up a few more times) proved in 1997 that even without names, a significant portion of individuals can be re-identified from a dataset by cross-referencing external data.&lt;/p&gt; &lt;p&gt;Previous attempts at anonymizing data have relied on been highly vulnerable to re-identification attacks.&lt;/p&gt; &lt;h4 id=&#34;aol-search-log-release&#34;&gt;AOL Search Log Release&lt;/h4&gt; &lt;p&gt;A famous example is the AOL search log release. AOL had been logging its users searches for research purposes. When they released the data, they only replaced the users&#39; real names with an identifier. Researchers were able to identify &lt;a href=&#34;https://archive.nytimes.com/www.nytimes.com/learning/teachers/featured_articles/20060810thursday.html&#34;&gt;user 4417749&lt;/a&gt; as Thelma Arnold based on the identifying details of her searches.&lt;/p&gt; &lt;h4 id=&#34;strava-heatmap-incident&#34;&gt;Strava Heatmap Incident&lt;/h4&gt; &lt;p&gt;In 2018, the fitness app Strava announced a major update to its heatmap, showing the the workout patterns of users of fitness trackers like Fitbit.&lt;/p&gt; &lt;p&gt;Analyst &lt;a href=&#34;https://x.com/Nrg8000/status/957318498102865920&#34;&gt;Nathan Ruser&lt;/a&gt; indicated that these patterns can reveal military bases and troop movement patterns. This is obviously a huge op-sec problem and can endanger the lives of troops.&lt;/p&gt; &lt;p&gt;It was also possible to &lt;a href=&#34;https://steveloughran.blogspot.com/2018/01/advanced-denanonymization-through-strava.html&#34;&gt;deanonymize&lt;/a&gt; individual users in some circumstances.&lt;/p&gt; &lt;h4 id=&#34;randomized-response&#34;&gt;Randomized Response&lt;/h4&gt; &lt;p&gt;One of the earliest ideas for anonymizing data was &lt;a href=&#34;https://uvammm.github.io/docs/randomizedresponse.pdf&#34;&gt;randomized response&lt;/a&gt;, first introduced all the way back in 1965 in a paper by Stanley L. Warner. The idea behind it is quite clever.&lt;/p&gt; &lt;p&gt;For certain questions like &#34;have you committed tax fraud?&#34; respondents will likely be hesitant to answer truthfully. The solution? Have the respondent flip a coin. If the coin is tails, answer yes. If the coin lands on heads, answer truthfully.&lt;/p&gt; &lt;table&gt; &lt;thead&gt; &lt;tr&gt; &lt;th&gt;Respondent&lt;/th&gt; &lt;th&gt;Answer&lt;/th&gt; &lt;th&gt;Coin Flip (not included in the actual dataset just here for illustration)&lt;/th&gt; &lt;/tr&gt; &lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;1&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;Tails (Answer Yes)&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;2&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;td&gt;Heads (Answer Truthfully)&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;3&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;Tails (Answer Yes)&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;4&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;Tails (Answer Yes)&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;5&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;td&gt;Heads (Answer Truthfully)&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;p&gt;Because we know the exact probability that a &#34;Yes&#34; answer is fake, 50%, we can remove it and give a rough estimate of how many respondents answered &#34;Yes&#34; truthfully.&lt;/p&gt; &lt;p&gt;Randomized Response would lay the groundwork for differential privacy, but it wouldn&#39;t truly be realized for many decades.&lt;/p&gt; &lt;h4 id=&#34;unrelated-question-randomized-response&#34;&gt;Unrelated Question Randomized Response&lt;/h4&gt; &lt;p&gt;A variation used later in a &lt;a href=&#34;https://www.jstor.org/stable/2283636&#34;&gt;paper&lt;/a&gt; by Greenberg et al. called &lt;strong&gt;unrelated question randomized response&lt;/strong&gt; would present each respondent with either a sensitive question or a banal question like &#34;is your birthday in January?&#34; to increase the likelihood of people answering honestly, since the researcher doesn&#39;t know which question was asked.&lt;/p&gt; &lt;table&gt; &lt;thead&gt; &lt;tr&gt; &lt;th&gt;Respondent&lt;/th&gt; &lt;th&gt;Question (not visible to researcher)&lt;/th&gt; &lt;th&gt;Answer&lt;/th&gt; &lt;/tr&gt; &lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;1&lt;/td&gt; &lt;td&gt;Have you ever committed tax evasion?&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;2&lt;/td&gt; &lt;td&gt;Is your birthday in January?&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;3&lt;/td&gt; &lt;td&gt;Is your birthday in January?&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;4&lt;/td&gt; &lt;td&gt;Have you ever committed tax evasion?&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;5&lt;/td&gt; &lt;td&gt;Have you ever committed tax evasion?&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;h4 id=&#34;k-anonymity&#34;&gt;k-Anonymity&lt;/h4&gt; &lt;p&gt;Latanya Sweeney and Pierangela Samarati introduced &lt;a href=&#34;https://dataprivacylab.org/dataprivacy/projects/kanonymity/paper3.pdf&#34;&gt;k-anonymity&lt;/a&gt; to the world back in 1998.&lt;/p&gt; &lt;p&gt;It&#39;s interesting that even all the way back in 1998 concerns constant data collection were already relevant.&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;Most actions in daily life are recorded on some computer somewhere. That information in turn is often shared, exchanged, and sold. Many people may not care that the local grocer keeps track of which items they purchase, but shared information can be quite sensitive or damaging to individuals and organizations. Improper disclosure of medical information, financial information or matters of national security can have alarming ramifications, and many abuses have been cited.&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;In a dataset, you might have removed names and other obviously identifying information, but there might be other data such as birthday, ZIP code, etc., that might be unique to one person in the dataset. If someone were to cross-reference this data with outside data, it could be possible to deanonymize individuals.&lt;/p&gt; &lt;p&gt;k-anonymity means that for each row, at least k-1 other rows are identical. So for a k of 2, at least one other row is identical to each row.&lt;/p&gt; &lt;h5 id=&#34;generalization&#34;&gt;Generalization&lt;/h5&gt; &lt;p&gt;This is achieved through a few techniques, one of which is generalization. Generalization is reducing the precision of data so that it&#39;s not as unique.&lt;/p&gt; &lt;p&gt;For example, instead of recording an exact age, you might give a range like 20-30. You&#39;ve probably noticed this on surveys you&#39;ve taken before. Data like this that&#39;s not directly identifiable but could be used to re-identify someone is referred to as &lt;em&gt;quasi-identifiers&lt;/em&gt;.&lt;/p&gt; &lt;h5 id=&#34;suppression&#34;&gt;Suppression&lt;/h5&gt; &lt;p&gt;Sometimes even with generalization, you might have outliers that don&#39;t satisfy the k-anonymity requirements.&lt;/p&gt; &lt;p&gt;In these cases, you can simply remove the row entirely.&lt;/p&gt; &lt;h5 id=&#34;attacks-on-k-anonymity&#34;&gt;Attacks on k-Anonymity&lt;/h5&gt; &lt;p&gt;k-anonymity has been &lt;a href=&#34;https://www.usenix.org/system/files/sec22-cohen.pdf&#34;&gt;demonstrated&lt;/a&gt; to not prevent re-identification of individuals despite the data in a dataset being properly k-anonymized by &#34;statistical experts&#34;.&lt;/p&gt; &lt;p&gt;Researchers were able to deanonymize 3 students from a k-anonymized dataset from Harvard and MIT&#39;s EdX platform by cross-referencing data from LinkedIn, putting potentially thousands of students at risk of re-identification.&lt;/p&gt; &lt;h3 id=&#34;dawn-of-differential-privacy&#34;&gt;Dawn of Differential Privacy&lt;/h3&gt; &lt;p&gt;Most of the concepts I write about seem to come from the 70s and 80s, but differential privacy is a relatively new concept. It was first introduced in a paper from 2006 called &lt;a href=&#34;https://desfontain.es/PDFs/PhD/CalibratingNoiseToSensitivityInPrivateDataAnalysis.pdf&#34;&gt;&lt;em&gt;Calibrating Noise to Sensitivity in Private Data Analysis&lt;/em&gt;&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;The paper introduces the idea of adding noise to data to achieve privacy, similar to randomized response. However, differential privacy is much more mathematically rigorous and provable.&lt;/p&gt; &lt;p&gt;Of course, adding noise to the dataset reduces its accuracy. Ɛ defines the amount of noise added to the dataset, with a small Ɛ meaning more privacy but less accurate data and vice versa. It&#39;s also referred to as the &#34;privacy loss parameter&#34; or &#34;privacy budget&#34;.&lt;/p&gt; &lt;h4 id=&#34;central-differential-privacy&#34;&gt;Central Differential Privacy&lt;/h4&gt; &lt;p&gt;This early form of differential privacy relied on adding noise to the data &lt;em&gt;after&lt;/em&gt; it was already collected, meaning you still have to trust a central authority with the raw data.&lt;/p&gt; &lt;h2 id=&#34;google-rappor&#34;&gt;Google RAPPOR&lt;/h2&gt; &lt;p&gt;In 2014, Google introduced &lt;a href=&#34;https://arxiv.org/pdf/1407.6981&#34;&gt;Randomized Aggregatable Privacy-Preserving Ordinal Response&lt;/a&gt; (RAPPOR), their &lt;a href=&#34;https://github.com/google/rappor&#34;&gt;open source&lt;/a&gt; implementation of differential privacy.&lt;/p&gt; &lt;p&gt;Google RAPPOR implements and builds on previous techniques such as randomized response and adds significant improvements on top.&lt;/p&gt; &lt;h3 id=&#34;local-differential-privacy&#34;&gt;Local Differential Privacy&lt;/h3&gt; &lt;p&gt;In Google&#39;s implementation, noise is added to data on-device before it&#39;s sent off to any server. This removes the need to trust the central authority to handle your raw data, an important step in achieving truly anonymous data collection.&lt;/p&gt; &lt;h3 id=&#34;bloom-filters&#34;&gt;Bloom Filters&lt;/h3&gt; &lt;p&gt;Google RAPPOR makes use of a clever technique called bloom filters that saves space and improves privacy.&lt;/p&gt; &lt;p&gt;Bloom filters work by starting out with an array of all 0&#39;s&lt;/p&gt; &lt;p&gt;&lt;code&gt;[0, 0, 0, 0, 0, 0, 0, 0, 0]&lt;/code&gt;&lt;/p&gt; &lt;p&gt;Then, you run data such as the word &#34;apple&#34; through a hashing algorithm, which will give 1&#39;s in specific positions, say position 1, 3, and 5.&lt;/p&gt; &lt;p&gt;&lt;code&gt;[0, 1, 0, 1, 0, 1, 0, 0, 0]&lt;/code&gt;&lt;/p&gt; &lt;p&gt;When you want to check if data is present, you run the data through the hashing algorithm and check if the corresponding positions are 1&#39;s. If they are, the data &lt;em&gt;might&lt;/em&gt; be present (other data might have flipped those same bits at some point). If any of the 1&#39;s are 0&#39;s, then you know for sure that the data is not in the set.&lt;/p&gt; &lt;h3 id=&#34;permanent-randomized-response&#34;&gt;Permanent Randomized Response&lt;/h3&gt; &lt;p&gt;A randomization step is performed flipping some of the bits randomly. This response is then &#34;memoized&#34; so that the same random values are used for future reporting. This protects against an &#34;averaging&#34; attack where an attacker sees multiple responses from the same user and can eventually recover the real value by averaging them out over time.&lt;/p&gt; &lt;h3 id=&#34;instantaneous-randomized-response&#34;&gt;Instantaneous Randomized Response&lt;/h3&gt; &lt;p&gt;On top of the permanent randomized data, another randomization step is performed. This time, different randomness is added on top of the permanent randomness so that every response sent is unique. This prevents an attacker from determining a user from seeing the same randomized pattern over and over again.&lt;/p&gt; &lt;p&gt;Both the permanent and instantaneous randomized response steps can be fine-tuned to for the desired privacy.&lt;/p&gt; &lt;h3 id=&#34;chrome&#34;&gt;Chrome&lt;/h3&gt; &lt;p&gt;Google first used differential privacy in their Chrome browser for detection of &lt;a href=&#34;https://blog.chromium.org/2014/10/learning-statistics-with-privacy-aided.html&#34;&gt;malware&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Differential privacy is also used in Google&#39;s &lt;a href=&#34;https://privacysandbox.google.com/private-advertising/aggregation-service/privacy-protection-report-strategy&#34;&gt;Privacy Sandbox&lt;/a&gt;.&lt;/p&gt; &lt;h3 id=&#34;maps&#34;&gt;Maps&lt;/h3&gt; &lt;p&gt;Google Maps uses DP for its &lt;a href=&#34;https://safety.google/privacy/data/#:~:text=To%20offer%20features%20like%20place%20busyness%20in%20Maps%2C%20we%20apply%20an%20advanced%20anonymization%20technology%20called%20differential%20privacy%20that%20adds%20noise%20to%20your%20information%20so%20it%20can%E2%80%99t%20be%20used%20to%20personally%20identify%20you.&#34;&gt;place busyness&lt;/a&gt; feature, allowing Maps to show you how busy an area is without revealing the movements of individual people.&lt;/p&gt; &lt;h3 id=&#34;google-fi&#34;&gt;Google Fi&lt;/h3&gt; &lt;p&gt;&lt;a href=&#34;https://opensource.googleblog.com/2019/09/enabling-developers-and-organizations.html&#34;&gt;Google Fi&lt;/a&gt; uses differential privacy as well to improve the service.&lt;/p&gt; &lt;h2 id=&#34;opendp&#34;&gt;OpenDP&lt;/h2&gt; &lt;p&gt;&lt;a href=&#34;https://opendp.org&#34;&gt;OpenDP&lt;/a&gt; is a community effort to build open source and trustworthy tools for differential privacy. Their members consist of academics from prestigious universities like Harvard and employees at companies like Microsoft.&lt;/p&gt; &lt;p&gt;There&#39;s been an effort from everyone to make differential privacy implementations open source, which is a breath of fresh air from companies that typically stick to closed source for their products.&lt;/p&gt; &lt;h2 id=&#34;apple&#34;&gt;Apple&lt;/h2&gt; &lt;p&gt;&lt;a href=&#34;https://www.apple.com/privacy/docs/Differential_Privacy_Overview.pdf&#34;&gt;Apple&lt;/a&gt; uses local differential privacy for much of its services, similar to what Google does. They add noise before sending any data off device, enabling them to collect aggregate data without harming the privacy of any individual user.&lt;/p&gt; &lt;p&gt;They limit the number of contributions any one user can make via a &lt;em&gt;privacy budget&lt;/em&gt; (this is the same as Ɛ) so you won&#39;t have to worry about your own contributions being averaged out over time and revealing your own trends.&lt;/p&gt; &lt;p&gt;This allows them to find new words that people use that aren&#39;t included by default in the dictionary, or find which emojis are the most popular.&lt;/p&gt; &lt;p&gt;Some of the things they use differential privacy for include&lt;/p&gt; &lt;ul&gt; &lt;li&gt;QuickType suggestions&lt;/li&gt; &lt;li&gt;Emoji suggestions&lt;/li&gt; &lt;li&gt;Lookup Hints&lt;/li&gt; &lt;li&gt;Safari Energy Draining Domains&lt;/li&gt; &lt;li&gt;Safari Autoplay Intent Detection&lt;/li&gt; &lt;li&gt;Safari Crashing Domains&lt;/li&gt; &lt;li&gt;Health Type Usage&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;That&#39;s just based on their initial white paper, they&#39;ve likely increased their use of DP since then.&lt;/p&gt; &lt;h3 id=&#34;sketch-matrix&#34;&gt;Sketch Matrix&lt;/h3&gt; &lt;p&gt;Apple uses a similar method to Google, with a matrix initialized with all zeros. The input for the matrix is encoded with the SHA-256 hashing algorithm, and then bits are flipped randomly at a probability dependent on the epsilon value.&lt;/p&gt; &lt;p&gt;Apple only sends a random row from this matrix instead of the entire thing in order to stay within their privacy budget.&lt;/p&gt; &lt;h3 id=&#34;see-whats-sent&#34;&gt;See What&#39;s Sent&lt;/h3&gt; &lt;p&gt;You can see data sent with differential privacy in iOS under Settings &amp;gt; Privacy &amp;gt; Analytics &amp;gt; Analytics Data, it will begin with &lt;code&gt;DifferentialPrivacy&lt;/code&gt;. On macOS, you can see these logs in the Console.&lt;/p&gt; &lt;h2 id=&#34;us-census&#34;&gt;U.S. Census&lt;/h2&gt; &lt;p&gt;Differential privacy isn&#39;t just used by big corporations, in 2020 famously the U.S. Census used DP to protect the data of U.S. citizens for the first time.&lt;/p&gt; &lt;p&gt;As a massive collection of data from numerous U.S. citizens, it&#39;s important for the census bureau to protect the privacy of census participants while still preserving the overall aggregate data.&lt;/p&gt; &lt;h3 id=&#34;impetus&#34;&gt;Impetus&lt;/h3&gt; &lt;p&gt;Since the 90s, the U.S. Census used a less formal injection of statistical noise into their data, which they did all the way through 2010.&lt;/p&gt; &lt;p&gt;After the 2010 census, the bureau tried to &lt;a href=&#34;https://www2.census.gov/library/publications/decennial/2020/census-briefs/c2020br-03.pdf&#34;&gt;re-identify individuals&lt;/a&gt; in the census data.&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;The experiment resulted in reconstruction of a dataset of more than 300 million individuals. The Census Bureau then used that dataset to match the reconstructed records to four commercially available data sources, to attempt to identify the age, sex, race, and Hispanic origin of people in more than six million blocks in the 2010 Census.&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Considering 309 million people lived in the U.S. in 2010, that&#39;s a devastating breach of personal privacy. Clearly more formal frameworks for protecting the privacy of individuals were needed.&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;Nationwide, roughly 150 million individuals—almost one-half of the population, have a unique combination of sex and single year of age at the block level.&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;They could keep adding noise until these attacks are impossible, but that would make the data nigh unusable. Instead, differential privacy offers a mathematically rigorous method to protect the data from future re-identification attacks without ruining the data by adding too much noise. They can be sure thanks to the mathematical guarantees of DP.&lt;/p&gt; &lt;h2 id=&#34;dprio&#34;&gt;DPrio&lt;/h2&gt; &lt;p&gt;Mozilla has been constantly working to make their telemetry more private over the years. Firefox uses &lt;a href=&#34;https://blog.mozilla.org/security/2019/06/06/next-steps-in-privacy-preserving-telemetry-with-prio/&#34;&gt;Prio&lt;/a&gt;, a &lt;a href=&#34;https://datatracker.ietf.org/doc/html/draft-ietf-ppm-dap&#34;&gt;Distributed Aggregation Protocol&lt;/a&gt;-based telemetry system. It uses Multi-Party Computation to split the processing of user data between multiple parties.&lt;/p&gt; &lt;p&gt;To accomplish this, &lt;a href=&#34;https://blog.mozilla.org/en/firefox/partnership-ohttp-prio/&#34;&gt;Mozilla&lt;/a&gt; partnered with &lt;a href=&#34;https://divviup.org/blog/divvi-up-in-firefox/&#34;&gt;Divvi Up&lt;/a&gt; as their DAP provider, and &lt;a href=&#34;https://www.fastly.com/blog/firefox-fastly-take-another-step-toward-security-upgrade&#34;&gt;Fastly&lt;/a&gt; as their OHTTP provider. OHTTP acts as a multi-hop proxy to separate traffic between two parties when making a connection: neither Mozilla nor Fastly will know both who you are and what you&#39;re connecting to.&lt;/p&gt; &lt;p&gt;In 2023 researchers from Mozilla also conducted research into making Prio differentially private. The so-named &#34;&lt;a href=&#34;https://petsymposium.org/popets/2023/popets-2023-0086.pdf&#34;&gt;DPrio&lt;/a&gt;&#34; would combine multi-party computation, OHTTP, and differential privacy in a very impressive display of privacy protection. Unfortunately I couldn&#39;t find any evidence to suggest that DPrio has been implemented, but something to keep a lookout for in the future.&lt;/p&gt; &lt;h2 id=&#34;future-of-differential-privacy&#34;&gt;Future of Differential Privacy&lt;/h2&gt; &lt;p&gt;Differential privacy unlocks the potential for data collection with minimal risk of data exposure for any individual. Already, DP has allowed for software developers to improve their software, for new possibilities in research in the health sector and in government organizations.&lt;/p&gt; &lt;p&gt;Adoption of scientifically and mathematically rigorous methods of data collection allows for organizations to collect aggregate data will allow for increased public trust in organizations and subsequently greater potential for research that will result in improvements to our everyday lives.&lt;/p&gt; &lt;p&gt;I think for there to be more public trust there needs to be a bigger public outreach. That&#39;s my goal with this series, I&#39;m hoping to at least increase awareness of some of the technology being deployed to protect your data, especially since so much of the news we hear is negative. Armed with the knowledge of what&#39;s available, we can also demand companies and organizations use these tools if they aren&#39;t already.&lt;/p&gt; &lt;p&gt;It&#39;s heartening to see the level of openness and collaboration in the research. You can see a clear improvement over time as each paper takes the previous research and builds on it. I wish we saw the same attitude with all software.&lt;/p&gt; &lt;h2 id=&#34;further-research&#34;&gt;Further Research&lt;/h2&gt; &lt;p&gt;Any programmers interested in learning how to implement differential privacy can check out the book &lt;em&gt;&lt;a href=&#34;https://programming-dp.com&#34;&gt;Programming Differential Privacy&lt;/a&gt;&lt;/em&gt; to see Python examples.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/09/30/differential-privacy/</link> <pubDate>Tue, 30 Sep 2025 16:27:09 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/09/30/differential-privacy/</guid> </item> <item> <title>What is Multi-Party Computation?</title> <author>fria</author> <category>Explainers</category> <category>Privacy Enhancing Technologies</category> <description>&lt;h1 id=&#34;what-is-multi-party-computation&#34;&gt;What is Multi-Party Computation?&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;An image of a lock and multiple keys going toward it to unlock it&#34; src=&#34;../../../../assets/images/multi-party-computation/cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jordan Warne / Privacy Guides&lt;/small&gt;&lt;/p&gt; &lt;p&gt;We know how to secure data in storage using &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;, but is it possible to ensure data privacy even while processing it server-side? This is the first in a &lt;a href=&#34;../../../../tags/#tag:privacy-enhancing-technologies&#34;&gt;series&lt;/a&gt; of articles I&#39;ll be writing covering the privacy-enhancing technologies being rolled out.&lt;!-- more --&gt;&lt;/p&gt; &lt;h2 id=&#34;history&#34;&gt;History&lt;/h2&gt; &lt;p&gt;In a seminal &lt;a href=&#34;https://dspace.mit.edu/bitstream/handle/1721.1/148953/MIT-LCS-TM-125.pdf?sequence=1&#34;&gt;paper&lt;/a&gt; called &#34;Mental Poker&#34; by Adi Shamir, Ronald L. Rivest, and Leonard M. Adleman from 1979, the researchers attempt to demonstrate a way of playing poker over a distance using only messages and still have it be a fair game.&lt;/p&gt; &lt;p&gt;To explain, fan favorites Alice and Bob will make a return. First, Bob encrypts all the cards with his key, then sends them to Alice. Alice picks five to deal back to Bob as his hand, then encrypts five with her own key and sends those to Bob as well. Bob removes his encryption from all ten cards and sends Alice&#39;s cards back to her.&lt;/p&gt; &lt;div style=&#34;position: relative; padding-top: 56.25%;&#34;&gt;&lt;iframe title=&#34;Mental Poker Animation&#34; width=&#34;100%&#34; height=&#34;100%&#34; src=&#34;https://neat.tube/videos/embed/k5jMvrTPLx5VcgzNq3ej1B?title=0&#34; frameborder=&#34;0&#34; allowfullscreen=&#34;&#34; sandbox=&#34;allow-same-origin allow-scripts allow-popups allow-forms&#34; style=&#34;position: absolute; inset: 0px;&#34;&gt;&lt;/iframe&gt;&lt;/div&gt; &lt;p&gt;Notice that Bob needs to be able to remove his encryption &lt;em&gt;after&lt;/em&gt; Alice has applied hers. This commutative property is important for the scheme to work.&lt;/p&gt; &lt;p&gt;This early scheme is highly specialized for this task and not applicable to different situations.&lt;/p&gt; &lt;h3 id=&#34;secure-two-party-computation&#34;&gt;Secure Two-Party Computation&lt;/h3&gt; &lt;p&gt;Alice and Bob have struck it rich! They&#39;re both millionaires, but they want to be able to see who has more money without revealing exactly how much they have to each other.&lt;/p&gt; &lt;p&gt;Luckily, we can use &lt;strong&gt;Multi-Party Computation&lt;/strong&gt; (&lt;strong&gt;MPC&lt;/strong&gt;) to solve this &#34;Millionaire&#39;s Problem,&#34; using a method invented by Andrew Yao called &lt;em&gt;garbled circuits&lt;/em&gt;. Garbled circuits allow us to use MPC for any problem as long as it can be represented as a boolean circuit, i.e. a set of logic gates such as &lt;code&gt;AND&lt;/code&gt; &lt;code&gt;OR&lt;/code&gt; &lt;code&gt;XOR&lt;/code&gt; etc.&lt;/p&gt; &lt;h3 id=&#34;garbled-circuits&#34;&gt;Garbled Circuits&lt;/h3&gt; &lt;p&gt;We can split the two parties into an &#34;Evaluator&#34; and a &#34;Generator&#34;. The Generator will be responsible for setting up the cryptography that&#39;ll be used, and the Evaluator will actually perform the computation.&lt;/p&gt; &lt;p&gt;We start by making the truth table for our inputs. In order to hide the values of the truth table, we assign each input a different label. Importantly, we need to assign a different label for each input, so 1 will not be represented by the same label for each. We also need to shuffle the order of the rows, so the values can&#39;t be inferred from that.&lt;/p&gt; &lt;p&gt;We can still tell what the value is based on knowing the type of logic gate. For example, an &lt;code&gt;AND&lt;/code&gt; gate would only have one different output, so you could infer that output is 1 and the others are 0. To fix this, we can encrypt the rows using the input labels as keys, so only the correct output can be decrypted.&lt;/p&gt; &lt;p&gt;We still have a problem, though: how can the Evaluator put in their inputs? Asking for both labels would allow them to decrypt more than one output, and giving their input would break the whole point. The solution is something called &#34;Oblivious Transfer&#34;.&lt;/p&gt; &lt;p&gt;The solution is for the Evaluator to generate two public keys, one of which they have the private key for. The Generator encrypts the two labels for the Evaluator&#39;s inputs using the provide public keys and sends them back. Since the Generator only has a private key for one of the labels, they will decrypt the one they want. The Generator puts the labels in order so that the Evaluator can choose which one they want to decrypt. This method relies on the Evaluator not to send multiple keys that can be decrypted. Because some trust is required, this protocol is considered &#34;semi-honest&#34;.&lt;/p&gt; &lt;p&gt;There&#39;s a good explainer for Yao&#39;s garbled circuits &lt;a href=&#34;https://lcamel.github.io/MPC-Notes/story-en-US.html&#34;&gt;here&lt;/a&gt; if you&#39;re interested in a step-by-step walkthrough.&lt;/p&gt; &lt;h3 id=&#34;birth-of-multi-party-computation&#34;&gt;Birth of Multi-Party Computation&lt;/h3&gt; &lt;p&gt;Multi-Party Computation was solidified with the &lt;a href=&#34;https://dl.acm.org/doi/pdf/10.1145/28395.28420&#34;&gt;research&lt;/a&gt; of Oded Goldreich, Silvio Micali, and Avi Wigderson and the GMW paradigm (named after the researchers, similar to how RSA is named).&lt;/p&gt; &lt;h4 id=&#34;more-than-two-parties&#34;&gt;More Than Two Parties&lt;/h4&gt; &lt;p&gt;Yao&#39;s protocol was limited to two parties. The GMW paradigm expanded the protocol to be able to handle any number of parties and can handle actively malicious actors as long as the majority are honest.&lt;/p&gt; &lt;h4 id=&#34;secret-sharing&#34;&gt;Secret Sharing&lt;/h4&gt; &lt;p&gt;The GMW paradigm relies on secret sharing which is a method of splitting private information like a cryptographic key into multiple parts such that it will only reveal the secret if the shares are combined. The GMW protocol uses additive secret sharing, which is quite simple. You come up with a secret number, say 123, and you split it up into however many other numbers you want.&lt;/p&gt; &lt;p&gt;&lt;code&gt;99 + 24 = 123&lt;/code&gt;&lt;/p&gt; &lt;p&gt;You distribute each number to a participant and add them all together to get the original secret. While simple, it doesn&#39;t play well with multiplication operations.&lt;/p&gt; &lt;h4 id=&#34;zero-knowledge-proofs&#34;&gt;Zero-Knowledge Proofs&lt;/h4&gt; &lt;p&gt;The GMW paradigm introduced protections against malicious adversaries, powered by zero-knowledge proofs (ZKP). ZKP allow one party to convince another party a statement is true without revealing any other information than the fact that the statement is true. The concept of ZKP was first introduced in a &lt;a href=&#34;https://dl.acm.org/doi/pdf/10.1145/22145.22178&#34;&gt;paper&lt;/a&gt; from 1985 by Shafi Goldwasser, Silvio Micali, and Charles Rackoff.&lt;/p&gt; &lt;p&gt;A humorous paper titled &lt;em&gt;&lt;a href=&#34;https://pages.cs.wisc.edu/~mkowalcz/628.pdf&#34;&gt;How to Explain Zero-Knowledge Protocols to Your Children&lt;/a&gt;&lt;/em&gt; gives a storybook explanation of how they work (who says academic papers can&#39;t be fun?).&lt;/p&gt; &lt;p&gt;The main crux revolves around probability: if a party knows the proper way to get a result, they should be able to reliably get the correct answer.&lt;/p&gt; &lt;p&gt;To borrow the cave explanation, imagine Alice and Bob have taken up cave exploration. They&#39;ve found a cave in the shape of a loop with a magic door connecting each entrance together and Alice claims to know how to open it. However, she doesn&#39;t want Bob to know the secret to open the door.&lt;/p&gt; &lt;p&gt;Alice, acting as the &#34;Prover&#34; goes into the cave. Bob, the &#34;Verifier&#34;, stays outside and yells which side of the cave Alice should come out of. They repeat this many times. If Alice can reliably make it out of the correct side of the cave, then she must know how to open the magic door.&lt;/p&gt; &lt;h3 id=&#34;bgw-protocol&#34;&gt;BGW Protocol&lt;/h3&gt; &lt;p&gt;While the GMW protocol was a huge leap forward for MPC, there were still huge limitations. The garbled circuit protocol is limited to boolean logic gates which makes implementing many different common operations much more difficult. It also requires communication for every single gate, which is highly inefficient.&lt;/p&gt; &lt;p&gt;The researchers Michael Ben-Or, Shafi Goldwassert, and Avi Wigderson in their paper &lt;em&gt;&lt;a href=&#34;https://dl.acm.org/doi/pdf/10.1145/62212.62213&#34;&gt;Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation&lt;/a&gt;&lt;/em&gt; made several advancements in the efficiency and robustness of MPC, moving it closer to being practical to use in the real world.&lt;/p&gt; &lt;h4 id=&#34;arithmetic-circuits&#34;&gt;Arithmetic Circuits&lt;/h4&gt; &lt;p&gt;Instead of boolean circuits, the BGW protocol uses arithmetic circuits. These allow for easier mathematical operations like multiplication and addition instead of being limited to logic gates on individual bits. This makes a huge difference in the amount of communication between parties and thus the efficiency of the protocol.&lt;/p&gt; &lt;h4 id=&#34;shamirs-secret-sharing&#34;&gt;Shamir&#39;s Secret Sharing&lt;/h4&gt; &lt;p&gt;The BGW protocol utilizes &lt;a href=&#34;https://web.mit.edu/6.857/OldStuff/Fall03/ref/Shamir-HowToShareASecret.pdf&#34;&gt;Shamir&#39;s Secret Sharing&lt;/a&gt;, which relies on polynomials instead of addition. This allows for more efficiency in multiplication and allows for setting a threshold where only a certain number of shares need to be present in order to reconstruct the secret.&lt;/p&gt; &lt;h4 id=&#34;less-communication&#34;&gt;Less Communication&lt;/h4&gt; &lt;p&gt;The BGW protocol doesn&#39;t require as much communication between parties, partly thanks to its use of Shamir&#39;s secret sharing which works well with arithmetic operations.&lt;/p&gt; &lt;p&gt;Additionally, it doesn&#39;t require Oblivious Transfer or zero-knowledge proofs. Its use of Shamir&#39;s secret sharing and error correction codes instead provides the same properties in a more efficient way.&lt;/p&gt; &lt;h3 id=&#34;fairplay&#34;&gt;Fairplay&lt;/h3&gt; &lt;p&gt;The field was further advanced by the introduction of the &lt;a href=&#34;https://www.cs.huji.ac.il/w~noam/FairplayMP.pdf&#34;&gt;Fairplay&lt;/a&gt; system.&lt;/p&gt; &lt;p&gt;Up until this paper, MPC was limited to boolean circuits or arithmetic circuits: not exactly friendly if you&#39;re a programmer that&#39;s used to using higher level languages. Fairplay introduces a compiler, SFDL, which can compile higher level languages to boolean circuits and then securely computes the circuit.&lt;/p&gt; &lt;p&gt;Fairplay also brings some advancements in efficiency. It utilizes constant rounds, with a fixed 8 rounds, reducing the communication overhead. It also uses the free XOR technique so that encryption operations don&#39;t have to be performed on XOR gates, improving efficiency.&lt;/p&gt; &lt;h3 id=&#34;real-world-usage&#34;&gt;Real-World Usage&lt;/h3&gt; &lt;p&gt;As MPC saw gradual optimizations and improvements, it grew from an interesting thought experiment to something that could have real-world uses.&lt;/p&gt; &lt;h4 id=&#34;danish-sugar-beet-auction&#34;&gt;Danish Sugar Beet Auction&lt;/h4&gt; &lt;p&gt;The first instance of MPC being used in a real-world scenario wouldn&#39;t occur until 2008.&lt;/p&gt; &lt;p&gt;Denmark&#39;s sugar beet industry faced a problem: with the EU significantly reducing its financial support for sugar beet production, they needed to figure out what price the thousands of sugar beet farmers were willing to sell at, and which price the company that bought all the sugar beets would be willing to buy them at, a so-called &#34;double auction&#34; where the buyer and seller figure out the &lt;strong&gt;market clearing price&lt;/strong&gt;, or the price at which demand meets supply most effectively.&lt;/p&gt; &lt;p&gt;But who should be in charge of the auction? Farmers don&#39;t want to trust Danisco with their bids as it reveals information about each individual farmer&#39;s business. The farmers can&#39;t be in charge of it because they don&#39;t trust each other. They could use an external consulting firm, but then the entire operation would rely on that one firm&#39;s confidentiality and the reliability of their tools.&lt;/p&gt; &lt;p&gt;The &lt;a href=&#34;https://a.storyblok.com/f/266767/x/e4c85ffa34/mpc-goes-live_whitepaper_2008-068.pdf&#34;&gt;solution&lt;/a&gt; was to use a &#34;virtual auctioneer&#34; that relied on MPC to fairly carry the auction out.&lt;/p&gt; &lt;p&gt;It relied on three servers, with one representing each party: Danisco, DKS (the Danish sugar beet growers association), and The SIMAP project (Secure Information Management and Processing, a project sponsored by the Danish National Research Agency).&lt;/p&gt; &lt;p&gt;The solution was so successful that it was used every year until 2015 when it was no longer needed. A survey of the farmers found that the vast majority found the system simplified the process of trading contracts and that they were satisfied with the level of confidentiality it provided.&lt;/p&gt; &lt;p&gt;The first test run of MPC was a massive success and the potential was now proven.&lt;/p&gt; &lt;h4 id=&#34;the-boston-womens-workforce-council&#34;&gt;The Boston Women&#39;s Workforce Council&lt;/h4&gt; &lt;p&gt;In 2016, the &lt;a href=&#34;https://www.boston.gov/sites/default/files/document-file-09-2017/bwwcr-2016-new-report.pdf&#34;&gt;Boston Women&#39;s Workforce Council&lt;/a&gt; worked with 69 companies to investigate if women are paid the same as men.&lt;/p&gt; &lt;p&gt;Using MPC, the companies were able to process their data without revealing the actual wages of any employees. The wage data of 112,600 employees was collected, representing about 11% of the Greater Boston workforce.&lt;/p&gt; &lt;p&gt;You can read their detailed findings in the report, but they found that women were indeed being paid less than men: 77 cents for every dollar a man makes on average.&lt;/p&gt; &lt;p&gt;It was reported in 2023 that thanks to this data, the Boston Women&#39;s Workforce Council was able to reduce the wage gap by 30%.&lt;/p&gt; &lt;h4 id=&#34;allegheny-county&#34;&gt;Allegheny County&lt;/h4&gt; &lt;p&gt;In 2018, Allegheny County Department of Human Services partnered with the &lt;a href=&#34;https://bipartisanpolicy.org/press-release/bpc-partners-with-allegheny-county-on-new-privacy-preserving-data-project/&#34;&gt;Bipartisan Policy Center&lt;/a&gt; to implement MPC, allowing for private and secure sharing of county data on services to the homeless, behavioral health services, causes and incidence of mortality, family interventions, and incarceration.&lt;/p&gt; &lt;p&gt;The experiment was considered a success, with a recommendation from the U.S. Commission on Evidence-Based Policymaking to further explore the use of MPC.&lt;/p&gt; &lt;h2 id=&#34;mpc-today&#34;&gt;MPC Today&lt;/h2&gt; &lt;p&gt;Today, the &lt;a href=&#34;https://www.mpcalliance.org&#34;&gt;MPC Alliance&lt;/a&gt; represents a collective of companies that have come together to advance the use of MPC.&lt;/p&gt; &lt;p&gt;MPC is used for everything from &lt;a href=&#34;https://www.coinbase.com/learn/wallet/what-is-a-multi-party-computation-mpc-wallet&#34;&gt;cryptocurrency&lt;/a&gt; to HIPAA-compliant &lt;a href=&#34;https://pmc.ncbi.nlm.nih.gov/articles/PMC6658266/&#34;&gt;medical&lt;/a&gt; uses. There are ongoing efforts to &lt;a href=&#34;https://csrc.nist.gov/projects/threshold-cryptography&#34;&gt;standardize&lt;/a&gt; it from organizations like NIST, although it&#39;s a difficult proposition due to the sheer variation in MPC protocols and use cases.&lt;/p&gt; &lt;p&gt;There&#39;s been research into using MPC for secure and &lt;a href=&#34;https://eprint.iacr.org/2014/075.pdf&#34;&gt;verifiably fair&lt;/a&gt; &lt;a href=&#34;https://arxiv.org/html/2205.10580v4&#34;&gt;electronic voting&lt;/a&gt;, something that&#39;s much needed as countries move toward &lt;a href=&#34;https://worldpopulationreview.com/country-rankings/electronic-voting-by-country&#34;&gt;electronic voting&lt;/a&gt;. It&#39;s important to not completely dismiss the march of technology, but these things should be implemented with the utmost caution and scientific rigor. I feel that implementing black-box electronic voting without open and provably secure technologies like MPC is irresponsible and endangers elections.&lt;/p&gt; &lt;p&gt;MPC acts as an essential privacy tool in the toolbox. It intersects with other PETs like homomorphic encryption, a method of encrypting data in such a way that operations can still be performed on it without revealing the unencrypted data.&lt;/p&gt; &lt;p&gt;MPC is just one tool among many that&#39;s reshaping the privacy landscape. I&#39;m excited to see how it&#39;s used in the future and what new advancements it unlocks.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/09/15/multi-party-computation/</link> <pubDate>Tue, 30 Sep 2025 16:27:09 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/09/15/multi-party-computation/</guid> </item> <item> <title>Age Verification Wants Your Face, and Your Privacy</title> <author>Em</author> <category>News</category> <description>&lt;h1 id=&#34;age-verification-wants-your-face-and-your-privacy&#34;&gt;Age Verification Wants Your Face, and Your Privacy&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;A stylized photo showing a person holding a printed photo of their face in front of their actual face.&#34; src=&#34;../../../../assets/images/age-verification-wants-your-face/ageverification-cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Kyle Glenn / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Age verification laws and propositions forcing platforms to restrict content accessed by children and teens have been multiplying in recent years. The problem is, implementing such measures necessarily requires identifying each user accessing this content, one way or another. This is bad news for your privacy.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;For a few years now, several legislators in North America, Europe, and Australia have expressed concern about children and teens accessing certain types of content online. While there is no doubt some online content can be worrisome, implementing a technological solution for this is &lt;a href=&#34;https://www.jonaharagon.com/posts/age-verification-is-incompatible-with-the-internet/&#34;&gt;extremely problematic&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;By mandating platforms to be legally responsible to verify a user&#39;s age, regulators effectively force them to identify each user requesting access to content deemed inappropriate under a certain age threshold.&lt;/p&gt; &lt;p&gt;If these regulations continue to proliferate, this could lead to the end of pseudonymity online.&lt;/p&gt; &lt;h2 id=&#34;how-can-age-be-verified-online&#34;&gt;How can age be verified online&lt;/h2&gt; &lt;p&gt;Verifying age online is &lt;a href=&#34;https://www.woodhullfoundation.org/fact-checked/online-age-verification-is-not-the-same-as-flashing-your-id-at-a-liquor-store/&#34;&gt;difficult&lt;/a&gt;. There isn&#39;t any magical solution to it, it&#39;s either recording how a user looks or scanning official documents.&lt;/p&gt; &lt;p&gt;Conducting verification &#34;on-device&#34; offers only few additional protections considering this information still has to be checked and reported with an external service, somehow.&lt;/p&gt; &lt;p&gt;Moreover, processes used to keep this data &#34;on-device&#34; are often opaque. Taking into account how valuable this information is, it becomes very difficult to trust any for-profit third-party services which such a sensitive task.&lt;/p&gt; &lt;p&gt;Users&#39; faces and official documents are two types of very sensitive information. Who becomes responsible to collect, process, store, and safeguard this data? With whom does this data get shared, and for which other purposes? And how accurate is this data anyway?&lt;/p&gt; &lt;h3 id=&#34;facial-scans&#34;&gt;Facial scans&lt;/h3&gt; &lt;p&gt;Some platforms and third-party providers of the rapidly growing &#34;&lt;a href=&#34;https://www.businessresearchinsights.com/market-reports/digital-identity-verification-market-118180&#34;&gt;identity verification industry&lt;/a&gt;&#34; have started to use facial recognition and face scan systems in order to determine a user&#39;s age.&lt;/p&gt; &lt;p&gt;The problem is, the systems are &lt;a href=&#34;https://www.liberties.eu/en/stories/facial-recognition-privacy-concerns/44518&#34;&gt;horrible for everyone&#39;s privacy&lt;/a&gt;, extremely problematic to use due to &lt;a href=&#34;https://www.aclu-mn.org/en/news/biased-technology-automated-discrimination-facial-recognition&#34;&gt;racist and gendered biases&lt;/a&gt;, &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/face-scans-estimate-our-age-creepy-af-and-harmful&#34;&gt;inaccurate&lt;/a&gt; to determine the correct age, and on top of all that, &lt;a href=&#34;https://www.theregister.com/2022/05/22/ai_in_brief/&#34;&gt;can be cheated&lt;/a&gt;.&lt;/p&gt; &lt;h3 id=&#34;official-documents&#34;&gt;Official documents&lt;/h3&gt; &lt;p&gt;The second solution is to require users to provide an official piece of ID. Considering an official ID often contain a photo, full legal name, date of birth, home address, and government specific codes, this is even worse.&lt;/p&gt; &lt;p&gt;All this sensitive data then gets collected by either the platform itself or a third-party provider with little oversight or incentive to protect this data at all. Leaks and breaches for this enormous data trove are just around the corner. Unfortunately, this isn&#39;t speculative, &lt;a href=&#34;https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/&#34;&gt;data leaks have already occurred&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;The more copies of your official documents exist online, the greater the risk this data &lt;em&gt;will get exposed&lt;/em&gt;, and the less value this document has to actually identify you when it&#39;s &lt;em&gt;truly&lt;/em&gt; needed.&lt;/p&gt; &lt;p&gt;And again, this sort of verification is easy to cheat. Any determined teenager will soon learn how to either create a fake ID, use someone else&#39;s ID, or go around this verification system in another way.&lt;/p&gt; &lt;p&gt;Age verification laws will &lt;em&gt;without a doubt&lt;/em&gt; support a flourishing criminal industry to provide fake or stolen IDs even more easily online.&lt;/p&gt; &lt;h2 id=&#34;where-age-verification-is-or-will-be-required&#34;&gt;Where age verification is (or will be) required&lt;/h2&gt; &lt;p&gt;In April this year, &lt;a href=&#34;https://www.theverge.com/news/650493/discord-age-verification-face-id-scan-experiment&#34;&gt;Discord started to test age verification systems&lt;/a&gt; using facial or ID scans, as a way to comply with &lt;a href=&#34;https://www.bbc.co.uk/news/articles/c89vjj0lxx9o&#34;&gt;Australia&lt;/a&gt;&#39;s and &lt;a href=&#34;https://www.theverge.com/2023/10/26/23922397/uk-online-safety-bill-law-passed-royal-assent-moderation-regulation&#34;&gt;UK&lt;/a&gt;&#39;s new laws.&lt;/p&gt; &lt;p&gt;This measure only applies to access certain protected posts for users located in Australia and the United Kingdom and at this time, but don&#39;t be surprised if it soon gets implemented at the account level for users everywhere.&lt;/p&gt; &lt;p&gt;In the &lt;a href=&#34;https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/&#34;&gt;United States&lt;/a&gt;, many states have already passed some types of age verification laws, and several others have proposed such laws. In &lt;a href=&#34;https://www.eff.org/deeplinks/2024/09/canadas-leaders-must-reject-overbroad-age-verification-bill&#34;&gt;Canada&lt;/a&gt; and &lt;a href=&#34;https://digital-strategy.ec.europa.eu/en/funding/call-tenders-development-consultancy-and-support-age-verification-solution&#34;&gt;Europe&lt;/a&gt;, legislators have also been pushing for similar regulations to block content online subject to age verification.&lt;/p&gt; &lt;p&gt;There is no doubt the more countries pass similar prohibitive laws, the more other countries will soon follow.&lt;/p&gt; &lt;p&gt;Some hope however, this month a US federal judge ruled an age verification &lt;a href=&#34;https://thehill.com/homenews/state-watch/5228836-judge-blocks-social-media-age-verification-law-in-arkansas/&#34;&gt;law in Arkansas unconstitutional&lt;/a&gt;.&lt;/p&gt; &lt;h2 id=&#34;who-decides-what-is-sensitive-content&#34;&gt;Who decides what is sensitive content&lt;/h2&gt; &lt;p&gt;When talking about age verification, most assume this only applies to obvious pornographic content. However, many of these laws have &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/impact-age-verification-measures-goes-beyond-porn-sites&#34;&gt;much wider reach&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;For example, the Australian law prohibits access to social media altogether for anyone under the age of 16. This means that, once the law comes into full effect after its transitional period, anyone who uses social media in Australia will have to prove they are older than this age. It is likely that all Australian users will have to provide some form of identifying data to continue using their social media accounts. &lt;strong&gt;This is a privacy nightmare.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;When laws target specific content, definition of what is appropriate and what isn&#39;t is often too broad. Moreover, this definition is subject to change from one administration to another.&lt;/p&gt; &lt;p&gt;There are also wide differences from one country to another. For example, some countries sadly consider simple discussions of gender identity or sexual orientation to be sensitive content. What is deemed inappropriate to children in one culture might not be the same in another.&lt;/p&gt; &lt;p&gt;Automating this sort of censorship leads to a lot of misfiring. There has already been numerous instances of &lt;a href=&#34;https://www.cbc.ca/news/world/facebook-clarifies-breastfeeding-pics-ok-updates-rules-1.2997124&#34;&gt;breastfeeding photos mislabelled&lt;/a&gt; for nudity. Important educational material for sex education could get censored and inaccessible to children, who critically need access to it &lt;em&gt;before&lt;/em&gt; adulthood.&lt;/p&gt; &lt;p&gt;Who will decide which content should be censored and which shouldn&#39;t? Will countries hosting the big tech platforms end up having a greater decision power in the matter? Will platforms simply decide to apply the strongest level of restriction worldwide?&lt;/p&gt; &lt;h2 id=&#34;age-verification-isnt-effective&#34;&gt;Age verification isn&#39;t effective&lt;/h2&gt; &lt;p&gt;Even if we could somehow find a global consensus that is perfectly ethical and never misfires on which content children shouldn&#39;t access, it will likely fail.&lt;/p&gt; &lt;p&gt;Children, and teenagers especially, are and have always been incredibly effective at going around such limitation to feed their curious minds.&lt;/p&gt; &lt;p&gt;First, there are technical tools such as VPNs and proxies of all sort to go around location-based restrictions. Then, there&#39;s the classic fake ID, and its modern evolution: deepfake face. There will also be without a doubt a growing market of pre-verified &#34;adult&#34; accounts up for sale online.&lt;/p&gt; &lt;p&gt;Perhaps age verification measures will work for a couple of months, until products to evade it get the word out, then they&#39;ll become useless. Only leaving the ashes of your social media legal consenting adult pseudonymity in its path.&lt;/p&gt; &lt;h2 id=&#34;why-its-bad-news-for-everyones-privacy&#34;&gt;Why it&#39;s bad news for everyone&#39;s privacy&lt;/h2&gt; &lt;p&gt;Age verification will require all platforms and/or third-party identification service providers to collect an enormous trove of sensitive data on everyone.&lt;/p&gt; &lt;p&gt;This goes against all principles of data minimization, generally a vital part of data protection regulations.&lt;/p&gt; &lt;p&gt;Daily occurrences of data breach incidents have taught us we cannot trust these services to safeguard our data. Data breaches for this sensitive information are only a matter of time.&lt;/p&gt; &lt;p&gt;The concentration of such valuable data will likely be monetized and resold either by the platforms themselves, by the for-profit third-party &#34;age assurance&#34; providers they use, or eventually by the criminals who stole it from them.&lt;/p&gt; &lt;p&gt;This data trove will include face scans of children with their location (trying to pass as adults), and faces and official documents from every adult in the world using social media, if this kind of regulation gets implemented at large.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The privacy and safety implications of this are absolutely disastrous&lt;/strong&gt;.&lt;/p&gt; &lt;h2 id=&#34;age-verification-is-not-the-solution&#34;&gt;Age verification is not the solution&lt;/h2&gt; &lt;p&gt;Sadly, age verification legislation will not help safeguard children from harmful content online, but it will effectively remove protection for anyone needing pseudonymity online to &lt;a href=&#34;../../../03/25/privacy-means-safety/&#34;&gt;stay safe&lt;/a&gt;. Moreover, it will put everyone at a much greater risk of victimization by identify theft, impersonation, stalking, and worse.&lt;/p&gt; &lt;p&gt;Despite the perhaps well-intended legislators, technological solutions aren&#39;t always adequate to solve every problem we have. Here again, education and content moderation are likely much better ways to deal with this sort of issues.&lt;/p&gt; &lt;p&gt;In the meantime, don&#39;t be surprised if you cross a teenager on the street suddenly pointing their phone to scan &lt;em&gt;your&lt;/em&gt; adult face, or a young relative looking in your wallet. They probably won&#39;t be looking for your money, but most likely for your adult ID.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/05/06/age-verification-wants-your-face/</link> <pubDate>Thu, 25 Sep 2025 04:09:21 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/05/06/age-verification-wants-your-face/</guid> </item> <item> <title>Encryption Is Not a Crime</title> <author>Em</author> <category>Opinion</category> <description>&lt;h1 id=&#34;encryption-is-not-a-crime&#34;&gt;Encryption Is Not a Crime&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Photo of a red key on an all black background.&#34; src=&#34;../../../../assets/images/encryption-is-not-a-crime/encryption-is-not-a-crime-cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Matt Artz / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Contrary to what some policymakers seem to believe, whether naively or maliciously, encryption is not a crime. Anyone asserting encryption is a tool for crime is either painfully misinformed or is attempting to manipulate legislators to gain oppressive power over the people.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;Encryption is not a crime, encryption is a shield.&lt;/p&gt; &lt;p&gt;Encryption is the digital tool that protects us against all sorts of attacks. It is the lock on your digital door preventing harmful intruders from entering your home. Encryption is also the door itself, protecting your privacy and intimacy from creepy eavesdroppers while you go about your life.&lt;/p&gt; &lt;p&gt;It&#39;s not a crime to lock your home&#39;s door for protection, &lt;strong&gt;why would it be a crime to lock your digital door?&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;../../../03/25/privacy-means-safety/&#34;&gt;Encryption protects you&lt;/a&gt; from cyberattack, identity theft, discrimination, doxxing, stalking, sexual violence, physical harm, and much more.&lt;/p&gt; &lt;h2 id=&#34;who-says-encryption-is-a-crime&#34;&gt;Who says encryption is a crime&lt;/h2&gt; &lt;p&gt;Anyone who is well-informed will find it hard to believe someone could want to sabotage such fantastic protection.&lt;/p&gt; &lt;p&gt;Yet, &lt;a href=&#34;https://www.wired.com/1993/02/crypto-rebels/&#34;&gt;year&lt;/a&gt; after &lt;a href=&#34;https://www.wired.com/story/a-new-era-of-attacks-on-encryption-is-starting-to-heat-up/&#34;&gt;year&lt;/a&gt;, oppressive regimes and lazy or greedy &lt;a href=&#34;https://www.techradar.com/computing/cyber-security/anonymity-is-not-a-fundamental-right-experts-disagree-with-europol-chiefs-request-for-encryption-back-door&#34;&gt;law enforcement&lt;/a&gt; entities around the world have attempted to &lt;a href=&#34;https://www.howtogeek.com/544727/what-is-an-encryption-backdoor/&#34;&gt;undermine encryption&lt;/a&gt; using the pretext this is needed to &#34;solve crime&#34;, despite all the experts &lt;em&gt;repeatedly&lt;/em&gt; warning on how &lt;a href=&#34;https://arstechnica.com/tech-policy/2019/08/post-snowden-tech-became-more-secure-but-is-govt-really-at-risk-of-going-dark/&#34;&gt;unnecessary&lt;/a&gt; and &lt;a href=&#34;https://www.globalencryption.org/2020/11/breaking-encryption-myths/&#34;&gt;dangerous&lt;/a&gt; this would be. And this is without accounting for all the countries where encryption is &lt;em&gt;already&lt;/em&gt; &lt;a href=&#34;https://www.gp-digital.org/world-map-of-encryption/&#34;&gt;severely restricted&lt;/a&gt;, such as Russia, China, India, Iran, Egypt, Cuba, and others.&lt;/p&gt; &lt;p&gt;Whether breaking encryption is brought up naively by misinformed authorities, or as a disguised excuse for mass surveillance is up for debate.&lt;/p&gt; &lt;p&gt;Nevertheless, the result is the same: An attempt to destroy &lt;strong&gt;a tool we all need to stay safe&lt;/strong&gt;.&lt;/p&gt; &lt;h2 id=&#34;encryption-is-a-protective-shield&#34;&gt;Encryption is a protective shield&lt;/h2&gt; &lt;p&gt;Encryption, moreover end-to-end encryption, is a tool we all use in our digital life to stay safe.&lt;/p&gt; &lt;p&gt;In today&#39;s world, the boundary between online and offline life is largely dissolved. Almost everything we do &#34;offline&#34; has a record of it &#34;online&#34;. Online life is regular life now. It&#39;s not just your browsing history.&lt;/p&gt; &lt;p&gt;Your medical record from a visit at the clinic, your purchase transaction from a trip to the store, your travel photos saved in the cloud, your text conversations with your friends, family, and children, are all likely protected with encryption, perhaps even with &lt;em&gt;end-to-end&lt;/em&gt; encryption.&lt;/p&gt; &lt;p&gt;Such a large trove of personal data needs to be protected against eavesdropping and malicious attacks for everyone to stay safe.&lt;/p&gt; &lt;p&gt;Encryption offers this protection. End-to-end encryption all the more.&lt;/p&gt; &lt;h2 id=&#34;what-is-end-to-end-encryption-and-what-is-the-war-against-it&#34;&gt;What is end-to-end encryption, and what is the war against it&lt;/h2&gt; &lt;p&gt;End-to-end encryption is a type of encryption where only the intended recipient(s) have the ability to decrypt (read) the encrypted data.&lt;/p&gt; &lt;p&gt;This means that if you send a message through &lt;a href=&#34;https://signal.org/&#34;&gt;Signal&lt;/a&gt; for example, only the participants to this conversation will be able to read the content of this conversation. Even Signal cannot know what is being discussed on Signal.&lt;/p&gt; &lt;p&gt;This greatly annoys some over-controlling authorities who would like to be granted unlimited power to spy on anyone anytime they wish, for vaguely defined purposes that could change at any moment.&lt;/p&gt; &lt;p&gt;End-to-end encryption can also mean a situation where you are &#34;both ends&#34; of the communication.&lt;/p&gt; &lt;p&gt;For example, when enabling Apple&#39;s &lt;a href=&#34;https://support.apple.com/en-ca/guide/security/sec973254c5f/web&#34;&gt;Advanced Data Protection for iCloud&lt;/a&gt; (ADP), it activates end-to-end encryption protection for almost all of iCloud data, including photos. This means that even Apple could not see your photos, or be forced to share your photos with a governmental entity.&lt;/p&gt; &lt;p&gt;Without ADP, Apple can read or share your photos (or other data) if they are legally compelled to, or if they feel like it. The same is true for Google&#39;s services, Microsoft&#39;s services, and any other online services that aren&#39;t end-to-end encrypted.&lt;/p&gt; &lt;p&gt;This is at the root of the latest attack on encryption:&lt;/p&gt; &lt;p&gt;In February this year, it was reported that &lt;a href=&#34;../../../02/28/uk-forced-apple-to-remove-adp/&#34;&gt;Apple was served with a notice&lt;/a&gt; from the UK&#39;s Home Office to force it to break ADP&#39;s end-to-end encryption. In response, Apple removed access to ADP from the UK entirely, making this protection unavailable to UK residents.&lt;/p&gt; &lt;p&gt;Do not mistakenly think this attack is limited to the UK and Apple users, however. If this regulation notice or a similar one gets enforced, it would &lt;strong&gt;impact the whole world.&lt;/strong&gt; Other countries would likely soon follow, and other services would likely soon get under attack as well.&lt;/p&gt; &lt;p&gt;Moreover, do not feel unaffected just because you use end-to-end encryption with &lt;a href=&#34;https://www-svt-se.translate.goog/nyheter/inrikes/signal-lamnar-sverige-om-regeringens-forslag-pa-datalagring-klubbas?_x_tr_sl=auto&amp;amp;_x_tr_tl=en&amp;amp;_x_tr_hl=en-US&amp;amp;_x_tr_pto=wapp&#34;&gt;Signal&lt;/a&gt; or &lt;a href=&#34;https://www.techradar.com/vpn/vpn-privacy-security/secure-encryption-and-online-anonymity-are-now-at-risk-in-switzerland-heres-what-you-need-to-know&#34;&gt;Proton&lt;/a&gt; services instead of Apple, they are both &lt;strong&gt;under attack&lt;/strong&gt; as well in this war.&lt;/p&gt; &lt;p&gt;Just in recent years, the war against encryption has affected the &lt;a href=&#34;https://www.eff.org/deeplinks/2023/04/earn-it-bill-back-again-seeking-scan-our-messages-and-photos&#34;&gt;US&lt;/a&gt;, the &lt;a href=&#34;https://www.bbc.co.uk/news/articles/cgj54eq4vejo&#34;&gt;UK&lt;/a&gt;, &lt;a href=&#34;https://www.globalencryption.org/2025/04/joint-letter-on-swedish-data-storage-and-access-to-electronic-information-legislation/&#34;&gt;Sweden&lt;/a&gt;, &lt;a href=&#34;https://www.laquadrature.net/en/warondrugslaw/&#34;&gt;France&lt;/a&gt;, &lt;a href=&#34;https://www.theverge.com/2020/10/12/21513212/backdoor-encryption-access-us-canada-australia-new-zealand-uk-india-japan&#34;&gt;Australia, New Zealand, Canada, India, Japan&lt;/a&gt;, and all the European Union countries with proposals such as &lt;a href=&#34;../../../02/03/the-future-of-privacy/#chat-control-wants-to-break-end-to-end-encryption&#34;&gt;Chat Control&lt;/a&gt;.&lt;/p&gt; &lt;h2 id=&#34;the-arguments-given-to-break-encryption-make-no-sense&#34;&gt;The arguments given to break encryption make no sense&lt;/h2&gt; &lt;p&gt;Authoritarian entities generally use the same populist excuses to justify their senseless demands. &#34;Protecting the children&#34; is always a fashionable disingenuous argument.&lt;/p&gt; &lt;p&gt;Because no one would disagree that protecting the children is important, it is often used as an attempt to deceitfully make an irrefutable argument to justify breaking encryption.&lt;/p&gt; &lt;p&gt;The problem is, &lt;strong&gt;breaking encryption doesn&#39;t protect the children&lt;/strong&gt;, it &lt;a href=&#34;https://www.theguardian.com/technology/2022/jan/21/end-to-end-encryption-protects-children-says-uk-information-watchdog&#34;&gt;endangers&lt;/a&gt; them.&lt;/p&gt; &lt;p&gt;When law enforcement officials claim they need to be able to read everyone&#39;s messages and see everyone&#39;s personal photos to be able to fight child predators, they seem to neglect that:&lt;/p&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;This means they will expose the children&#39;s messages, contact information, locations, and photos in the process, potentially &lt;em&gt;endangering the children further&lt;/em&gt;.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;Exposing everyone&#39;s data will make this data much more likely to be found and exploited by criminals, making &lt;em&gt;everyone&lt;/em&gt; more vulnerable to attacks.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;Predators will simply move to underground channels, &lt;a href=&#34;https://www.schneier.com/blog/archives/2015/07/back_doors_wont.html&#34;&gt;unbothered&lt;/a&gt;.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;p&gt;They use the same kind of deceptive argument trying to justify weakening the protections we have to supposedly catch &#34;criminals&#34; and &#34;terrorists&#34;.&lt;/p&gt; &lt;p&gt;Of course the exact definition of what is a &#34;criminal&#34; or a &#34;terrorist&#34; is always vague and subject to change. In the past, human rights activists and authoritarian regime dissidents have been labeled as such, climate change activists as well, LGBTQ+ people even in some countries. Maybe next year this label will include &#34;DEI advocates&#34;, who knows where they draw the line and what can be considered a &#34;criminal&#34; worth spying on.&lt;/p&gt; &lt;p&gt;You &lt;em&gt;cannot&lt;/em&gt; remove everyone&#39;s right to privacy and protection from harm while pretending it is to protect them. No one who is well-informed and well-intended could possibly consider this a smart thing to do.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;An attack on end-to-end encryption isn&#39;t an attack on criminals, it&#39;s an attack on all of us.&lt;/strong&gt;&lt;/p&gt; &lt;h2 id=&#34;magical-backdoor-only-for-the-good-guys-is-a-complete-fantasy&#34;&gt;Magical backdoor only for &#34;the good guys&#34; is a complete fantasy&lt;/h2&gt; &lt;p&gt;Let&#39;s say the strategy is akin to creating a MagicalKey that unlocks every door (a magical key because thinking encryption backdoors would only be used by &#34;the good guys&#34; is a great example of &lt;a href=&#34;https://www.britannica.com/science/magical-thinking&#34;&gt;magical thinking&lt;/a&gt;).&lt;/p&gt; &lt;p&gt;Imagine, for the sake of this exercise, the MagicalLock for this MagicalKey is impossible to pick, and imagine only police officers have MagicalKeys. Let&#39;s say one thousand police officers each have a MagicalKey.&lt;/p&gt; &lt;p&gt;They argue they need to be able to unlock anyone&#39;s door if they suspect a crime is happening inside. &#34;It&#39;s for safety!&#34;&lt;/p&gt; &lt;p&gt;Overtime, let&#39;s say only 1% of the police officers accidentally lose their MagicalKey. This kind of things happen. Now 10 MagicalKeys are lost in the wild and could be used by anyone else, for any purposes, including crime.&lt;/p&gt; &lt;p&gt;Then, let&#39;s say only 0.1% of police officers get corrupted by a crime gang. That&#39;s just one right? This corrupted &#34;good guy&#34; lets the gang create a double of the MagicalKey. Which crime gang wouldn&#39;t want a key that can magically open any door? They pay the police officer good money for this. It&#39;s an investment.&lt;/p&gt; &lt;p&gt;Now, the gang creates doubles of the MagicalKey they have. They obfuscate its serial number, so it cannot be traced back to them. They use it subtly at first to avoid detection. They make sure they never leave traces behind, so victims have no idea their door got unlocked.&lt;/p&gt; &lt;p&gt;During this time, they steal your data, they sell it, they use it to impersonate you, they use it to harm you and your loved ones.&lt;/p&gt; &lt;p&gt;Then, another criminal figures out on their own how to emulate a MagicalKey without even having access to one. The criminal creates a reproducible mold for this Emulated-MagicalKey and sells it to other criminals on the criminal market. Now, the MagicalKey™️ is available to any criminals looking for it. Restrictions on the backdoor are off. &lt;strong&gt;Your personal data is up for grabs.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;This is what is going to happen if backdoors are implemented in end-to-end encryption. But don&#39;t worry they say, &#34;it&#39;s only for the good guys!&#34;.&lt;/p&gt; &lt;p&gt;At least, the criminals&#39; data will also be up for grabs, right?&lt;/p&gt; &lt;p&gt;Nope! The criminals knew about this, so they just started using different channels that weren&#39;t impacted. Criminals will have their privacy intact, they don&#39;t care about using illegal tools, but &lt;strong&gt;your legal privacy protections will be gone&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;&lt;em&gt;Backdoored&lt;/em&gt; end-to-end encryption isn&#39;t end-to-end anymore, it&#39;s just open-ended encryption. This offers pretty much no protection at all.&lt;/p&gt; &lt;h2 id=&#34;ignoring-experts-doesnt-make-facts-disappear&#34;&gt;Ignoring experts doesn&#39;t make facts disappear&lt;/h2&gt; &lt;p&gt;Where is the opposition to this? Where are the experts pushing against this nightmare? Everywhere.&lt;/p&gt; &lt;p&gt;Thankfully, opposition has been strong, despite the relentless ignorance or malevolence from authoritarian authorities repeatedly pushing against encryption.&lt;/p&gt; &lt;p&gt;Many people and groups have been fighting valiantly to defend our collective right to privacy and security. Countless experts have patiently taken the time to explain &lt;a href=&#34;https://signal.org/blog/uk-online-safety-bill/&#34;&gt;again&lt;/a&gt; and &lt;a href=&#34;https://www.globalencryption.org/2020/10/cdt-gpd-and-internet-society-reject-time-worn-argument-for-encryption-backdoors/&#34;&gt;again&lt;/a&gt; and &lt;a href=&#34;https://www.schneier.com/wp-content/uploads/2016/09/paper-keys-under-doormats-CSAIL.pdf&#34;&gt;again&lt;/a&gt; how an encryption backdoor only for &#34;the good guys&#34; is simply impossible.&lt;/p&gt; &lt;p&gt;Weakening encryption to let &#34;the good guys&#34; enter, lets &lt;em&gt;anyone&lt;/em&gt; enter, including criminals. There is no way around this.&lt;/p&gt; &lt;p&gt;Seemingly ignoring warnings and advice from the most respected specialists in the field, authoritarian officials continue to push against encryption. So much so that it has become difficult to assume good intent misguided by ignorance at this point.&lt;/p&gt; &lt;p&gt;Unfortunately, ignoring the experts or silencing the debate will not make the facts magically disappear.&lt;/p&gt; &lt;p&gt;In an encouraging development this week, Apple &lt;a href=&#34;https://www.bbc.co.uk/news/articles/cvgn1lz3v4no&#34;&gt;won a case&lt;/a&gt; fighting an attempt from the UK Home Office to hide from the public details of their latest attack on encryption.&lt;/p&gt; &lt;p&gt;This battle and all battles to protect our privacy rights, &lt;em&gt;must&lt;/em&gt; be fought is broad daylight, for all to see and to support.&lt;/p&gt; &lt;h2 id=&#34;fight-for-encryption-rights-everywhere-you-can&#34;&gt;Fight for encryption rights everywhere you can&lt;/h2&gt; &lt;p&gt;The war against encryption isn&#39;t anything new, it has been happening for decades. However, the quantity of data, personal and sensitive data, that is collected, stored, and shared about us is much larger today. It is essential we use the proper tools to secure this information.&lt;/p&gt; &lt;p&gt;This is what have changed, and what is making encryption and end-to-end encryption even more indispensable today.&lt;/p&gt; &lt;p&gt;Mass surveillance will not keep us safe, it will endanger us further and damage our democracies and freedoms in irreparable ways.&lt;/p&gt; &lt;p&gt;We must fight to keep our right to privacy, and use of strong end-to-end encryption to protect ourselves, our friends, our family, and yes also to protect the children.&lt;/p&gt; &lt;h3 id=&#34;how-can-you-support-the-right-to-encryption&#34;&gt;How can you support the right to encryption?&lt;/h3&gt; &lt;ul class=&#34;task-list&#34;&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Use end-to-end encryption everywhere you can.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Talk about the benefits of end-to-end encryption to everyone around you, especially your loved ones less knowledgeable about technology. Talk about how it is essential to protect everyone&#39;s data, including the children&#39;s.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Use social media to promote the benefits of end-to-end encryption and post about how it protects us all.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Write or call your government representatives to let them know you care about end-to-end encryption and are worried about dangerous backdoors or chat control proposals.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Support organizations fighting for encryption, such as:&lt;/p&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.globalencryption.org/&#34;&gt;Global Encryption Coalition&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.openrightsgroup.org/campaign/save-encryption/&#34;&gt;Open Rights Group&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.makedmssafe.com/&#34;&gt;Fight For The Future&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://signal.org/donate/&#34;&gt;Signal app&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.internetsociety.org/open-letters/fix-the-take-it-down-act-to-protect-encryption/&#34;&gt;Internet Society&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.eff.org/issues/end-end-encryption&#34;&gt;Electronic Frontier Foundation&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/en/about/donate/&#34;&gt;Privacy Guides&lt;/a&gt; 💛&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;/li&gt; &lt;/ul&gt; &lt;p&gt;Finally, have a look at our &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;recommendations&lt;/a&gt; if you want to start using more tools protecting your privacy using end-to-end encryption.&lt;/p&gt; &lt;p&gt;This is a long war, but the importance of it doesn&#39;t allow us to give up.&lt;/p&gt; &lt;p&gt;We must continue fighting for the right to protect our data with end-to-end encryption, &lt;strong&gt;we owe it to ourselves, our loved ones, and the future generations.&lt;/strong&gt;&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/04/11/encryption-is-not-a-crime/</link> <pubDate>Thu, 25 Sep 2025 04:09:21 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/04/11/encryption-is-not-a-crime/</guid> </item> <item> <title>The Importance of Data Privacy For The Queer Community</title> <author>Em</author> <category>News</category> <category>Pride Month</category> <description>&lt;h1 id=&#34;the-importance-of-data-privacy-for-the-queer-community&#34;&gt;The Importance of Data Privacy For The Queer Community&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Photo of a Progress Pride Flag with a semi-transparent padlock icon over it.&#34; src=&#34;../../../../assets/images/importance-of-privacy-for-the-queer-community/pride-cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Photo: Chris Robert / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Data privacy is important for everyone. But for some marginalized populations, data privacy is indispensable for social connection, access to information, and physical safety. For &lt;a href=&#34;../../../../tags/#tag:pride-month&#34;&gt;Pride month&lt;/a&gt; this year, we will discuss topics at the intersection of data privacy and experiences specific to the LGBTQ+ community.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;While it&#39;s difficult to get a complete estimate on this, due to fear of discrimination and other factors, a 2021 &lt;a href=&#34;https://www.ipsos.com/sites/default/files/ct/news/documents/2021-06/LGBT%20Pride%202021%20Global%20Survey%20Report_3.pdf&#34;&gt;survey&lt;/a&gt; conducted by Ipsos in 27 countries revealed that only 80% of the population surveyed identified as heterosexual. Additionally, about 1% of adults identified as a gender different from the one they were assigned at birth. This percentage is even higher for Gen Z and Millennials.&lt;/p&gt; &lt;p&gt;In the United States alone, it&#39;s &lt;a href=&#34;https://www.lgbttech.org/_files/ugd/d77b01_0e1e02c938e94ae3aad4ce21312bdde4.pdf&#34;&gt;estimated&lt;/a&gt; there are 20 million adults who are part of the LGBTQ+ community. That&#39;s a lot of people!&lt;/p&gt; &lt;p&gt;Despite the progress of the past decades, the queer population still faces many challenges to being free and safe from discrimination.&lt;/p&gt; &lt;p&gt;Discrimination online, at work, at school, at the national or even the familial level, can put LGBTQ+ individuals in dangerous situations, where data privacy may be the only shield available for protection.&lt;/p&gt; &lt;p&gt;In this context, it&#39;s essential for the queer community to be well-informed on the tools and practices that can help mitigate the risks, so that information, services, and support can still be accessed safely.&lt;/p&gt; &lt;h2 id=&#34;higher-risk-when-data-gets-exposed&#34;&gt;Higher risk when data gets exposed&lt;/h2&gt; &lt;p&gt;Unfortunately, LGBTQ+ people are still at a higher risk when their personal data gets exposed.&lt;/p&gt; &lt;p&gt;First, for people living in environments hostile to their sexual orientation or gender identity, keeping personal information private can literally mean life or death. Tragically, even today many countries still criminalize homosexuality and gender identities different from cisgender. When this personal information gets exposed, people might lose support from their family, lose their job, get arrested, or even be &lt;a href=&#34;https://en.wikipedia.org/wiki/Capital_punishment_for_homosexuality&#34;&gt;executed&lt;/a&gt; in some countries.&lt;/p&gt; &lt;p&gt;People in these very vulnerable situations have to be &lt;em&gt;extremely&lt;/em&gt; careful about protecting their data in order to stay safe, online and offline.&lt;/p&gt; &lt;p&gt;Moreover, organizations collecting data that could put anyone at risk of getting accidentally or maliciously outed should feel a &lt;em&gt;strong responsibility&lt;/em&gt; to protect this data fiercely, and be held legally accountable when they fail.&lt;/p&gt; &lt;h3 id=&#34;being-outed-against-ones-will&#34;&gt;Being outed against one&#39;s will&lt;/h3&gt; &lt;p&gt;For a queer person, deciding when, how, and to whom to reveal their sexuality or gender identity is a very important and intimate moment. It &lt;em&gt;must&lt;/em&gt; be a personal choice, and only on the person&#39;s own terms.&lt;/p&gt; &lt;p&gt;Even in countries where queer identities and sexualities are legal and accepted, &lt;a href=&#34;https://www.pridecorner.org/post/how-to-support-someone-who-has-been-outed-against-their-will&#34;&gt;being outed against one&#39;s will can have devastating consequences&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;If someone lives with family members who do not accept who they are, getting outed against their will could mean losing their home and familial support. In other situations, perhaps their family is supportive, but their employer isn&#39;t, or maybe some of their friends or co-workers are hostile. They might want to keep this information from them in order to avoid conflicts at work, or avoid losing friendships. Further, there is of course the risk for discrimination, online harassment, and worse.&lt;/p&gt; &lt;p&gt;No matter the situation, coming out as queer should always be an individual and intentional choice.&lt;/p&gt; &lt;p&gt;It is an act of violence to out someone against their consent, even when performed by the intermediary of an algorithm or a neglectful data leak.&lt;/p&gt; &lt;p&gt;Each time there is a data breach that includes information about gender identity, sexuality, browsing history, location history, installed applications, or legal names, this data leak risks outing people against their will.&lt;/p&gt; &lt;p&gt;For all these reasons, it is vital that information be safeguarded so that a queer person is empowered to choose when, how, and to whom to come out on their own terms.&lt;/p&gt; &lt;p&gt;In today&#39;s political climate, this is unfortunately even truer for trans people, who are at a greater risk of getting outed against their will when data about their gender, sex, or legal name leaks. Sadly, there are still too many online forms and software that needlessly collect gender data when it&#39;s completely unnecessary. Similarly, requiring full &lt;em&gt;legal&lt;/em&gt; name is completely irrelevant in many situations where it is currently asked.&lt;/p&gt; &lt;p&gt;Developers must take responsibility and design software and forms considering these risks. As data scientist and civic technologist Soren Spicknall explains brilliantly, gender data &lt;a href=&#34;https://medium.com/@SorenSpicknall/protecting-queer-communities-through-data-4707ae0cb562&#34;&gt;should never be collected&lt;/a&gt; unless &lt;em&gt;absolutely&lt;/em&gt; necessary and &lt;em&gt;absolutely&lt;/em&gt; protected, which in most instances it really isn&#39;t:&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;&#34;Is the danger to your LGBT+ users worth the ability to roughly guess whether somebody is buying a purse for themselves or as a gift, or to assume you know what kind of movie they want to watch?&#34;&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Algorithms shouldn&#39;t be able to target sexuality and gender identity as markers for advertising purposes. Unfortunately, there have already been reported incidents where &lt;a href=&#34;https://www.dailydot.com/irl/facebook-ads-lgbtq/&#34;&gt;people were outed against their will by Facebook&lt;/a&gt; spitting around rainbow ads everywhere, because of Facebook secretly tying someone&#39;s browsing activity back to their profile.&lt;/p&gt; &lt;p&gt;Facebook (and most other commercial platforms) uses cookies and other tracking technologies to follow users online and &lt;a href=&#34;https://www.makeuseof.com/tag/facebook-tracking-stop/&#34;&gt;build an advertising profile&lt;/a&gt; based on their online activity, even outside of Facebook. Then, it shows ads on Facebook related to that activity, no matter if this information was shared or not on the platform.&lt;/p&gt; &lt;p&gt;This kind of non-consensual outing can have devastating consequences, and should be forbidden by law. Everyone should be able to come out when and how they see fit, and not be aggressively outed by some Facebook or Google ad algorithm, or by some negligent data leak.&lt;/p&gt; &lt;h3 id=&#34;online-harassment-and-extortion&#34;&gt;Online harassment and extortion&lt;/h3&gt; &lt;p&gt;The risk of having data about one&#39;s sexuality or gender identity revealed against one&#39;s will can be very dangerous for some people.&lt;/p&gt; &lt;p&gt;With online harassment on the rise, this intimate information can be weaponized by bigots and extortionists to cause severe harm. Unfortunately, this isn&#39;t a rare occurrence, even in countries where the LGBTQ+ community is well accepted. Regrettably, some platforms have even started to &lt;a href=&#34;https://apnews.com/article/social-media-lgbtq-tiktok-x-facebook-instagram-glaad-f790bda1bc3f169ef28ca3f441ea8447&#34;&gt;roll back previous protections against hate speech&lt;/a&gt; and harassment. This will have a severely detrimental impact on the safety of the queer community online.&lt;/p&gt; &lt;p&gt;This year, the LGBTQ advocacy organization GLAAD produced a &lt;a href=&#34;https://glaad.org/smsi/2025/platform-scorecard/&#34;&gt;Social Media Safety Index&lt;/a&gt; rating six major platforms: TikTok, Facebook, Instagram, YouTube, Threads, and X. X (formerly Twitter) received the worst safety score of them all.&lt;/p&gt; &lt;h3 id=&#34;seeking-health-information&#34;&gt;Seeking health information&lt;/h3&gt; &lt;p&gt;People questioning their gender identity or sexuality might seek information online about the health procedures or treatments they need.&lt;/p&gt; &lt;p&gt;This sensitive search history can reveal a lot of personal details that should never be exposed against one&#39;s will. Sadly, browsing the internet without any tracking is a task that becomes harder every year, and many people aren&#39;t aware of the protections they can use against this tracking.&lt;/p&gt; &lt;p&gt;People can suffer from severe harm when sensitive data related to their gender-affirming care or sexual health is exposed, ranging from non-consensual outing to imprisonment. Discrimination related to this type of health information is still rampant in every country in the world.&lt;/p&gt; &lt;h3 id=&#34;seeking-community-online&#34;&gt;Seeking community online&lt;/h3&gt; &lt;p&gt;Seeking the support of online communities is common for queer people who can more easily feel isolated. This is especially true for youth living in hostile or rural environments, where smaller population density often means less supportive local resources and venues.&lt;/p&gt; &lt;p&gt;For people in these situations, finding community online can be essential to survival.&lt;/p&gt; &lt;p&gt;Despite all its flaws, the internet still offers a wonderful way to connect with others regardless of physical distances, and this is doubly true for the queer community.&lt;/p&gt; &lt;p&gt;The need for social connection and support from peers is a fundamental human need. No matter how dangerous this can be, not sharing information online is simply not a viable option for many queer people.&lt;/p&gt; &lt;h2 id=&#34;privacy-invasive-practices-that-are-exponentially-worse-for-queer-people&#34;&gt;Privacy-invasive practices that are exponentially worse for queer people&lt;/h2&gt; &lt;h3 id=&#34;real-name-policies&#34;&gt;Real-name policies&lt;/h3&gt; &lt;p&gt;Many privacy-invasive practices and policies are significantly more dangerous for LGBTQ+ people. For example, &lt;a href=&#34;https://en.wikipedia.org/wiki/Real-name_system&#34;&gt;the &#34;real-name&#34; policies&lt;/a&gt; on Facebook and other platforms are absolutely horrendous for transgender people.&lt;/p&gt; &lt;p&gt;If a trans person uses an older account, or has not changed their name on official documentation, a real-name policy could either out them against their will, force them to keep their &lt;a href=&#34;https://en.wikipedia.org/wiki/Deadnaming&#34;&gt;deadname&lt;/a&gt; online, or even lock them out of their account if official ID is requested for account recovery and doesn&#39;t match the name they used for the account.&lt;/p&gt; &lt;p&gt;For many people around the world, the use of pseudonyms or chosen names online means safety, and this is even truer for trans people and other queer people.&lt;/p&gt; &lt;h3 id=&#34;single-account-policies&#34;&gt;Single-account policies&lt;/h3&gt; &lt;p&gt;Thankfully, most platforms aren&#39;t using such policies yet. But unfortunately, it does seem there could be a push to implement single-account policies in the near future.&lt;/p&gt; &lt;p&gt;With the multiplication of age verification laws and the proliferation of unregulated AI systems, there has been some talk of using unique identifiers to prevent the creation of multiple accounts. This is &lt;strong&gt;a horrible idea for everyone&lt;/strong&gt;, and should never be allowed, but it&#39;s even worse for LGBTQ+ people.&lt;/p&gt; &lt;p&gt;Creating multiple accounts for different purposes, for example to separate work life from personal life, is a great privacy practice for anyone.&lt;/p&gt; &lt;p&gt;Multiple accounts on a same platform, or &#34;alt accounts&#34;, are regularly used by queer people in order to be their full selves online, when they aren&#39;t fully out in their public or personal life, or just because they prefer to keep their queer identity and activities separated.&lt;/p&gt; &lt;p&gt;Sadly, if single-account policies begin to be implemented on platforms, this great privacy protection could soon disappear.&lt;/p&gt; &lt;h3 id=&#34;facial-recognition&#34;&gt;Facial recognition&lt;/h3&gt; &lt;p&gt;Facial recognition is an especially problematic technology for transgender people. Many times, these algorithms will not only create a faceprint from the data, but will also try to infer gender from it.&lt;/p&gt; &lt;p&gt;These systems are deeply flawed and have discrimination biases built-in. They can&#39;t even reliably identify the correct gender of cisgender people. Because of the way these algorithms were developed, the use of this technology is &lt;a href=&#34;https://www.theswaddle.com/how-facial-recognition-ai-reinforces-discrimination-against-trans-people&#34;&gt;worse for transgender people&lt;/a&gt;, and &lt;a href=&#34;https://sciencepolicy.hsites.harvard.edu/blog/racial-discrimination-face-recognition-technology&#34;&gt;exponentially worse&lt;/a&gt; for transgender people of color.&lt;/p&gt; &lt;p&gt;Tragically, privacy legislation is lagging behind at protecting us by regulating this biased, invasive, and inaccurate technology that is spreading faster and further every year.&lt;/p&gt; &lt;h3 id=&#34;public-photos-during-events&#34;&gt;Public photos during events&lt;/h3&gt; &lt;p&gt;These days, it&#39;s pretty much impossible to attend many events without having our photo intrusively taken by a stranger and posted on Instagram without our consent.&lt;/p&gt; &lt;p&gt;This is a generally bad behavior that we should all work on improving culturally. Posting photos of strangers online without their consent can be much more harmful for queer people.&lt;/p&gt; &lt;p&gt;For example, taking photos at a Pride event and posting it online can out people against their will. While it&#39;s perhaps fair to assume most people &lt;em&gt;performing&lt;/em&gt; in a Pride parade or on a stage might implicitly be comfortable with it, this isn&#39;t necessarily the case for people in the &lt;em&gt;audience&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;This non-consensual practice, coupled with the corporate social media tendency to use facial recognition to tag everyone&#39;s faces, can cause harm in all sorts of ways.&lt;/p&gt; &lt;p&gt;We should all &lt;a href=&#34;../../../03/10/the-privacy-of-others/&#34;&gt;develop more respectful practices&lt;/a&gt; when taking photos at events, and be mindful not to post anything online which could identify anyone in the audience who did not give their explicit consent.&lt;/p&gt; &lt;h3 id=&#34;background-checks-and-algorithmic-biases&#34;&gt;Background checks and algorithmic biases&lt;/h3&gt; &lt;p&gt;Even for people who are publicly out and live in regions that are supportive, discrimination and biases are still there. Despite new legislations and a more progressive culture, data remnants of previous oppressive times can still have a severe negative impact on someone&#39;s life. Too few efforts are made by institutions to correct records properly after legislation has passed.&lt;/p&gt; &lt;p&gt;This is especially problematic with opaque systems where embedded discrimination might not be obvious. Algorithmic decision-making is a growing danger for this, considering there is often no way to trace back the reasons a decision was made, and no accountability for whomever fed biased data to the black-box algorithm, whether negligently or maliciously.&lt;/p&gt; &lt;p&gt;There are also older systems of decision-making, such as background checks. Last year, a 78-year-old woman from West Sussex &lt;a href=&#34;https://www.bbc.co.uk/news/articles/c3v5pwnpnvko&#34;&gt;learned&lt;/a&gt; that she had a criminal record for 56 years for being a lesbian in the military (at a time when it was illegal). Completely unaware of this outdated data trail, this woman spent her whole life with this discriminatory tag attached to her records. This likely cost her countless opportunities throughout the decades, without her ever knowing the cause.&lt;/p&gt; &lt;p&gt;Unfortunately, this kind of incident is likely to multiply by millions with the increased use of algorithmic decision-making using closed systems, often impossible to audit.&lt;/p&gt; &lt;h3 id=&#34;dating-apps-data&#34;&gt;Dating apps data&lt;/h3&gt; &lt;p&gt;Last but not least, data collected by dating apps is an especially sensitive issue for the queer population.&lt;/p&gt; &lt;p&gt;Regrettably, there have already been numerous data breaches showing this risk is very real. Intimate photos have been leaked, location data has been leaked, health data has been leaked, and even private messages have been &lt;a href=&#34;https://www.pride.com/think-your-privacy-is-safe-on-the-gay-dating-apps-this-data-leak-could-change-your-mind&#34;&gt;leaked&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;The harm caused by these leaks and breaches have consequences ranging from accidental outing, to loss of employment, extortion by criminals, imprisonment, and even &lt;em&gt;death&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;In countries where homosexuality is criminalized, cruel state authorities and homophobic bigots are &lt;a href=&#34;https://www.article19.org/resources/apps-traps-dating-apps-must-protect-communities-middle-east-north-africa/&#34;&gt;weaponizing dating apps to entrap&lt;/a&gt; LGBTQ+ people to attack or arrest them. Weighing the need for support, love, and affection, with the very real risk of physical aggression is a dreadful challenge many queer people face.&lt;/p&gt; &lt;h2 id=&#34;things-to-keep-in-mind-to-stay-safe&#34;&gt;Things to keep in mind to stay safe&lt;/h2&gt; &lt;p&gt;Despite the increased risks the queer community is exposed to, staying offline and disconnected from the world isn&#39;t a viable option.&lt;/p&gt; &lt;p&gt;Indeed, disconnection and isolation can be a &lt;em&gt;worse&lt;/em&gt; risk for many LGBTQ+ people, especially younger people. Tragically, queer youth are more than four times as likely to attempt suicide. Disconnecting from the internet communities that accept them isn&#39;t an option, and would pose dangers of its own.&lt;/p&gt; &lt;p&gt;Thankfully, there are many tools and practices that can be adopted to improve privacy online, and reduce the risk of sensitive data getting exposed. Here are a few ideas that might help yourself or your loved ones to stay safer online:&lt;/p&gt; &lt;h3 id=&#34;using-better-social-media&#34;&gt;Using better social media&lt;/h3&gt; &lt;p&gt;Social media usage leaves &lt;em&gt;a lot&lt;/em&gt; of digital footprints online, and some platforms are worse than others for this. Staying mindful about which platform to choose, and how to use it, can greatly improve one&#39;s experience and security.&lt;/p&gt; &lt;p&gt;Favoring alternative social media platforms that do not have a commercial incentive to monetize data can really help.&lt;/p&gt; &lt;p&gt;For example, platforms that are developed and managed by a community of volunteers, rather than a for-profit corporation, tend to keep their users&#39; benefits and safety in mind much more.&lt;/p&gt; &lt;p&gt;If you are ready to make a change, &lt;a href=&#34;https://joinmastodon.org/&#34;&gt;Mastodon&lt;/a&gt; is a non-profit platform that &lt;a href=&#34;https://www.privacyguides.org/en/social-networks/#mastodon&#34;&gt;we recommend&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Mastodon is a social media platform that somewhat resembles Twitter prior to its rebranding. It is composed of multiple servers you can choose from, which makes it easier to move your account if you aren&#39;t satisfied with the moderation on one particular server.&lt;/p&gt; &lt;p&gt;To get started, you can choose the server administrated by the team who develops the Mastodon software (&lt;a href=&#34;https://mastodon.social/about&#34;&gt;mastodon.social&lt;/a&gt;), or you can choose a smaller server run by volunteers (you can also self-host, but that&#39;s a longer story).&lt;/p&gt; &lt;p&gt;Don&#39;t let this choice intimidate you too much though, these servers connect with each other, and you can always move later on. Just pick one you like. Some servers will have a focus on a region, a topic, a hobby, and there are even servers focused on LGBTQ+ communities, such as &lt;a href=&#34;https://tech.lgbt/about&#34;&gt;tech.lgbt&lt;/a&gt;, &lt;a href=&#34;https://lgbtqia.space/about&#34;&gt;lgbtqia.space&lt;/a&gt;, and &lt;a href=&#34;https://joinmastodon.org/servers&#34;&gt;more&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;All the servers listed on the Mastodon website have &lt;a href=&#34;https://joinmastodon.org/covenant&#34;&gt;committed&lt;/a&gt; to hold active moderation against racism, sexism, homophobia, and transphobia.&lt;/p&gt; &lt;p&gt;Additionally, Mastodon connects with other social media platforms that are also part of the larger &lt;a href=&#34;https://fediverse.info/&#34;&gt;Fediverse&lt;/a&gt; network.&lt;/p&gt; &lt;p&gt;If you prefer something similar to Instagram, you can replace it with &lt;a href=&#34;https://pixelfed.org/&#34;&gt;Pixelfed&lt;/a&gt;. For something similar to Facebook, look for &lt;a href=&#34;https://friendi.ca/&#34;&gt;Friendica&lt;/a&gt;. For something more like TikTok, try &lt;a href=&#34;https://loops.video/&#34;&gt;Loops&lt;/a&gt;. For a replacement to YouTube, check videos on &lt;a href=&#34;https://joinpeertube.org/&#34;&gt;PeerTube&lt;/a&gt;, and &lt;a href=&#34;https://fediverse.info/explore/projects&#34;&gt;more&lt;/a&gt;!&lt;/p&gt; &lt;p&gt;These alternative platforms often benefit from stronger moderation and better respect for their users&#39; data. Because they aren&#39;t for-profit corporations, they have no interest in collecting your data, tracking you, or imposing invasive &#34;real-name&#34; policies. Additionally, they run &lt;strong&gt;no ads&lt;/strong&gt;!&lt;/p&gt; &lt;h4 id=&#34;secure-any-social-media-you-use&#34;&gt;Secure any social media you use&lt;/h4&gt; &lt;p&gt;No matter what social media platform(s) you choose to use, the first step should always be to make sure you go through all the settings to secure your account (&lt;a href=&#34;https://www.privacyguides.org/en/basics/multi-factor-authentication/&#34;&gt;enable multifactor authentication&lt;/a&gt;!), and adjust the available privacy options to your needs and preferences (consider &lt;a href=&#34;https://www.privacyguides.org/en/social-networks/#public-profile&#34;&gt;locking&lt;/a&gt; your account if you wish to restrict visibility to your followers).&lt;/p&gt; &lt;p&gt;This is true for Mastodon as well, but you should make adjusting all the privacy and security options an &lt;em&gt;absolute priority&lt;/em&gt; for &lt;em&gt;any&lt;/em&gt; corporate social media, especially &lt;a href=&#34;https://www.digitaltrends.com/social-media/how-to-opt-out-of-targeted-ads-on-facebook/&#34;&gt;if you stay on Facebook&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Additionally, keep in mind that many platforms, including X, Facebook, and Reddit, will now use all your posted content to train their AI systems, making this information and embedded biases likely impossible to delete in the future.&lt;/p&gt; &lt;p&gt;Developing an awareness of what data is shared, who can access it, how it is secured, and how it is used is very important for staying safe online.&lt;/p&gt; &lt;h3 id=&#34;securing-data-when-communicating&#34;&gt;Securing data when communicating&lt;/h3&gt; &lt;p&gt;Outside of social media platforms, many tools are available to help you secure your intimate and private communications.&lt;/p&gt; &lt;p&gt;While chatting on dating apps may be the first step to meeting new people, moving early to end-to-end encrypted channels is likely a good idea for data security and privacy.&lt;/p&gt; &lt;p&gt;That being said, also take into account that because your communications there will be fully end-to-end encrypted (only visible by its intended sender and recipient), there will be no moderation with it. Make sure you trust a person enough before moving the discussion to an end-to-end encrypted, more personal channel.&lt;/p&gt; &lt;h4 id=&#34;instant-messaging-communication&#34;&gt;Instant messaging communication&lt;/h4&gt; &lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/#signal&#34;&gt;Signal&lt;/a&gt; is a wonderful end-to-end encrypted and free-to-use instant messaging app. Signal will collect your phone number to create the account, but nothing else.&lt;/p&gt; &lt;p&gt;When using Signal, you should &lt;a href=&#34;https://support.signal.org/hc/en-us/articles/6712070553754-Phone-Number-Privacy-and-Usernames&#34;&gt;enable the username feature&lt;/a&gt;. That way, you can (and should) share your &lt;em&gt;username&lt;/em&gt; only, instead of sharing your phone number to connect with others.&lt;/p&gt; &lt;p&gt;Additionally, you should &lt;a href=&#34;https://support.signal.org/hc/en-us/articles/360007320771-Set-and-manage-disappearing-messages&#34;&gt;enable the disappearing messages&lt;/a&gt; feature from Signal, to help clean up the data you no longer need as time goes, and reduce the risk of leaks.&lt;/p&gt; &lt;div class=&#34;admonition danger&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Only send sensitive information to people you genuinely trust!&lt;/p&gt; &lt;p&gt;Keep in mind that even when using end-to-end encrypted apps and a disappearing message features, this will not prevent a malicious person from downloading this data on their device or taking a screenshot of it.&lt;/p&gt; &lt;p&gt;Be especially careful when sending very sensitive information, such as intimate photos for example. No matter how secure the application is, you should only send sensitive information and pictures to people you know and sincerely trust.&lt;/p&gt; &lt;/div&gt; &lt;h4 id=&#34;email-communication&#34;&gt;Email communication&lt;/h4&gt; &lt;p&gt;For email communication, migrating to an end-to-end encrypted alternative can make a big difference for your privacy.&lt;/p&gt; &lt;p&gt;For example, services like Gmail (Google) and Hotmail (Microsoft) could access the content of all your communications, and often use this information in various ways to build advertising profiles. Because email content isn&#39;t end-to-end encrypted, this data could get requested by authorities as well, and handed to them in plain text (unencrypted).&lt;/p&gt; &lt;p&gt;For secure and more private end-to-end encrypted email services, we recommend &lt;a href=&#34;https://www.privacyguides.org/en/email/#proton-mail&#34;&gt;Proton Mail&lt;/a&gt; or &lt;a href=&#34;https://www.privacyguides.org/en/email/#tuta&#34;&gt;Tuta&lt;/a&gt;. These services will not make you anonymous when you email someone (email address, &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address, and subject line, could still identify you), but the content of your communication will be encrypted end-to-end (if used with a compatible service), and only visible to its intended recipient(s).&lt;/p&gt; &lt;div class=&#34;admonition warning&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Encrypted email service limitations&lt;/p&gt; &lt;p&gt;Stay aware that if you email someone who is not using the same end-to-end encrypted email service as you, and you aren&#39;t using any additional measures to encrypt the message, this email will likely be accessible to the service you sent it to.&lt;/p&gt; &lt;p&gt;For example, if you send an email from a Proton Mail address, to someone using a Gmail address, without asking the recipient to use your encryption key or use any additional services, then the email you sent will be stored on Google&#39;s servers, and could get accessed by Google.&lt;/p&gt; &lt;p&gt;If you send a Proton Mail email to another Proton Mail user, the &lt;em&gt;content&lt;/em&gt; of the message will be fully end-to-end encrypted and Proton could not access it.&lt;/p&gt; &lt;p&gt;The same is true for any other email providers. Make sure to verify compatibility fully before sending any sensitive information that way.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;securing-data-when-traveling&#34;&gt;Securing data when traveling&lt;/h3&gt; &lt;p&gt;When traveling, keep in mind that different countries or regions might have different laws related to LGBTQ+ people.&lt;/p&gt; &lt;p&gt;Your marriage might not be recognized in the location you are visiting. Your new legal name might also not get the same recognition, sadly. The first step to take when planning a trip should always be to gather information on the legal and cultural differences between your own region and the one you are visiting.&lt;/p&gt; &lt;p&gt;If you are visiting a country hostile to your sexuality or gender identity, make sure to take the proper precautions to secure your data &lt;em&gt;before&lt;/em&gt; you cross the border.&lt;/p&gt; &lt;p&gt;This could mean leaving your phone at home and only bringing a burner phone with you. It could also mean bringing additional (or different) types of official ID that are less likely to get you in trouble, and more likely to get accepted by the authorities of your visiting country.&lt;/p&gt; &lt;p&gt;Be extremely careful when connecting to Wi-Fi services from a foreign country. If you were to connect to a service or website that is illegal there, and could accidentally out yourself as queer, you could get in trouble with few recourses. Using a &lt;a href=&#34;https://www.privacyguides.org/en/vpn/&#34;&gt;trustworthy &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/a&gt; can help mitigate some of this risk.&lt;/p&gt; &lt;h3 id=&#34;securing-data-when-protesting&#34;&gt;Securing data when protesting&lt;/h3&gt; &lt;p&gt;For this month of Pride, you might feel the need to join a protest more than a parade.&lt;/p&gt; &lt;p&gt;If you decide to join the action, make sure to secure your data properly to stay safe. Prepare your devices adequately to be ready and resist surveillance targeted at protesters. Consult our &lt;a href=&#34;../../../01/23/activists-guide-securing-your-smartphone/&#34;&gt;Protesters&#39; Guide to Smartphone Security&lt;/a&gt;, and make sure you understand well the level of risk of this particular protest. &lt;strong&gt;Different protests in different regions require different levels of data protection.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;If you are organizing actions, try to stay away from corporate platforms who will willingly and quickly share your data with authorities (even private messages). If you must use corporate platforms, then make sure to limit the personal data you share there, and ensure attendees have alternative ways to contact you that do not require them to create an account, to register, or to use their legal name.&lt;/p&gt; &lt;p&gt;Having an independent website, or using a Fediverse-connected platform that will be accessible to everyone even without an account, are better ways to organize.&lt;/p&gt; &lt;p&gt;For example, if you create a Mastodon account for your organization, people will not need to create a Mastodon account to read your posts and event announcements. All your posts will be accessible just like any independent website would be (if you leave your posts&#39; visibility public).&lt;/p&gt; &lt;p&gt;Setting up an end-to-end encrypted email address and using an &lt;a href=&#34;https://www.privacyguides.org/en/email-aliasing/&#34;&gt;alias email address&lt;/a&gt; are also good ways to stay accessible without requiring attendees to use a Facebook account.&lt;/p&gt; &lt;p&gt;Additionally, there are federated platforms, such as &lt;a href=&#34;https://mobilizon.org/&#34;&gt;Mobilizon&lt;/a&gt;, that can be a great non-commercial way to organize in a safer and more accessible space.&lt;/p&gt; &lt;p&gt;Data shared on federated platforms isn&#39;t necessarily end-to-end encrypted, and could also get shared with authorities if requested. But by using non-commercial platforms, this data will not be compiled and attached to an account the same way this would happen on a for-profit corporate platform such as Facebook. Using alternative not-for-profit platforms isn&#39;t perfect nor anonymous, but it&#39;s still a great improvement from the corporate default.&lt;/p&gt; &lt;h3 id=&#34;protections-for-extreme-situations&#34;&gt;Protections for extreme situations&lt;/h3&gt; &lt;p&gt;Finally, if you are living in an extreme situation where being yourself is dangerous to your physical safety, caution must be a priority.&lt;/p&gt; &lt;p&gt;There isn&#39;t a single solution that can protect all your data at once, and anyone telling you there is one is lying to sell you something. Remain skeptical of such claims.&lt;/p&gt; &lt;p&gt;However, there are a &lt;em&gt;multitude&lt;/em&gt; of practices and tools that can help &lt;em&gt;reduce&lt;/em&gt; your data trails, and improve your privacy greatly. The tools and practices you need to adopt will depend on the &lt;a href=&#34;https://www.privacyguides.org/en/basics/threat-modeling/&#34;&gt;threat model&lt;/a&gt; specific to your situation.&lt;/p&gt; &lt;p&gt;Take the time to evaluate well which data could put you in danger, and focus on protecting this first.&lt;/p&gt; &lt;p&gt;If you are in a situation where someone hostile to you has access to your device, for example because you are living with an unsupportive family and need to browse the internet on a family device, Tails may be a tool that can help you. If you can use this computer unobserved, by &lt;a href=&#34;../../../01/29/installing-and-using-tails/&#34;&gt;using the live system Tails&lt;/a&gt; installed on a USB stick, you can keep your browsing activity hidden from this device. Your Internet Service Provider (&lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;) could still know you have been visiting a special network, however. Make sure to read our tutorial thoroughly if you decide to use Tails.&lt;/p&gt; &lt;p&gt;If the information stored on your computer isn&#39;t a risk to you, but visiting LGBTQ+ websites from your country could be dangerous, perhaps &lt;a href=&#34;../../../04/30/in-praise-of-tor/&#34;&gt;using Tor&lt;/a&gt; with a Bridge or through a &lt;a href=&#34;https://www.privacyguides.org/en/vpn/&#34;&gt;trustworthy &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/a&gt; could be another solution to allow you to access this information in a safer way.&lt;/p&gt; &lt;p&gt;It&#39;s impossible to cover every specific situation, but know that there are &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;many solutions&lt;/a&gt; to reduce the risks greatly, and improve data protection to allow you to &lt;strong&gt;stay connected, stay yourself, and stay safe&lt;/strong&gt; 💛&lt;/p&gt; &lt;div class=&#34;admonition tip&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Caution: This isn&#39;t an exhaustive list!&lt;/p&gt; &lt;p&gt;This is only a short introduction to some practices and tools that &lt;em&gt;can&lt;/em&gt; improve your privacy online. Not one solution will be enough to be anonymous online.&lt;/p&gt; &lt;p&gt;It&#39;s important to stay aware of what data will still be shared and which will be better protected, but nothing will make you 100% anonymous.&lt;/p&gt; &lt;p&gt;For more information on how to improve further your data protection online, you can consult our various guides. If you are just starting in your privacy-improving journey, be patient. Adopt one small improvement at the time, then add another one. Each additional step you take will slowly but surely reduce your data trails, and improve your privacy overtime.&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;improving-data-privacy-is-vital-for-everyone-but-critical-for-the-queer-community&#34;&gt;Improving data privacy is vital for everyone, but critical for the queer community&lt;/h2&gt; &lt;p&gt;Every situation is different and requires different protections. While data privacy is important for everyone, it&#39;s also essential to acknowledge that marginalized populations are often at a heightened risk when their data gets exposed.&lt;/p&gt; &lt;p&gt;Protection &lt;em&gt;cannot&lt;/em&gt; be only an individual responsibility. &lt;strong&gt;Protecting vulnerable and marginalized populations is a societal responsibility that concerns everyone.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;We &lt;em&gt;all&lt;/em&gt; have a &lt;strong&gt;duty of care&lt;/strong&gt; to protect the data of others. Whether it&#39;s from the photos we take at public events, or the discussions we have about others on Facebook or X-Twitter&#39;s direct messages, &lt;em&gt;everyone&lt;/em&gt; must improve their practices on this.&lt;/p&gt; &lt;p&gt;Moreover, anyone in a position to improve how data is collected from users &lt;em&gt;must&lt;/em&gt; be held accountable, and must feel morally liable on the decisions taken that could endanger anyone, but especially marginalized groups like the queer community.&lt;/p&gt; &lt;p&gt;In an ideal world, laws and cultures would protect everyone and particularly the most vulnerable &lt;em&gt;by default&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;But until we get there, we have to empowered ourselves to bring change and stop predatory data collection, prevent negligent data security, and educate everyone on the tools we can use to help ourselves and the most vulnerable to stay safe.&lt;/p&gt; &lt;h2 id=&#34;additional-resources&#34;&gt;Additional resources&lt;/h2&gt; &lt;h3 id=&#34;helplines&#34;&gt;Helplines&lt;/h3&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.mindinsomerset.org.uk/our-services/adult-one-to-one-support/mindline-trans/&#34;&gt;Mindline Trans+ (UK)&lt;/a&gt;: A confidential emotional, mental health support helpline for people who identify as Trans, Agender, Gender Fluid or Non-Binary.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://translifeline.org/hotline/&#34;&gt;Trans Lifeline Hotline (US and Canada)&lt;/a&gt;: Trans peer support over the phone.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://988lifeline.org/&#34;&gt;Suicide &amp;amp; Crisis Helpline (US and Canada)&lt;/a&gt;: General support 24/7 phone number 988.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/List_of_suicide_crisis_lines&#34;&gt;Suicide &amp;amp; Crisis Helpline (International)&lt;/a&gt;: List of suicide crisis lines around the world.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;h3 id=&#34;supportive-organizations&#34;&gt;Supportive organizations&lt;/h3&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://egale.ca/asylum/&#34;&gt;Egale (Canada, International)&lt;/a&gt;: Resources for LGBTQ+ asylum and immigration requests from outside and inside Canada.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.sos-homophobie.org/international-content&#34;&gt;SOS Homophobie (France)&lt;/a&gt;: Non-profit, volunteer-run organization committed to combatting hate-motivated violence and discrimination against LGBTI people.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.thetrevorproject.org/&#34;&gt;The Trevor Project (US)&lt;/a&gt;: Suicide prevention and crisis intervention non-profit organization for LGBTQ+ young people.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://transrescue.org/&#34;&gt;Trans Rescue (International)&lt;/a&gt;: Organization assisting trans and queer individuals in relocating from dangerous areas to safer places.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://twenty10.org.au/&#34;&gt;Twenty10 (Australia)&lt;/a&gt;: Sydney-based organization providing a broad range of free support programs to the LGBTIQA+ community.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;h3 id=&#34;international-advocacy&#34;&gt;International advocacy&lt;/h3&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.amnesty.org/en/what-we-do/discrimination/lgbti-rights/&#34;&gt;Amnesty International&lt;/a&gt;: Human rights organization running campaigns to protect and uphold the rights of LGBTI people globally.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.hrw.org/topic/lgbt-rights&#34;&gt;Human Rights Watch&lt;/a&gt;: Human rights non-profit who documents and exposes abuses based on sexual orientation and gender identity worldwide, and advocate for better protective laws and policies.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;div class=&#34;admonition tip&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Stay aware of your data trail&lt;/p&gt; &lt;p&gt;If the traces of this article in your browsing history could put you at risk, visit &lt;a href=&#34;../../../02/13/clearing-browsing-data/&#34;&gt;our guide&lt;/a&gt; to properly delete this data from your device.&lt;/p&gt; &lt;/div&gt;</description> <link>https://www.privacyguides.org/articles/2025/06/03/importance-of-privacy-for-the-queer-community/</link> <pubDate>Thu, 25 Sep 2025 04:09:21 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/06/03/importance-of-privacy-for-the-queer-community/</guid> </item> <item> <title>KeePassium Review: A Flexible Password Manager for iOS and macOS</title> <author>Em</author> <category>Reviews</category> <description>&lt;p&gt;&lt;img alt=&#34;The KeePassium logo over a yellow background showing Apple devices.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Photo: PicJumbo / Pexels&lt;/small&gt;&lt;/p&gt; &lt;p&gt;If you have been looking for a password manager giving you full control over your data, KeePassium is a fantastic option. The application available for iOS and macOS keeps your password database offline by default. KeePassium still offers synchronization and backup options, but allows you to choose which storage provider to trust with your database, and change it whenever you want.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;KeePassium logo&#34; itemprop=&#34;image&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://keepassium.com/&#34;&gt;KeePassium&lt;/a&gt; is a commercial open-source application made by KeePassium Labs, based in Luxembourg.&lt;/p&gt; &lt;p&gt;Because it&#39;s open-source, anyone can inspect and download its &lt;a href=&#34;https://github.com/keepassium/KeePassium&#34;&gt;code&lt;/a&gt; if they wish. Anyone could even &lt;a href=&#34;https://github.com/keepassium/KeePassium?tab=readme-ov-file#is-it-free&#34;&gt;build&lt;/a&gt; the entire application by themselves, and use the advanced features completely for free.&lt;/p&gt; &lt;p&gt;However, if you do not want to bother with code, you can use either the basic plan for free, or pay for a premium plan to access advanced features and to support the project.&lt;/p&gt; &lt;p&gt;KeePassium is a &lt;a href=&#34;https://keepass.info/&#34;&gt;KeePass&lt;/a&gt;-compatible project. If you are already familiar with any software from the &lt;a href=&#34;https://github.com/lgg/awesome-keepass&#34;&gt;KeePass ecosystem&lt;/a&gt;, you will feel right at home with KeePassium.&lt;/p&gt; &lt;p&gt;KeePassium&#39;s strength resides in how it integrates KeePass&#39; security and features into a well-rounded and well-designed application, that is very instinctive to use, while not compromising on flexibility and customizability.&lt;/p&gt; &lt;div class=&#34;admonition abstract&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;The KeePassium application&lt;/p&gt; &lt;p&gt;For this review, the words &#34;KeePassium&#34; and &#34;application&#34; refer to both the KeePassium iOS and macOS applications simultaneously, unless otherwise specified. The mobile application was tested first and will be more prominent in the examples and screenshots.&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;platforms-and-compatibility&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M18.71 19.5c-.83 1.24-1.71 2.45-3.05 2.47-1.34.03-1.77-.79-3.29-.79-1.53 0-2 .77-3.27.82-1.31.05-2.3-1.32-3.14-2.53C4.25 17 2.94 12.45 4.7 9.39c.87-1.52 2.43-2.48 4.12-2.51 1.28-.02 2.5.87 3.29.87.78 0 2.26-1.07 3.81-.91.65.03 2.47.26 3.64 1.98-.09.06-2.17 1.28-2.15 3.81.03 3.02 2.65 4.03 2.68 4.04-.03.07-.42 1.44-1.38 2.83M13 3.5c.73-.83 1.94-1.46 2.94-1.5.13 1.17-.34 2.35-1.04 3.19-.69.85-1.83 1.51-2.95 1.42-.15-1.15.41-2.35 1.05-3.11&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Platforms and Compatibility&lt;/h2&gt; &lt;p&gt;KeePassium is written in Apple&#39;s Swift programming language and is available for Apple devices.&lt;/p&gt; &lt;h3 id=&#34;mobile&#34;&gt;Mobile&lt;/h3&gt; &lt;ul&gt; &lt;li&gt;For iPhone and iPad, KeePassium works on iOS 17.0 or later.&lt;/li&gt; &lt;/ul&gt; &lt;h3 id=&#34;desktop&#34;&gt;Desktop&lt;/h3&gt; &lt;ul&gt; &lt;li&gt;For Mac computers, KeePassium works on macOS 14.0 (Sonoma) or later.&lt;/li&gt; &lt;li&gt;KeePassium is compatible with both Apple Silicon and Intel hardware.&lt;/li&gt; &lt;li&gt;The desktop application is new and was &lt;a href=&#34;https://keepassium.com/blog/2024/12/keepassium-2.0/&#34;&gt;released&lt;/a&gt; on December 17th, 2024.&lt;/li&gt; &lt;/ul&gt; &lt;h3 id=&#34;apple-vision&#34;&gt;Apple Vision&lt;/h3&gt; &lt;ul&gt; &lt;li&gt;For Apple Vision, KeePassium works on visionOS 1.0 or later.&lt;/li&gt; &lt;/ul&gt; &lt;h3 id=&#34;languages&#34;&gt;Languages&lt;/h3&gt; &lt;p&gt;The KeePassium application is available in the following languages: English, Arabic, Czech, Dutch, French, German, Italian, Japanese, Korean, Polish, Portuguese, Russian, Simplified Chinese, Slovak, Spanish, Swedish, Thai, Traditional Chinese, Turkish, and Ukrainian.&lt;/p&gt; &lt;h3 id=&#34;cross-compatibility&#34;&gt;Cross-compatibility&lt;/h3&gt; &lt;p&gt;One great strength of any applications derivative of KeePass is compatibility with other KeePass applications. This is due to implementing of the same &lt;code&gt;.kdbx&lt;/code&gt; file format for password databases, and often sharing similar features as well.&lt;/p&gt; &lt;p&gt;If you use KeePassium to store your passwords, you will be able to easily transfer your password database to other KeePass-compatible applications, and vice versa. This offers powerful portability for your password database.&lt;/p&gt; &lt;div class=&#34;admonition info&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;File formats and encryption&lt;/p&gt; &lt;p&gt;KeePassium supports the KDB, KDBX3, and KDBX4 file formats, and implements AES, ChaCha20, Twofish, and Argon2 for encryption algorithms.&lt;/p&gt; &lt;p&gt;Even if compatibility with older database formats is available, it is recommended to use the more recent and &lt;a href=&#34;https://keepass.info/help/kb/kdbx_4.html&#34;&gt;more secure&lt;/a&gt; KDBX4 format. This latest format will be the default when you create a new database in KeePassium.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;This cross-compatibility is so versatile that you could, for example, use KeePassium on mobile but sync it with &lt;a href=&#34;../../../03/18/installing-keepassxc-and-yubikey/&#34;&gt;KeePassXC&lt;/a&gt; on desktop.&lt;/p&gt; &lt;p&gt;Similarly, if you have a Mac computer but an Android phone, you could use KeePassium on desktop but KeePassDX on mobile, and so on and so forth. You can consult KeePassium&#39;s documentation for a list of all &lt;a href=&#34;https://support.keepassium.com/kb/compatible-apps/&#34;&gt;compatible apps&lt;/a&gt;.&lt;/p&gt; &lt;div class=&#34;admonition warning&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Testing compatibility&lt;/p&gt; &lt;p&gt;If you plan on using KeePassium with cloud storage and synchronization between devices, make sure to test your settings well before adding all your passwords to it.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;Depending on your usage and settings, glitches in synchronization &lt;em&gt;could&lt;/em&gt; corrupt your database file. This has more chances to happen if you use a cloud storage that isn&#39;t fully supported, or a KeePass-compatible application that isn&#39;t listed in KeePassium&#39;s documentation.&lt;/p&gt; &lt;p&gt;Ideally, if you use synchronization, create a dummy database at first to test that synchronization works properly with your specific cloud configuration and between all the devices you use.&lt;/p&gt; &lt;p&gt;It&#39;s also advisable to enable the backup feature and even keep a backup copy of your database file in a different directory. That way, if your main synced file were to get corrupted or lost somehow, you could always rely on this secondary backup.&lt;/p&gt; &lt;p&gt;This is important because there is no remote database management done by KeePassium. &lt;strong&gt;You are fully in control of your own data, but you are also fully responsible to protect it.&lt;/strong&gt;&lt;/p&gt; &lt;h2 id=&#34;pricing&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M15.5 15.5c.83 0 1.5-.67 1.5-1.5s-.67-1.5-1.5-1.5-1.5.67-1.5 1.5.67 1.5 1.5 1.5M7 3h10a2 2 0 0 1 2 2v2a2 2 0 0 1 2 2v10c0 1.11-.89 2-2 2H7c-2.21 0-4-1.79-4-4V7c0-2.21 1.79-4 4-4m10 4V5H7c-1.1 0-2 .9-2 2v.54A4 4 0 0 1 7 7zM5 17a2 2 0 0 0 2 2h12V9H7c-1.1 0-2 .9-2 2z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Pricing&lt;/h2&gt; &lt;p&gt;KeePassium can be used completely for free!&lt;/p&gt; &lt;p&gt;That being said, if you need advanced features, you might want to &lt;a href=&#34;https://keepassium.com/pricing/&#34;&gt;pay&lt;/a&gt; for a &lt;a href=&#34;https://keepassium.com/articles/why-upgrade-to-premium/&#34;&gt;Premium&lt;/a&gt; plan (monthly or yearly), or a Pro or Business plan. Fortunately, the monthly Premium plan is very affordable, allowing users to test the Premium features one month at the time before committing to a longer subscription.&lt;/p&gt; &lt;p&gt;Alternatively, if you do not need any advanced features but would like to support the project, you could use the free plan and &lt;a href=&#34;https://keepassium.com/donate/&#34;&gt;donate&lt;/a&gt; a fix amount to KeePassium.&lt;/p&gt; &lt;h4 id=&#34;rent-to-own&#34;&gt;Rent-to-own&lt;/h4&gt; &lt;p&gt;Something interesting about KeePassium Premium&#39;s plan is that it offers a &#34;&lt;a href=&#34;https://support.keepassium.com/kb/license-rent-own/&#34;&gt;rent-to-own&lt;/a&gt;&#34; license. This means that if you pay for a KeePassium subscription for 12 months or more, you will always &#34;own&#34; the features you&#39;ve paid for, even if you stop paying.&lt;/p&gt; &lt;p&gt;For example, if you pay for Premium for only one year then stop, you will keep access to all the Premium features that were available while you paid for Premium, but will not have access to new features added after your stopped paying. This is an excellent model that more applications should adopt.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the KeePassium website&#39;s Pricing page with a description of which features are included in each plan.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-pricing.webp&#34; /&gt;&lt;/p&gt; &lt;h2 id=&#34;security-and-trust&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;m8.533.133 5.25 1.68A1.75 1.75 0 0 1 15 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.7 1.7 0 0 1-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 0 1 1.217-1.667l5.25-1.68a1.75 1.75 0 0 1 1.066 0m-.61 1.429zl-5.25 1.68a.25.25 0 0 0-.174.237V7c0 1.36.275 2.666 1.057 3.859.784 1.194 2.121 2.342 4.366 3.298a.2.2 0 0 0 .154 0c2.245-.957 3.582-2.103 4.366-3.297C13.225 9.666 13.5 8.358 13.5 7V3.48a.25.25 0 0 0-.174-.238l-5.25-1.68a.25.25 0 0 0-.153 0M11.28 6.28l-3.5 3.5a.75.75 0 0 1-1.06 0l-1.5-1.5a.749.749 0 0 1 .326-1.275.75.75 0 0 1 .734.215l.97.97 2.97-2.97a.75.75 0 0 1 1.042.018.75.75 0 0 1 .018 1.042&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Security and Trust&lt;/h2&gt; &lt;p&gt;Security and trust are without a doubt the most important characteristics of a good password manager.&lt;/p&gt; &lt;p&gt;While functionality and features are also important, there is no point in having a pretty application that doesn&#39;t safeguard your passwords properly. It would defeat the whole purpose of the password manager.&lt;/p&gt; &lt;p&gt;KeePassium does not neglect security for convenience, and has done its homework to earn its users&#39; trust. The database format it uses, its transparency with open source, and its independent security audit, are all factors contributing to build trust in KeePassium.&lt;/p&gt; &lt;h3 id=&#34;trusted-database-format&#34;&gt;Trusted database format&lt;/h3&gt; &lt;p&gt;The application is using an encrypted database file format developed by &lt;a href=&#34;https://en.wikipedia.org/wiki/KeePass&#34;&gt;KeePass&lt;/a&gt;, an open-source project with a good reputation in the security and privacy community. KeePass&#39; code and formats are trusted by many other KeePass-compatible projects, including KeePassXC, KeeWeb, OneKeePass, ModernKeePass, MacPass, Keepass2Android, and &lt;a href=&#34;https://github.com/lgg/awesome-keepass&#34;&gt;more&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Even if the KeePassium application is relatively recent with its first &lt;a href=&#34;https://keepassium.com/blog/2019/07/introducing-keepassium-for-ios/&#34;&gt;launch&lt;/a&gt; in 2019, the formats it uses to secure password databases had many eyes on since the initial KeePass release in 2003. The fact that so many people have inspected, used, tested, and improved the security foundation of this file format through the years contributes to KeePassium&#39;s security as well.&lt;/p&gt; &lt;h3 id=&#34;open-source-code&#34;&gt;Open-source code&lt;/h3&gt; &lt;p&gt;KeePassium was &lt;a href=&#34;https://keepassium.com/articles/who-created-keepassium/&#34;&gt;created&lt;/a&gt; by &lt;a href=&#34;https://popleteev.com/&#34;&gt;Dr. Andrei Popleteev&lt;/a&gt;, who founded KeePassium Labs, and continues as its director to develop and maintain the app with a small team of &lt;a href=&#34;https://github.com/keepassium/KeePassium/graphs/contributors&#34;&gt;contributors&lt;/a&gt;. Like KeePass, KeePassium&#39;s code is open-source under a &lt;a href=&#34;https://github.com/keepassium/KeePassium/blob/master/LICENSE.txt&#34;&gt;GNU General Public License&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Open-source code isn&#39;t magical, but it helps to build trust by providing full transparency. Because all of KeePassium&#39;s code is publicly accessible, anyone could inspect it. This can help to detect and reporting potential vulnerabilities early on, and quickly verifying any claims made. Of course, at least &lt;em&gt;some&lt;/em&gt; independent qualified people have to inspect the code in order to make this meaningful at all. But this is true for any open-source projects.&lt;/p&gt; &lt;h4 id=&#34;a-note-on-keepassiums-open-source-commercial-model&#34;&gt;A note on KeePassium&#39;s open-source commercial model&lt;/h4&gt; &lt;p&gt;More precisely, KeePassium is a &lt;em&gt;commercial&lt;/em&gt; open-source application. This means its code is fully open and available to inspect, download, and use (within its license&#39;s limits). However, users can also purchase paid plans to access advanced features, without having to build and manage the code themselves.&lt;/p&gt; &lt;p&gt;Paid plans provide a source of revenue to KeePassium, which helps to maintain the application adequately to keep it compatible and secure, providing support to customers, and adding new features down the line.&lt;/p&gt; &lt;p&gt;This commercial model can actually add stability to a project, making it more likely to survive long term. This is reassuring considering all the other KeePass-compatible projects that have stopped getting maintained and are unfortunately no longer usable.&lt;/p&gt; &lt;p&gt;Furthermore, there is some &lt;a href=&#34;https://www.engadget.com/2011-01-09-the-gpl-the-app-store-and-you.html&#34;&gt;conflict&lt;/a&gt; between certain open-source licenses and publication on Apple&#39;s App Store. Because it isn&#39;t possible to download an iOS app outside of Apple&#39;s App Store (unless you adventure in the perilous waters of &lt;a href=&#34;https://en.wikipedia.org/wiki/IOS_jailbreaking&#34;&gt;jailbreaking&lt;/a&gt;), KeePassium and all other iOS apps are confined to operate within the App Store&#39;s requirements.&lt;/p&gt; &lt;p&gt;Also for this reason, the KeePassium projects cannot accept external contributions to its code, but can still &lt;a href=&#34;https://github.com/keepassium/KeePassium?tab=readme-ov-file#how-to-contribute&#34;&gt;accept contributions&lt;/a&gt; for bug reports, feature suggestions, and translations.&lt;/p&gt; &lt;h3 id=&#34;independent-security-audit-ios&#34;&gt;Independent security audit (iOS)&lt;/h3&gt; &lt;p&gt;Perhaps one of the most compelling argument for trusting KeePassium is the &lt;a href=&#34;https://support.keepassium.com/kb/security-audits/&#34;&gt;independent security audit&lt;/a&gt; the iOS application went through last year.&lt;/p&gt; &lt;p&gt;The Berlin-based cybersecurity firm &lt;a href=&#34;https://en.wikipedia.org/wiki/Cure53&#34;&gt;Cure53&lt;/a&gt; conducted a full evaluation and professional pentest of the mobile application in November 2024.&lt;/p&gt; &lt;p&gt;The review included an audit of the source code, application, network communications, and the implemented cryptography. The few vulnerabilities found were all fixed following reception of the report.&lt;/p&gt; &lt;p&gt;It&#39;s important to note that only KeePassium for iOS was audited, and not KeePassium for macOS, which was released after the audit. However, many aspects of KeePassium for iOS that were included in the audit are likely to be similar for KeePassium for macOS.&lt;/p&gt; &lt;p&gt;Interestingly, Cure53 has &lt;a href=&#34;https://cure53.de/&#34;&gt;audited&lt;/a&gt; many other well-known security and privacy-focused or open-source applications such as Proton Pass, 1Password, Bitwarden, Obsidian, Mullvad &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, Onion Browser, Threema, Briar, SecureDrop, Mastodon, and much &lt;a href=&#34;https://github.com/cure53/Publications&#34;&gt;more&lt;/a&gt;.&lt;/p&gt; &lt;h3 id=&#34;recommended-by-other-applications&#34;&gt;Recommended by other applications&lt;/h3&gt; &lt;p&gt;Finally, if you already trust KeePassXC for your desktop password manager, know that KeePassium is one of the apps &lt;a href=&#34;https://keepassxc.org/docs/&#34;&gt;suggested&lt;/a&gt; by KeePassXC to use on iOS.&lt;/p&gt; &lt;h2 id=&#34;privacy-and-encryption&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M4 4a4 4 0 0 1 8 0v2h.25c.966 0 1.75.784 1.75 1.75v5.5A1.75 1.75 0 0 1 12.25 15h-8.5A1.75 1.75 0 0 1 2 13.25v-5.5C2 6.784 2.784 6 3.75 6H4Zm8.25 3.5h-8.5a.25.25 0 0 0-.25.25v5.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-5.5a.25.25 0 0 0-.25-.25M10.5 6V4a2.5 2.5 0 1 0-5 0v2Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Privacy and Encryption&lt;/h2&gt; &lt;p&gt;Data privacy and encryption are fundamental aspects of any password managers. Because pretty much all data stored in a password manager is highly sensitive data, all data should be protected by strong end-to-end encryption.&lt;/p&gt; &lt;h3 id=&#34;data-collection&#34;&gt;Data collection&lt;/h3&gt; &lt;p&gt;On this point, KeePassium delivers. First, a quick look at Apple&#39;s privacy label indicates that &#34;the developer does not collect any data from this app&#34;. This is a good start, and this description is true for both the iOS and macOS applications.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from Apple&#39;s App Store for KeePassium&#39;s App Privacy label. The label states that the &amp;quot;developer does not collect any data from this app&amp;quot;.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-applelabel.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;Second, in its current version, KeePassium&#39;s &lt;a href=&#34;https://keepassium.com/privacy/app/&#34;&gt;Privacy Policy&lt;/a&gt; is excellent. This is never a guarantee of course, but the app&#39;s &lt;a href=&#34;#independent-security-audit-ios&#34;&gt;security audit&lt;/a&gt; shows the Privacy Policy statements are likely founded.&lt;/p&gt; &lt;p&gt;KeePassium separates its privacy policies for the application and the website. This is an excellent practice way too rarely adopted by companies. This approach provides much more clarity for what data is collected from where, and is a positive sign that an organization understands well data privacy legal requirements.&lt;/p&gt; &lt;p&gt;The Privacy Policy for the app is detailed and thorough, which are essential qualities to any respectable privacy policies.&lt;/p&gt; &lt;p&gt;It starts by stating clearly that KeePassium does not send any personal data to KeePassium Labs, the company developing the app. Then, it lists all instances where data &lt;em&gt;could&lt;/em&gt; be collected through the purchase or use of KeePassium, and gives clear instructions on how to opt out for each. This is the kind of privacy policy that shows an organization genuinely values and understands data privacy. I highly encourage you to have a look at it from the link above.&lt;/p&gt; &lt;p&gt;Worth noting as well, KeePassium&#39;s Privacy Policy for its &lt;em&gt;website&lt;/em&gt; states it &lt;a href=&#34;https://keepassium.com/privacy/website/#our-use-of-cookies-and-tracking&#34;&gt;does not use any cookies&lt;/a&gt;. This is certainly refreshing to read.&lt;/p&gt; &lt;h3 id=&#34;encryption&#34;&gt;Encryption&lt;/h3&gt; &lt;p&gt;Although the application is compatible with older formats, KeePassium by default will use the newer KDBX4 file format to encrypt password databases.&lt;/p&gt; &lt;p&gt;This is important because the KDBX4 format offers &lt;a href=&#34;https://keepass.info/help/kb/kdbx_4.html&#34;&gt;significant security improvements&lt;/a&gt; over the previous KDBX3 format. If you import an older database in KeePassium, it is recommended to upgrade it to KDBX4 and use a different main password for the upgraded database if you keep a backup of the previous one.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Upgrade from KDB to KDBX&lt;/p&gt; &lt;p&gt;If you need to upgrade an older database file to the newest file format to benefit from better security and KeePassium&#39;s full functionality, you can follow KeePassium&#39;s &lt;a href=&#34;https://support.keepassium.com/kb/convert-kdb-kdbx/&#34;&gt;instructions&lt;/a&gt;.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;To secure the database, and all the content included in it, KeePassium uses AES256, ChaCha20, Twofish, HMAC, and Argon2 (for KDBX4 only). Because the &lt;a href=&#34;https://keepass.info/help/kb/kdbx.html&#34;&gt;KeePass database file format&lt;/a&gt; (and so KeePassium&#39;s as well) encrypts the whole database, this means that not only passwords are encrypted but also usernames, website URLs, notes, attachments, etc.&lt;/p&gt; &lt;div class=&#34;admonition info&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Encrypting all data, not just passwords&lt;/p&gt; &lt;p&gt;Encrypting all user data contained in a password manager entry is &lt;em&gt;extremely&lt;/em&gt; important, because encrypting passwords only just isn&#39;t enough.&lt;/p&gt; &lt;p&gt;In August 2022, the password manager &lt;a href=&#34;https://blog.lastpass.com/posts/notice-of-recent-security-incident&#34;&gt;LastPass suffered a security breach&lt;/a&gt; where users&#39; password vaults (databases) were stolen from LastPass&#39; servers.&lt;/p&gt; &lt;p&gt;This is bad enough even with end-to-end encrypted data (because vaults with a weak main password could get cracked), but even worse than this, some important data like website URLs were &lt;em&gt;not encrypted at all&lt;/em&gt;, so this information was &lt;a href=&#34;https://www.pwndefend.com/2022/12/24/lastpass-breach-the-danger-of-metadata/&#34;&gt;stolen in plain text&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;This is the perfect example of why &lt;strong&gt;encrypting all data &lt;em&gt;and&lt;/em&gt; metadata&lt;/strong&gt; input by the user is &lt;em&gt;crucial&lt;/em&gt; for data privacy and security.&lt;/p&gt; &lt;p&gt;Additionally, the LastPass&#39; breach is a great argument in favor of keeping one&#39;s password database &lt;em&gt;offline,&lt;/em&gt; whenever possible. Something that KeePassium makes possible even by default.&lt;/p&gt; &lt;/div&gt; &lt;h4 id=&#34;encryption-algorithms-used-by-keepassium&#34;&gt;Encryption algorithms used by KeePassium&lt;/h4&gt; &lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Advanced_Encryption_Standard&#34;&gt;AES256&lt;/a&gt;: The Advanced Encryption Standard (AES) is a trusted and commonly used block cipher symmetric-key algorithm. It was established in 2001 by NIST, the American National Institute of Standards and Technology. The number following the acronym describes the key size in bits (128, 192, or 256 bits).&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Twofish&#34;&gt;Twofish&lt;/a&gt;: Twofish is another block cipher symmetric-key algorithm, which KeePassium can use to secure databases, in 256-bit key size as well. Famous cryptographer Bruce Schneier was part of the team who designed Twofish.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant&#34;&gt;ChaCha20&lt;/a&gt; (KDBX4 only): The ChaCha20 algorithm is a variant of Salsa20, both stream ciphers that encrypt and decrypt data in continuous stream instead of blocks. The number refers to the number of rounds in its structure.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/HMAC&#34;&gt;HMAC&lt;/a&gt; (Key Derivative Function): Hash-based Message Authentication Code (HMAC) is a robust hash function. In KeePass-compatible apps, it is used to &lt;a href=&#34;https://keepass.info/help/kb/kdbx.html#hbs&#34;&gt;verify&lt;/a&gt; the integrity and authenticity of the database before decryption.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://en.wikipedia.org/wiki/Argon2&#34;&gt;Argon2&lt;/a&gt; (Key Derivative Function, for KDBX4 only): Argon2 is a memory-hard function that offers better resistance against GPU cracking attacks compared to AES-KDF. Argon2 was the winner of the Password Hashing Competition in 2015.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://keepass.info/help/kb/kdbx_4.html#intro&#34;&gt;AES-KDF&lt;/a&gt; (Key Derivative Function, for KDBX3 only): AES-KDF is a key derivative function based on AES. This method was previously used for the KDBX3 database format, but has since been replaced by Argon2 for KDBX4. This is partly because AES-KDF is not memory-hard, which makes it easier to crack for an attacker using modern technologies.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the Encryption Settings.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-encryptionoptions.webp&#34; width=&#34;400&#34; /&gt;&lt;/p&gt; &lt;h2 id=&#34;usage-and-features&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M1.5 3.25c0-.966.784-1.75 1.75-1.75h2.5c.966 0 1.75.784 1.75 1.75v2.5A1.75 1.75 0 0 1 5.75 7.5h-2.5A1.75 1.75 0 0 1 1.5 5.75Zm7 0c0-.966.784-1.75 1.75-1.75h2.5c.966 0 1.75.784 1.75 1.75v2.5a1.75 1.75 0 0 1-1.75 1.75h-2.5A1.75 1.75 0 0 1 8.5 5.75Zm-7 7c0-.966.784-1.75 1.75-1.75h2.5c.966 0 1.75.784 1.75 1.75v2.5a1.75 1.75 0 0 1-1.75 1.75h-2.5a1.75 1.75 0 0 1-1.75-1.75Zm7 0c0-.966.784-1.75 1.75-1.75h2.5c.966 0 1.75.784 1.75 1.75v2.5a1.75 1.75 0 0 1-1.75 1.75h-2.5a1.75 1.75 0 0 1-1.75-1.75ZM3.25 3a.25.25 0 0 0-.25.25v2.5c0 .138.112.25.25.25h2.5A.25.25 0 0 0 6 5.75v-2.5A.25.25 0 0 0 5.75 3Zm7 0a.25.25 0 0 0-.25.25v2.5c0 .138.112.25.25.25h2.5a.25.25 0 0 0 .25-.25v-2.5a.25.25 0 0 0-.25-.25Zm-7 7a.25.25 0 0 0-.25.25v2.5c0 .138.112.25.25.25h2.5a.25.25 0 0 0 .25-.25v-2.5a.25.25 0 0 0-.25-.25Zm7 0a.25.25 0 0 0-.25.25v2.5c0 .138.112.25.25.25h2.5a.25.25 0 0 0 .25-.25v-2.5a.25.25 0 0 0-.25-.25Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Usage and Features&lt;/h2&gt; &lt;p&gt;Once solid security and privacy protections have been confirmed, the second important part of a good password manager is how easy it is to use and the features it offers.&lt;/p&gt; &lt;p&gt;In this regard, KeePassium excels again. Not only does KeePassium offer the features users familiar with KeePass-compatible applications will recognize, but importantly, it implements these features with a polished user interface and obvious consideration for accessibility and user experience.&lt;/p&gt; &lt;h3 id=&#34;starting-with-keepassium-on-ios&#34;&gt;Starting with KeePassium on iOS&lt;/h3&gt; &lt;p&gt;Installing the app from the App Store is a smooth process. Once installed, make sure to go in Apple&#39;s &#34;Settings&#34; &amp;gt; &#34;KeePassium&#34; &amp;gt; &#34;Siri &amp;amp; Search&#34; and disable the Siri options you are not using. Apple very annoyingly puts them all on by default for each new app installed.&lt;/p&gt; &lt;p&gt;Additionally, you can follow KeePassium&#39;s &lt;a href=&#34;https://keepassium.com/privacy/app/&#34;&gt;instructions&lt;/a&gt; from its Privacy Policy to opt out of other Apple settings related to KeePassium.&lt;/p&gt; &lt;p&gt;After installing the app, KeePassium will guide you step-by-step to set up an application PIN (you can also enable application lock with biometrics), and import or create a new database.&lt;/p&gt; &lt;p&gt;If you are not familiar with it already, it&#39;s a good idea to read each popup from the welcome screen.&lt;/p&gt; &lt;div class=&#34;grid&#34;&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the Welcome page after installation.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-startwelcome.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the page giving options to either create a new database, add an existing database, or connect to a server.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-startdatabase.webp&#34; /&gt;&lt;/p&gt; &lt;/div&gt; &lt;div class=&#34;admonition tip&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Secure the application properly&lt;/p&gt; &lt;p&gt;When prompted to select a Passcode to lock the application (which is different from the main password to secure your database), you will have the option to switch from the numeric keypad to a full alphanumeric keyboard. This is recommended to set up a stronger Passcode to protect the application, where your database(s) might be kept unlocked if you choose this option.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;If you create a new database to store your passwords, make sure to choose a &lt;a href=&#34;https://www.privacyguides.org/en/basics/passwords-overview/#passwords&#34;&gt;strong main password&lt;/a&gt; (or &#34;Master Key&#34;) that is &lt;em&gt;unique&lt;/em&gt;, &lt;em&gt;complex&lt;/em&gt;, and &lt;em&gt;long&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;KeePassium will guide you to determine if your main password is sufficiently strong. However, the app cannot know if you have used this password before, so you should make sure that you haven&#39;t and this main password is unique.&lt;/p&gt; &lt;div class=&#34;admonition danger&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Be careful to remember your main password!&lt;/p&gt; &lt;p&gt;This is the only password that cannot be stored in your password manager, so it&#39;s important to secure it properly and also ensure you can &lt;strong&gt;remember it well&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;Due to the nature of end-to-end encryption, there is no way for KeePassium to recover a lost password. Not remembering your main password could mean &lt;strong&gt;getting locked out of your password database permanently&lt;/strong&gt;.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;After creating a new database, you will be prompted to unlock it with your new main password (&#34;Master Key&#34;).&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the New Database section.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-newdatabase.webp&#34; width=&#34;400&#34; /&gt;&lt;/p&gt; &lt;p&gt;After you have either created or imported a database, you are ready to explore KeePassium&#39;s features.&lt;/p&gt; &lt;h3 id=&#34;starting-with-keepassium-on-macos&#34;&gt;Starting with KeePassium on macOS&lt;/h3&gt; &lt;p&gt;To download KeePassium on macOS, you will need to go through Apple&#39;s App Store. Alternatively, you could also &lt;a href=&#34;https://github.com/keepassium/KeePassium&#34;&gt;build&lt;/a&gt; the application from the source code, but that is an entirely different process.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from Apple&#39;s App Store on macOS showing the KeePassium page.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-appstoremac.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;Installing the application is a breeze, and the macOS app shares the same welcome sections and features the iOS version has, with a slightly different format.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the macOS app showing the Welcome page after installation.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-startwelcomemac.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;The application will guide you to either create or import a database, then you will recognize the same features described below for the iOS version.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the macOS app showing the New Database section.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-newdatabasemac.webp&#34; /&gt;&lt;/p&gt; &lt;h3 id=&#34;accessibility&#34;&gt;Accessibility&lt;/h3&gt; &lt;p&gt;There are a few great accessibility features with KeePassium. First, KeePassium fully works with Apple&#39;s VoiceOver. To enable it on iPhone, you can go in the iOS &#34;Settings&#34; &amp;gt; &#34;Accessibility&#34; &amp;gt; &#34;VoiceOver&#34; and enable &#34;VoiceOver&#34;.&lt;/p&gt; &lt;p&gt;Second, from the KeePassium app you can tap on the &#34;Settings&#34; gear button on the lower-right to access the &#34;Appearance&#34; menu. From there, you will see a sliding option to adjust the entry&#39;s text size. This will change the size of the text in all entries&#39; sections. You also have the option to change the font type from there.&lt;/p&gt; &lt;p&gt;Additionally, when tapping on a Password in an entry section, you can quickly tap on the magnified &#34;a&#34; button (while the blue &#34;Copied&#34; overlay appears) to display the password in large font, with each character separated in an indexed table.&lt;/p&gt; &lt;div class=&#34;grid&#34;&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the Appearance page from the Settings with the Text Size option.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-textsize.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing an entry&#39;s password selected with the large font option, which displays each character from a password in a separate indexed box.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-largeindexedfont.webp&#34; /&gt;&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;security-features&#34;&gt;Security features&lt;/h3&gt; &lt;p&gt;In the &#34;Access Control&#34; category of &#34;Settings&#34;, there are some important options to customize the app&#39;s security features:&lt;/p&gt; &lt;h4 id=&#34;app-protection&#34;&gt;App Protection&lt;/h4&gt; &lt;p&gt;This section gives options to secure the application itself. It includes using the device&#39;s biometric lock instead of the app&#39;s Passcode, changing the app&#39;s Passcode, and choosing when the app gets locked.&lt;/p&gt; &lt;h4 id=&#34;data-protection&#34;&gt;Data Protection&lt;/h4&gt; &lt;p&gt;This section gives options to enable or disable if the database(s)&#39; main password(s) is remembered locally in the device&#39;s secure keychain, or if it must be re-entered each time to unlock a database. It also allows you to choose when (if remembered) the database will lock itself again, how long to keep data (including copied passwords) in the device&#39;s clipboard, and other security preferences.&lt;/p&gt; &lt;p&gt;A fun (and useful) feature you will find there is that you can decide what happens when the device is &#34;shaken&#34;. This can be an important security feature for people in sensitive situations.&lt;/p&gt; &lt;div class=&#34;grid&#34;&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the App Protection page from the Settings.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-appprotection.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the Data Protection page from the Settings.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-dataprotection.webp&#34; /&gt;&lt;/p&gt; &lt;/div&gt; &lt;h4 id=&#34;protection-against-weak-passwords&#34;&gt;Protection against weak passwords&lt;/h4&gt; &lt;p&gt;When first creating a database, KeePassium will indicate if the main password chosen is too weak and display a warning.&lt;/p&gt; &lt;p&gt;This is an important security feature because &lt;strong&gt;a database is only as protected as the strength of its main password&lt;/strong&gt;. It goes without saying the main password for a database should always be &lt;em&gt;unique&lt;/em&gt; (has never been used elsewhere), &lt;em&gt;complex&lt;/em&gt; (uses a variety of character types), and &lt;em&gt;long&lt;/em&gt; (is long enough to not be vulnerable to brute-force attacks).&lt;/p&gt; &lt;p&gt;Passwords chosen for each entry will also display an indicator of strength under each field.&lt;/p&gt; &lt;h4 id=&#34;yubikey-support-premium&#34;&gt;YubiKey support (Premium)&lt;/h4&gt; &lt;p&gt;For users with Premium plans, KeePassium offers &lt;a href=&#34;https://www.yubico.com/works-with-yubikey/catalog/keepassium/&#34;&gt;support for YubiKey&lt;/a&gt; to add extra protection to a database using the challenge-response implementation.&lt;/p&gt; &lt;p&gt;The same feature is available on KeePassXC on desktop. For more details on this, you can check our &lt;a href=&#34;../../../03/18/installing-keepassxc-and-yubikey/&#34;&gt;tutorial for KeePassXC&lt;/a&gt;, or our tutorial on &lt;a href=&#34;../../../03/06/yubikey-reset-and-backup/&#34;&gt;how to set up and back up a YubiKey&lt;/a&gt;&#39;s challenge-response.&lt;/p&gt; &lt;h4 id=&#34;passwords-audit-premium&#34;&gt;Passwords audit (Premium)&lt;/h4&gt; &lt;p&gt;KeePassium offers to audit database&#39;s passwords for potential leaks. This feature works by comparing an obfuscated version of a password with the &lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;Have I Been Pwned&lt;/a&gt; service. The password is never shared externally during this process. This is helpful information to get an early warning and change a compromised password before the exposed account is attacked.&lt;/p&gt; &lt;h3 id=&#34;groups-and-smart-groups&#34;&gt;Groups and Smart Groups&lt;/h3&gt; &lt;p&gt;Before starting to add entries to a new database, it&#39;s a good idea to explore the Groups and Smart Groups features. Groups are directories that can be created inside a database to separate categories of passwords.&lt;/p&gt; &lt;p&gt;Smart Groups are simply Groups created from a search query. If you imported a database already full of passwords, you might not feel like sorting them manually. Smart Groups will help to create Groups using queries to &lt;a href=&#34;https://support.keepassium.com/docs/smart-groups/&#34;&gt;categorize&lt;/a&gt; entries automatically. This can be very convenient to organize larger databases.&lt;/p&gt; &lt;p&gt;When creating a new database, KeePassium will suggest some Groups, which you can be used as provided, changed, or deleted. To add a new Group or Smart Group, tap on the 3-dot button on the upper-right from inside a database and select &#34;New Group&#34; or &#34;New Smart Group&#34;.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing different groups created within a database.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-groups.webp&#34; width=&#34;400&#34; /&gt;&lt;/p&gt; &lt;div class=&#34;admonition info&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Separate databases vs Groups&lt;/p&gt; &lt;p&gt;Using separate databases for different categories of passwords, for example one database for personal passwords, work-related passwords, and family-shared passwords is a good idea because it takes advantage of compartmentalization to add extra security and privacy.&lt;/p&gt; &lt;p&gt;Each database will have its own main password, and if one database were to get compromised, the others might still be protected. KeePassium&#39;s free plan only allow to use &lt;em&gt;one&lt;/em&gt; database at the time, however.&lt;/p&gt; &lt;p&gt;Groups mainly serve to organize passwords and do not provide any additional security, privacy, or portability like separate databases do. For free plan users, Groups can still be a great feature to separate passwords when it isn&#39;t a security issue to encrypt them all together using a same main password.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;entry-options&#34;&gt;Entry options&lt;/h3&gt; &lt;p&gt;Once inside a database, users can add a new entry there or first create/enter a Group directory. To create a new entry, tap on the 3-dot menu on the upper-right, then select &#34;New Entry&#34;.&lt;/p&gt; &lt;p&gt;Each New Entry section will include a field for the entry&#39;s name, choice of icon (or option to download the service&#39;s favicon), &#34;User Name&#34;, &#34;Password&#34;, &#34;URL&#34;, &#34;Tags&#34;, &#34;Notes&#34;, and option to &#34;Set up one-time password (&lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;)&#34;.&lt;/p&gt; &lt;p&gt;Tapping the plus-sign button at the top will create a new custom text field for an entry. Enabling the &#34;Protected Field&#34; option on the lower-right will hide this field as if it was a password field. That being said, all fields from an entry will be fully encrypted with the database.&lt;/p&gt; &lt;div class=&#34;grid&#34;&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing a New Entry page with various empty fields.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-newentry.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the page within a Group with four different entries.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-entries.webp&#34; /&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;An entry section from macOS:&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the macOS app showing an entry section with the &amp;quot;User Name&amp;quot;, &amp;quot;Password&amp;quot;, &amp;quot;URL&amp;quot;, &amp;quot;Tags&amp;quot;, and &amp;quot;Notes&amp;quot; fields filled.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-entrymac.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;Finally, to edit, move, copy or delete an entry on iOS, a long press over its name from the directory will show these options. Swiping left on a password entry will also show the edit and delete options.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the options Edit, Move, Copy, and Delete when long-pressing on a listed entry.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-moveentry.webp&#34; width=&#34;400&#34; /&gt;&lt;/p&gt; &lt;h3 id=&#34;password-generator&#34;&gt;Password generator&lt;/h3&gt; &lt;p&gt;Conveniently, KeePassium includes a password generator. This is a common feature for password managers, and KeePassium implements this feature very well.&lt;/p&gt; &lt;p&gt;The generator can be used from either the die-shaped button on the right of every password field, the tool-shaped button menu on the lower-left from inside a database selecting &#34;Random Generator&#34;, or the die-shaped button on the lower-left from the &#34;Databases&#34; section. The latter is a nice touch if you ever need to generate a random string while your database is locked.&lt;/p&gt; &lt;p&gt;Each time you open the Random Generator, it will automatically generate new random strings for all 3 modes: Basic, Expert, and Passphrase.&lt;/p&gt; &lt;div class=&#34;grid&#34;&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the tool menu from within a database. The menu shows options for &amp;quot;Random Generator&amp;quot;, &amp;quot;Password Audit&amp;quot;, &amp;quot;Download Favicons&amp;quot;, &amp;quot;Print&amp;quot;, &amp;quot;Change Master Key&amp;quot;, &amp;quot;Encryption Settings&amp;quot;, and &amp;quot;Lock Database&amp;quot;.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-databaseoptions.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the Random Generator page that displays three random passwords for &amp;quot;Basic&amp;quot;, &amp;quot;Expert&amp;quot;, and &amp;quot;Passphrase&amp;quot;.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-generator.webp&#34; /&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;The Random Generator can also be customized. To customize each mode, tap on the gears-shaped button on the upper-right of the generator and change the mode to adjust the parameters for each. The app will remember the parameters every time it is used.&lt;/p&gt; &lt;p&gt;The customization for Passphrase does not include the options for &#34;MIXED&#34; case at this time, however, considering this option was just added to KeePassXC last month, maybe it will be added to KeePassium as well in the near future.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the macOS app showing the Random Generator page that displays the options to adjust for generated passphrase.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-generatormac.webp&#34; /&gt;&lt;/p&gt; &lt;h3 id=&#34;one-time-password-otp&#34;&gt;One-Time Password (&lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;)&lt;/h3&gt; &lt;p&gt;KeePassium offers the option to store one-time password codes with each entry. This can be a convenient way to manage second-factor of authentication, and keep these codes stored locally only.&lt;/p&gt; &lt;p&gt;However, this can also introduce additional risks. If a database file was to get compromised at some point, it would also compromise all the &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; codes within it, making this second-factor protection useless against an attack of the whole database.&lt;/p&gt; &lt;p&gt;If this isn&#39;t a risk you are concerned with, then KeePassium&#39;s &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; can be a useful feature.&lt;/p&gt; &lt;p&gt;&lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; codes are easy to set up and can be entered manually or using a QR code. Once set up, the code will be displayed as a field in the entry. Tap on it to copy it.&lt;/p&gt; &lt;div class=&#34;grid&#34;&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing an entry for Mastodon Social with all credential fields filled, and an arrow pointing at a One-Time Password code.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-otp.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing an Entry page with the option to &amp;quot;Set up one-time password (OTP)&amp;quot; selected at the bottom and displaying a menu with the options &amp;quot;Scan QR code&amp;quot; and &amp;quot;Enter manually&amp;quot;.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-otpentry.webp&#34; /&gt;&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;autofill&#34;&gt;AutoFill&lt;/h3&gt; &lt;p&gt;Depending on your usage, AutoFill can be an important feature for a password manager. AutoFill will allow KeePassium to recognize a login page and automatically fill all in the login credentials.&lt;/p&gt; &lt;p&gt;To ensure AutoFill works smoothly, it&#39;s important to enter the correct website URL for each entry, specifically the page&#39;s URL where the credentials will be required.&lt;/p&gt; &lt;p&gt;Ultimately, it&#39;s possible some websites will just not work with KeePassium&#39;s AutoFill. Some &lt;a href=&#34;https://github.com/keepassium/KeePassium/issues/405&#34;&gt;issues&lt;/a&gt; have been experienced while testing the app for this review. If you experience the same issue with a website, you can simply copy-paste the credentials manually in each corresponding field.&lt;/p&gt; &lt;div class=&#34;admonition failure&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;AutoFill issues for some websites&lt;/p&gt; &lt;p&gt;A possible cause of AutoFill issues can be an incorrect entry URL that isn&#39;t the proper &#34;Caller ID&#34;. To troubleshoot this, you can consult KeePassium&#39;s helpful &lt;a href=&#34;https://support.keepassium.com/kb/autofill-matching/&#34;&gt;instructions&lt;/a&gt; here.&lt;/p&gt; &lt;/div&gt; &lt;h4 id=&#34;autofill-for-ios&#34;&gt;AutoFill for iOS&lt;/h4&gt; &lt;p&gt;When set up correctly on iOS, a &#34;Passwords&#34; button should appear above the keyboard for websites where credentials have been stored in your database. If it doesn&#39;t, this could mean AutoFill was not set up properly from the &lt;a href=&#34;https://support.keepassium.com/kb/autofill-setup-ios/&#34;&gt;iOS Settings&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from a mobile browser with the login page for mastodon.social displaying empty credential fields and iOS showing a &amp;quot;Passwords&amp;quot; button over the keyboard.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-autofill.webp&#34; width=&#34;400&#34; /&gt;&lt;/p&gt; &lt;h4 id=&#34;autofill-for-macos&#34;&gt;AutoFill for macOS&lt;/h4&gt; &lt;p&gt;There isn&#39;t a browser extension available for KeePassium on macOS. The desktop AutoFill feature integrates with the system as a &lt;a href=&#34;https://www.reddit.com/r/KeePassium/comments/1isvjjd/comment/mdsbwwc/&#34;&gt;credential provider&lt;/a&gt;. Browser implementation depends on how each browser integrates this function. The desktop AutoFill feature does work flawlessly with Safari.&lt;/p&gt; &lt;p&gt;To set up AutoFill for KeePassium, you will have to enable it from the &lt;a href=&#34;https://support.keepassium.com/kb/autofill-setup-macos/&#34;&gt;macOS Settings&lt;/a&gt;. KeePassium will guide you through the process with clear instructions to follow:&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the macOS app showing a setting popup to &amp;quot;Uncheck Keychain&amp;quot; with the option to enable KeePassium instead.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-autofillmac.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;Once enabled, every website with a corresponding URL in your database will display a small key icon on the right of the credential fields.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from Safari showing the cryptpad.fr login page and a key icon on the right of the Username empty field, with the option on the left to select either KeePassium or Keychain to fill the credentials.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-loginsafarimac.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;Despite lacking a browser extension, integration with Safari and the macOS ecosystem works smoothly, and it will work with applications that aren&#39;t browsers as well.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the ProtonDrive login popup in macOS showing a menu over the Password field to select either KeePassium or Keychain to fill the credentials.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-loginappmac.webp&#34; /&gt;&lt;/p&gt; &lt;h3 id=&#34;backups&#34;&gt;Backups&lt;/h3&gt; &lt;p&gt;Backing up your database is essential with any KeePass-compatible app. Because there is no remote backup automatically stored by the application, you become responsible for protecting this data properly.&lt;/p&gt; &lt;p&gt;KeePassium offers many options to help users back up their databases.&lt;/p&gt; &lt;h4 id=&#34;enable-backup-copies&#34;&gt;Enable backup copies&lt;/h4&gt; &lt;p&gt;The option to back up local copies automatically will be enabled by default. You can disable it if you prefer (ideally not), or enable the option to &#34;Show Backup Files&#34; in &#34;Settings&#34; &amp;gt; &#34;Database Backup&#34;. You can also adjust for how long you wish to keep the local backups (the default value is 2 months).&lt;/p&gt; &lt;h4 id=&#34;exclude-from-iclouditunes&#34;&gt;Exclude from iCloud/iTunes&lt;/h4&gt; &lt;p&gt;There is an important feature to exclude your database file and KeePassium&#39;s backups of your database from your device&#39;s iCloud or iTunes backups. If you do not trust Apple with your encrypted database, you should enable this everywhere (excluding from iCloud/iTunes is disabled by default).&lt;/p&gt; &lt;p&gt;If your database is stored locally (you might not see the option otherwise): From the &#34;Databases&#34; page, tap on the 3-dot button right to your database name (not the &lt;em&gt;circled&lt;/em&gt; 3-dot button at the top, the one below). Then tap on &#34;File Info&#34; and &lt;em&gt;enable&lt;/em&gt; the option &#34;Exclude From iCloud/iTunes Backup&#34; to make sure your database file stays outside your device&#39;s iCloud or iTunes backups.&lt;/p&gt; &lt;p&gt;Secondly, to also exclude the backups created by KeePassium, inside a database tap on the &#34;Settings&#34; gear button on the lower-right, then &#34;Database Backup&#34;, and &lt;em&gt;enable&lt;/em&gt; &#34;Exclude Backup Files from System Backup&#34;.&lt;/p&gt; &lt;div class=&#34;grid&#34;&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the File Info page for a database, with the &amp;quot;Exclude From iCloud/iTunes Backup&amp;quot; option enabled in green.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-fileinfo.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the Database backup page from Settings with the &amp;quot;Exclude Backup Files from System Backup&amp;quot; option enabled in green.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-backup.webp&#34; /&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;You will find the same option on macOS:&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the macOS app showing the File Info for a database, with the &amp;quot;Exclude From iCloud/iTunes Backup&amp;quot; option enabled in yellow.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-fileinfomac.webp&#34; /&gt;&lt;/p&gt; &lt;h4 id=&#34;auto-delete-backup-files&#34;&gt;Auto-delete backup files&lt;/h4&gt; &lt;p&gt;You can choose the backup files to get deleted automatically after a certain period of time. For this, go to &#34;Settings&#34; then the &#34;Database Backup&#34; again, and scroll down to &#34;Keep Backup Files&#34;. Select a retention period that is secure for your threat model. You can also tap on &#34;Delete ALL Backup Files&#34; below to delete all backups at any time.&lt;/p&gt; &lt;h4 id=&#34;manual-backups&#34;&gt;Manual backups&lt;/h4&gt; &lt;p&gt;Finally, you can simply back up your database &lt;code&gt;.kdbx&lt;/code&gt; file manually. For this you have the options to transfer the file from KeePassium via cable, cloud storage, local network, AirDrop, email, or even Signal&#39;s &lt;a href=&#34;https://support.signal.org/hc/en-us/articles/360043272451-Note-to-Self&#34;&gt;Note to Self&lt;/a&gt;!&lt;/p&gt; &lt;p&gt;To &lt;a href=&#34;https://support.keepassium.com/kb/database-transfer/&#34;&gt;transfer&lt;/a&gt; your database file entirely offline to another Apple device, connect your device together via USB cable and follow these &lt;a href=&#34;https://support.apple.com/en-gb/guide/mac-help/mchl4bd77d3a/mac&#34;&gt;instructions&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;If you stored your database locally on iPhone, you will find the file in Apple&#39;s &#34;Files&#34; &amp;gt; &#34;On My iPhone&#34; &amp;gt; &#34;KeePassium&#34;. From there, you can long press the file to see options to move or share it.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS Files showing the menu from a long-press over the local database file with the option to &amp;quot;Move&amp;quot; the file circled.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-movedatabase.webp&#34; width=&#34;400&#34; /&gt;&lt;/p&gt; &lt;h4 id=&#34;restore-database-from-backup&#34;&gt;Restore database from backup&lt;/h4&gt; &lt;p&gt;If you encounter any errors while managing your database, you can always restore it from a backup. Keeping multiple backup versions is a good idea to ensure you always have a functional file. Glitches and bugs are more likely to happen if you handle your database in unusual ways, with other software that may not have been tested for this usage yet.&lt;/p&gt; &lt;p&gt;Restoring a database in KeePassium is a very straightforward operation. In the &#34;Databases&#34; section, tap on the 3-dot button on the upper-right, then select &#34;Show Backup Files&#34;, if it isn&#39;t already on. Follow KeePassium&#39;s &lt;a href=&#34;https://support.keepassium.com/kb/restore-backup/&#34;&gt;instructions to restore&lt;/a&gt; a previous version.&lt;/p&gt; &lt;h3 id=&#34;synchronization-and-direct-connection&#34;&gt;Synchronization and direct connection&lt;/h3&gt; &lt;p&gt;While you can use KeePassium entirely offline, the app also offers options to synchronize your database with other KeePassium installations or other KeePass-compatible applications.&lt;/p&gt; &lt;p&gt;There are two ways to do this. You can either simply store your database file in a cloud service of your choice and let KeePassium access this file, or you can use KeePassium&#39;s direct connection with certain cloud providers.&lt;/p&gt; &lt;p&gt;You can see these two options from the app in &#34;Settings&#34; &amp;gt; &#34;Network Access&#34;. From there, you have the option to select &#34;Stay Offline&#34;, for maximum privacy, or &#34;Allow Network Access&#34;, for maximum functionality.&lt;/p&gt; &lt;p&gt;Whether you choose simple file synchronization or a direct connection, you can consult &lt;a href=&#34;https://support.keepassium.com/kb/sync/&#34;&gt;this list&lt;/a&gt; of cloud storage providers that have been tested by the KeePassium team and users to determine if your provider is supported.&lt;/p&gt; &lt;h4 id=&#34;stay-offline-and-synchronize-through-a-cloud-provider-recommended&#34;&gt;Stay offline, and synchronize through a cloud provider (recommended)&lt;/h4&gt; &lt;p&gt;This is KeePassium&#39;s &lt;a href=&#34;https://keepassium.com/articles/cloud-sync-sandboxing/&#34;&gt;recommended method&lt;/a&gt; to synchronize your database file(s) while maximizing privacy and minimizing external accesses. By default, KeePassium will remain offline, but you can store your database file with a cloud provider of your choice.&lt;/p&gt; &lt;p&gt;This way, your cloud provider will manage the network communication, and KeePassium will only take care of decrypting your database. Because of system-enforced sandboxing, KeePassium will not have access to anything else on your cloud storage, only the database file(s) your have granted it access to.&lt;/p&gt; &lt;p&gt;For example, you can store your database file on a cloud storage of your choice, then open it from KeePassium for iOS and also from KeePassXC on desktop. Both applications will access and manage the same file, therefore synchronizing your database.&lt;/p&gt; &lt;p&gt;Be careful however when modifying your database. If synchronization isn&#39;t handled properly, this could cause errors that could corrupt your file. This is why it&#39;s important to test your setting first, and a good practice to keep a backup in a secure secondary location.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing the Network Access page with the option &amp;quot;Stay Offline&amp;quot; selected.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-offline.webp&#34; width=&#34;400&#34; /&gt;&lt;/p&gt; &lt;details class=&#34;example&#34;&gt; &lt;summary&gt;Synchronization through Proton Drive&lt;/summary&gt; &lt;p&gt;Proton Drive isn&#39;t part of the recommended and tested list of cloud providers for KeePassium. However, it was briefly tested during this review.&lt;/p&gt; &lt;p&gt;Between KeePassium iOS and KeePassXC on desktop, some synchronization was possible through Proton Drive, but with mixed results.&lt;/p&gt; &lt;p&gt;To make it work, first the Proton Drive app needed to stay unprotected by a PIN or biometrics, which isn&#39;t ideal if you have other sensitive files on this drive. There was also some delay to sync the database between mobile and desktop, and a few bugs occurred while testing.&lt;/p&gt; &lt;p&gt;That being said, synchronization was &lt;em&gt;possible&lt;/em&gt; through Proton Drive between KeePassium for iOS and KeePassXC on desktop, but maybe not recommended. If you choose this setup for yourself, it is &lt;em&gt;strongly&lt;/em&gt; recommended to conduct adequate testing first using a dummy database, and once set up with your actual database, to keep a secondary backup in a separate location.&lt;/p&gt; &lt;p&gt;Testing couldn&#39;t make synchronization work between KeePassium iOS and KeePassium macOS through Proton Drive. Issues seem to come from conflict resolutions on the Proton Drive side. Of course, because Proton Drive isn&#39;t even listed by KeePassium as a supported storage, this was simply conducted as an experiment and not an expectation.&lt;/p&gt; &lt;p&gt;Because many of our readers might use Proton Drive as a cloud provider, just be aware it probably isn&#39;t a usable synchronization solution at this time.&lt;/p&gt; &lt;p&gt;Using Proton Drive to simply back up a password database file manually without synchronization is still a viable option, however.&lt;/p&gt; &lt;/details&gt; &lt;h4 id=&#34;allow-network-access-to-connect-directly-from-keepassium&#34;&gt;Allow network access, to connect directly from KeePassium&lt;/h4&gt; &lt;p&gt;In 2022, KeePassium added direct connection options for certain cloud storage providers as a workaround solution for providers that were not integrating well with the system. This should however be a secondary choice only, as it will have some downsides for your data privacy.&lt;/p&gt; &lt;p&gt;You can find this option from the &#34;Data Encryption&#34; welcome window at the start where you can either create a database, import a database, or &#34;Connect to Server&#34;.&lt;/p&gt; &lt;p&gt;Although KeePassium will only use what is necessary for this functionality, it &lt;a href=&#34;https://keepassium.com/privacy/app/#direct-connections&#34;&gt;will access&lt;/a&gt; more data than with the &#34;Stay Offline&#34; synchronization option. The data used for this functionality will however remain between your device and the cloud provider.&lt;/p&gt; &lt;h4 id=&#34;supported-cloud-storage-providers&#34;&gt;Supported cloud storage providers&lt;/h4&gt; &lt;p&gt;KeePassium offers full support for iCloud Drive, Box, Dropbox, Google Drive, OneDrive, Resilio Sync, Nextcloud, SFTP / WebDAV, and limited support for Mega and Cryptomator.&lt;/p&gt; &lt;p&gt;You might be able to make it work with cloud providers that aren&#39;t listed here. However, if you decide to use a provider that isn&#39;t fully supported, make sure to properly test your setup with a dummy database first.&lt;/p&gt; &lt;h3 id=&#34;additional-features&#34;&gt;Additional features&lt;/h3&gt; &lt;p&gt;This review focused testing on the most commonly used features that are accessible from a free plan. Nonetheless, KeePassium offers many more features, and additional ones for paid plans. Here&#39;s a summary of some other interesting features that have not been covered yet:&lt;/p&gt; &lt;h4 id=&#34;passkeys&#34;&gt;Passkeys&lt;/h4&gt; &lt;p&gt;Since December 2024, KeePassium added &lt;a href=&#34;https://keepassium.com/blog/2024/12/keepassium-2.0/#passkey-support&#34;&gt;support&lt;/a&gt; for passkeys with its 2.0 release.&lt;/p&gt; &lt;h4 id=&#34;family-sharing-premium&#34;&gt;Family sharing (Premium)&lt;/h4&gt; &lt;p&gt;You can use Apple&#39;s Family Sharing feature to &lt;a href=&#34;https://support.keepassium.com/kb/family-sharing/&#34;&gt;share&lt;/a&gt; your KeePassium paid license with your family members.&lt;/p&gt; &lt;h4 id=&#34;multiple-databases-premium&#34;&gt;Multiple databases (Premium)&lt;/h4&gt; &lt;p&gt;With a paid plan, it&#39;s possible to create or import multiple databases with KeePassium. This can be very convenient if you use a separate database for work and for your personal life, for example.&lt;/p&gt; &lt;h4 id=&#34;printing-database&#34;&gt;Printing database&lt;/h4&gt; &lt;p&gt;KeePassium has a quick option to print an entire database in plain text, in an easy-to-read format. If this is secure for you, it can be a convenient way to keep a backup paper copy of all your passwords in case of emergency (or for inheritance purposes).&lt;/p&gt; &lt;p&gt;To do this, while inside your database tap on the tool-shaped button on the lower-left, then select &#34;Print&#34;. Of course make sure to secure this printed data &lt;em&gt;very well&lt;/em&gt;, as it could be your weakest link.&lt;/p&gt; &lt;div class=&#34;admonition warning&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Important security warning!&lt;/p&gt; &lt;p&gt;Depending on your printer&#39;s settings, you should be &lt;em&gt;very careful&lt;/em&gt; when using the print function. This data will be sent in plain text to your printer, and even perhaps through a network (depending on your printer&#39;s settings).&lt;/p&gt; &lt;p&gt;This &lt;strong&gt;can represent a very high security risk&lt;/strong&gt;, depending on your printer setup and situation. The file with your plain text passwords could also remain stored in the printer&#39;s queue!&lt;/p&gt; &lt;p&gt;The print function can be &lt;a href=&#34;https://support.keepassium.com/docs/mdm-appconfig/#allowDatabasePrint&#34;&gt;disabled&lt;/a&gt; for users with a Business license.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing a preview to print a database file in plain text. The file lists the database name at the top, then each group, and within each group all entries&#39; credentials including usernames, passwords in plain text, URL, and notes.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-print.webp&#34; /&gt;&lt;/p&gt; &lt;h4 id=&#34;read-only-database&#34;&gt;Read-only database&lt;/h4&gt; &lt;p&gt;You can protect a database from accidental changes by enabling this option. This will prevent any entries from being added, removed, or modified.&lt;/p&gt; &lt;p&gt;It can be very useful if you have installed the app for someone who isn&#39;t comfortable with technology and want to make sure they cannot inadvertently delete an entry, for example.&lt;/p&gt; &lt;p&gt;To enable it from KeePassium on iOS, go to the &#34;Databases&#34; section, long press on your database file, select &#34;Database Settings&#34;, then enable &#34;Read Only&#34; at the top.&lt;/p&gt; &lt;h4 id=&#34;file-storage-attachments&#34;&gt;File storage (attachments)&lt;/h4&gt; &lt;p&gt;You can use your database to store files!&lt;/p&gt; &lt;p&gt;It&#39;s probably best to stay reasonable with this because files will quickly make your database very heavy. This could significantly slow down the encryption and decryption processes.&lt;/p&gt; &lt;p&gt;That being said, it&#39;s a great way to store more sensitive files securely. The files will be encrypted with your database.&lt;/p&gt; &lt;p&gt;You can either add files to an entry already created, or create a new entry named &#34;Files&#34; (or anything else you wish) to store all of your files together.&lt;/p&gt; &lt;p&gt;To add a file, select the paperclip-icon tab at the top of an entry, then tap the plus-sign button at the bottom. Your files (attachments) will be accessible from any other KeePass-compatible application, like KeePassXC for example.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the macOS app showing the section tab within an Entry to add and view attachment files.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-attachmentmac.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;Interestingly, KeePassium even uses a quite decent PDF viewer on iOS:&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot from the iOS app showing a preview for a PDF file, in this case the document for Privacy by Design by Ann Cavoukian.&#34; src=&#34;../../../../assets/images/keepassium-review/keepassium-pdfviewer.webp&#34; width=&#34;400&#34; /&gt;&lt;/p&gt; &lt;h2 id=&#34;nice-to-have&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M5 9v12H1V9zm4 12a2 2 0 0 1-2-2V9c0-.55.22-1.05.59-1.41L14.17 1l1.06 1.06c.27.27.44.64.44 1.05l-.03.32L14.69 8H21a2 2 0 0 1 2 2v2c0 .26-.05.5-.14.73l-3.02 7.05C19.54 20.5 18.83 21 18 21zm0-2h9.03L21 12v-2h-8.79l1.13-5.32L9 9.03z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Nice to have&lt;/h2&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;You can see what was added, changed, or fixed for each KeePassium version from &#34;Settings&#34; in the &#34;What&#39;s New&#34; section.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;You can change the KeePassium and database icons from &#34;Settings&#34; &amp;gt; &#34;Appearance&#34; &amp;gt; in &#34;App Icon&#34; and &#34;Database Icons&#34;.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;KeePassium has &lt;a href=&#34;https://support.keepassium.com/&#34;&gt;excellent documentation&lt;/a&gt;! This is handy to learn about features or to troubleshoot if you encounter any errors.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;You can see the full credits for the app from &#34;Settings&#34; in the &#34;About KeePassium&#34; section.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;div class=&#34;admonition question&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Check the credits!&lt;/p&gt; &lt;p&gt;KeePassium not only credits its direct contributors but also lists credits for each graphics, code, and encryption algorithms used. You will find the same list of credits on KeePassium&#39;s GitHub &lt;a href=&#34;https://github.com/keepassium/KeePassium?tab=readme-ov-file#author-and-credits&#34;&gt;page&lt;/a&gt;. This is a wonderful idea that more software should get inspired by.&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;downsides&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M19 15V3h4v12zM15 3a2 2 0 0 1 2 2v10c0 .55-.22 1.05-.59 1.41L9.83 23l-1.06-1.06c-.27-.27-.44-.64-.44-1.06l.03-.31.95-4.57H3a2 2 0 0 1-2-2v-2c0-.26.05-.5.14-.73l3.02-7.05C4.46 3.5 5.17 3 6 3zm0 2H5.97L3 12v2h8.78l-1.13 5.32L15 14.97z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Downsides&lt;/h2&gt; &lt;p&gt;Even if KeePassium is a great secure application that is easy and pleasant to use, there are still a few downsides that should be mentioned:&lt;/p&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;People with older versions of iOS or macOS will unfortunately not be able to use the application at all.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;KeePassium only works in the Apple ecosystem, and there are no versions for other systems at this time.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;If you are using a cloud provider that doesn&#39;t work smoothly with KeePassium and you need synchronization, you will unfortunately need to synchronize your database manually or change your cloud storage provider.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;AutoFill on iOS might not work for every account. This can be an inconvenience depending on your usage and which of your accounts (if any) are impacted.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;AutoFill on macOS might not work with your favorite browser (if it isn&#39;t Safari).&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;h2 id=&#34;conclusion&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M10.5 0a5.499 5.499 0 1 1-1.288 10.848l-.932.932a.75.75 0 0 1-.53.22H7v.75a.75.75 0 0 1-.22.53l-.5.5a.75.75 0 0 1-.53.22H5v.75a.75.75 0 0 1-.22.53l-.5.5a.75.75 0 0 1-.53.22h-2A1.75 1.75 0 0 1 0 14.25v-2c0-.199.079-.389.22-.53l4.932-4.932A5.5 5.5 0 0 1 10.5 0m-4 5.5c-.001.431.069.86.205 1.269a.75.75 0 0 1-.181.768L1.5 12.56v1.69c0 .138.112.25.25.25h1.69l.06-.06v-1.19a.75.75 0 0 1 .75-.75h1.19l.06-.06v-1.19a.75.75 0 0 1 .75-.75h1.19l1.023-1.025a.75.75 0 0 1 .768-.18A4 4 0 1 0 6.5 5.5M11 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Conclusion&lt;/h2&gt; &lt;p&gt;Overall, KeePassium is a privacy-focused, offline-first application, that has clearly prioritized user experience and user interface, while not neglecting security and privacy.&lt;/p&gt; &lt;p&gt;When used with the basic and supported settings, it works fairly smoothly and allows enough customization to adapt to a variety of user needs and situations.&lt;/p&gt; &lt;p&gt;The fact that KeePassium allows full compatibility with most other KeePass-compatible applications is an immense benefit compared to proprietary password managers.&lt;/p&gt; &lt;p&gt;If you already keep your database in the KeePass file format, there are no downsides in trying KeePassium. If you aren&#39;t using this database format yet, this is a great opportunity to start and free yourself from locked-in systems that secure your precious passwords with obscurity rather than with openness.&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Unless credited otherwise, all screenshots from: Privacy Guides&lt;/small&gt;&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/05/13/keepassium-review/</link> <pubDate>Thu, 25 Sep 2025 04:09:21 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/05/13/keepassium-review/</guid> </item> <item> <title>Selling Surveillance as Convenience</title> <author>Em</author> <category>Opinion</category> <description>&lt;h1 id=&#34;selling-surveillance-as-convenience&#34;&gt;Selling Surveillance as Convenience&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Stylized and colorized photo of a large wooden horse standing over a blue sky.&#34; src=&#34;../../../../assets/images/selling-surveillance-as-convenience/surveillance-cover.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Photo: Zeki Okur / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Increasingly, surveillance is being normalized and integrated in our lives. Under the guise of convenience, applications and features are sold to us as being the new better way to do things. While some might be useful, &lt;strong&gt;this convenience is a Trojan horse&lt;/strong&gt;. The cost of it is the continuous degradation of our privacy rights, with all that that entails.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;As appalling as it is, the truth is the vast majority of software companies do not consider privacy rights and data minimization practices strongly enough, if at all. Most fail to implement the principles of &lt;a href=&#34;https://en.wikipedia.org/wiki/Privacy_by_design&#34;&gt;Privacy by Design&lt;/a&gt; that should guide development from the start.&lt;/p&gt; &lt;p&gt;Whether this comes from ignorance, incompetence, greed, or malicious intent can be debated. It matters little, because the result is the same: Technologies collecting (and monetizing) a shameful amount of data from everyone.&lt;/p&gt; &lt;p&gt;This horrifying trend ends up facilitating and normalizing surveillance in our daily lives. It is the opposite direction of where we should be going.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The more we accept this normalized surveillance, the harder it becomes to fight back.&lt;/strong&gt; It is critical that we firmly and loudly object to this banalized invasion of our privacy.&lt;/p&gt; &lt;p&gt;There are countless examples of this growing issue, but for now let&#39;s focus on three of them: Airport face scans, parking apps, and AI assistants.&lt;/p&gt; &lt;h2 id=&#34;face-scans-in-airports-and-elsewhere&#34;&gt;Face scans in airports (and elsewhere)&lt;/h2&gt; &lt;p&gt;Some airports and airlines around the world have started to &lt;a href=&#34;https://www.huffpost.com/entry/why-you-can-and-should-opt-out-of-tsa-facial-recognition-right-now-goog_l_680a673ae4b0b1be33560c93&#34;&gt;install face scanning stations&lt;/a&gt; to screen travelers. This is supposedly a quick and &lt;em&gt;convenient&lt;/em&gt; way to verify your identity when passing through airport security lines.&lt;/p&gt; &lt;p&gt;Facial scans and facial recognition data are biometric data. Biometric data is especially sensitive because once it&#39;s collected, there is no way for you to modify it later, ever.&lt;/p&gt; &lt;p&gt;Imagine having a password stolen a thousand times, yet there is no way for you to change it. This is the security system that biometric data collectors are building. When their database eventually leaks, and someone steals it to impersonate you, you cannot simply get a new face like you would generate a new password.&lt;/p&gt; &lt;p&gt;Moreover, facial data is the perfect tool to track you around without your consent. Systems using facial recognition are being installed in schools, sport stadiums, and other venues around the world.&lt;/p&gt; &lt;p&gt;Everyone should be extremely worried about sharing any biometric data with others, and should never do so simply for &#34;convenience&#34;.&lt;/p&gt; &lt;p&gt;Sadly, many people do not know they might have a right to refuse.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Refusing to provide biometric data everywhere we can is crucial.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;If people never refuse and simply accept surveillance without objection, we will soon lose any right we had to refuse. Without changes, this is the dystopia we are running towards.&lt;/p&gt; &lt;p&gt;If everyone said no instead of complying for convenience, these intrusive technologies would stop being imposed on us. We have a duty to &lt;strong&gt;say no&lt;/strong&gt; when we can.&lt;/p&gt; &lt;h2 id=&#34;parking-apps&#34;&gt;Parking apps&lt;/h2&gt; &lt;p&gt;Parking applications might feel like a boring but necessary sacrifice. With the slow disappearance of parking meters and cash money, more parking facilities now require parking apps for registration and payment.&lt;/p&gt; &lt;p&gt;The problem is, these applications collect lots of sensitive information. Necessarily, they collect parking location, parking duration, license plate number, phone number, email, payment information, and often even your full legal name. This information can be shared across multiple applications and organizations (partners) to track a car&#39;s location even beyond the parking facility.&lt;/p&gt; &lt;p&gt;Despite how sensitive this data is, it&#39;s very likely most applications have not invested the time and effort to protect it properly. Inevitably, &lt;a href=&#34;https://www.classaction.org/blog/parkmobile-data-breach-class-action-heres-what-you-need-to-know&#34;&gt;data breaches&lt;/a&gt; have already occurred.&lt;/p&gt; &lt;p&gt;Once this data is exposed, it can be challenging or impossible to change or delete it. People in vulnerable situations can be put in grave danger when such data becomes accessible to anyone looking for it.&lt;/p&gt; &lt;p&gt;Even without criminal breaches, security researcher Inti De Ceukelaire &lt;a href=&#34;https://www.dailydot.com/debug/parking-apps-track-car-privacy-gdpr/&#34;&gt;revealed&lt;/a&gt; in 2022 that some parking apps could allow anybody to track a car around. This is due to poor security practices which allowed anyone to register and track any car&#39;s license plate, whether it&#39;s their car or not.&lt;/p&gt; &lt;p&gt;Despite repeated &lt;a href=&#34;https://www.cbc.ca/news/canada/hamilton/hamilton-parking-app-privacy-concerns-1.5689209&#34;&gt;warnings&lt;/a&gt; from privacy experts, parking applications remain largely under-regulated.&lt;/p&gt; &lt;h2 id=&#34;ai-assistants-and-note-takers&#34;&gt;AI assistants and note-takers&lt;/h2&gt; &lt;p&gt;Last but not least, AI assistant and note-taking applications have spawned in every corner of our lives for the past few years. Unfortunately, these &lt;strong&gt;AI applications are an absolute nightmare for data privacy&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;Very few AI systems of this type provide data without also &lt;em&gt;taking in&lt;/em&gt; data.&lt;/p&gt; &lt;p&gt;Most fresh AI startups simply utilize a subscription to OpenAI under the hood. This means it is likely any data you input into an AI assistant or note-taker will be shared back with OpenAI in the end. This includes any personal information you type and any photos you upload.&lt;/p&gt; &lt;p&gt;Some applications offer options to opt out of input sharing, but given the track record of tech companies asking for forgiveness rather than permission, can this really be trusted?&lt;/p&gt; &lt;p&gt;Additionally, regardless of the stated purpose for this data collection, nothing stops these companies from using it for another purpose down the road, or selling it to someone else.&lt;/p&gt; &lt;p&gt;AI note-taking applications that seem to be all the rage in remote meetings these days are no exception.&lt;/p&gt; &lt;p&gt;To provide a transcript then a summary, these applications &lt;a href=&#34;https://www.zscaler.com/cxorevolutionaries/insights/privacy-security-concerns-ai-meeting-tools&#34;&gt;will record&lt;/a&gt; the whole meeting, often including both audio and video. This data will be stored by the AI note-taking company, and maybe also shared with at least OpenAI, potentially with other third-parties as well.&lt;/p&gt; &lt;p&gt;This is &lt;strong&gt;incredibly intrusive&lt;/strong&gt;, not to say straight out &lt;em&gt;creepy&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;Besides, it can even be &lt;em&gt;illegal&lt;/em&gt;. If you use this kind of application with someone living in a region with a &lt;a href=&#34;https://acclaws.com/can-you-record-a-conversation-legally/&#34;&gt;two-party consent law&lt;/a&gt;, recording without prior consent of all participants is criminal.&lt;/p&gt; &lt;p&gt;Even without this, any personal information collected by an AI system is still &lt;strong&gt;subject to the privacy regulation protecting its data subject&lt;/strong&gt;. Nobody should take lightly the legal and moral obligations they have when using or developing such invasive technology.&lt;/p&gt; &lt;p&gt;Even if you don&#39;t care about sending &lt;em&gt;your own&lt;/em&gt; personal data to these companies, &lt;strong&gt;you are still responsible&lt;/strong&gt; for &lt;a href=&#34;../../../03/10/the-privacy-of-others/&#34;&gt;the data of others&lt;/a&gt; you input in these systems.&lt;/p&gt; &lt;p&gt;For organizations, using AI doesn&#39;t remove any legal obligations to &lt;strong&gt;&lt;a href=&#34;https://iapp.org/news/a/how-privacy-and-data-protection-laws-apply-to-ai-guidance-from-global-dpas&#34;&gt;comply with privacy laws&lt;/a&gt;&lt;/strong&gt;. You are still responsible for any personal data collected by your usage of AI systems, even when delegating the task to OpenAI or any other subcontractor.&lt;/p&gt; &lt;h2 id=&#34;how-to-opt-out&#34;&gt;How to opt out?&lt;/h2&gt; &lt;p&gt;There are multiple ways to opt out of surveillance disguised as convenience. The first thing of course is to avoid using any such technology whenever possible.&lt;/p&gt; &lt;p&gt;Before taking a plane, spend some time researching if your citizenship and the region you are visiting grant you opt-out rights. If it does, print this documentation and be ready to politely ask for a traditional identify verification instead of a face scan.&lt;/p&gt; &lt;p&gt;If you own a car, try to find a parking application that has been more thoughtful regarding security and privacy. Report any parking apps which infringe on your local privacy laws to your local Data Protection Authority or equivalent. If you go somewhere that could put you in danger if tracked — for example, because you are victim of domestic violence or stalking — consider renting a car with a different license plate, sharing a ride with a trusted friend, or parking at another location you can safely walk from.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Do NOT use any AI note-taker!&lt;/strong&gt; This technology might seem &lt;em&gt;convenient&lt;/em&gt; at first, but it is completely unnecessary (and also unreliable). If you use this technology carelessly without providing proper privacy notice, you could run into serious legal risks. Additionally, you risk eroding the trust of everyone communicating with you when the &lt;em&gt;inevitable&lt;/em&gt; data breach occurs.&lt;/p&gt; &lt;p&gt;If someone invites you to a meeting using an AI note-taker, do not hesitate to refuse being recorded, and share your discomfort about this technology.&lt;/p&gt; &lt;p&gt;If you must use an AI assistant, try to find one that can run &lt;em&gt;offline,&lt;/em&gt; and does not upload your inputs back to the company&#39;s server. When this isn&#39;t possible, make sure at least to never share any personal information with these systems. Be especially vigilant not to share any data related to other people, and especially children. This could lead to severe legal consequences for you down the road.&lt;/p&gt; &lt;h2 id=&#34;why-it-is-crucial-to-oppose-everywhere-we-can&#34;&gt;Why it is crucial to oppose everywhere we can&lt;/h2&gt; &lt;p&gt;If we all do everything we can to opt out every time we can, it will become harder and harder to implement mass surveillance systems in our society.&lt;/p&gt; &lt;p&gt;The response provided when privacy experts raise the alarm is often to minimize concerns saying &#34;it&#39;s only optional, and people can opt out&#34;.&lt;/p&gt; &lt;p&gt;But for &lt;strong&gt;how long will we keep the right to opt out&lt;/strong&gt; if we never exercise this right? How many dark patterns and intimidation techniques are used to pressure people into saying yes, or to make sure they never know about their right to opt out?&lt;/p&gt; &lt;p&gt;Furthermore, write to your representatives about your concerns related to privacy rights and the rise of surveillance systems in our society. Discuss this with your family and your friends. Post about it on social media. Share your experience of surveillance with the press.&lt;/p&gt; &lt;p&gt;The more we are talking about this problem, the stronger the opposition becomes, and the more chances we have to &lt;strong&gt;keep our privacy rights alive&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;If we do not stand firm to defend our rights, even when it&#39;s inconvenient to do, we might soon lose them.&lt;/p&gt; &lt;h2 id=&#34;additional-resources&#34;&gt;Additional resources&lt;/h2&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.ajl.org/campaigns/fly&#34;&gt;Facial scan at airport (United States): Protect Your Face Data&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://notmyplate.com/&#34;&gt;Information on parking apps vulnerabilities: Not My Plate&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.fisherphillips.com/en/news-insights/ai-notetaking-tools-should-you-use-them.html&#34;&gt;Information on AI note-takers&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.microsoftrecall.com/&#34;&gt;How to remove/disable Microsoft&#39;s Windows Recall&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt;</description> <link>https://www.privacyguides.org/articles/2025/06/07/selling-surveillance-as-convenience/</link> <pubDate>Thu, 25 Sep 2025 04:09:21 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/06/07/selling-surveillance-as-convenience/</guid> </item> <item> <title>The Future of Privacy: How Governments Shape Your Digital Life</title> <author>Em</author> <category>News</category> <description>&lt;h1 id=&#34;the-future-of-privacy-how-governments-shape-your-digital-life&#34;&gt;The Future of Privacy: How Governments Shape Your Digital Life&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Black and white photo of a street post at night. The street post has some ripped stickers on it and a stencilled graffiti saying Big Data is Watching You.&#34; src=&#34;../../../../assets/images/the-future-of-privacy/cover.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Photo: ev / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Data privacy is a vast subject that encompasses so much. Some might think it is a niche focus interesting only a few. But in reality, it is a wide-ranging field influenced by intricate relationships between politics, law, technology, and much more. Further, it affects &lt;strong&gt;everyone&lt;/strong&gt; in one way or another, whether they care about it or not.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;I routinely read articles discussing changes in politics on the advocacy side of data privacy. Then, I read articles talking about changes in regulations on the legal side of data privacy. And then, I see all the articles and guides presenting new tools and privacy features on the tech side of data privacy. Of course, all of this is linked together.&lt;/p&gt; &lt;p&gt;Let&#39;s talk about how politics, law, and technological features are intertwined, all at once.&lt;/p&gt; &lt;h2 id=&#34;privacy-laws-are-always-one-election-away-from-getting-better-or-worse&#34;&gt;Privacy laws are always one election away from getting better, or worse&lt;/h2&gt; &lt;p&gt;Each change in government can have a serious effect on data privacy legislation. Privacy is a politically charged field. For example, authoritarian regimes might want to remove or weaken privacy rights to exert strict control over their population. While democratic governments generally bring more freedom and protections to its citizens, including privacy rights. It&#39;s important to keep in mind who in the past has bettered citizen rights and protections, and who has actively worked to undermine civil rights.&lt;/p&gt; &lt;p&gt;Each time a new government takes power, its values will be put forward and influence legislation in place, or legislation not in place yet. While the Western world has benefited from some improvements in data privacy law for the past few years, we must consider these gains are fragile and protections could get removed or lessened at any time.&lt;/p&gt; &lt;p&gt;Unfortunately, it seems there is currently a political push towards deregulation, mass surveillance, and a focus on corporate gains. This is &lt;strong&gt;extremely worrisome for the future of privacy rights&lt;/strong&gt;, human rights, and individual liberties.&lt;/p&gt; &lt;p&gt;Following politics and advocating for better privacy rights and legislation is essential in improving access to privacy tools and features around the world. Privacy is never politically neutral.&lt;/p&gt; &lt;h2 id=&#34;the-tools-you-use-might-depend-on-government-funding&#34;&gt;The tools you use might depend on government funding&lt;/h2&gt; &lt;p&gt;Many &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;privacy tools&lt;/a&gt; we use depend at least partially on government funding or on other tools which depend on government funding. This is especially true for open-source nonprofit organizations needing some (usually) more stable income, in addition to donations.&lt;/p&gt; &lt;h3 id=&#34;which-privacy-and-security-tools-could-be-impacted&#34;&gt;Which privacy and security tools could be impacted&lt;/h3&gt; &lt;p&gt;One notable example of a privacy-related project receiving government funding is the &lt;a href=&#34;https://www.torproject.org/&#34;&gt;Tor Project&lt;/a&gt;. If this source of funding &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/executive-order-state-department-sideswipes-freedom-tools-threatens-censorship&#34;&gt;were cut off&lt;/a&gt;, the impact on Tor could be quite detrimental, not only to the Tor Project but to all projects relying on Tor as well. Many privacy-focus software are built around the &lt;a href=&#34;https://en.wikipedia.org/wiki/Tor_(network)&#34;&gt;Tor network&lt;/a&gt;. To name only a few, whistleblowing software such as &lt;a href=&#34;https://hushline.app/&#34;&gt;Hush Line&lt;/a&gt; and &lt;a href=&#34;https://securedrop.org/&#34;&gt;SecureDrop&lt;/a&gt; both utilize the Tor network to harden privacy. &lt;a href=&#34;https://briarproject.org/&#34;&gt;Briar&lt;/a&gt;, &lt;a href=&#34;https://cwtch.im/&#34;&gt;Cwtch&lt;/a&gt;, and &lt;a href=&#34;https://simplex.chat/&#34;&gt;SimpleX&lt;/a&gt;, are examples of messaging applications also using Tor to add a layer of security and privacy to communications. &lt;strong&gt;Tor is critical infrastructure&lt;/strong&gt; in the world of data privacy.&lt;/p&gt; &lt;p&gt;Another important project receiving government funding is &lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let&#39;s Encrypt&lt;/a&gt;. Let&#39;s Encrypt is a nonprofit Certificate Authority providing &lt;a href=&#34;https://en.wikipedia.org/wiki/Transport_Layer_Security&#34;&gt;&lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt;&lt;/a&gt; certificates to websites. It is run by the Internet Security Research Group (ISRG), which &lt;a href=&#34;https://www.abetterinternet.org/sponsors/&#34;&gt;receives funding&lt;/a&gt; from the Sovereign Tech Agency, &lt;a href=&#34;https://www.sovereign.tech/faq&#34;&gt;supported by&lt;/a&gt; the German Federal Ministry for Economic Affairs and Climate Action. The ISRG also receives funding from the &lt;a href=&#34;https://www.opentech.fund/&#34;&gt;Open Technology Fund&lt;/a&gt; (OTF), which receives the &lt;a href=&#34;https://www.opentech.fund/about/about-our-funding/&#34;&gt;majority&lt;/a&gt; of its funding from the United States government, through the U.S. Agency for Global Media.&lt;/p&gt; &lt;p&gt;In current events, last month an &lt;a href=&#34;https://web.archive.org/web/20250131165539/https://new.nsf.gov/executive-orders&#34;&gt;executive order&lt;/a&gt; in the United States from the Trump administration led the National Science Foundation (NSF) to &lt;a href=&#34;https://www.npr.org/sections/shots-health-news/2025/01/27/nx-s1-5276342/nsf-freezes-grant-review-trump-executive-orders-dei-science&#34;&gt;freeze grant reviews&lt;/a&gt;. This is currently impacting many important projects in the tech world, &lt;a href=&#34;https://www.linkedin.com/posts/sethmlarson_national-science-foundation-freezes-grant-activity-7290072485423656960-n2eJ/&#34;&gt;including&lt;/a&gt; the Python Software Foundation (PSF). &lt;strong&gt;The repercussions of this freeze could be devastating for many open-source projects, in privacy and beyond.&lt;/strong&gt;&lt;/p&gt; &lt;h3 id=&#34;government-funding-should-support-civil-liberties-and-protections&#34;&gt;Government funding should support civil liberties and protections&lt;/h3&gt; &lt;p&gt;Governments funding nonprofit projects and organizations working on improving human rights, civil liberties, and technological security and safety is a good thing. This can bring an important source of stable income to nonprofit projects that could not stay afloat solely from donations.&lt;/p&gt; &lt;p&gt;However, this dependency can become precarious when governments aren&#39;t working for the good of the people anymore, and when organizations rely too heavily on such support, making them vulnerable to change in power. Such a change of regime can have devastating repercussions on the privacy tools we use.&lt;/p&gt; &lt;h2 id=&#34;the-gdpr-gave-you-deletion-features-in-your-apps&#34;&gt;The &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; gave you deletion features in your apps&lt;/h2&gt; &lt;p&gt;On the good side of regulatory influence, there are regulations like the &lt;a href=&#34;https://gdpr-info.eu/&#34;&gt;General Data Protection Regulation&lt;/a&gt; (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;). Saying the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; revolutionized the world of data privacy would not be an overstatement. While many privacy regulations pre-date the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;, in the Western world none had the scope nor the grit the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; has.&lt;/p&gt; &lt;h3 id=&#34;what-is-the-gdpr&#34;&gt;What is the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;&lt;/h3&gt; &lt;p&gt;The &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; is a data privacy regulation that was adopted by the European Union (EU) in 2016 and became effective in May 2018. Its scope encompasses all the EU member states as well as all the countries part of the European Economic Area (&lt;abbr title=&#34;European Economic Area&#34;&gt;EEA&lt;/abbr&gt;), which together count 30 countries to this day. The United Kingdom also uses an &lt;a href=&#34;https://www.gdpreu.org/differences-between-the-uk-and-eu-gdpr-regulations/&#34;&gt;amended version&lt;/a&gt; of the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; post-Brexit.&lt;/p&gt; &lt;p&gt;However, the reach of the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; isn&#39;t limited to Europe. Every organization based &lt;em&gt;outside the EU&lt;/em&gt; that is offering goods or services to, or is monitoring the behavior of, individuals located in the EU &lt;a href=&#34;https://commission.europa.eu/law/law-topic/data-protection/rules-business-and-organisations/application-regulation/who-does-data-protection-law-apply_en&#34;&gt;must comply&lt;/a&gt; as well. This means that &lt;strong&gt;most organizations operating worldwide, regardless of where they are located in the world, must comply&lt;/strong&gt; with the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;.&lt;/p&gt; &lt;p&gt;As is often the case with data privacy laws, it took a few years before &lt;a href=&#34;https://www.gdprsummary.com/gdpr-definitions/data-subject/&#34;&gt;Data Subjects&lt;/a&gt; (your legal designation under the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;) noticed any concrete changes. One change that has become prominent in the past few years, and is likely a direct product of the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;, is data deletion features within apps and accounts.&lt;/p&gt; &lt;h3 id=&#34;what-does-the-gdpr-have-to-do-with-data-deletion-features&#34;&gt;What does the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; have to do with data deletion features&lt;/h3&gt; &lt;p&gt;An important right granted by the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; to Data Subjects is the &lt;a href=&#34;https://gdpr-info.eu/art-17-gdpr/&#34;&gt;Right to Erasure&lt;/a&gt; (or the Right to be Forgotten). Other legislation such as the &lt;a href=&#34;https://www.oag.ca.gov/privacy/ccpa&#34;&gt;California Consumer Privacy Act&lt;/a&gt; (CCPA) calls for a similar right, the &lt;em&gt;Right to Delete&lt;/em&gt;. This and similar rights have existed before, but through the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; and its enforcement it has affected technology in a much broader and impactful way.&lt;/p&gt; &lt;p&gt;Slowly since 2018, applications requiring accounts have started to implement data deletion and account deletion features within the account itself. A probable reason for this is that due to the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;, and a now &lt;a href=&#34;https://iapp.org/resources/article/us-state-privacy-legislation-tracker/&#34;&gt;growing number&lt;/a&gt; of privacy regulations from various states in the United States, organizations are obligated to respond to Data Subject &lt;a href=&#34;https://www.gdprsummary.com/data-subject-rights/&#34;&gt;requests&lt;/a&gt; to get their personal data deleted. Managing this can be quite cumbersome for organizations. The burden of answering and implementing each data deletion request manually is often not worth the value of the data itself. Organizations with enough resources have simply added it as an internal product feature. This makes data deletion requests manageable by each Data Subject themselves (at least partially), freeing the organization from legally having to answer each individual request. When implemented properly, this is what we can call a win-win situation.&lt;/p&gt; &lt;div class=&#34;admonition tip&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Request to delete&lt;/p&gt; &lt;p&gt;Unfortunately, not all applications have integrated automatic deletion features internally (yet). Additionally, some applications and accounts will allow you to delete information only partially this way.&lt;/p&gt; &lt;p&gt;If you wish to exercise or have questions related to your Right to Erasure or Right to Delete, first consult your local privacy regulation to check if you have this right as a &lt;em&gt;Data Subject&lt;/em&gt;, &lt;em&gt;Individual,&lt;/em&gt; or &lt;em&gt;Consumer&lt;/em&gt;. Then, you can contact the organization&#39;s &lt;em&gt;Privacy Officer&lt;/em&gt; with your request. You can usually find information about an organization&#39;s designated &lt;em&gt;Privacy Officer&lt;/em&gt; by reading its privacy policy or privacy notice. In any case, it never hurts to ask.&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;chat-control-wants-to-break-end-to-end-encryption&#34;&gt;Chat Control wants to break end-to-end encryption&lt;/h2&gt; &lt;p&gt;If you are not European, please bear with me. First, everyone outside of Europe should care about what is happening in Europe, regardless. But even if you don&#39;t care, you should know &lt;strong&gt;this kind of mass surveillance proposition will inevitably leak west&lt;/strong&gt;, and if adopted will affect us all globally.&lt;/p&gt; &lt;h3 id=&#34;what-is-chat-control&#34;&gt;What is Chat Control&lt;/h3&gt; &lt;p&gt;In 2021, the EU &lt;a href=&#34;https://www.patrick-breyer.de/en/chatcontrol-european-parliament-approves-mass-surveillance-of-private-communications/&#34;&gt;approved a derogation&lt;/a&gt; to the &lt;a href=&#34;https://en.wikipedia.org/wiki/EPrivacy_Directive&#34;&gt;ePrivacy Directive&lt;/a&gt; to allow communication service providers to scan all exchanged messages to detect child sexual abuse material (CSAM). Although this first derogation was not mandatory, some policymakers kept pushing with new propositions.&lt;/p&gt; &lt;p&gt;A year later, a &lt;a href=&#34;https://edri.org/wp-content/uploads/2022/10/EDRi-Position-Paper-CSAR-short.pdf&#34;&gt;new regulation&lt;/a&gt; (CSAR) was proposed by the European Commissioner for Home Affairs to make scanning messages for CSAM &lt;em&gt;mandatory&lt;/em&gt; for all EU countries, and also allow them to &lt;strong&gt;break end-to-end encryption&lt;/strong&gt;. In 2023, the UK passed a similar legislation called the &lt;a href=&#34;https://hackaday.com/2023/10/29/the-uk-online-safety-bill-becomes-law-what-does-it-mean/&#34;&gt;Online Safety Act&lt;/a&gt;. These types of messaging mass scanning regulations have been called by critics &lt;em&gt;Chat Control&lt;/em&gt;.&lt;/p&gt; &lt;h3 id=&#34;why-is-chat-control-horrible-for-privacy-and-for-children&#34;&gt;Why is Chat Control horrible for privacy, and for children&lt;/h3&gt; &lt;p&gt;Such legislation might sound like a noble cause at first, but consider this: Scanning all messages exchanged for any reason treats everyone like a criminal, no matter what. &lt;strong&gt;This is not hunting criminals, this is mass surveillance.&lt;/strong&gt; Not only is this horrifying for privacy rights, but it also endangers democracy. Once a system to mass monitor all written communications is implemented to (supposedly) stop CSAM, new topics to detect, block, and report could be added anytime, and by any future governments. There is nothing that would prevent much less reasonable topics from being added to the list to be filtered out at a later date.&lt;/p&gt; &lt;p&gt;Chat Control would hurt everyone, &lt;a href=&#34;https://digitalcommons.law.uw.edu/wlr/vol99/iss1/9/&#34;&gt;including the children&lt;/a&gt;. Not only would mass scanning of all messages be &lt;a href=&#34;https://volteuropa.org/news/chat-control-wont-protect-children&#34;&gt;ineffective&lt;/a&gt; at reducing CSAM, but it would endanger the children even further by also scanning their communications. Because yes, children also communicate online. Parents also communicate sensitive information about their children online, with trusted family or doctors. All this data would get scanned and collected, only &lt;a href=&#34;https://techcrunch.com/2025/01/28/powerschool-begins-notifying-students-and-teachers-after-massive-data-breach/&#34;&gt;one breach away&lt;/a&gt; from being made public.&lt;/p&gt; &lt;p&gt;&lt;em&gt;Protecting the children&lt;/em&gt; is a pretext regularly used to implement abusive regulations undermining individual liberties and protections. Do not get fooled by this demagogic stratagem. &lt;strong&gt;Chat Control is the opposite of protecting the children.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Chat Control would only lead to destroying the end-to-end encryption messaging features that are protecting us and the children so well already. Criminals exploiting children would simply move to underground channels, unbothered.&lt;/p&gt; &lt;h3 id=&#34;who-opposes-chat-control&#34;&gt;Who opposes Chat Control&lt;/h3&gt; &lt;p&gt;Thankfully, opposition from experts and advocates alike has been strong. To name only a few, Meredith Whittaker, president of the Signal Foundation which develops the messaging app &lt;a href=&#34;https://signal.org/&#34;&gt;Signal&lt;/a&gt;, has taken &lt;a href=&#34;https://signal.org/blog/uk-online-safety-bill/&#34;&gt;a clear stand&lt;/a&gt; against Chat Control. The Electronic Frontier Foundation has also &lt;a href=&#34;https://www.eff.org/deeplinks/2024/06/now-eu-council-should-finally-understand-no-one-wants-chat-control&#34;&gt;firmly opposed&lt;/a&gt; Chat Control legislation. In the UK, the Open Rights Group has led &lt;a href=&#34;https://www.openrightsgroup.org/campaign/save-encryption/&#34;&gt;powerful campaigns&lt;/a&gt; to fight against the Online Safety Act. In Europe, privacy advocacy organization &lt;a href=&#34;https://noyb.eu/en/noyb-files-complaint-against-eu-commission-over-targeted-chat-control-ads&#34;&gt;noyb&lt;/a&gt; and former Member of the European Parliament Patrick Breyer have both been fervent defenders of privacy rights &lt;a href=&#34;https://www.patrick-breyer.de/en/posts/messaging-and-chat-control/&#34;&gt;raising relentless resistance&lt;/a&gt; to Chat Control.&lt;/p&gt; &lt;p&gt;Harmful policies such as Chat Control are a direct example of how politics can affect laws that can cause &lt;strong&gt;unimaginable damage&lt;/strong&gt; to the privacy-preserving technologies we use every day.&lt;/p&gt; &lt;h2 id=&#34;age-verification-wants-to-collect-your-sensitive-data&#34;&gt;Age Verification wants to collect your sensitive data&lt;/h2&gt; &lt;p&gt;Another potent example of the &lt;em&gt;protecting-the-children stratagem&lt;/em&gt; to undermine privacy rights is &lt;a href=&#34;https://www.jonaharagon.com/posts/age-verification-is-incompatible-with-the-internet/&#34;&gt;Age Verification legislation&lt;/a&gt;. In the past few years, this idea of controlling which online content should be accessible to children has raised new proposals around the world.&lt;/p&gt; &lt;p&gt;Age Verification policies generally start with the premise that some content should not be accessible to children online. Again, this could seem like a reasonable idea at first. Nobody would debate that children should be shielded from some type of content. Sadly, we have all witnessed how horrifying the internet can be at times. However, both the premise and methodology to achieve this goal are wrong.&lt;/p&gt; &lt;h3 id=&#34;who-will-decide-what-content-should-be-walled-online&#34;&gt;Who will decide what content should be walled online?&lt;/h3&gt; &lt;p&gt;First, even putting aside the fact that there is plenty of disturbing content accessible &lt;em&gt;outside&lt;/em&gt; the internet (newspapers, television, movies, radio, advertising, etc.), who would be &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/impact-age-verification-measures-goes-beyond-porn-sites&#34;&gt;the deciders&lt;/a&gt; of which specific content can be accessed by children or not? This can be extremely problematic, to say the least.&lt;/p&gt; &lt;p&gt;There is no objective measure to decide on this, and what might be deemed appropriate by one might not be by another. More importantly in the context of our discussion, what one government might judge appropriate might be very different from the next or previous administration.&lt;/p&gt; &lt;p&gt;This is again &lt;strong&gt;a dangerous slippery slope opening the door wide to authoritarian policies&lt;/strong&gt;.&lt;/p&gt; &lt;h3 id=&#34;age-verification-undermines-privacy-and-security&#34;&gt;Age Verification undermines privacy and security&lt;/h3&gt; &lt;p&gt;Secondly, &lt;a href=&#34;https://www.woodhullfoundation.org/fact-checked/online-age-verification-is-not-the-same-as-flashing-your-id-at-a-liquor-store/&#34;&gt;how can age be verified online&lt;/a&gt;? Of course by collecting more data, on everyone. Age Verification policies don&#39;t affect only the children, they affect everyone who wants to access content online. If a website is deemed to display content that should not be accessed by children, the only way to enforce this rule would be to ask for some form of official identity verification from all adults who want to access it.&lt;/p&gt; &lt;p&gt;Proponents of these regulations often refer to &#34;age assurance processes&#34; and suppose these processes to be undoubtedly secure. Anyone familiar with data security will understand how naive this approach is. I will not go into the details here, but you probably can already see how having each private website (or third-party processor) collect such sensitive information from each visitor is horrendous for privacy rights, and data security as well. Of course, these websites or third-party &#34;age assurance processors&#34; will unavoidably become a large treasure trove for thieves, and their sensitive data will be &lt;a href=&#34;https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/&#34;&gt;inevitably leaked or stolen&lt;/a&gt; sooner rather than later.&lt;/p&gt; &lt;p&gt;Age Verification is one of the biggest privacy threats online. Continuing in this direction could ultimately lead to the end of pseudonymous browsing. Additionally, this could also mean the end of your official ID having any value at all. After all, what unique identification value does a piece of ID keep after it has been leaked in a thousand different data breaches? Maybe even one day bought on a &lt;a href=&#34;https://en.wikipedia.org/wiki/Darknet_market&#34;&gt;darknet market&lt;/a&gt; by a curious teenager in need of accessing some website...&lt;/p&gt; &lt;h3 id=&#34;age-verification-is-already-here-sadly&#34;&gt;Age Verification is already here, sadly&lt;/h3&gt; &lt;p&gt;Regrettably, this is not a hypothetical scare. Age Verification legislation has already passed in &lt;a href=&#34;https://www.thehindu.com/news/international/what-is-australias-online-safety-amendment-about-explained/article69026251.ece&#34;&gt;Australia&lt;/a&gt;, in the &lt;a href=&#34;https://www.ofcom.org.uk/online-safety/protecting-children/age-checks-to-protect-children-online/&#34;&gt;UK&lt;/a&gt;, as well as in &lt;a href=&#34;https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/&#34;&gt;many U.S. states&lt;/a&gt;. It is also on the table federally in the &lt;a href=&#34;https://www.eff.org/deeplinks/2024/10/eff-new-york-age-verification-threatens-everyones-speech-and-privacy&#34;&gt;United States&lt;/a&gt;, &lt;a href=&#34;https://www.eff.org/deeplinks/2024/09/canadas-leaders-must-reject-overbroad-age-verification-bill&#34;&gt;Canada&lt;/a&gt;, &lt;a href=&#34;https://www.politico.eu/article/france-doubles-down-on-social-media-age-limit-at-15/&#34;&gt;France&lt;/a&gt;, &lt;a href=&#34;https://www.euractiv.com/section/politics/news/norwegian-government-sets-15-year-age-limit-for-using-social-media/&#34;&gt;Norway&lt;/a&gt;, and &lt;a href=&#34;https://digital-strategy.ec.europa.eu/en/funding/call-tenders-development-consultancy-and-support-age-verification-solution&#34;&gt;Europe&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;There is some &lt;a href=&#34;https://www.eff.org/deeplinks/2024/12/global-age-verification-measures-2024-year-review&#34;&gt;tenacious opposition&lt;/a&gt; to Age Verification policies from digital rights and free speech advocates. Unfortunately, there is also a strong push in support of Age Verification from the rapidly growing &#34;age assurance&#34; and identity verification &lt;a href=&#34;https://avpassociation.com/thought-leadership/2025-the-year-of-implementation-for-age-assurance/&#34;&gt;industry&lt;/a&gt;, and from many governments worldwide &lt;strong&gt;moving towards a surveillance state&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;Again, government values are deciding on digital features that impact our data privacy in disastrous ways. If you want to &lt;strong&gt;take a stand against Age Verification&lt;/strong&gt;, you can join the &lt;a href=&#34;https://www.stoponlineidchecks.org/&#34;&gt;Stop Online ID Checks&lt;/a&gt; campaign from the nonprofit organization Fight for the Future.&lt;/p&gt; &lt;h2 id=&#34;the-future-of-privacy&#34;&gt;The future of privacy&lt;/h2&gt; &lt;p&gt;There&#39;s a lot to be worrying about in today&#39;s privacy landscape. Unfortunately, recent political tendencies in the Western world make it difficult to stay optimistic. The trend toward authoritarian regimes and surveillance capitalism is bad news for the future of privacy around the globe.&lt;/p&gt; &lt;p&gt;There is no question that privacy is intrinsically intertwined with politics, and can therefore never be politically neutral. The latest decisions taken by the new U.S. administration running full speed into deregulation and defunding, growing pressure in Europe to break end-to-end encryption in favor of a surveillance state, and invasive age verification policies to censor the web and collect even more data on every netizen is admittedly frightening.&lt;/p&gt; &lt;p&gt;But one thing frightens me even more than all of this. One thing that could end privacy rights, forever. This threat to privacy is never far and always looming.&lt;/p&gt; &lt;p&gt;This threat is giving up.&lt;/p&gt; &lt;p&gt;Despite all the gloom menacing privacy rights, &lt;strong&gt;privacy will never be dead as long as we stand up to defend it&lt;/strong&gt;. Governments might have the power to remove our privacy rights on paper and proclaim privacy features illegal. But the people have the power to keep pushing for better privacy rights and to keep developing even more robust and more accessible privacy tools.&lt;/p&gt; &lt;p&gt;We must continue to advocate loudly for privacy rights and &lt;em&gt;all&lt;/em&gt; human rights every chance we have. The fight for better privacy rights is only over when we give up.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Do not give up.&lt;/strong&gt;&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/02/03/the-future-of-privacy/</link> <pubDate>Thu, 25 Sep 2025 04:09:21 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/02/03/the-future-of-privacy/</guid> </item> <item> <title>Privacy is Also Protecting the Data of Others</title> <author>Em</author> <category>Explainers</category> <description>&lt;h1 id=&#34;privacy-is-also-protecting-the-data-of-others&#34;&gt;Privacy is Also Protecting the Data of Others&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Illustration from a photo of two children standing in a grass field. The taller child holds a yellow umbrella protecting the smaller child.&#34; src=&#34;../../../../assets/images/the-privacy-of-others/cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Photo: J W / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;In privacy, we talk a lot about how to protect our own data, but what about our responsibility to protect the data of others?&lt;/p&gt; &lt;p&gt;If you care about privacy rights, you must also care for the data of the people around you. To make privacy work, we need to develop a culture that normalizes caring for everyone&#39;s data, not just our own. Privacy cannot solely be a personal responsibility, data privacy is team work.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;Whatever measures and tools you use to protect your own data, you would never be able to protect it fully without the collaboration of others.&lt;/p&gt; &lt;p&gt;In this context, the people around you might be your family or your friends, but also includes your boss, your doctor, your therapist, your school, your government, and any other person or organization that has control over some of your data.&lt;/p&gt; &lt;p&gt;Conversely, you are also in control of other people&#39;s data.&lt;/p&gt; &lt;p&gt;Even if you are not a boss, a doctor, or a therapist yourself, you probably have some photos of your friends, a list of contact information, and copies of sensitive conversations exchanged in private messages with your family. All of this data is under your guard too.&lt;/p&gt; &lt;p&gt;Once you have control over someone else&#39;s data, &lt;strong&gt;you become its guardian&lt;/strong&gt;.&lt;/p&gt; &lt;h2 id=&#34;data-protection-is-a-communal-responsibility&#34;&gt;Data protection is a communal responsibility&lt;/h2&gt; &lt;p&gt;Now to be clear, this isn&#39;t necessarily in relationship with the law, although it can be part of it. In this context, I am referring more to ethics. Do we have a moral obligation to care for and protect others to at least the same level we wish to be protected ourselves?&lt;/p&gt; &lt;p&gt;As a connected society, we constantly exchange information with each other. This information is now mostly stored on digital mediums, and can be very easily duplicated and shared elsewhere. Actually, on a technical level, it&#39;s even &lt;em&gt;difficult&lt;/em&gt; not to constantly involuntarily create duplicates of this data and send it elsewhere.&lt;/p&gt; &lt;p&gt;This is why &lt;strong&gt;we must increase our vigilance&lt;/strong&gt; about protecting the data of others.&lt;/p&gt; &lt;p&gt;Considering the quantity of data that ends up in everyone&#39;s possession, data has become a communal responsibility.&lt;/p&gt; &lt;h2 id=&#34;we-must-develop-a-culture-that-normalizes-data-privacy&#34;&gt;We must develop a culture that normalizes data privacy&lt;/h2&gt; &lt;p&gt;Privacy is a human right, and a good starting point to protect any human right is legislation. Legislation is undeniably an aspect of data privacy that is in constant evolution, and we can hope that privacy laws will only get better over time. Well, let&#39;s not just hope, let&#39;s also work to make sure it does.&lt;/p&gt; &lt;p&gt;That being said, &lt;strong&gt;laws simply aren&#39;t enough&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;To truly improve data privacy rights, we &lt;em&gt;must&lt;/em&gt; integrate them into our &lt;em&gt;whole culture&lt;/em&gt;. This might sound like an over-ambitious endeavor, but culture is flexible and evolves with people&#39;s needs.&lt;/p&gt; &lt;p&gt;In the past few decades, our culture and customs have begun to shift &lt;em&gt;against&lt;/em&gt; data privacy. Some of us are old enough to remember a time when everyone didn&#39;t have a camera in their pocket. At that time, it would have been considered unacceptable in most places to suddenly point a recording camera at a stranger in the street and start filming them without any explanation and without their consent.&lt;/p&gt; &lt;p&gt;Now this kind of disrespectful behavior is a common occurrence, because everyone has the tool to do it. Our society evolved with technological tools, but &lt;strong&gt;we neglected to course-correct our culture for it&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;We have reached a point where we need to develop a culture of individual responsibility towards each other&#39;s data.&lt;/p&gt; &lt;p&gt;This means caring not just for our own data, but &lt;strong&gt;caring for everyone&#39;s data&lt;/strong&gt;, whether it&#39;s the data of our friends, our family, our employees, our patients, or even complete strangers in the streets, or online.&lt;/p&gt; &lt;p&gt;This will take a lot of time and effort, but we owe it to the next generations to start now.&lt;/p&gt; &lt;h2 id=&#34;the-principles-we-should-consider-in-relation-to-privacy&#34;&gt;The principles we should consider in relation to privacy&lt;/h2&gt; &lt;p&gt;Our society already has adopted or improved many ethical principles in the past decades that are intimately linked to data privacy.&lt;/p&gt; &lt;p&gt;Some of these principles and values have become much more prevalent in our culture recently, consent being one great example for this.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Consent&lt;/strong&gt; in privacy is incredibly important. What one person might feel comfortable sharing publicly might be completely different from another person, for example. Privacy cannot be established on a fixed basis without considering individuality and circumstances.&lt;/p&gt; &lt;p&gt;Someone might be happy sharing their name on social media, and someone else might safeguard this information and only use pseudonyms. One person might feel safe sharing their home address online, yet another person could be killed for doing this.&lt;/p&gt; &lt;p&gt;This is why &lt;em&gt;informed&lt;/em&gt; and &lt;em&gt;explicit&lt;/em&gt; individual consent (with true choices) should always be the center of such decisions, for any type of personal information.&lt;/p&gt; &lt;p&gt;Other principles we must integrate in our culture of data privacy include &lt;strong&gt;empathy&lt;/strong&gt; (my threat model isn&#39;t your threat model), &lt;strong&gt;trust and respect&lt;/strong&gt; (secure this data properly if you must collect it), &lt;strong&gt;safety&lt;/strong&gt; (consider someone could get severely harmed by a data breach), and &lt;strong&gt;individual liberties&lt;/strong&gt; (sharing data must be a personal choice, even if there&#39;s no danger, it&#39;s still valid even if it&#39;s just a preference).&lt;/p&gt; &lt;p&gt;Of course, these are only a few principles indispensable to build a culture of data privacy, but since most people are already familiar with these we&#39;ll start here.&lt;/p&gt; &lt;h2 id=&#34;how-we-can-start-building-a-better-culture-around-data-privacy&#34;&gt;How we can start building a better culture around data privacy&lt;/h2&gt; &lt;p&gt;So, what concrete actions can we take &lt;em&gt;right now&lt;/em&gt; to improve our culture around data privacy? What can we do today at the individual level to start better protecting the data of others?&lt;/p&gt; &lt;p&gt;Here are a few practices you can adopt in your daily life to improve the data of the people around you. However, I insist you not just demand others do this for you, but &lt;strong&gt;do this for others too&lt;/strong&gt;. Re-shaping our culture needs to start with ourselves:&lt;/p&gt; &lt;h3 id=&#34;ask-for-consent-before-sharingposting-photos&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M1.2 4.47 2.5 3.2 20 20.72 18.73 22l-2-2H4a2 2 0 0 1-2-2V6c0-.22.04-.43.1-.63zM7 4l2-2h6l2 2h3a2 2 0 0 1 2 2v12c0 .6-.26 1.13-.68 1.5l-4.99-5c.43-.73.67-1.59.67-2.5a5 5 0 0 0-5-5c-.91 0-1.77.24-2.5.67L5.82 4zm0 8a5 5 0 0 0 5 5c.5 0 1.03-.08 1.5-.23L11.72 15A3.064 3.064 0 0 1 9 12.28L7.23 10.5c-.15.47-.23 1-.23 1.5m5-3a3 3 0 0 1 3 3 3 3 0 0 1-.17 1L11 9.17A3 3 0 0 1 12 9&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Ask for consent before sharing/posting photos&lt;/h3&gt; &lt;p&gt;Do not post photos of people online without their prior consent. Especially if there are children involved! Before sharing photos of others online, &lt;em&gt;always&lt;/em&gt; ask for their consent first.&lt;/p&gt; &lt;h3 id=&#34;be-mindful-when-sharing-photos-of-protests&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M9 11.75A1.25 1.25 0 0 0 7.75 13 1.25 1.25 0 0 0 9 14.25 1.25 1.25 0 0 0 10.25 13 1.25 1.25 0 0 0 9 11.75m6 0A1.25 1.25 0 0 0 13.75 13 1.25 1.25 0 0 0 15 14.25 1.25 1.25 0 0 0 16.25 13 1.25 1.25 0 0 0 15 11.75M12 2A10 10 0 0 0 2 12a10 10 0 0 0 10 10 10 10 0 0 0 10-10A10 10 0 0 0 12 2m0 18a8 8 0 0 1-8-8 4 4 0 0 1 0-.86 10.05 10.05 0 0 0 5.26-5.37A9.99 9.99 0 0 0 17.42 10c.76 0 1.51-.09 2.25-.26 1.25 4.26-1.17 8.69-5.41 9.93-.76.22-1.5.33-2.26.33M0 2a2 2 0 0 1 2-2h4v2H2v4H0zm24 20a2 2 0 0 1-2 2h-4v-2h4v-4h2zM2 24a2 2 0 0 1-2-2v-4h2v4h4v2zM22 0a2 2 0 0 1 2 2v4h-2V2h-4V0z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Be mindful when sharing photos of protests&lt;/h3&gt; &lt;p&gt;Be very careful when &lt;a href=&#34;https://www.privacyguides.org/articles/2025/01/23/activists-guide-securing-your-smartphone/&#34;&gt;taking pictures during a protest&lt;/a&gt;. There&#39;s a lot of nuance to this because it&#39;s also important to show protests and make them known (that&#39;s usually the goal!), but in some circumstances people might be put in danger if their faces are shown online associated with certain causes.&lt;/p&gt; &lt;p&gt;Be mindful and make sure no one is singled out without consent in your pictures if you post them online. When possible, try to blur/block the faces of the people you couldn&#39;t ask for consent.&lt;/p&gt; &lt;h3 id=&#34;blur-license-plates&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m5 11 1.5-4.5h11L19 11m-1.5 5a1.5 1.5 0 0 1-1.5-1.5 1.5 1.5 0 0 1 1.5-1.5 1.5 1.5 0 0 1 1.5 1.5 1.5 1.5 0 0 1-1.5 1.5m-11 0A1.5 1.5 0 0 1 5 14.5 1.5 1.5 0 0 1 6.5 13 1.5 1.5 0 0 1 8 14.5 1.5 1.5 0 0 1 6.5 16M18.92 6c-.2-.58-.76-1-1.42-1h-11c-.66 0-1.22.42-1.42 1L3 12v8a1 1 0 0 0 1 1h1a1 1 0 0 0 1-1v-1h12v1a1 1 0 0 0 1 1h1a1 1 0 0 0 1-1v-8z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Blur license plates&lt;/h3&gt; &lt;p&gt;When taking photos in the streets and posting them online, be mindful to blur license plates. This might sound extreme but imagine a situation where someone is a victim of domestic violence and their abuser sees their car parked at a shelter, or at someone&#39;s place. This information could literally get someone killed. Always keep in mind different people have different &lt;a href=&#34;https://www.privacyguides.org/en/basics/threat-modeling/&#34;&gt;threat models&lt;/a&gt;.&lt;/p&gt; &lt;h3 id=&#34;safeguard-contact-information&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20 0H4v2h16zM4 24h16v-2H4zM20 4H4a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V6a2 2 0 0 0-2-2m-8 2.75A2.25 2.25 0 0 1 14.25 9 2.25 2.25 0 0 1 12 11.25 2.25 2.25 0 0 1 9.75 9 2.25 2.25 0 0 1 12 6.75M17 17H7v-1.5c0-1.67 3.33-2.5 5-2.5s5 .83 5 2.5z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Safeguard contact information&lt;/h3&gt; &lt;p&gt;Never share the contact information of someone with someone else (or something else) without their prior explicit consent. This includes email addresses, phone numbers, legal names, locations, photos, and &lt;em&gt;especially&lt;/em&gt; home addresses. This information in the wrong hands could literally get someone killed. &lt;strong&gt;Always ask first!&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Additionally, be vigilant when importing your contact list in a new application. This could get it shared further than you intended. Ideally, always keep your contact list in an end-to-end encrypted application only.&lt;/p&gt; &lt;h3 id=&#34;be-careful-when-sharing-files-from-and-with-others&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M17 18c.56 0 1 .44 1 1s-.44 1-1 1-1-.44-1-1 .44-1 1-1m0-3c-2.73 0-5.06 1.66-6 4 .94 2.34 3.27 4 6 4s5.06-1.66 6-4c-.94-2.34-3.27-4-6-4m0 6.5a2.5 2.5 0 0 1-2.5-2.5 2.5 2.5 0 0 1 2.5-2.5 2.5 2.5 0 0 1 2.5 2.5 2.5 2.5 0 0 1-2.5 2.5m-7.86-1.75L8.85 19l.29-.74C10.43 15.06 13.5 13 17 13c1.05 0 2.06.21 3 .56V8l-6-6H6c-1.11 0-2 .89-2 2v16a2 2 0 0 0 2 2h4.5c-.55-.66-1-1.42-1.36-2.25M13 3.5 18.5 9H13z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Be careful when sharing files from and with others&lt;/h3&gt; &lt;p&gt;If someone trusted you with a file (photo, music, video, PDF, text file, etc.), always ask for consent before sharing this file with someone else.&lt;/p&gt; &lt;p&gt;Additionally, always keep this file only locally or stored in a secure end-to-end encrypted service. If this person gives you consent to share this file, ensure that metadata has been &lt;a href=&#34;https://www.privacyguides.org/en/data-redaction/&#34;&gt;removed&lt;/a&gt; from it. This person might not be aware of the metadata on this file.&lt;/p&gt; &lt;h3 id=&#34;keep-confidences-secret&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m12 21.35-1.45-1.32C5.4 15.36 2 12.27 2 8.5 2 5.41 4.42 3 7.5 3c1.74 0 3.41.81 4.5 2.08C13.09 3.81 14.76 3 16.5 3 19.58 3 22 5.41 22 8.5c0 3.77-3.4 6.86-8.55 11.53z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Keep confidences secret&lt;/h3&gt; &lt;p&gt;If someone trusts you enough to share something personal with you, do not betray that trust by talking about it with someone else, and &lt;em&gt;especially&lt;/em&gt; not on unencrypted services such as Gmail or Twitter&#39;s DM. In doing so, you would expose this secret to even more unintended recipients. Respect people&#39;s trust in you. Do not share confidences.&lt;/p&gt; &lt;h3 id=&#34;safeguard-and-delete-private-messages-on-social-media&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20 2H4a2 2 0 0 0-2 2v18l4-4h14a2 2 0 0 0 2-2V4a2 2 0 0 0-2-2M6 9h12v2H6m8 3H6v-2h8m4-4H6V6h12&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Safeguard and delete private messages on social media&lt;/h3&gt; &lt;p&gt;If you have private conversations on social media, be mindful not to spread this information elsewhere. If you delete your account, be mindful to also &lt;a href=&#34;https://docs.cyd.social/docs/x/delete#delete-my-direct-messages&#34;&gt;delete&lt;/a&gt; the information of others you have stored in your private messages. If someone wants to share sensitive information with you, always invite them to move to an end-to-end encrypted &lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/&#34;&gt;messaging service&lt;/a&gt; instead.&lt;/p&gt; &lt;h3 id=&#34;safeguard-and-delete-intimate-pictures-you-received&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M5 3h14a2 2 0 0 1 2 2v14a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2m7 14 .72-.66C15.3 14 17 12.46 17 10.57c0-1.54-1.21-2.75-2.75-2.75-.87 0-1.7.41-2.25 1.05a3 3 0 0 0-2.25-1.05C8.21 7.82 7 9.03 7 10.57c0 1.89 1.7 3.43 4.28 5.77z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Safeguard and delete intimate pictures you received&lt;/h3&gt; &lt;p&gt;If someone trust you enough to send you intimate photos of themselves, take this responsibility &lt;em&gt;extremely&lt;/em&gt; seriously. If they use an end-to-end encrypted service, do not move the photos out of there. If you do, you could inadvertently upload them to an unencrypted service and compromise the security of these pictures.&lt;/p&gt; &lt;p&gt;If your relationship with this person ends, you &lt;em&gt;should&lt;/em&gt; delete all intimate pictures you have received. This is extremely important for their safety, and also possibly for &lt;em&gt;yours&lt;/em&gt;. Things could get very problematic legally if your copies were to get accidentally leaked or stolen. No matter how difficult this might be emotionally, do the right thing and delete these pictures fully.&lt;/p&gt; &lt;p&gt;If you are still unconvinced about this one, maybe have a look at Ted Lasso season 3, &lt;a href=&#34;https://screenrant.com/ted-lasso-season-3-episode-8-keeley-story-response/&#34;&gt;episode 8&lt;/a&gt; which has a great story demonstrating the dangers related to this.&lt;/p&gt; &lt;h3 id=&#34;avoid-taking-screenshot-of-peoples-posts&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M7 1a2 2 0 0 0-2 2v18a2 2 0 0 0 2 2h10a2 2 0 0 0 2-2V3a2 2 0 0 0-2-2zm0 3h10v16H7zm2 2v4h1.5V7.5H13V6zm4.5 8v2.5H11V18h4v-4z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Avoid taking screenshot of people&#39;s posts&lt;/h3&gt; &lt;p&gt;Each time you take a screenshot of someone&#39;s post to repost it somewhere else, you are effectively removing this person&#39;s ability to delete their content later. This is horrible for privacy &lt;em&gt;and&lt;/em&gt; for consent. Instead, use links to other people&#39;s posts. That way, if they decide later to delete their content, the link will simply not work anymore, but their right to deletion will remain intact.&lt;/p&gt; &lt;h3 id=&#34;notify-guests-if-you-are-using-a-smart-speaker&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 2A10 10 0 0 0 2 12a10 10 0 0 0 10 10 10 10 0 0 0 10-10A10 10 0 0 0 12 2m0 7a3 3 0 0 1 3 3 3 3 0 0 1-3 3 3 3 0 0 1-3-3 3 3 0 0 1 3-3&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Notify guests if you are using a smart speaker&lt;/h3&gt; &lt;p&gt;If you are using a smart speaker device in your home such as Amazon&#39;s Echo (Alexa), Apple&#39;s HomePod (Siri), Google&#39;s Nest, inform your guests about it when they enter your home. These devices have the &lt;a href=&#34;https://www.makeuseof.com/tag/alexa-amazon-echo-privacy-risk/&#34;&gt;capacity&lt;/a&gt; to record all conversations, and there has already been instances of accidental privacy invasion &lt;a href=&#34;https://www.cnet.com/home/smart-home/alexa-sent-private-audio-to-a-random-contact-portland-family-says/&#34;&gt;reported&lt;/a&gt; about this. Even if you don&#39;t mind yourself, offer your guests to &lt;em&gt;unplug&lt;/em&gt; your smart speaker while they are visiting you. The same is valid for any voice assistant on your phone.&lt;/p&gt; &lt;h3 id=&#34;do-not-use-windows-recall-or-anything-similar&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M11.83 9 15 12.16V12a3 3 0 0 0-3-3zm-4.3.8 1.55 1.55c-.05.21-.08.42-.08.65a3 3 0 0 0 3 3c.22 0 .44-.03.65-.08l1.55 1.55c-.67.33-1.41.53-2.2.53a5 5 0 0 1-5-5c0-.79.2-1.53.53-2.2M2 4.27l2.28 2.28.45.45C3.08 8.3 1.78 10 1 12c1.73 4.39 6 7.5 11 7.5 1.55 0 3.03-.3 4.38-.84l.43.42L19.73 22 21 20.73 3.27 3M12 7a5 5 0 0 1 5 5c0 .64-.13 1.26-.36 1.82l2.93 2.93c1.5-1.25 2.7-2.89 3.43-4.75-1.73-4.39-6-7.5-11-7.5-1.4 0-2.74.25-4 .7l2.17 2.15C10.74 7.13 11.35 7 12 7&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Do not use Windows Recall (or anything similar)&lt;/h3&gt; &lt;p&gt;If you are a Microsoft user, make sure to &lt;a href=&#34;https://www.ytechb.com/how-to-uninstall-microsoft-recall-in-windows-11/&#34;&gt;&lt;em&gt;disable&lt;/em&gt;&lt;/a&gt; Windows Recall from your computer. If it&#39;s enabled, this application will &lt;a href=&#34;https://www.theverge.com/2024/6/3/24170305/microsoft-windows-recall-ai-screenshots-security-privacy-issues&#34;&gt;continuously&lt;/a&gt; take screenshots of your computer, including the faces of anyone video-chatting with you on Signal, the email content of anyone contacting your through Tuta Mail, the secrets of anyone chatting with you on Matrix. Windows Recall completely defeats the protections of anyone using end-to-end encryption to contact you. This is a huge breach of trust! If you somehow use this feature, at least be mindful to disable it each time you communicate with others.&lt;/p&gt; &lt;h3 id=&#34;dont-use-metas-ray-ban-ai-glasses&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 576 512&#34;&gt;&lt;!--! Font Awesome Free 7.1.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2025 Fonticons, Inc.--&gt;&lt;path d=&#34;M143.3 96c-14 0-26.5 9.2-30.6 22.6L70.4 256H224c17.7 0 32 14.3 32 32h64c0-17.7 14.3-32 32-32h153.6l-42.3-137.4c-4.1-13.4-16.5-22.6-30.6-22.6H400c-17.7 0-32-14.3-32-32s14.3-32 32-32h32.7c42.1 0 79.4 27.5 91.8 67.8l45.4 147.5c4.1 13.2 6.1 26.9 6.1 40.7v96c0 53-43 96-96 96h-64c-53 0-96-43-96-96v-32h-64v32c0 53-43 96-96 96H96c-53 0-96-43-96-96v-96c0-13.8 2.1-27.5 6.1-40.7L51.5 99.8C63.9 59.5 101.1 32 143.3 32H176c17.7 0 32 14.3 32 32s-14.3 32-32 32zM64 320v64c0 17.7 14.3 32 32 32h64c17.7 0 32-14.3 32-32v-64zm416 96c17.7 0 32-14.3 32-32v-64H384v64c0 17.7 14.3 32 32 32z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Don&#39;t use Meta&#39;s Ray-Ban &#34;AI&#34; glasses!&lt;/h3&gt; &lt;p&gt;Don&#39;t use &#34;smart&#34; glasses recording people.&lt;/p&gt; &lt;p&gt;Just don&#39;t.&lt;/p&gt; &lt;p&gt;Ever.&lt;/p&gt; &lt;p&gt;This is &lt;em&gt;extremely&lt;/em&gt; creepy.&lt;/p&gt; &lt;p&gt;Never buy nor use this.&lt;/p&gt; &lt;p&gt;If you encounter someone in the street wearing this, run away.&lt;/p&gt; &lt;h2 id=&#34;this-is-only-a-start-but-together-we-can-do-this&#34;&gt;This is only a start, but together we can do this&lt;/h2&gt; &lt;p&gt;Improving our culture around data privacy will take time and effort, but we have to start now. The best place to start is with yourself.&lt;/p&gt; &lt;p&gt;Remember:&lt;/p&gt; &lt;p&gt;&#34;Be the change you wish to see in the world.&#34;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Be the data protector you wish to see in the world.&lt;/strong&gt;&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/03/10/the-privacy-of-others/</link> <pubDate>Thu, 25 Sep 2025 04:09:21 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/03/10/the-privacy-of-others/</guid> </item> <item> <title>Your Online Life Is IRL</title> <author>Em</author> <category>Opinion</category> <description>&lt;h1 id=&#34;your-online-life-is-irl&#34;&gt;Your Online Life Is IRL&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Photo of an illuminated red street sign with the word Internet on it.&#34; src=&#34;../../../../assets/images/your-online-life-is-irl/irl-cover.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Leon Seibert / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;If you, like myself, have been inhabiting the internet for a few decades, you&#39;re probably familiar with the old adage IRL: In Real Life.&lt;/p&gt; &lt;p&gt;The acronym was used a lot when the distinction between online life and offline life was much greater than it is now. In today&#39;s world, can we really keep referring to our digital life as being somehow disconnected from our &#34;real life&#34;?&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;While it&#39;s true that pseudo-anonymity online is still alive and well, most people don&#39;t hide their real identity online because it&#39;s much different from their personality offline, but generally simply as a protection.&lt;/p&gt; &lt;p&gt;Even when using pseudonyms, online life is still part of &lt;em&gt;real life&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;The proportion of time we spend on the connected world today is also far greater than it was before. We often chat with friends online, work online, communicate with our family online, play games online, assist to events online, go to school online, watch recipe videos online, and so on and so forth.&lt;/p&gt; &lt;h2 id=&#34;our-offline-life-is-happening-and-tracked-online-too&#34;&gt;Our offline life is happening (and tracked) online too&lt;/h2&gt; &lt;p&gt;Another thing that has changed is how much data about what we do offline ends up getting collected and stored &lt;em&gt;online&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;Maybe it&#39;s the places we visit during the day getting &lt;a href=&#34;https://www.pcmag.com/how-to/how-to-get-google-to-quit-tracking-you&#34;&gt;tracked by our phones&lt;/a&gt; and then stored by Google in our profile.&lt;/p&gt; &lt;p&gt;Maybe it&#39;s our &lt;a href=&#34;https://www.lifewire.com/can-alexa-record-conversations-5205324&#34;&gt;smart speaker recording&lt;/a&gt; an intimate conversation and sending it to Amazon.&lt;/p&gt; &lt;p&gt;Completely outside our control, maybe it&#39;s the street cameras, cellular towers, car license readers &lt;a href=&#34;https://www.aclum.org/en/publications/what-you-need-know-about-automatic-license-plate-readers&#34;&gt;tracking our movement&lt;/a&gt; outside as we go about our day.&lt;/p&gt; &lt;p&gt;Or even more dystopian, maybe it&#39;s our &lt;a href=&#34;https://theconversation.com/some-clinicians-are-using-ai-to-write-health-records-what-do-you-need-to-know-237762&#34;&gt;doctor using an AI note-taking app&lt;/a&gt;, sending a copy of our very personal in-person medical consultation to who knows which for-profit company.&lt;/p&gt; &lt;h2 id=&#34;our-digital-lives-and-irl-lives-are-intertwined&#34;&gt;Our digital lives and IRL lives are intertwined&lt;/h2&gt; &lt;p&gt;All this data collected on what we do &lt;em&gt;offline&lt;/em&gt;, can sometimes &lt;a href=&#34;https://epic.org/issues/consumer-privacy/data-brokers/&#34;&gt;get aggregated&lt;/a&gt; together with the data collected on us &lt;em&gt;online&lt;/em&gt;, even while using pseudo-anonymity.&lt;/p&gt; &lt;p&gt;The social media account where we use a pseudonym and cat profile picture to stay anonymous can get aggregated from the same &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address we used to log in another account using our legal name.&lt;/p&gt; &lt;p&gt;Our offline data and our online data often get connected and bundled up together. This is especially concerning with the growing practice of &lt;a href=&#34;https://privacyinternational.org/long-read/5337/social-media-monitoring-uk-invisible-surveillance-tool-increasingly-deployed&#34;&gt;social media monitoring&lt;/a&gt; used by governments and companies.&lt;/p&gt; &lt;h2 id=&#34;what-we-do-online-have-offline-consequences&#34;&gt;What we do online have offline consequences&lt;/h2&gt; &lt;p&gt;Taking this into account, there isn&#39;t a separation between our &lt;em&gt;online&lt;/em&gt; life and &lt;em&gt;offline&lt;/em&gt; life anymore.&lt;/p&gt; &lt;p&gt;What we do online affects what we do offline, and vice versa. All of our life, online and offline, is &lt;em&gt;In Real Life&lt;/em&gt; now.&lt;/p&gt; &lt;p&gt;Our digital life and communications can affect our employment, our dating life, our family life, our housing situation, and even the capacity we have to visit a country &lt;a href=&#34;https://globalnews.ca/news/11090232/french-scientist-denied-us-entry-critical-trump-text-messages/&#34;&gt;or not&lt;/a&gt;.&lt;/p&gt; &lt;h2 id=&#34;the-data-collected-on-us-online-should-be-cared-for-even-more&#34;&gt;The data collected on us online should be cared for even more&lt;/h2&gt; &lt;p&gt;Because there isn&#39;t much separation anymore, we should treat all data collected about us online as sensitive data intrinsically attached to our person.&lt;/p&gt; &lt;p&gt;An invasion of online privacy, of our online life, becomes the same as an invasion of our home, our body, our IRL life. Not only because this data can be used to find our IRL location, identify our person, and have important repercussions offline, but also because all data about us is an essential part of who we are.&lt;/p&gt; &lt;p&gt;It&#39;s not just data points, it&#39;s a part of us.&lt;/p&gt; &lt;p&gt;Considering how the world has evolved in the past decades, and shows no sign of slowing down its greedy appropriation of every single piece of information about us, &lt;strong&gt;we should defend our online lives as fiercely as we would our offline lives&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;We need to fight for a future anchored in human rights, and for this, we need to firmly enforce the principle that &lt;strong&gt;digital rights are fundamental human rights&lt;/strong&gt;.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/05/16/your-online-life-is-irl/</link> <pubDate>Thu, 25 Sep 2025 04:09:21 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/05/16/your-online-life-is-irl/</guid> </item> <item> <title>Ghosts in the Machine: The Fight for Privacy After Death</title> <author>Peter Marsden</author> <category>Opinion</category> <description>&lt;h1 id=&#34;ghosts-in-the-machine-the-fight-for-privacy-after-death&#34;&gt;Ghosts in the Machine: The Fight for Privacy After Death&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;&#34; src=&#34;../../../../assets/images/the-fight-for-privacy-after-death/cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Panyawat Auitpol / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;In the early hours of 6 June 2020, Nicole Smallman and her sister Bibaa Henry had just finished celebrating Bibaa&#39;s birthday with friends in a park in London. Alone and in the dark, they were both &lt;a href=&#34;https://en.wikipedia.org/wiki/Murders_of_Bibaa_Henry_and_Nicole_Smallman&#34;&gt;fatally and repeatedly stabbed&lt;/a&gt; 36 times.&lt;!-- more --&gt;&lt;/p&gt; &lt;div class=&#34;admonition note inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Guest Contributor&lt;/p&gt; &lt;p&gt;Please welcome Peter Marsden as a first-time guest contributor! Privacy Guides does not publish guest posts in exchange for compensation, and this tutorial was independently reviewed by our editorial team prior to publication.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;But the police didn’t just fail them in life—they failed them in death too. PC Deniz Jaffer and PC Jamie Lewis, both of the Metropolitan Police, &lt;a href=&#34;https://www.theguardian.com/uk-news/2021/dec/06/two-met-police-officers-jailed-photos-murdered-sisters-deniz-jaffer-jamie-lewis-nicole-smallman-bibaa-henry&#34;&gt;took selfies&lt;/a&gt; with the dead bodies of the victims, posting them on a WhatsApp group. And no privacy laws prevented them from doing so.&lt;/p&gt; &lt;p&gt;This horrific case is just one in the murky, often sinister realm of posthumous privacy. In the UK, Europe, and across the world, privacy protections for the dead are at best a rarity—and at worst, a deep moral and societal failing that we cannot and must not accept.&lt;/p&gt; &lt;p&gt;Let’s take a step back. The case of the Smallmans starkly draws attention to the denial in death of guarantees to the living.&lt;/p&gt; &lt;div class=&#34;admonition quote inline pullquote&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;This abrupt collapse in privacy rights leaves the deceased and their families &lt;small&gt;[...]&lt;/small&gt; newly vulnerable, and at a time when they are already utterly broken.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;As a &lt;em&gt;Privacy Guides&lt;/em&gt; reader, you are no doubt aware that the UK and Europe have firm privacy protections in &lt;em&gt;The General Data Protection Regulation&lt;/em&gt; (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;) and Article 8 of the &lt;em&gt;European Convention on Human Rights&lt;/em&gt; (ECHR).&lt;/p&gt; &lt;p&gt;However, the picture elsewhere is less clear, with a challenging patchwork of laws and regional statutes being the only protection for those in the US and much of the rest of the world. And once you die? Almost universally, these protections &lt;a href=&#34;https://gdpr-info.eu/recitals/no-27/&#34;&gt;immediately cease&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Here the problem begins. &lt;span class=&#34;pullquote-source&#34;&gt;This abrupt collapse in privacy rights leaves the deceased and their families—like the Smallman family—newly vulnerable, and at a time when they are already utterly broken.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;In the absence of law comes the pursuit of it, against a backdrop of flagrant privacy violations. What this pursuit means, in practical terms, is that two primary categories of posthumous privacy dominate legal debate: the medical, where the law has intervened tentatively, and the digital, where it simply hasn’t kept up.&lt;/p&gt; &lt;p&gt;Medical protections are tentative because of piecemeal development. Typically involving legal workarounds, they offer rare precedent for what might happen to your digital ghosts now and in the future, with the only clear trend being a reluctance to protect.&lt;/p&gt; &lt;p&gt;That said, the US is one country that has taken measures to protect the medical privacy of the dead. The &lt;em&gt;Health Insurance Portability and Accountability Act&lt;/em&gt; (HIPAA) dictates that 50 years of protection must be given to your personally identifiable medical information after you die.&lt;/p&gt; &lt;p&gt;Except there’s a catch. State laws also apply, and state laws differ. In Colorado, Louisiana, and many others, its efficacy is severely challenged by laws dictating the mandatory release of information regarded as public—including autopsy reports and even &lt;a href=&#34;http://dx.doi.org.ezp.lib.cam.ac.uk/10.1177/1073110516654124&#34;&gt;your genetic information&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;In lieu of any protections, surviving relatives in Europe have found some success claiming that their own Article 8 rights—that ECHR right to privacy—have been violated through disclosures or inspections related to their deceased.&lt;/p&gt; &lt;p&gt;In one case, Leyla Polat, an Austrian national, suffered the awful death of her son just two days after birth following a cerebral hemorrhage. The family refused a postmortem examination, wanting to bury their child in accordance with Muslim beliefs; but doctors insisted it take place, covertly removing his internal organs and filling the hollows with cotton wool.&lt;/p&gt; &lt;p&gt;When this was discovered during the funeral rites, the boy had to be buried elsewhere, and without ceremony. After several court cases and appeals, The European Court of Human Rights &lt;a href=&#34;https://hudoc.echr.coe.int/rum#%7B%22itemid%22:%5B%22002-13361%22%5D%7D&#34;&gt;found&lt;/a&gt; that Leyla’s Article 8 and 9 rights had been violated.&lt;/p&gt; &lt;p&gt;As an aside: Stalin’s grandson &lt;a href=&#34;https://hudoc.echr.coe.int/eng#%7B%22itemid%22:%5B%22001-150568%22%5D%7D&#34;&gt;tried the same Article 8 route&lt;/a&gt; in relation to reputational attacks on his grandfather, reflecting attempts to apply the workaround more widely.&lt;/p&gt; &lt;p&gt;It’s not that there hasn’t been some progress. The fundamental problem is that protections—already sparse—are only as good as their material and geographic scopes, their interactions with other laws, and how they are interpreted in a court.&lt;/p&gt; &lt;p&gt;Nowhere is this more apparent than in the case of the Smallman sisters. Judge Mark Lucraft KC &lt;a href=&#34;https://www.judiciary.uk/wp-content/uploads/2022/07/R-v-Jaffer-Lewis-sentencing-061221.pdf&#34;&gt;found&lt;/a&gt; that PCs Jaffer and Lewis, in taking selfies with the murdered victims, had:&lt;/p&gt; &lt;blockquote&gt; &lt;p&gt;&lt;em&gt;“…wholly disregarded the privacy of the two victims of horrific violence and their families for what can only have been some cheap thrill, kudos, a kick or some form of bragging right by taking images and then passing them to others.”&lt;/em&gt;&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Yet this acknowledgement of privacy violation is precisely just that. The crime the officers committed was misconduct in public office; they were not convicted on the basis of privacy law. That sense of progress—that we might be beginning to recognize the importance of posthumous privacy—has all but gone out of the window.&lt;/p&gt; &lt;p&gt;That does not leave your digital privacy in a good place. Whatever little protection you may be able to tease out for our medical privacy far, far exceeds the control you have over your virtual ghosts. And with AI just about everywhere, the prospects for your data after death are terrifying.&lt;/p&gt; &lt;div class=&#34;admonition quote inline end pullquote&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Account deleted or not, our ghosts will all be stuck in the machine.&lt;/p&gt; &lt;/div&gt; &lt;p&gt;We’ve already established that data protections for the living—such as &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;—expire at death. The simple reality is that dying places your data at the mercy of large technology corporations, and their dubious afterlife tools.&lt;/p&gt; &lt;p&gt;Even if you trust such tools to dispose of or act on our data, there is a disconnect between demand and take-up. A &lt;a href=&#34;https://www.tandfonline.com/doi/full/10.1080/13600869.2025.2506164#abstract&#34;&gt;study of UK nationals&lt;/a&gt; found a majority that wanted their data deleted at death were unaware of the tools, with large tech companies unwilling to share any details on their uptake. Reassuring stuff.&lt;/p&gt; &lt;p&gt;But the reality is, you shouldn’t. You’ll recall that &lt;a href=&#34;https://www.privacyguides.org/en/basics/account-deletion/&#34;&gt;deletion doesn’t usually mean deletion&lt;/a&gt;, and after death even &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; can’t force big tech to delete the data of those lucky enough to have benefited from it. &lt;span class=&#34;pullquote-source&#34;&gt;Account deleted or not, our ghosts will all be stuck in the machine.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;Recent reports have acknowledged dire possibilities. Almost worldwide, you can &lt;a href=&#34;https://www.reuters.com/article/world/data-of-the-dead-virtual-immortality-exposes-holes-in-privacy-laws-idUSKBN21Z0NE/&#34;&gt;legally train AI models on the data of a deceased person&lt;/a&gt; and recreate them in digital form—all without their prior consent. Organizations exist purely to scour your social media profiles and activity for this exact purpose. Your ghost could be used to generate engagement against your will, disclosing what you tried to hide.&lt;/p&gt; &lt;p&gt;You may ask: why should the law care? Why indeed, when it deems we &lt;a href=&#34;https://doi.org/10.1093/acprof:oso/9780199607860.003.0003&#34;&gt;cannot be harmed&lt;/a&gt; after death. To argue thus is to miss the point. &lt;strong&gt;A lack of privacy after death harms the living, often in ways others cannot see.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;The effect of &lt;a href=&#34;https://www.tandfonline.com/doi/full/10.1080/17577632.2024.2438395#d1e120&#34;&gt;postmortem anxiety&lt;/a&gt; is a real one that deeply troubles individuals wishing to keep a part of them hidden from public—or even family—view, whether it be it an &lt;a href=&#34;https://www.cardozoaelj.com/wp-content/uploads/2011/02/Edwards-Galleyed-FINAL.pdf&#34;&gt;illicit affair&lt;/a&gt; or whatever else. Revelation at the point of death can be just as harmful to those still alive.&lt;/p&gt; &lt;p&gt;There is cause for optimism. Article 85 of the &lt;em&gt;French Data Protection Act&lt;/em&gt; allows you to include &lt;a href=&#34;https://www.cnil.fr/fr/la-loi-informatique-et-libertes#article85&#34;&gt;legally enforceable demands concerning your personal data&lt;/a&gt; in your will. This is truly a landmark piece of legislation by the French that indicates what the global direction of travel should be, and what we should ultimately demand: protections for the dead, by the dead.&lt;/p&gt; &lt;p&gt;But even more urgently, we must demand that governments across the world introduce even the most basic legal framework for postmortem privacy that protects you, your family, and community from egregious harm.&lt;/p&gt; &lt;p&gt;The Smallmans deserved dignity, and so does everyone else in death. The law must catch up.&lt;/p&gt; &lt;hr /&gt; &lt;p&gt;&lt;em&gt;This article hasn’t even begun to scratch the surface of the complexity of postmortem privacy, and there are innumerable relevant cases and laws that simply wouldn’t fit. If the topic has caught your interest, and you’d like to dig in more, &lt;a href=&#34;https://doi.org/10.1016/j.clsr.2022.105737&#34;&gt;this white paper&lt;/a&gt; by Uta Kohl is a good starting point.&lt;/em&gt;&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/09/16/the-fight-for-privacy-after-death/</link> <pubDate>Tue, 16 Sep 2025 17:58:44 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/09/16/the-fight-for-privacy-after-death/</guid> </item> <item> <title>Privacy-Respecting European Tech Alternatives</title> <author>Jonah Aragon</author> <category>News</category> <description>&lt;h1 id=&#34;privacy-respecting-european-tech-alternatives&#34;&gt;Privacy-Respecting European Tech Alternatives&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;European Union flag and Privacy Guides logo side by side&#34; src=&#34;../../../../assets/images/private-european-alternatives/eu-alternatives.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides&lt;/small&gt;&lt;/p&gt; &lt;p&gt;There is a growing sentiment that the US shouldn&#39;t be relied upon for the technologies that many people and businesses use every day. Lately, the US has been unilaterally &lt;a href=&#34;https://archive.ph/EJ26f&#34;&gt;cutting off&lt;/a&gt; access to critical technologies to European countries, prompting &lt;a href=&#34;https://techcrunch.com/2025/03/16/european-tech-industry-coalition-calls-for-radical-action-on-digital-sovereignty-starting-with-buying-local/&#34;&gt;calls for &#34;radical action&#34;&lt;/a&gt; to bolster European tech stacks from EU lawmakers.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;At Privacy Guides, we generally value technical guarantees over matters like jurisdiction. There is simply no alternative to privacy technologies like strong &lt;em&gt;end-to-end encryption&lt;/em&gt; when it comes to protecting your information.&lt;/p&gt; &lt;p&gt;That being said, the United States &lt;em&gt;certainly&lt;/em&gt; does not have a monopoly on the best technologies, and many of our favorite &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;recommended tools&lt;/a&gt; come from Europe and all over the world. Tools from the European Union also generally benefit from much stronger data protection laws, thanks to the EU&#39;s General Data Protection Regulation (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;).&lt;/p&gt; &lt;p&gt;If supporting the European tech industry is something that is important to you, here&#39;s a non-exhaustive list of some of our favorites. We have many more recommendations throughout our website if you are interested in learning more about privacy-respecting tech alternatives!&lt;/p&gt; &lt;h2 id=&#34;email-services&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m20 8-8 5-8-5V6l8 5 8-5m0-2H4c-1.11 0-2 .89-2 2v12a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V6a2 2 0 0 0-2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Email Services&lt;/h2&gt; &lt;p&gt;Many people and businesses are tied to Google&#39;s Gmail or Microsoft&#39;s Outlook products, but there are &lt;em&gt;far&lt;/em&gt; more secure and private &lt;a href=&#34;https://www.privacyguides.org/en/email/&#34;&gt;alternative email providers&lt;/a&gt; out there!&lt;/p&gt; &lt;h3 id=&#34;tuta&#34;&gt;Tuta &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt;&lt;/h3&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Tuta logo&#34; src=&#34;../../../../assets/img/email/tuta.svg#only-light&#34; /&gt; &lt;img align=&#34;right&#34; alt=&#34;Tuta logo&#34; src=&#34;../../../../assets/img/email/tuta-dark.svg#only-dark&#34; /&gt;&lt;/p&gt; &lt;p&gt;Based in Hanover, Germany, &lt;strong&gt;Tuta&lt;/strong&gt; is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011.&lt;/p&gt; &lt;p&gt;Free accounts start with 1 GB of storage.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/email/#tuta&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://tuta.com&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;proton-mail&#34;&gt;Proton Mail &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt;&lt;/h3&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Proton Mail logo&#34; src=&#34;../../../../assets/img/email/protonmail.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;Based in Geneva, Switzerland, &lt;strong&gt;Proton Mail&lt;/strong&gt; is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013.&lt;/p&gt; &lt;p&gt;The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/email/#proton-mail&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://proton.me&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;office-suites&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M6 2c-1.11 0-2 .89-2 2v16a2 2 0 0 0 2 2h4v-1.91L12.09 18H6v-2h8.09l2-2H6v-2h12.09L20 10.09V8l-6-6zm7 1.5L18.5 9H13zm7.15 9.5a.55.55 0 0 0-.4.16l-1.02 1.02 2.09 2.08 1.02-1.01c.21-.22.21-.58 0-.79l-1.3-1.3a.54.54 0 0 0-.39-.16m-2.01 1.77L12 20.92V23h2.08l6.15-6.15z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Office Suites&lt;/h2&gt; &lt;p&gt;Of course, email isn&#39;t the only thing offered by solutions like Google Workspace and Microsoft 365. Many people use their entire suite of &lt;a href=&#34;https://www.privacyguides.org/en/document-collaboration/&#34;&gt;productivity tools&lt;/a&gt; to manage their businesses and collaborate with others.&lt;/p&gt; &lt;p&gt;Luckily, there are plenty of alternatives that incorporate strong encryption and can even be self-hosted, which will not only decrease your reliance on the traditional Big Tech companies, but keep your data far more secure as well.&lt;/p&gt; &lt;h3 id=&#34;cryptpad&#34;&gt;CryptPad &lt;img alt=&#34;🇫🇷&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1eb-1f1f7.svg&#34; title=&#34;:flag_fr:&#34; /&gt;&lt;/h3&gt; &lt;p&gt;Developed and hosted by &lt;em&gt;XWiki&lt;/em&gt; in Paris, France, &lt;strong&gt;CryptPad&lt;/strong&gt; is a complete online office suite with applications including Documents, Rich Text, Spreadsheets, Code/Markdown, Kanban, Slides, Whiteboard and Forms.&lt;/p&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;CryptPad logo&#34; src=&#34;../../../../assets/img/document-collaboration/cryptpad.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;CryptPad&lt;/strong&gt; is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/document-collaboration/#cryptpad&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://cryptpad.org&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M19 3a2 2 0 0 1 2 2v14a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2zm-3.42 14-.95-4.08 3.16-2.73-4.17-.36L12 6l-1.62 3.84-4.17.36 3.16 2.73L8.42 17 12 14.84z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; We recently did a &lt;a href=&#34;../../../02/07/cryptpad-review/&#34;&gt;full review of CryptPad&lt;/a&gt;, which you should definitely check out if you might be interested in switching!&lt;/p&gt; &lt;h3 id=&#34;nextcloud&#34;&gt;Nextcloud &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt;&lt;/h3&gt; &lt;p&gt;&lt;strong&gt;Nextcloud&lt;/strong&gt; comes from German startup &lt;em&gt;Nextcloud GmbH&lt;/em&gt;, and offers a complete cloud drive alternative to Google Drive or OneDrive.&lt;/p&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Nextcloud logo&#34; src=&#34;../../../../assets/img/self-hosting/nextcloud.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Nextcloud&lt;/strong&gt; is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/document-collaboration/#nextcloud&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://nextcloud.com&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;libreoffice&#34;&gt;LibreOffice &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt;&lt;/h3&gt; &lt;p&gt;&lt;strong&gt;LibreOffice&lt;/strong&gt; is developed by &lt;em&gt;The Document Foundation&lt;/em&gt; based in Berlin, Germany. It&#39;s a free and open-source office suite with extensive functionality.&lt;/p&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;LibreOffice logo&#34; src=&#34;../../../../assets/img/office-suites/libreoffice.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;Web-based editors aren&#39;t for everyone. If you need a full-fledged office suite that runs locally on your computer, &lt;strong&gt;LibreOffice&lt;/strong&gt; is a fantastic alternative to Microsoft Office.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/office-suites/#libreoffice&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://libreoffice.org&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;search-engines&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m15.5 14 5 5-1.5 1.5-5-5v-.79l-.27-.28A6.47 6.47 0 0 1 9.5 16 6.5 6.5 0 0 1 3 9.5 6.5 6.5 0 0 1 9.5 3 6.5 6.5 0 0 1 16 9.5c0 1.61-.59 3.09-1.57 4.23l.28.27zm-6-9.5-.55.03c-.24.52-.61 1.4-.88 2.47h2.86c-.27-1.07-.64-1.95-.88-2.47-.18-.03-.36-.03-.55-.03M13.83 7a4.94 4.94 0 0 0-2.68-2.22c.24.53.55 1.3.78 2.22zM5.17 7h1.9c.23-.92.54-1.69.78-2.22A4.94 4.94 0 0 0 5.17 7M4.5 9.5c0 .5.08 1.03.23 1.5h2.14l-.12-1.5.12-1.5H4.73c-.15.47-.23 1-.23 1.5m9.77 1.5c.15-.47.23-1 .23-1.5s-.08-1.03-.23-1.5h-2.14a9.5 9.5 0 0 1 0 3zm-6.4-3-.12 1.5.12 1.5h3.26a9.5 9.5 0 0 0 0-3zm1.63 6.5c.18 0 .36 0 .53-.03.25-.52.63-1.4.9-2.47H8.07c.27 1.07.65 1.95.9 2.47zm4.33-2.5h-1.9c-.23.92-.54 1.69-.78 2.22A4.94 4.94 0 0 0 13.83 12m-8.66 0a4.94 4.94 0 0 0 2.68 2.22c-.24-.53-.55-1.3-.78-2.22z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Search Engines&lt;/h2&gt; &lt;p&gt;One of the most frequently used tools on the internet is the venerable search engine. Switching from &lt;strong&gt;Google&lt;/strong&gt; to an &lt;a href=&#34;https://www.privacyguides.org/en/search-engines/&#34;&gt;alternative&lt;/a&gt; is one of the biggest impact approaches to improving your privacy that you can make.&lt;/p&gt; &lt;h3 id=&#34;startpage&#34;&gt;Startpage &lt;img alt=&#34;🇳🇱&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f3-1f1f1.svg&#34; title=&#34;:flag_nl:&#34; /&gt;&lt;/h3&gt; &lt;p&gt;Headquartered and developed in the Netherlands, Startpage is one great alternative to Google you could consider:&lt;/p&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Startpage logo&#34; src=&#34;../../../../assets/img/search-engines/startpage.svg#only-light&#34; /&gt; &lt;img align=&#34;right&#34; alt=&#34;Startpage logo&#34; src=&#34;../../../../assets/img/search-engines/startpage-dark.svg#only-dark&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Startpage&lt;/strong&gt; is a private search engine. One of Startpage&#39;s unique features is the &lt;a href=&#34;https://startpage.com/en/anonymous-view&#34;&gt;Anonymous View&lt;/a&gt;, which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding &lt;a href=&#34;https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details&#34;&gt;some&lt;/a&gt; network and browser properties. However, unlike the name suggests, the feature should not be relied upon for &lt;em&gt;total&lt;/em&gt; anonymity.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/search-engines/#startpage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Homepage&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://startpage.com&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;It is worth noting that &lt;a href=&#34;../../../../2020/05/03/relisting-startpage/&#34;&gt;since 2020&lt;/a&gt;, Startpage has been a subsidiary of American company System1. Their operations and employees remain in the Netherlands, and you can choose to utilize only European servers if you wish.&lt;/p&gt; &lt;h2 id=&#34;web-browsers&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M17.9 17.39c-.26-.8-1.01-1.39-1.9-1.39h-1v-3a1 1 0 0 0-1-1H8v-2h2a1 1 0 0 0 1-1V7h2a2 2 0 0 0 2-2v-.41a7.984 7.984 0 0 1 2.9 12.8M11 19.93c-3.95-.49-7-3.85-7-7.93 0-.62.08-1.22.21-1.79L9 15v1a2 2 0 0 0 2 2m1-16A10 10 0 0 0 2 12a10 10 0 0 0 10 10 10 10 0 0 0 10-10A10 10 0 0 0 12 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Web Browsers&lt;/h2&gt; &lt;p&gt;Web browsers are historically very tricky to build, and the three major browser engines, Chromium, Gecko (Firefox), and WebKit (Safari) are all &lt;em&gt;primarily&lt;/em&gt; developed by American companies. This is a space that could certainly use improvement.&lt;/p&gt; &lt;h3 id=&#34;mullvad-browser&#34;&gt;Mullvad Browser &lt;img alt=&#34;🇸🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f8-1f1ea.svg&#34; title=&#34;:flag_se:&#34; /&gt;&lt;/h3&gt; &lt;p&gt;One of our &lt;a href=&#34;https://www.privacyguides.org/en/desktop-browsers/&#34;&gt;recommended browsers&lt;/a&gt; is spearheaded by Swedish &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; company &lt;em&gt;Mullvad&lt;/em&gt;, although it&#39;s worth noting that its development is somewhat reliant on American non-profits Mozilla and the Tor Project, being a Tor Browser &lt;abbr title=&#34;A new software project created by copying an existing project and adding to it independently&#34;&gt;fork&lt;/abbr&gt;.&lt;/p&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Mullvad Browser logo&#34; src=&#34;../../../../assets/img/browsers/mullvad_browser.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Mullvad Browser&lt;/strong&gt; is a version of Tor Browser with Tor network integrations removed. It aims to provide to &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; users Tor Browser&#39;s anti-fingerprinting browser technologies, which are key protections against mass surveillance programs. It is developed by the Tor Project and distributed by Mullvad, although it does &lt;em&gt;not&lt;/em&gt; require the use of Mullvad&#39;s &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://mullvad.net/en/browser&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;maps-navigation&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m15 19-6-2.11V5l6 2.11M20.5 3h-.16L15 5.1 9 3 3.36 4.9c-.21.07-.36.25-.36.48V20.5a.5.5 0 0 0 .5.5c.05 0 .11 0 .16-.03L9 18.9l6 2.1 5.64-1.9c.21-.1.36-.25.36-.48V3.5a.5.5 0 0 0-.5-.5&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Maps &amp;amp; Navigation&lt;/h2&gt; &lt;p&gt;Mapping and location apps like Google Maps can track your every move, and that data is used by tech companies for a wide variety of purposes, including for military and defense. The best mapping apps for your privacy can be used completely offline:&lt;/p&gt; &lt;h3 id=&#34;organic-maps&#34;&gt;Organic Maps &lt;img alt=&#34;🇪🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ea-1f1ea.svg&#34; title=&#34;:flag_ee:&#34; /&gt;&lt;/h3&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Organic Maps logo&#34; src=&#34;../../../../assets/img/maps/organic-maps.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;Based in Estonia, &lt;strong&gt;Organic Maps&lt;/strong&gt; is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/maps/#organic-maps&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://organicmaps.app&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;osmand&#34;&gt;OsmAnd &lt;img alt=&#34;🇳🇱&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f3-1f1f1.svg&#34; title=&#34;:flag_nl:&#34; /&gt;&lt;/h3&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;OsmAnd logo&#34; src=&#34;../../../../assets/img/maps/osmand.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;Based in the Netherlands, &lt;strong&gt;OsmAnd&lt;/strong&gt; is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/maps/#osmand&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://osmand.net&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;password-managers&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M17 7h5v10h-5v2a1 1 0 0 0 1 1h2v2h-2.5c-.55 0-1.5-.45-1.5-1 0 .55-.95 1-1.5 1H12v-2h2a1 1 0 0 0 1-1V5a1 1 0 0 0-1-1h-2V2h2.5c.55 0 1.5.45 1.5 1 0-.55.95-1 1.5-1H20v2h-2a1 1 0 0 0-1 1zM2 7h11v2H4v6h9v2H2zm18 8V9h-3v6zM8.5 12A1.5 1.5 0 0 0 7 10.5 1.5 1.5 0 0 0 5.5 12 1.5 1.5 0 0 0 7 13.5 1.5 1.5 0 0 0 8.5 12m4.5-1.11c-.61-.56-1.56-.51-2.12.11-.56.6-.51 1.55.12 2.11.55.52 1.43.52 2 0z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Password Managers&lt;/h2&gt; &lt;h3 id=&#34;keepassxc&#34;&gt;KeePassXC &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt;&lt;/h3&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;KeePassXC logo&#34; src=&#34;../../../../assets/img/password-management/keepassxc.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;KeePassXC&lt;/strong&gt; is a community &lt;abbr title=&#34;A new software project created by copying an existing project and adding to it independently&#34;&gt;fork&lt;/abbr&gt; of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal of extending and improving it with new features and bug fixes to provide a feature-rich, cross-platform, and modern open-source password manager.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/passwords/#keepassxc&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://keepassxc.org&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M19 3a2 2 0 0 1 2 2v14a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2zm-3.42 14-.95-4.08 3.16-2.73-4.17-.36L12 6l-1.62 3.84-4.17.36 3.16 2.73L8.42 17 12 14.84z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; We recently published an article on &lt;a href=&#34;../../18/installing-keepassxc-and-yubikey/&#34;&gt;securely using KeePassXC with a YubiKey&lt;/a&gt;!&lt;/p&gt; &lt;h3 id=&#34;proton-pass&#34;&gt;Proton Pass &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt;&lt;/h3&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Proton Pass logo&#34; src=&#34;../../../../assets/img/password-management/protonpass.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Proton Pass&lt;/strong&gt; is an open-source, end-to-end encrypted password manager developed by the Swiss company Proton AG, the team behind Proton Mail. It securely stores your login credentials, generates unique email aliases, and supports and stores passkeys.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/passwords/#proton-pass&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://proton.me/pass&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;instant-messengers&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 3c5.5 0 10 3.58 10 8s-4.5 8-10 8c-1.24 0-2.43-.18-3.53-.5C5.55 21 2 21 2 21c2.33-2.33 2.7-3.9 2.75-4.5C3.05 15.07 2 13.13 2 11c0-4.42 4.5-8 10-8m5 9v-2h-2v2zm-4 0v-2h-2v2zm-4 0v-2H7v2z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Instant Messengers&lt;/h2&gt; &lt;p&gt;Switching off of WhatsApp, Facebook Messenger, or iMessage in favor of a more &lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/&#34;&gt;private instant messenger&lt;/a&gt; is an excellent way to safeguard your chats.&lt;/p&gt; &lt;h3 id=&#34;element&#34;&gt;Element &lt;img alt=&#34;🇬🇧&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ec-1f1e7.svg&#34; title=&#34;:flag_gb:&#34; /&gt;&lt;/h3&gt; &lt;p&gt;Element is based in the United Kingdom, which is of course no longer in the European Union. However, it is a trusted messaging platform by the &lt;a href=&#34;https://element.io/case-studies/tchap&#34;&gt;French government&lt;/a&gt;, and the &lt;a href=&#34;https://element.io/case-studies/bundeswehr&#34;&gt;German military&lt;/a&gt;, among many other organizations in Europe and around the world looking for sovereignty from Big Tech messaging platforms like Slack and Google Messages.&lt;/p&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Element logo&#34; src=&#34;../../../../assets/img/social-networks/element.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Element&lt;/strong&gt; is the flagship client for the &lt;a href=&#34;https://matrix.org/docs/chat_basics/matrix-for-im&#34;&gt;Matrix&lt;/a&gt; protocol, an &lt;a href=&#34;https://spec.matrix.org/latest&#34;&gt;open standard&lt;/a&gt; for secure decentralized real-time communication.&lt;/p&gt; &lt;p&gt;Messages and files shared in private rooms (those which require an invite) are by default &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;, as are one-to-one voice and video calls.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/real-time-communication/#element&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://element.io&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;simplex&#34;&gt;SimpleX &lt;img alt=&#34;🇬🇧&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ec-1f1e7.svg&#34; title=&#34;:flag_gb:&#34; /&gt;&lt;/h3&gt; &lt;p&gt;Another open-source option from the United Kingdom, SimpleX chat has very strong security features, and can be entirely self-hosted anywhere in the world if you prefer the assurances a &lt;a href=&#34;https://simplex.chat/docs/server.html&#34;&gt;custom server&lt;/a&gt; can bring.&lt;/p&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Simplex logo&#34; src=&#34;../../../../assets/img/messengers/simplex.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;SimpleX Chat&lt;/strong&gt; is an instant messenger that doesn&#39;t depend on any unique identifiers such as phone numbers or usernames. Its decentralized network makes SimpleX Chat an effective tool against censorship.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/real-time-communication/#simplex-chat&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://simplex.chat&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M8 2c1.981 0 3.671.992 4.933 2.078 1.27 1.091 2.187 2.345 2.637 3.023a1.62 1.62 0 0 1 0 1.798c-.45.678-1.367 1.932-2.637 3.023C11.67 13.008 9.981 14 8 14s-3.671-.992-4.933-2.078C1.797 10.83.88 9.576.43 8.898a1.62 1.62 0 0 1 0-1.798c.45-.677 1.367-1.931 2.637-3.022C4.33 2.992 6.019 2 8 2M1.679 7.932a.12.12 0 0 0 0 .136c.411.622 1.241 1.75 2.366 2.717C5.176 11.758 6.527 12.5 8 12.5s2.825-.742 3.955-1.715c1.124-.967 1.954-2.096 2.366-2.717a.12.12 0 0 0 0-.136c-.412-.621-1.242-1.75-2.366-2.717C10.824 4.242 9.473 3.5 8 3.5s-2.825.742-3.955 1.715c-1.124.967-1.954 2.096-2.366 2.717M8 10a2 2 0 1 1-.001-3.999A2 2 0 0 1 8 10&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;briar&#34;&gt;Briar &lt;img alt=&#34;🌍&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f30d.svg&#34; title=&#34;:earth_africa:&#34; /&gt;&lt;/h3&gt; &lt;p&gt;Briar is an open source project not legally incorporated in any jurisdiction, although it has received funding from European initiatives like &lt;a href=&#34;https://ngi.eu/&#34;&gt;NGI&lt;/a&gt; and the &lt;a href=&#34;https://nlnet.nl/&#34;&gt;NLnet Foundation&lt;/a&gt;, and includes many Europeans in their voluntary board and team.&lt;/p&gt; &lt;div class=&#34;admonition recommendation&#34;&gt; &lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Briar logo&#34; src=&#34;../../../../assets/img/messengers/briar.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Briar&lt;/strong&gt; is an encrypted instant messenger that &lt;a href=&#34;https://briarproject.org/how-it-works&#34;&gt;connects&lt;/a&gt; to other clients using the Tor Network, making it an effective tool at circumventing censorship. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem.&lt;/p&gt; &lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/real-time-communication/#briar&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt; &lt;a class=&#34;card-link&#34; href=&#34;https://briarproject.org&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;more-services&#34;&gt;More Services...&lt;/h2&gt; &lt;p&gt;Looking for more? Here&#39;s a short (and non-exhaustive) list of other recommendations of ours which are based in Europe:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/vpn/&#34;&gt;&lt;strong&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; Services&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇸🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f8-1f1ea.svg&#34; title=&#34;:flag_se:&#34; /&gt; &lt;a href=&#34;https://www.privacyguides.org/en/vpn/#mullvad&#34;&gt;Mullvad&lt;/a&gt; and &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt; &lt;a href=&#34;https://www.privacyguides.org/en/vpn/#proton-vpn&#34;&gt;Proton &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/dns/#recommended-providers&#34;&gt;&lt;strong&gt;&lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; Providers&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇫🇷&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1eb-1f1f7.svg&#34; title=&#34;:flag_fr:&#34; /&gt; &lt;a href=&#34;https://dns0.eu/&#34;&gt;dns0.eu&lt;/a&gt;, &lt;img alt=&#34;🇸🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f8-1f1ea.svg&#34; title=&#34;:flag_se:&#34; /&gt; &lt;a href=&#34;https://mullvad.net/en/help/dns-over-https-and-dns-over-tls&#34;&gt;Mullvad &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt;&lt;/a&gt;, and &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt; &lt;a href=&#34;https://quad9.net/&#34;&gt;Quad9&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/calendar/&#34;&gt;&lt;strong&gt;Calendars&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt; &lt;a href=&#34;https://tuta.com/calendar&#34;&gt;Tuta&lt;/a&gt; and &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt; &lt;a href=&#34;https://proton.me/calendar&#34;&gt;Proton Calendar&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/notebooks/&#34;&gt;&lt;strong&gt;Notes Apps&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇬🇧&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ec-1f1e7.svg&#34; title=&#34;:flag_gb:&#34; /&gt; &lt;a href=&#34;https://joplinapp.org/&#34;&gt;Joplin&lt;/a&gt; and &lt;img alt=&#34;🇪🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ea-1f1ea.svg&#34; title=&#34;:flag_ee:&#34; /&gt; &lt;a href=&#34;https://crypt.ee/&#34;&gt;Crypt.ee&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/pastebins/&#34;&gt;&lt;strong&gt;Pastebins&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇫🇷&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1eb-1f1f7.svg&#34; title=&#34;:flag_fr:&#34; /&gt; &lt;a href=&#34;https://privatebin.info/&#34;&gt;PrivateBin&lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/desktop/&#34;&gt;&lt;strong&gt;Linux Distros&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt; &lt;a href=&#34;https://www.opensuse.org/&#34;&gt;openSUSE&lt;/a&gt;&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;If you&#39;re in Europe and looking to build or host your &lt;em&gt;own&lt;/em&gt; European technology, there are also plenty of alternatives to the typical American IT providers. Topics like cloud computing platforms, web analytics services, and content delivery networks are currently out of scope for what we cover here at Privacy Guides, but &lt;a href=&#34;https://european-alternatives.eu/&#34;&gt;European Alternatives&lt;/a&gt; is one great resource for finding more services like these.&lt;/p&gt; &lt;p&gt;At the end of the day, we trust &lt;em&gt;all&lt;/em&gt; of our &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;recommended privacy tools&lt;/a&gt; to keep you safe from prying eyes, but there are many valid reasons you may prefer to stick to the European market.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/03/19/private-european-alternatives/</link> <pubDate>Mon, 15 Sep 2025 17:25:27 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/03/19/private-european-alternatives/</guid> </item> <item> <title>Chat Control Must Be Stopped, Act Now!</title> <author>Em</author> <category>News</category> <description>&lt;h1 id=&#34;chat-control-must-be-stopped-act-now&#34;&gt;Chat Control Must Be Stopped, Act Now!&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Filtered photo of a protest with a protestor holding a sign in first plan. The background is a red monochrome and the sign is in turquoise. The sign says &amp;quot;You won&#39;t make me live this 1984 sh*t&amp;quot;.&#34; src=&#34;../../../../assets/images/chat-control-must-be-stopped/chatcontrol-cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Photo: Ramaz Bluashvili / Pexels&lt;/small&gt;&lt;/p&gt; &lt;p&gt;If you&#39;ve heard of &lt;a href=&#34;../../../02/03/the-future-of-privacy/&#34;&gt;Chat Control&lt;/a&gt; already, bad news: &lt;strong&gt;it&#39;s back&lt;/strong&gt;. If you haven&#39;t, this is a pressing issue you should urgently learn more about if you value privacy, democracy, and human rights. This is happening &lt;strong&gt;right now&lt;/strong&gt;, and &lt;strong&gt;we must act to stop it right now&lt;/strong&gt;.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;Take a minute to visualize this: Every morning you wake up with a police officer entering your home to inspect it, and staying with you all day long.&lt;/p&gt; &lt;p&gt;The agent checks your bathroom, your medicine cabinet, your bedroom, your closets, your drawers, your fridge, and takes photos and notes to document everything. Then, this report is uploaded to the police&#39;s cloud. It&#39;s &#34;&lt;a href=&#34;../../../04/11/encryption-is-not-a-crime/&#34;&gt;for a good cause&lt;/a&gt;&#34; you know, it&#39;s to make sure you aren&#39;t hiding any child sexual abuse material under your bed.&lt;/p&gt; &lt;p&gt;Every morning. Even if you&#39;re naked in bed. Even while you&#39;re having a call with your doctor or your lover. Even when you&#39;re on a date. Even while you&#39;re working and discussing your client&#39;s confidential information with their attorney. This police officer is there, listening to you and reporting on everything you do.&lt;/p&gt; &lt;p&gt;This is the in-person equivalent of Chat Control, a piece of legislation that would mandate &lt;strong&gt;all&lt;/strong&gt; services to scan &lt;strong&gt;all&lt;/strong&gt; private digital communications of &lt;strong&gt;everyone&lt;/strong&gt; residing in the European Union.&lt;/p&gt; &lt;p&gt;This is an Orwellian nightmare.&lt;/p&gt; &lt;h2 id=&#34;act-now&#34;&gt;Act now!&lt;/h2&gt; &lt;p&gt;This is happening &lt;strong&gt;right now&lt;/strong&gt;. European governments will be finalizing their positions on the regulation proposal on September 12th, and there will be a final vote on &lt;strong&gt;October 14th, 2025&lt;/strong&gt;.&lt;/p&gt; &lt;div class=&#34;admonition warning&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Important: If you are reading this article after September 12th&lt;/p&gt; &lt;p&gt;Regardless of the outcome on September 12th, the fight isn&#39;t over. The next deadline will be the &lt;strong&gt;final vote on October 14th, 2025&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;If you&#39;ve missed September 12th, make sure to contact your representatives &lt;strong&gt;right now&lt;/strong&gt; to tell them to &lt;strong&gt;oppose Chat Control&lt;/strong&gt; on October 14th.&lt;/p&gt; &lt;/div&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;mark&gt;If you are not located in Europe&lt;/mark&gt;: Keep reading, this will affect you too.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;If you are still unconvinced: Keep reading, we discuss Chat Control in &lt;a href=&#34;#why-is-this-bad&#34;&gt;more details&lt;/a&gt; below.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;If you are located in Europe: You must &lt;strong&gt;act now&lt;/strong&gt; to stop it.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;div class=&#34;admonition question&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;How to stop this? Contact your MEPs today&lt;/p&gt; &lt;p&gt;Use this &lt;a href=&#34;https://fightchatcontrol.eu/&#34;&gt;&lt;strong&gt;website&lt;/strong&gt;&lt;/a&gt; to easily contact your government representatives, and tell them they should &lt;strong&gt;oppose Chat Control&lt;/strong&gt;. Even if your country already opposes Chat Control, contact your representatives to tell them you are relieved they oppose, and support them in this decision to protect human rights. This will help reinforce their position.&lt;/p&gt; &lt;p&gt;But if your country &lt;em&gt;supports&lt;/em&gt; Chat Control, or is &lt;em&gt;undecided&lt;/em&gt;, &lt;strong&gt;it is vital that you contact your representatives as soon as possible&lt;/strong&gt;. To support your point, you can share this article with them or one of the many great &lt;a href=&#34;#resources-to-learn-more-and-fight-for-human-rights&#34;&gt;resources&lt;/a&gt; listed at the end.&lt;/p&gt; &lt;p&gt;At the time of this writing, the list of countries to contact is:&lt;/p&gt; &lt;table&gt; &lt;thead&gt; &lt;tr&gt; &lt;th&gt;&lt;strong&gt;Supporting (15)&lt;/strong&gt;&lt;/th&gt; &lt;th&gt;&lt;/th&gt; &lt;th&gt;&lt;strong&gt;Undecided (6)&lt;/strong&gt;&lt;/th&gt; &lt;/tr&gt; &lt;/thead&gt; &lt;tbody&gt; &lt;tr&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Bulgaria&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Latvia&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Estonia&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Croatia&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Lithuania&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Germany&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Cyprus&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Malta&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Greece&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Denmark&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Portugal&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Luxembourg&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; France&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Slovakia&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Romania&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Hungary&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Spain&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;⚠&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/26a0.svg&#34; title=&#34;:warning:&#34; /&gt; Slovenia&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Ireland&lt;/td&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Sweden&lt;/td&gt; &lt;td&gt;&lt;/td&gt; &lt;/tr&gt; &lt;tr&gt; &lt;td&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Italy&lt;/td&gt; &lt;td&gt;&lt;/td&gt; &lt;td&gt;&lt;/td&gt; &lt;/tr&gt; &lt;/tbody&gt; &lt;/table&gt; &lt;/div&gt; &lt;p&gt;&lt;img alt=&#34;A map of countries part of the European Union. Countries opposing Chat Control are represented in green, countries undecided in blue, and countries in favor are in red. Below there is text saying &amp;quot;Act now! www.chatcontrol.eu&amp;quot;.&#34; src=&#34;../../../../assets/images/chat-control-must-be-stopped/chatcontrol-map-chatcontroleu-20250903.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Image: Patrick Breyer / &lt;a href=&#34;https://www.chatcontrol.eu&#34;&gt;chatcontrol.eu&lt;/a&gt;&lt;/small&gt;&lt;/p&gt; &lt;h2 id=&#34;what-is-chat-control&#34;&gt;What is Chat Control?&lt;/h2&gt; &lt;p&gt;&#34;Chat Control&#34; refers to a series of legislative proposals that would make it mandatory for &lt;em&gt;all&lt;/em&gt; service providers (text messaging, email, social media, cloud storage, hosting services, etc.) to scan &lt;em&gt;all&lt;/em&gt; communications and &lt;em&gt;all&lt;/em&gt; files (including end-to-end encrypted ones), in order to supposedly detect whatever the government deems &#34;abusive material.&#34;&lt;/p&gt; &lt;p&gt;The push for Chat Control started in 2021 with the approval of a &lt;a href=&#34;https://www.patrick-breyer.de/en/chatcontrol-european-parliament-approves-mass-surveillance-of-private-communications/&#34;&gt;derogation&lt;/a&gt; to the ePrivacy Directive by the European Parliament. This derogation escalated to a second proposal for &lt;em&gt;mandatory&lt;/em&gt; scanning a year later, which was &lt;a href=&#34;https://fortune.com/europe/2023/10/26/eu-chat-control-csam-encryption-privacy-european-commission-parliament-johansson-breyer-zarzalejos-ernst/&#34;&gt;rejected&lt;/a&gt; in 2023. Nevertheless, lawmakers and lobbyists determined to undermine our safety and civil liberties are bringing it back again two years later, &lt;strong&gt;literally trying to wear you down&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;We cannot let authoritarians wear us down until we lose all our privacy rights. Our privacy rights are fundamental to so many other human rights, to civil liberties, to public safety, and to functioning democracies.&lt;/p&gt; &lt;p&gt;Chat Control undermines all of this.&lt;/p&gt; &lt;p&gt;Cryptography professor and cybersecurity expert Matthew Green described the 2022 proposal document for Chat Control as &#34;&lt;a href=&#34;https://fortune.com/2022/05/12/europe-phone-surveillance-crackdown-child-sexual-abuse-material-sparks-outrage-among-cybersecurity-experts-privacy-activists/&#34;&gt;&lt;strong&gt;the most terrifying thing I&#39;ve ever seen&lt;/strong&gt;&lt;/a&gt;&#34;.&lt;/p&gt; &lt;p&gt;And terrifying, it is.&lt;/p&gt; &lt;p&gt;The &lt;a href=&#34;https://tuta.com/blog/chat-control-criticism&#34;&gt;most recent proposal for Chat Control&lt;/a&gt; comes from the EU Council Danish presidency pushing for regulation misleadingly called the &lt;strong&gt;Child Sexual Abuse Regulation&lt;/strong&gt; (CSAR). Despite its seemingly caring name, this regulation will &lt;strong&gt;not&lt;/strong&gt; help fight child abuse, and will even likely worsen it, impacting negatively what is already being done to fight child abuse (more on this in the &lt;a href=&#34;#would-this-protect-the-children&#34;&gt;next section&lt;/a&gt;).&lt;/p&gt; &lt;p&gt;The CSAR proposal (which &lt;em&gt;is&lt;/em&gt; the latest iteration of Chat Control) could be implemented as early as &lt;em&gt;next month&lt;/em&gt;, if we do not stop it.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;The problem is this: Chat Control will not work, it is unreliable, it will escalate in scope, and it will endanger everyone (including the children).&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Even if you are not in Europe, know that Chat Control will affect everyone inside &lt;em&gt;and&lt;/em&gt; outside of Europe one way or another. Regardless of where you are, you should be concerned and pay attention, and there are things you can do to fight back. This is important.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Still image from a video showing an illustration of three cellphones being scanned by a red light, with lines leading to a law enforcement icon.&#34; src=&#34;../../../../assets/images/chat-control-must-be-stopped/chatcontrol-stopscanningme-video.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Still image from &lt;a href=&#34;https://stopscanningme.eu/video/csar-explainer.mp4&#34;&gt;video&lt;/a&gt;: Stop Scanning Me / EDRi&lt;/small&gt;&lt;/p&gt; &lt;h2 id=&#34;why-is-this-bad&#34;&gt;Why is this bad?&lt;/h2&gt; &lt;p&gt;The idea that it&#39;s possible to somehow &lt;a href=&#34;../../../04/11/encryption-is-not-a-crime/#magical-backdoor-only-for-the-good-guys-is-a-complete-fantasy&#34;&gt;magically protect&lt;/a&gt; information properly while giving access to unquestionably well-intended law enforcement comes from either extreme naivety, lack of information, and plain dishonesty.&lt;/p&gt; &lt;p&gt;This proposal would effectively break any end-to-end encryption protections, and potentially expose all your files and communications to not only law enforcement, but eventually also to criminals of all sorts (with the data breaches, data leaks, and corruption that will inevitably follow).&lt;/p&gt; &lt;p&gt;Here&#39;s a summary of some dangers this regulation would create if approved:&lt;/p&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;Breaking end-to-end encryption&lt;/strong&gt;: Removing crucial protections for all sensitive files and communications of vulnerable populations, victims, whistleblowers, journalists, activists, and everyone else.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;Mission creep&lt;/strong&gt;: Once this mass surveillance system is in place, authorities can decide to add more criteria such as searching all communications for references to drug use, protest attendances, political dissidence, or even &lt;a href=&#34;https://www.lemonde.fr/en/international/article/2025/03/22/how-a-french-researcher-being-refused-entry-to-the-us-turned-into-a-diplomatic-mess_6739415_4.html&#34;&gt;negative comments&lt;/a&gt; about a leader. Europol (the EU law enforcement agency) has already called for &lt;a href=&#34;https://www.youtube.com/watch?v=L933xDcSS3o&amp;amp;t=2016s&#34;&gt;expanding the program&lt;/a&gt;.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;p&gt;&lt;img alt=&#34;A cartoon illustration explaining that chat control is planning to monitor all chats, emails, and messenger conversations, and use artificial intelligence to automatically report flagged content to the police.&#34; src=&#34;../../../../assets/images/chat-control-must-be-stopped/chatcontrol-LornaSchutte-chatcontroleu-1.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Image: Lorna Schütte / &lt;a href=&#34;https://www.chatcontrol.eu&#34;&gt;chatcontrol.eu&lt;/a&gt;&lt;/small&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;Criminal attacks&lt;/strong&gt;: Each time a backdoor exists, it doesn&#39;t take long for criminals to find access and steal our information. This could include criminals finding access to each service independently or to the entire database authorities would keep. A database that would be filled with material tagged as sexually explicit text or photos of children. This could even &lt;em&gt;create&lt;/em&gt; new Child Sexual Abuse Material (CSAM) for criminals. For example, consenting teenagers innocently sexting together could have their photos collected in this database, after being wrongly flagged by the automated system. Then, criminals could steal their intimate photos from the governments.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;False positives&lt;/strong&gt;: With a mass surveillance system this large, moreover a system with no transparency and little oversight, false positives are inevitable. Despite marketing promises from the &lt;a href=&#34;https://www.patrick-breyer.de/en/chat-control-eu-ombudsman-criticises-revolving-door-between-europol-and-chat-control-tech-lobbyist-thorn/&#34;&gt;organizations lobbying government officials&lt;/a&gt;, we all know AI technologies regularly misfire and cannot be reliable for anything of such importance. Loving parents could get flagged as pedophiles just for innocently uploading a photo of their child in the bathtub on their &lt;em&gt;private&lt;/em&gt; cloud. Teenagers exploring their sexuality consensually with each other could get tagged as sexual predators (a label that might stick on them decades later). The police could receive reports for breastfeeding mothers. The list is infinite.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;p&gt;&lt;img alt=&#34;A cartoon illustration summarizing why chat control is dangerous.&#34; src=&#34;../../../../assets/images/chat-control-must-be-stopped/chatcontrol-LornaSchutte-chatcontroleu-3.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Image: Lorna Schütte / &lt;a href=&#34;https://www.chatcontrol.eu&#34;&gt;chatcontrol.eu&lt;/a&gt;&lt;/small&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;Overwhelming resources&lt;/strong&gt;: The inevitable false positives will completely overwhelm the agencies responsible for investigating flagged material. This will cost them precious time they will not have to investigate &lt;em&gt;actual&lt;/em&gt; abuse cases. Organizations fighting child sexual abuse are already overwhelmed and lack resources to prosecute real criminals.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;Hurting victims&lt;/strong&gt;: Such system of mass surveillance could prevent victims of child sexual abuse (and other crimes) to reach out for help. Knowing that all their communications would be scanned, they would lose all confidentiality while reporting crimes. The evidences they share could even be tagged by Chat Control, as if they were the perpetrator rather than the victim. Sadly, many will likely decide it&#39;s safer not to report at all.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;Self-censorship&lt;/strong&gt;: With Chat Control in place, not only victims might censor themselves and stop reaching out for help, but everyone else as well. When people know they are being observed, they feel less free to be themselves and to share openly. This is doubly true for anyone who is part of a marginalized group, such as &lt;a href=&#34;../../../06/03/importance-of-privacy-for-the-queer-community/&#34;&gt;LGBTQ+ people&lt;/a&gt;, or anyone who is being victimized or at risk of victimization.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;p&gt;&lt;img alt=&#34;A cartoon illustration explaining how chat control does not protect the victims and might silence them due to loss of confidentiality.&#34; src=&#34;../../../../assets/images/chat-control-must-be-stopped/chatcontrol-LornaSchutte-chatcontroleu-2.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Image: Lorna Schütte / &lt;a href=&#34;https://www.chatcontrol.eu&#34;&gt;chatcontrol.eu&lt;/a&gt;&lt;/small&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;Undermining democracy&lt;/strong&gt;: This surveillance system would allow governments to spy on opposition. Chat logs from opposing candidates, activists, and journalists could all be accessed by authorities in order to silence opponents or blackmail candidates. Even if you trust your government to not do this now, this doesn&#39;t mean it could not be used in this way by the next government. We have all seen how fast the political landscape can change.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;strong&gt;Violating the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; (and other laws)&lt;/strong&gt;: The General Data Protection Regulation (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;) offers wonderful protections to Europeans. Sadly, Chat Control would make a complete farce of it. The Right to Erasure (right to delete) could be reduced to ashes by Chat Control, including for any highly sensitive information wrongly caught in the CSAR net. Moreover, it would &lt;a href=&#34;https://tuta.com/blog/chat-control-criticism&#34;&gt;violate Article 7 and Article 8&lt;/a&gt; of the EU Charter of Fundamental Rights.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;p&gt;Protecting the children is only the excuse used in hope of convincing a misinformed public. &lt;strong&gt;Chat Control is authoritarian mass surveillance.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Authorities understand well how important protecting communication and information is. This is why they included an exemption to protect &lt;em&gt;their own&lt;/em&gt; communications, but not yours.&lt;/p&gt; &lt;h2 id=&#34;would-this-protect-the-children&#34;&gt;Would this protect the children?&lt;/h2&gt; &lt;p&gt;No.&lt;/p&gt; &lt;p&gt;This cannot be stressed enough: &lt;strong&gt;This regulation would not protect the children, it would &lt;em&gt;harm&lt;/em&gt; the children&lt;/strong&gt;, and everyone else too, worldwide. Claiming otherwise is either naivety, or misinformation.&lt;/p&gt; &lt;p&gt;Last year, the civil and human rights association European Digital Rights (EDRi) put together a &lt;a href=&#34;https://edri.org/our-work/joint-statement-on-the-future-of-the-csa-regulation/&#34;&gt;joint statement from 48 organizations&lt;/a&gt; for children&#39;s protection, digital rights, and human rights, demanding that the European Parliament invest instead in proven strategies to fight child abuse. This appeal to reason does not seem to have been heard by most EU Member States.&lt;/p&gt; &lt;p&gt;There are many things we can do as a society to increase protections for children and fight abusers and criminals, but Chat Control is far from it all. Protection of the children is clearly only an excuse here, and a very misleading one.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;A popular No Yes meme, with the face replaced with the European Commission logo. In the No-part is: &amp;quot;Invest in: social workers, help for victims, support hotlines, prevention, education, targeted police work, IT-security&amp;quot;, and in the Yes-part below is: &amp;quot;Buy Chat Control filter technology that doesn&#39;t solve the problem&amp;quot;.&#34; src=&#34;../../../../assets/images/chat-control-must-be-stopped/chatcontrol-stopscanningme-meme-4.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;&lt;a href=&#34;https://stopscanningme.eu/en/organise-now.html&#34;&gt;Image&lt;/a&gt;: Stop Scanning Me / EDRi&lt;/small&gt;&lt;/p&gt; &lt;h3 id=&#34;mislabelling-children-as-criminals&#34;&gt;Mislabelling children as criminals&lt;/h3&gt; &lt;p&gt;First, this automated system is flawed in many ways, and the false-positive rate would likely be high. But let&#39;s imagine that, magically, the system could flag CSAM at an accuracy rate of 99%. This still means 1% of reports would be false. Expanded to the size of European Union&#39;s population of approximately 450 million people, exchanging likely billions of messages and files every day, this still means millions could be falsely tagged as sexual predators, with all the &lt;a href=&#34;https://www.republik.ch/2022/12/08/die-dunklen-schatten-der-chatkontrolle&#34;&gt;consequences&lt;/a&gt; this implies.&lt;/p&gt; &lt;p&gt;Worse, the Swiss federal police reported that currently about 80% of all automated reports received were &lt;a href=&#34;https://www.patrick-breyer.de/en/posts/chat-control/#WhatYouCanDo&#34;&gt;false-positives&lt;/a&gt;. This means in reality, the error rate is likely far higher than 1%, and actually closer to an &lt;strong&gt;80% error rate&lt;/strong&gt;. Of the approximate 20% of positive reports, in Germany, over 40% of investigations initiated &lt;a href=&#34;https://www.polizei-beratung.de/aktuelles/detailansicht/straftat-verbreitung-kinderpornografie-pks-2022/&#34;&gt;targeted children&lt;/a&gt; themselves.&lt;/p&gt; &lt;p&gt;Sometimes, flagged content is simply teenagers innocently sexting each other consensually. Not only would they be wrongly tagged as criminals under Chat Control, but they&#39;d be triggering an investigation that would expose their intimate photos to some faceless officers or tech employees working on the system.&lt;/p&gt; &lt;p&gt;Even in a magical world where Chat Control AI is 99% accurate, it would still wrongly tag and &lt;strong&gt;expose sensitive data from millions of children&lt;/strong&gt;. In reality, no AI system is even remotely close to this accuracy level, and proprietary algorithms are usually opaque black boxes impossible to audit transparently. The number of children Chat Control would harm, and likely traumatize for life, would be disastrous.&lt;/p&gt; &lt;h3 id=&#34;exposing-childrens-sensitive-and-sexual-information&#34;&gt;Exposing children&#39;s sensitive and sexual information&lt;/h3&gt; &lt;p&gt;Any content that could be deemed suspicious or explicit by the system, accurately or not, would be flagged and reported.&lt;/p&gt; &lt;p&gt;When this content is reported, it will likely be uploaded to a database for human review. This means that if a teenager was sending an intimate photo of themselves to another consenting teenager, they could be flagged as sharing CSAM, even if it&#39;s their own photo. Then, their photo would be sent to the police for review. Information that should very much have stayed protected and private between these two teenagers is now exposed to strangers. This is wrong, and dangerous.&lt;/p&gt; &lt;p&gt;Even innocuous communications such as daily conversations, teenagers chatting with each other, parents reporting information about their child to a &lt;a href=&#34;https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html&#34;&gt;doctor&lt;/a&gt;, and therapists talking with their patients, could all inadvertently expose children sensitive information. This is information that should have remained &lt;em&gt;private&lt;/em&gt;, and would now be uploaded to a police database, likely &lt;a href=&#34;https://www.iccl.ie/news/an-garda-siochana-unlawfully-retains-files-on-innocent-people-who-it-has-already-cleared-of-producing-or-sharing-of-child-sex-abuse-material/&#34;&gt;stored there forever&lt;/a&gt; with few recourses to remove it.&lt;/p&gt; &lt;p&gt;The more we collect sensitive information about children (photos, faces, locations, identifications, medical information, private chats, experiences, etc.), the more we risk exposing children to harm. This includes systems used by authorities and governments. Even if everyone with legitimate access to this data is miraculously 100% exemplary and incorruptible citizens, the databases and scanning systems will still be vulnerable to attacks from criminals and hostile governments alike.&lt;/p&gt; &lt;p&gt;The only way to protect children&#39;s information properly is to &lt;strong&gt;1) not collect it&lt;/strong&gt;, and &lt;strong&gt;2) use end-to-end encryption to protect it&lt;/strong&gt; when we cannot avoid collecting it. Spying on everyone and every child is the opposite of that.&lt;/p&gt; &lt;h3 id=&#34;authorities-databases-will-be-attacked&#34;&gt;Authorities&#39; databases will be attacked&lt;/h3&gt; &lt;p&gt;It&#39;s impossible to perfectly secure information online. There is a lot we can do to improve security (much more than is done now), but data breaches will happen.&lt;/p&gt; &lt;p&gt;If governments mandate a backdoor to have access to all our online communication and stored files, it&#39;s inevitable that at least some criminals will eventually get access to it as well. This is even truer if this system is closed-source, &lt;a href=&#34;https://fortune.com/europe/2023/09/26/thorn-ashton-kutcher-ylva-johansson-csam-csa-regulation-european-commission-encryption-privacy-surveillance/&#34;&gt;privatized&lt;/a&gt;, and isn&#39;t subjected to frequent independent audits with strong accountability.&lt;/p&gt; &lt;p&gt;Once a vulnerability is found by criminals, they will have the same access as authorities have to our data. With Chat Control, this means pretty much all our data.&lt;/p&gt; &lt;p&gt;In addition, Chat Control could facilitate the proliferation of even more spyware and &lt;a href=&#34;https://stopstalkerware.org/&#34;&gt;stalkerware&lt;/a&gt; on the market, thriving on the vulnerabilities found in the powerful system. This would allow &lt;em&gt;anyone&lt;/em&gt; to purchase access to spy on &lt;em&gt;anyone&lt;/em&gt;, including databases of identified children. It could give a direct backdoor-access to pedophiles. How could &lt;em&gt;this&lt;/em&gt; be helping to protect the children?&lt;/p&gt; &lt;h3 id=&#34;the-danger-is-inside&#34;&gt;The danger is inside&lt;/h3&gt; &lt;p&gt;Even if the idea of online strangers accessing children&#39;s sensitive data is terrifying, the worse danger in often much closer.&lt;/p&gt; &lt;p&gt;Sadly, we already know that the &lt;a href=&#34;https://content.c3p.ca/pdfs/C3P_SurvivorsSurveyFullReport2017.pdf&#34;&gt;vast majority&lt;/a&gt; of child sexual abuse is perpetrated by adults close to the child, not strangers, and that two-thirds of CSAM images appear to have been &lt;a href=&#34;https://theconversation.com/new-research-shows-parents-are-major-producers-of-child-sexual-abuse-material-153722&#34;&gt;produced at home&lt;/a&gt;. Chat Control would do nothing to fight this. In fact, it could facilitate it.&lt;/p&gt; &lt;p&gt;Child abuse is an incredibly important topic to discuss and to fight against as a society. Utilizing this issue as an excuse to pass a surveillance law that would endanger everyone, including the victims, is despicable.&lt;/p&gt; &lt;p&gt;When children are living with the abuser, the only escape is outside the home, and sometimes this means &lt;em&gt;online&lt;/em&gt;. Abusers often use spying technologies to control and restrict access to help for their victims. If we make mass surveillance mandatory and normalized, this risks aggravating the stalkerware problem by obligating providers to implement backdoors in their systems. We would effectively be helping abusers at home to restrict access to help for their victims, including victims of CSAM. This is completely unacceptable.&lt;/p&gt; &lt;h3 id=&#34;how-to-actually-help-the-children&#34;&gt;How to actually help the children&lt;/h3&gt; &lt;p&gt;Despite the politicization of this issue to manipulate the public opinion in accepting mass surveillance, there are actually &lt;em&gt;proven&lt;/em&gt; solutions to help to protect the children, online and offline.&lt;/p&gt; &lt;p&gt;First, governments should &lt;a href=&#34;https://mogis.info/static/media/uploads/eu-libe-mogis-hahne-07032023_en.pdf&#34;&gt;listen&lt;/a&gt; to &lt;a href=&#34;https://edri.org/our-work/most-criticised-eu-law-of-all-time/&#34;&gt;organizations already doing the work&lt;/a&gt;. Most are understaffed and under-resourced to properly support the victims and prosecute the criminals. Thousands of more reports every day would not help them do any effective work. More capacity to conduct &lt;em&gt;targeted&lt;/em&gt; investigation and arrest criminals, and more capacity to create safe spaces to support the victims and witnesses will help.&lt;/p&gt; &lt;p&gt;Privacy should be the default, for everyone.&lt;/p&gt; &lt;p&gt;If all our services were using end-to-end encryption when possible, and implemented proper security and privacy features and practices, this would effectively help to protect the children as well. Abusers and criminals are looking for leaked and stolen data all the time. When a cloud photo storage gets hacked, your photos are up for grabs online, including the photos of your children. When parents upload photos of their children and their address online, and this data gets exposed (leaked, breached, AI-scraped, etc.), this data then becomes accessible to criminals.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Better privacy protections also means better protections for the children.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Children themselves should receive better education on how their data is used online and how to protect it. Additionally, it is vital to provide better education on what behaviors aren&#39;t normal coming from an adult, and how to reach out for help when it happens. Children should have access to safe and confidential resources to report abuse, whether it&#39;s happening outside or inside their home.&lt;/p&gt; &lt;p&gt;Parents should be careful when sharing information about their children. And when they have to, they should benefit from complete confidentiality, knowing their communication is fully end-to-end encrypted and not shared with anyone else.&lt;/p&gt; &lt;p&gt;There is so much we can do to help to protect better the children online, surveillance is the opposite of it all.&lt;/p&gt; &lt;h2 id=&#34;how-would-this-affect-me&#34;&gt;How would this affect me?&lt;/h2&gt; &lt;p&gt;If this regulation is approved on &lt;strong&gt;October 14th, 2025&lt;/strong&gt; (the date for the final vote), the consequences would be devastating for everyone, even outside the European Union.&lt;/p&gt; &lt;p&gt;We have seen how platforms implemented better privacy practices and features after the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; became effective in 2018, features that often benefited people worldwide. This could have the same effect in reverse.&lt;/p&gt; &lt;p&gt;Every platform potentially handling data of people located in the EU would be subjected to the law. Platforms would be obligated to scan all communications and all files of (at least) data subjects located in the EU, even data currently protected with end-to-end encryption. This would affect popular apps and services like Signal, Tuta, Proton, WhatsApp, Telegram, and much more.&lt;/p&gt; &lt;h3 id=&#34;outside-of-europe&#34;&gt;Outside of Europe&lt;/h3&gt; &lt;p&gt;This would not only affect Europeans&#39; data, but also the data of anyone outside communicating with someone located in the European Union. Because end-to-end encryption can only work if &lt;strong&gt;both&lt;/strong&gt; ends are protected.&lt;/p&gt; &lt;p&gt;If Chat Control gets approved and applied, it will become very difficult to communicate with anyone located in the EU while keeping strong protections for your data. Many people might just accept the surveillance passively, and as a result lose their rights, their protections, and compromise their democratic processes. Overtime, this will likely lead to a slippery slope towards dystopian authoritarianism.&lt;/p&gt; &lt;p&gt;Outside of Europe, you could expect to see services removing some privacy-protective features, downgrading encryption, blocking European countries that are subjected to the law, or moving outside of Europe entirely. If localization-based scanning is too complicated to handle for an application, some companies might just decide it&#39;s simpler to scan communications for all users, worldwide.&lt;/p&gt; &lt;p&gt;Additionally, Five Eyes countries (Australia, Canada, New Zealand, the United Kingdom, and the United States) have already &lt;a href=&#34;https://www.youtube.com/watch?v=L933xDcSS3o&amp;amp;t=2163s&#34;&gt;expressed support&lt;/a&gt; for Chat Control, and might be keen to try the same at home, if this gets approved and tested in Europe first.&lt;/p&gt; &lt;h3 id=&#34;inside-of-europe&#34;&gt;Inside of Europe&lt;/h3&gt; &lt;p&gt;Without using tools that would be now deemed illegal, you would lose any protections currently granted by end-to-end encryption. It would become impossible for you to send an email, a text message, or a photo without being observed by your government, and potentially also by criminals and foreign governments, following the inevitable data breaches.&lt;/p&gt; &lt;p&gt;You would have to constantly self-censor to avoid triggering the system and getting reported to the authorities. At first, you would probably just have to stop sending nudes, sexting, or sending photos of naked children in the bathtub or playing at the beach. Then, this would escalate to never mentioning drug or anything that could sound like drug, even as a joke. Later, you might have to stop texting about going to a protest, and stop organizing protests online. Further down the line, you might even have to self-censor to make sure you are not saying anything negative about a leader, or a &lt;a href=&#34;https://www.reuters.com/world/us/trump-administration-resuming-student-visa-appointments-state-dept-official-says-2025-06-18/&#34;&gt;foreign politician&lt;/a&gt; even. This isn&#39;t that hypothetical, this sort of &lt;a href=&#34;https://www.hrw.org/news/2017/11/19/china-police-big-data-systems-violate-privacy-target-dissent&#34;&gt;oppressive surveillance&lt;/a&gt; already exists in some countries.&lt;/p&gt; &lt;p&gt;Many services you currently rely on right now would simply shut down, or move away from Europe entirely. Businesses might also move outside of Europe if they worry about protecting their proprietary information. This could cause massive layoffs, while organizations move to jurisdictions where they are allowed to keep their data protected and unobserved.&lt;/p&gt; &lt;p&gt;Finally, even if this doesn&#39;t affect you personally, or you don&#39;t believe it will, &lt;a href=&#34;../../../03/10/the-privacy-of-others/&#34;&gt;&lt;strong&gt;this isn&#39;t just about you&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;The data of vulnerable people would be exposed and their safety put at risk. Victims might decide to stop reaching out for help or reporting crimes. Sources requiring anonymity might decide the risk isn&#39;t worth reporting valuable information to journalists. Opponents of governments in power could be silenced. Every democracy in the European Union would suffer greatly from it.&lt;/p&gt; &lt;p&gt;Chat Control is completely antithetical to the values the European Union has been presenting to the world in recent years.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;The popular Red Dress meme, with the offended woman overlaid with the words &amp;quot;Fundamental Rights&amp;quot;, the whistling man the words &amp;quot;European Commission&amp;quot;, and woman wearing the red dress the words &amp;quot;Scanning private messages and controlling how citizens use the internet&amp;quot;.&#34; src=&#34;../../../../assets/images/chat-control-must-be-stopped/chatcontrol-stopscanningme-meme-2.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;&lt;a href=&#34;https://stopscanningme.eu/en/organise-now.html&#34;&gt;Image&lt;/a&gt;: Stop Scanning Me / EDRi&lt;/small&gt;&lt;/p&gt; &lt;h2 id=&#34;what-can-i-do-about-it&#34;&gt;What can I do about it?&lt;/h2&gt; &lt;p&gt;Even if the landscape seems dismal, &lt;strong&gt;the battle isn&#39;t over&lt;/strong&gt;. There are many things you can do, right now, to fight against this authoritarian dystopia.&lt;/p&gt; &lt;h3 id=&#34;for-europeans-specifically&#34;&gt;For Europeans, specifically&lt;/h3&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;Contact your country representatives &lt;strong&gt;TODAY&lt;/strong&gt;. The group Fight Chat Control has put together an &lt;a href=&#34;https://fightchatcontrol.eu/#contact-tool&#34;&gt;&lt;strong&gt;easy tool&lt;/strong&gt;&lt;/a&gt; making this quick with only a few clicks.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;After September 12th, the battle isn&#39;t over. Although governments will finalize their positions on that day, the final vote happens on &lt;strong&gt;October 14th, 2025&lt;/strong&gt;. If you missed the September 12th deadline, keep contacting your representatives anyway.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;Tell your family and friends to contact their representatives as well, talk about it, make noise.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;h3 id=&#34;for-everyone-including-europeans&#34;&gt;For Everyone, including Europeans&lt;/h3&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;Talk about Chat Control on social media often, especially this month. Make noise online. Use the hashtags #ChatControl and #StopScanningMe to help others learn more about the opposition movement.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;Share informative &lt;a href=&#34;#resources-to-learn-more-and-fight-for-human-rights&#34;&gt;videos and memes&lt;/a&gt; about Chat Control. Spread the word in various forms.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;Contact your European friends in impacted countries and tell them to contact their representatives NOW.&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;Even outside the EU, you can contact your own representatives as well, to let them know regulations like Chat Control are horrible for human rights, and you hope your country will never fall for such repressive laws. Tell your political representatives that privacy rights are important to you. &lt;strong&gt;Your voice matters.&lt;/strong&gt;&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;p&gt;We need your help to fight this. For democracy, for privacy, and for all other human rights, we cannot afford to lose this battle.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Screenshot of the Fight Chat Control website in a browser.&#34; src=&#34;../../../../assets/images/chat-control-must-be-stopped/chatcontrol-fightchatcontrol-website.webp&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Screenshot: &lt;a href=&#34;https://fightchatcontrol.eu/&#34;&gt;fightchatcontrol.eu&lt;/a&gt;&lt;/small&gt;&lt;/p&gt; &lt;h2 id=&#34;resources-to-learn-more-and-fight-for-human-rights&#34;&gt;Resources to learn more, and fight for human rights&lt;/h2&gt; &lt;h3 id=&#34;videos-about-chat-control&#34;&gt;Videos about Chat Control&lt;/h3&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://stopscanningme.eu/video/csar-explainer.mp4&#34;&gt;&lt;strong&gt;Stop Scanning Me&lt;/strong&gt;: Short video that summarizes perfectly the issues with Chat Control&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.patrick-breyer.de/posts/chat-control/&#34;&gt;&lt;strong&gt;Stop Scanning Me&lt;/strong&gt;: German-language version of the same short video&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=3NyUgv6dpJc&#34;&gt;&lt;strong&gt;Louis Rossmann&lt;/strong&gt;: Video discussing why privacy matters, and the impact of Chat Control from a perspective outside of Europe&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.youtube.com/watch?v=L933xDcSS3o&#34;&gt;&lt;strong&gt;Shaping Opinion&lt;/strong&gt;: Excellent interview with Chat Control expert Patrick Breyer (recommended)&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://peertube.european-pirates.eu/c/patrick_breyer_mep_channel&#34;&gt;&lt;strong&gt;Patrick Breyer&lt;/strong&gt;: PeerTube channel with numerous videos related to Chat Control (German &amp;amp; English)&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;h3 id=&#34;memes-about-chat-control&#34;&gt;Memes about Chat Control&lt;/h3&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://stopscanningme.eu/en/organise-now.html&#34;&gt;&lt;strong&gt;Stop Scanning Me&lt;/strong&gt;: Memes, banners, and other graphics&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.patrick-breyer.de/posts/chat-control/#WhatYouCanDo&#34;&gt;&lt;strong&gt;Patrick Breyer&lt;/strong&gt;: Memes, explainers, maps, and other graphics&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;h3 id=&#34;websites-with-more-information&#34;&gt;Websites with more information&lt;/h3&gt; &lt;ul&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://fightchatcontrol.eu/&#34;&gt;&lt;strong&gt;Fight Chat Control&lt;/strong&gt; (Contact your representatives here &lt;strong&gt;TODAY&lt;/strong&gt;!)&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://stopscanningme.eu&#34;&gt;&lt;strong&gt;Stop Scanning Me&lt;/strong&gt; (from EDRi)&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://www.patrick-breyer.de/posts/chat-control/&#34;&gt;&lt;strong&gt;Patrick Breyer&lt;/strong&gt; (expert and former Member of the European Parliament)&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://eu.ci/eu-chat-control-regulation/&#34;&gt;&lt;strong&gt;European Crypto Initiative&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;li&gt; &lt;p&gt;&lt;a href=&#34;https://mastodon.social/@chatcontrol&#34;&gt;Follow &lt;strong&gt;Fight Chat Control&lt;/strong&gt; on Mastodon for updates&lt;/a&gt;&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;hr /&gt; &lt;p&gt;&lt;strong&gt;Update (9/15):&lt;/strong&gt; Added modifications related to the second important deadline for action, on October 14th.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Update (9/8):&lt;/strong&gt; Added clarification about what Chat Control is for readers unfamiliar with it.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/09/08/chat-control-must-be-stopped/</link> <pubDate>Mon, 15 Sep 2025 16:30:00 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/09/08/chat-control-must-be-stopped/</guid> </item> <item> <title>&amp;ldquo;We [Don&#39;t] Care About Your Privacy&amp;rdquo;</title> <author>Em</author> <category>Tutorials</category> <description>&lt;h1 id=&#34;we-dont-care-about-your-privacy&#34;&gt;&amp;ldquo;We [Don&#39;t] Care About Your Privacy&amp;rdquo;&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Filtered photo of a metal container left on the street, with on it the painted sentence &amp;quot;We&#39;ve updated our privacy policy.&amp;quot; with three faded happy face icons around it. On and around the container are icons of hidden red flags.&#34; src=&#34;../../../../assets/images/red-and-green-privacy-flags/dontcare-cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Photo: Lilartsy / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;They all claim &#34;Your privacy is important to us.&#34; How can we know if that&#39;s true? With privacy washing being normalized by big tech and startups alike, it becomes increasingly difficult to evaluate who we can trust with our personal data. Fortunately, there are red (and green) flags we can look for to help us.&lt;!-- more --&gt;&lt;/p&gt; &lt;p&gt;If you haven&#39;t heard this term before, &lt;a href=&#34;../../../08/20/privacy-washing-is-a-dirty-business/&#34;&gt;privacy washing&lt;/a&gt; is the practice of misleadingly, or fraudulently, presenting a product, service, or organization as being trustworthy for data privacy, when in fact it isn&#39;t.&lt;/p&gt; &lt;p&gt;Privacy washing isn&#39;t a new trend, but it has become more prominent in recent years, as a strategy to gain trust from progressively more suspicious prospect customers. Unless politicians and regulators start getting much more serious and severe about protecting our privacy rights, this trend is likely to only get worse.&lt;/p&gt; &lt;p&gt;In this article, we will examine common indicators of privacy washing, and the &#34;red&#34; and &#34;green&#34; flags we should look for to make better-informed decisions and avoid deception.&lt;/p&gt; &lt;h2 id=&#34;spotting-the-red-flags&#34;&gt;Spotting the red flags&lt;/h2&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Marketing claims can be separated from facts by an abysmally large pit of lies&lt;/p&gt; &lt;/div&gt; &lt;p&gt;It&#39;s important to keep in mind that it&#39;s not the most visible product that&#39;s necessarily the best. More visibility only means more marketing. &lt;span class=&#34;pullquote-source&#34;&gt;Marketing claims can be separated from facts by an abysmally large pit of lies&lt;/span&gt;.&lt;/p&gt; &lt;p&gt;Being able to distinguish between facts and marketing lies is an important skill to develop, doubly so on the internet. After all, it&#39;s difficult to find a single surface of the internet that isn&#39;t covered with ads, whether in plain sight or lurking in the shadows, disguised as innocent comments and enthusiastic reviews.&lt;/p&gt; &lt;p&gt;So what can we do about it?&lt;/p&gt; &lt;p&gt;There are some signs that should be considered when evaluating a product to determine its trustworthiness. It&#39;s unfair this burden falls on us, but sadly, until we get better regulations and institutions to protect us, we will have to protect ourselves.&lt;/p&gt; &lt;p&gt;It&#39;s also important to remember that evaluating trustworthiness isn&#39;t binary, and isn&#39;t permanent. There is always at least some risk, no matter how low, and trust should always be revoked when new information justifies it.&lt;/p&gt; &lt;div class=&#34;admonition info&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Examine flags collectively, and in context&lt;/p&gt; &lt;p&gt;It&#39;s important to note that each red flag isn&#39;t necessarily a sign of untrustworthiness on its own (and the same is true for green flags, in reverse). But the more red flags you spot, the more suspicious you should get.&lt;/p&gt; &lt;p&gt;Taken into account &lt;em&gt;together&lt;/em&gt;, these warning signs can help us estimate when it&#39;s probably reasonably safe to trust (low risk), when we should revoke our trust, or when we should refrain from trusting a product or organization entirely (high risk).&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;conflict-of-interest&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Conflict of interest&lt;/h3&gt; &lt;p&gt;Conflict of interest is one of the biggest red flag to look for. It comes in many shapes: Sponsorships, affiliate links, parent companies, donations, employments, personal relationships, and so on and so forth.&lt;/p&gt; &lt;h4 id=&#34;content-sponsorships-and-affiliate-links&#34;&gt;Content sponsorships and affiliate links&lt;/h4&gt; &lt;p&gt;Online influencers and educators regularly receive offers to &#34;monetize their audience with ease&#34; if they accept to overtly or subtly advertise products within their content. If this isn&#39;t explicitly presented as advertising, then there is obviously a strong conflict of interest. The same is true for affiliate links, where creators receive a sum of money each time a visitor clicks on a link or purchase a product from this link.&lt;/p&gt; &lt;p&gt;It&#39;s understandable that content creators are seeking sources of revenue to continue doing their work. This isn&#39;t an easy job. But a trustworthy content creator should always &lt;strong&gt;disclose&lt;/strong&gt; any potential conflicts of interest related to their content, and present paid advertising explicitly as paid advertising.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Before trusting content online, try to examine what the sources of revenue are for this content. Look for affiliate links and sponsorships, and try to evaluate if what you find might have influenced the impartiality of the content.&lt;/p&gt; &lt;/div&gt; &lt;h4 id=&#34;parent-companies&#34;&gt;Parent companies&lt;/h4&gt; &lt;p&gt;This one is harder to examine, but is extremely important. In today&#39;s corporate landscape, it&#39;s not rare to find conglomerates of corporations with a trail of ownership so long it&#39;s sometimes impossible to find the head. Nevertheless, investigating which company owns which is fundamental to detect conflicts of interest.&lt;/p&gt; &lt;p&gt;For example, the corporation &lt;a href=&#34;https://en.wikipedia.org/wiki/Teddy_Sagi#Kape_Technologies&#34;&gt;Kape Technologies&lt;/a&gt; is the owner of both &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers (ExpressVPN, CyberGhost, Private Internet Access, and Zenmate) and websites publishing &lt;a href=&#34;https://cyberinsider.com/kape-technologies-owns-expressvpn-cyberghost-pia-zenmate-vpn-review-sites/&#34;&gt;&lt;em&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; reviews&lt;/em&gt;&lt;/a&gt;. Suspiciously, their own &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers always get ranked at the top on their own review websites. Even if there were no explicit directive for the websites to do this, which review publisher would dare to rank negatively a product owned by its parent company, the one keeping them alive? This is a direct and obvious conflict of interest.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Look at the &lt;em&gt;Terms of Service&lt;/em&gt; and &lt;em&gt;Privacy Policy&lt;/em&gt; (or &lt;em&gt;Privacy Notice&lt;/em&gt;) for declarations related to a parent company. This is often stated there. You can also examine an organization&#39;s &lt;em&gt;About&lt;/em&gt; page, Wikipedia page, or even the official government corporate registries to find out if anyone else owns an organization.&lt;/p&gt; &lt;/div&gt; &lt;h4 id=&#34;donations-event-sponsorships-and-other-revenues&#34;&gt;Donations, event sponsorships, and other revenues&lt;/h4&gt; &lt;p&gt;When money is involved, there is always a potential for conflict of interest. If an organization receives a substantial donation, grant, or loan from another, it will be difficult to remain impartial about it. Few would dare to talk negatively about a large donor.&lt;/p&gt; &lt;p&gt;This isn&#39;t necessarily a red flag in every situation of course. For example, a receiving organization could be in a position where the donor&#39;s values are aligned, or where impartiality isn&#39;t required. Nevertheless, it&#39;s something important to consider.&lt;/p&gt; &lt;p&gt;In 2016, developer and activist Aral Balkan &lt;a href=&#34;https://ar.al/notes/why-im-not-speaking-at-cpdp/&#34;&gt;wrote&lt;/a&gt; about how he refused an invitation to speak at a panel on Surveillance Capitalism at the &lt;a href=&#34;http://www.cpdpconferences.org&#34;&gt;Computers, Privacy, &amp;amp; Data Protection Conference&lt;/a&gt; (CPDP). The conference had accepted sponsorship from an organization completely antithetical to its stated values: &lt;a href=&#34;https://www.independent.co.uk/news/world/americas/us-politics/trump-doge-palantir-data-immigration-b2761096.html&#34;&gt;Palantir&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Balkan wrote: &#34;The sponsorship of privacy and human rights conferences by corporations that erode our privacy and human rights is a clear conflict of interests that we must challenge.&#34;&lt;/p&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;How could one claim to defend privacy rights while receiving money from organizations thriving on destroying them?&lt;/p&gt; &lt;/div&gt; &lt;p&gt;This is a great example of how sponsors can severely compromise not only the impartiality of an organization, but also its credibility and its values. How could the talks being put forward at such a conference be selected without bias? &lt;span class=&#34;pullquote-source&#34;&gt;How could one claim to defend privacy rights while receiving money from organizations thriving on destroying them?&lt;/span&gt;&lt;/p&gt; &lt;p&gt;It&#39;s worth nothing that this year&#39;s CPDP 2025 sponsors &lt;a href=&#34;https://www.cpdpconferences.org/sponsors-partners&#34;&gt;included&lt;/a&gt; Google, Microsoft, TikTok, and Uber.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Examine who sponsors events and who donates to organizations. Try to evaluate if an organization or event received money from sources that could be in contradiction with its values. Does this compromise its credibility? If a sponsor or donor has conflicting values, what benefit would there be for the sponsor supporting this event or organization?&lt;/p&gt; &lt;/div&gt; &lt;h4 id=&#34;employment-and-relationships&#34;&gt;Employment and relationships&lt;/h4&gt; &lt;p&gt;Finally, another important type of conflicts of interest to keep in mind are the relationships between the individuals producing the content and the companies or products they are reporting on.&lt;/p&gt; &lt;p&gt;For example, if a content creator is working or previously worked for an organization, and the content requires impartiality, this is a potential conflict of interest that should be openly disclosed.&lt;/p&gt; &lt;p&gt;The same can be true if this person is in a professional or personal relationship with people involved with the product. This can be difficult to detect of course, and is not categorically a sign of bias, but it&#39;s worth paying attention to it in our evaluations.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Look for disclaimers related to conflict of interest. Research the history of an organization to gain a better understanding of the people involved. Wikipedia can be a valuable resource for this.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;checkbox-compliance-and-copy-paste-policies&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Checkbox compliance and copy-paste policies&lt;/h3&gt; &lt;p&gt;Regrettably, many organizations have no intention whatsoever to genuinely implement privacy-respectful practices, and are simply trying to get rid of these &#34;pesky privacy regulation requirements&#34; as cheaply and quickly as possible.&lt;/p&gt; &lt;p&gt;They treat privacy law compliance like an annoying list of annoying tasks. They think they can complete this list doing the bare &lt;em&gt;cosmetic&lt;/em&gt; minimum, so that it will all &lt;em&gt;look&lt;/em&gt; like it&#39;s compliant (of course, it is not).&lt;/p&gt; &lt;p&gt;A good clue this mindset might be ongoing in an organization is when it uses a very generic privacy policy and terms of service, policies that are often simply copy-pasted from another website or AI-generated (which is kind of the same thing).&lt;/p&gt; &lt;p&gt;Not only this is &lt;em&gt;extremely unlikely&lt;/em&gt; to truly fulfill the requirements for privacy compliance, but it also almost certainly infringes on &lt;em&gt;copyright&lt;/em&gt; laws.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;If you find few details in a privacy policy that are specific to the organization, try copying one of its paragraph or long sentence in a search engine (using quotation marks around it to find the exact same entry). This will help detect where other websites are using the same policy.&lt;/p&gt; &lt;p&gt;Some might be using legitimate templates of course, but even legal usable policy templates need to be customized heavily to be compliant. Sadly, many simply copy-paste material from other organizations without permission, or use generative AI tools doing the same.&lt;/p&gt; &lt;p&gt;If the whole policy is copied without customization, it&#39;s very unlikely to describe anything true.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;meaningless-privacy-compliance-badges&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Meaningless privacy compliance badges&lt;/h3&gt; &lt;p&gt;Many businesses and startups have started to proudly display privacy law &#34;&lt;a href=&#34;https://www.shutterstock.com/search/compliance-badge&#34;&gt;compliance badges&lt;/a&gt;&#34; on their websites, to reassure potential clients and customers.&lt;/p&gt; &lt;p&gt;While it can indeed be reassuring at first glance to see &#34;&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; Compliant!&#34;, &#34;CCPA Privacy Approved&#34;, and other deceitful designs, there is no central authority verifying this systematically. At this time, anyone could decide to claim they are &#34;&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; Compliant&#34; and ornate their website with a pretty badge.&lt;/p&gt; &lt;p&gt;Moreover, if this claim isn&#39;t true, this is fraudulent of course and likely to break many laws. But some businesses bet on the assumption that no one will verify or report it, or that data protection authorities simply have better things to do.&lt;/p&gt; &lt;p&gt;While most privacy regulations adopt principles similar to the European General Data Protection Regulation (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;) &lt;a href=&#34;https://commission.europa.eu/law/law-topic/data-protection/rules-business-and-organisations/obligations/how-can-i-demonstrate-my-organisation-compliant-gdpr_en&#34;&gt;principle of accountability&lt;/a&gt; (where organizations are responsible for compliance and for demonstrating compliance), organizations&#39; assertions are rarely challenged or audited. Because most of the time there isn&#39;t anyone verifying compliance unless there&#39;s an individual complaint, organizations have grown increasingly fearless with false claims of compliance.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Never trust a claim of privacy compliance at face value, especially if it comes in the shape of a pretty website badge.&lt;/p&gt; &lt;p&gt;Examine organizations&#39; privacy policies, contact them and ask questions, look for independent reviews, investigate to see if an organization has been reported before. Never trust a first-party source to tell you how great and compliant the first-party is.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;fake-reviews&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Fake reviews&lt;/h3&gt; &lt;p&gt;Fake reviews are a growing problem on the internet. And this was only aggravated by the arrival of generative AI. There are so many review websites that are simply advertising in disguise. Some fake reviews are &lt;a href=&#34;https://apnews.com/article/fake-online-reviews-generative-ai-40f5000346b1894a778434ba295a0496&#34;&gt;generated by AI&lt;/a&gt;, some are paid for or &lt;a href=&#34;../../../../2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/&#34;&gt;influenced by sponsorships and affiliate links&lt;/a&gt;, some are in &lt;a href=&#34;https://cyberinsider.com/kape-technologies-owns-expressvpn-cyberghost-pia-zenmate-vpn-review-sites/&#34;&gt;conflict of interest&lt;/a&gt; from parent companies, and many are biased in other ways. Trusting an online review today feels like trying to find the single strand of true grass through an enormous plastic haystack.&lt;/p&gt; &lt;p&gt;Genuine reviews are (were?) usually a good way to get a second opinion while shopping online and offline. Fake reviews pollute this verification mechanism by duping us in believing something comes from an independent third-party, when it doesn&#39;t.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Train yourself to spot fake reviews. There are &lt;a href=&#34;https://www.bbb.org/all/spot-a-scam/how-to-spot-a-fake-review&#34;&gt;many signs&lt;/a&gt; that can help with this, such as language that suspiciously uses the complete and correct product and feature brand each time, reviewers who published an unnatural quantity of reviews in a short period of time, excessively positive review, negative reviews talking about how great this &lt;em&gt;other&lt;/em&gt; brand is, etc. Make sure to look for potential conflicts of interest as well.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;fake-ai-generated-content&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Fake AI-generated content&lt;/h3&gt; &lt;p&gt;Sadly, the internet has been infected by a new plague in recent years: AI-generated content. This was mentioned before, but truly deserves its own red flag.&lt;/p&gt; &lt;p&gt;Besides AI-generated reviews, it&#39;s important to know there are also now multiple articles, social media posts, and even entire websites that are completely AI-generated, and doubly fake. This affliction makes it even harder for readers to find genuine sources of reliable information online. &lt;a href=&#34;https://www.cnn.com/interactive/2023/07/business/detect-ai-text-human-writing/&#34;&gt;Learning to recognize this fake content&lt;/a&gt; is now an internet survival skill.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;If you find a blog that publishes 5 articles per day from the same author every day, be suspicious. Look for publication dates, and if they are inhumanly close to each other, this can be a sign of AI-generated content.&lt;/p&gt; &lt;p&gt;When reading an article, AI-generated text will often use very generic sentences, you will rarely find the colorful writing style that is unique to an author. AI-writing is generally bland with no personality shinning through. You might also notice the writing feels circular. It will seems like it&#39;s not really saying anything specific, except for that one thing, that is repeated over and over.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;excessive-self-references&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Excessive self-references&lt;/h3&gt; &lt;p&gt;When writing an article, review, or a product description, writers often use text links to add sources of information to support their statements, or to provide additional resources to readers.&lt;/p&gt; &lt;p&gt;When &lt;strong&gt;all&lt;/strong&gt; the text links in an article point to the same source, you should grow suspicious. If all the seemingly external links only direct to material created from the original source, this can give the impression of supporting independent evidences, when in fact there aren&#39;t any.&lt;/p&gt; &lt;p&gt;Of course, organizations will sometimes refer back to their own material to share more of what they did with you (we certainly do!), but if an article or review &lt;em&gt;only&lt;/em&gt; uses self-references, and these references also only use self-references, this could be a red flag.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Even if you do not click on links, at least hover over them to see where they lead. Usually, trustworthy sources will have at least a few links pointing to &lt;em&gt;external&lt;/em&gt; third-party websites. A diversity of supporting resources is important when conducting impartial research, and should be demonstrated there whenever relevant.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;deceptive-designs&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Deceptive designs&lt;/h3&gt; &lt;p&gt;Deceptive design can be difficult to spot. Sometimes it&#39;s obvious, like a cookie banner with a ridiculously small &lt;small&gt;&#34;reject all&#34;&lt;/small&gt; button, or an opt-out option hidden under twenty layers of menu.&lt;/p&gt; &lt;p&gt;Most of the time however, deceptive design is well-planned to psychologically manipulate us to pick the option most favorable to the company, at the expense of our privacy. The Office of the Privacy Commissioner of Canada has produced this informative &lt;a href=&#34;https://www.priv.gc.ca/en/privacy-topics/technology/online-privacy-tracking-cookies/online-privacy/deceptive-design/gd_dd-ind/&#34;&gt;web page&lt;/a&gt; to help us recognize better deceptive design.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Favor tools and services that are built for privacy from the ground up, and always default to privacy first. Train yourself to spot deceptive patterns and be persistent to choose the most privacy-protective option.&lt;/p&gt; &lt;p&gt;Don&#39;t be afraid to &lt;a href=&#34;../../../06/17/you-can-say-no/&#34;&gt;say no&lt;/a&gt;, to reject options and products, and to also report them when deceptive design becomes fraudulent or infringes privacy laws.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;buzzword-language&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Buzzword language&lt;/h3&gt; &lt;p&gt;Be suspicious of buzzword language, especially when it becomes excessive or lacks any supportive evidences. &lt;strong&gt;Remember that buzzwords aren&#39;t a promise, but only marketing to get your attention.&lt;/strong&gt; These words don&#39;t mean anything on their own.&lt;/p&gt; &lt;p&gt;Expressions like &#34;military-grade encryption&#34; are usually designed to inspire trust, but there is &lt;a href=&#34;https://www.howtogeek.com/445096/what-does-military-grade-encryption-mean/&#34;&gt;no such thing&lt;/a&gt; that grants better privacy. Most military organizations likely use industry-standard encryption from solid and tested cryptographic algorithms, like any trustworthy organizations and privacy-preserving tools do.&lt;/p&gt; &lt;p&gt;Newer promises like &#34;AI-powered&#34; are completely empty, if not &lt;em&gt;scary&lt;/em&gt;. Thankfully, many &#34;AI-powered&#34; apps aren&#39;t really AI-powered, and this is a good thing because &#34;AI&#34; is more often &lt;a href=&#34;https://www.sciencenewstoday.org/the-dark-side-of-ai-bias-surveillance-and-control&#34;&gt;a danger to your privacy&lt;/a&gt;, and not an enhancement at all.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Remain skeptical of expressions like &#34;privacy-enhancing&#34;, &#34;privacy-first approach&#34;, &#34;fully-encrypted&#34;, or &#34;fully compliant&#34; when these claims aren&#39;t supported with evidences. Fully encrypted means nothing if the encryption algorithm is weak, or if the company has access to your encryption keys.&lt;/p&gt; &lt;p&gt;When you see claims of &#34;military-grade encryption&#34;, ask which cryptographic algorithms are used, and how encryption is implemented. Look for evidences and detailed information on technological claims. Never accept vague promises as facts.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;unverifiable-and-unrealistic-promises&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Unverifiable and unrealistic promises&lt;/h3&gt; &lt;p&gt;Along the same lines, many businesses will be happy to promise you the moon. But then, they become reluctant to explain how they will get you the moon, how they will manage to give the moon to multiple customers at once, and what will happen to the planet once they&#39;ve transported the moon away from its orbit to bring it back to you on Earth... Maybe getting the moon isn&#39;t such a good promise after all.&lt;/p&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;companies promising you software that is 100% secure and 100% private are either lying or misinformed themselves&lt;/p&gt; &lt;/div&gt; &lt;p&gt;Similarly, &lt;span class=&#34;pullquote-source&#34;&gt;companies promising you software that is 100% secure and 100% private are either lying or misinformed themselves&lt;/span&gt;.&lt;/p&gt; &lt;p&gt;No software product is 100% secure and/or 100% private. Promises like this are unrealistic, and (fortunately for those companies) often also &lt;em&gt;unverifiable&lt;/em&gt;. But an unverifiable claim shouldn&#39;t default to a trustworthy claim, quite the opposite. Trust must be earned. If a product cannot demonstrate how their claims are true, then we must remain skeptical.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Same as for buzzwords and compliance claims, never trust at face value. If there are no ways for you to verify a claim, remain skeptical and aware this promise could be empty.&lt;/p&gt; &lt;p&gt;Be especially suspicious with organizations repeating exaggerated guarantees such as 100% secure. Organizations that are knowledgeable about security and privacy will usually restrain from such binary statement, and tend to talk about risk reduction with nuanced terms like &#34;more secure&#34;, or &#34;more private&#34;.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;flawed-or-absent-process-for-data-deletion&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Flawed or absent process for data deletion&lt;/h3&gt; &lt;p&gt;Examining an organization&#39;s processes for data deletion can reveal a lot on their privacy practices and expertise. Organizations that are knowledgeable about privacy rights will usually be prepared to respond to data deletion requests, and will already have a process in place, a process that &lt;a href=&#34;../../../06/24/queer-dating-apps-beware-who-you-trust/#they-can-make-deleting-data-difficult&#34;&gt;doesn&#39;t require providing more information&lt;/a&gt; than they already have.&lt;/p&gt; &lt;p&gt;Be especially worried if:&lt;/p&gt; &lt;ul class=&#34;task-list&#34;&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; You don&#39;t find any mentions of data deletion in their privacy policy.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; From your account&#39;s settings or app, you cannot find any option to delete your account and data.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; The account and data deletion process uses vague terms that make it unclear if your data will be truly deleted.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; You cannot find an email address to contact a privacy officer in their privacy policy.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; The email listed in their privacy policy isn&#39;t an address dedicated to privacy.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; You emailed the address listed but didn&#39;t get any reply after two weeks.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Their deletion process requires to fill a form demanding more information than they already have on you, or uses a privacy-invasive third-party like Google Forms.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; They argue with you when you ask for legitimate deletion.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;If this isn&#39;t already explicitly explained in their policies (or if you do not trust their description), find the privacy contact for an organization and email them &lt;em&gt;before&lt;/em&gt; using their products or services, to ask about their data deletion practices.&lt;/p&gt; &lt;p&gt;Ask in advance which information will be required from you in order to delete your data. Also ask if they keep any data afterward, and (if they do) what data they keep. Once data is shared, this could be much harder to deal with. It&#39;s best to verify data deletion processes &lt;em&gt;before&lt;/em&gt; trusting an organization with our data.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;false-reassurances&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; False reassurances&lt;/h3&gt; &lt;p&gt;The goal of privacy washing is to reassure worried clients, consumers, users, patients, and investors into using the organization&#39;s products or services. But making us &lt;em&gt;feel&lt;/em&gt; more secure doesn&#39;t always mean that we are.&lt;/p&gt; &lt;h4 id=&#34;privacy-theaters&#34;&gt;Privacy theaters&lt;/h4&gt; &lt;p&gt;You might have heard the term &#34;security theater&#34; already, but there&#39;s also &#34;&lt;a href=&#34;https://slate.com/technology/2021/12/facebook-twitter-big-tech-privacy-sham.html&#34;&gt;privacy theater&lt;/a&gt;&#34;. Many large tech organizations have mastered this art for decades now. In response to criticisms about their dubious privacy practices, companies like Facebook and Google love to add seemingly &#34;privacy-preserving&#34; options to their software&#39;s settings, to give people the impression it&#39;s possible to use their products while preserving their privacy. But alas, it is not.&lt;/p&gt; &lt;p&gt;Unfortunately, no matter how much you &#34;harden&#34; your Facebook or Google account for privacy, these corporations will keep tracking everything you do on and off their platforms. Yes, enabling these options &lt;em&gt;might&lt;/em&gt; very slightly reduce exposure for &lt;em&gt;some&lt;/em&gt; of your data (and you should enable them if you cannot leave these platforms). However, Facebook and Google will still collect enough data on you to make them billions in profits each year, otherwise they wouldn&#39;t implement these options at all.&lt;/p&gt; &lt;h4 id=&#34;misleading-protections&#34;&gt;Misleading protections&lt;/h4&gt; &lt;p&gt;The same can be said for applications that have built a reputation on a supposedly privacy-first approach like &lt;a href=&#34;https://cybersecuritycue.com/telegram-data-sharing-after-ceo-arrest/&#34;&gt;Telegram&lt;/a&gt; and &lt;a href=&#34;https://insidetelecom.com/whatsapp-security-risk-alert-over-privacy-concerns/&#34;&gt;WhatsApp&lt;/a&gt;. In fact, the protections these apps offer are only partial, often poorly explained to users, and the apps still collect a large amount of data and/or metadata.&lt;/p&gt; &lt;h4 id=&#34;when-deletion-doesnt-mean-deletion&#34;&gt;When deletion doesn&#39;t mean deletion&lt;/h4&gt; &lt;p&gt;In other cases, false reassurance comes in the form of supposedly deleted data that isn&#39;t truly deleted. In 2019, Global News &lt;a href=&#34;https://globalnews.ca/news/5463630/amazon-alexa-keeps-data-deleted-privacy/&#34;&gt;reported&lt;/a&gt; on Amazon&#39;s Alexa virtual assistant speaker that didn&#39;t always delete voice-recorded data as promised. Google was also found &lt;a href=&#34;https://www.cnet.com/tech/services-and-software/google-oops-did-not-delete-street-view-data-as-promised/&#34;&gt;guilty&lt;/a&gt; of this, even after receiving an order from UK&#39;s Information Commissioner&#39;s Office.&lt;/p&gt; &lt;p&gt;This can also happen with cloud storage services that display an option to &#34;delete&#34; a file, when in fact the file is &lt;a href=&#34;https://www.consumersearch.com/technology/cloud-storage-privacy-concerns-learn-permanently-delete-data&#34;&gt;simply hidden&lt;/a&gt; from the interface, while remaining available in a bin directory or from version control.&lt;/p&gt; &lt;p&gt;How many unaware organizations might have inadvertently (or maliciously) kept deleted data by misusing their storage service and version control system? Of course, if a copy of the data is kept in backups or versioning system, then it&#39;s &lt;strong&gt;not&lt;/strong&gt; fully deleted, and doesn&#39;t legally fulfill a data deletion requirement.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Do not simply trust a &#34;privacy&#34; or &#34;opt-out&#34; option. Look at the overall practices of an organization to establish trust. Privacy features have no value at all if we cannot trust the organization that implemented them.&lt;/p&gt; &lt;p&gt;Investigate to find an organization&#39;s history of data breaches and how they responded to it. Was this organization repeatedly fined by data protection authorities? Do not hesitate to ask questions to an organization&#39;s privacy officer about their practices. And look for independent reviews of the organization.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;new-and-untested-technologies&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; New and untested technologies&lt;/h3&gt; &lt;p&gt;Many software startups brag about how revolutionary their NewTechnology™ is. Some even dare to brag about a &#34;unique&#34; and &#34;game-changing&#34; novel encryption algorithm. You should not feel excited by this, you should feel &lt;em&gt;terrified&lt;/em&gt;.&lt;/p&gt; &lt;p&gt;For example, any startups serious about security and privacy will know that &lt;strong&gt;you should never be &lt;a href=&#34;https://www.infosecinstitute.com/resources/cryptography/the-dangers-of-rolling-your-own-encryption/&#34;&gt;&#34;rolling your own crypto&#34;&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt; &lt;p&gt;Cryptography is a complex discipline, and developing a robust encryption algorithm takes a lot of time and transparent testing to achieve. Usually, it is achieved with the help of an entire community of experts. Some beginners might think they had the idea of the century, but until their algorithm has been rigorously tested by hundreds of experts, this is an unfounded claim.&lt;/p&gt; &lt;p&gt;The reason most software use the same few cryptographic algorithms for encryption, and usually follow strict protocols to implement them, is because this isn&#39;t an easy task to do, and the slightest mistake could render this encryption completely useless. The same can be true for other types of technology as well.&lt;/p&gt; &lt;p&gt;Novel technologies might sound more exciting, but &lt;em&gt;proven&lt;/em&gt; and &lt;em&gt;tested&lt;/em&gt; technologies are usually much more reliable when it comes to privacy, and especially when it comes to encryption.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;If a company brags about its new technology, investigate what information they have made available about it. Look for a document called a &lt;em&gt;White Paper&lt;/em&gt;, which should describe in technical details how the technology works.&lt;/p&gt; &lt;p&gt;If the code is open source, look at the project&#39;s page and see how many people have worked on it, who is involved, since how long, etc.&lt;/p&gt; &lt;p&gt;More importantly, look for independent audits from trustworthy experts. Read the reports and verify if the organization&#39;s claims are supported by professionals in the field.&lt;/p&gt; &lt;/div&gt; &lt;h3 id=&#34;critics-from-experts&#34;&gt;&lt;img alt=&#34;🚩&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f6a9.svg&#34; title=&#34;:triangular_flag_on_post:&#34; /&gt; Critics from experts&lt;/h3&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;if you find multiple reports of privacy experts raising the alarm about it, consider this a dark-red red flag&lt;/p&gt; &lt;/div&gt; &lt;p&gt;No matter how much an organization or product claims to be &#34;privacy-first&#34;, &lt;span class=&#34;pullquote-source&#34;&gt;if you find multiple reports of privacy experts raising the alarm about it, consider this a dark-red red flag&lt;/span&gt;.&lt;/p&gt; &lt;p&gt;If a company has been &lt;a href=&#34;../../../05/10/sam-altman-wants-your-eyeball/#privacy-legislators-arent-on-board&#34;&gt;criticized by privacy commissioners&lt;/a&gt;, data protection authorities, privacy professionals, and consumer associations, especially if this has happened repeatedly, you should be &lt;em&gt;very&lt;/em&gt; suspicious.&lt;/p&gt; &lt;p&gt;Sometimes, criticized corporations will use misleading language like &#34;we are currently working with the commissioner&#34;, this &lt;em&gt;isn&#39;t&lt;/em&gt; a good sign.&lt;/p&gt; &lt;p&gt;The marketing department will try to spin any authority audits into something that sounds favorable to the corporation, but this is only privacy washing. They would not be &#34;working with&#34; the privacy commissioner if they hadn&#39;t been forced to in the first place. And &lt;strong&gt;they wouldn&#39;t have been forced to if they truly had privacy-respectful practices&lt;/strong&gt;.&lt;/p&gt; &lt;div class=&#34;admonition success&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;What to do?&lt;/p&gt; &lt;p&gt;Use a search engine to look for related news using keywords such as the company&#39;s name with &#34;data breach&#34;, &#34;fined&#34;, or &#34;privacy&#34;.&lt;/p&gt; &lt;p&gt;Check the product&#39;s or corporation&#39;s Wikipedia page, sometimes there will be references to previous incidents and controversies listed there. Follow trustworthy sources of privacy and security news to stay informed about reported data leaks and experts raising the alarm.&lt;/p&gt; &lt;/div&gt; &lt;h2 id=&#34;looking-for-the-greenish-flags&#34;&gt;Looking for the green(ish) flags&lt;/h2&gt; &lt;p&gt;Now that we have discussed some red flags to help us know when we should be careful, let&#39;s examine the signs that &lt;em&gt;can&lt;/em&gt; be indicator of trustworthiness.&lt;/p&gt; &lt;p&gt;Like for red flags, green flags should always be taken into context and considered together. One, or even a few green flags (or greenish flags) aren&#39;t on their own a guarantee that an organization is trustworthy. Always remain vigilant, and be ready to revoke your trust at any time if new information warrants it.&lt;/p&gt; &lt;h3 id=&#34;independent-reviews&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;?xml version=&#34;1.0&#34; encoding=&#34;UTF-8&#34; standalone=&#34;no&#34;?&gt; &lt;!DOCTYPE svg PUBLIC &#34;-//W3C//DTD SVG 1.1//EN&#34; &#34;http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd&#34;&gt; &lt;svg width=&#34;100%&#34; height=&#34;100%&#34; viewBox=&#34;0 0 36 36&#34; version=&#34;1.1&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34; xmlns:xlink=&#34;http://www.w3.org/1999/xlink&#34; xml:space=&#34;preserve&#34; xmlns:serif=&#34;http://www.serif.com/&#34; style=&#34;fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;&#34;&gt; &lt;path d=&#34;M13,34C13,34 13,36 11,36C9,36 9,34 9,34L9,2C9,2 9,0 11,0C13,0 13,2 13,2L13,34Z&#34; style=&#34;fill:rgb(102,117,127);fill-rule:nonzero;&#34;/&gt; &lt;path d=&#34;M11,4C11,1.8 12.636,0.75 14.636,1.667L31.363,9.334C33.363,10.251 33.363,11.751 31.363,12.667L14.636,20.334C12.636,21.25 11,20.2 11,18L11,4Z&#34; style=&#34;fill:rgb(69,221,46);fill-rule:nonzero;&#34;/&gt; &lt;/svg&gt; &lt;/span&gt; Independent reviews&lt;/h3&gt; &lt;p&gt;Independent reviews from trustworthy sources can be a valuable resource to help to determine if a product is reliable. This is never a guarantee of course, humans (even experts) can also make mistakes (less than AI, but still) and aren&#39;t immune to lies.&lt;/p&gt; &lt;p&gt;However, an impartial review conducted by an expert in the field has the benefit of someone who has likely put many hours investigating this topic, something you might understandably not always have the time to do yourself. But be careful to first evaluate if this is a genuine unbiased assessment, or simply marketing content disguised as one.&lt;/p&gt; &lt;h3 id=&#34;independent-audits&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;?xml version=&#34;1.0&#34; encoding=&#34;UTF-8&#34; standalone=&#34;no&#34;?&gt; &lt;!DOCTYPE svg PUBLIC &#34;-//W3C//DTD SVG 1.1//EN&#34; &#34;http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd&#34;&gt; &lt;svg width=&#34;100%&#34; height=&#34;100%&#34; viewBox=&#34;0 0 36 36&#34; version=&#34;1.1&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34; xmlns:xlink=&#34;http://www.w3.org/1999/xlink&#34; xml:space=&#34;preserve&#34; xmlns:serif=&#34;http://www.serif.com/&#34; style=&#34;fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;&#34;&gt; &lt;path d=&#34;M13,34C13,34 13,36 11,36C9,36 9,34 9,34L9,2C9,2 9,0 11,0C13,0 13,2 13,2L13,34Z&#34; style=&#34;fill:rgb(102,117,127);fill-rule:nonzero;&#34;/&gt; &lt;path d=&#34;M11,4C11,1.8 12.636,0.75 14.636,1.667L31.363,9.334C33.363,10.251 33.363,11.751 31.363,12.667L14.636,20.334C12.636,21.25 11,20.2 11,18L11,4Z&#34; style=&#34;fill:rgb(69,221,46);fill-rule:nonzero;&#34;/&gt; &lt;/svg&gt; &lt;/span&gt; Independent audits&lt;/h3&gt; &lt;p&gt;Similarly, independent audits from credible organizations are very useful to assess a product&#39;s claims. Make sure the company conducting the audit is reputable, impartial, and that you can find a copy of the audit&#39;s report they produced, ideally from a source that &lt;em&gt;isn&#39;t&lt;/em&gt; the audited company&#39;s website (for example, the auditing organization might &lt;a href=&#34;https://cure53.de/#publications&#34;&gt;provide&lt;/a&gt; access to it transparently).&lt;/p&gt; &lt;h3 id=&#34;transparency&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;?xml version=&#34;1.0&#34; encoding=&#34;UTF-8&#34; standalone=&#34;no&#34;?&gt; &lt;!DOCTYPE svg PUBLIC &#34;-//W3C//DTD SVG 1.1//EN&#34; &#34;http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd&#34;&gt; &lt;svg width=&#34;100%&#34; height=&#34;100%&#34; viewBox=&#34;0 0 36 36&#34; version=&#34;1.1&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34; xmlns:xlink=&#34;http://www.w3.org/1999/xlink&#34; xml:space=&#34;preserve&#34; xmlns:serif=&#34;http://www.serif.com/&#34; style=&#34;fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;&#34;&gt; &lt;path d=&#34;M13,34C13,34 13,36 11,36C9,36 9,34 9,34L9,2C9,2 9,0 11,0C13,0 13,2 13,2L13,34Z&#34; style=&#34;fill:rgb(102,117,127);fill-rule:nonzero;&#34;/&gt; &lt;path d=&#34;M11,4C11,1.8 12.636,0.75 14.636,1.667L31.363,9.334C33.363,10.251 33.363,11.751 31.363,12.667L14.636,20.334C12.636,21.25 11,20.2 11,18L11,4Z&#34; style=&#34;fill:rgb(69,221,46);fill-rule:nonzero;&#34;/&gt; &lt;/svg&gt; &lt;/span&gt; Transparency&lt;/h3&gt; &lt;p&gt;Transparency helps a lot to earn trust, and source code that is publicly available helps a lot with transparency. If a piece of software publishes its code for anyone to see, this is already a significant level of transparency above any proprietary code.&lt;/p&gt; &lt;p&gt;Open source code is never a guarantee of security and privacy, but it makes it much easier to verify any organization assertions. This is almost impossible to do when code is proprietary. Because no one outside the organization can examine the code, they must be trusted on their own words entirely. Favor products with code that is transparently available whenever possible.&lt;/p&gt; &lt;h3 id=&#34;verifiable-claims&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;?xml version=&#34;1.0&#34; encoding=&#34;UTF-8&#34; standalone=&#34;no&#34;?&gt; &lt;!DOCTYPE svg PUBLIC &#34;-//W3C//DTD SVG 1.1//EN&#34; &#34;http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd&#34;&gt; &lt;svg width=&#34;100%&#34; height=&#34;100%&#34; viewBox=&#34;0 0 36 36&#34; version=&#34;1.1&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34; xmlns:xlink=&#34;http://www.w3.org/1999/xlink&#34; xml:space=&#34;preserve&#34; xmlns:serif=&#34;http://www.serif.com/&#34; style=&#34;fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;&#34;&gt; &lt;path d=&#34;M13,34C13,34 13,36 11,36C9,36 9,34 9,34L9,2C9,2 9,0 11,0C13,0 13,2 13,2L13,34Z&#34; style=&#34;fill:rgb(102,117,127);fill-rule:nonzero;&#34;/&gt; &lt;path d=&#34;M11,4C11,1.8 12.636,0.75 14.636,1.667L31.363,9.334C33.363,10.251 33.363,11.751 31.363,12.667L14.636,20.334C12.636,21.25 11,20.2 11,18L11,4Z&#34; style=&#34;fill:rgb(69,221,46);fill-rule:nonzero;&#34;/&gt; &lt;/svg&gt; &lt;/span&gt; Verifiable claims&lt;/h3&gt; &lt;p&gt;If you can easily verify an organization&#39;s claims, this is a good sign. For example, if privacy practices are explicitly detailed in policies (and match the observed behaviors), if source code is open and easy to inspect, if independent audits have confirmed the organization&#39;s claims, and if the organization is consistent with its privacy practices (in private as much as in public), this all helps to establish trust.&lt;/p&gt; &lt;h3 id=&#34;well-defined-policies&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;?xml version=&#34;1.0&#34; encoding=&#34;UTF-8&#34; standalone=&#34;no&#34;?&gt; &lt;!DOCTYPE svg PUBLIC &#34;-//W3C//DTD SVG 1.1//EN&#34; &#34;http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd&#34;&gt; &lt;svg width=&#34;100%&#34; height=&#34;100%&#34; viewBox=&#34;0 0 36 36&#34; version=&#34;1.1&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34; xmlns:xlink=&#34;http://www.w3.org/1999/xlink&#34; xml:space=&#34;preserve&#34; xmlns:serif=&#34;http://www.serif.com/&#34; style=&#34;fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;&#34;&gt; &lt;path d=&#34;M13,34C13,34 13,36 11,36C9,36 9,34 9,34L9,2C9,2 9,0 11,0C13,0 13,2 13,2L13,34Z&#34; style=&#34;fill:rgb(102,117,127);fill-rule:nonzero;&#34;/&gt; &lt;path d=&#34;M11,4C11,1.8 12.636,0.75 14.636,1.667L31.363,9.334C33.363,10.251 33.363,11.751 31.363,12.667L14.636,20.334C12.636,21.25 11,20.2 11,18L11,4Z&#34; style=&#34;fill:rgb(69,221,46);fill-rule:nonzero;&#34;/&gt; &lt;/svg&gt; &lt;/span&gt; Well-defined policies&lt;/h3&gt; &lt;p&gt;Trustworthy organizations should always have well-defined, unique, and easy to read privacy policies and terms of service. The conditions within it should also be fair. &lt;strong&gt;You shouldn&#39;t have to sell your soul to 1442 marketing partners just to use a service or visit a website.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Read an organization&#39;s privacy policy (or privacy notice), and make sure it includes:&lt;/p&gt; &lt;ul class=&#34;task-list&#34;&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Language unique to this organization (no copy-paste policy).&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Disclosure of any parent companies owning this organization (if any).&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; A dedicated email address to contact for privacy-related questions and requests.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Detailed information on what data is collected for each activity. For example, the data collected when you use an app or are employed by an organization shouldn&#39;t be bundled together indistinctly with the data collected when you simply visit the website.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Clear limits on data retention periods (when the data will be automatically deleted).&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Clear description of the process to follow in order to delete, access, or correct your personal data.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; A list of third-party vendors used by the organization to process your information.&lt;/p&gt; &lt;/li&gt; &lt;li class=&#34;task-list-item&#34;&gt; &lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Evidences of accountability. The organization should demonstrate accountability for the data it collects, and shouldn&#39;t just transfer this responsibility to the processors it uses.&lt;/p&gt; &lt;/li&gt; &lt;/ul&gt; &lt;h3 id=&#34;availability&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;?xml version=&#34;1.0&#34; encoding=&#34;UTF-8&#34; standalone=&#34;no&#34;?&gt; &lt;!DOCTYPE svg PUBLIC &#34;-//W3C//DTD SVG 1.1//EN&#34; &#34;http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd&#34;&gt; &lt;svg width=&#34;100%&#34; height=&#34;100%&#34; viewBox=&#34;0 0 36 36&#34; version=&#34;1.1&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34; xmlns:xlink=&#34;http://www.w3.org/1999/xlink&#34; xml:space=&#34;preserve&#34; xmlns:serif=&#34;http://www.serif.com/&#34; style=&#34;fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;&#34;&gt; &lt;path d=&#34;M13,34C13,34 13,36 11,36C9,36 9,34 9,34L9,2C9,2 9,0 11,0C13,0 13,2 13,2L13,34Z&#34; style=&#34;fill:rgb(102,117,127);fill-rule:nonzero;&#34;/&gt; &lt;path d=&#34;M11,4C11,1.8 12.636,0.75 14.636,1.667L31.363,9.334C33.363,10.251 33.363,11.751 31.363,12.667L14.636,20.334C12.636,21.25 11,20.2 11,18L11,4Z&#34; style=&#34;fill:rgb(69,221,46);fill-rule:nonzero;&#34;/&gt; &lt;/svg&gt; &lt;/span&gt; Availability&lt;/h3&gt; &lt;p&gt;Verify availability. Who will you contact if a problem arises with your account, software, or data? Will you be ignored by an AI chatbot just repeating what you&#39;ve already read on the company&#39;s website? Will you be able to reach out to a competent human?&lt;/p&gt; &lt;p&gt;If you contact an organization at the listed privacy-dedicated email address to ask a question, and receive a thoughtful non-AI-generated reply within a couple of weeks, this can be a good sign. If you can easily find a privacy officer email address, a company&#39;s phone number, and the location where the organization is based, this also can be encouraging signs.&lt;/p&gt; &lt;h3 id=&#34;clear-funding-model&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;?xml version=&#34;1.0&#34; encoding=&#34;UTF-8&#34; standalone=&#34;no&#34;?&gt; &lt;!DOCTYPE svg PUBLIC &#34;-//W3C//DTD SVG 1.1//EN&#34; &#34;http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd&#34;&gt; &lt;svg width=&#34;100%&#34; height=&#34;100%&#34; viewBox=&#34;0 0 36 36&#34; version=&#34;1.1&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34; xmlns:xlink=&#34;http://www.w3.org/1999/xlink&#34; xml:space=&#34;preserve&#34; xmlns:serif=&#34;http://www.serif.com/&#34; style=&#34;fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;&#34;&gt; &lt;path d=&#34;M13,34C13,34 13,36 11,36C9,36 9,34 9,34L9,2C9,2 9,0 11,0C13,0 13,2 13,2L13,34Z&#34; style=&#34;fill:rgb(102,117,127);fill-rule:nonzero;&#34;/&gt; &lt;path d=&#34;M11,4C11,1.8 12.636,0.75 14.636,1.667L31.363,9.334C33.363,10.251 33.363,11.751 31.363,12.667L14.636,20.334C12.636,21.25 11,20.2 11,18L11,4Z&#34; style=&#34;fill:rgb(69,221,46);fill-rule:nonzero;&#34;/&gt; &lt;/svg&gt; &lt;/span&gt; Clear funding model&lt;/h3&gt; &lt;p&gt;If a &lt;em&gt;free&lt;/em&gt; service is provided by a &lt;em&gt;for-profit&lt;/em&gt; corporation, you should investigate further. The old adage that if you do not pay for a product you are the product is sadly often true in tech, and doubly so for big tech.&lt;/p&gt; &lt;p&gt;Before using a new service, try to find what the funding model is. Maybe it&#39;s a free service run by volunteers? Maybe they have a paid tier for businesses, but remain free for individual users? Maybe they survive and thrive on donations? Or maybe everyone does pay for it (with money, not data).&lt;/p&gt; &lt;p&gt;Look for what the funding model is. If it&#39;s free, and you can&#39;t really find any details on how it&#39;s financed, this could be a red flag that your data might be used for monetization. But if the funding model is transparent, fair, and ethical, this &lt;em&gt;can&lt;/em&gt; be a green flag.&lt;/p&gt; &lt;h3 id=&#34;reputation-history&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;?xml version=&#34;1.0&#34; encoding=&#34;UTF-8&#34; standalone=&#34;no&#34;?&gt; &lt;!DOCTYPE svg PUBLIC &#34;-//W3C//DTD SVG 1.1//EN&#34; &#34;http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd&#34;&gt; &lt;svg width=&#34;100%&#34; height=&#34;100%&#34; viewBox=&#34;0 0 36 36&#34; version=&#34;1.1&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34; xmlns:xlink=&#34;http://www.w3.org/1999/xlink&#34; xml:space=&#34;preserve&#34; xmlns:serif=&#34;http://www.serif.com/&#34; style=&#34;fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;&#34;&gt; &lt;path d=&#34;M13,34C13,34 13,36 11,36C9,36 9,34 9,34L9,2C9,2 9,0 11,0C13,0 13,2 13,2L13,34Z&#34; style=&#34;fill:rgb(102,117,127);fill-rule:nonzero;&#34;/&gt; &lt;path d=&#34;M11,4C11,1.8 12.636,0.75 14.636,1.667L31.363,9.334C33.363,10.251 33.363,11.751 31.363,12.667L14.636,20.334C12.636,21.25 11,20.2 11,18L11,4Z&#34; style=&#34;fill:rgb(69,221,46);fill-rule:nonzero;&#34;/&gt; &lt;/svg&gt; &lt;/span&gt; Reputation history&lt;/h3&gt; &lt;p&gt;Some errors are forgivable, but others are too big to let go. Look for an organization&#39;s track record to help to evaluate its reputation overtime. Check if there was any security or privacy incidents, or expert criticisms, and check how the organization responded to it.&lt;/p&gt; &lt;p&gt;If you find an organization that has always stuck to its values (integrity), is still run by the same core people in recent years (stability), seems to have a generally good reputation with others (reputability), and had few (or no) incidents in the past (reliability), this &lt;em&gt;can&lt;/em&gt; be a green flag.&lt;/p&gt; &lt;h3 id=&#34;expert-advice&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;?xml version=&#34;1.0&#34; encoding=&#34;UTF-8&#34; standalone=&#34;no&#34;?&gt; &lt;!DOCTYPE svg PUBLIC &#34;-//W3C//DTD SVG 1.1//EN&#34; &#34;http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd&#34;&gt; &lt;svg width=&#34;100%&#34; height=&#34;100%&#34; viewBox=&#34;0 0 36 36&#34; version=&#34;1.1&#34; xmlns=&#34;http://www.w3.org/2000/svg&#34; xmlns:xlink=&#34;http://www.w3.org/1999/xlink&#34; xml:space=&#34;preserve&#34; xmlns:serif=&#34;http://www.serif.com/&#34; style=&#34;fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;&#34;&gt; &lt;path d=&#34;M13,34C13,34 13,36 11,36C9,36 9,34 9,34L9,2C9,2 9,0 11,0C13,0 13,2 13,2L13,34Z&#34; style=&#34;fill:rgb(102,117,127);fill-rule:nonzero;&#34;/&gt; &lt;path d=&#34;M11,4C11,1.8 12.636,0.75 14.636,1.667L31.363,9.334C33.363,10.251 33.363,11.751 31.363,12.667L14.636,20.334C12.636,21.25 11,20.2 11,18L11,4Z&#34; style=&#34;fill:rgb(69,221,46);fill-rule:nonzero;&#34;/&gt; &lt;/svg&gt; &lt;/span&gt; Expert advice&lt;/h3&gt; &lt;p&gt;Seek expert advice before using a new product or service. Look online for reliable and independent sources of &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;recommendations&lt;/a&gt; (like Privacy Guides!), and read thoroughly to determine if the description fits your privacy needs. No tool is perfect to protect your privacy, but experts will warn you about a tool&#39;s limitations and downsides.&lt;/p&gt; &lt;p&gt;There&#39;s also added value in community consensus. If a piece of software is repeatedly recommended by multiple experts (not websites or influencers, &lt;em&gt;experts&lt;/em&gt;), then this &lt;em&gt;can&lt;/em&gt; be a green flag that this tool or service is generally trusted by the community (at this point in time).&lt;/p&gt; &lt;h2 id=&#34;take-a-stand-for-better-privacy&#34;&gt;Take a stand for better privacy&lt;/h2&gt; &lt;p&gt;Trying to evaluate who is worthy of our trust and who isn&#39;t is an increasingly difficult task. While this burden shouldn&#39;t fall on us, there are unfortunately too few institutional protections we can rely on at the moment.&lt;/p&gt; &lt;p&gt;Until our governments finally prioritize the protection of human rights and privacy rights over corporate interests, we will have to protect ourselves. But this isn&#39;t limited to self-protection, our individual choices also matter collectively.&lt;/p&gt; &lt;p&gt;Each time we dig in to thoroughly investigate a malicious organization and expose its privacy washing, we contribute in improving safety for everyone around us.&lt;/p&gt; &lt;p&gt;Each time we report a business infringing privacy laws, talk publicly about our bad experience to get our data deleted, and more importantly refuse to participate in services and products that aren&#39;t worthy of our trust, this all helps to improve data privacy for everyone overtime.&lt;/p&gt; &lt;p&gt;Being vigilant and reporting bad practices is taking a stand for better privacy. We must all take a stand for better privacy, and expose privacy washing each time we spot it.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/09/03/red-and-green-privacy-flags/</link> <pubDate>Wed, 03 Sep 2025 20:41:37 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/09/03/red-and-green-privacy-flags/</guid> </item> <item> <title>Privacy Washing Is a Dirty Business</title> <author>Em</author> <category>Opinion</category> <description>&lt;h1 id=&#34;privacy-washing-is-a-dirty-business&#34;&gt;Privacy Washing Is a Dirty Business&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Filtered photo of a sticker on a metallic surface with graffiti. The sticker has the sentence &amp;quot;We respect your privacy!&amp;quot; written on it, and the whole sentence is barred is a red line over it.&#34; src=&#34;../../../../assets/images/privacy-washing-is-a-dirty-business/washing-cover.webp&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Marija Zaric / Unsplash&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Perhaps you haven&#39;t heard the term &lt;em&gt;privacy washing&lt;/em&gt; before. Nonetheless, it&#39;s likely that you have already been exposed to this scheme in the wild. Regrettably, privacy washing is a widespread deceptive strategy.&lt;!-- more --&gt;&lt;/p&gt; &lt;h2 id=&#34;what-is-privacy-washing&#34;&gt;What is privacy washing&lt;/h2&gt; &lt;p&gt;Similarly to whitewashing (concealing unwanted truths to improve a reputation) and greenwashing (deceptively presenting a product as environmentally friendly for marketing purposes), privacy washing misleadingly, or fraudulently, presents a product, service, or organization as being responsible and trustworthy with data protection, when it isn&#39;t.&lt;/p&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Your privacy is&amp;ast; important to us. &lt;small aria-hidden=&#34;true&#34;&gt;&amp;ast;not!&lt;/small&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;The term has been used for over a decade already. It&#39;s saddening to see that not only is this &lt;a href=&#34;https://dataethics.eu/privacy-washing/&#34;&gt;not a new problem&lt;/a&gt;, but it has only gotten worse through the years.&lt;/p&gt; &lt;p&gt;With the acceleration of data collection, the accumulation of data breaches, and the erosion of customers&#39; trust, companies have an increased need for reassuring users to gain their business.&lt;/p&gt; &lt;p&gt;Despite consumers&#39; rights and expectations, implementing proper data protection takes time, expertise, and money. Even if the long term benefits are colossal, the time invested often doesn&#39;t translate into direct &lt;em&gt;short term&lt;/em&gt; profits, the main objective for most businesses. On the other hand, collecting more data to sell it to third parties often &lt;em&gt;does&lt;/em&gt; translate into short term profits.&lt;/p&gt; &lt;p&gt;For these reasons, many companies quickly realize the need for &lt;em&gt;advertising&lt;/em&gt; better privacy, but aren&#39;t necessarily willing to invest what it takes to make these claims true.&lt;/p&gt; &lt;p&gt;There comes privacy washing: &lt;span class=&#34;pullquote-source&#34;&gt;&#34;Your privacy is&amp;ast; important to us.&#34; &lt;small aria-hidden=&#34;true&#34;&gt;&amp;ast;not!&lt;/small&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;Privacy washing comes with a selection of washer cycles, from malicious trap to deceptive snake oil to perhaps the most common wash: plain negligence.&lt;/p&gt; &lt;h2 id=&#34;negligence-incompetence-or-malevolence&#34;&gt;Negligence, incompetence, or malevolence&lt;/h2&gt; &lt;p&gt;In some other contexts, intentions might matter more. But when it comes to privacy washing, the result is often the same regardless of intentions: Personal data from users, customers, employees, patients, or children even being leaked and exploited in all sorts of ways.&lt;/p&gt; &lt;p&gt;Whether false claims come from negligence by failing to verify that data protections are properly implemented, incompetence to evaluate if they are, or maliciously trying to trick users in using a service that is actually detrimental to their privacy, harm is done, and sometimes permanently so.&lt;/p&gt; &lt;p&gt;Nonetheless, understanding the different types of privacy washing can help us to evaluate how to detect it, respond to it, and report it.&lt;/p&gt; &lt;h3 id=&#34;negligence-and-greed&#34;&gt;Negligence and greed&lt;/h3&gt; &lt;blockquote&gt; &lt;p&gt;&lt;em&gt;They know what they are doing, but they care more about money&lt;/em&gt;&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;The most common occurrence of privacy washing likely comes from negligence and greed. One of the biggest drivers for this is that the current market incentivizes it.&lt;/p&gt; &lt;p&gt;Today&#39;s software industry is largely inflated by venture capitalist funding, which creates expectations for a substantial return on investment. This funding model often encourages startups to quickly build an app following the &lt;a href=&#34;https://en.wikipedia.org/wiki/Minimum_viable_product&#34;&gt;minimum viable product&lt;/a&gt; principles, grow its user base as fast as possible, increase its value, and then sell it off for profits.&lt;/p&gt; &lt;p&gt;The problem is, this model is antithetical to implementing good privacy, security, and legal practices from the start. Data privacy cannot only be an afterthought. It must be implemented from the start, before users&#39; data even gets collected.&lt;/p&gt; &lt;p&gt;Many startups fail to see how being thorough with data privacy will benefit them in the long term, and view privacy and security requirements only as a burden slowing down their growth. This mindset can result in perceiving privacy as a simple marketing asset, something businesses talk to users about for reassurance, but without putting any real effort into it beneath the surface.&lt;/p&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Perhaps moving fast and breaking things wasn&#39;t such a good idea after all.&lt;/small&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;Outside of privacy, this common startup mindset of playing fast and loose with customers and their safety frequently has &lt;strong&gt;devastating&lt;/strong&gt; consequences. One recent and tragic example comes from OceanGate&#39;s Titan deep-sea submersible that &lt;a href=&#34;https://globalnews.ca/news/11318623/titan-sub-report-oceangate-culture-critically-flawed/&#34;&gt;infamously imploded&lt;/a&gt; during an exploration, killing its five passengers in an instant.&lt;/p&gt; &lt;p&gt;The final report blamed a problematic safety culture at OceanGate that was “critically flawed and at the core of these failures were glaring disparities between their written safety protocols and their actual practices.”&lt;/p&gt; &lt;p&gt;&lt;span class=&#34;pullquote-source&#34;&gt;Perhaps &lt;a href=&#34;../../../../2022/04/04/move-fast-and-break-things/&#34;&gt;moving fast and breaking things&lt;/a&gt; wasn&#39;t such a good idea after all.&lt;/span&gt;&lt;/p&gt; &lt;p&gt;Alas, similar &#34;glaring disparities&#34; between policies and practices are widespread in the tech industry. While maybe not as dramatic and spectacular as an imploding submersible, &lt;a href=&#34;../../../03/25/privacy-means-safety/&#34;&gt;data leaks can also literally kill people&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Data privacy is the &#34;passenger safety protocol&#34; for software&lt;/strong&gt;, and it should never be trivialized.&lt;/p&gt; &lt;p&gt;Privacy isn&#39;t just &#34;risk management&#34;, it is a human right. Analogous to safety protocols, organizations are responsible for ensuring their data protection policies are being followed, and are accurately describing their current practices. Anything less is negligence, at best.&lt;/p&gt; &lt;p&gt;Unfortunately, users (like passengers) often have very few ways to verify false claims about allegedly privacy-respectful features and policies. But this burden should never be on them in the first place.&lt;/p&gt; &lt;h3 id=&#34;incompetence-and-willful-ignorance&#34;&gt;Incompetence and willful ignorance&lt;/h3&gt; &lt;blockquote&gt; &lt;p&gt;&lt;em&gt;They don&#39;t know what they are doing, or they just don&#39;t want to know&lt;/em&gt;&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Partly related to negligence, is plain incompetence and willful ignorance. Some organizations might be well-intentioned initially, but either lack the internal expertise to implement proper privacy practices, or conveniently decide not to spend much time researching about what their data protection responsibilities are.&lt;/p&gt; &lt;p&gt;For example, most businesses have heard by now of the requirement to present a privacy policy to their users, customers, and even web visitors. Deplorably, in a failed attempt to fulfill this legal obligation, many simply copy someone else&#39;s privacy policy and paste it on their own website. Not only this is very unlikely to be compliant with applicable privacy regulations, but it also possibly infringes &lt;em&gt;copyright&lt;/em&gt; laws.&lt;/p&gt; &lt;p&gt;Do not simply copy-paste another organization&#39;s privacy policy and claim it as your own!&lt;/p&gt; &lt;p&gt;It&#39;s important to remember that legal requirements for policies aren&#39;t the end goal here. &lt;strong&gt;The true requirements are the data protection &lt;em&gt;practices&lt;/em&gt;.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;The policies &lt;em&gt;must&lt;/em&gt; accurately describe what the &lt;em&gt;practices&lt;/em&gt; are in reality. Because no two organizations have the exact same internal practices and third-party vendors, no two organizations should have the exact same privacy policy.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Copy-paste privacy policies aren&#39;t compliance, they&#39;re deception.&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;A privacy policy that isn&#39;t accurately describing an organization&#39;s practices is a form of privacy washing. Sadly, a quite commonly used one, like some quick light-wash cycle.&lt;/p&gt; &lt;p&gt;It&#39;s worth noting these days that creating a privacy policy using generative AI will lead to the exact same problems related to accuracy and potential infringement of both privacy and copyright laws. This is &lt;em&gt;not&lt;/em&gt; a smart &#34;shortcut&#34; to try.&lt;/p&gt; &lt;p&gt;While lack of understanding of policies and legal requirements is only one example of how incompetence can become a form of privacy washing, there are infinitely more ways this can happen.&lt;/p&gt; &lt;p&gt;As soon as data is collected by an organization (or by the third-party software it uses), there is almost certainly legal obligations to protect this data, to restrict its collection and retention, and to inform data subjects.&lt;/p&gt; &lt;p&gt;Organizations that do not take this responsibility seriously, or blissfully decide to remain unaware of it, while presenting an empty privacy policy, are effectively doing privacy washing.&lt;/p&gt; &lt;p&gt;Implementing protections and limiting collection cannot be an afterthought. Once data is leaked, there is often nothing that can be done to truly delete it from the wild. The damage caused by leaked data can be tragic and permanent.&lt;/p&gt; &lt;p&gt;Organizations must take this responsibility much more seriously.&lt;/p&gt; &lt;h3 id=&#34;malevolence-and-fraud&#34;&gt;Malevolence and fraud&lt;/h3&gt; &lt;blockquote&gt; &lt;p&gt;&lt;em&gt;They lie, and they want your data&lt;/em&gt;&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Greed and ignorance are common causes of privacy washing, but they can quickly escalate to fraud and ambush.&lt;/p&gt; &lt;p&gt;It&#39;s worth noting that a large amount of negligence or incompetence can be indistinguishable from malice, but there are organizations that deliberately lie to users to exploit them, or to trick them into unwillingly revealing sensitive information.&lt;/p&gt; &lt;h4 id=&#34;anom-the-secret-fbi-operation&#34;&gt;Anom, the secret FBI operation&lt;/h4&gt; &lt;p&gt;Perhaps one of the most infamous example of this is the Anom honeypot. Anom was an encrypted phone company promising privacy and security, but that was in fact part of an undercover operation staged by the American Federal Bureau of Investigation (FBI), &lt;a href=&#34;https://en.wikipedia.org/wiki/Operation_Trojan_Shield&#34;&gt;Operation Trojan Shield&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Investigative journalist Joseph Cox &lt;a href=&#34;https://www.vice.com/en/article/inside-anom-video-operation-trojan-shield-ironside/&#34;&gt;reported&lt;/a&gt; in 2021 that Anom advertised their products to criminal groups, then secretly sent a copy of every message on the device to the FBI. It was so secret, even Anom developers didn&#39;t know about the operation. They were told their customers were corporations.&lt;/p&gt; &lt;p&gt;A screenshot &lt;a href=&#34;https://www.vice.com/en/article/operation-trojan-shield-anom-fbi-secret-phone-network/&#34;&gt;shared&lt;/a&gt; by Motherboard shows an Anom slogan: &#34;Anom, Enforce your right to privacy&#34;. It&#39;s hard to tell how many non-criminal persons (if any) might have accidentally been caught in this FBI net. Although this specific operation seems to have been narrowly targeting criminals, who knows if a similar operation could not be casting a wider net, inadvertently catching many innocent privacy-conscious users in its path.&lt;/p&gt; &lt;h4 id=&#34;navigating-vpn-providers-can-be-a-minefield&#34;&gt;Navigating &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers can be a minefield&lt;/h4&gt; &lt;p&gt;Using a &lt;a href=&#34;https://www.privacyguides.org/en/vpn/&#34;&gt;trustworthy&lt;/a&gt; Virtual Private Network (&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;) service is a good strategy to improve your privacy online. That being said, evaluating trustworthiness is critical here. Using a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; is only a transfer of trust, from your Internet Service Provider (&lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;) to your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider. Your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider will still know your true &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address and location, and &lt;em&gt;could&lt;/em&gt; technically see all your online activity while using the service, if they decided to look.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/videos/2024/12/12/do-you-need-a-vpn/&#34;&gt;Different &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; services are not equal&lt;/a&gt;, unfortunately, snake oil products and traps are everywhere in this market. As with anything, do not assume that whoever screams the loudest is the most trustworthy. Loudness here only means more investment in advertising.&lt;/p&gt; &lt;p&gt;For example, take the interesting case of &lt;a href=&#34;https://en.wikipedia.org/wiki/Kape_Technologies&#34;&gt;Kape Technologies&lt;/a&gt;, a billionaire-run company formerly known as Crossrider. This corporation has now acquired four different &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; services: ExpressVPN, CyberGhost, Private Internet Access, and Zenmate. This isn&#39;t that suspicious in itself, but Kape Technologies has also &lt;a href=&#34;https://cyberinsider.com/kape-technologies-owns-expressvpn-cyberghost-pia-zenmate-vpn-review-sites/&#34;&gt;acquired&lt;/a&gt; a number of &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; &lt;em&gt;review&lt;/em&gt; websites, suspiciously always ranking its own &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; services at the top. This is a blatant conflict of interest, to say the least.&lt;/p&gt; &lt;p&gt;Sadly, on the &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; market — &lt;a href=&#34;https://www.grandviewresearch.com/industry-analysis/virtual-private-network-market&#34;&gt;estimated&lt;/a&gt; at $41.33 billion USD in 2022 — what is called a &lt;a href=&#34;../../../../2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/&#34;&gt;&#34;review&#34; is often just &lt;em&gt;advertising&lt;/em&gt;&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;Moreover, many free &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; providers &lt;a href=&#34;https://iapp.org/news/a/privacy-violations-by-free-vpn-service-providers&#34;&gt;break their privacy promises&lt;/a&gt; regarding users&#39; data. In 2013, Facebook &lt;a href=&#34;https://gizmodo.com/do-not-i-repeat-do-not-download-onavo-facebook-s-vam-1822937825&#34;&gt;bought&lt;/a&gt; the free &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider Onavo, and included it in a Facebook feature deceptively labeled &#34;Protect&#34;. As is now standard behavior for Facebook, the social media juggernaut actually collected and analyzed the data from Onavo users. This allowed Facebook to monitor the online habits of its users even when they weren&#39;t using the Facebook app. This is very much the opposite of data privacy, and of any implied promises to &#34;Protect&#34;.&lt;/p&gt; &lt;p&gt;Then there&#39;s the case of Hotspot Shield &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, accused in 2017 of &lt;a href=&#34;https://www.zdnet.com/article/privacy-group-accuses-hotspot-shield-of-snooping-on-web-traffic/&#34;&gt;breaking&lt;/a&gt; its privacy promises by the Center for Democracy &amp;amp; Technology, a digital rights nonprofit organization. While promising &#34;anonymous browsing&#34;, Hotspot Shield allegedly deployed persistent cookies and used more than five different third-party tracking libraries. The parent company AnchorFree denied the accusations, but even &lt;em&gt;if&lt;/em&gt; it wasn&#39;t the case for AnchorFree, how tempting would it be for a business with an ad-based revenue model to utilize the valuable data it collects for more of this revenue? And indeed, many free &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; services do &lt;a href=&#34;https://thebestvpn.com/how-free-vpns-sell-your-data/&#34;&gt;monetize&lt;/a&gt; users&#39; data.&lt;/p&gt; &lt;p&gt;Worst of all are the &lt;em&gt;fake&lt;/em&gt;, free &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; services. Like stepping on a landmine, criminals are &lt;a href=&#34;https://www.techradar.com/pro/criminals-are-using-a-dangerous-fake-free-vpn-to-spread-malware-via-github-heres-how-to-stay-safe&#34;&gt;luring users&lt;/a&gt; looking for a free &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; service and tricking them into downloading malware on their devices. While this goes beyond privacy washing, it&#39;s still a piece of software actively harming users and deceptively gaining their trust with the false promise of better privacy. Wherever privacy washing is being normalized by greedy or lazy organizations, criminals like this flourish.&lt;/p&gt; &lt;h4 id=&#34;using-compliance-to-appear-legitimate&#34;&gt;Using compliance to appear legitimate&lt;/h4&gt; &lt;p&gt;Another fraudulent case of privacy washing is organizations using false claims related to privacy law compliance to appear more legitimate.&lt;/p&gt; &lt;p&gt;Earlier this year, the digital rights organization Electronic Frontier Foundation (EFF) &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/eff-state-ags-time-investigate-crisis-pregnancy-centers&#34;&gt;called&lt;/a&gt; for an investigation into deceptive anti-abortion militant organizations (also called &#34;&lt;a href=&#34;https://www.plannedparenthood.org/blog/what-are-crisis-pregnancy-centers&#34;&gt;fake clinics&lt;/a&gt;&#34;) in eight different US states.&lt;/p&gt; &lt;p&gt;These fake clinics were claiming to be bound by the Health Insurance Portability and Accountability Act (HIPAA) in order to appear like genuine health organizations. HIPAA is an American federal privacy law that was established in 1996 to protect sensitive health information in the United States.&lt;/p&gt; &lt;p&gt;Not only are many of these fake clinics &lt;strong&gt;not&lt;/strong&gt; complying with HIPAA, but they collect extremely sensitive information without being bound by HIPAA in the first place, because they &lt;em&gt;aren&#39;t&lt;/em&gt; licensed healthcare providers. Worse, some have &lt;a href=&#34;https://jessica.substack.com/p/exclusive-health-data-breach-at-americas&#34;&gt;leaked this data&lt;/a&gt; in all sorts of ways.&lt;/p&gt; &lt;p&gt;Thanks to the EFF&#39;s work, some of those fake clinics have now &lt;a href=&#34;https://www.eff.org/deeplinks/2025/08/fake-clinics-quietly-edit-their-websites-after-being-called-out-hipaa-claims&#34;&gt;quietly removed&lt;/a&gt; misleading language from their websites. But sadly, this small victory doesn&#39;t make these organizations any more trustworthy, it only slightly reduces the extent of their privacy washing.&lt;/p&gt; &lt;h3 id=&#34;deception-and-privacy-masquerading&#34;&gt;Deception and privacy-masquerading&lt;/h3&gt; &lt;blockquote&gt; &lt;p&gt;&lt;em&gt;They talk privacy, but their words are empty&lt;/em&gt;&lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;Perhaps the most obvious and pernicious examples of privacy washing are organizations that are clearly building products and features harming people&#39;s privacy, while using deceptive, pro-privacy language to disguise themselves as privacy-respectful organizations. There are likely more occurrences of this than there are characters in this article&#39;s text.&lt;/p&gt; &lt;p&gt;Buzzwords like &#34;military-grade encryption&#34;, &#34;privacy-enhancing&#34;, and the reassuring classic &#34;we never share your data with anyone&#34; get thrown around like candies falling off a privacy-preserving-piñata.&lt;/p&gt; &lt;p&gt;But &lt;strong&gt;words are meaningless when they are deceitful&lt;/strong&gt;, and these candies quickly turn bitter once we learn the truth.&lt;/p&gt; &lt;h4 id=&#34;google-the-advertising-company&#34;&gt;Google, the advertising company&lt;/h4&gt; &lt;p&gt;An infamous recent example of this is Google, who &lt;a href=&#34;https://proton.me/blog/privacy-washing-2023&#34;&gt;pushed&lt;/a&gt; a new Chrome feature for targeted advertising in 2023 and dared to call it &#34;Enhanced Ad Privacy&#34;&lt;/p&gt; &lt;p&gt;This &lt;a href=&#34;https://www.eff.org/deeplinks/2023/09/how-turn-googles-privacy-sandbox-ad-tracking-and-why-you-should&#34;&gt;enabled by default&lt;/a&gt; technology allows Google to target users with ads customized around their browsing history. It&#39;s really difficult to see where the &#34;privacy&#34; is supposed to be here, even when squinting very hard.&lt;/p&gt; &lt;p&gt;Of course, Google, an advertising company, has long mastered the art of misleading language around data privacy to reassure its valuable natural resource, the user.&lt;/p&gt; &lt;div class=&#34;admonition quote inline end&#34;&gt; &lt;p class=&#34;admonition-title&#34;&gt;Google continued to collect personally identifiable user data from their extensive server-side tracking network.&lt;/small&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;Everyone is likely familiar with Chrome&#39;s infamously deceptive &#34;Incognito mode&#34;. In reality, becoming &#34;Incognito&#34; stopped at your own device where browsing history will not be kept, while &lt;span class=&#34;pullquote-source&#34;&gt;Google continued to collect personally identifiable user data from their extensive server-side tracking network.&lt;/span&gt; Understandably, disgruntled users filed an official &lt;a href=&#34;https://www.theverge.com/2023/8/7/23823878/google-privacy-tracking-incognito-mode-lawsuit-summary-judgment-denied&#34;&gt;class action lawsuit&lt;/a&gt; to get reparation from this deception. In 2023, Google agreed &lt;a href=&#34;https://www.bbc.co.uk/news/business-67838384&#34;&gt;to settle&lt;/a&gt; this $5 billion lawsuit.&lt;/p&gt; &lt;p&gt;Despite claims of &#34;privacy&#34; in their advertising to users, Google, like many other big tech giants, has in reality spent millions &lt;a href=&#34;https://www.politico.com/news/2021/10/22/google-kids-privacy-protections-tech-giants-516834&#34;&gt;lobbying against&lt;/a&gt; better privacy protections for years.&lt;/p&gt; &lt;h4 id=&#34;world-app-the-biometric-data-collector&#34;&gt;World App, the biometric data collector&lt;/h4&gt; &lt;p&gt;Similarly, Sam Altman&#39;s World project loves to throw privacy-preserving language around to reassure prospect users and investors. But despite all its claims, data protection authorities around the world have been &lt;a href=&#34;../../../05/10/sam-altman-wants-your-eyeball/#privacy-legislators-arent-on-board&#34;&gt;investigating, fining, and even banning&lt;/a&gt; its operations.&lt;/p&gt; &lt;p&gt;The World App (developed by the World project) is an &#34;everything app&#34; providing users with a unique identifier called a World ID. This World ID, which grants various perks and accesses while using the World App, is earned by providing biometric data to the organization, in the form of an iris scan.&lt;/p&gt; &lt;p&gt;Providing an iris scan to a for-profit corporation with little oversight will rightfully scare away many potential users. This is why the company has evidently invested heavily in branding itself as a &#34;privacy-preserving&#34; technology, claims that are &lt;a href=&#34;../../../05/10/sam-altman-wants-your-eyeball/#how-privacy-preserving-is-it&#34;&gt;questionable&lt;/a&gt; to say the least.&lt;/p&gt; &lt;p&gt;Despite catchy declarations such as &#34;privacy by default and by design approach&#34;, the World project has accumulated an impressive history of privacy violations, and multiplies contradicting and misleading statements in its own documentation.&lt;/p&gt; &lt;p&gt;There are some stains that even a powerful, billionaire-backed, privacy wash just cannot clean off.&lt;/p&gt; &lt;h4 id=&#34;flo-sharing-your-period-data-with-facebook&#34;&gt;Flo, sharing your period data with Facebook&lt;/h4&gt; &lt;p&gt;In 2019, the Wall Street Journal &lt;a href=&#34;https://therecord.media/meta-flo-trial-period-tracking-data-sharing&#34;&gt;reported&lt;/a&gt; that the period tracking application Flo had been sharing sensitive health data with Facebook (Meta), despite its promises of privacy.&lt;/p&gt; &lt;p&gt;The app, developed by Flo Health, repeatedly reassured users that the very sensitive information they shared with the app would remain private and would not be shared with any third parties without explicit consent.&lt;/p&gt; &lt;p&gt;Despite this pledge, the Flo app did share sensitive personal data with third parties, via the software development kits incorporated into the app.&lt;/p&gt; &lt;p&gt;This extreme negligence (or malevolence) have likely harmed some users in unbelievable ways. Considering the state of abortion rights in the United States at the moment, it&#39;s not an exaggeration to say this data leak could &lt;a href=&#34;../../../03/25/privacy-means-safety/#healthcare-seekers&#34;&gt;severely endanger&lt;/a&gt; Flo App&#39;s users, including with risk of imprisonment.&lt;/p&gt; &lt;p&gt;In response, users have filed several &lt;a href=&#34;https://www.hipaajournal.com/jury-trial-meta-flo-health-consumer-privacy/&#34;&gt;class action lawsuits&lt;/a&gt; against Flo Health, Facebook, Google, AppsFlyer, and Flurry.&lt;/p&gt; &lt;p&gt;Trivializing health data privacy while promising confidentiality to gain users&#39; trust should never be banalized. This is a very serious infringement of users&#39; rights.&lt;/p&gt; &lt;h2 id=&#34;remain-skeptical-revoke-your-trust-when-needed&#34;&gt;Remain skeptical, revoke your trust when needed&lt;/h2&gt; &lt;p&gt;Regardless of the promises to safeguard our personal data, it&#39;s sad to say, we can never let our guard down.&lt;/p&gt; &lt;p&gt;Privacy washing isn&#39;t a trend that is about to fade away, it&#39;s quite likely that it will even worsen in the years to come. We must prepare accordingly.&lt;/p&gt; &lt;p&gt;The only way to improve our safety (and our privacy) is to remain vigilant at all time, and grant our trust only sparsely. We also need to stay prepared to revoke this trust at any time, when we learn new information that justifies it.&lt;/p&gt; &lt;p&gt;Always remain skeptical when you encounter privacy policies that seem suspiciously too generic; official-looking badges on websites advertising unsupported claims of &#34;&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; compliance&#34;, reviews that are lacking supporting evidence and doubtfully independent; and over usage of buzzwords like &#34;military-grade encryption&#34;, &#34;privacy-enhancing&#34;, &#34;fully encrypted&#34;, and (more recently) &#34;AI-powered&#34;.&lt;/p&gt; &lt;p&gt;It&#39;s not easy to navigate the perilous waters of supposedly privacy-respectful software. And it&#39;s even worse in an age where AI-spawned websites and articles can create the illusion of trustworthiness with only a few clicks and prompts.&lt;/p&gt; &lt;p&gt;Learning &lt;a href=&#34;../../../09/03/red-and-green-privacy-flags/&#34;&gt;how to spot the red flags, and the green(ish) flags&lt;/a&gt;, to protect ourselves from the deceptive manipulation of privacy washing is an important skill to develop to make better informed choices.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/08/20/privacy-washing-is-a-dirty-business/</link> <pubDate>Wed, 03 Sep 2025 19:24:12 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/08/20/privacy-washing-is-a-dirty-business/</guid> </item> <item> <title>The Power of Digital Provenance in the Age of AI</title> <author>fria</author> <category>AI</category> <category>Content Credentials</category> <category>Opinion</category> <description>&lt;h1 id=&#34;the-power-of-digital-provenance-in-the-age-of-ai&#34;&gt;The Power of Digital Provenance in the Age of AI&lt;/h1&gt; &lt;p&gt;&lt;img alt=&#34;Article cover showing a painterly background with cool colors and the Content Credentials logo&#34; src=&#34;../../../../assets/images/digital-provenance/cover.jpg&#34; /&gt; &lt;small aria-hidden=&#34;true&#34;&gt;Photo: Kseniya Lapteva / Pexels | Logo: Content Credentials&lt;/small&gt;&lt;/p&gt; &lt;p&gt;With the popularity of generative AI, it&#39;s becoming more and more difficult to &lt;a href=&#34;https://uwaterloo.ca/news/media/can-you-tell-ai-generated-people-real-ones&#34;&gt;distinguish&lt;/a&gt; reality from fiction. Can this problem be solved using cryptography? What are the privacy implications of the currently proposed systems?&lt;!-- more --&gt;&lt;/p&gt; &lt;h2 id=&#34;the-problem&#34;&gt;The Problem&lt;/h2&gt; &lt;p&gt;Can you tell which of these images are AI generated?&lt;/p&gt; &lt;div class=&#34;grid&#34;&gt; &lt;p&gt;&lt;img alt=&#34;Group of geese by some water&#34; src=&#34;../../../../assets/images/digital-provenance/geese1.jpeg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Group of geese by some water&#34; src=&#34;../../../../assets/images/digital-provenance/geese2.jpeg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Group of geese by some water&#34; src=&#34;../../../../assets/images/digital-provenance/geese3.jpeg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Group of geese by some water&#34; src=&#34;../../../../assets/images/digital-provenance/geese4.jpeg&#34; /&gt;&lt;/p&gt; &lt;/div&gt; &lt;p&gt;...Have a guess?&lt;/p&gt; &lt;hr /&gt; &lt;p&gt;Actually, they&#39;re all real. But the fact that you may have believed some of them were AI generated poses a problem: How can we tell where an image came from, if it was AI generated, and whether it was edited?&lt;/p&gt; &lt;h2 id=&#34;provenance&#34;&gt;Provenance&lt;/h2&gt; &lt;p&gt;&lt;a href=&#34;https://youtu.be/K56EhgfCDjs&#34;&gt;Provenance&lt;/a&gt; is the history of ownership of an object, typically used when referring to antiques or art. Knowing the history of a piece of art can affect the value a lot, but you need a way to prove it&#39;s an original piece by the artist instead of a reproduction, or was owned by a famous person.&lt;/p&gt; &lt;p&gt;Provenance can take many &lt;a href=&#34;https://artbusiness.com/provwarn.html&#34;&gt;forms&lt;/a&gt;, from an original receipt or documentation from the artist themselves to stickers from a gallery attached to it. Typically, you want a signed &lt;a href=&#34;https://www.artcertificate.co.uk/?id_article=2267&#34;&gt;certificate&lt;/a&gt; from an expert on the artist in order to verify its authenticity.&lt;/p&gt; &lt;h2 id=&#34;hoaxes&#34;&gt;Hoaxes&lt;/h2&gt; &lt;p&gt;It&#39;s important for historical preservation as well to know that an object is really from a certain time period. There&#39;s no shortage of &lt;a href=&#34;https://www.history.com/articles/7-historical-hoaxes&#34;&gt;historical hoaxes&lt;/a&gt;. These can distort our view of history and make us all a bit dumber.&lt;/p&gt; &lt;h3 id=&#34;cardiff-giant&#34;&gt;Cardiff Giant&lt;/h3&gt; &lt;p&gt;One of the most famous hoaxes was that of the &lt;a href=&#34;https://www.history.com/articles/the-cardiff-giant-fools-the-nation-145-years-ago&#34;&gt;Cardiff Giant&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;An atheist named George Hull got into an argument with a preacher. Hull was frustrated with the preacher&#39;s literal interpretation of the bible, particularly his belief that giants were real.&lt;/p&gt; &lt;p&gt;Hull devised a plan to trick the religious and make some money at the same time. He would have a statue of a giant man constructed and pass it off as a petrified human.&lt;/p&gt; &lt;p&gt;After securing the materials needed, specifically a soft material called gypsum, he convinced a marble dealer to help him with his scheme. A pair of sculptors carved out the visage of a giant 10-foot man, with Hull posing as a model. They even poured sulfuric acid over it to give it an aged look.&lt;/p&gt; &lt;p&gt;He settled on burying the giant in Cardiff, New York, where he cut a deal with a distant relative and farmer named William &#34;Stub&#34; Newell.&lt;/p&gt; &lt;p&gt;On October 16, 1869, Newell hired an unsuspecting pair of workers to dig a well on his property. After they inevitably uncovered the giant, it wasn&#39;t long before the whole town was in a frenzy.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;men surrounding a stone sculpture of a man in a hole in the ground doffing their hats&#34; src=&#34;../../../../assets/images/digital-provenance/cardiff-giant.jpg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Wikimedia Commons (Public Domain)&lt;/small&gt;&lt;/p&gt; &lt;p&gt;Speculation that the sculpture was an ancient, petrified man quickly began to spread. Eventually, a syndicate of businessmen offered Newell $30,000 (worth $&lt;a href=&#34;https://www.in2013dollars.com/us/inflation/1869?amount=30000&#34;&gt;705,438.97&lt;/a&gt; in today&#39;s money) for a three-fourths stake, and he took them up on that offer.&lt;/p&gt; &lt;p&gt;P.T. Barnum even tried to buy the sculpture, and after being turned down, he had a replica built and displayed it in a Manhattan museum. Several other copies were made afterward, and soon, there were petrified giants being exhibited all over the country.&lt;/p&gt; &lt;p&gt;In a way that seems familiar to us now, you couldn&#39;t even be sure you were looking at the &lt;em&gt;real&lt;/em&gt; hoax. Misinformation can so easily mutate and spread when left unchecked.&lt;/p&gt; &lt;p&gt;A famed Yale paleontologist named Othniel Charles Marsh declared it &#34;of very recent origin, and a most decided humbug.&#34; Unfortunately, as is so often the case, Hull had already cashed in on the fervor by the time experts had properly debunked his hoax.&lt;/p&gt; &lt;h3 id=&#34;ai-hoaxes&#34;&gt;AI Hoaxes&lt;/h3&gt; &lt;p&gt;Many modern hoaxes tend to make use of social media and focus on getting views and clicks over selling a physical object.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://youtu.be/Pc2psN0PFTk&#34;&gt;Miniminuteman&lt;/a&gt; is a great YouTube channel covering misinformation on the internet, specifically about archaeology. Misinformation can spread quickly, especially now with the rise of generative AI that can make convincing fake images and videos.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://www.mediamatters.org/media/4016186/embed/embed&#34;&gt;Here&lt;/a&gt; you can see an example of AI being used to make a fake Joe Rogan podcast clip. Now, whether or not you view Joe Rogan as a reliable source of information is another topic, but as one of the &lt;a href=&#34;https://podcastcharts.byspotify.com&#34;&gt;most popular podcasts&lt;/a&gt;, his reach could be leveraged to spread dangerous misinformation like that a meteor is going to hit earth and kill everyone.&lt;/p&gt; &lt;p&gt;The effort required is low, and the return is high. With TikTok&#39;s &lt;a href=&#34;https://www.tiktok.com/creator-academy/en/article/creator-rewards-program&#34;&gt;Creator Rewards Program&lt;/a&gt;, content that&#39;s at least 60 seconds long and has high engagement will be rewarded. That means longer videos with alarming content like conspiracy theory videos will do very well since they will have lots of comments from people either fooled by the content posting about how scared they are or people debunking the claims. The insidious thing is the creators get rewarded either way.&lt;/p&gt; &lt;p&gt;&lt;a href=&#34;https://youtu.be/E4I6K8OEyho?si=wbWAUcLsjOA7yDnO&#34;&gt;Several&lt;/a&gt; &lt;a href=&#34;https://youtu.be/cqrHmjGD1ds?si=k60RTO9MH177ASTS&#34;&gt;history&lt;/a&gt; &lt;a href=&#34;https://youtu.be/HG1324unhcA?si=MuwglKd52FQ7iKU3&#34;&gt;channels&lt;/a&gt; on YouTube have expressed their concerns about misinformation being spread about history through AI generated images and videos and how they can distort our view of the past. There&#39;s even the possibility that these AI generated images could end up polluting the historical record.&lt;/p&gt; &lt;h2 id=&#34;content-authenticity-initiative&#34;&gt;Content Authenticity Initiative&lt;/h2&gt; &lt;p&gt;In 2019, &lt;a href=&#34;https://contentauthenticity.org/blog/test&#34;&gt;Adobe announced&lt;/a&gt; that it was partnering with the New York Times and Twitter on a project to develop an industry standard for digital content attribution called the Content Authenticity Initiative.&lt;/p&gt; &lt;p&gt;Twitter has since dropped out of the partnership.&lt;/p&gt; &lt;h2 id=&#34;project-origin&#34;&gt;Project Origin&lt;/h2&gt; &lt;p&gt;At the same time, &lt;a href=&#34;https://www.originproject.info&#34;&gt;Project Origin&lt;/a&gt; was designing their system for content transparency. This started as a partnership between Microsoft and the BBC.&lt;/p&gt; &lt;h2 id=&#34;c2pa&#34;&gt;C2PA&lt;/h2&gt; &lt;p&gt;The Coalition for Content Provenance and Authenticity, or &lt;a href=&#34;https://c2pa.org&#34;&gt;C2PA&lt;/a&gt;, combines the efforts of Project Origin and the Content Authenticity Initiative. Together, they created the &lt;a href=&#34;https://c2pa.org/specifications/specifications/2.1/specs/C2PA_Specification.html&#34;&gt;C2PA standard&lt;/a&gt; used to add verifiable provenance data to files, which they dub &#34;Content Credentials.&#34;&lt;/p&gt; &lt;h2 id=&#34;content-credentials&#34;&gt;Content Credentials&lt;/h2&gt; &lt;p&gt;&lt;a href=&#34;https://contentcredentials.org&#34;&gt;Content Credentials&lt;/a&gt; are the implementation of digital provenance by the C2PA, the culmination of years of research and development by major tech companies, from camera manufacturers to photo editing software and AI companies to social media sites.&lt;/p&gt; &lt;p&gt;The way Content Credentials work draws on concepts both familiar and alien. The standard is designed to be flexible and cover the myriad ways media is used online.&lt;/p&gt; &lt;p&gt;It&#39;s important to note that Content Credentials aren&#39;t attempting to determine &#34;truth&#34;; that&#39;s a much more complex and philosophical topic. Rather, they&#39;re trying to show where an image came from, edits made to it, its constituent parts, etc. so that you can decide for yourself if you trust the source. It&#39;s trying to show you that an image came from the BBC, rather than whether you should trust the BBC.&lt;/p&gt; &lt;h3 id=&#34;manifest&#34;&gt;Manifest&lt;/h3&gt; &lt;p&gt;Content Credentials are contained in what&#39;s called the &lt;strong&gt;manifest&lt;/strong&gt;. The manifest consists of the claim, claim signature, and assertions.&lt;/p&gt; &lt;p&gt;&lt;img alt=&#34;Example of a Manifest, with the Claim, Claim Signature, and Assertions inside&#34; src=&#34;../../../../assets/images/digital-provenance/manifest.svg&#34; /&gt;&lt;/p&gt; &lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: &lt;a href=&#34;https://c2pa.org/specifications/specifications/2.1/specs/C2PA_Specification.html&#34;&gt;C2PA&lt;/a&gt;&lt;/small&gt;&lt;/p&gt; &lt;p&gt;The manifest is created by hardware or software called a &#34;claim generator.&#34;&lt;/p&gt; &lt;p&gt;Files can have multiple manifests, and the set of manifests comprise its provenance data.&lt;/p&gt; &lt;h4 id=&#34;assertions&#34;&gt;Assertions&lt;/h4&gt; &lt;p&gt;An assertion is labelled data such as the type of camera used, actions performed on the image such as color corrections, a thumbnail image, or other types of data.&lt;/p&gt; &lt;h4 id=&#34;claim&#34;&gt;Claim&lt;/h4&gt; &lt;p&gt;The claim gathers together all the assertions and then hashes and cryptographically signs them. The claim is the part that backs up the assertions with cryptography; without it, there wouldn&#39;t be a way to verify the authenticity of the data.&lt;/p&gt; &lt;h3 id=&#34;signatures&#34;&gt;Signatures&lt;/h3&gt; &lt;p&gt;The foundation is based around cryptographic signatures, similar to how you&#39;d cryptographically sign software or text with a &lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt; signature.&lt;/p&gt; &lt;p&gt;The parts of a file that are cryptographically verified are called &#34;hard bindings.&#34; This allows programs to detect tampering.&lt;/p&gt; &lt;h4 id=&#34;certificate-authorities&#34;&gt;Certificate Authorities&lt;/h4&gt; &lt;p&gt;There are certificate authorities similar to how &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; works, which allow only signatures from trusted sources. Non-trusted signatures will give a warning in whatever C2PA-enabled software you&#39;re using.&lt;/p&gt; &lt;p&gt;Content Credentials allow for each application to provide its own &lt;em&gt;trust lists&lt;/em&gt;: lists of certificate authorities trusted by the application.&lt;/p&gt; &lt;p&gt;The C2PA gives a few examples to illustrate. A news organization might rely on a non-profit organization that verifies the authenticity of sources through real-world due diligence. An insurance company might operate its own internal CA to verify only its own employees handled the images.&lt;/p&gt; &lt;h3 id=&#34;ingredients&#34;&gt;Ingredients&lt;/h3&gt; &lt;p&gt;However, what&#39;s interesting is Content Credentials can cover multiple assets being &lt;a href=&#34;https://contentcredentials.org/verify?source=https%3A%2F%2Fcontentcredentials.org%2F_app%2Fimmutable%2Fassets%2Fhome2.91ab8f2d.jpg&#34;&gt;combined&lt;/a&gt; and still be able to verify each element of the image. Each element is called an &#34;ingredient.&#34; When the ingredients come together, the result is called a &#34;composed asset,&#34; with &#34;asset&#34; referring to a digital media file or data stream.&lt;/p&gt; &lt;h3 id=&#34;chain-of-provenance&#34;&gt;Chain of Provenance&lt;/h3&gt; &lt;p&gt;It also supports a chain of provenance, showing all steps in the life cycle of the file that change its contents such as edits. These are referred to as &#34;actions.&#34;&lt;/p&gt; &lt;p&gt;The specification supports a list of pre-defined actions such as edits, changing the color, translating to a different language, etc. It&#39;s really quite flexible, but the flexibility of information that can be provided allows for more opportunities for errors and means you need to trust the entity providing the information more.&lt;/p&gt; &lt;p&gt;An issue I noticed is when making edits using software that doesn&#39;t support Content Credentials, they will be corrupted and can&#39;t be read by verification programs. This poses a problem for the &#34;unbroken chain of provenance&#34; that the standard promises.&lt;/p&gt; &lt;p&gt;These verification programs tend to offer a way to check against a database of images with Content Credentials, so you can find an image with unbroken provenance data. They use &#34;soft bindings&#34; or a type of fingerprinting of the image in order to find similar images in the database.&lt;/p&gt; &lt;p&gt;I think this problem will be less and less of an issue when more software supports the standard. It will need to be so ubiquitous that image viewing programs don&#39;t trust images without provenance data, similar to how browsers don&#39;t trust websites without &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;. But for now with its very limited availability, that&#39;s not the case.&lt;/p&gt; &lt;h3 id=&#34;privacy&#34;&gt;Privacy&lt;/h3&gt; &lt;p&gt;Since Content Credentials are all about attaching extra data to images, concerns about privacy are reasonable.&lt;/p&gt; &lt;p&gt;However, it&#39;s important to remember that metadata has always existed in relation to digital files. Just like the metadata we&#39;ve always had, Content Credentials are optional.&lt;/p&gt; &lt;p&gt;Of course, it&#39;ll be up to programs we use to mediate what data is included. In order for the system to work as intended, certain things like &#34;this photo was edited in Adobe Photoshop&#34; will need to be automatically applied. Clear lines between personal data such as names, location, etc. need to be kept up to the user to add.&lt;/p&gt; &lt;p&gt;Privacy was one of the stated goals when the C2PA was designing Content Credentials, and I think they&#39;ve done a good job giving users control over their information.&lt;/p&gt; &lt;h2 id=&#34;support&#34;&gt;Support&lt;/h2&gt; &lt;p&gt;There are several online verification tools you can use to try out Content Credentials. &lt;a href=&#34;https://contentcredentials.org&#34;&gt;ContentCredentials.org&lt;/a&gt; offers a &lt;a href=&#34;https://contentcredentials.org/verify&#34;&gt;verification tool&lt;/a&gt; that lets you upload a media file and check its Content Credentials. They have some example images on their site you can try, or you can upload images from elsewhere and see where Content Credentials are supported, for example you can upload any image generated in ChatGPT.&lt;/p&gt; &lt;p&gt;Content Credentials also offers an official &lt;a href=&#34;https://github.com/contentauth/c2pa-rs/releases?q=c2patool&#34;&gt;command line tool&lt;/a&gt;, so you can view exactly what data is being stored in the image. They provide some samples as well that you can play around with. To view the content credentials, just run&lt;/p&gt; &lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;c2patool&lt;span class=&#34;w&#34;&gt; &lt;/span&gt;sample/C.jpg &lt;/code&gt;&lt;/pre&gt;&lt;/div&gt; &lt;p&gt;for any image you want to inspect, replacing sample/C.jpg with a path to your image.&lt;/p&gt; &lt;h3 id=&#34;bbc&#34;&gt;BBC&lt;/h3&gt; &lt;p&gt;The BBC is doing a limited trial run of Content Credentials with &lt;a href=&#34;https://www.bbc.com/news/bbcverify&#34;&gt;BBC Verify&lt;/a&gt;. Not all media in these articles have Content Credentials attached. &lt;a href=&#34;https://www.bbc.com/news/world-latin-america-68462851&#34;&gt;This article&lt;/a&gt; has Content Credentials for the video at the bottom. They also ask for feedback, so feel free to provide some. I&#39;d like to see more Content Credentials show up in news reporting, so please add your voice.&lt;/p&gt; &lt;h3 id=&#34;openai&#34;&gt;OpenAI&lt;/h3&gt; &lt;p&gt;OpenAI has embraced Content Credentials, with images generated using ChatGPT identifying themselves using Content Credentials. Try &lt;a href=&#34;https://chatgpt.com&#34;&gt;generating an image&lt;/a&gt; and upload it to the verification tool. You should see it identify the origin as OpenAI.&lt;/p&gt; &lt;h3 id=&#34;tiktok&#34;&gt;TikTok&lt;/h3&gt; &lt;p&gt;&lt;a href=&#34;https://newsroom.tiktok.com/en-us/partnering-with-our-industry-to-advance-ai-transparency-and-literacy&#34;&gt;TikTok&lt;/a&gt; became the first video sharing platform to support Content Credentials. For now, it&#39;s limited to being able to read Content Credentials from certain AI platforms. They say in the future they&#39;ll start labeling all content from TikTok with Content Credentials, but it seems they haven&#39;t enabled that yet, as if you download a video from TikTok, the C2PA verify tool will say it doesn&#39;t have any Content Credentials.&lt;/p&gt; &lt;h3 id=&#34;leica&#34;&gt;Leica&lt;/h3&gt; &lt;p&gt;Leica&#39;s &lt;a href=&#34;https://leica-camera.com/en-US/photography/cameras/m/m11-p-black&#34;&gt;M11-P camera&lt;/a&gt; is the first camera in the world to support Content Credentials. That&#39;s a huge step toward adoption; camera manufacturers need to support Content Credentials if they&#39;re going to be included from the creation of the image.&lt;/p&gt; &lt;h3 id=&#34;nikon&#34;&gt;Nikon&lt;/h3&gt; &lt;p&gt;Nikon is planning to release a firmware update for their &lt;a href=&#34;https://www.nikon.co.uk/en_GB/learn-and-explore/magazine/gear/nikon-z6iii-firmware-update-to-feature-content-verification&#34;&gt;Z6III&lt;/a&gt; camera that will support Content Credentials.&lt;/p&gt; &lt;h3 id=&#34;adobe&#34;&gt;Adobe&lt;/h3&gt; &lt;p&gt;Much of Adobe&#39;s &lt;a href=&#34;https://helpx.adobe.com/creative-cloud/help/content-credentials.html&#34;&gt;software&lt;/a&gt; supports Content Credentials, including Photoshop, Lightroom, and Adobe Camera Raw as well as Adobe&#39;s Firefly AI.&lt;/p&gt; &lt;h3 id=&#34;qualcomm&#34;&gt;Qualcomm&lt;/h3&gt; &lt;p&gt;With the Snapdragon 8 Gen 3 chipset, Qualcomm is embedding Content Credential capabilities into the Trusted Execution Environment, allowing for Content Credentials to be added right as the photo is produced.&lt;/p&gt; &lt;h2 id=&#34;limitations&#34;&gt;Limitations&lt;/h2&gt; &lt;h3 id=&#34;lack-of-support&#34;&gt;Lack of Support&lt;/h3&gt; &lt;p&gt;Content Credentials will need widespread support at every level, from hardware &lt;abbr title=&#34;Original Equipment Manufacturers&#34;&gt;OEMs&lt;/abbr&gt; to photo editing software vendors and AI generators to sites that host and display images. The rollout of Content Credentials will be slow, although more and more companies are starting to support them.&lt;/p&gt; &lt;p&gt;There are still major players missing support like Apple and Android, which is a big problem considering how many images are taken, edited, and shared on smartphones. Once photos taken from your phone can be imbued with Content Credentials in the default camera app, we&#39;ll see much wider adoption I think.&lt;/p&gt; &lt;h3 id=&#34;easy-to-remove&#34;&gt;Easy to Remove&lt;/h3&gt; &lt;p&gt;In my testing, any edits from a program that doesn&#39;t support Content Credentials will render them unreadable after that point. This problem won&#39;t be as bad if and when support for Content Credentials becomes widespread, since you can just decide not to trust images without them, sort of like not trusting a website without &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;. Platforms could even display a warning.&lt;/p&gt; &lt;p&gt;But for now, removing Content Credentials won&#39;t be noticed.&lt;/p&gt; &lt;h3 id=&#34;reliant-on-certificate-authorities&#34;&gt;Reliant on Certificate Authorities&lt;/h3&gt; &lt;p&gt;The system shares a flaw with &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; in that you need to rely on trusted Certificate Authorities to verify the validity of the information, except that Content Credentials are trying to verify a lot more information than just who originally made the image.&lt;/p&gt; &lt;p&gt;Since anyone can add their own Content Credentials to an image, a warning is displayed similar to a certificate warning in your browser that the Content Credentials come from an untrusted entity.&lt;/p&gt; &lt;h3 id=&#34;complexity&#34;&gt;Complexity&lt;/h3&gt; &lt;p&gt;One of the issues I ran into while researching was just how complex the standard is, since it needs to cover so many use cases and situations. This is pure speculation, but I can imagine the sheer complexity makes it unattractive for platforms to implement and maintain, which could be contributing to the very slow and partial rollout we&#39;re seeing on the platforms of even founding members of the project like the BBC.&lt;/p&gt; &lt;p&gt;I think this will be less of an issue as it rolls out however, as platforms will likely be able to use each other&#39;s implementations, or at least reference them when implementing it on their platform.&lt;/p&gt; &lt;p&gt;The standard is still in early stages and there&#39;s plenty of room to shape it and improve it in the future, so make your voice heard about how you want to see it implemented. I think with more awareness about Content Credentials, platforms will feel more pressure to support them, so if you want to see this feature on your favorite platform, speak up and gather support.&lt;/p&gt;</description> <link>https://www.privacyguides.org/articles/2025/05/19/digital-provenance/</link> <pubDate>Wed, 27 Aug 2025 22:30:25 +0000</pubDate> <source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/05/19/digital-provenance/</guid> </item> </channel> </rss>