Privacy greenhouse¶
Imagine your personal data is a rare orchid in a vast, overgrown botanical garden. Corporate poachers, government landscapers, and algorithmic weeds all want to catalog, clone, or crush your fragile blooms.
- Threat models
- Defensive strategies
- Playbooks: when judgement is required
- The Greenhouse of Home Privacy
- Use encrypted messaging
- How to keep your anonymous data separate from your identity
- How to remove your personal info from data broker websites
- Minimise long-term data storage
- How to protect your email privacy
- VPNs for privacy protection
- How to block tracking scripts with uBlock Origin and Privacy Badger
- Switch to a privacy-focused browser
- Using cash and privacy-focused payment methods
- Removing metadata from files
- How to foil facial recognition like a Sci-Fi rebel (because big brother is watching)
- Quantum-resistant encryption: Why your secrets need future-proofing today
- Prepare devices for high-risk travel
- Audit what data you hold
- Assess third-party vendor security
- Audit and revoke shared account access
- Check a device for stalkerware
- Detect stalkerware using PiRogue and Wazuh
- Monitor device traffic with a spare Android phone
- Detect stalkerware using DNS monitoring
- Suspected device compromise
- Digital safety steps when leaving
- Runbooks: step-by-step procedures
- Set up a password manager
- Enable two-factor authentication
- Enable device encryption
- Block IoT internet access with VLANs (Guest network method)
- Stop tracking and sharing personal info via photos
- How (and why) to reset your advertising ID regularly
- The most thorough cleaning method (using ExifTool)
- Submit a GDPR deletion request
- Run a periodic access review
- Handle research participant data
- Disable Chrome’s Topics API
- Account compromise response
- Phishing click response
- Doxxing response
- Respond to a suspected data breach
- Vendor breach response
- After device seizure
- Responding to a legal demand for data
- Data subject request response
- Reclaim your primary email account
- Privacy playground
- For the curious botanist
- The Unseen University library