Search
Content type: Guide step
Whatsapp (owned by META) is one of the most popular end-to-end encrypted messaging service. If you use it on your day-to-day it's worth reviewing some of your current settings and how you are making use of the platform.
This guide includes:
Chat backup settings
Visibility settings
App permissions
Managing desktop sessions
App security and two-factor authentication
Good Practises
Chat backup settings
This is one of most important settings to consider in WhatsApp. Because WhatsApp is end to end…
Content type: Guide step
Tracking pixels are a common online tracking technique used in email messages. They consist in embedding a unique, disguised or invisible, image in an email message to gather data about your interactions with it.
When you open a message containing a tracking pixel, your email client makes a request to load the image so that it can display it to you: in practice, this request acts as a notification to the server. Since only you are served this exact pixel, when your email client requests it to…
Content type: Guide step
In the current digital landscape, passwords are the predominant method for user authentication across most platforms. From a privacy perspective, passwords present a advantage over some other methods like biometrics, as they do not disclose any additional or unique data about you – apart from the selected username
Given the widespread adoption of passwords, manually managing multiple, unique passwords for each online account becomes more difficult. Having unique random passwords for each…
Content type: Guide step
In your day-to-day life, your smartphone silently captures and stores a digital footprint of your whereabouts by keeping a location history: this history is then used to enhance your mobile experience, such as by aiding in navigation and customizing app experiences according to your location habits.
Yet, it's essential to recognize the potential risks tied to this seemingly innocuous practice. Understanding how your location data is handled becomes vital, as it can impact your privacy in ways…
Content type: Guide step
Many mainstream Internet platforms, such as YouTube and X, often collect extensive user data, track online activities, and employ algorithms to create content recommendations based on individual preferences. For a privacy-conscious user, this is nothing short of a nightmare. Making use of alternative front-ends allows you to access the content you want, while minimising the data collected about you. Essentially, this corresponds to using a different website to access the same content. By using…
Content type: Guide step
The practice of buying and selling email addresses is a common one among digital data brokers. Say you register at an online shop to buy an item from a brand. The shop can then sell your email address to that same brand, so they can advertise to you directly in your email inbox. This is a form of targeted advertising, and we have written about its privacy implications to you as a digital citizen. Online marketing is not the sole reason you should consider concealing your personal email address…
Content type: Guide step
Depending on where in the world you are visiting from, websites may seek consent as one way to justify their collection of data about you. This has become general practice across the web, and the typical way to ask for user consent is via banners that pop up first thing when the webpage loads. Often these banners will make use of design elements and user interfaces aiming to mislead or influence you in giving away consent to collect and process your data - these are called Dark Patterns and are…
Content type: Guide step
Depending on where in the world you are visiting from, websites may seek consent as one way to justify their collection of data about you. This has become general practice across the web, and the typical way to ask for user consent is via banners that pop up first thing when the webpage loads. Often these banners will make use of design elements and user interfaces aiming to mislead or influence you in giving away consent to collect and process your data - these are called Dark Patterns and are…