| Web Browsing |
|
|
|
| Private browsing |
Use incognito/private mode |
Firefox, Chrome, Brave |
Ctrl+Shift+N (Chrome), Ctrl+Shift+P (Firefox) |
| Search engines |
Use privacy-focused search |
DuckDuckGo, Startpage, Searx |
Set as browser default |
| Browser hardening |
Disable tracking features |
uBlock Origin, Privacy Badger |
Install extensions, adjust settings |
| Fingerprint resistance |
Prevent browser identification |
Firefox privacy settings, Brave shields |
Enable "Strict" tracking protection |
| Cookies management |
Control persistent data |
Cookie AutoDelete |
Configure to delete on tab close |
| Communication |
|
|
|
| Encrypted messaging |
Use E2E encrypted apps |
Signal, Matrix, Session |
Install apps, verify contacts |
| Email privacy |
Use encrypted email |
ProtonMail, Tutanota |
Create account, use encryption |
| Metadata protection |
Minimize communication metadata |
Signal disappearing messages |
Enable advanced privacy features |
| VoIP security |
Secure voice communications |
Signal, Jitsi |
Use encrypted voice calls |
| File sharing |
Secure document transfer |
OnionShare |
Share files via Tor |
| Device Security |
|
|
|
| Disk encryption |
Encrypt storage devices |
VeraCrypt, LUKS, BitLocker |
Enable system-wide encryption |
| Secure deletion |
Permanently erase data |
BleachBit, shred |
shred -vzu file, use secure wipe |
| Password management |
Use password manager |
KeePassXC, Bitwarden |
Generate unique passwords |
| Screen privacy |
Prevent shoulder surfing |
Privacy screen, timeout locks |
Install filters, set short timeouts |
| Device hardening |
Remove unnecessary services |
OS settings |
Disable unused features/services |
| Network Privacy |
|
|
|
| VPN usage |
Encrypt network traffic |
Mullvad, ProtonVPN |
Install VPN, enable kill switch |
| Tor browsing |
Anonymous web browsing |
Tor Browser |
Use for sensitive activities |
| DNS privacy |
Encrypt DNS requests |
DNS over HTTPS/TLS |
Configure in browser/OS |
| Wi-Fi security |
Secure wireless connections |
WPA3, random MAC |
Enable MAC randomization |
| Traffic analysis |
Prevent traffic inspection |
Obfs4, Snowflake |
Use bridge relays with Tor |
| Identity Protection |
|
|
|
| Account separation |
Compartmentalize identities |
Multiple browsers/profiles |
Use different accounts per context |
| Alternative identities |
Use pseudonyms |
Temp email services |
Create context-specific emails |
| Financial privacy |
Anonymous payments |
Cash, privacy coins |
Use cash for sensitive purchases |
| Metadata removal |
Clean document metadata |
ExifTool, mat2 |
exiftool -all= document.pdf |
| Location privacy |
Minimize location tracking |
GPS spoofing, airplane mode |
Disable location services when not needed |