security-cheatsheets/privacy/privacy-protection.md
2025-04-15 00:08:30 -06:00

3.5 KiB

Privacy Protection Cheatsheet

Category Technique Tools Implementation
Web Browsing
Private browsing Use incognito/private mode Firefox, Chrome, Brave Ctrl+Shift+N (Chrome), Ctrl+Shift+P (Firefox)
Search engines Use privacy-focused search DuckDuckGo, Startpage, Searx Set as browser default
Browser hardening Disable tracking features uBlock Origin, Privacy Badger Install extensions, adjust settings
Fingerprint resistance Prevent browser identification Firefox privacy settings, Brave shields Enable "Strict" tracking protection
Cookies management Control persistent data Cookie AutoDelete Configure to delete on tab close
Communication
Encrypted messaging Use E2E encrypted apps Signal, Matrix, Session Install apps, verify contacts
Email privacy Use encrypted email ProtonMail, Tutanota Create account, use encryption
Metadata protection Minimize communication metadata Signal disappearing messages Enable advanced privacy features
VoIP security Secure voice communications Signal, Jitsi Use encrypted voice calls
File sharing Secure document transfer OnionShare Share files via Tor
Device Security
Disk encryption Encrypt storage devices VeraCrypt, LUKS, BitLocker Enable system-wide encryption
Secure deletion Permanently erase data BleachBit, shred shred -vzu file, use secure wipe
Password management Use password manager KeePassXC, Bitwarden Generate unique passwords
Screen privacy Prevent shoulder surfing Privacy screen, timeout locks Install filters, set short timeouts
Device hardening Remove unnecessary services OS settings Disable unused features/services
Network Privacy
VPN usage Encrypt network traffic Mullvad, ProtonVPN Install VPN, enable kill switch
Tor browsing Anonymous web browsing Tor Browser Use for sensitive activities
DNS privacy Encrypt DNS requests DNS over HTTPS/TLS Configure in browser/OS
Wi-Fi security Secure wireless connections WPA3, random MAC Enable MAC randomization
Traffic analysis Prevent traffic inspection Obfs4, Snowflake Use bridge relays with Tor
Identity Protection
Account separation Compartmentalize identities Multiple browsers/profiles Use different accounts per context
Alternative identities Use pseudonyms Temp email services Create context-specific emails
Financial privacy Anonymous payments Cash, privacy coins Use cash for sensitive purchases
Metadata removal Clean document metadata ExifTool, mat2 exiftool -all= document.pdf
Location privacy Minimize location tracking GPS spoofing, airplane mode Disable location services when not needed

GDPR Data Subject Rights Reference

Right Description How to Exercise
Access Obtain your personal data Submit Subject Access Request (SAR)
Rectification Correct inaccurate data Request correction in writing
Erasure Delete your data Submit "Right to be Forgotten" request
Restriction Limit data processing Request processing limitation
Portability Receive/transfer your data Request data in machine-readable format
Object Stop certain processing Express objection to processing
Auto-decisions Avoid automated profiling Opt out of automated decision systems