All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "2417269",
"signature": "Article:2417269",
"url": "https://staging.dailymaverick.co.za/article/2024-10-21-how-to-protect-your-data-privacy-a-digital-media-expert-provides-steps-you-can-take-and-explains-why-you-cant-go-it-alone/",
"shorturl": "https://staging.dailymaverick.co.za/article/2417269",
"slug": "how-to-protect-your-data-privacy-a-digital-media-expert-provides-steps-you-can-take-and-explains-why-you-cant-go-it-alone",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "How to protect your data privacy: A digital media expert provides steps you can take and explains why you can’t go it alone",
"firstPublished": "2024-10-21 17:00:37",
"lastUpdate": "2024-10-20 15:58:02",
"categories": [
{
"id": "1825",
"name": "Maverick Life",
"signature": "Category:1825",
"slug": "maverick-life",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/maverick-life/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6712,
"contents": "<div class=\"theconversation-article-body\">\r\n\r\nPerfect safety is no more possible online than it is when driving on a crowded road with strangers or walking alone through a city at night. Like roads and cities, the dangers of the internet arise from the choices society has made. To enjoy the freedom of cars comes with the risk of accidents; to have the pleasures of a city full of unexpected encounters means some of those encounters can harm you. To have an open internet means people can always find ways to hurt each other. However, some highways and cities are safer than others.\r\n\r\nTogether, people can make their online lives safer, too.\r\n\r\nI’m a <a href=\"https://scholar.google.com/citations?hl=en&user=a3nrKn8AAAAJ&view_op=list_works&sortby=pubdate\">media scholar</a> who researches the online world. For decades now, I have experimented on myself and my devices to explore what it might take to live a digital life on my own terms. But in the process, I’ve learned that my privacy cannot come from just my choices and my devices.\r\n\r\nThis is a guide for getting started, with the people around you, on the way toward a safer and healthier online life.\r\n<h4><strong>The threats</strong></h4>\r\nThe dangers you face online take very different forms, and they require different kinds of responses. The kind of threat you hear about most in the news is the straightforwardly criminal sort of hackers and <a href=\"https://www.dailymaverick.co.za/article/2024-03-25-crime-bytes-how-easily-you-can-be-lured-by-criminal-scammers-without-even-realising/\">scammers</a>. The perpetrators typically want to steal victims’ identities or money, or both. These <a href=\"https://www.dailymaverick.co.za/article/2024-07-30-cyberattackers-use-easily-available-tools-to-target-media-sites/\">attacks</a> take advantage of <a href=\"https://academic.oup.com/ips/article/16/3/olac013/6649355\">varying legal and cultural norms</a> around the world. Businesses and governments often offer to defend people from these kinds of threats, without mentioning that they can pose threats of their own.\r\n\r\nA second kind of threat comes from <a href=\"https://www.dailymaverick.co.za/article/2024-05-28-cybercrime-goes-corporate-there-are-ways-to-protect-your-company/\">businesses</a> that lurk in the cracks of the online economy. Lax <a href=\"https://www.dailymaverick.co.za/article/2024-03-05-beware-psychological-techniques-used-by-scammers/\">protections</a> allow them to scoop up vast quantities of data about people and sell it to abusive advertisers, police forces and others willing to pay. Private data brokers <a href=\"https://theconversation.com/data-brokers-know-everything-about-you-what-ftc-case-against-ad-tech-giant-kochava-reveals-218232\">most people have never heard of</a> gather data from apps, transactions and more, and they sell what they learn about you without needing your approval.\r\n\r\nhttps://youtu.be/Hhyzx-rRBps\r\n\r\nA third kind of threat comes from established institutions themselves, such as large tech companies and government agencies. These institutions <a href=\"https://doi.org/10.1080/21624887.2023.2239002\">promise a kind of safety</a> if people trust them – protection from everyone but themselves, as they liberally collect your data. Google, for instance, provides tools with high-security standards, but its business model is built on <a href=\"https://www.cnbc.com/2021/05/18/how-does-google-make-money-advertising-business-breakdown-.html\">selling ads</a> based on what people do with those tools. Many people feel they have to accept this deal because everyone around them already has.\r\n\r\nThe stakes are high.\r\n\r\n<a href=\"https://www.genderit.org/editorial/feminist-conversation-cybersecurity\">Feminist</a> and <a href=\"https://www.criticalracedigitalstudies.com/\">critical race</a> scholars have demonstrated that surveillance has long been the basis of unjust discrimination and exclusion. As African American studies scholar <a href=\"https://scholar.google.com/citations?hl=en&user=XlsH9jEAAAAJ&view_op=list_works&sortby=pubdate\">Ruha Benjamin</a> puts it, online surveillance has become a “<a href=\"https://cyber.harvard.edu/events/new-jim-code\">new Jim Code</a>,” excluding people from jobs, fair pricing and other opportunities based on how computers are trained to watch and categorize them.\r\n\r\nOnce again, there is no formula for safety. When you make choices about your technology, individually or collectively, you are really making choices about whom and how you trust – shifting your trust from one place to another. But those choices can make a real difference.\r\n<h4><strong>Phase 1: Basic data privacy hygiene</strong></h4>\r\nTo get started with digital privacy, there are a few things you can do fairly easily on your own. First, use a password manager like <a href=\"https://bitwarden.com/\">Bitwarden</a> or <a href=\"https://proton.me/pass\">Proton Pass</a>, and make all your passwords unique and complex. If you can remember a password easily, it’s probably not keeping you safe. Also, enable two-factor authentication, which typically involves receiving a code in a text message, wherever you can.\r\n\r\nAs you browse the web, use a browser like <a href=\"https://firefox.com/\">Firefox</a> or <a href=\"https://brave.com/\">Brave</a> with a strong commitment to privacy, and add to that a good ad blocker like <a href=\"https://ublockorigin.com/\">uBlock Origin</a>. Get in the habit of using a search engine like <a href=\"https://duckduckgo.com/\">DuckDuckGo</a> or <a href=\"https://search.brave.com/\">Brave Search</a> that doesn’t profile you based on your past queries.\r\n\r\nOn your phone, download only the apps you need. It can help to <a href=\"https://www.popsci.com/story/diy/how-to-reset-devices/\">wipe and reset</a> everything periodically to make sure you keep only what you really use. Beware especially of apps that track your location and access your files.\r\n\r\nFor Android users, <a href=\"https://f-droid.org/\">F-Droid</a> is an alternative app store with more privacy-preserving tools. The Consumer Reports app <a href=\"https://www.permissionslipcr.com/\">Permission Slip</a> can help you manage how other apps use your data.\r\n\r\nhttps://youtu.be/a1i-3xwcSGA\r\n<h4><strong>Phase 2: Shifting away</strong></h4>\r\nNext, you can start shifting your trust away from companies that make their money from surveillance. But this works best if you can get your community involved; if they are using Gmail, and you email them, Google gets your email whether you use Gmail yourself or not. Try an email provider like <a href=\"https://proton.me/mail\">Proton Mail</a> that doesn’t rely on targeted ads, and see if your friends will try it, too. For mobile chat, <a href=\"https://www.signal.org/\">Signal</a> makes encrypted messages easy, but only if others are using it with you.\r\n\r\nYou can also try using privacy-preserving operating systems for your devices. <a href=\"https://grapheneos.org/\">GrapheneOS</a> and <a href=\"https://e.foundation/e-os/\">/e/OS</a> are versions of Android that avoid sending your phone’s data to Google. For your computer, <a href=\"https://pop.system76.com/\">Pop!_OS</a> is a friendly version of Linux. Find more ideas for shifting away from science and technology scholar Janet Vertesi’s <a href=\"https://www.optoutproject.net/\">Opt-Out Project</a> website.\r\n<h4><strong>Phase 3: New foundations</strong></h4>\r\nIf you are ready to go even further, rethink how your community or workplace collaborates. In my university lab, we <a href=\"https://manifold.umn.edu/projects/the-lab-book\">run our own servers</a> to manage our tools, including <a href=\"https://nextcloud.com/\">Nextcloud</a> for file sharing and <a href=\"http://matrix.org/\">Matrix</a> for chat.\r\n\r\nThis kind of shift, however, requires a collective commitment in how organizations spend money on technology, away from big companies and toward investing in the ability to manage your tools. It can take extra work to build what I call “<a href=\"https://doi.org/10.31269/triplec.v20i1.1281\">governable stacks</a>” – tools that people manage and control together – but the result can be a more satisfying, empowering relationship with technology.\r\n<h4><strong>Protecting each other</strong></h4>\r\nToo often, people are told that being safe online is a job for individuals, and it is your fault if you’re not doing it right. But I think this is a kind of victim blaming. In my view, the biggest source of danger online is the lack of public policy and collective power to prevent surveillance from being the basic business model for the Internet.\r\n\r\nFor years, people have organized “<a href=\"https://doi.org/10.14763/2020.4.1508\">cryptoparties</a>” where they can come together and learn how to use privacy tools. You can also support organizations like the <a href=\"https://eff.org/\">Electronic Frontier Foundation</a> that advocate for privacy-protecting public policy.\r\n\r\nIf people assume that privacy is just an individual responsibility, we have already lost.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;\" src=\"https://counter.theconversation.com/content/221569/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" /> <strong>DM <iframe style=\"border: none !important;\" src=\"https://counter.theconversation.com/content/221569/count.gif?distributor=republish-lightbox-advanced\" width=\"1\" height=\"1\"></iframe></strong><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines -->\r\n\r\n<a href=\"https://theconversation.com/how-to-protect-your-data-privacy-a-digital-media-expert-provides-steps-you-can-take-and-explains-why-you-cant-go-it-alone-221569\"><em>This story was first published in</em> The Conversation.</a> <em>Nathan Schneider is an Assistant Professor of Media Studies at the University of Colorado Boulder.</em>\r\n\r\n</div>",
"teaser": "How to protect your data privacy: A digital media expert provides steps you can take and explains why you can’t go it alone",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "1038981",
"name": "Nathan Schneider",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/nathan-schneider/",
"editorialName": "nathan-schneider",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "2082",
"name": "Privacy",
"url": "https://staging.dailymaverick.co.za/keyword/privacy/",
"slug": "privacy",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Privacy",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "5505",
"name": "Security",
"url": "https://staging.dailymaverick.co.za/keyword/security/",
"slug": "security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "5949",
"name": "Digital media",
"url": "https://staging.dailymaverick.co.za/keyword/digital-media/",
"slug": "digital-media",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Digital media",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10249",
"name": "Internet",
"url": "https://staging.dailymaverick.co.za/keyword/internet/",
"slug": "internet",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Internet",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "20017",
"name": "Hacking",
"url": "https://staging.dailymaverick.co.za/keyword/hacking/",
"slug": "hacking",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Hacking",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "85262",
"name": "Cybersecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cybersecurity/",
"slug": "cybersecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybersecurity",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "92089",
"name": "data privacy",
"url": "https://staging.dailymaverick.co.za/keyword/data-privacy/",
"slug": "data-privacy",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "data privacy",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "150209",
"name": "Big Tech",
"url": "https://staging.dailymaverick.co.za/keyword/big-tech/",
"slug": "big-tech",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Big Tech",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "403561",
"name": "Live Smarter",
"url": "https://staging.dailymaverick.co.za/keyword/live-smarter/",
"slug": "live-smarter",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Live Smarter",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "425590",
"name": "computer literacy",
"url": "https://staging.dailymaverick.co.za/keyword/computer-literacy/",
"slug": "computer-literacy",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "computer literacy",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "55969",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/x86wgkw1u2TmxzDP2dcr5p-V6kM=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/BMHlzPg5kQ_qOFyjksGyNvikswg=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/lfCasXjXkICLj6XcUgmaFrJtDKQ=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/eD3G6swd2grhbXSVGIV7NwuZP84=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/e12dVM1ihiWz1JsVZ9aY1TMpEO8=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/x86wgkw1u2TmxzDP2dcr5p-V6kM=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/BMHlzPg5kQ_qOFyjksGyNvikswg=/450x0/smart/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/lfCasXjXkICLj6XcUgmaFrJtDKQ=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/eD3G6swd2grhbXSVGIV7NwuZP84=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/e12dVM1ihiWz1JsVZ9aY1TMpEO8=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2024/10/ai-generated-9123440_1280.jpg",
"type": "image"
}
],
"summary": "Your data privacy is under threat from hackers, data brokers and big tech. Here’s what you can do about it. Step 1 is to get your colleagues, friends and family on board.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "How to protect your data privacy: A digital media expert provides steps you can take and explains why you can’t go it alone",
"search_description": "<div class=\"theconversation-article-body\">\r\n\r\nPerfect safety is no more possible online than it is when driving on a crowded road with strangers or walking alone through a city at night. Like roads an",
"social_title": "How to protect your data privacy: A digital media expert provides steps you can take and explains why you can’t go it alone",
"social_description": "<div class=\"theconversation-article-body\">\r\n\r\nPerfect safety is no more possible online than it is when driving on a crowded road with strangers or walking alone through a city at night. Like roads an",
"social_image": ""
},
"cached": true,
"access_allowed": true
}