Privacy Focused Life - You Don't Have To Disappear

Empty computer

Privacy is not a switch with two options.
You can -and should- choose your level of privacy.

Don't delete your social media account just for privacy.
Don't burn your phone just for safety.

Basic habits will keep you safe.

Choose Your Privacy To Your Threats

Military operations specialists keep their moves in secret.
They must do it.
It's their interest. Their work.
Leaking military data would be dangerous for the nation.

The CEO of a billion-dollar company won't share their business plans.
Their next step is private - to stay ahead of competition.

Your doctor must not share your health data.
Your file is only your concern.

You Don't Have To Disappear

You don't have to erase yourself from social media.
Always read the privacy statements.
Set up the access to your data.
Restrict it to friends, family.

Make visible only the necessary information.

Don't post images without stripping metadata.
Photos may contain more information:

  • Location
  • Camera type
  • Date
  • Timezone
  • Other settings

Never post your current location.
Burglars and thieves follow social sites.

Don't say too much.
Less is more.

Your Images - Someone Else's Map

Metadata - the information your images carry.
It can tell a lot about you.

The subjects - architecture, buildings, signs, text, etc.
They scream about who you are. Where you are. What are you doing.

Never share images that tell too much.
Use some metadata cleaner.
Remove all meta information.

On Linux use the Ghost Image Cleaner to remove metadata.

Don't over-share.

Your Phone: The Double Agent

Your phone knows more about you than you think.
Smart phones are not only phones anymore.
They are:

  • GPS tools for precise location sharing.
  • Cameras to record audio and video with metadata like location.
  • Digital creditcards to pay comfortably.

Installed applications follow your habits.
Always review what permissions they request.
Read every permission - a grocery app doesn't need video recording.

OPSEC Begins With You

You can use

  • TailsOS for immutable, secure system.
  • Tor browser for secure browsing.
  • VPN for end-to-end encryption.
  • Full-disk-encryption for data in rest.

If your habits are dangerous - your tools won't protect you.

Ghost Practice

  • Strip metadata from your last 3 shared photos.
  • Audit your phone permissions.
  • Post nothing today.

Ghost's Whisper

You are the Operator.
Fix your habits first.
Then go over your tools.

Whisper to DeadSwitch on Matrix:
@deadswitch:matrix.org
Maybe the Ghost signals back.

DeadSwitch | The Silent Architect
"In silence, I rise. In storms, I endure."