By using this website you acknowledge the Privacy Policy and agree to the Terms of Service
Big Tech Email, Social Media and AI are Not Free
The Price You Pay is Your Loss of Privacy
The Relationship Between Privacy and Freedom
Privacy is a prerequisite for meaningful freedom. Without the ability to keep certain aspects of life out of public view, individuals may self‑censor or alter behavior out of fear of surveillance.
Freedom creates the conditions for privacy to thrive. Democratic institutions, rule of law, and civil liberties provide the safeguards that protect personal data and limit unwarranted intrusion.
Both are mutually reinforcing. Weakening one tends to erode the other: increased surveillance (privacy loss) can chill free expression, while restrictions on free speech can make it harder to challenge privacy infringements.
How to Protect Your Personal Data
Private DNS (Domain Name System)
A Private DNS (Domain Name System) secures the very first step of every click you make. DNS is essentially the "phone book of the internet." When you type a website name like google.com into your browser, a DNS server translates that name into a numerical IP address (like 142.250.190.46) so your computer can find it.
Why Switching to a Private DNS Matters
By default, your device usually uses the DNS server provided by your Internet Service Provider (ISP). Here’s why that’s a privacy bottleneck and how a private DNS fixes it:
Stopping ISP Tracking:
Even if you use HTTPS (secure) websites, your ISP can see every DNS request you make. They know every site you visit and how often, often selling this "metadata" to advertisers. A private DNS—especially one that uses DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT)—encrypts these requests so your ISP can't see where you're going.
Blocking Malicious Content:
Many private DNS providers act as a firewall at the source. They can automatically block connections to known malware sites, phishing domains, and even intrusive trackers before they ever load on your device.
Faster Browsing:
ISP DNS servers are often slow or poorly maintained. Switching to a high-performance private DNS can shave milliseconds off your "time to first byte," making your browsing feel snappier.
Bypassing "Soft" Censorship:
ISPs sometimes "block" websites by simply removing them from their DNS phone book. A private DNS uses a global phone book, allowing you to access content that might be restricted at the local ISP level.
The "Hidden" Benefit:
Private DNS can be configured at the router level. This means every "smart" device in your home—from your fridge to your TV—gets the same privacy and ad-blocking protection without you having to install software on each one.
VPN (Virtual Private Network)
Think of a VPN (Virtual Private Network) as a secure, encrypted tunnel for your internet traffic. Normally, when you browse the web, your data is out in the open for your Internet Service Provider (ISP) and potential snoopers to see. When you use a VPN, your data is scrambled (encrypted) before it even leaves your device and is sent through a private server before reaching the wider internet.
Why It’s a Big Deal for Data Privacy
Using a VPN isn't just for tech enthusiasts; it’s a foundational tool for digital self-defense. Here is why it matters:
Encryption of Sensitive Data:
It turns your browsing data into unreadable code. This is crucial if you’re using public Wi-Fi at a coffee shop or airport, where hackers often "sniff" out passwords and credit card numbers.
IP Address Masking:
Your IP address is like your digital home address. A VPN replaces your real IP with one from its own server, making it much harder for websites and advertisers to track your physical location or build a profile on your habits.
Preventing ISP Snooping:
In many regions, ISPs can legally track your browsing history and sell that data to third-party advertisers. A VPN hides your specific activity from your ISP—all they see is that you’re connected to a VPN, not what you’re doing.
Bypassing Censorship:
If you’re traveling or living in a region with heavy internet restrictions, a VPN allows you to access the open web by making it appear as though you are browsing from a different country.
A Quick Reality Check:
While a VPN hides your traffic from your ISP and hackers, it doesn't make you invisible to the services you actually log into (like Google or Facebook). They still know who you are because you've signed in! When using a VPN you will notice that some websites will not respond. Sometimes this is a way of preventing you from masking your IP address. You will have to turn off your VPN to gain access. Once they have your IP address they can obtain data from your ISP or data broker to link your personal information to your normal IP address. You cannot sign up for some social media sites if you are using a VPN. Obviously, they will be tracking you and linking your activity to your personal information.
Offshore Encrypted Email
Offshore encrypted email is a digital vault for your private correspondence. Moving your email away from "Big Tech" and into privacy-friendly jurisdictions is about reclaiming ownership of your personal data. Both the sender and the receiver should be using encrypted email.
Why Jurisdictions and Encryption Matter
Standard email (like Gmail or Outlook) is generally "encrypted in transit," but the provider holds the keys. Offshore encrypted services change the game in several ways:
Legal "Safe Havens":
By hosting servers in countries like Switzerland, Iceland, or Norway, these services operate under strict privacy laws. They are outside the reach of the "14 Eyes" surveillance alliance, meaning they can’t be easily coerced into bulk data collection or secret "backdoor" access by foreign intelligence agencies.
Zero-Access Encryption:
Top-tier providers use "zero-access" architecture. Your emails are encrypted with your password before they even hit the server. If a government subpoenas the service provider, all the provider can hand over is a pile of scrambled, unreadable code.
Protection from Data Mining:
Traditional free email providers scan your inbox to build advertising profiles. Offshore encrypted providers typically use a subscription model (or limited free tiers) because you are the customer, not the product. Your private life isn't being auctioned off to the highest bidder.
Metadata Minimization:
Beyond just the text of your email, these services often strip away your IP address from the email headers, making it much harder to trace a message back to your physical location.
Email Alias:
Some email providers offer email aliases which enable you to use different email addresses for specific purposes. If you use just one email address for everything, then somewhere that email address is linked to your personal information.
The "Golden Rule" of Privacy:
Encryption is only as strong as your password. If you use a weak password or lose it, and the service is truly "zero-access," even the provider cannot help you recover your data.
Browser Hardening (The "Window" to the Web)
Your web browser often leaks a "fingerprint"—a unique profile based on your screen resolution, fonts, and extensions.
Privacy-First Browsers:
Switch from Chrome or Edge to Brave (good defaults) or LibreWolf (a "hardened" version of Firefox).
The Gold Standard:
Mullvad Browser or Tor Browser are designed to make your fingerprint look identical to thousands of other users, providing true anonymity.
Essential Extension:
If you use Firefox, install uBlock Origin. It is the most effective way to block not just ads, but the invisible tracking scripts that follow you across the web.
Password Management & Passkeys
Reusing passwords is the #1 way privacy is compromised. If one site is breached, your entire digital life is at risk.
Zero-Knowledge Vaults:
Use a manager like Bitwarden or KeePassXC. These use "zero-knowledge" encryption, meaning even the provider cannot see your passwords.
Adopt Passkeys:
In 2026, more sites support Passkeys. These are cryptographic keys stored on your device that are virtually impossible to "phish" because there is no password for a hacker to steal.
Two-Factor Authentication (2FA)
Stop using SMS for 2FA. Hackers can "SIM-swap" your phone number to intercept your codes.
Authenticator Apps:
Use Ente Auth or Aegis (Android). These generate codes locally on your phone.
Hardware Keys:
For maximum security, use a physical YubiKey. It requires you to physically touch a USB device to log in, making remote hacking nearly impossible.
Finger Printing
Fingerprint‑printing (or device/browser fingerprinting) is a technique that collects a set of attributes from a client’s device or browser and combines them into a unique identifier. Unlike cookies, which are stored and can be cleared by the user, a fingerprint is derived from characteristics that are hard to change or delete.
Browser
User‑agent string
Installed plugins
MIME types
Canvas rendering data
WebGL parameters
Font list
Timezone
Language
Device / OS
Screen resolution
Color depth
Operating‑system version
CPU architecture
Hardware concurrency (cores)
Device memory
Network
IP address (hashed)
Connection type (Wi‑Fi, cellular)
Carrier information
Behavioral
Mouse‑movement patterns
Typing cadence
Scroll speed
Storage
LocalStorage
IndexedDB
Service‑worker cache presence
Your Computer Hardware/Software Was Designed with Tracking Built-in
While modern tracking typically relies more on OS‑level or network identifiers, several firmware‑level (BIOS/UEFI) identifiers can be used to uniquely identify or track a machine. These identifiers are generally stable across OS re-installs and sometimes even disk replacement.
System UUID (universally Unique Identifier):
A 128‑bit value stored in BIOS/UEFI.
Intended to uniquely identify the system board.
Often used by enterprise management tools (e.g., SCCM, Intune).
Can sometimes be changed by someone with technical skill, as noted in Microsoft Q&A discussions.
Motherboard Serial Number:
Exposed via SMBIOS (System Management BIOS).
Typically accessible through tools like wmic bios get serialnumber.
Manufacturers may leave it blank or generic, but when present, it’s a strong identifier.
BIOS Version / BIOS ID String:
Contains manufacturer, model, and revision information.
Not unique by itself, but can help fingerprint a system model.
BIOS ID strings are widely used for identifying motherboard type during updates.
Asset Tag / Chassis Serial Number:
Many business‑class systems (Dell, Lenovo, HP) store an asset tag in BIOS.
Enterprises use this for inventory and tracking.
Can be modified by an administrator.
There may be others...
Various hardware and software vendors add tracking IDs to their product in addition to the ones outlined above.
Why We Need Legislation to Protect Our Privacy
Power imbalance
Companies and governments can collect, store, and analyze massive amounts of personal data, far beyond what any individual can control.
Data‑driven risks
Breaches, accidental leaks, and misuse can lead to identity theft, financial loss, discrimination, or reputational damage.
Transparency & consent
Without rules, organizations may obscure how they process data, making informed consent impossible.
Purpose limitation
Legislation can require that data be used only for the purposes explicitly disclosed to the user, preventing “function creep.”
Accountability & enforcement
Laws create enforceable rights (access, correction, deletion) and penalties for non‑compliance, allowing you to hold providers accountable.
Cross‑border consistency
Harmonize rules and reduce legal fragmentation when personal data moves across jurisdictions, simplifying compliance for multinational projects.
Public trust
Strong privacy statutes signal that societies value individual autonomy, encouraging adoption of digital services and smoother deployments.
Statement on Social Media Use and Platform Endorsements
I am committed to supporting democratic participation, protecting civic discourse, and upholding principles of transparency, accountability, and independence.
For these reasons, I do not maintain or promote a Facebook presence that endorses or supports Mark Zuckerberg or Meta Platforms, Inc.
Facebook plays a significant role in shaping public communication worldwide. However, it is a privately controlled platform whose governance and decision-making structures are not democratically accountable. Publicly supporting the leadership of such a platform is inconsistent with my commitment to democratic values and the decentralization of power.
I am also concerned about the effects of engagement-driven social media systems on public discourse. Extensive public reporting and independent research have linked these systems to the amplification of misinformation, polarization, and harmful content, which undermines informed civic participation and trust in democratic institutions.
Meta’s history of data-privacy controversies raises serious concerns about the protection of individual rights and meaningful consent—core principles in a democratic society. Publicly endorsing corporate leadership may be interpreted as acceptance of practices that conflict with these values.
Maintaining independence from powerful corporate actors is important to me. I prioritize direct, transparent communication over reliance on platforms whose business models and governance structures may conflict with the public interest.
My focus is on contributing to a healthier, more accountable public sphere. I will continue to evaluate how technology affects civic life and choose communication tools that align with democratic principles.