Why The Steps We Took To Protect Privacy Still Matter

Why The Steps We Took To Protect Privacy Still Matter

Privacy isn't a single event. It’s not something you just "fix" with a software update and then forget about forever while you scroll through TikTok. Honestly, most people think about digital security only after they get that terrifying email saying their password was found on the dark web. By then, it’s usually too late. When we look back at the steps we took to secure our digital footprints over the last few years, it’s clear that the landscape has shifted from "nice to have" to "survival requirement."

Data is the new oil, sure, but your personal info is more like your digital DNA. Once it’s leaked, you can’t exactly get a transplant.

The Messy Reality of Data Brokers

You’ve probably noticed those eerily specific ads. You mention wanting a new blender to a friend, and suddenly, your Instagram feed is nothing but Vitamix comparisons. It feels like your phone is listening. While that's a debated topic in tech circles, the reality is actually more boring and more invasive: data aggregation.

Companies like Acxiom or CoreLogic have thousands of data points on almost every adult in the US. They know your credit score, your political leanings, and probably how often you buy cat food. One of the most critical of the steps we took involved a massive push toward "Data Subject Access Requests" (DSARs). Under regulations like Europe’s GDPR and California’s CCPA, we finally got the right to tell these companies, "Hey, show me what you have and then delete it."

It’s a tedious process. You have to email dozens of entities you’ve never heard of. But it works. I’ve seen people reduce their "spam score" significantly just by opting out of the big three brokers. It isn't a silver bullet, though. New brokers pop up like weeds. It’s a constant game of whack-a-mole that requires vigilance rather than a one-time setup.

Why 2FA Isn't Actually Enough Anymore

We were told for years that Two-Factor Authentication (2FA) was the gold standard. "Just use your phone number," they said. Well, they were wrong. SIM swapping became a literal epidemic.

🔗 Read more: Is TikTok Owned by a Chinese Company? What Most People Get Wrong

Hackers realized they didn't need to break into your account if they could just trick a customer service rep at a telecom company into porting your phone number to their device. Suddenly, they receive your "secure" SMS codes. Total nightmare.

The shift moved toward hardware keys like Yubikeys or app-based authenticators like Authy or Google Authenticator. These don't rely on the cellular network. They’re local. If you’re still using your phone number for 2FA on your primary email or bank account, you’re basically leaving the back door unlocked with a "Welcome" mat out. One of the smartest of the steps we took as a collective was moving toward FIDO2 standards. It’s a bit more of a hassle to carry a physical key on your keychain, but it's the difference between a screen door and a bank vault.

The Encryption Wars

Encryption sounds like something out of a 90s thriller movie with green text scrolling down a black screen. It’s actually just math.

When Apple and Google started encrypting phone backups by default, law enforcement lost their minds. The FBI calls it the "Going Dark" problem. Privacy advocates call it "basic human rights." If you look at the 2016 San Bernardino case, the FBI tried to force Apple to create a backdoor. Apple said no. That moment changed everything. It set the precedent that a company shouldn't be forced to undermine its own security.

The VPN Myth and What Actually Works

Let’s talk about VPNs for a second because the marketing is everywhere. "Stay anonymous! Hide from the government!"

Most of that is marketing fluff.

A VPN just shifts your trust from your Internet Service Provider (ISP) to the VPN provider. If your VPN is free, you are the product. They are selling your browsing habits to the very people you’re trying to hide from. The real value of the steps we took with VPNs is mostly about public Wi-Fi security—making sure the guy at the coffee shop can’t see your banking credentials.

If you want actual anonymity, you’re looking at things like the Tor browser or using privacy-focused search engines like DuckDuckGo or Brave Search. Even then, your "browser fingerprint"—the unique combination of your screen resolution, fonts, and plugins—can identify you. You’re never truly invisible. You’re just harder to find.

The "Smart Home" Betrayal

We all wanted the future. We wanted to talk to our lights and have our refrigerators tell us when the milk is sour.

Then we realized that Amazon's Ring was sharing footage with police departments without warrants. Or that Eufy—a brand that promised "local storage only"—was actually sending unencrypted thumbnails to the cloud. It was a massive breach of trust.

The pivot now is toward "Matter" and "Thread." These are new standards designed to let smart devices talk to each other locally without needing to phone home to a server in Virginia or Beijing. Cutting the cord to the cloud is one of the most technical yet rewarding of the steps we took recently. If your lightbulb needs an internet connection to turn on, you don't own that lightbulb; you're just renting the permission to use it.

Your Digital Legacy and The "Burner" Mindset

Privacy is also about what you leave behind.

👉 See also: Beyond the Visible: Why the Lights We Cannot See Shape Everything You Do

We’ve started seeing the rise of "ephemeral" data. Apps like Signal, which pioneered disappearing messages, changed the expectation of permanence. Why should a joke you made in a group chat in 2014 exist forever on a server? It shouldn't.

Using "burner" email addresses for one-off signups is another huge win. Services like SimpleLogin or iCloud’s "Hide My Email" allow you to create a unique address for every site. If one site gets hacked, you just delete that specific address. No more "Credential Stuffing" attacks where a leak at a random pizza shop leads to someone hacking your Spotify or your Amazon account.

Acknowledging the Trade-offs

Look, privacy is inconvenient.

It is much easier to use the same password for everything. It’s convenient to stay logged into Google so it remembers your favorite parking spot. We have to acknowledge that for many people, the "cost" of privacy—in time and effort—is too high. That’s okay. Security is a spectrum, not a binary. You don't have to live in a Faraday cage in the woods to be safer than you were yesterday.

Moving Forward: Actionable Tactics

You don't need to do everything at once. That leads to burnout. Pick one thing.

Audit your app permissions. Go into your phone settings right now. You will find games that have access to your microphone or weather apps that track your location "Always." Turn them off. They don't need that data to function.

Switch your DNS. Most people use their ISP’s default DNS. Switch to something like Cloudflare (1.1.1.1) or NextDNS. It takes two minutes and stops your ISP from keeping a neat little log of every website you visit.

Use a Password Manager. Stop trying to remember them. Use Bitwarden or 1Password. Use a unique, 20-character password for every single site. This is the single most effective thing you can do to prevent your life from being upended by a data breach.

📖 Related: Private IP Address Ranges: What Most People Get Wrong About Home Networking

Check your 'Leaks'. Go to HaveIBeenPwned and put in your email. It’s a reality check. When you see your data was part of 12 different breaches, it tends to motivate you to take the steps we took to heart.

The goal isn't to be perfect. The goal is to be a difficult target. Hackers and data brokers are lazy; they want the low-hanging fruit. By taking even three of these steps, you’ve basically moved your digital house from a tent with no locks to a brick home with a security system. That’s enough for most people.

Start with your primary email account tonight. Secure that, and the rest becomes much easier to manage over time.