Home - human-aspect
Verify Recipients
Essential
Emails can be easily spoofed. Verify the sender's authenticity, especially for sensitive actions, and prefer entering URLs manually rather than clicking links in emails.
Don't Trust Your Popup Notifications
Essential
Fake pop-ups can be deployed by malicious actors. Always check the URL before entering any information on a popup.
Never Leave Device Unattended
Essential
Unattended devices can be compromised even with strong passwords. Use encryption and remote erase features like Find My Phone for lost devices.
Prevent Camfecting
Essential
Protect against camfecting by using webcam covers and microphone blockers. Mute home assistants when not in use or discussing sensitive matters.
Stay protected from shoulder surfers
Essential
Use privacy screens on laptops and mobiles to prevent others from reading your screen in public spaces.
Educate yourself about phishing attacks
Essential
Be cautious of phishing attempts. Verify URLs, context of received messages, and employ good security practices like using 2FA and not reusing passwords.
Watch out for Stalkerware
Essential
Be aware of stalkerware installed by acquaintances for spying. Look out for signs like unusual battery usage and perform factory resets if suspected.
Install Reputable Software from Trusted Sources
Essential
Only download software from legitimate sources and check files with tools like [Virus Total](https://awesome-privacy.xyz/security-tools/online-tools/virus-total) before installation.
Store personal data securely
Essential
Ensure all personal data on devices or in the cloud is encrypted to protect against unauthorized access.
Obscure Personal Details from Documents
Essential
When sharing documents, obscure personal details with opaque rectangles to prevent information leakage.
Do not assume a site is secure, just because it is `HTTPS`
Essential
HTTPS does not guarantee a website's legitimacy. Verify URLs and exercise caution with personal data.
Use Virtual Cards when paying online
Optional
Use virtual cards for online payments to protect your banking details and limit transaction risks.
Review application permissions
Optional
Regularly review and manage app permissions to ensure no unnecessary access to sensitive device features.
Opt-out of public lists
Optional
Remove yourself from public databases and marketing lists to reduce unwanted contacts and potential risks.
Never Provide Additional PII When Opting-Out
Optional
Do not provide additional personal information when opting out of data services to avoid further data collection.
Opt-out of data sharing
Optional
Many apps and services default to data sharing settings. Opt out to protect your data from being shared with third parties.
Review and update social media privacy
Optional
Regularly check and update your social media settings due to frequent terms updates that may affect your privacy settings.
Compartmentalize
Advanced
Keep different areas of digital activity separate to limit data exposure in case of a breach.
WhoIs Privacy Guard
Advanced
Use WhoIs Privacy Guard for domain registrations to protect your personal information from public searches.
Use a forwarding address
Advanced
Use a PO Box or forwarding address for mail to prevent companies from knowing your real address, adding a layer of privacy protection.
Use anonymous payment methods
Advanced
Opt for anonymous payment methods like cryptocurrencies to avoid entering identifiable information online.