20 measures to protect your privacy


18 K 3.9/5 (44 reviews)
Grade this page:
Last modified on: April 16th 2013
For this post: Comment Follow Send to a friend
20 measures to protect your privacy

privacy

As we use more and more new technology, we leave ourselves increasingly vulnerable to companies who make money out of collecting our personal data.

For instance, when we use the internet, we need to be wary of what is collected about what we do, our habits, etc.

Here is a list of simple measures which allow us to reduce the natural “vulnerability” of our data:

Internet

facebook

  1. Protect: Use a strong password whenever you are asked for one. You can see some advice about this here.
  2. Keep secret: Never forget that a password is as personal as a handkerchief or toothbrush – never, ever, share it with anyone else, even someone you trust (who might be negligent or take this less seriously). If, however, you do ever need to let someone else know your password, change it immediately after this “loan” is finished.
  3. Double up: Set up an email address to use for anything that requires you to give your email address (online shopping, forum membership, signing up to anything, etc.). Only use your main email address for serious business and real contacts (family, friends, professional, etc.
  4. Camouflage: When you create this “commercial” email address, throw them off your trail: if you are asked for details of your age, sex, country, address, etc., give fantasy details that are completely different from your real ones: invented date of birth, false name, even change your sex.
  5. Separate: Still on the subject of this commercial email address, never choose the same password that you use with your main address. If you are asked for a backup email address in case you lose your password, do not enter anything, or at the very least, never enter your main email address.
  6. google

    Log out: Do you use an online service that requires you to log in (Facebook, Twitter, Google, etc.)? If so, never tick the box that says “keep me logged in” and, most importantly, always log out afterwards. Whenever you stay logged in, you give information about your online behaviour to the service in question. If you would like a quick demonstration of this, do a Google search of your name: do exactly the same search logged in, then logged out and see the difference.
  7. Clean: Have a regular clear out of all the cookies stored in your browser's memory. If you have not done this for a while, you will be amazed at how many there are and the number of sites that have deposited one.
  8. Observe:
    Install a tool in your favourite browser to identify trackers hidden in web pages you visit, so that you can block them if you wish. Example: Ghostery in Firefox – the number of trackers on some pages will leave you open-mouthed (10 or more different ones).
  9. Be paranoid: Use the “in private” or “incognito” option of your browser whenever you have any doubts about a site, or if you prefer to do certain things discreetly, without leaving any traces on your computer. But you should be aware that this mode does nothing to prevent data being recorded on the server you are visiting, nor – importantly – the proxy through which you are passing. To quote Gordon Moore (former Intel CEO): "Only the paranoid survive".

Conventional mail

mail

  1. Use the same weapons as the enemy: If you are asked for your postal address in an online form and you are obliged to give it, then add your own “tracker” . Then, if you receive junk mail one day, you will see where your address has been harvested from. A tracker in this case is some sort of useless “padding” detail added to your address, which does not affect postal delivery, but is a clue for you: for instance, add "block XX" ou "yy floor" (when this does not really exist where you live), or slip in a little deliberate spelling mistake, or even add "c/o Mrs. So-and-so", etc.
  2. Send it back: Have you received commercial junk mail? Don't throw it away, don't open it, but cross out your address and add “return to sender” before posting it again. This will cost the sender money, and they are likely to cross you off their list, especially if you do this a number of times.
  3. Destroy: Have you received other unwanted mail? Don't just throw it in the bin as it is; it contains data about you (even if it is only your address). It is better to destroy it (tear, shred or burn it). Do this for all personal documents which you no longer need (bills, bank statements, etc.) to protect you from identity theft.

Mobile phone

mobile

  1. Be prepared: What would happen if I was suddenly deprived of my phone (breakdown, theft, loss)? To avoid a full-blown drama, it is better to ask yourself this and prepare for the worst while you still have it in your hand. In particular, take steps to back-up your list of addresses, any important files it might contain, etc.
  2. Complicate: Don't use a PIN that is too obvious (0000, 1234 or your date of birth), as these are the first things any thief will try.
  3. Note: Make a note of your phone's IMEI number and keep this somewhere safe (not on the phone itself). This 15-figure number, unique to your phone, is a useful reference if it is lost or stolen. This is also one of the first things you will be asked for when you report the problem, so that it can be blocked remotely. You can find the IMEI number on your phone's outer case, or on the bill, and it is usually on a label under the battery. You can also see it by entering *#06# on the phone's.
  4. Don't hide: Don't conceal the number you are calling from, as this might arouse suspicion (especially for professional calls) and the person you are calling might well not answer. Hidden numbers are the stock-in-trade of call centres, automatic dialing machines and sales calls. Don't answer any such calls yourself, as this is an underhand practice. If the call is from a call centre or automatic dialer, simply picking up will validate your number on the machine's list (and it will call you again sooner or later). If the call really is for you, the person will leave you a message.
  5. Think "national": You see that a call is from abroad (beginning with 00XXX), but you don't know anyone in that country: you should treat it like a hidden number and not answer.
  6. Check: Have you ever received a text message which leaves you a number to call, something like: "Lucy has left you a message, call XX XX to hear it", or "You have received a text message, click on this link to read it or call xx.xx"? This is a very common scam: you will be calling a premium rate number – for nothing, needless to say. The only number you should call is that of your own voice mail; any other is sure to be a fake.
  7. Unlock: When you have had a new phone for 4 months (usually, but do check with your network provider) remember to "unlock" it, i.e. remove the protection that stops it functioning with another network's SIM card. This will allow you to pass it on or sell it more easily, or keep it as an emergency back-up phone. Remember to do this while the phone is still on the original network contract, as it is more difficult, if not impossible, to do it later. To unlock your phone: note the IMEI number and call your network's customer services. Based on this number, they will give you an unlocking code and the steps to follow to enter this on the phone.
  8. Recycle: Like most people, you probably have a box at home, full of old phones and chargers that you haven't used in ages. It is a good idea to take these to a recycling centre and only keep your last phone, unlocked, with its charger, in a plastic box or bag. But do be careful: before recycling, check that you have not left a SIM card in the phone and that you have deleted everything (contact numbers, call history, messages, documents, etc.).


That's a quite a lot, I know, but I hope that you will find some useful ideas here to help you protect your privacy as far as possible.


Lasts posts
Travel cakes
Travel cakes
You may have come across the term "travel cakes" ("gateaux de voyage" in french) for certain pastries, so let's take a look at what they're all about.
January 27th 20252,218
The aromatic power of sugar
The aromatic power of sugar
In the kitchen, sugar doesn't just sweeten, it also has an exceptional ability to capture flavors. Combined with aromatic ingredients, such as citrus zest, it acts as a veritable sponge for aromas. By taking the time to let the sugar soak up the flavors, you can transform your desserts, making...
December 25th 20242,5545
The little trap of thick cream
The little trap of thick cream
When you need to add cream to a recipe, you might be wondering: thick (heavy) cream or liquid cream? In most cases, there's no big difference: you can use either. But there is one exception, and that's when the cream needs to be cooked, for a sauce for example, and here the difference between...
December 13th 20243,1195
Sauce and salad: When and how to mix them?
Sauce and salad: When and how to mix them?
When dressing a salad, there's a kind of golden rule: add the dressing very shortly before serving, especially if your salad contains crunchy elements such as croutons or fresh vegetables, which will retain their crunchiness or crispiness. But, as is often the case in the kitchen, there are...
November 29th 20243,2825
No need to boil gelatin
No need to boil gelatin
Gelatin is a magical ingredient for making light, creamy, structured desserts, yet it's often misused in the kitchen. A common mistake in some recipes is the idea that it needs to be boiled for it to work properly, but this is a mistake indeed: gelatin melts at a much lower temperature, around...
November 21th 20243,1835
Other pages you may also like
The "caves" in the bakery and pastry shop
The "caves" in the bakery and pastry shop
Maybe you've already done this? You want to make a brioche or a cake with fruit inside, you decide to proceed with your usual recipe, but also to add in the dough pieces of fresh and raw fruit, or whole fruit, for example pieces of apples or pears, good idea. When you bake it, everything seems to...
March 27th 20218,2764.9
The art of the charlotte
The art of the charlotte
In cooking, a charlotte is a delicious moulded dessert, with biscuits around the outside that have been soaked in a flavoured syrup, filled with a light cream or mousse. The charlotte is left to set in the fridge before being turned out and served in slices. It is very light and a lovely sweet...
February 27th 201340 K4.3
What is the difference between bakery and patisserie?
What is the difference between bakery and patisserie?
This is a question that you may well have asked yourself and which I will attempt to answer. In France the two trades of "boulangerie" (bakery) and "pâtisserie" (patisserie and confectionery) have always been quite distinct, but where exactly do the boundaries lie? .
February 7th 2017126 K 14.1
What can I use for blind baking a pastry case?
What can I use for blind baking a pastry case?
When it comes to home-made desserts, tarts are always popular. They can be divided into two basic types: those cooked with their filling, such as an apricot and almond cream tart, and those where the filling is added after baking the pastry case, such as a strawberry tart or chocolate tart. For...
May 2nd 2017107 K4.5
The beautiful story of the croissants
The beautiful story of the croissants
As you may have already noticed, cooking, baking and pastry-making are full of stories or legends, usually very romantic, about this or that product or recipe. This is often the case for named recipes, for example tarte tatin, peach melba, paris-brest and many others, but it also applies to very...
October 10th 201815 K5
Post a comment or question
Posted by:
I am not a leaving thing
Follow this page
If you are interested in this page, you can "follow" it, by entering your email address here. You will then receive a notification immediately each time the page is modified or a new comment is added. Please note that you will need to confirm this following.
I am not a leaving thing
Note: We'll never share your e-mail address with anyone else.
Alternatively: you can subscribe to the mailing list of cooling-ez.com , you will receive a e-mail for each new recipe published on the site.

Back to top of page