Skip navigation
The Habeas Citebook Ineffective Counsel - Header
× You have 2 more free articles available this month. Subscribe today.

Protecting Your Digital Privacy

by Anthony W. Accurso

In an era of expanding government surveillance, protecting your digital privacy is more critical than ever. This article offers practical steps to safeguard your data from government and corporate surveillance. As digital threats evolve in 2025, with increasing use of AI for tracking and data breaches affecting billions, these measures help minimize risks such as identity theft, doxxing, and unauthorized monitoring. Understanding your digital footprint – every click, post, or connection – is key, as data brokers and government surveillance alliances like the Five Eyes (U.S., U.K., Canada, Australia, New Zealand) and expanded 14 Eyes (Five Eyes plus nine additional countries: Belgium, Denmark, France, Germany, Italy, the Netherlands, Norway, Spain, and Sweden – with data sharing varying by agreement and country) facilitate intelligence and data sharing. This makes privacy protection essential for everyone, from activists to everyday users.

Government surveillance capabilities have grown significantly, often justified by anti-terrorism measures since 2001. Recent developments, such as restricted abortion access in many U.S. states and threats to target political opponents, highlight the risk of your digital footprint being used against you. Everyone should reconsider their personal security safeguards. Runa Sandvik, a former digital security staffer for The New York Times and founder of the security firm Granitt, advises, “Whatever platforms you’re on, whatever devices you have, you need to have a sense of what kind of data you’re generating and then use the controls available to limit who can see what you’re doing.” Beyond individual risks, community-oriented privacy plans can help groups assess collective threats and build shared defenses, as emphasized by Electronic Frontier Foundation (“EFF”) resources. Start by evaluating your situation: Who might target you? What data do you generate? This foundational step ensures tailored protections.

Encrypted Communications

Use end-to-end encrypted messaging apps like Signal, WhatsApp, or Apple’s iMessage and FaceTime to secure your communications. Unlike traditional calls or texts, these apps prevent interception by third parties, including law enforcement. Signal is particularly robust, as it minimizes metadata storage, retaining only essential data like phone numbers and last connection times, which can be subpoenaed but is far less extensive than other platforms, minimizing data available through subpoenas. Enabling disappearing messages on Signal to auto-delete conversations after a set time reduces risks if a device is seized. Why is this important? Unencrypted communications can be easily accessed via carrier requests or hacks, as seen in past cases where metadata revealed journalist sources. To set up Signal: Download from the app store, verify your phone number (or use a secondary one for anonymity), and enable features like sealed sender for extra privacy. For groups, use Signal’s group chats with admin controls to limit who can add members.

For secure video calls, consider tools like Jitsi Meet, which offers end-to-end encryption without requiring an account, as recommended in EFF’s Surveillance Self-Defense guide (EFF SSD Tool Guides, ongoing updates through 2025). Jitsi is ideal for spontaneous meetings; host a server yourself for maximum control or use public instances. Setup: Visit meet.jit.si, create a room name, and share the link – encryption activates automatically. This prevents platform providers from accessing content, crucial in 2025 when video surveillance via apps is rising. Additionally, Session messenger provides decentralized encryption without needing a phone number, routing through Lokinet for anonymity. Why choose it? It avoids central servers that could be subpoenaed, offering benefits for high-risk users like journalists.

Avoid default settings on apps like Facebook Messenger or Telegram, which may store decrypted data on servers accessible to governments. Always verify end-to-end encryption is enabled, and test with a contact to confirm. In 2025, with AI analyzing communications, encryption ensures only intended recipients access content, protecting against both state and corporate surveillance.

Encrypted Devices

Encrypting your devices is essential to prevent unauthorized access if seized or lost. Modern iPhones and Android phones use full-disk encryption by default, but security depends on a strong passcode – opt for at least 12 characters mixing letters, numbers, and symbols. Harlo Holmes, director of digital security at the Freedom of the Press Foundation, recommends a long alphanumeric passphrase for robustness. Why? Short PINs can be brute-forced (meaning they can be easily guessed by a computer program that systematically tries every possible combination until it finds the correct one), especially with tools law enforcement uses. Setup on iPhone: Go to Settings > Face ID & Passcode > Change Passcode > Passcode Options > Custom Alphanumeric Code. On Android: Settings > Security > Screen Lock > Password.

For easy access, you can use biometric login (like FaceID or fingerprint scanning). However, this method is less secure if you are forced to unlock your device by someone else. Think of it this way: a captor can’t force you to reveal a password you’ve “forgotten,” but they can physically compel you to look at a phone or place your finger on it.

To protect yourself in a situation where you might be coerced (such as at a border crossing or during a protest), you must force your phone to require your numeric passcode. You can do this quickly by temporarily disabling biometrics. On an iPhone, hold down the side button and either of the volume buttons. On a modern Android device, access the power menu (often by holding the power button or power button + volume up) and tap the “Lockdown” option that appears.

Your strongest defensive measure is to power off your devices before entering a high-risk situation. When a device is completely off, the encryption keys (the codes needed to unscramble your data) are removed from the phone’s fast memory – RAM. This makes it much harder for law enforcement or anyone with forensic tools to extract your data. Security experts recommend you practice these quick disabling methods and powering-off routines, so you can use them instantly when needed.

For laptops, enable FileVault on Macs (Settings > Privacy & Security > FileVault) or BitLocker on Windows Pro (Settings > Privacy & Security > Device Encryption). Windows Home users can use VeraCrypt for full-disk encryption: Download from veracrypt.fr, create a volume, select system encryption, and follow the wizard – back up your header key. Why VeraCrypt? It’s open-source and audited, resisting hidden backdoors. In 2025, with advanced forensics tools, encryption prevents data extraction even if devices are compromised. Regularly update OS for patches – enable auto-updates to close vulnerabilities exploited by surveillance malware.

Cloud Storage

Cloud services like iCloud, Google Drive, or Microsoft OneDrive store your data on third-party servers, which can be accessed by providers or governments via warrants. Ensure end-to-end encryption for backups (e.g., Apple’s iCloud Advanced Data Protection or Meta’s chat backups) is enabled: On iPhone, Settings > [Your Name] > iCloud > Advanced Data Protection (note: not available in all countries, such as China or Russia – verify availability in your region via Apple’s settings or support page). Alternatively, encrypt sensitive files with VeraCrypt before uploading – create a container file, add data, and mount as a drive. As Holmes advises, “Take a moment to make sure that the things that you are deliberately syncing to your iCloud are the things that you wouldn’t mind someone having access to.” Why? Past cases show unencrypted backups can be used in investigations, like WhatsApp chats in criminal probes.

Ideally, keep sensitive data off the cloud through data minimization – delete unnecessary files and avoid auto-sync for photos or documents. Use local backups on encrypted external drives. For alternatives, consider privacy-focused providers like Internxt, which offers end-to-end encrypted storage with zero-knowledge architecture, meaning even the provider can’t access your data. Setup: Sign up at internxt.com, upload files via their app – plans start free with 1GB. In 2025, with cloud breaches rising, this reduces risks from subpoenaed data.

Online Anonymity

Your online activity leaves a traceable trail via IP addresses and cookies. The Tor Browser or Orbot (for mobile) uses triple-encrypted proxies to anonymize browsing, hiding your IP. Download from torproject.org; it’s slow but effective for sensitive research. However, use Tor Browser’s “Safest” security mode to restrict JavaScript and other fingerprinting risks, as disabling JavaScript entirely may break websites, and modern fingerprinting can occur via other methods like CSS or canvas – rely on Tor’s built-in protections and weigh functionality versus security. Alternatives include Brave’s private browsing, which blocks trackers by default, or Apple’s iCloud Private Relay (subscription: $0.99/month via iCloud+). Brave is chromium-based, fast, and fingerprint-resistant – to setup: Download from brave.com and enable shields for ad/tracker blocking.

Virtual private networks (“VPNs”) offer simpler protection by encrypting traffic and masking IPs – choose no-log providers like Surfshark (audited by Cure53, RAM-only servers) or Mullvad. To setup Surfshark: Download app, sign in (accepts Bitcoin), and connect to a server – unlimited devices supported. Why? VPNs counter ISP tracking and surveillance alliances. “For me, I always try to remember you’re not ‘going to’ a website,” says Matt Mitchell, founder of CryptoHarlem, a security and privacy training nonprofit. “You’re opening a door, and just like if you open your door, people can see you, and they can see behind you.”

To further secure your browsing, install browser extensions like uBlock Origin for ad/tracker blocking and HTTPS Everywhere to force secure connections. Verify the padlock icon for HTTPS before inputting data. Use incognito mode to avoid local history storage, but note it doesn’t stop ISP tracking – combine with VPN. In 2025, fingerprinting techniques are advanced, so randomize user agents via extensions. Limit sharing on sites; use throwaway emails for sign-ups.

Location Data

Smartphones track location via GPS, Wi-Fi, or cell towers. Disable services for non-essential apps: On iOS/Android, Settings > Privacy > Location Services > App permissions. Review regularly – delete unused apps. Use a VPN or ad blocker to reduce leaks. Apple’s Lockdown Mode (Settings > Privacy & Security > Lockdown Mode) strips metadata from photos and blocks risky Wi-Fi, but limits features – enable only when threatened.

When using public Wi-Fi, avoid sensitive activities without VPN, opting for cellular data instead – public networks enable eavesdropping. For maximum protection, Sandvik suggests, “If you’re trying not to be tracked, not having a phone is often the easiest. Leave it at home.” Alternatively, Faraday bags block signals – place device inside for temporary invisibility, but plan usage as it disables functionality. Why important? Location data reveals habits, associations, and can criminalize legal activities in shifting laws, like abortion-related travel. In 2025, 5G enables precise tracking; counter by using apps like Orbot for Tor on mobile.

Financial Privacy

Financial transactions are traceable without warrants for cards or apps like PayPal, Venmo, Cash App. Use cash for in-person anonymity. Cryptocurrencies like Bitcoin are pseudonymous and traceable with analysis, but Monero/Zcash offer better obfuscation (Zcash requires shielded transactions, which must be actively selected) – use wallets like Monero GUI for transactions. “Forensic accounting is a thing,” warns Holmes. “So yeah, just use cash.”

Limit app usage; access services via browser in private mode to avoid data collection. For online, use privacy-focused payment methods or VPNs to mask IPs during purchases.

Account Security: Passwords and Multi-Factor Authentication

Create strong, unique passwords – long passphrases (e.g., “CorrectHorseBatteryStaple”) over complex strings – for each account, avoiding reuse. Use managers like 1Password or Bitwarden (open-source, free) to generate/store them. To setup 1Password: Download, create master password, and add accounts – auto-fills securely. Why? Breached passwords from one site compromise others; managers prevent this.

Enable 2FA/MFA on all accounts – use apps like Authy or Duo over SMS (vulnerable to SIM swaps). To setup: In account settings, scan QR code with app. This adds a time-based code, blocking unauthorized logins even if passwords leak. In 2025, with AI phishing, MFA is vital.

Software and Device
Maintenance

Regularly update OS, apps, browsers – enable auto-updates for patches against vulnerabilities like zero-days. Change router passwords from defaults, setup guest networks for IoT to isolate risks. Use antivirus like Bitdefender for real-time scans – to setup: Install, run full scan, and enable protections. Before disposing of devices, wipe data: iOS/Android factory reset after backup; use DBAN for PCs. Why? Outdated software is exploited in 90% of breaches.

Managing Past Data
and Oversharing

Past data lingers with brokers; use Incogni to opt-out from over 200 brokers automatically (exact number varies; check Incogni’s site for current coverage). Avoid oversharing on social media – run privacy checkups: Facebook Settings > Privacy Checkup to limit visibility. Pause Google ads via My Ad Center. For AI like ChatGPT, disable data-sharing in settings.

Use secure email like ProtonMail (end-to-end encrypted) or StartMail for aliases. Be vigilant against phishing: Scrutinize emails, report suspicious ones – use tools like Google Transparency Report to check URLs. Why? Phishing caused 298,878 complaints in the U.S. in 2023 per the FBI’s IC3 report; 2025 figures will likely increase due to rising AI-driven threats like deepfakes.

Limit social media: Assess platforms, hide details like birthdays, use privacy settings to restrict tags/posts. For smart devices, disable tracking in settings – e.g., smart TVs monitor viewing; isolate on guest networks.

Compartmentalization,
Not Anonymity

Burner phones are impractical if linked via location or accounts. Instead, Holmes recommends compartmentalization – separate devices for work/personal, never overlapping. “Unless you’re gonna pretend to be a character from The Wire, ultimately what’s attainable for people is compartmentalization, not anonymity,” says Holmes. Use EFF’s doxxing guide for online protection: Minimize personal info, use pseudonyms.

Conclusion

The battle for digital autonomy is not a distant, theoretical concept. It is the defining struggle of the digital age. Your privacy is not a luxury – it is the foundation of your freedom, especially as government and corporate surveillance systems, fueled by advancing AI and facilitated by global alliances like the 14 Eyes, become increasingly pervasive and weaponizable.

To retreat into full anonymity is nearly impossible. The goal is compartmentalization and control. The actions detailed here – from adopting end-to-end encrypted tools like Signal and ProtonMail to enforcing full-disk encryption with strong passphrases – are not overly complicated technical hurdles, but a series of essential defensive routines. They are the modern equivalent of locking your doors.

Your digital footprint, from the metadata of a single message to the viewing history on a smart TV, has tangible, real-world consequences. By taking these decisive, practical steps, you move from being a passive subject of surveillance to an active guardian of your own data. Do not wait for a breach or a crisis. Make this a non-negotiable part of your daily life. Privacy is power – take it back.  

 

Sources: Wired, Electronic Frontier Foundation, Freedom of the Press Foundation, CryptoHarlem, TechCrunch, PrivacyTools.io

As a digital subscriber to Criminal Legal News, you can access full text and downloads for this and other premium content.

Subscribe today

Already a subscriber? Login

 

 

PLN Subscribe Now Ad
PLN Subscribe Now Ad 450x450
Prison Phone Justice Campaign