Skip to Main Content

Digital Privacy

Resources, best practices, and key concepts related to digital privacy

Privacy Tools & Settings: Value and Limitations

Social media, email, and web browsers are first-party data collection parties. When you interact with these sites, information about your behavior is stored in the company’s proprietary databases.First-party data collectors can make money selling your data to third-parties. Even if the service is "free," companies profit from your activity on their website and personal information revealed through website interaction.

While using any digital tools comes with some risk to your privacy, using selective privacy tools changing certain settings in online accounts can reduce that risk. Changing your privacy settings in your online accounts affects what information public users see about you, but the given social media company will still have all of the information you share on its platform.

Please note that because digital platforms like social media make profits from the personal information you share, the information that they share about changing privacy settings is helpful, but may not be fully transparent. It's therefore good to view not only what the platforms themselves say about their privacy settings, but also what other sources that are less likely to have a commercial interest in the platform say.

Keep in mind that technology and digital platform are continually changing, and there is no "silver bullet," or full solution to protecting digital privacy. You'll want to continue practice awareness of potential privacy risks and be mindful about what information you share online.

This page includes a non-exhaustive list of ways to better protect your privacy and data while using first-party data collectors like social media, email, and other internet services.

Internet Search Privacy Tools

These simple privacy tools offer easy ways to improve your digital privacy when searching and browsing the Internet. If you feel short on time, these are good first steps. (Please note that these are offered as a starting point, not a comprehensive list.)

Google & Social Media Platform Settings

As mentioned above, please note that because digital platforms like social media make profits from the personal information you share, the information that they share about changing privacy settings is helpful, but may not be fully transparent. It's therefore good to view not only what the platforms themselves say about their privacy settings, but also what other sources that are less likely to have a commercial interest in the platform say.

Google

X

Instagram

Email Applications

Securing Passwords

  • Use a unique password for each of your user accounts. 
  • Use a combination of letters (upper- and lower-case), numbers, and symbols that are difficult for anyone to guess.
  • Password managers can help with juggling between a large number of passwords, though it's important to be aware of their limitations. Some believe that writing your passwords on paper may be the most secure password management system.  For a review of password managers visit The Best Password Managers for 2025.

VPNs

  • A Virtual Private Network (VPN) creates a private tunnel through the internet.
  • Be sure to research a VPN before you decide to use it. The VPN will be able to see your Internet activity, so you want to be sure you trust it.
  • VPNs can sometimes break authentication or digital rights management systems, disrupting some library digital resources. If you have a VPN and are having issues accessing library resources, try turning off your VPN. For more information on VPNs, review CNET's article Everything You Need to Know About VPNs and How They Work.

Image Credit: https://securityboulevard.com/2020/03/vpn-a-key-to-securing-an-online-work-environment/

Encryption Technologies

Encryption technologies use a mathematical formula to scramble information, rendering it unreadable unless you have a key to decrypt the encrypted information. Different forms of encryption are applied to different sorts of data. Text messages, emails, or communications with apps are examples of data in transit, while computer files, external hard drives, and information stored on a cell phone are data at rest. Data in transit requires different encryption strategies than data at rest. More information on digital security is available from Security Education Companion.

Encryption technologies are a tool in your privacy toolkit, but encryption alone will not solve your privacy issues. This article from Wired discusses the challenges of encrypted messaging: Encrypted Messaging Isn’t Magic. Below is a discussion of two different kinds of encryption technologies for data in transit, Tor Browsers and the Signal messaging app. While both technologies are helpful tools with storied advocates, critical questions should be raised about the early research and development of each, particularly for users driven to use Tor and Signal to avoid government surveillance.

By The Tor Project, Inc. - https://media.torproject.org/image/official-images/2011-tor-logo-flat.svg, CC BY 3.0 us, https://commons.wikimedia.org/w/index.php?curid=20851621Tor Browsers

 

 

Image Credit: By The Tor Project, Inc. - https://media.torproject.org/image/official-images/2011-tor-logo-flat.svg, CC BY 3.0 us, https://commons.wikimedia.org/w/index.php?curid=20851621

Signal

 



Image Credit: https://github.com/signalapp/Signal-iOS/blob/master/Signal/iTunesArtwork%403x.png

  • How does it work?:
    • Signal has end-to-end encryption on messages.
    • This ProPrivacy review discusses whether Signal saves metadata on each message.
    • Signal sounds like WhatsApp, so why did people switch from WhatsApp to Signal? The main reasons are security features and open source software. Facebook owns WhatsApp and mines WhatsApp networks for Facebook data.
  • Advocates of Signal:
    • Edward Snowden
    • EFF does not necessarily advocate for Signal's privacy record, but does note that Signal has better encryption tactics than WhatApp.
  • Questions about Signal:
    • Yasha Levine has also critiqued Signal. Levine's September 2017 article from The Baffler includes an interview with one of the creators of the encrypted messaging app Telegram, pointing to curiosities in Signal's funding (including funding from the Broadcasting Board of Governors) and Snowden's insisted preference for Signal instead of other encryption apps. The article also discusses a CIA leak revealing that the CIA had tools to decrypt Signal, Weibo, and other encrypted SMS apps.