12 - STOP the Data Leak Part 2: Facebook, Microsoft, and Amazon
Release Date: 11/23/2024
Intentionally Inconvenient
In this episode of the Privacy Bootcamp podcast, we dive into securing your social media accounts, focusing on Facebook and X.com (formerly Twitter). Tim Jensen, host of "Intentionally Inconvenient," walks us through essential settings and strategies to enhance your privacy and protect personal information. From managing your Facebook profile visibility to understanding session tokens on X.com, this episode is packed with actionable insights to keep your digital presence secure. Standout Quotes: • “Your public...
info_outlineIntentionally Inconvenient
In this episode of the Privacy Bootcamp podcast, we welcome Tim Jensen, the host of "Intentionally Inconvenient," where he explores personal freedom through privacy. Today, Tim delves into two-factor authentication (2FA) and multi-factor authentication (MFA), focusing on authenticator apps and other methods to secure your online accounts. Learn about the tools and strategies that can protect you from hackers and enhance your digital security. Standout Quotes: ● “In today’s online world, you absolutely must implement 2FA and MFA to move you from the low-hanging...
info_outlineIntentionally Inconvenient
In this episode, Tim Jensen explores the importance of two-factor authentication (2FA) and multi-factor authentication (MFA) using hardware keys to enhance online security. He explains the concepts behind these authentication methods, their role in establishing identity trust, and how they form part of a robust privacy framework. Tim also highlights the advantages of using hardware keys like YubiKey and OnlyKey over other forms of authentication. Standout Quotes ● “Two-factor authentication establishes trust with someone who does not know who you are by using...
info_outlineIntentionally Inconvenient
In this episode, Tim Jensen dives into the importance of email aliasing as a foundational step in maintaining privacy and protecting your digital identity. He shares practical strategies to safeguard your accounts, minimize exposure to hackers, and build a layered security system. Tim emphasizes creating habits of privacy and introduces tools like Proton Pass, SimpleLogin, and YubiKey to simplify the process. Standout Quotes ● “Using the same email address and the same password for everything is a horrible strategy.” – Tim Jensen ● ...
info_outlineIntentionally Inconvenient
Tim dives into the privacy implications of search engines, discussing alternatives like Startpage, DuckDuckGo, and Freespoke. He explains how search data can be used to build detailed profiles and why it’s essential to choose search engines that prioritize user privacy. Standout Quotes: ● "Your search engine knows more about you than your closest friends." ● "If you like Google’s results but want privacy, Startpage is your best bet." ● "Support search engines that build from scratch—don’t rely on...
info_outlineIntentionally Inconvenient
In this episode, Tim Jensen discusses web browsers and how they impact your privacy. He explains how browsers like Brave, Firefox, and Tor can protect against tracking and surveillance. Tim also highlights the dangers of using mainstream browsers like Google Chrome and Microsoft Edge, emphasizing the need for privacy-focused alternatives. Standout Quotes: ● "Brave gives you privacy right out of the box—no need to harden it like Firefox." ● "Every keystroke, every click, every mouse movement is tracked by mainstream browsers." ...
info_outlineIntentionally Inconvenient
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen explores the world of messengers, dissecting the pros and cons of popular platforms like WhatsApp, Facebook Messenger, iMessage, and others. Tim delves into the importance of end-to-end encryption, decentralization, and other privacy features while explaining why he prefers Signal Messenger over alternatives. He also highlights the critical concept of disappearing messages and why they are a game-changer for protecting privacy. Standout Quotes: ● "End-to-end encryption means...
info_outlineIntentionally Inconvenient
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen explores the crucial role of virtual private networks (VPNs) in safeguarding online privacy. He clarifies how VPNs work to hide your IP address, showing their necessity in defending personal data from ISPs, cybercriminals, and unauthorized access. Tim provides tips on choosing an effective VPN, dispels misconceptions about digital anonymity, and features the significance of managing one's online identity. He invites the audience to embrace VPNs as an essential part of their approach to maintaining...
info_outlineIntentionally Inconvenient
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen addresses the critical issue of password security, introducing listeners to essential tools like complex passwords, password managers, and OnlyKey. He walks through how each tool functions, why they are crucial for safeguarding personal data, and shares practical tips for integrating them into your daily routine. Tim encourages listeners to consider the broader implications of digital security and prepares them to take proactive steps in the ever-evolving battleground of online privacy. Standout Quotes: ...
info_outlineIntentionally Inconvenient
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen tackles the ever-present threat of identity theft, introducing listeners to three essential tools for safeguarding privacy: fraud alerts, credit freezes, and credit locks. He explains how these measures work, why they’re vital, and offers step-by-step guidance for implementing them effectively. But reclaiming your privacy doesn’t stop with credit bureaus—Tim also teases future episodes dedicated to tackling broader security challenges. Standout Quotes: “You can always reclaim your privacy. You just...
info_outlineWelcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen continues his exploration of strategies to stop data leaks and protect personal privacy. After discussing Google and data broker sites in the previous episode, Tim now turns his attention to Facebook, Microsoft, Amazon, and other major tech platforms. He highlights the importance of carefully adjusting privacy settings, using two-factor authentication, and considering alternative services that are more privacy-focused. From email aliases to Linux computers, Tim provides a range of actionable tips to help listeners take back control of their personal information and limit the exposure of their digital footprint.
Standout Quotes:
- “Try using your favorite search engine to look up your first name, last name, city, and state. You'll see the value of a service like DeleteMe. You'll be amazed at the number of websites containing your name, email address, phone number, family names, and possibly pictures of you that you didn't give permission to post or share.”
- “Protect your friends list from people who are not your Facebook friends. They don't need to see who your Facebook friends are.”
- “Consider maybe opening up a separate Amazon account, and use an alias for a name. They don't necessarily need to know who you are for you to buy stuff from them.”
- “Don’t use Outlook. Don’t use Edge. Instead, use Proton for email and Brave or Firefox for your browser.”
Key Takeaways:
- Sign up for the DeleteMe service to remove your personal information from data broker sites. This can help limit the amount of your private data available online.
- Review and adjust your Facebook privacy settings to limit data sharing, protect your friends list, and consider disabling identity confirmation if possible. This can help prevent unnecessary data leaks.
- Explore using an alias or separate account for Amazon purchases, consider alternate delivery addresses, and pay with Amazon gift cards or a service like Privacy.com to avoid sharing credit card information.
- Investigate alternatives to Microsoft Office like LibreOffice and look into Linux computers from companies like System76 as an option to Windows to reduce data collection.
- Use privacy-focused email, browsers, and avoid Outlook and Microsoft Edge to further protect your online activity and communications.
Episode Timeline:
[00:35] Introduction and Service Recommendations
[02:46] Mitigation strategies for Facebook
[05:17] Additional Facebook settings and privacy measures
[06:58] Microsoft and Amazon privacy tips
Links mentioned:
https://www.goclik.me/travelingmailbox
https://www.goclik.me/protonvpn