Intentionally Inconvenient
Tim Jensen Convenience is the Enemy of Privacy. In today's digital age, we have given up our personal freedoms by giving away our personally identifiable information. All hope is not lost, however. Privacy takes time, effort, and hard work. We believe that reclaiming your privacy is a conscious choice and may require you to take unconventional steps. Our mission is to guide you through this journey, providing you with the information and resources needed to make informed decisions about your digital footprint.
info_outline
24 - Privacy Bootcamp - Level 1 - Social Media Accounts
02/04/2025
24 - Privacy Bootcamp - Level 1 - Social Media Accounts
In this episode of the Privacy Bootcamp podcast, we dive into securing your social media accounts, focusing on Facebook and X.com (formerly Twitter). Tim Jensen, host of "Intentionally Inconvenient," walks us through essential settings and strategies to enhance your privacy and protect personal information. From managing your Facebook profile visibility to understanding session tokens on X.com, this episode is packed with actionable insights to keep your digital presence secure. Standout Quotes: • “Your public profile is the tip of the iceberg. Hide the rest to stay secure.” – Tim • “Aliases for emails and phone numbers are a little privacy measure that goes a long way.” – Tim • “Session tokens can bypass logins; logging out regularly stops this vulnerability.” – Tim • “Limit what you share. Every detail is a piece of the puzzle for data collectors.” – Tim Key Takeaways: 1. Facebook Privacy Settings: ◦ Use Privacy Checkup tools to manage who can see your posts, stories, and personal details. ◦ Limit the visibility of your friends list to prevent impersonation scams. ◦ Lock down past posts by adjusting the audience to "Friends Only." ◦ Use aliases for phone numbers and emails to keep your contact details private. 2. X.com Security Practices: ◦ Regularly log out of all sessions to invalidate session tokens and secure your account. ◦ Turn off discoverability by phone number and email to reduce unsolicited contacts. ◦ Use hardware keys like YubiKey for 2FA instead of SMS-based authentication. ◦ Disable location tracking and minimize personalized ads to reduce data collection. 3. General Privacy Strategies: ◦ Avoid using social media accounts to log into third-party apps. ◦ Consider using services like DeleteMe to remove personal data from broker sites. ◦ Regularly review and update privacy settings to ensure they align with your preferences. Episode Timeline: • [00:00] Introduction to Facebook Privacy • [02:15] Using Privacy Checkup Tools • [05:30] Managing Public Profile Visibility and Locking Down Posts • [10:00] Introduction to X.com Privacy Practices • [15:20] Managing Session Tokens and Turning Off Discoverability • [20:10] Using Hardware Keys for Enhanced Security • [25:00] Final Thoughts on Privacy Resources Mentioned ● - A service recommended by Tim Jensen to remove personal information from the internet. They offer a 25% discount. Contact and Additional Information Host: Tim Jensen Email: [email protected]:
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/35149345
info_outline
23 - Privacy Bootcamp - Level 1 - 2FA and MFA using Authenticator Applications
01/21/2025
23 - Privacy Bootcamp - Level 1 - 2FA and MFA using Authenticator Applications
In this episode of the Privacy Bootcamp podcast, we welcome Tim Jensen, the host of "Intentionally Inconvenient," where he explores personal freedom through privacy. Today, Tim delves into two-factor authentication (2FA) and multi-factor authentication (MFA), focusing on authenticator apps and other methods to secure your online accounts. Learn about the tools and strategies that can protect you from hackers and enhance your digital security. Standout Quotes: ● “In today’s online world, you absolutely must implement 2FA and MFA to move you from the low-hanging fruit to the top-of-the-tree hanging fruit.” – Tim ● “Convenience is the enemy of privacy.” – Tim ● “Always log out when you're done with your session. It’s the most inconvenient thing, but it’s also the most secure.” – Tim ● “Your authenticator app does not need to be connected to the internet to generate codes.” – Tim Key Takeaways: ● Importance of 2FA and MFA: These tools add an extra layer of security to your online accounts, making it harder for hackers to gain access. ● Types of Algorithms: Various algorithms like time-based one-time passwords (TOTP) and HMAC-based one-time passwords ensure the secure generation and verification of authentication codes. ● Authenticator Apps: Recommended apps include YubiKey and GSA Authenticator, which allow you to generate secure 2FA codes and transfer data between devices. ● Risks of Session Tokens: Always log out after your session to prevent unauthorized access through stolen session tokens. ● Avoid Storing All Credentials Together: Keep your 2FA codes separate from your password manager for enhanced security. ● Offline Functionality: Authenticator apps can generate codes even when offline, making them a reliable option. ● Consider Hardware Keys: Tools like YubiKey are nearly foolproof because they require physical possession to access accounts. ● Biometric Concerns: Biometrics are convenient but can be compromised if accessed by unauthorized entities, including government officials. Episode Timeline: ● [00:00] Introduction to 2FA and MFA ● [02:15] Types of 2FA: Text, Email, Phone Calls, and Authenticator Apps ● [05:40] How Algorithms Generate 2FA Codes ● [10:30] Recommended Authenticator Apps and Tools ● [15:20] The Importance of Logging Out After Sessions ● [18:45] Risks of Storing Credentials Together ● [21:10] Hardware Keys vs. Authenticator Apps ● [25:00] Final Thoughts on Privacy and Security Resources Mentioned ● Free Code Camp () - Mentioned as a source for more detailed information on authentication algorithms. ● - A service recommended by Tim Jensen to remove personal information from the internet. They offer a 25% discount. ● My Life () - A people search site that can potentially find personal information about an individual. ● Spokeo (), ● Whitepages () ● BeenVerified () ● LexisNexis () - Other people search sites that can potentially expose personal information. Contact and Additional Information Host: Tim Jensen Email: [email protected] Website:
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34942425
info_outline
22 - Privacy Bootcamp - Level 1 - 2FA and MFA using Hardware Keys
01/14/2025
22 - Privacy Bootcamp - Level 1 - 2FA and MFA using Hardware Keys
In this episode, Tim Jensen explores the importance of two-factor authentication (2FA) and multi-factor authentication (MFA) using hardware keys to enhance online security. He explains the concepts behind these authentication methods, their role in establishing identity trust, and how they form part of a robust privacy framework. Tim also highlights the advantages of using hardware keys like YubiKey and OnlyKey over other forms of authentication. Standout Quotes ● “Two-factor authentication establishes trust with someone who does not know who you are by using something from a trusted authority as proof of your identity.” – Tim Jensen ● “Convenience is the enemy of privacy.” – Tim Jensen ● “Hardware keys need to be physically with you, so that’s the best kind because they can’t be stolen through hacking.” – Tim Jensen ● “Always buy two hardware keys. Never buy just one.” – Tim Jensen Key Takeaways 1. What is Two-Factor Authentication? ○ A method requiring two distinct forms of identification to access an account. ○ Common types include: something you know (password), something you have (hardware key), and something you are (biometric data). 2. Why Use Hardware Keys for Authentication? ○ They provide an extra layer of physical security. ○ Cannot be duplicated or stolen digitally. ○ Best for protecting critical accounts like financial or medical records. 3. Tim’s Hardware Key Recommendations: ○ YubiKey: Supports USB-C, NFC, and stores authentication codes. ○ OnlyKey: Combines password management with authentication, supporting up to 24 passwords. 4. Best Practices for Hardware Keys: ○ Register your keys during account setup. ○ Keep backup keys in a secure, separate location (e.g., a safe or safety deposit box). ○ Separate storage for passwords and two-factor authentication codes. 5. Layering Your Security: ○ Combine hardware keys with other methods like VPNs and unique email aliases. ○ Use hardware keys alongside password managers for the most secure setup. Episode Timeline ● [00:00] Introduction: Recap of email aliasing and the importance of layered security. ● [03:00] Explanation of two-factor and multi-factor authentication. ● [10:15] Why hardware keys are the most secure method. ● [18:45] Demonstration of YubiKey and OnlyKey features. ● [24:00] Practical steps to secure your accounts with hardware keys. ● [29:45] Closing thoughts: "Stay safe and stay private." Resources Mentioned • - A service recommended by Tim Jensen to remove personal information from the internet. They offer a 25% discount. • - Website for purchasing YubiKey hardware security keys • - Website for purchasing Onlykey password manager devices Contact and Additional Information Host: Tim Jensen Email: [email protected] Website:
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34850550
info_outline
21 Privacy Bootcamp Level 1 Email Aliasing
01/02/2025
21 Privacy Bootcamp Level 1 Email Aliasing
In this episode, Tim Jensen dives into the importance of email aliasing as a foundational step in maintaining privacy and protecting your digital identity. He shares practical strategies to safeguard your accounts, minimize exposure to hackers, and build a layered security system. Tim emphasizes creating habits of privacy and introduces tools like Proton Pass, SimpleLogin, and YubiKey to simplify the process. Standout Quotes ● “Using the same email address and the same password for everything is a horrible strategy.” – Tim Jensen ● “Using an email alias adds another layer of security.” – Tim Jensen ● “This little bit of inconvenience is a lot better than having your accounts stolen or your entire identity stolen.” – Tim Jensen ● “Create habits of privacy.” – Tim Jensen Key Takeaways What is an Email Alias? ○ Email aliasing is essentially email forwarding that hides your real email address from senders. ○ You assign unique email aliases for each account or purpose, which forwards messages to your actual email address. Why Use Email Aliases? ○ Protects your primary email from data breaches and spammers. ○ Allows you to track where your email address might have been compromised. ○ Helps compartmentalize your digital identity. Tim’s Recommendations for Privacy Layers: ○ Use unique email aliases stored in a password manager. ○ Create 20+ character unique passwords for each account. ○ Utilize hardware keys like YubiKey for significant accounts. ○ Employ two-factor authentication through apps or hardware keys. Managing Your Privacy Habit: ○ Start small, mastering one privacy step at a time. ○ Layer your security for critical accounts like financial or medical accounts. ○ Gradually incorporate habits like using VPNs, encrypted communication tools, and credit freezes. Tools Highlighted: ○ Proton Pass: Combines password management with email aliasing. ○ YubiKey: Hardware key for two-factor authentication. ○ SimpleLogin: Service integrated with Proton Pass for alias management. Episode Timeline ● [00:00] Introduction: The importance of email aliases. ● [03:15] What is email aliasing, and why it’s essential for privacy. ● [07:50] Layering your security: Tim’s recommended strategy. ● [13:00] Stories of compromised accounts and how email aliasing prevents them. ● [18:30] Practical steps to start with Proton Pass and SimpleLogin. ● [24:45] Tim’s privacy bootcamp habit-building strategy. ● [29:10] Closing thoughts: “Don’t be the low-hanging fruit for hackers.” Resources Mentioned ● : A password manager with built-in email aliasing. ● : A service for creating and managing email aliases. ● : A hardware key for two-factor authentication. Contact and Additional Information Host: Tim Jensen Email: [email protected] Website:
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34699675
info_outline
20 Privacy Bootcamp Level 1 Search Engines
12/11/2024
20 Privacy Bootcamp Level 1 Search Engines
Tim dives into the privacy implications of search engines, discussing alternatives like Startpage, DuckDuckGo, and Freespoke. He explains how search data can be used to build detailed profiles and why it’s essential to choose search engines that prioritize user privacy. Standout Quotes: ● "Your search engine knows more about you than your closest friends." ● "If you like Google’s results but want privacy, Startpage is your best bet." ● "Support search engines that build from scratch—don’t rely on Google’s API." Key Takeaways: Understand the Risks: Mainstream search engines track searches, clicks, and even mouse movements. Switch to Alternatives: Use Startpage for Google-like results without the tracking or Freespoke for a transparent experience. Pay for Privacy: Services like Kagi offer ad-free, unbiased results for a subscription fee. Be Mindful of API Use: Many search engines rely on Google or Bing’s back-end, which may compromise privacy. Episode Timeline: ● [00:01] Introduction to search engines ● [03:30] How search engines track and profile users ● [06:25] Privacy-focused options: Startpage, DuckDuckGo, and Freespoke ● [12:03] Supporting ad-free engines like Kagi ● [13:28] Final thoughts Sponsor - Proton Pass Contact and Additional Information Host: Tim Jensen Email: [email protected] Website: Intentionally Inconvenient Podcast
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34396960
info_outline
19 Privacy Bootcamp Level 1 Browsers
12/09/2024
19 Privacy Bootcamp Level 1 Browsers
In this episode, Tim Jensen discusses web browsers and how they impact your privacy. He explains how browsers like Brave, Firefox, and Tor can protect against tracking and surveillance. Tim also highlights the dangers of using mainstream browsers like Google Chrome and Microsoft Edge, emphasizing the need for privacy-focused alternatives. Standout Quotes: ● "Brave gives you privacy right out of the box—no need to harden it like Firefox." ● "Every keystroke, every click, every mouse movement is tracked by mainstream browsers." ● "Switching browsers is a simple yet effective step toward better privacy." Key Takeaways: Switch to Privacy-First Browsers: Options like Brave and Tor minimize tracking and protect your identity. Harden Firefox for Better Privacy: If you prefer Firefox, follow hardening guides like those from Michael Basil. Avoid Data-Hungry Browsers: Stay away from Google Chrome and Microsoft Edge to reduce surveillance. Use a Password Manager: Tools like ProtonPass integrate seamlessly with privacy-focused browsers. Episode Timeline: ● [00:01] Introduction to browser privacy ● [03:20] Recommended browsers: Brave, Tor, and hardened Firefox ● [05:44] Why avoid Chrome and Edge ● [08:23] How password managers complement privacy browsers ● [10:18] Wrap-up Sponsor - Proton Pass
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34346285
info_outline
18 Privacy Bootcamp Level 1 Messengers AKA Instant Messengers
12/06/2024
18 Privacy Bootcamp Level 1 Messengers AKA Instant Messengers
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen explores the world of messengers, dissecting the pros and cons of popular platforms like WhatsApp, Facebook Messenger, iMessage, and others. Tim delves into the importance of end-to-end encryption, decentralization, and other privacy features while explaining why he prefers Signal Messenger over alternatives. He also highlights the critical concept of disappearing messages and why they are a game-changer for protecting privacy. Standout Quotes: ● "End-to-end encryption means that even in transit, no one can read your messages—only the recipient." ● "Disappearing messages are like Mission Impossible: they self-destruct, leaving no digital footprint." ● "A messenger shouldn’t be a museum of your conversations; your privacy matters more." Key Takeaways: Choose Privacy-Centric Platforms: Platforms like Signal and Briar offer robust privacy features like encryption and decentralization. Disappearing Messages: Enable disappearing messages to reduce the risk of long-term exposure of your private conversations. Avoid Third-Party Surveillance: Use platforms that don’t collect or sell your data, such as Signal. Cross-Platform Flexibility: Use messengers like Signal that work across operating systems, from iOS to Android to Linux. Episode Timeline: ● [00:01] Introduction to messengers and privacy ● [02:33] Evolution of messaging platforms ● [12:10] The benefits of Signal Messenger ● [16:20] Why disappearing messages are essential ● [17:47] Closing thoughts
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34317130
info_outline
17 Privacy Bootcamp Level 1 Virtual Private Networks VPN
12/04/2024
17 Privacy Bootcamp Level 1 Virtual Private Networks VPN
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen explores the crucial role of virtual private networks (VPNs) in safeguarding online privacy. He clarifies how VPNs work to hide your IP address, showing their necessity in defending personal data from ISPs, cybercriminals, and unauthorized access. Tim provides tips on choosing an effective VPN, dispels misconceptions about digital anonymity, and features the significance of managing one's online identity. He invites the audience to embrace VPNs as an essential part of their approach to maintaining internet privacy. Standout Quotes: “It's nobody's business who you are and what you're doing on the internet. It's not the ISP's business, the website you visit's business, or the business of hackers and identity thieves.” “Anonymity in this society is a myth. No matter what VPN companies may advertise, it will not make you anonymous.” “Remember, if the product is free, you are the product. You don't want to be using a free VPN any more than you want to use free email.” “A VPN is not a fad. They're going to be here for a long time because they serve a valuable purpose of keeping people away from being identified.” Key Takeaways: Evaluate Your VPN Needs: Reflect on your online activities and decide if a VPN is necessary for your situation. Consider how it might improve your online privacy. Research and Choose Wisely: Investigate different VPN providers and choose one that aligns with your privacy goals, keeping in mind factors like logging policies and customer reviews. Understand the Limitations: Clearly recognize what a VPN can and cannot do. Acknowledge that while it enhances privacy, it doesn't guarantee complete anonymity. Check Local Laws: If you travel, be aware of the legality of VPN usage in various countries to avoid any legal complications. Regularly Review Your Privacy Tools: Beyond a VPN, ensure your entire suite of privacy tools is up to date and serving its purpose effectively. Episode Timeline: [00:01] Introduction [00:26] What are VPNs? [03:30] The importance of keeping your IP address private using a VPN [05:38] VPN misconceptions [07:41] Proton VPN [10:10] VPN differences [12:40] Recap and final thoughts [13:47] Outro
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34282755
info_outline
16 Privacy Bootcamp Level 1 Passwords and Password Managers
12/02/2024
16 Privacy Bootcamp Level 1 Passwords and Password Managers
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen addresses the critical issue of password security, introducing listeners to essential tools like complex passwords, password managers, and OnlyKey. He walks through how each tool functions, why they are crucial for safeguarding personal data, and shares practical tips for integrating them into your daily routine. Tim encourages listeners to consider the broader implications of digital security and prepares them to take proactive steps in the ever-evolving battleground of online privacy. Standout Quotes: “If you can remember it, it's not good enough. Each login should have a unique password.” “We don't use the same password for all our logins because the minute someone knows your email address and the password you use frequently, they can guess and phish around wherever else they can go.” “If you make it easy for yourself, you make it easy for a hacker. You will get used to it. It will become easier and less complex as time goes on because you're going to go through the same routines over and over again.” “The longer it is, the stronger it is. Complexity is important.” Key Takeaways: Audit Your Passwords: Assess your current passwords. Are they complex enough, including uppercase and lowercase letters, numerals, and symbols? If not, make them so. Implement a Password Manager: Start using a password manager like ProtonPass to securely store your unique and complex passwords, ensuring you aren’t using the same password across multiple logins. Consider Using Hardware Security Devices: Explore tools like OnlyKey for an added layer of security, enabling offline storage and self-destruct capabilities for your most sensitive passwords. Educate Yourself on Digital Security Tactics: Stay informed about the latest security threats and defenses. Make it a habit to regularly update your knowledge to protect against emerging risks. Challenge Yourself to Strengthen Online Security: Reflect on how easily a cybercriminal could access your accounts. What steps can you take today to fortify your digital defenses? Episode Timeline: [00:01] Introduction [00:41] Securing your passwords and password managers [02:36] Managing passwords with ProtonPass [06:00] The importance of password length and OnlyKey [13:10] Final thoughts [13:58] Outro
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34233160
info_outline
15 - Privacy Bootcamp - Level 1 - Credit Bureaus v1
11/29/2024
15 - Privacy Bootcamp - Level 1 - Credit Bureaus v1
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen tackles the ever-present threat of identity theft, introducing listeners to three essential tools for safeguarding privacy: fraud alerts, credit freezes, and credit locks. He explains how these measures work, why they’re vital, and offers step-by-step guidance for implementing them effectively. But reclaiming your privacy doesn’t stop with credit bureaus—Tim also teases future episodes dedicated to tackling broader security challenges. Standout Quotes: “You can always reclaim your privacy. You just have to work at it. It's not going to happen by accident.” “You need to exist everywhere online. If you limit yourself, you’re not going to succeed. You can’t restrict yourself to just a small part of the marketplace because your competition, I guarantee you, is reaching out further.” “You’re welcome to spend your own money—it’s yours, and you can do whatever you want with it. Spend it as you wish. However, to prevent identity theft, you don’t need to spend money, though you’re welcome to if you prefer.” That’s what identity theft is about—making it so they can rob you blind through the credit bureaus and the credit system.” Key Takeaways: Freeze your credit with the 5 major credit bureaus (TransUnion, Experian, Equifax, NCTUE, Innovis) to prevent identity theft and unauthorized credit applications. Set up a fraud alert with the 3 major credit bureaus (TransUnion, Experian, Equifax) to add an extra layer of protection. Evaluate your business's online presence - are you consistently posting on platforms like LinkedIn, YouTube, and Facebook? If not, it may be time to reevaluate your strategy. Reflect on whether you're truly "limiting yourself" in your business or if you could be reaching a wider audience by expanding your online footprint. Episode Timeline: [00:01] Introduction [01:28] Protecting your identity with credit freezes and alerts [03:22] How podcasting services can simplify your workflow [07:32] Steps to freeze your credit at all major bureaus [12:04] Why fraud alerts and locks might not be enough [14:20] Final tips for staying safe from identity theft
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34202960
info_outline
14 - Privacy Bootcamp Level 1 - Email
11/27/2024
14 - Privacy Bootcamp Level 1 - Email
Welcome to the Intentionally Inconvenient Podcast! In today's data-driven world, free email services like Gmail are a double-edged sword - convenient, yet a treasure trove for data brokers. Host Tim Jensen exposes the alarming reality: your emails are permanent records, analyzed by artificial intelligence, and vulnerable to breaches. But what if you could reclaim your digital privacy? Tim unveils a comprehensive strategy, from creating encrypted email accounts to implementing advanced security measures like email aliasing and two-factor authentication. By compartmentalizing your digital footprint, you can protect your most sensitive information. Are you ready to take back control of your online privacy? Standout Quotes: “The price of free is astronomically expensive because data is the currency that so many companies rely on these days; it's worth a ton of money to them.” “If you ever get an email that's an alias in a data breach, you'll know where the breach happened.” “Don't get too emotionally tied to any one email address, because you can change it all—and you should.” “Think of artificial intelligence—it's reading your stuff. It's probably kept forever, a permanent record they maintain, even if you delete it. That's a big deal.” “You should never give out your real email address. You should only give out the aliases.” Key Takeaways: Change your existing email password immediately to a strong, unique passphrase stored in a password manager. Sign up for secure, encrypted email accounts with Proton and TutaNota, and never share these real email addresses with anyone. Register multiple anonymous domains for email aliasing and assign each domain to a specific category (e.g., retail, medical, social media) to compartmentalize your online accounts. Implement two-factor authentication using hardware security keys and authenticator apps to add an extra layer of protection to all your accounts. Designate your TutaNota email account as a highly private channel for sensitive communications with trusted contacts like your attorney or financial advisor, and access it only from a secure home computer. Episode Timeline: [00:01] Why free email services aren’t safe and what to do [02:21] Secure email options that protect your privacy [04:25] Strengthening your email security with strong passwords [06:43] Setting up Proton and Tuta for maximum security [14:36] Protecting your identity with email aliasing [18:10] Changing email addresses for safer online accounts [20:44] Advanced email security tips for total protection [25:55] Using Tuta for secure personal communications [27:33] Final steps to lock down your email privacy today
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34178540
info_outline
13 - Privacy Bootcamp Introduction
11/25/2024
13 - Privacy Bootcamp Introduction
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen introduces a new "Privacy Bootcamp" series aimed at helping listeners protect their personal privacy. He defines privacy as the right to control access to oneself, emphasizing the importance of taking personal responsibility rather than relying on others or the government. Tim outlines a three-level approach, starting with basic tasks like managing email, passwords, and web browsers, then progressing to more technical measures like two-factor authentication and protecting against data leaks from phones, modems, and the Internet of Things. Standout Quotes: “Privacy is the right to control access to ourselves. We want to be able to control that access.” “People are not the problem. The problem is what they do, not who they are, and we need to separate the two when we're talking to them.” “Don't blame anybody until you've looked inside yourself, looked at the person in the mirror, and taken full responsibility for your privacy.” “We should not be expecting people out there, like the government, to protect our privacy for us.” “We need to take proactive measures to solve things at the lowest possible level, and that starts with us.” Key Takeaways: Take personal responsibility for your own privacy - don't rely on or complain about companies, take proactive steps to protect yourself. Start with the basic, easy-to-implement Level 1 privacy tasks first, such as securing your email, passwords, and web browsing habits. Treat people with respect even when maintaining your privacy - separate the person from the action and avoid being a "jerk" about it. Consider hiring help or outsourcing tasks if you need more technical privacy measures in Level 2 or Level 3 - don't try to do everything yourself. Develop consistent privacy habits and stop data leaks before moving on to more advanced privacy strategies - lay a solid foundation first. Episode Timeline: [00:00] Introduction to the Privacy Bootcamp [03:20] What privacy means and why it’s so important today [04:45] Taking control of your privacy and personal responsibility [09:28] Behind the scenes of creating a successful podcast [12:21] Breaking down the three levels of privacy protection [15:01] Simple privacy steps everyone can start today [15:50] Stepping up your privacy game with advanced tactics [18:24] Wrapping up with key takeaways and next steps for privacy
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34135766
info_outline
12 - STOP the Data Leak Part 2: Facebook, Microsoft, and Amazon
11/23/2024
12 - STOP the Data Leak Part 2: Facebook, Microsoft, and Amazon
Welcome to the Intentionally Inconvenient Podcast! In this episode, host Tim Jensen continues his exploration of strategies to stop data leaks and protect personal privacy. After discussing Google and data broker sites in the previous episode, Tim now turns his attention to Facebook, Microsoft, Amazon, and other major tech platforms. He highlights the importance of carefully adjusting privacy settings, using two-factor authentication, and considering alternative services that are more privacy-focused. From email aliases to Linux computers, Tim provides a range of actionable tips to help listeners take back control of their personal information and limit the exposure of their digital footprint. Standout Quotes: “Try using your favorite search engine to look up your first name, last name, city, and state. You'll see the value of a service like DeleteMe. You'll be amazed at the number of websites containing your name, email address, phone number, family names, and possibly pictures of you that you didn't give permission to post or share.” “Protect your friends list from people who are not your Facebook friends. They don't need to see who your Facebook friends are.” “Consider maybe opening up a separate Amazon account, and use an alias for a name. They don't necessarily need to know who you are for you to buy stuff from them.” “Don’t use Outlook. Don’t use Edge. Instead, use Proton for email and Brave or Firefox for your browser.” Key Takeaways: Sign up for the DeleteMe service to remove your personal information from data broker sites. This can help limit the amount of your private data available online. Review and adjust your Facebook privacy settings to limit data sharing, protect your friends list, and consider disabling identity confirmation if possible. This can help prevent unnecessary data leaks. Explore using an alias or separate account for Amazon purchases, consider alternate delivery addresses, and pay with Amazon gift cards or a service like Privacy.com to avoid sharing credit card information. Investigate alternatives to Microsoft Office like LibreOffice and look into Linux computers from companies like System76 as an option to Windows to reduce data collection. Use privacy-focused email, browsers, and avoid Outlook and Microsoft Edge to further protect your online activity and communications. Episode Timeline: [00:35] Introduction and Service Recommendations [02:46] Mitigation strategies for Facebook [05:17] Additional Facebook settings and privacy measures [06:58] Microsoft and Amazon privacy tips Links mentioned:
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/34117901
info_outline
11 - STOP the Data Leak, Part 1
05/02/2024
11 - STOP the Data Leak, Part 1
Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. In this episode, Tim Jensen will talk about the persistent issue of data leaks through apps and services from major tech companies. We will explore the risks associated with health apps, the challenges of intrusive privacy policies, and strategies for enhancing privacy using services like ProtonMail and ProtonVPN. Standout Quotes: "Any account that you create involves data collection. Data is the currency you use to pay for free services." "Data collection is a potential data leak whenever you create an account. When you trust a company to store your information, assume it may be breached at some point." "Complaining is not a strategy. Sitting here and complaining about everything that these big four companies and others do to collect and store data is not productive." "We have the right to remain private. This may sound familiar, but we need to do more than just accept societal norms. We must take actions that go above and beyond what the average person would do." Key Takeaways: Personal data can be leaked through various apps and online services if precautions are not taken, compromising privacy over time. Before agreeing to any app's terms, it's crucial to read the privacy policies carefully to understand their data practices and what personal information they may be collecting. Creating online accounts often leads to extensive data collection. Therefore, it's advisable to minimize the number of accounts created. Major tech companies such as Google, Facebook, Amazon, and Microsoft collect and analyze personal data extensively. It's preferable to limit dependence on their "free" services in favor of alternatives when possible. Encrypted communication tools and VPN services can strengthen privacy by preventing third parties from accessing or analyzing personal online activities and communications. To fully protect sensitive personal information from unwanted data collection and leaks, it may be necessary to invest in privacy-focused services. Episode Timeline: [00:18] Data Leakage [04:21] Data Collection and Privacy Concerns [08:03] Data Privacy and Security in Healthcare Apps [14:55] Privacy Concerns with Google [18:01] Encrypted Services For more information, please visit http://www.intentionallyinconvenient.com
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/31087438
info_outline
10 - Email - The Museum Of YOU
04/17/2024
10 - Email - The Museum Of YOU
Welcome to the Intentionally Inconvenient Podcast! This episode focuses on discussing email privacy in the digital age and how email can act as a "Museum of You" by storing users' personal data and communications over many years with providers. Tim Jensen explores strategies for taking back control of one's privacy through encrypted email services and better digital security practices. Standout Quotes: “Privacy is the right to control access to ourselves.” “If the product is free, you are the product.” “Competitive intelligence is how these companies make their money. We need to be more vigilant and protecting our own privacy.” “We shouldn't have the history of our life scanned and stored as your email service provider. It's none of their business. It's your business.” Key Takeaways: Audit your email accounts and clean out old emails to limit the amount of personal data being stored by providers over time. Research encrypted email providers like ProtonMail that offer privacy protections like end-to-end encryption and zero-knowledge encryption. Consider paying for an encrypted service. Use an email aliasing service and unique aliases for each account to better protect your primary email address and limit data collection. Set up a password manager to securely store strong, unique passwords and login credentials for all online accounts and services. Consider the privacy implications before sharing personal details, schedules, contacts, and locations via free online services. Paying for privacy-focused alternatives may better protect your data. Episode Timeline: [00:35] Introduction to email storage and privacy [05:40] Email privacy and data collection by providers [11:04] Data privacy and security [08:40] End-to-end encryption services [23:46] Closing remarks For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30871453
info_outline
09 - Enemies of Privacy
04/10/2024
09 - Enemies of Privacy
Welcome to the Intentionally Inconvenient Podcast! This episode focuses on the major enemies of privacy in the digital age. It identifies the biggest tech companies like Google, Meta, Microsoft and Amazon as large collectors of personal data. Tim Jensen gives tips for taking action to improve privacy habits and reduce reliance on major tech companies that extensively collect personal data. Standout Quotes: “Privacy is not free; it will actually cost you less to pay a little upfront to protect your privacy than if you gave it away, because that's not measured in dollars.” “If Google knows more about you than your family does, what could possibly go wrong? To me, that's a problem. No one company should know that much about me.” “You can be the biggest enemy of your own privacy by what you do and don’t do.” Key Takeaways: Read the terms and conditions and privacy policies of services you use before agreeing to them. Audit which services you use and how much data you share with them. Look for opportunities to reduce over-sharing. Consider alternatives to major tech companies like Google and Facebook that don't require as much personal data sharing. Be mindful of how much you share about yourself publicly online and with apps/services. Limit details like your full name, address, birthday, etc. Question why certain devices and services need access to personal information like your location or contacts. Restrict access when possible. Episode Timeline: [00:35] Introduction [01:23] Identifying the biggest enemies of privacy [04:02] How tech giants collect your data [08:40] Protecting yourself in the digital age [27:29] Closing remarks For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30764148
info_outline
08 - All About 2FA-MFA
03/27/2024
08 - All About 2FA-MFA
Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. First-factor authentication, such as username and password, is not enough. Hackers are good nowadays because they can easily breach users without regard for their privacy and security. Therefore, setting up a two-factor or multiple-factor authentication is a must to have robust security in your accounts and have no worries about other people stealing your data and information. Today, Tim will emphasize the importance of using two-factor or multiple-factor authentication for all online accounts. He will discuss different methods of 2FA/MFA, including hardware keys, PASS keys, biometrics, authenticator apps, and SMS-based codes, the pros and cons of different 2FA methods in terms of security, the risks of session tokens, and more! Standout Quotes: “Two-factor or multi-factor authentication has prevented the loss of my social media accounts, which in and of itself may not be a big deal. But there's so much personal information that we put in our social media accounts that it can leave us very vulnerable. It could have left me very vulnerable had they taken those accounts over.” “The more layers a hacker has to go through, the more difficult it is for them to hack into your account. They're going to go after the low-hanging fruit, so they are going to pass you by because they'll see that second factor or that third factor. “Always have two or more options for two-factor authentication and multi-factor authentication. If you don't, you could be locked out of your account.” Key Takeaways: Two-factor authentication is important for securing online accounts and preventing hackers from taking over your accounts. Multi-factor authentication has been used for a long time, such as with credit card transactions; people just do not realize it. Hardware-based authentication like YubiKeys is among the most secure second-factor options. Avoid SMS-based authentication due to SIM swap vulnerabilities. Use reputable authenticator apps from trusted providers and enable biometric login if available. Set up multi-factor authentication on multiple devices for redundancy. Session tokens can be stolen, so always log out of accounts when finished. Keep second factors separate from password managers for added security. Have at least two different second-factor options available as backups. Using layers of security through multiple authentication factors makes accounts more secure. Episode Timeline: [00:18] Two-factor or Multifactor authentication [01:45] Real-World Example Of Using Two-Factor Or Multifactor Authentication [03:28] First Factor of Security [04:45] Various Kinds of Second Factor Authentication [06:47] Passkeys [08:02] Importance of having Layers of Privacy [09:00] Vulnerabilities of using SMS and Email in Authentication [10:45] Push Factor [11:33] Biometrics [12:40] Authenticator Application [15:48] Hackers bypassing Security using Session Tokens [21:58] Fake Authenticator Apps [22:19] Separate 2FA from Password Managers For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30565088
info_outline
07 - All About Password Managers
03/20/2024
07 - All About Password Managers
Welcome to the Intentionally Inconvenient Podcast! This episode focuses on the importance of using a password manager to securely store unique, complex passwords for all online accounts. Tim Jensen provides practical tips for improving password security and taking back control of personal data from companies. Standout Quotes: “Convenience is the enemy of privacy.” “I don't want to be the product, I want to be the person who pays for my software so that when I use it, I know that I'm not having all this information collected on me.” “I don't recommend that you use the browser password manager. Most of the time, they're not encrypted.” Key Takeaways: Research and select a password manager with zero-knowledge encryption to securely store your passwords. Generate unique, long passwords for each account and store them in your password manager for easy access. Consider adding extra random characters to the end of passwords for an extra layer of security. Back up your password manager data and master password using a separate manager or hardware key. Audit your existing passwords and change any that have been compromised in a breach. Episode Timeline: [00:02] Introduction [01:32] Password managers and security measures [04:02] Password management software [08:40] Password security strategies [18:39] The importance of protecting your passwords Resources: OnePassword: Bitwarden: OnlyKey: Mullvad: Stealer Logs: For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30452608
info_outline
06- All About Passwords
03/13/2024
06- All About Passwords
Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. Passwords are the keys to your accounts. It is the defense that keeps your account safe from other people. As such, setting up unique and strong passwords for every account is critical. It could be daunting, but with the right tools, you can do it. Do everything you can to keep you safe online! In this episode, Tim Jensen discusses the importance of using unique, complex passwords for each account and avoiding password reuse. You will learn about password complexity, the use of password managers, and making passwords intentionally inconvenient to protect your online accounts. Standout Quotes: “If you can remember your password, it's not good enough.” “We should, as much as possible, be using different passwords and even different usernames on every website." “The longer your password is, the stronger your password is.” "In all reality, passwords are a hassle. There's no question that they cause real pain. But what's bigger pain is if someone gets into your account and locks you out." "Passwords have to be strong enough to do the job. We always need to do the right job with the right tool." "Make your passwords intentionally inconvenient.” Key Takeaways: Use unique passwords and usernames for every account and website. Use a password manager to generate and store strong, unique passwords securely. Avoid using LastPass as a password manager due to security breaches. Use passwords with a minimum of 20 characters in length. Include uppercase letters, lowercase letters, numbers, and symbols in passwords. Do not use dictionary words and birthdays in passwords. Generate strong passwords randomly instead of relying on memory. Prioritize changing passwords for sensitive accounts like email and banking. Make passwords intentionally inconvenient for both yourself and hackers. Episode Timeline: [00:47] Analogy of Insurance [02:17] Importance of Using Different Passwords & Username [04:47] Account Data Breached [05:10] Password Manager [6:27] Avoid Using LastPass [7:36] Start Changing Your Passwords [9:41] Longer Passwords Are Much Better [10:38] Don’t Include Words From Dictionary [12:00] Inconvenient Passwords Resources: For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30363558
info_outline
05 - BASIC Principles Of Privacy
03/06/2024
05 - BASIC Principles Of Privacy
Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. By knowing how to limit who has access to our information and questioning why we need to share personal details, we can protect our identity and rights at a time when data collection is expected. In this episode, Tim Jensen will elaborate on the basic principles of individual privacy. We will explore controlling access to oneself, limiting trust to safeguard privacy, refraining from using privacy as an excuse for unlawful actions, and all about the other fundamentals. Standout Quotes: "Convenience is the enemy of privacy." "Privacy starts with prevention. Prevention is intentional; you didn't accidentally fall into privacy. You have to be intentional in your actions to maintain your privacy." "You are the first line of defense for your personal privacy. You can't leave that in the hands of another person, a government, or a business. You are the first line of defense and ultimately responsible for securing and maintaining your privacy. Key Takeaways: Adopt a mindset that prioritizes privacy. Try to share as little personal information as possible, and remember that privacy isn't always the default. Keep an eye out for how services collect and use your data. Safeguard your accounts using robust passwords and a password manager to keep them straight. It's also a good idea to use pseudonyms to avoid relying too much on a single tech company. Remember, privacy is more important than convenience. Develop habits that include multiple layers of protection, even if it's inconvenient. It's worth it to keep potential threats at bay. Make sure to back up your data in several secure locations regularly. To avoid having a single point of failure, try to spread your accounts and data across different devices. It's all about keeping your information safe and secure. Episode Timeline: [00:58] Controlling Access to Ourselves [01:48] Personal Privacy vs. Legal Responsibility [02:39] Limiting Trust [06:29] Trust on a Need-to-Know Basis [14:21] Aliases and Password Managers [16:18] Balancing Trust and Convenience [25:26] Mindset and Behavior Over Technology [27:47] Proactive Prevention [29:20] Your Role in Safeguarding Personal Data [33:16] Data Backup [37:07] Decentralize Control
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30254523
info_outline
04 - The First Things You Need To Do Today To Protect Your Privacy
02/28/2024
04 - The First Things You Need To Do Today To Protect Your Privacy
Welcome to the Intentionally Inconvenient Podcast where we dive deep into personal freedom through the lens of securing your privacy. Privacy isn’t a destination, it’s a journey. This episode, Tim Jensen is going to share five actionable steps you can take right now to kickstart your journey towards greater privacy protection. Standout Quotes: “Privacy is a journey, not a destination. We can take small steps every day to ensure that we are more private than we were yesterday.” “Privacy takes time. It takes effort, and sometimes it can cost you some money.” “You can't change the past; you can only take steps to move forward and protect yourself.” “The only person you can control is yourself.” “You might not be able to do it all today, but you can get started and make progress every day.” “Your email is like a museum of you, and the more that people look at your email, the more they can learn about who you are. It can really shape your identity.” “The more additional steps a hacker or someone who shouldn't be in your account has to take, the less likely they are to target you. They'll move on to someone who is easier to work with, someone who's easy to steal from.” Key Takeaways: Audit the personal information you have shared online and remove or limit access to anything that could compromise your identity. Change your email password to a strong, unique password and store it in a password manager. Implement two-factor authentication on all important accounts that hold personal information. Consider purchasing a security key for added protection beyond passwords and two-factor authentication. Episode Timeline: [00:02] Personal privacy and security [01:33] Unlocked vehicles and online security risks [04:15] Data breaches and hacking [08:00] Protecting personal information and privacy [12:36] Recommendations for protecting privacy
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/29907563
info_outline
03 - Privacy is Like Air
02/21/2024
03 - Privacy is Like Air
Welcome to Intentionally Inconvenient, where we talk about our freedom by securing our privacy. It's easy to underestimate the significance of safeguarding our digital footprints in today's interconnected age. Still, the truth is, that protecting your privacy begins and ends with you—and it matters now more than ever. In this episode, Tim Jensen will discuss the importance of personal responsibility for privacy and the risks of giving up privacy for perceived security benefits. We will discuss the need to safeguard personal identifying information, challenge the idea of "I have nothing to hide," and emphasize the significance of taking proactive steps to protect our privacy. Standout Quotes: "Privacy is like air. You don't give it any thought until you don't have it anymore, or until you have less of it." "It's not that you have nothing to hide. It's that you have things and people to protect." "You are responsible for your privacy. It's not the responsibility of the government, your credit bureau, your financial institution, your employer, or your identity theft protection company. None of these companies are responsible for your privacy. You are the number one person responsible for your privacy." Key Takeaways: Audit your privacy and security settings on all your accounts and devices. It's always a good idea to enable two-factor authentication whenever possible. Remember to minimize the sharing of personally identifiable information and be cautious about the details you provide to companies, websites, and other parties. Take a moment to consider how much and what type of personal data you're comfortable with companies and organizations collecting. It's worth considering limiting data collection and sharing. It's important to question common beliefs like "I have nothing to hide" that can lead to complacency around privacy issues. Remember, your privacy is valuable and worth protecting. Take proactive steps to secure your privacy now so that you have better control over it in the future, as risks and threats continue to evolve. Stay informed and stay proactive on privacy topics. Episode Timeline: [00:34] A scenario about protecting privacy [03:48] Personal data and security risks [06:17] Responsibility over personal information [13:09] Idea of “having nothing to hide” [18:05] The erosion of the Fourth Amendment
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/29907403
info_outline
02 - Be Careful How You Slice Your Pii
02/14/2024
02 - Be Careful How You Slice Your Pii
Welcome to the Intentionally Inconvenient Podcast! This episode focuses on the importance of personal privacy and information security in today's world. Tim Jensen leads a discussion on defining privacy as the right to control access to oneself, including one's personal information and physical distance. He expresses concern about how much personal data is publicly available online without consent through data broker websites and believes that everyone has a right to protect this data and control who has access to it. Standout Quotes: “Privacy is the right to control access to ourselves.” “You may think you have nothing to hide, but you have something to protect.” “Everybody has something to hide, but it's usually something that other people just don't need to know that much about us.” “These days, most of our transactions are done electronically and can be traced.” “Personal identifying information needs to be protected. Because not everybody needs to know all of your business all the time.” Key Takeaways: Audit the types of personal information you share online and consider limiting what you disclose publicly. Question who has access to your personal data and why they need it. Consider restricting access only to necessary parties. Evaluate your online habits and digital footprint to identify ways to better protect your privacy and security. Consider purchasing a security key for added protection beyond passwords and two-factor authentication. Discuss privacy and data protection with family and friends to raise awareness of personal information risks in the digital age. Episode Timeline: [00:35] Introduction [03:45] Data brokers’ effect on privacy [07:45] Securing your personal data [14:37] Privacy and security in the digital age [18:39] Protecting personal information in the modern world and beyond zJa1q79wVm256dPCrc93
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/29907293
info_outline
01 - Privacy Isn't The Goal - It's A Decision
01/24/2024
01 - Privacy Isn't The Goal - It's A Decision
Welcome to the “Intentionally Inconvenient,” where we discuss a topic that's often overlooked – privacy. In a world where information is currency, privacy isn't a luxury; it's a necessity. In this episode, Tim Jensen is going to dive into why privacy matters, not just as a concept but as a cornerstone of personal freedom. From the choices we make to the consequences we face, let's unravel the significance of safeguarding our digital boundaries. Standout Quotes: “Privacy isn't the goal. It’s a decision.” “If the product is free, then you are the product.” “Privacy is like air, water, or money. You don't give it a whole lot of thought until you don't have it.” “Freedom requires privacy. If you want freedom, you have to maintain your privacy.” Key Takeaways: In a world where information flows, choosing what to share and what to keep sacred is a powerful act. Own your privacy; let it be a reflection of your empowered choices. Stay mindful of the transactions in the online space and consider the value exchange between convenience and privacy. Empower yourself with awareness. Cherish and safeguard privacy as a precious element in our lives. Recognize its value before you find yourself longing for the privacy you gave up for the sake of your convenience. Convenience is the ENEMY of privacy! Freedom and privacy are inseparable. To preserve one is to safeguard the other.
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/29632683