Intentionally Inconvenient
Tim Jensen Convenience is the Enemy of Privacy. In today's digital age, we have given up our personal freedoms by giving away our personally identifiable information. All hope is not lost, however. Privacy takes time, effort, and hard work. We believe that reclaiming your privacy is a conscious choice and may require you to take unconventional steps. Our mission is to guide you through this journey, providing you with the information and resources needed to make informed decisions about your digital footprint.
info_outline
11 - STOP the Data Leak, Part 1
05/02/2024
11 - STOP the Data Leak, Part 1
Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. In this episode, Tim Jensen will talk about the persistent issue of data leaks through apps and services from major tech companies. We will explore the risks associated with health apps, the challenges of intrusive privacy policies, and strategies for enhancing privacy using services like ProtonMail and ProtonVPN. Standout Quotes: "Any account that you create involves data collection. Data is the currency you use to pay for free services." "Data collection is a potential data leak whenever you create an account. When you trust a company to store your information, assume it may be breached at some point." "Complaining is not a strategy. Sitting here and complaining about everything that these big four companies and others do to collect and store data is not productive." "We have the right to remain private. This may sound familiar, but we need to do more than just accept societal norms. We must take actions that go above and beyond what the average person would do." Key Takeaways: Personal data can be leaked through various apps and online services if precautions are not taken, compromising privacy over time. Before agreeing to any app's terms, it's crucial to read the privacy policies carefully to understand their data practices and what personal information they may be collecting. Creating online accounts often leads to extensive data collection. Therefore, it's advisable to minimize the number of accounts created. Major tech companies such as Google, Facebook, Amazon, and Microsoft collect and analyze personal data extensively. It's preferable to limit dependence on their "free" services in favor of alternatives when possible. Encrypted communication tools and VPN services can strengthen privacy by preventing third parties from accessing or analyzing personal online activities and communications. To fully protect sensitive personal information from unwanted data collection and leaks, it may be necessary to invest in privacy-focused services. Episode Timeline: [00:18] Data Leakage [04:21] Data Collection and Privacy Concerns [08:03] Data Privacy and Security in Healthcare Apps [14:55] Privacy Concerns with Google [18:01] Encrypted Services For more information, please visit http://www.intentionallyinconvenient.com
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/31087438
info_outline
10 - Email - The Museum Of YOU
04/17/2024
10 - Email - The Museum Of YOU
Welcome to the Intentionally Inconvenient Podcast! This episode focuses on discussing email privacy in the digital age and how email can act as a "Museum of You" by storing users' personal data and communications over many years with providers. Tim Jensen explores strategies for taking back control of one's privacy through encrypted email services and better digital security practices. Standout Quotes: “Privacy is the right to control access to ourselves.” “If the product is free, you are the product.” “Competitive intelligence is how these companies make their money. We need to be more vigilant and protecting our own privacy.” “We shouldn't have the history of our life scanned and stored as your email service provider. It's none of their business. It's your business.” Key Takeaways: Audit your email accounts and clean out old emails to limit the amount of personal data being stored by providers over time. Research encrypted email providers like ProtonMail that offer privacy protections like end-to-end encryption and zero-knowledge encryption. Consider paying for an encrypted service. Use an email aliasing service and unique aliases for each account to better protect your primary email address and limit data collection. Set up a password manager to securely store strong, unique passwords and login credentials for all online accounts and services. Consider the privacy implications before sharing personal details, schedules, contacts, and locations via free online services. Paying for privacy-focused alternatives may better protect your data. Episode Timeline: [00:35] Introduction to email storage and privacy [05:40] Email privacy and data collection by providers [11:04] Data privacy and security [08:40] End-to-end encryption services [23:46] Closing remarks For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30871453
info_outline
09 - Enemies of Privacy
04/10/2024
09 - Enemies of Privacy
Welcome to the Intentionally Inconvenient Podcast! This episode focuses on the major enemies of privacy in the digital age. It identifies the biggest tech companies like Google, Meta, Microsoft and Amazon as large collectors of personal data. Tim Jensen gives tips for taking action to improve privacy habits and reduce reliance on major tech companies that extensively collect personal data. Standout Quotes: “Privacy is not free; it will actually cost you less to pay a little upfront to protect your privacy than if you gave it away, because that's not measured in dollars.” “If Google knows more about you than your family does, what could possibly go wrong? To me, that's a problem. No one company should know that much about me.” “You can be the biggest enemy of your own privacy by what you do and don’t do.” Key Takeaways: Read the terms and conditions and privacy policies of services you use before agreeing to them. Audit which services you use and how much data you share with them. Look for opportunities to reduce over-sharing. Consider alternatives to major tech companies like Google and Facebook that don't require as much personal data sharing. Be mindful of how much you share about yourself publicly online and with apps/services. Limit details like your full name, address, birthday, etc. Question why certain devices and services need access to personal information like your location or contacts. Restrict access when possible. Episode Timeline: [00:35] Introduction [01:23] Identifying the biggest enemies of privacy [04:02] How tech giants collect your data [08:40] Protecting yourself in the digital age [27:29] Closing remarks For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30764148
info_outline
08 - All About 2FA-MFA
03/27/2024
08 - All About 2FA-MFA
Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. First-factor authentication, such as username and password, is not enough. Hackers are good nowadays because they can easily breach users without regard for their privacy and security. Therefore, setting up a two-factor or multiple-factor authentication is a must to have robust security in your accounts and have no worries about other people stealing your data and information. Today, Tim will emphasize the importance of using two-factor or multiple-factor authentication for all online accounts. He will discuss different methods of 2FA/MFA, including hardware keys, PASS keys, biometrics, authenticator apps, and SMS-based codes, the pros and cons of different 2FA methods in terms of security, the risks of session tokens, and more! Standout Quotes: “Two-factor or multi-factor authentication has prevented the loss of my social media accounts, which in and of itself may not be a big deal. But there's so much personal information that we put in our social media accounts that it can leave us very vulnerable. It could have left me very vulnerable had they taken those accounts over.” “The more layers a hacker has to go through, the more difficult it is for them to hack into your account. They're going to go after the low-hanging fruit, so they are going to pass you by because they'll see that second factor or that third factor. “Always have two or more options for two-factor authentication and multi-factor authentication. If you don't, you could be locked out of your account.” Key Takeaways: Two-factor authentication is important for securing online accounts and preventing hackers from taking over your accounts. Multi-factor authentication has been used for a long time, such as with credit card transactions; people just do not realize it. Hardware-based authentication like YubiKeys is among the most secure second-factor options. Avoid SMS-based authentication due to SIM swap vulnerabilities. Use reputable authenticator apps from trusted providers and enable biometric login if available. Set up multi-factor authentication on multiple devices for redundancy. Session tokens can be stolen, so always log out of accounts when finished. Keep second factors separate from password managers for added security. Have at least two different second-factor options available as backups. Using layers of security through multiple authentication factors makes accounts more secure. Episode Timeline: [00:18] Two-factor or Multifactor authentication [01:45] Real-World Example Of Using Two-Factor Or Multifactor Authentication [03:28] First Factor of Security [04:45] Various Kinds of Second Factor Authentication [06:47] Passkeys [08:02] Importance of having Layers of Privacy [09:00] Vulnerabilities of using SMS and Email in Authentication [10:45] Push Factor [11:33] Biometrics [12:40] Authenticator Application [15:48] Hackers bypassing Security using Session Tokens [21:58] Fake Authenticator Apps [22:19] Separate 2FA from Password Managers For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30565088
info_outline
07 - All About Password Managers
03/20/2024
07 - All About Password Managers
Welcome to the Intentionally Inconvenient Podcast! This episode focuses on the importance of using a password manager to securely store unique, complex passwords for all online accounts. Tim Jensen provides practical tips for improving password security and taking back control of personal data from companies. Standout Quotes: “Convenience is the enemy of privacy.” “I don't want to be the product, I want to be the person who pays for my software so that when I use it, I know that I'm not having all this information collected on me.” “I don't recommend that you use the browser password manager. Most of the time, they're not encrypted.” Key Takeaways: Research and select a password manager with zero-knowledge encryption to securely store your passwords. Generate unique, long passwords for each account and store them in your password manager for easy access. Consider adding extra random characters to the end of passwords for an extra layer of security. Back up your password manager data and master password using a separate manager or hardware key. Audit your existing passwords and change any that have been compromised in a breach. Episode Timeline: [00:02] Introduction [01:32] Password managers and security measures [04:02] Password management software [08:40] Password security strategies [18:39] The importance of protecting your passwords Resources: OnePassword: Bitwarden: OnlyKey: Mullvad: Stealer Logs: For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30452608
info_outline
06- All About Passwords
03/13/2024
06- All About Passwords
Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. Passwords are the keys to your accounts. It is the defense that keeps your account safe from other people. As such, setting up unique and strong passwords for every account is critical. It could be daunting, but with the right tools, you can do it. Do everything you can to keep you safe online! In this episode, Tim Jensen discusses the importance of using unique, complex passwords for each account and avoiding password reuse. You will learn about password complexity, the use of password managers, and making passwords intentionally inconvenient to protect your online accounts. Standout Quotes: “If you can remember your password, it's not good enough.” “We should, as much as possible, be using different passwords and even different usernames on every website." “The longer your password is, the stronger your password is.” "In all reality, passwords are a hassle. There's no question that they cause real pain. But what's bigger pain is if someone gets into your account and locks you out." "Passwords have to be strong enough to do the job. We always need to do the right job with the right tool." "Make your passwords intentionally inconvenient.” Key Takeaways: Use unique passwords and usernames for every account and website. Use a password manager to generate and store strong, unique passwords securely. Avoid using LastPass as a password manager due to security breaches. Use passwords with a minimum of 20 characters in length. Include uppercase letters, lowercase letters, numbers, and symbols in passwords. Do not use dictionary words and birthdays in passwords. Generate strong passwords randomly instead of relying on memory. Prioritize changing passwords for sensitive accounts like email and banking. Make passwords intentionally inconvenient for both yourself and hackers. Episode Timeline: [00:47] Analogy of Insurance [02:17] Importance of Using Different Passwords & Username [04:47] Account Data Breached [05:10] Password Manager [6:27] Avoid Using LastPass [7:36] Start Changing Your Passwords [9:41] Longer Passwords Are Much Better [10:38] Don’t Include Words From Dictionary [12:00] Inconvenient Passwords Resources: For more information, please visit
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30363558
info_outline
05 - BASIC Principles Of Privacy
03/06/2024
05 - BASIC Principles Of Privacy
Welcome to Intentionally Inconvenient, where we talk about our personal freedom by securing our privacy. By knowing how to limit who has access to our information and questioning why we need to share personal details, we can protect our identity and rights at a time when data collection is expected. In this episode, Tim Jensen will elaborate on the basic principles of individual privacy. We will explore controlling access to oneself, limiting trust to safeguard privacy, refraining from using privacy as an excuse for unlawful actions, and all about the other fundamentals. Standout Quotes: "Convenience is the enemy of privacy." "Privacy starts with prevention. Prevention is intentional; you didn't accidentally fall into privacy. You have to be intentional in your actions to maintain your privacy." "You are the first line of defense for your personal privacy. You can't leave that in the hands of another person, a government, or a business. You are the first line of defense and ultimately responsible for securing and maintaining your privacy. Key Takeaways: Adopt a mindset that prioritizes privacy. Try to share as little personal information as possible, and remember that privacy isn't always the default. Keep an eye out for how services collect and use your data. Safeguard your accounts using robust passwords and a password manager to keep them straight. It's also a good idea to use pseudonyms to avoid relying too much on a single tech company. Remember, privacy is more important than convenience. Develop habits that include multiple layers of protection, even if it's inconvenient. It's worth it to keep potential threats at bay. Make sure to back up your data in several secure locations regularly. To avoid having a single point of failure, try to spread your accounts and data across different devices. It's all about keeping your information safe and secure. Episode Timeline: [00:58] Controlling Access to Ourselves [01:48] Personal Privacy vs. Legal Responsibility [02:39] Limiting Trust [06:29] Trust on a Need-to-Know Basis [14:21] Aliases and Password Managers [16:18] Balancing Trust and Convenience [25:26] Mindset and Behavior Over Technology [27:47] Proactive Prevention [29:20] Your Role in Safeguarding Personal Data [33:16] Data Backup [37:07] Decentralize Control
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/30254523
info_outline
04 - The First Things You Need To Do Today To Protect Your Privacy
02/28/2024
04 - The First Things You Need To Do Today To Protect Your Privacy
Welcome to the Intentionally Inconvenient Podcast where we dive deep into personal freedom through the lens of securing your privacy. Privacy isn’t a destination, it’s a journey. This episode, Tim Jensen is going to share five actionable steps you can take right now to kickstart your journey towards greater privacy protection. Standout Quotes: “Privacy is a journey, not a destination. We can take small steps every day to ensure that we are more private than we were yesterday.” “Privacy takes time. It takes effort, and sometimes it can cost you some money.” “You can't change the past; you can only take steps to move forward and protect yourself.” “The only person you can control is yourself.” “You might not be able to do it all today, but you can get started and make progress every day.” “Your email is like a museum of you, and the more that people look at your email, the more they can learn about who you are. It can really shape your identity.” “The more additional steps a hacker or someone who shouldn't be in your account has to take, the less likely they are to target you. They'll move on to someone who is easier to work with, someone who's easy to steal from.” Key Takeaways: Audit the personal information you have shared online and remove or limit access to anything that could compromise your identity. Change your email password to a strong, unique password and store it in a password manager. Implement two-factor authentication on all important accounts that hold personal information. Consider purchasing a security key for added protection beyond passwords and two-factor authentication. Episode Timeline: [00:02] Personal privacy and security [01:33] Unlocked vehicles and online security risks [04:15] Data breaches and hacking [08:00] Protecting personal information and privacy [12:36] Recommendations for protecting privacy
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/29907563
info_outline
03 - Privacy is Like Air
02/21/2024
03 - Privacy is Like Air
Welcome to Intentionally Inconvenient, where we talk about our freedom by securing our privacy. It's easy to underestimate the significance of safeguarding our digital footprints in today's interconnected age. Still, the truth is, that protecting your privacy begins and ends with you—and it matters now more than ever. In this episode, Tim Jensen will discuss the importance of personal responsibility for privacy and the risks of giving up privacy for perceived security benefits. We will discuss the need to safeguard personal identifying information, challenge the idea of "I have nothing to hide," and emphasize the significance of taking proactive steps to protect our privacy. Standout Quotes: "Privacy is like air. You don't give it any thought until you don't have it anymore, or until you have less of it." "It's not that you have nothing to hide. It's that you have things and people to protect." "You are responsible for your privacy. It's not the responsibility of the government, your credit bureau, your financial institution, your employer, or your identity theft protection company. None of these companies are responsible for your privacy. You are the number one person responsible for your privacy." Key Takeaways: Audit your privacy and security settings on all your accounts and devices. It's always a good idea to enable two-factor authentication whenever possible. Remember to minimize the sharing of personally identifiable information and be cautious about the details you provide to companies, websites, and other parties. Take a moment to consider how much and what type of personal data you're comfortable with companies and organizations collecting. It's worth considering limiting data collection and sharing. It's important to question common beliefs like "I have nothing to hide" that can lead to complacency around privacy issues. Remember, your privacy is valuable and worth protecting. Take proactive steps to secure your privacy now so that you have better control over it in the future, as risks and threats continue to evolve. Stay informed and stay proactive on privacy topics. Episode Timeline: [00:34] A scenario about protecting privacy [03:48] Personal data and security risks [06:17] Responsibility over personal information [13:09] Idea of “having nothing to hide” [18:05] The erosion of the Fourth Amendment
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/29907403
info_outline
02 - Be Careful How You Slice Your Pii
02/14/2024
02 - Be Careful How You Slice Your Pii
Welcome to the Intentionally Inconvenient Podcast! This episode focuses on the importance of personal privacy and information security in today's world. Tim Jensen leads a discussion on defining privacy as the right to control access to oneself, including one's personal information and physical distance. He expresses concern about how much personal data is publicly available online without consent through data broker websites and believes that everyone has a right to protect this data and control who has access to it. Standout Quotes: “Privacy is the right to control access to ourselves.” “You may think you have nothing to hide, but you have something to protect.” “Everybody has something to hide, but it's usually something that other people just don't need to know that much about us.” “These days, most of our transactions are done electronically and can be traced.” “Personal identifying information needs to be protected. Because not everybody needs to know all of your business all the time.” Key Takeaways: Audit the types of personal information you share online and consider limiting what you disclose publicly. Question who has access to your personal data and why they need it. Consider restricting access only to necessary parties. Evaluate your online habits and digital footprint to identify ways to better protect your privacy and security. Consider purchasing a security key for added protection beyond passwords and two-factor authentication. Discuss privacy and data protection with family and friends to raise awareness of personal information risks in the digital age. Episode Timeline: [00:35] Introduction [03:45] Data brokers’ effect on privacy [07:45] Securing your personal data [14:37] Privacy and security in the digital age [18:39] Protecting personal information in the modern world and beyond zJa1q79wVm256dPCrc93
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/29907293
info_outline
01 - Privacy Isn't The Goal - It's A Decision
01/24/2024
01 - Privacy Isn't The Goal - It's A Decision
Welcome to the “Intentionally Inconvenient,” where we discuss a topic that's often overlooked – privacy. In a world where information is currency, privacy isn't a luxury; it's a necessity. In this episode, Tim Jensen is going to dive into why privacy matters, not just as a concept but as a cornerstone of personal freedom. From the choices we make to the consequences we face, let's unravel the significance of safeguarding our digital boundaries. Standout Quotes: “Privacy isn't the goal. It’s a decision.” “If the product is free, then you are the product.” “Privacy is like air, water, or money. You don't give it a whole lot of thought until you don't have it.” “Freedom requires privacy. If you want freedom, you have to maintain your privacy.” Key Takeaways: In a world where information flows, choosing what to share and what to keep sacred is a powerful act. Own your privacy; let it be a reflection of your empowered choices. Stay mindful of the transactions in the online space and consider the value exchange between convenience and privacy. Empower yourself with awareness. Cherish and safeguard privacy as a precious element in our lives. Recognize its value before you find yourself longing for the privacy you gave up for the sake of your convenience. Convenience is the ENEMY of privacy! Freedom and privacy are inseparable. To preserve one is to safeguard the other.
/episode/index/show/3aa928f0-1aa5-44f0-881f-81765ba02341/id/29632683