← Back to Library

Privacy Tools & Practices

Tools and practices for protecting your digital privacy

25 cards · security

Sign up to start studying this deck

Cards (25)

FrontBack
End-to-end encryptionOnly endpoints can decrypt; intermediaries cannot
Protects message content from providers and networks. Use apps that implement it by default.
Forward secrecyCompromised keys can't decrypt past sessions
Uses ephemeral keys so old traffic stays safe even if a long-term key leaks.
Password managerStores and generates unique, strong passwords
Reduces reuse and weak choices; syncs securely across devices.
Unique passwordsUse a different password for every account
Prevents a single breach from compromising other logins.
PassphrasesLong passphrases beat short complex strings
Length is key; use several random words rather than forced complexity.
Multi-factor authenticationAdd a second factor; cut account takeovers dramatically
Prefer app-based codes or hardware keys over SMS when available.
Hardware security keysPhishing-resistant authentication using FIDO/WebAuthn
Keys bind logins to the site’s origin, stopping credential phishing.
SMS codesVulnerable to SIM swap and interception
Choose authenticator apps or hardware keys whenever possible.
VPNEncrypts traffic to its server; hides from local networks
The VPN can still see destinations; it is not an anonymity tool.
Threat modelingIdentify assets, adversaries, and mitigations
Plan defenses based on who might target you and what you need to protect.
TorRoutes traffic through relays to hide your IP
Onion routing separates identity from destination for stronger anonymity.
Tor exit nodeExit nodes can see plaintext without HTTPS
Always use HTTPS to protect content beyond the Tor network.
Safety number verificationVerifying contacts prevents man-in-the-middle
Compare verification codes in person or via a trusted channel.
MetadataInformation about communication, not its content
Includes who, when, and where; often unencrypted and highly revealing.
Traffic analysisInference from communication patterns and timing
Even with encryption, sizes and times can expose relationships.
Data minimizationCollect, use, and keep only what is necessary
Reduces exposure in breaches and legal demands; a GDPR core principle.
Third-party cookiesEnable cross-site tracking by outside domains
Blocking them limits profiling across different websites.
Browser fingerprintingIdentify you via unique browser and device traits
Reduce entropy and use built-in anti-fingerprinting protections.
Private browsingClears local history; not hidden from sites or ISPs
Good for shared devices; not an anonymity or VPN substitute.
HTTPSEncrypts web traffic and authenticates the site
Prevents eavesdropping and tampering between you and the website.
DNS encryptionDoH/DoT encrypt DNS queries to the resolver
Hides lookups from local observers; your resolver still sees them.
Tracker blockingBlocks ads and trackers that profile you
Reduces cross-site tracking and can speed up page loads.
App permissionsGrant only necessary access to data and sensors
Review and revoke unneeded permissions; limit background access.
Device encryptionFull-disk encryption protects data if lost or stolen
Combine with a strong passcode and auto-lock for better protection.
CompartmentalizationSeparate identities, devices, and profiles to limit linkage
Use different emails, browser profiles, or VMs for distinct roles.