Russ Harvey Consulting - Computer and Internet Services

Restoring Privacy

Take Back Your Privacy | Restoring Balance | VPNs | Privacy Tools | Learning More

Check the privacy settings for your devices and software/apps

Take Back Your Privacy

Privacy is not about hiding wrongs. Privacy is power over your own information.

Your Privacy At Risk

Your privacy is at risk like it has never been before, yet most folks think that only guilty criminals need be concerned. They are wrong!

You need to take back your privacy.

Fight For Privacy

Much like we lock doors and close curtains to retain our physical privacy, we can learn how to restore our virtual privacy.

Start by learning to protect and restore your privacy. Demand accountability.

Organisations can no longer assume that any personal information given to them can be exploited in any way they see fit. — Elliot Rose

Avoid Giving Information Away

Take these steps to avoid giving away unnecessary information:

Social media is a very important aspect of privacy because so much personal information is collected including facial recognition software, comparative and linked data (such as the "Like" button).

Are You Sharing Too Much?

Are you careful about what you're sharing in public forums?

Though the internet and social media have been used by the public for decades, the concept of privacy still lacks a modern application to the online world. Digital privacy, therefore, is still very much a legal frontier. — University of Dayton's School of Law

Protect Third-party Information

You need to protect third-party information in your possession.

Don't reveal private information about individuals (email addresses, phone numbers and birthdays) while emailing or posting on social media.

Educate Yourself

Become informed about issues around privacy.

Take the Mozilla privacy survey to see how well you are improving your privacy awareness help with changing your habits.

Who to Trust?

OpenMedia and the Mozilla Foundation actively promote privacy.

OpenMedia works to keep the Internet open, affordable, and surveillance-free. We create community-driven campaigns to engage, educate, and empower people to safeguard the Internet. — OpenMedia


The University of Dayton School of Law has an excellent overview of online privacy in their article, How much privacy do you have online? Their recommendations:

  1. Know what to look for in the Terms and Conditions.
  2. Clear out cookies and fully close a browser after every session.
  3. Take advantage of customizable settings.
  4. Use digital tools to better understand consumer rights.

Teach Your Children

Children's privacy has been seriously threatened. Besides making changes, we need to talk to our children in terms that they can understand.

Be Discrete in Providing Personal Information

Everyone is collecting personal data when they ask you to fill out a form — whether on paper or online.

While everyone is diligent in collecting this information, they are less careful in protecting that information — particularly if an opportunity to profit comes along.

Be Selective

You should be very selective in providing information.

Is It Necessary?

Once you provide anyone with information, it is no longer in your control.

Ask yourself:

  • Does this site need this information to provide what I asked for?
  • How will they use that information?
  • Will they share (sell) that information with others?
  • How will they protect my personal information?
  • If they fail to protect it, what are the consequences for me? For them?

Will They Share With Others?

You have to assume that your information will be shared if it is profitable or if they are shown a government warrant.

How Will They Use That Information?

When ordering a product, the company may need your shipping address and payment information, but you have choices that are more private.

Payment Options

When you use a credit card, they often need your address to process online payments, even if it isn't being delivered physically.

Apple Pay doesn't provide your credit information to vendors. PayPal is another option.

Decline Email Receipts

Decline the option to get an emailed receipt when you're asked by a store clerk.

If you're buying online, you should be able to print off a receipt rather than having one emailed.

Who Needs Your Birth Date?

Depending upon the product or service, some sites may need to know your age.

They don't need to know your birth date, only if you're old enough. However the birth date is much more valuable to their marketing department.

Government services and those that are provide government benefits may need to know your age.

Big Tech on a Buying Spree

Big tech has been on a buying spree. While they're acquiring technology, they're also adding to their ability to profile their site visitors.

Monopoly is made by acquisition — Google buying AdMob and DoubleClick, Facebook buying Instagram and WhatsApp, Amazon buying, to name just a few, Audible, Twitch, Zappos and Alexa.
NY Times

The new company may not honour promises made by the previous owners.

Will They Protect Your Information?

Most companies spend much more protecting their own information than protecting yours. Governments don't enforce protection or require significant penalties.

Have you noticed that most security breaches only affect consumer data, not corporate data. After all, your data didn't cost them anything to acquire.

Log-ins with Your Facebook or Google ID

Using single sign-on options (e.g. signing in with your Facebook or Google account) may be convenient, but creates a single point of failure.

Logging in with Facebook or Google provides access to those accounts.

While sites are not provided with your Facebook or Google password, they can obtain access to information that allows them to improve their profile of you.

Logging in to a website using a service such as Facebook or Google allows the website to make a request for data about you.


Linking two or more sites allows companies to collect more data, building an increasingly rounded profile about you.


Allowing one account to have access to others means that if the least secure account is hacked, the rest could also be compromised.
Natasha Stokes

If you generate a unique password for that site using a password manager like LastPass the site obtains only your name, email and what you provide to them.

Check the Privacy Policy

You should always read and understand the privacy policy of any site before you choose to give personal information. See more about privacy policies.

The privacy policy is a legal document, it spells out how a company collects, stores, uses, and shares your data. — IRL Podcast

Privacy policies change for a number of reasons including purchase of the company or a new business plan.

Don't provide information on sites without a privacy policy.

Return to top

Restoring Balance

Tech companies spend millions of dollars to learn how to fully engage their viewers. These include techniques like

  • the suggestions on the side of YouTube and news feeds;
  • the notifications from Facebook and other social media sites; and
  • the use of instant-on videos on websites to add sound and video to draw you in.

A simple check on what you're friends or family are doing can turn into a three-hour Facebook bing. Playing a game for a “five-minute break” and suddenly an hour has gone by.

We need to restore balance to our lives by reducing our exposure to these techniques. While profitable to the corporate bottom line, they are increasingly making us feel more isolated.


I urge you to take the initiative to restore your privacy.

Replace Google

Consider using alternatives to Google to protect your privacy:

See the Reset the Net Privacy Pack and my recommended software.

Start Using Privacy Tools

Start using effective privacy tools and be sure to use only software that is safe to use.

Take Back Your Phone

Take control of your phone. Don't let your apps control your phone use, change settings to remove the distractions.

Try these simple changes to live more intentionally with your devices right now.

  • iOS 12 includes a Screen Time tool (swipe right to see it) that allows you to control activity.
  • Edit what appears on your screen. Do you really need real-time weather, news, stocks, etc.? Do you need all those apps?

Return to top

Privacy Tools

Start using effective privacy tools and be sure that you're not installing software that is unsafe to use.

For Website Owners

Website owners should begin to use technologies that secure their sites and make them safer to use.

Avoid invasive (a.k.a. sleazy) techniques. These place your site visitors at risk and your site's security.

Pledge to add SSL, HSTS & PFS protection this year; it matters! Already rocking SSL & HSTS? Consider approaches to end-to-end crypto.

For Mobile App Developers

Too many apps collect information they don't need (often surreptitiously) then selling it. Not only should these apps be banned, but so should the developers that released them.

Some developers released their app without securing it properly Those developers' products should not be in the app store.

Technologies like SSL and proper certification pinning should be mandatory. End-to-end encryption makes messaging much safer and your app a worthwhile download.

If you serve ads on your free apps, you need to ensure that ALL third party code, including ads and analytics, are secure.

Ensure that ads within your app play nicely.

  • Avoid ads that crash an app or lock it up for extended periods of time.
  • Your paid version is judged by the performance of your free app.

Crossing Borders?

Like much of Canada's privacy laws, the rules governing border searches pre-date the consumer use of the Internet and cellphones and are seriously out of touch with the reality that we carry our entire lives on our smartphones.

Border searches can be conducted not only at the actual border, but within 100 miles (160 km) of the U.S.-Canada border as well as at airports or even when boarding a cruise ship.

There is an increasing trend around the world to treat borders as law-free zones where authorities have the right to carry out whatever outrageous form of surveillance they want.


But they're not: the whole point of basic rights is that you're entitled to them wherever you are. — Edin Omanovic

Searches at the border are based upon the laws from an age when everything was on paper. That is how they justify copying everything on your phone or computer.

Canada's border agents can search your phone and laptop at borders and airports, including looking through your private photos, personal messages, and call history. — OpenMedia
[B]order agents could end up seeing private emails and text messages, photos, web browser histories and sensitive documents, even if you've done nothing wrong. — CTV News

The recommendation is to leave your devices at home. If you plan to take your digital devices across the border, check out the following advice:

…[B]efore crossing the border, delete private material or transfer it to the cloud; at the border, turn on airplane mode yourself; and, finally, be prepared, unless you have some really compelling privacy reason, to just turn over your phone. — CTV News

Return to top

Learning More

The following resources provide more information about privacy policies, privacy guides, privacy tools and privacy when crossing borders.

Privacy Policies


It has become increasingly impossible to read the privacy policy of every website (or to understand the complex language used). TL;DR

A study by researchers at Carnegie Mellon concluded,

…if the average American were to actually read every single privacy policy of every single web service that she used in a year…[t]he average user would have to spend between 181 and 304 hours each year reading privacy policies.

That's approximately 4.5 and 7.6 work-weeks (about a month or two every year) — just reading privacy statements!

Privacy Policies are Changing

You only need to look at the way Facebook and others so quickly change their privacy policies to enhance their profitability. You're mostly on your own when it comes to protecting your identity.

Consumer Protections Needed

Consumers need a central location to find out what information companies have collected about them, how it is being used and the ability to restore your privacy.

That would be difficult to provide without legislation to create and enforce a standard by which consumers are protected from corporate giants.

Who Has Your Back?

In the face of unbounded surveillance, users of technology need to know which companies are willing to take a stand for the privacy of their users. — EFF
We are at a critical moment for free expression online and for the role of Internet intermediaries in the fabric of democratic societies.


In particular, governments around the world have been pushing companies to take down more speech than ever before.


What responsibilities do the platforms that directly host our speech have to protect — or take down — certain types of expression when the government comes knocking? — EFF, 2018
EFF 2018 report on the track record of companies in protecting your privacy

Who Has Your Back? Censorship Edition documents the track record for companies in releasing private information to the government.

One of the reasons I recommend using Firefox as your primary browser is Mozilla's stand on privacy.

We Need to Do Better

The problem with our private data is that so much of it is irreplaceable and cannot be altered. Unlike a password, once released into the world, there is no calling it back.

Both companies and individuals need to quit ignoring the damage caused by security breaches and careless postings on social media.

Fix It Already

Tech companies could change these things to make your life easier and protect your digital security and privacy. Why haven't they yet?
Fix It Already

Privacy Guides

Privacy Tools


Fix Bill C-11

Fix Bill C-11 and privacy in Canada.

Fix Bill C-11: Make it work for us. Tell your MP to fix privacy in Canada by closing the loopholes in Bill C-11.

More about why Bill C-11 needs fixing

VPN Services

A Virtual Private Network, or VPN, hides your browsing habits from your ISP as well as your location.

[A VPN] secures your computer's internet connection to guarantee that all of the data you're sending and receiving is encrypted and secured from prying eyes. — LifeHacker

Why Use a VPN?

In an era of increased surveillance, VPNs have become an essential tool to safeguard our online activity from prying eyes.
— OpenMedia

I strongly recommend a VPN while using public WiFi.

For most users this will mean securing your access over the Internet using a private VPN service so that your communications are encrypted.

Choosing a VPN Service

Be careful in how you select your VPN.

There's no such thing as a free VPN. They're either sending ads back to you or tracking you. — Menlo Security
Free VPNs are either selling your browsing data in aggregated form to researchers and marketers, or giving you a paltry amount of data transfer every month. — PCWorld

No Guarantee of Privacy

Your online activity can be sold or subject to a court order.

Using a VPN is a safer way to browse on an unsecure network, such as a public Starbucks wi-fi; however, it does not stop trackers from gathering browsing information on you.

There is a low threshold for such warrants.

Are VPNs truly private? Unfortunately, no.


The VPN provider can still log your browsing data. You are essentially putting your trust in your VPN provider.


Will your provider hand over info when pressed? Will they log your browser data and sell it at a later date? — Mozilla

Mozilla VPN Recommended

Mozilla VPN is a new service from folks that place a priority on privacy. US$4.99/month.

The Mozilla VPN runs on a global network of servers powered by Mullvad using the WireGuard® protocol. Mullvad puts your privacy first and does not keep logs of any kind.
  • Device-level encryption
  • 280+ servers in 30+ countries
  • No bandwidth restrictions
  • No logging of your network activity
  • Connect up to 5 devices

VPN Reviews

You have to look around to find one that works for you.

Beware: Many highly recommended “best VPNs” don't live up to their privacy claims. —

Return to top

Related Resources

Related resources on this site:

or check the resources index.

If these pages helped you,
buy me a coffee!


Return to top
Updated: June 11, 2021