{"id":39265,"date":"2021-04-12T04:15:10","date_gmt":"2021-04-12T08:15:10","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?page_id=39265"},"modified":"2024-11-26T07:29:50","modified_gmt":"2024-11-26T12:29:50","slug":"anti-doxing-checklist","status":"publish","type":"page","link":"https:\/\/www.kaspersky.com\/blog\/anti-doxing-checklist\/","title":{"rendered":"Definitive Checklist: How to protect your data online"},"content":{"rendered":"<link rel=\"stylesheet\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/11\/26072909\/kaspersky-lp-styles.min_.css\"><br>\n<style>\n    h1.entry-title {\n        display: none\n    }\n<p>    #main .hero_piople-on-green .hero__grid::after,\n    .hero_piople-on-blue .hero__grid::after {\n        background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09185622\/anti-doxing-hero.png);\n        height: 60vh;\n        background-size: contain;\n        background-position: bottom;\n    }\n<p>    #main .hero_piople-on-green .hero__grid::after,\n    .hero_piople-on-blue .hero__grid::after {\n        width: 40vw;\n    }\n<p>    #main .hero_piople-on-green .hero__title {\n        font-size: 78px;\n        line-height: 1.125;\n        margin-top: 50px;\n    }\n<p>    #main .longread__video-paragraph {\n        line-height: 1.5;\n        font-weight: 300;\n        font-size: 1.5rem;\n    }\n<p>    #main .features_three-columns-blue-bg .features__item-description {\n        font-weight: 300;\n    }\n<p>    #main .content__text {\n        line-height: 1.5;\n        font-weight: 300;\n    }\n<p>    #main .figure {\n        background: #eaeaea;\n    }\n<p>    #main .figure__img {\n        mix-blend-mode: multiply;\n        object-fit: contain;\n        object-position: bottom;\n    }\n<p>    @media (min-width: 640px) {\n        #main .longread__video-text-container {\n            margin: 0 auto;\n            max-width: 762.5px;\n        }\n    }\n<p>    #main .features__icon-wrap_figure-three-green {\n        background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09201545\/figure-three-white.svg);\n    }\n<p>    #main .features__icon-wrap_figure-two-green {\n        background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09201547\/figure-two-white.svg);\n    }\n<p>    #main .features__icon-wrap_figure-one-green {\n        background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09201549\/figure-one-white.svg);\n    }\n<p>    #main .figure_rounded-square::before {\n        background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09202740\/desktop.png);\n    }\n<p>    #main .content-left-1-8 .content__wrap {\n        grid-column: 1\/span 8;\n        grid-row: 2;\n    }\n<p>    #main .content-right-1-8 .content__wrap {\n        grid-column: 5\/span 8;\n        grid-row: 2;\n    }\n<p>    #main .content-center-1-8 .content__wrap {\n        grid-column: 3\/span 8;\n        grid-row: 2;\n    }\n<p>    #main .content__grid_title-center-content-right .content__figure {\n        align-items: flex-start;\n    }\n<p>    #main .content__grid .content__title {\n        margin: 48px 0 76px 0;\n    }\n<p>    #main .features__item .features__icon-wrap.features__icon-wrap {\n        transition: 0.3s;\n    }\n<p>    #main .lp-articles {\n        max-width: 910px;\n        margin: auto;\n    }\n<p>    #main .content__subtitle_strong .arrow-up:before {\n        content: \"\\2191\";\n        color: #bbb;\n        transition: .3s;\n    }\n<p>    #main .content__subtitle_strong .arrow-up {\n        position: absolute;\n        left: -40px;\n        top: -5px;\n        cursor: pointer;\n    }\n<p>    #main .content__subtitle_strong {\n        position: relative;\n    }\n<p>    #main .content__subtitle_strong .arrow-up:hover:before {\n        color: #000000cc;\n    }\n<p>    #main .content {\n        padding-top: 32px;\n    }\n<p>    #main .lp-articles__article-img {\n        border-radius: 6px;\n    }\n<p>    #main .content__grid_title-center-content-right .content__title,\n    #main .content__grid.content-center-1-8 .content__title {\n        grid-column: 1\/span 12;\n    }\n<p>    @media(min-width: 1024px) and (max-width:1180px) {\n<p>        #main .hero_piople-on-green .hero__text,\n        #main .hero_piople-on-blue .hero__text {\n            grid-column: 1\/span 7;\n        }\n<p>        #main .hero_piople-on-green .hero__grid::after,\n        .hero_piople-on-blue .hero__grid::after {\n            grid-column: 8\/span 5;\n        }\n    }\n<p>    @media(min-width: 1980px) {\n<p>        #main .hero_piople-on-green .hero__grid::after,\n        .hero_piople-on-blue .hero__grid::after {\n            max-height: 800px;\n            max-width: 1000px;\n        }\n    }\n<p>.grid.hero__grid{\n    display: flex!important;\n    flex-wrap: nowrap;\n}\n#main .hero_piople-on-green .hero__grid::after, .hero_piople-on-blue .hero__grid::after {\n    width: 50%;\n    flex-shrink: 0;\n}\n<\/style>\n<p><script>\n    \/*$(function () {\n        $('#main .content__subtitle_strong').append('<a href = \"#contents\" class= \"arrow-up\" \/>');\n    })*\/\n<\/script><br>\n<!-----------------------hero--------------------------------------><\/p>\n<div class=\"hero hero_piople-on-green\">\n<div class=\"grid hero__grid\">\n<div class=\"hero__text\">\n<h1 class=\"hero__title\">\n                <span>Definitive Checklist: How to protect your data online<\/span><br>\n            <\/h1>\n<\/div>\n<\/div>\n<\/div>\n<p><!----------------------intro----------------------------------><\/p>\n<div class=\"longread\">\n<div class=\"longread__container\">\n<div class=\"longread__video\">\n<div class=\"longread__video-text-container\">\n<p class=\"longread__video-paragraph\">Photos, uploaded documents, smartphone app details \u2013 data<br>\n                    management is a continuous, daily event whether we realize it or not. But do we know where this data<br>\n                    ends up, and could it be in the wrong hands? We need to learn how to share personal data responsibly<br>\n                    \u2013 whether it is personal data that you have influence over, data controlled by other parties, or<br>\n                    even information about others that you have access to. This checklist will show you how to take<br>\n                    control of your data. <\/p>\n<p class=\"longread__video-paragraph\">You can download the PDF version of the checklist<br>\n                    <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/28134211\/Definitive-checklist-how-to-protect-your-data-online.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.\n                <\/p>\n<p>                <span id=\"contents\"><\/span>\n            <\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<style>\n    \/*contents style*\/\n    #main .features_three-columns-blue-bg .features__items .features__item .features__icon-wrap {\n        position: relative;\n        cursor: pointer;\n    }\n<p>    #main .features_three-columns-blue-bg .features__items .features__item ul.submenu {\n        position: absolute;\n        opacity: 0;\n        visibility: hidden;\n        padding: 20px;\n        background: linear-gradient(45deg, white, #f6fbfd);\n        width: 450px;\n        left: -70px;\n        top: 80px;\n        box-shadow: 0 4px 20px -5px #cecece;\n        transition: .2s;\n        z-index: 9999;\n        border-radius: 6px;\n        transform: scale(0.85);\n    }\n<p>    #main .features_three-columns-blue-bg .features__items .features__item:last-child ul.submenu {\n        left: -150px;\n    }\n<p>    #main .features_three-columns-blue-bg .features__items .features__item:nth-child(2) ul.submenu {\n        left: -100px;\n    }\n<p>    #main .features_three-columns-blue-bg .features__items .features__item ul.submenu li {\n        margin: 10px;\n        position: relative;\n        padding-left: 26px;\n    }\n<p>    #main .features_three-columns-blue-bg .features__items .features__item .features__icon-wrap:hover ul.submenu {\n        opacity: 1;\n        transform: scale(1);\n        visibility: visible;\n    }\n<p>    #main .grid {\n        z-index: 1;\n    }\n<p>    #main .features_three-columns-blue-bg .features__items .features__item ul.submenu li::before {\n        position: absolute;\n        top: 5px;\n        left: 0;\n        width: 16px;\n        height: 16px;\n        content: '';\n        background-color: #23d1ae;\n        border-radius: 50%;\n    }\n<p>    #main .features_three-columns-blue-bg .features__items .features__item ul.submenu li::after {\n        position: absolute;\n        top: 9px;\n        left: 4px;\n        width: 8px;\n        height: 8px;\n        content: '';\n        border: 2px solid #fff;\n        border-radius: 50%;\n    }\n<p>    #main .features__item .features__icon-wrap.features__icon-wrap:hover {\n        transform: scale(1.1);\n    }\n<p>    #main .content__grid_title-center-content-right .figure_rounded-rectangle {\n        margin-left: -350px;\n    }\n<p>    \/*mobile*\/\n    #main .lp-articles__article-title {\n        color: #333;\n    }\n<p>    @media(max-width: 1024px) {\n        #main .features_three-columns-blue-bg .features__items .features__item ul.submenu {\n            width: 250px;\n            font-size: 12px;\n            padding: 10px;\n            z-index: 9999;\n        }\n<p>        #main .features_three-columns-blue-bg .features__items .features__item:nth-child(2) ul.submenu {\n            left: auto;\n        }\n<p>        #main .features_three-columns-blue-bg .features__items .features__item:last-child ul.submenu {\n            left: auto;\n        }\n<p>        #main .hero_piople-on-green .hero__title {\n            font-size: 42px;\n            text-align: left;\n            margin-top: 10px;\n        }\n<p>        #main .hero_piople-on-green .hero__grid::after,\n        .hero_piople-on-blue .hero__grid::after {\n            min-height: auto;\n            width: 90vw;\n        }\n<p>        @media(max-width:640px) {\n<p>            #main .hero_piople-on-green .hero__grid::after,\n            .hero_piople-on-blue .hero__grid::after {\n                max-height: 220px;\n            }\n        }\n<p>        #main .longread__video-paragraph {\n            font-size: 1rem;\n            font-weight: 300;\n        }\n<p>        #main .content__grid .content__title {\n            margin: 0 0 32px;\n        }\n<p>        #main .grid {\n            display: flex;\n            flex-direction: column;\n            padding: 0;\n        }\n<p>        #main .content__subtitle_strong {\n            text-align: left;\n        }\n<p>        #main .lp-articles {\n            padding-top: 0;\n            padding-bottom: 0;\n        }\n<p>        #main .lp-articles__article-title {\n            font-size: 1rem;\n        }\n<p>        #main .link-button__text_size_l {\n            font-size: 16px;\n        }\n<p>        #main .longread__video-player-container {\n            margin-bottom: 0;\n        }\n<p>        #main .features_three-columns-blue-bg .features__items .features__item ul.submenu li {\n            margin: 10px 0;\n            padding-left: 15px;\n        }\n<p>        #main .features_three-columns-blue-bg .features__items .features__item ul.submenu li::before {\n            width: 10px;\n            height: 10px;\n            top: 4px;\n        }\n<p>        #main .features_three-columns-blue-bg .features__items .features__item ul.submenu li::after {\n            width: 4px;\n            height: 4px;\n            top: 7px;\n            left: 3px;\n        }\n<p>        #main .features_three-columns-blue-bg .features__item {\n            z-index: 3\n        }\n<p>        #main .features_three-columns-blue-bg .features__item+.features__item {\n            z-index: 2\n        }\n<p>        #main .features_three-columns-blue-bg .features__item+.features__item+.features__item {\n            z-index: 1\n        }\n<p>        #main .content__title {\n            font-size: 28px;\n            text-align: left;\n        }\n<p>        #main .figure::before {\n            top: 0;\n            bottom: 0;\n            left: 0;\n            right: 0;\n        }\n<p>        #main .content__grid_title-center-content-right .figure_rounded-rectangle {\n            margin-left: auto;\n        }\n<p>        #main .content__subtitle_strong .arrow-up {\n            left: auto;\n            right: -8px;\n            position: absolute;\n            top: calc(50% - 5px);\n            transform: translateY(-50%);\n        }\n<p>        .gform_wrapper .gfield .ginput_container.ginput_recaptcha {\n            transform: scale(0.85);\n        }\n<p>        #main .content+.content {\n            padding-top: 0;\n        }\n<p>        \/**\/\n    }\n<p>    @media(min-width:640px) and(max-width:1200px) {\n        #main .content__grid .content__title {\n            font-size: 48px;\n        }\n<p>        #main .longread__video-paragraph {\n            font-size: 24px\n        }\n<p>        #main .lp-articles {\n            padding-bottom: 48px;\n        }\n<p>        #main .longread__video-paragraph {\n            font-size: 24px\n        }\n<p>        #main .figure_rounded-square {\n            width: 440px;\n            height: 400px;\n        }\n    }\n<\/style>\n<p><!----------------------bullets----------------------------------><\/p>\n<div class=\"features features_three-columns-blue-bg\">\n<div class=\"features__items\">\n<div class=\"features__item\">\n<div class=\"features__icon-wrap features__icon-wrap_figure-one-green\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09111417\/anti-doxing-checklist-bullet-1.png\" class=\"features__icon features__icon_small\" alt=\"\" role=\"presentation\">\n<ul class=\"submenu\">\n<h6>Information about you that you control<\/h6>\n<li>\n                        <a href=\"#section1_1\" target=\"_blank\" rel=\"noopener\"> Be conscious of which personal data you share and with whom, as well as<br>\n                            how much you trust them. <\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section1_2\" target=\"_blank\" rel=\"noopener\"> Be mindful of who you share your data with and when.<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section1_3\" target=\"_blank\" rel=\"noopener\"> Think before you post. Be accountable for what you share. Every time.<br>\n                            Even if your account is closed.<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section1_4\" target=\"_blank\" rel=\"noopener\"> Use abstract geotags, if any at all. Do not tag photos with specific<br>\n                            locations that you visit regularly. <\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section1_5\" target=\"_blank\" rel=\"noopener\"> Make sure that you do not show your personal data on the photos you<br>\n                            share.<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section1_6\" target=\"_blank\" rel=\"noopener\"> Understand which messengers are safe and which ones have end-to-end<br>\n                            encryption. <\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section1_7\" target=\"_blank\" rel=\"noopener\"> Invest wisely in your smart devices. Cheap development often means higher<br>\n                            data leak risks.<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section1_8\" target=\"_blank\" rel=\"noopener\"> Shop online in trusted stores. The fewer, the better.<\/a>\n                    <\/li>\n<\/ul><\/div>\n<div class=\"features__content\">\n<div class=\"features__item-title\">\n                    <span>Section I<\/span>\n                <\/div>\n<div class=\"features__item-description\">Information about you that you control<\/div>\n<\/div>\n<\/div>\n<div class=\"features__item\">\n<div class=\"features__icon-wrap features__icon-wrap_figure-two-green\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09111519\/anti-doxing-checklist-bullet-2.png\" class=\"features__icon features__icon_small\" alt=\"\" role=\"presentation\">\n<ul class=\"submenu\">\n<h6>Information about you that you do not control<\/h6>\n<li>\n                        <a href=\"#section2_1\" target=\"_blank\" rel=\"noopener\"> Opt for a browser that\u2019s built with privacy in mind or set up a plug-in<br>\n                            that minimizes tracking <\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section2_2\" target=\"_blank\" rel=\"noopener\"> Set up browser cookies to delete after each session<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section2_3\" target=\"_blank\" rel=\"noopener\"> Look for higher privacy settings in the browser\u2019s options interface<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section2_4\" target=\"_blank\" rel=\"noopener\"> Use incognito browsing<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section2_5\" target=\"_blank\" rel=\"noopener\"> Use a basic VPN<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section2_6\" target=\"_blank\" rel=\"noopener\"> Change the local region on your phone<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section2_7\" target=\"_blank\" rel=\"noopener\"> Set up specific access settings for each application on your phone<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section2_8\" target=\"_blank\" rel=\"noopener\"> Never install unverified applications<\/a>\n                    <\/li>\n<\/ul><\/div>\n<div class=\"features__content\">\n<div class=\"features__item-title\">\n                    <span>Section II<\/span>\n                <\/div>\n<div class=\"features__item-description\">Information about you that you do not control<\/div>\n<\/div>\n<\/div>\n<div class=\"features__item\">\n<div class=\"features__icon-wrap features__icon-wrap_figure-three-green\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09111623\/anti-doxing-checklist-bullet-3.png\" class=\"features__icon features__icon_small\" alt=\"\" role=\"presentation\">\n<ul class=\"submenu\">\n<h6>Information about other people that you have control of<\/h6>\n<li>\n                        <a href=\"#section3_1\" target=\"_blank\" rel=\"noopener\"> Only share personal information after gaining consent from people<br>\n                            involved<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section3_2\" target=\"_blank\" rel=\"noopener\"> Treat other people\u2019s personal data like you would treat your own \u2013 with<br>\n                            care<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section3_3\" target=\"_blank\" rel=\"noopener\"> Always warn others about recording a conversation<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section3_4\" target=\"_blank\" rel=\"noopener\"> Do not share information about your family relations or close connections<br>\n                            in public social media accounts<\/a>\n                    <\/li>\n<li>\n                        <a href=\"#section3_5\" target=\"_blank\" rel=\"noopener\"> Talk to your friends and family about treating your data right<\/a>\n                    <\/li>\n<\/ul><\/div>\n<div class=\"features__content\">\n<div class=\"features__item-title\">\n                    <span>Section III<\/span>\n                <\/div>\n<div class=\"features__item-description\">Information about other people that you have control of <\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr style=\"border-width: 2px;\">\n<!--------------------section 1-------------------------------><br>\n<!---------------1---------------->\n<div id=\"section1_1\" class=\"content\">\n<div class=\"grid content__grid content__grid_title-center-content-right\">\n<h2 class=\"content__title\">Information about you that you control<\/h2>\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">1. Be conscious of which personal data you share and<br>\n                with whom, as well as how much you trust them.<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">When sharing personal identification information (passports, IDs, medical<br>\n                insurance), make sure you understand which<br>\n                service or person you are sending it to and how much you trust this particular service or person. In the<br>\n                case of<br>\n                businesses, check in case there has been a previous data breach. Think every time before you give<br>\n                someone your<br>\n                documents. For example, sharing personal data with a real estate agent for a contract may be risky,<br>\n                while confirming ID<br>\n                details to a delivery service that requests it on behalf of customs is generally trustworthy. This is<br>\n                especially<br>\n                important when it comes to sharing medical data (such as menstrual cycles, blood sugar, daily calories).\n            <\/p>\n<\/div>\n<div class=\"content__figure\">\n<figure class=\"figure figure_rounded-square\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/20194249\/anti-doxing-checklist-1-1.png\" alt=\"\" class=\"figure__img\" role=\"presentation\"><br>\n            <\/figure>\n<\/div>\n<\/div>\n<\/div>\n<p><!-----------2--------------><\/p>\n<div id=\"section1_2\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">2. Be mindful of who you share your data with and<br>\n                when.<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">It is a good practice to keep track of third parties that you have shared your<br>\n                personal data with. This way, when you<br>\n                see the news about a leaked database around a service you have used, you can check if your data may have<br>\n                been<br>\n                compromised. A handy way to go about this is using a password manager as a catalogue of all the services<br>\n                with which<br>\n                you\u2019ve registered. By controlling who you share your personal data with, you will think twice before<br>\n                sharing it. <\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!--------------------articles---------------------><\/p>\n<div class=\"lp-articles lp-articles_three-columns\">\n<div class=\"lp-articles__articles\">\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/discord-privacy-security\/38546\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/01\/22073242\/discord-privacy-security-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">How to upgrade Discord security<\/div>\n<div class=\"lp-articles__article-subtitle\">Evade spammers, take control of your notifications, and protect<br>\n                your Discord account from hijacking.<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a><br>\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/check-what-data-apps-collect\/29120\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/11\/01160410\/check-what-data-apps-collect-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">Finding out what data apps really collect<\/div>\n<div class=\"lp-articles__article-subtitle\">Basically, all apps collect some information about you. Using the<br>\n                services AppCensus and Exodus, you can find out what exactly is collected.<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a>\n    <\/div>\n<\/div>\n<p><!-------------3---------------><\/p>\n<div id=\"section1_3\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">3. Think before you post. Be accountable for what you<br>\n                share. Every time. Even if your account is closed.<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Aside from sensitive data, a \u2018social portrait\u2019 can be constructed based on your<br>\n                posts and used against you. Make sure that you are ready to be accountable for whatever you have said<br>\n                online. Consider making your account private, but be aware that this does not make it fully hidden, and<br>\n                there are still a number of ways to expose what you have posted (for instance, your followers getting<br>\n                hacked).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<style>\n    #main .longread__video-player-container {\n        margin: 0 auto 96px;\n        width: 100%;\n        height: 0;\n        position: relative;\n        padding-bottom: 56%;\n    }\n<p>    #main .longread__video-player {\n        background-color: #f2f2f2;\n        object-fit: fill;\n        height: 100%;\n        width: 100%;\n        position: absolute;\n        border-radius: 6px;\n    }\n<p>    #main .video-container {\n        max-width: 850px;\n        margin: auto;\n        display: flex;\n        justify-content: center;\n    }\n<\/style>\n<p><!-------------video-------------><\/p>\n<div class=\"video-container\">\n<div class=\"longread__video-player-container\">\n        <iframe class=\"longread__video-player\" width=\"100%\" height=\"100%\" src=\"https:\/\/www.youtube.com\/embed\/s3h4bjuRwvU?enablejsapi=1&amp;origin=https%3A%2F%2Fwww.kaspersky.com\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\" data-gtm-yt-inspected-11460029_106=\"true\" id=\"386476992\"><\/iframe>\n    <\/div>\n<\/div>\n<p><!-------------4---------------><\/p>\n<div id=\"section1_4\" class=\"content\">\n<div class=\"grid content__grid content__grid_title-center-content-left\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">4. Use abstract geotags, if any at all. Do not tag<br>\n                photos with specific locations that you visit regularly.<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Geolocation is one of the most sensitive types of data which can compromise you \u2013<br>\n                by following the geotags, criminals<br>\n                can identify where you live, where your children spend time, which routes you take and when you are not<br>\n                at home. At the<br>\n                same time sharing geotags of places you travel to or attend rarely is generally safe.<\/p>\n<\/div>\n<div class=\"content__figure\">\n<figure class=\"figure figure_rounded-square\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/20194256\/anti-doxing-checklist-1-4.png\" alt=\"\" class=\"figure__img loading\" role=\"presentation\" data-was-processed=\"true\"><br>\n            <\/figure>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------privacy checker-----------><\/p>\n<div class=\"video-container\">\n    <iframe style=\"max-width:850px\" src=\"https:\/\/privacy.kaspersky.com\/embeded\/widget\/?responsive=true\" scrolling=\"no\" width=\"100%\" height=\"520\" frameborder=\"0\"><\/iframe>\n<\/div>\n<p><!---------5------------><\/p>\n<div id=\"section1_5\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">5. Make sure that you do not show your personal data<br>\n                on the photos you share.<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">This should be an easy one, yet, looking at the hashtags #tickets or #flights we<br>\n                can see that so many people still share their personal data in photos \u2013 for instance, their flight<br>\n                booking numbers on a boarding pass. Any time this type of data is made public it has the potential to be<br>\n                abused\u2014even if it\u2019s just by some ill-intentioned joker. In fact, a prankster once cancelled a booking of<br>\n                an unwitting user for fun by simply calling the airline using the booking number posted online and the<br>\n                name of the user. If you plan to share something about your travels, make sure that the photos do not<br>\n                contain personal data, just share the destination.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!-------------video-------------><\/p>\n<div class=\"video-container\">\n<div class=\"longread__video-player-container\">\n        <iframe class=\"longread__video-player\" width=\"100%\" height=\"100%\" src=\"https:\/\/www.youtube.com\/embed\/ZFZ2SdgHZ3c\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n    <\/div>\n<\/div>\n<p><!--------------------articles---------------------><br>\n<!---------6------------><\/p>\n<div id=\"section1_6\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">6. Understand which messengers are safe and which<br>\n                ones have end-to-end encryption.<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Personal conversations, which generally take place in messenger apps, are the most<br>\n                sensitive data of all. We use<br>\n                messengers to discuss very private and important topics, things that can identify our vulnerabilities.<br>\n                Therefore, it is<br>\n                crucial to understand how secure the messenger you are using is, and what kind of data \u2013 text or photos<br>\n                \u2013 can be shared<br>\n                with low risk. Know whether your favorite messenger app stores messages only on your device or in a<br>\n                cloud or server from<br>\n                where they can be leaked. Consider other privacy options, for instance, whether the app informs you if<br>\n                the participant<br>\n                of a conversation took a screenshot of your communication, or try to send self-destructive messages.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!--------------------articles---------------------><\/p>\n<div class=\"lp-articles lp-articles_three-columns\">\n<div class=\"lp-articles__articles\">\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/telegram-privacy-security\/38444\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/01\/15142028\/telegram-privacy-security-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">Telegram security and privacy tips<\/div>\n<div class=\"lp-articles__article-subtitle\">We explain why secret chats in Telegram are a must, and how to<br>\n                configure security and privacy.<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a><br>\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/what-is-end-to-end-encryption\/37011\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/09\/11113120\/what-is-end-to-end-encryption-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">What end-to-end encryption is, and why you need it<\/div>\n<div class=\"lp-articles__article-subtitle\">We explain for laypeople what end-to-end encryption is and how it<br>\n                enables private, secure communication for us all.<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a>\n    <\/div>\n<\/div>\n<p><!---------------7----------------><\/p>\n<div id=\"section1_7\" class=\"content\">\n<div class=\"grid content__grid content__grid_title-center-content-left\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">7. Invest wisely in your smart devices. Cheap<br>\n                development often means higher data leak risks.<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Fitness trackers and smartwatches that we wear 24\/7 are all tied to specific apps<br>\n                that gather your biometric data. While<br>\n                there are plenty of cheap devices, be aware \u2013 the less the developer has invested in the device and app,<br>\n                the lower the<br>\n                security can be. The basic rule is to consider the price, popularity of the device and how easy-to-use<br>\n                the application<br>\n                it is tied to is. Look up information about the application that the tracker should be linked to, review<br>\n                any history of<br>\n                data leaks and read user reviews before purchasing. The same goes for smartphones, video cameras and<br>\n                baby monitors.<\/p>\n<\/div>\n<div class=\"content__figure\">\n<figure class=\"figure figure_rounded-rectangle\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/20194302\/anti-doxing-checklist-1-7.png\" alt=\"\" target=\"blank\" class=\"figure__img\" role=\"presentation\"><br>\n            <\/figure>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------8------------><\/p>\n<div id=\"section1_8\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">8. Shop online in trusted stores. The fewer, the<br>\n                better.<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">The myriad of online stores offering more or less the same things may confuse us.<br>\n                But all stores have different privacy policies, some \u2013 none at all. The fewer online stores you use, the<br>\n                less information you share. <\/p>\n<div align=\"center\">\n<a href=\"https:\/\/education.kaspersky.com\/en\/lesson\/53\/page\/291?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_doxing-checklist_ap0072&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_1to3ae72py8prmf\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/05\/27083016\/education-doxing-course-desktop-en.png\" alt=\"\" width=\"1340\" height=\"400\" class=\"aligncenter size-full wp-image-40071\"><\/a>\n            <\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr style=\"border-width: 2px;\">\n<style>\n    #main .figure_rounded-rectangle::before {\n        background-image: url(https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/10060346\/desktop-1.png);\n    }\n<\/style>\n<p><!--------------------section 2-------------------------------><\/p>\n<div id=\"section2_1\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<h2 class=\"content__title\">Information about you that you do not control<\/h2>\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">Browser activity<\/h3>\n<p class=\"content__text\">Every single step you take in your browser is traced by cookies and tracking URLs.<br>\n                And it\u2019s not just cookies \u2013 there are<br>\n                myriad fingerprinting mechanisms used to uniquely identify a user online. This data enables<br>\n                organizations to create a<br>\n                detailed profile of you \u2013 and, no doubt, to cater advertising and enhance the user experience. But that<br>\n                comes at the<br>\n                cost of your data being vulnerable. It is therefore up to you to find the right balance between your<br>\n                privacy and<br>\n                improved user experience \u2013 with help from our tips.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------------1----------------><\/p>\n<div class=\"content\">\n<div class=\"grid content__grid content__grid_title-center-content-left\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">1. Opt for a browser that\u2019s built with privacy in<br>\n                mind or set up a plug-in that minimizes tracking<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Tracking URLs meant for advertising are loaded alongside a webpage to trace your<br>\n                activity on top of the existing<br>\n                tracking executed by the web page. Install trusted privacy and security add-ons, such as tracker<br>\n                blockers, ad blockers<br>\n                and security tools, and use plug-ins that cut off tracking links. For instance, Kaspersky products have<br>\n                a Do Not Track<br>\n                component that prevents the loading of tracking elements that monitor user actions on websites.<\/p>\n<\/div>\n<div class=\"content__figure\">\n<figure class=\"figure figure_rounded-square\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/20194310\/anti-doxing-checklist-2-2.png\" alt=\"\" class=\"figure__img\" role=\"presentation\"><br>\n            <\/figure>\n<\/div>\n<\/div>\n<\/div>\n<p><!--------------------articles---------------------><\/p>\n<div class=\"lp-articles lp-articles_three-columns\">\n<div class=\"lp-articles__articles\">\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/rc3-fpmon-browser-fingerprinting\/38369\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/01\/12122753\/rc3-fpmon-browser-fingerprinting-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">How to tell if a website is taking your (browser) fingerprints<\/div>\n<div class=\"lp-articles__article-subtitle\">Researchers have created an extension to learn about the<br>\n                information websites collect to \u201cfingerprint\u201d browsers.<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a>\n    <\/div>\n<\/div>\n<p><!---------2------------><\/p>\n<div id=\"section2_2\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">2. Set up browser cookies to be deleted after each<br>\n                session<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Set up browsing settings to limit cookies. This way you do not allow cookies to<br>\n                trace your web activity long-term and<br>\n                prevent them from creating a defined profile of you. Take into account the difference between<br>\n                first-party and<br>\n                third-party cookies: first-party cookies are meant to improve the user experience, making it more<br>\n                convenient to browse<br>\n                and create personalized recommendations for you. They are generally safe. Meanwhile, third-party cookies<br>\n                trace the same<br>\n                activity or the most interesting activities in order to create a profile of you and target ads to you \u2013<br>\n                they might also<br>\n                trace your browsing history. Note that some browsers such as Safari, have now developed a more robust<br>\n                privacy policy in<br>\n                relation to cookies by default.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!--------------------articles---------------------><\/p>\n<div class=\"lp-articles lp-articles_three-columns\">\n<div class=\"lp-articles__articles\">\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/36c3-listening-back\/33859\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/03\/02081640\/36c3-listening-back-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">Why you should try listening to your cookies<\/div>\n<div class=\"lp-articles__article-subtitle\">Listen to your cookies with the Listening Back browser extension<br>\n                to understand the real scale of Web tracking.<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a>\n    <\/div>\n<\/div>\n<p><!---------3------------><\/p>\n<div id=\"section2_3\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">3. Look for higher privacy settings in the browser\u2019s<br>\n                options interface<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">If you are ready to put some effort into protecting your data, both from a privacy<br>\n                and security standpoint, consider<br>\n                additional measures. For instance, Firefox Containers is a neat option for users to carefully segment<br>\n                portions of their<br>\n                online activity into separate boxes that keep data relevant to those segments separate from each other.<br>\n                Other options<br>\n                would be restricting which sites have access to your location data, microphone and webcam, and even<br>\n                which sites have<br>\n                JavaScript enabled.<\/p>\n<p class=\"content__text\">\n                More advanced users may consider disabling the WebRTC APIs if potentially leaking your IP address is an<br>\n                area of concern.<br>\n                Another option that usually is turned on automatically in most browsers that many users might want to<br>\n                turn off for added<br>\n                security is autosaving and autofilling of passwords. If the browser supports it, consider enabling the<br>\n                \u201cHTTPS Only Mode\u201d<br>\n                that automatically attempts to encrypt all HTTP traffic on sites (most of the web thankfully now uses<br>\n                HTTPS, but there<br>\n                are still outliers out there, and it is better to be safe than sorry).\n            <\/p>\n<p class=\"content__text\">\n                Many of these tasks can be done automatically with the help of browser extensions like<br>\n                <a target=\"_blank\" href=\"http:\/\/privacybadger.org\/\" rel=\"noopener nofollow\">Privacy Badger<\/a>.<br>\n                It\u2019s the project maintained at EFF and is a free, install-and-forget browser add-on that works behind<br>\n                the scenes on<br>\n                users\u2019 browsers to opt them into higher privacy settings.\n            <\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------4------------><\/p>\n<div id=\"section2_4\" class=\"content\">\n<div class=\"grid content__grid content__grid_title-center-content-right\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">4. Use incognito browsing<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">If you want to search for something, but do not want it to stay in your history,<br>\n                use incognito browsing windows. It<br>\n                limits the browser from tracing your browsing history and cuts off all cookies, making your search<br>\n                private. This is<br>\n                especially useful if you are sharing your computer with others.<\/p>\n<\/div>\n<div class=\"content__figure\">\n<figure class=\"figure figure_rounded-square\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/20194305\/anti-doxing-checklist-2-1.png\" alt=\"\" class=\"figure__img loading\" role=\"presentation\" data-was-processed=\"true\"><br>\n            <\/figure>\n<\/div>\n<\/div>\n<\/div>\n<p><!--------------------articles---------------------><\/p>\n<div class=\"lp-articles lp-articles_three-columns\">\n<div class=\"lp-articles__articles\">\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/incognito-mode-faq\/14784\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020628\/incognito-mode-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">Incognito mode Q&amp;A<\/div>\n<div class=\"lp-articles__article-subtitle\">What your browser\u2019s private browsing mode does \u2014 and doesn\u2019t \u2014<br>\n                protect you from.<\/div>\n<p>            <span href=\"https:\/\/www.kaspersky.com\/blog\/incognito-mode-faq\/14784\/\" class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a>\n    <\/div>\n<\/div>\n<p><!---------5--------------><\/p>\n<div id=\"section2_5\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">Tracking by applications <\/h3>\n<p class=\"content__text\">Mobile apps trace and gather your data the same way as web browsers. Even worse \u2013<br>\n                we carry smartphones with us<br>\n                everywhere, so they know much more about us than we might suspect. There are two main ways to limit<br>\n                mobile devices<br>\n                gathering your information: minimize tracking and clutter the data with noise. Here is how:<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------------5----------------><\/p>\n<div class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">5. Use a basic VPN<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">A VPN fully encrypts the traffic from your device, keeping it safe and hidden from<br>\n                everyone, including your provider,<br>\n                even if you connect to public Wi-Fi networks. It can change some information about you and your device<br>\n                (for instance,<br>\n                your IP) and make it harder for organizations to trace you. It is important to consider that a VPN also<br>\n                gathers user<br>\n                data, and, therefore, it is important to select a service that you can really trust. While a free<br>\n                version of a VPN will<br>\n                be sufficient to hide your traffic from a provider, it may also sell it to third parties. Select a<br>\n                service from a<br>\n                respected vendor with a data processing statement in place, for instance, Kaspersky VPN.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!--------------------articles---------------------><\/p>\n<div class=\"lp-articles lp-articles_three-columns\">\n<div class=\"lp-articles__articles\">\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-wifi-from-neighbors\/39039\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/03\/17071054\/how-to-protect-wifi-from-neighbors-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">How to protect your home Wi-Fi from nosy neighbors<\/div>\n<div class=\"lp-articles__article-subtitle\">Keep outsiders off your wireless network.<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a><br>\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/choose-your-vpn\/14756\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/04\/06020635\/secure-connection-app-featured-a.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">How to choose a VPN<\/div>\n<div class=\"lp-articles__article-subtitle\">Out of so many VPN providers, how do you choose the best one for<br>\n                you?<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a>\n    <\/div>\n<\/div>\n<p><!---------6------------><\/p>\n<div id=\"section2_6\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">6. Change the local region on your phone<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Misinforming trackers about your location will help to confuse them and make it<br>\n                harder to create a correct profile of<br>\n                you. Set up a different regional locale on your OS and choose a third country for your VPN connection.<br>\n                For instance,<br>\n                select the German version of the iOS and a Finnish VPN connection. One of the issues you may face when<br>\n                using a locale<br>\n                change is trying to use a payment service in a country where this service is not supported. In such<br>\n                cases, just switch<br>\n                back to your local region, make a payment, and then switch again back the country of your choice.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------7------------><\/p>\n<div id=\"section2_7\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">7. Set up specific access settings for each<br>\n                application on your phone<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Use instruments that your OS developers have created to ensure applications only<br>\n                gain access to the information they<br>\n                need. Best practices includes allowing access to your location only while using an app, and limiting<br>\n                access to the<br>\n                microphone and photographs. Be wary of applications that request data they should not need to perform<br>\n                their functions.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!--------------------articles---------------------><\/p>\n<div class=\"lp-articles lp-articles_three-columns\">\n<div class=\"lp-articles__articles\">\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/what-is-off-facebook-activity\/38824\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/02\/19064621\/what-is-off-facebook-activity-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">With Off-Facebook Activity, you have (some) control over your data\n            <\/div>\n<div class=\"lp-articles__article-subtitle\">Facebook lets you manage the data it collects from third-party<br>\n                websites and apps. Here\u2019s how.<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a><br>\n        <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/keep-instagram-secure\/11045\/\" class=\"lp-articles__article\" rel=\"noopener nofollow\"><br>\n            <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/11\/25081537\/privacy-security-instagram-featured.jpg\" class=\"lp-articles__article-img\" alt=\"\" role=\"presentation\">\n<div class=\"lp-articles__article-title\">Instagram\u2019s updated security and privacy settings<\/div>\n<div class=\"lp-articles__article-subtitle\">How to protect your Instagram account and personal photos from<br>\n                prying eyes.<\/div>\n<p>            <span class=\"link-button link-button_arrow lp-articles__article-link\"><br>\n                <span class=\"link-button__text link-button__text_size_l\">Learn more<\/span><br>\n                <span class=\"link-button__icon\"><br>\n                    <span style=\"background-image: url('.\/assets\/icons\/svg\/arrow_right\/green.svg')\" class=\"icon-svg icon-svg_size_m\"><\/span><br>\n                    <span style=\"background-image: url('https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/09205459\/teal.svg')\" class=\"icon-svg icon-svg_size_m link-button__icon-hover\"><\/span><\/span><\/span><br>\n        <\/p><\/a>\n    <\/div>\n<\/div>\n<p><!---------8------------><\/p>\n<div id=\"section2_8\" class=\"content\">\n<div class=\"grid content__grid content__grid_title-center-content-right\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">8. Never install unverified applications<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Unverified applications (apps that have not gone through an app store\u2019s<br>\n                verification process) often end up being adware \u2013 a type of software that floods your phone with<br>\n                advertising and gathers metadata about you. Even worse, the app you download may be malicious. For<br>\n                instance, it may contain spyware that gathers information about your location, your conversations in<br>\n                messengers or call log.<\/p>\n<\/div>\n<div class=\"content__figure\">\n<figure class=\"figure figure_rounded-rectangle\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/20194316\/anti-doxing-checklist-2-7.png\" alt=\"\" class=\"figure__img loading\" role=\"presentation\" data-was-processed=\"true\"><br>\n            <\/figure>\n<\/div>\n<\/div>\n<\/div>\n<hr style=\"border-width: 2px;\">\n<!--------------------section 3------------------------------->\n<div id=\"section3_1\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<h2 class=\"content__title\">Information about other people that you have control of<\/h2>\n<div class=\"content__wrap\">\n<p class=\"content__text\">Photos of other people, conversations, chats, phone numbers, and addresses \u2013 you<br>\n                often get access to other people\u2019s<br>\n                personal information. This also needs good care, and it is your responsibility to keep it safe. Here is<br>\n                how:<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------------1----------------><\/p>\n<div class=\"content\">\n<div class=\"grid content__grid content__grid_title-center-content-left\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">1. Only share personal information after gaining<br>\n                consent from the people involved<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Photographs of other people that you have taken may be considered innocent by you<br>\n                but could harm others. The same goes for screenshots of conversations, flight tickets you purchased<br>\n                together with someone else \u2013 pretty much anything that includes a third party and information that may<br>\n                identify them. Remember that you are responsible not just for your data, but for others\u2019 data that<br>\n                happened to become yours too.<\/p>\n<\/div>\n<div class=\"content__figure\">\n<figure class=\"figure figure_rounded-square\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/20194320\/anti-doxing-checklist-3-1.png\" alt=\"\" class=\"figure__img loading\" role=\"presentation\" data-was-processed=\"true\"><br>\n            <\/figure>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------------2----------------><\/p>\n<div id=\"section3_2\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">2. Treat other people\u2019s personal data like you would<br>\n                treat your own \u2013 with care<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Follow the same principles with other people\u2019s data as you would with your personal<br>\n                information that you can control. Only upload personal data of third parties to reliable resources, do<br>\n                not show it to other people and consider how this data may be used.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------------3----------------><\/p>\n<div id=\"section3_3\" class=\"content\">\n<div class=\"grid content__grid content__grid_title-center-content-left\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">3. Always warn others about recording a conversation<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Besides covert recordings being universally unethical and disrespectful to the<br>\n                participants of the conversation, in some countries they are also illegal.<\/p>\n<\/div>\n<div class=\"content__figure\">\n<figure class=\"figure figure_rounded-square\">\n                <img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/04\/20194325\/anti-doxing-checklist-3-3.png\" alt=\"\" class=\"figure__img loading\" role=\"presentation\" data-was-processed=\"true\"><br>\n            <\/figure>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------------4----------------><\/p>\n<div id=\"section3_4\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">4. Do not share information about your family<br>\n                relations or close connections in public social media accounts<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Personal connections reveal more than you think \u2013 they show which people mean a lot<br>\n                to you and hence make you vulnerable. This information may be used not just against you, but against<br>\n                your close connections too. <\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><!---------------5----------------><\/p>\n<div id=\"section3_5\" class=\"content\">\n<div class=\"grid content__grid content-center-1-8\">\n<div class=\"content__wrap\">\n<h3 class=\"content__subtitle content__subtitle_strong\">5. Talk to your friends and family about treating<br>\n                your data right<br>\n                <a href=\"#contents\" class=\"arrow-up\" target=\"_blank\" rel=\"noopener\"><\/a><br>\n            <\/h3>\n<p class=\"content__text\">Have conversations within your community to set some data hygiene standards for<br>\n                each other, and remember to check in with each other if, and when, anything relating to personal data<br>\n                leaks happens. There has to be a level of trust within your trusted network about how data is shared<br>\n                externally.<\/p>\n<div align=\"center\">\n<a href=\"https:\/\/education.kaspersky.com\/en\/lesson\/53\/page\/291?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_doxing-checklist_ap0072&amp;utm_content=link&amp;utm_term=gl_kdaily_organic_1to3ae72py8prmf\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/05\/27083016\/education-doxing-course-desktop-en.png\" alt=\"\" width=\"1340\" height=\"400\" class=\"aligncenter size-full wp-image-40071\"><\/a>\n            <\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Definitive Checklist: How to protect your data online Photos, uploaded documents, smartphone app details \u2013 data management is a continuous, daily event whether we realize it or not. But do<\/p>\n","protected":false},"author":2706,"featured_media":39268,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/legacy-page.php","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"class_list":["post-39265","page","type-page","status-publish","has-post-thumbnail"],"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/anti-doxing-checklist\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/anti-doxing-checklist\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/anti-doxing-checklist\/"}],"acf":[],"banners":"","is_landing":true,"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/39265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=39265"}],"version-history":[{"count":82,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/39265\/revisions"}],"predecessor-version":[{"id":52706,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/pages\/39265\/revisions\/52706"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/39268"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=39265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=39265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}