274 Comments
User's avatar
Your Nextdoor PCP's avatar

Love this checklist, especially the framing that your digital footprint is an attack surface, not just a privacy preference. The “recover old emails → search your inbox for old sign-ups → delete/close accounts” workflow is exactly how I’d triage risk for a patient-facing org: you can’t secure what you’ve forgotten exists. Two clinician-ish add-ons I’d emphasize:

1. Credential hygiene beats willpower. Use a password manager + unique passwords + 2FA/passkeys wherever possible; then leaks become “annoying” instead of catastrophic. Your HaveIBeenPwned + Google removal steps are solid starting points. 2. Data broker + credit controls matter for real-world harm (identity theft, harassment). Freezing credit + opting out of people-search sites often reduces downstream risk more than any single setting toggle.

Also appreciate the reminder that “99%” is aspirational; privacy is a process, and the biggest win is shrinking the easy-to-exploit surface area fast!

Brooke's avatar

What password manager would you suggest?

Meeru's avatar

Proton is best I suppose and they do have free trial

Thomas, an old GI's avatar

Recommend NOT using a VPN that REQUIRES all your personal information in order to HIDE all your personal information.

MULVAD only has an account number. Otherwise they really DO'NT know who I am.

Kasey King, LMFT's avatar

Now I need to check what info I put into my VPN.

Daniel's avatar

Protonvpn is also a good one but Mullvad is the best one

mortua conjuga's avatar

i use proton. it's good 👍🏾

Thomas, an old GI's avatar

I hear good things about Proton, as well.

Bwabbit's avatar

How about we delete the elite and their loyal sociopaths pissing on everything we love instead?

The Long Game's avatar

THIS is the answer. Attempting to defensively mitigate all the million little ways the ruling bloodlines and their lackeys facilitate leaks is a waste of time compared to just ENDING THE RULERSHIP.

Noel Veva's avatar

It doesn’t seem like a very good idea to type your password for anything into a search engine 🤔

Phoenix's avatar

I did a double take at this too..

Claire's avatar

this is so interesting.. on the one hand it makes my heart sink because i would like to go through this process but it sounds long and stressful (!) i have over the years had 'burner' accounts as you call it or mixed my real data with fictional (such as names and DOBs) but i dunno if this makes me more or less secure as it would be harder for me to access old accounts to now deleter the data, as i would have forgotten the random made up info i entered at the time. Hmm.

Deborah Guerrero's avatar

Google is the main account I’d want to delete first.

Chumz's avatar

Me too! I’ve been transferring my important emails to proton email acct. Once completed, goodbye google acct. They are compromised and have no intention on protecting peoples privacy once the A.I. data base for surveillance is fully implemented.

Deborah Guerrero's avatar

Absolutely agree. I’ve not used my gmail for eons, wish I were tech savvy enough to transfer or extract content so I could delete it entirely.

gpj2736's avatar

You can transfer all of your gmail emails, photos etc using Google Takeout. I just did this two weeks ago and transferred my gmails & photos to a thumbdrive. Look up instructions for using it.

Criz's avatar

What do you recommend for email

Kate Herford's avatar

Who are you moving your email too. I’ve deleted everything Google and Microsoft. I transitioned to Proton and it was easy. Just a couple of button clicks and my emails were transferred. I had however gone through them and deleted any that were no longer relevant.

You don’t have to be tech savvy. There’s the saying ‘how do you eat an elephant? One bite at a time’. The same goes for removing yourself from big tech and social media. My last step is Apple - both Mac and iPhone. The computer I should be able to do this weekend.

Deborah Guerrero's avatar

I now have a proton email account.

Kate Herford's avatar

that’s awesome! Sometimes the fear of what it will take to make change holds us back. Glad to see you took the plunge.

Deborah Guerrero's avatar

Just fyi, I’ve read some intel on proton (including vpn) that makes me leery too. I’ll attach if I can find.

Andrea Maria Romandini's avatar

I feel like nothing digital is entirely safe… every time I switch to a new browser or email I find out it’s compromised 🤦🏻‍♀️

MlleAbeilles's avatar

Oh no, really??? What other options do I have?

Deborah Guerrero's avatar

Good question. I don’t have a good answer. At least not one I’m tech savvy or rich enough to employ. I always assume that most all communications are being stored, if not tracked by some algorithm , most likely both.

If future reprisals include one’s personal history, especially on social media, even deleted, I know I’m screwed anyway. So I keep sharing because folks need information presented so they can decide for themselves what’s true, or not.

Anybody wanna weigh in?

Leah's avatar

Analog. 🤔

Becoming Human's avatar

You should look into who owns proton now… :(

Kate Herford's avatar

I felt the same why when I did research. I took the approach that if they are good at what they do, it’s better than Google, Microsoft and Apple harvesting data. And being hosted in Switzerland was a bonus.

In reality anything SMART or digital, ie computer based can be compromised. The lesser of evil is the result.

Leah's avatar

I started the process of moving everything from google to proton. They have some great tools to make the process easier. Google is the evil twin to AOL back in the day. It weaves itself all through your computer and accounts creating a massive spiderweb, but with consistency and forward thinking protection it can be done.

eden's avatar

ai generated image?

Kelo's avatar

It kind of read like an AI generated article too

Merri's avatar

Same, I care and want to see art created by humans (or talented animals, like that elephant who paints). AI gives me the creeps and I want no part of it.

Vero's avatar

This is not meant as an attack on author or content, but I have to say I feel a little conflicted about the ai image when the list itself is a indirectly criticising the systematic problems of data politics

Vereya in Nature's avatar

critical thinking at work… if only more people noticed the discrepancy,,,

Kevin's avatar

About deleting old credit history, this can lower your credit score since they use age of accounts, I don't have enough history anymore it only goes back 25 years and that dings my score.

Had I not cancelled my oldest card ( into the 80's ) I'd have a "perfect" credit score....

Don't need that old credit card but your history is part of your score.

And yes, only an oldster like myself would know that is an issue.

Otherwise a great rundown and a couple of things I hadn't thought of, nice work !

Bill Lacey's avatar

Credit scores are a scam. Want that “perfect” score? Sign up for 6 more credit cards and carry balances on all of them. They’ll tell you doing that proves to them you can handle credit responsibly. Haha. That’s like telling someone who regularly drives drunk they are a good driver for making it home every night. The incentives for a good credit score are the exact opposite of being fiscally responsible.

Nancy's avatar

Sadly credit scores are important for younger people needing loans for a home, a car, even renting an apartment but I agree they are indeed a scam that often just encourages people to take on more debt, but fiscal responsibility employed early on will eventually lead one into a position where they don't need to worry about their credit score.

Monnina's avatar

There is no profit for Wall St. in ordinary folk being fiscally responsible. If you are not deep in debt you are their enemy.

The Focused Data Scientist's avatar

Gonna be trying that ASAP

ToxSec's avatar

it’s a really good list they put together!

rambling rory's avatar

Proton Password manager, Mozilla Relay and some other services provide email aliases.

DoG's avatar

Getting out is the easy part, staying out is key.

It's a good exercise either way, but STAY out.

Key tools to stay out include a very secure browser configured correctly, and if you MUST do a cell phone, use a pixel with grapheneOS or similar.

Great article!

Adia Bali's avatar

The stalker example at the end is haunting. What struck me most is your point about hackers analyzing for months. It's not paranoia if someone can really piece together your identity from your digital crumbs. The burner accounts and false information strategies are smart.

Dedischado's avatar

May I also suggest using the Brave browser or Secured Firefox as well.

Dedischado's avatar

I haven’t used it myself, so I don’t know.

Andrea Maria Romandini's avatar

I like it so far - I mean, we can never be 💯 sure but I feel ok about using it vs Safari/Firefox/anything Goog related 🤷🏻‍♀️

Kelly's avatar

WOW, i never knew about this stuff before. Glad i see this post, please do more!!!

amine rafik's avatar

I Learned a lot from this one. thanks for sharing abi

natalie fox's avatar

why have an AI illustration as the cover for this though?