<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Secrets of Privacy]]></title><description><![CDATA[Practical privacy for busy people. Reduce your digital footprint, avoid scams, and become a harder target online. Join 4,800+ readers getting simple privacy wins each week.]]></description><link>https://www.secretsofprivacy.com</link><image><url>https://substackcdn.com/image/fetch/$s_!yQg9!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png</url><title>Secrets of Privacy</title><link>https://www.secretsofprivacy.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 24 Apr 2026 11:47:24 GMT</lastBuildDate><atom:link href="https://www.secretsofprivacy.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Secrets of Privacy]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[secretsofprivacy@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[secretsofprivacy@substack.com]]></itunes:email><itunes:name><![CDATA[Secrets of Privacy]]></itunes:name></itunes:owner><itunes:author><![CDATA[Secrets of Privacy]]></itunes:author><googleplay:owner><![CDATA[secretsofprivacy@substack.com]]></googleplay:owner><googleplay:email><![CDATA[secretsofprivacy@substack.com]]></googleplay:email><googleplay:author><![CDATA[Secrets of Privacy]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Trying to Detect Fraud and Scams Won't Save You Anymore]]></title><description><![CDATA[A new wave of fraud doesn't start with a generic lure. It starts with your face, your numbers, and your most recent post.]]></description><link>https://www.secretsofprivacy.com/p/stop-trying-to-detect-fraud-and-scams</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/stop-trying-to-detect-fraud-and-scams</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Wed, 22 Apr 2026 01:19:44 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4d9adc91-f45e-4c59-b0a3-0d2b838ecfa9_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>To avoid email scams, you were told to watch for generic greetings, suspicious senders, and bad grammar. New attacks and scams have evolved, and now skip all of that. </p><p>Instead, they open with your actual profile photo, your real follower count, and a thumbnail of your most recent post. Everything in the email looks legitimate because the attacker pulled your public data before sending you anything.</p><p>This comes from a phishing campaign documented this week by Malwarebytes that pulls real YouTube channel data to build a personalized copyright scare page. The moment you land on it, the page already knows your avatar, your subscriber count, and your most recent video. If you enter your credentials on the fake Google sign-in it serves up, you lose your entire Google account.</p><p>And while this particular scam focuses on YouTube, it can equally apply to any number of other platforms, from Facebook to Instagram to Substack. Creators are especially at risk. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><p>This scheme runs like a global hacker franchise. Multiple attackers share the same phishing kit, each running their own campaigns with their own affiliate ID embedded in the links. One operator can swap out the destination domain at any time to evade takedowns. That means the infrastructure stays live even when individual phishing pages get flagged.</p><p>There&#8217;s also a detail that says a lot about how professionally these operations are being run. <em>The scam automatically screens out any channel with more than three million subscribers</em>, instead showing those creators a clean bill of health rather than a scare page. The reason is simple if you think about it: </p><blockquote><p>Large creators are more likely to have security staff, YouTube contacts, or the visibility to get the operation shut down quickly. Smaller creators, who have less protection and just as much to lose, are the higher value target.</p></blockquote><p>The reason this scam works is that YouTube has a public API. In case you think this is just a YouTube problem, public APIs are not unique to YouTube. Any platform that displays your profile photo, follower count, and recent activity to the world gives an attacker the raw material to build a personalized scare page. </p><p>Facebook business pages, LinkedIn profiles, Etsy storefronts, Substack publications all expose enough public data to run the same scheme. A fake &#8220;your Facebook page has been flagged for removal&#8221; notice showing your page name, your follower count, and your most recent post would be just as convincing to a small business owner as the YouTube copyright notice is to a creator.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pIBo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pIBo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!pIBo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!pIBo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!pIBo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pIBo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:137507,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/194689179?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pIBo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!pIBo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!pIBo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!pIBo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa834b7ab-8a5b-4328-a897-a9b1faadcb9d_1080x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="callout-block" data-callout="true"><p>The YouTube scam is not occurring in isolation but sits inside a larger scam pattern.</p></div><p>Voice cloning has crossed what researchers at the University at Buffalo describe as the &#8220;indistinguishable threshold.&#8221; Some major retailers are already reporting over 1,000 AI-generated scam calls per day. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pmca!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pmca!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png 424w, https://substackcdn.com/image/fetch/$s_!pmca!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png 848w, https://substackcdn.com/image/fetch/$s_!pmca!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png 1272w, https://substackcdn.com/image/fetch/$s_!pmca!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pmca!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png" width="519" height="330" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:330,&quot;width&quot;:519,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:39559,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/194689179?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pmca!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png 424w, https://substackcdn.com/image/fetch/$s_!pmca!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png 848w, https://substackcdn.com/image/fetch/$s_!pmca!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png 1272w, https://substackcdn.com/image/fetch/$s_!pmca!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd67baffe-2eb5-4be2-b0e3-ff7b5e84cbb7_519x330.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The family emergency call, the one where you hear your daughter&#8217;s voice saying she&#8217;s been in an accident, is no longer a theoretical risk. It&#8217;s running at scale, and it runs on a few seconds of audio pulled from a public video or voicemail. Experian&#8217;s 2026 fraud forecast describes intelligent bots carrying out automated family-member-in-need scams with a sophistication that wasn&#8217;t possible even two years ago. </p><blockquote><p>Both of those attacks share the same logic as the YouTube scam. They start with real data about you, pulled from public sources, and use it to make the approach feel legitimate before you&#8217;ve had a chance to think.</p></blockquote><p>There&#8217;s a separate but related story worth knowing about too. A credential-stealing malware called Omnistealer revealed the other day hides its attack code inside blockchain transactions on networks like TRON and Binance Smart Chain. Because blockchains are append-only, those malicious snippets are effectively permanent once they&#8217;re mined into a block. You can take down a malicious GitHub repo or revoke a domain, but you can&#8217;t roll back TRON to remove a few hundred bytes of malware staging code. </p><p>The campaign has been linked by on-chain forensics to (no surprise!) North Korean state-sponsored actors. It spread through fake developer job offers on LinkedIn and GitHub where technically skilled targets handed what looked like a routine freelance project.</p><p>While the personalization angle is less pronounced here, what Omnistealer illustrates is the other half of the same shift: </p><blockquote><p>sophisticated fraud operations are not only getting better at targeting people, they&#8217;re getting better at making their infrastructure difficult, if not impossible, to shut down. The attacks are more convincing and more resilient at the same time.</p></blockquote><p>That combination is what makes this moment different from previous waves of online fraud.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/stop-trying-to-detect-fraud-and-scams?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/stop-trying-to-detect-fraud-and-scams?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>For most of the history of online fraud, the attacker&#8217;s main constraint was personalization. A phishing email that addressed you by name was already considered sophisticated. And a scam call that knew where you worked was alarming. </p><p>Building something that looked genuinely specific to you (your face on the page, your voice in the audio or your channel data in the copyright notice) required real effort and real resources. That constraint kept the volume down. It limited who could run these operations and how many people they could reach.</p><p>That constraint is gone, and it&#8217;s not coming back. </p><p>The YouTube copyright kit fetches your real data automatically from a public API. Voice cloning tools require a few seconds of audio, freely available for most people who have ever posted a video or left a voicemail. The personalization layer is now a commodity. Anyone with modest resources can build an attack that feels like it was made specifically for you, because technically, it was.</p><p>What legislators and most security advice haven&#8217;t caught up to yet is that the old detection signals no longer work. You were told to look for misspellings, generic greetings, implausible urgency. An email that called you &#8220;Dear Customer&#8221; was a tell. None of that applies anymore. The new signals are different, and defending against them requires a different posture.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HH4K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HH4K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!HH4K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!HH4K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!HH4K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HH4K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:124772,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/194689179?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HH4K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!HH4K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!HH4K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!HH4K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd61ae03-7622-480d-8f2f-5edd0aa059c5_1080x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>How to Defend Yourself</h2><p>The defense move here isn&#8217;t about being more skeptical of suspicious-looking messages. That&#8217;s because messages <em>won&#8217;t look suspicious</em>. The defense is structural, which means developing habits and configurations that hold up even when the attacker has already done their homework on you. Here&#8217;s how to do that. </p>
      <p>
          <a href="https://www.secretsofprivacy.com/p/stop-trying-to-detect-fraud-and-scams">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[OkCupid Gave Your Face to an AI Company]]></title><description><![CDATA[What happened to OkCupid users' faces is happening elsewhere, quietly and legally.]]></description><link>https://www.secretsofprivacy.com/p/okcupid-gave-your-face-to-an-ai-company</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/okcupid-gave-your-face-to-an-ai-company</guid><pubDate>Thu, 16 Apr 2026 10:36:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b968c5ca-5f56-461f-b98f-573e9401c12f_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Nearly three million people uploaded photos to the dating site OkCupid. They did so looking for dates (obviously). </p><p>Yet their faces ended up training a facial recognition system that now sells to police departments, government agencies, and the military.</p><p>How did that happen? </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><p>The U.S. Federal Trade Commission (FTC) alleged that OkCupid shared users&#8217; photos, location data, and demographic profiles with Clarifai, a &#8220;computer vision company&#8221;. They did so without user consent and in direct violation of its own privacy policy. OkCupid&#8217;s founders were personally invested in Clarifai, and one of them sent the photos from his personal email account, bypassing any corporate oversight. </p><p>No contract governed the data handoff. And no restrictions were placed on what Clarifai could do with the misappropriated data.</p><p>Clarifai ended up using the images to build technology capable of identifying the age, sex, and race of faces. The company has since secured contracts with the U.S. Air Force Research Laboratory and partnered with defense firms supplying AI to the Army&#8217;s intelligence community. </p><p>So dating profile pictures became raw material for defense contractors. The people in those photos had no idea, and were never asked.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/okcupid-gave-your-face-to-an-ai-company?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/okcupid-gave-your-face-to-an-ai-company?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>The FTC settled the case in March 2026. </p><p><strong>The good</strong>: The settlement permanently bars Match Group and OkCupid from misrepresenting their data practices and requires compliance reporting for a decade. </p><p><strong>The bad</strong>: Match Group did not admit wrongdoing. </p><p><strong>The ugly</strong>: The settlement carries no financial penalty. And the FTC did not require Clarifai to delete any of the data it received. </p><p>Twelve years of willfully misusing people&#8217;s images, and the regulatory consequence is a promise to tell the truth going forward.</p><h2><strong>The OkCupid Story Isn&#8217;t Really About OkCupid</strong></h2><p>Most people process news like this as a company-specific scandal. OkCupid was reckless with customer data, OkCupid got caught, but you don&#8217;t use OkCupid, so you&#8217;re fine. </p><p>That&#8217;s the superficial take. As is usually the case with these stories, there&#8217;s a deeper level. </p><p>Every site where you&#8217;ve uploaded photos, whether LinkedIn, Facebook, Instagram, a fitness app, a medical portal, or a real estate platform, operates under a privacy policy that its legal team wrote. And they wrote it to maximize the company&#8217;s flexibility, not yours. I&#8217;ve written before about why reading those policies is a waste of time. &#128071;</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ec7c4f9f-7629-49e8-a682-0187647d07be&quot;,&quot;caption&quot;:&quot;Gallop released their annual findings late last year regarding Americans&#8217; views on personal privacy matters. One of the noteworthy findings was most young adults don&#8217;t read privacy notices while a majority of older adults do read privacy notices. There was some common ground on one topic - 61% of all adults said privacy notices are not effective at communicating how a company uses personal data.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Reading Website Privacy Notices is a Waste of Time&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:169760400,&quot;name&quot;:&quot;Secrets of Privacy&quot;,&quot;bio&quot;:&quot;Practical privacy for busy people. Cut your digital exposure, avoid common threats, and stack simple privacy wins.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53778fb9-dd8e-4594-82d5-b49708bb0864_3214x2880.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-05-17T01:28:00.418Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3d681e18-74e4-493e-8038-55b134143329_1792x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/reading-website-privacy-notices-is-a-waste-time&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144484982,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>What the OkCupid case illustrates is the specific mechanisms that makes privacy policies useless: </p><blockquote><p>Privacy policies are often inaccurate, either out of negligence or intentional bad behavior (as appears to be the case with OKCupid). Or a company can change the policy at any time, usually without notice, to make their privacy infringing practices legit. And in almost all cases privacy policies are drafted to provide broad rights and discretion to use your data, which means most people don&#8217;t know what they&#8217;re supposedly consenting to. </p></blockquote><p>Unfortunately the OKCupid incident isn&#8217;t a one-time failure by a company with bad intentions. It&#8217;s a repeatable playbook. </p><p>Many people now understand that tech companies design features specifically to get you to hand over your face voluntarily. It&#8217;s been going on since the dawn of the internet but AI companies have taken it to a whole new level. The best example is when OpenAI/ChatGPT pushed an anime filter, the Ghibli-style portrait, which allowed users to see themselves as a cartoon. </p><p>Users got a quick dopamine hit from doing that. And OpenAI received valuable data to bolster their facial recognition capabilities without paying anything. That&#8217;s about as lopsided of a trade as you can find. </p><div class="comment" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/&quot;,&quot;commentId&quot;:104133711,&quot;comment&quot;:{&quot;id&quot;:104133711,&quot;date&quot;:&quot;2025-03-28T18:33:18.205Z&quot;,&quot;edited_at&quot;:null,&quot;body&quot;:&quot;How AI Companies Trick You Into Training Their Models \n\n&#129489;&#8205;&#128188; Exec 1: Our AI models are falling behind in facial recognition and image generation. We need more data.\n\n&#128105;&#8205;&#128188; Exec 2: But getting enough high-quality images will take too long.\n\n&#129333; Exec 3: What if we launch a fun feature that encourages people to upload their own photos?\n\n&#129489;&#8205;&#128188; Exec 1: &#128514; LOL. People won't fall for that anymore. They already post less personal content on social media.\n\n&#129333; Exec 3: &#129300; Hear me out. We offer a tool that transforms a personal photo into an anime version. People will love it. They&#8217;ll share the results, and we&#8217;ll get a fresh batch of faces to train our AI.\n\n&#129489;&#8205;&#128188; Exec 1: &#128527; That might work&#8230; but will they really go for it?\n\n&#129333; Exec 3: &#9989; They&#8217;ll think it&#8217;s just for fun. Meanwhile, we improve our dataset&#8212;for free.\n\n&#128680; Be mindful of what you upload. Your personal data is more valuable than ever as AI technology evolves. Gen AI tools like ChatGPT and Gemini are constantly seeking new ways to collecting data, often disguising data collection as entertainment.\n\nThis raises critical privacy and cybersecurity concerns. \n\nAre we unknowingly training AI models that could later be used for facial recognition, surveillance, or other invasive applications? \n\nLet us know what you think - do you see OpenAI's Ghibli-style image generator as clever marketing or a potential privacy trap? \n\nInterested in private Gen AI? Check out our post here: https://www.secretsofprivacy.com/p/the-privacy-risks-of-ai-chatbots-like-chatgpt&quot;,&quot;body_json&quot;:{&quot;type&quot;:&quot;doc&quot;,&quot;attrs&quot;:{&quot;schemaVersion&quot;:&quot;v1&quot;},&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;How AI Companies Trick You Into Training Their Models &quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;&#129489;&#8205;&#128188; Exec 1: Our AI models are falling behind in facial recognition and image generation. We need more data.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;&#128105;&#8205;&#128188; Exec 2: But getting enough high-quality images will take too long.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;&#129333; Exec 3: What if we launch a fun feature that encourages people to upload their own photos?&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;&#129489;&#8205;&#128188; Exec 1: &#128514; LOL. People won't fall for that anymore. They already post less personal content on social media.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;&#129333; Exec 3: &#129300; Hear me out. We offer a tool that transforms a personal photo into an anime version. People will love it. They&#8217;ll share the results, and we&#8217;ll get a fresh batch of faces to train our AI.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;&#129489;&#8205;&#128188; Exec 1: &#128527; That might work&#8230; but will they really go for it?&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;&#129333; Exec 3: &#9989; They&#8217;ll think it&#8217;s just for fun. Meanwhile, we improve our dataset&#8212;for free.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;&#128680; &quot;},{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;Be mindful of what you upload.&quot;},{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot; Your personal data is more valuable than ever as AI technology evolves. Gen AI tools like ChatGPT and Gemini are constantly seeking new ways to collecting data, often disguising data collection as entertainment.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;This raises critical &quot;},{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;privacy&quot;},{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot; and &quot;},{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;cybersecurity&quot;},{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot; concerns. &quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;Are we unknowingly training AI models that could later be used for facial recognition, surveillance, or other invasive applications? &quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;Let us know what you think - do you see OpenAI's Ghibli-style image generator as clever marketing or a potential &quot;},{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;privacy trap&quot;},{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;? &quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;Interested in private Gen AI? Check out our post here: &quot;},{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;link&quot;,&quot;attrs&quot;:{&quot;href&quot;:&quot;https://www.secretsofprivacy.com/p/the-privacy-risks-of-ai-chatbots-like-chatgpt&quot;,&quot;target&quot;:&quot;_blank&quot;,&quot;rel&quot;:&quot;nofollow ugc noopener&quot;,&quot;class&quot;:&quot;note-link&quot;}}],&quot;text&quot;:&quot;https://www.secretsofprivacy.com/p/the-privacy-risks-of-ai-chatbots-like-chatgpt&quot;}]}]},&quot;restacks&quot;:11,&quot;reaction_count&quot;:19,&quot;attachments&quot;:[{&quot;id&quot;:&quot;e679d48f-ccf2-4d81-ad48-6a7258154cd1&quot;,&quot;type&quot;:&quot;image&quot;,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a89600da-6af8-4df0-af78-3ac929c8ab0c_1024x1024.webp&quot;,&quot;imageWidth&quot;:1024,&quot;imageHeight&quot;:1024,&quot;explicit&quot;:false}],&quot;name&quot;:&quot;Secrets of Privacy&quot;,&quot;user_id&quot;:169760400,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53778fb9-dd8e-4594-82d5-b49708bb0864_3214x2880.png&quot;,&quot;user_bestseller_tier&quot;:null,&quot;userStatus&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}}" data-component-name="CommentPlaceholder"></div><p>OkCupid&#8217;s founders didn&#8217;t need a clever feature to capture valuable biometric data because they already had three million photos sitting in a database. But the outcome is the same: </p><blockquote><p>your face, in a training set, with no restrictions on what gets built from it.</p></blockquote><p>The enforcement consequence for any of this is, apparently, a compliance checklist. Which shouldn&#8217;t be surprising to anyone following these incidents. Penalties handed down by regulators are usually small compared to company revenues. Businesses then calculate the cost of protecting (or not protecting) your privacy, and when the answer is zero (or near zero) dollars in penalties, the math doesn&#8217;t work in favor of your privacy. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;0c7daeba-6bd4-42c1-b468-eae8d68db6a7&quot;,&quot;caption&quot;:&quot;Travel back in time to a McDonald's drive-thru in the 1990s.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;What McDonalds Hot Coffee Can Teach You About Protecting Your Data&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2025-04-11T01:12:41.543Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d5435224-38bb-40b7-a3ff-d3158078a631_1536x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/what-mcdonalds-hot-coffee-can-teach-you-about-protecting-your-data&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:160831137,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:7,&quot;comment_count&quot;:2,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>For photos specifically, the only meaningful control you still have is <strong>upload discipline</strong>. Review which apps have access to your Google, Apple, or Facebook account, and think carefully before handing your face to the next platform that makes it seem fun or convenient. The photos you never put up can&#8217;t be handed to anyone.</p><p>You can't un-upload a photo, and you can't control where it goes once a company has it. Knowing that your photos can move from a dating app to a defense contractor through a personal email and a handshake should change how you evaluate the next platform that asks for your face. While the next platform asking for your photo isn't OkCupid, the incentive structure is identical.</p><div><hr></div><p>One more thing: I've been sharing the behind-the-scenes of building <strong>DoxxScore</strong> over on Substack Notes. Things like the thinking behind the product, what I've learned about digital privacy along the way, and where it's headed. If that interests you, a sample post is below. DoxxScore goes live next week, so stay tuned for more information. &#8987;</p><div class="comment" data-attrs="{&quot;url&quot;:&quot;https://open.substack.com/&quot;,&quot;commentId&quot;:223555918,&quot;comment&quot;:{&quot;id&quot;:223555918,&quot;date&quot;:&quot;2026-03-05T19:42:04.863Z&quot;,&quot;edited_at&quot;:&quot;2026-03-21T16:00:16.466Z&quot;,&quot;body&quot;:&quot;Part 5: First Look at the DoxxScore Site\n\nWe've been heads-down building DoxxScore for weeks. Today I want to share a first look at the website.\n\nA few design decisions that were important to us:\n\n\n\n\n\nClean and professional. Privacy is a serious topic. We avoided anything cutesy or gamified. The interface is built to communicate trust and clarity.\n\n\n\nInformation hierarchy. When someone gets their results, the most important thing is: what's my risk level and what do I do about it? Everything else is secondary. The design reflects that.\n\n\n\nActionable by default. Every finding in your report comes with a recommended next step. We didn't want people to feel overwhelmed. We wanted them to feel equipped.\n\nStill in testing and still refining. But getting close. &#9203;&quot;,&quot;body_json&quot;:{&quot;type&quot;:&quot;doc&quot;,&quot;attrs&quot;:{&quot;schemaVersion&quot;:&quot;v1&quot;},&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;Part 5: First Look at the DoxxScore Site&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;We've been heads-down building DoxxScore for weeks. Today I want to share a first look at the website.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;A few design decisions that were important to us:&quot;}]},{&quot;type&quot;:&quot;bulletList&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;listItem&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;Clean and professional&quot;},{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;. Privacy is a serious topic. We avoided anything cutesy or gamified. The interface is built to communicate trust and clarity.&quot;}]}]},{&quot;type&quot;:&quot;listItem&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;Information hierarchy&quot;},{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;. When someone gets their results, the most important thing is: what's my risk level and what do I do about it? Everything else is secondary. The design reflects that.&quot;}]}]},{&quot;type&quot;:&quot;listItem&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;Actionable by default&quot;},{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;. Every finding in your report comes with a recommended next step. We didn't want people to feel overwhelmed. We wanted them to feel equipped.&quot;}]}]}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;Still in testing and still refining. But getting close. &#9203;&quot;}]}]},&quot;restacks&quot;:2,&quot;reaction_count&quot;:10,&quot;attachments&quot;:[{&quot;id&quot;:&quot;2ff473b2-8e40-441d-869d-0875a21a861c&quot;,&quot;type&quot;:&quot;image&quot;,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e0e6636f-dffe-481f-9804-40d9cf424269_668x531.png&quot;,&quot;imageWidth&quot;:668,&quot;imageHeight&quot;:531,&quot;explicit&quot;:false},{&quot;id&quot;:&quot;e3315a37-2754-4975-b6fe-89707329dec2&quot;,&quot;type&quot;:&quot;image&quot;,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8047196f-d88c-428d-9de6-c050f3770faf_618x518.png&quot;,&quot;imageWidth&quot;:618,&quot;imageHeight&quot;:518,&quot;explicit&quot;:false},{&quot;id&quot;:&quot;f928b951-15bd-4555-a028-b8f4c1cb77ca&quot;,&quot;type&quot;:&quot;image&quot;,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b64526f-7e36-4369-bce5-9a153f41cda1_646x517.png&quot;,&quot;imageWidth&quot;:646,&quot;imageHeight&quot;:517,&quot;explicit&quot;:false},{&quot;id&quot;:&quot;e0fbdafa-7c14-4fc3-ab01-61d871ffdc2a&quot;,&quot;type&quot;:&quot;image&quot;,&quot;imageUrl&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1fabe045-4281-41e6-97ff-3be989ccc6c5_627x449.png&quot;,&quot;imageWidth&quot;:627,&quot;imageHeight&quot;:449,&quot;explicit&quot;:false},{&quot;id&quot;:&quot;c25a000c-015c-4be2-8910-61def4e1e3ea&quot;,&quot;type&quot;:&quot;comment&quot;,&quot;publication&quot;:null,&quot;post&quot;:null,&quot;comment&quot;:{&quot;id&quot;:221958200,&quot;body&quot;:&quot;The Hardest Part of Building a Privacy Tool\n\nHere's the hard part about building a privacy-focused product, which probably isn&#8217;t all that surprising:\n\n\n\nYou constantly run into tension between the product you want to build and the principles behind it.\n\nDoxxScore is a tool that helps people understand their digital exposure. To do that effectively, we need to ask the right questions. That includes your online habits, your digital footprint, and the decisions you've made (or haven't made) about your personal information over the years.\n\nIn other words: \n\n\n\nwe need to do some of the same things that make people uncomfortable when data brokers do it.\n\nThe difference is:\n\n\n\n\n\nconsent\n\n\n\ntransparency\n\n\n\npurpose.\n\nUsers opt in. They know exactly what we're checking. And the entire point is to help them reduce their exposure, not profit from it.\n\nBut that tension forced us to think very carefully about how we handle data, what we store (as little as possible), and how to communicate what we're doing at every step.\n\nBuilding in the privacy space means your product has to live up to a higher standard. Your users are privacy-conscious by definition. They'll read your privacy policy. They'll ask hard questions.\n\nAnd they should.&quot;,&quot;body_json&quot;:{&quot;type&quot;:&quot;doc&quot;,&quot;attrs&quot;:{&quot;schemaVersion&quot;:&quot;v1&quot;},&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;marks&quot;:[{&quot;type&quot;:&quot;bold&quot;}],&quot;text&quot;:&quot;The Hardest Part of Building a Privacy Tool&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;Here's the hard part about building a privacy-focused product, which probably isn&#8217;t all that surprising:&quot;}]},{&quot;type&quot;:&quot;blockquote&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;You constantly run into tension between the product you want to build and the principles behind it.&quot;}]}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;DoxxScore is a tool that helps people understand their digital exposure. To do that effectively, we need to ask the right questions. That includes your online habits, your digital footprint, and the decisions you've made (or haven't made) about your personal information over the years.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;In other words: &quot;}]},{&quot;type&quot;:&quot;blockquote&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;we need to do some of the same things that make people uncomfortable when data brokers do it.&quot;}]}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;The difference is:&quot;}]},{&quot;type&quot;:&quot;orderedList&quot;,&quot;attrs&quot;:{&quot;start&quot;:1,&quot;type&quot;:null},&quot;content&quot;:[{&quot;type&quot;:&quot;listItem&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;consent&quot;}]}]},{&quot;type&quot;:&quot;listItem&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;transparency&quot;}]}]},{&quot;type&quot;:&quot;listItem&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;purpose.&quot;}]}]}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;Users opt in. They know exactly what we're checking. And the entire point is to help them reduce their exposure, not profit from it.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;But that tension forced us to think very carefully about how we handle data, what we store (as little as possible), and how to communicate what we're doing at every step.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;Building in the privacy space means your product has to live up to a higher standard. Your users are privacy-conscious by definition. They'll read your privacy policy. They'll ask hard questions.&quot;}]},{&quot;type&quot;:&quot;paragraph&quot;,&quot;content&quot;:[{&quot;type&quot;:&quot;text&quot;,&quot;text&quot;:&quot;And they should.&quot;}]}]},&quot;publication_id&quot;:null,&quot;post_id&quot;:null,&quot;user_id&quot;:169760400,&quot;type&quot;:&quot;feed&quot;,&quot;date&quot;:&quot;2026-03-02T17:26:45.870Z&quot;,&quot;edited_at&quot;:&quot;2026-03-21T16:00:33.079Z&quot;,&quot;ancestor_path&quot;:&quot;&quot;,&quot;reply_minimum_role&quot;:&quot;everyone&quot;,&quot;media_clip_id&quot;:null,&quot;user&quot;:{&quot;id&quot;:169760400,&quot;name&quot;:&quot;Secrets of Privacy&quot;,&quot;handle&quot;:&quot;secretsofprivacy&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53778fb9-dd8e-4594-82d5-b49708bb0864_3214x2880.png&quot;,&quot;bio&quot;:&quot;Practical privacy for busy people. Cut your digital exposure, avoid common threats, and stack simple privacy wins.&quot;,&quot;profile_set_up_at&quot;:&quot;2023-09-18T19:21:06.695Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-03-10T17:28:13.530Z&quot;,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null},&quot;primary_publication&quot;:{&quot;id&quot;:1961031,&quot;subdomain&quot;:&quot;secretsofprivacy&quot;,&quot;custom_domain&quot;:&quot;www.secretsofprivacy.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;name&quot;:&quot;Secrets of Privacy&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;author_id&quot;:169760400,&quot;user_id&quot;:169760400,&quot;handles_enabled&quot;:false,&quot;explicit&quot;:false,&quot;is_personal_mode&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;pledges_enabled&quot;:false,&quot;ios_app_payments_enabled&quot;:true}},&quot;reaction_count&quot;:10,&quot;reactions&quot;:{&quot;&#10084;&quot;:10},&quot;restacks&quot;:2,&quot;restacked&quot;:false,&quot;children_count&quot;:1,&quot;user_bestseller_tier&quot;:null,&quot;userStatus&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null},&quot;user_primary_publication&quot;:{&quot;id&quot;:1961031,&quot;subdomain&quot;:&quot;secretsofprivacy&quot;,&quot;custom_domain&quot;:&quot;www.secretsofprivacy.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;name&quot;:&quot;Secrets of Privacy&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;author_id&quot;:169760400,&quot;user_id&quot;:169760400,&quot;handles_enabled&quot;:false,&quot;explicit&quot;:false,&quot;is_personal_mode&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;pledges_enabled&quot;:false,&quot;ios_app_payments_enabled&quot;:true},&quot;language&quot;:null,&quot;autotranslate_to&quot;:null,&quot;attachments&quot;:[{&quot;id&quot;:&quot;7b989b17-335e-4cb3-81e2-a763886cecf2&quot;,&quot;type&quot;:&quot;textlink&quot;,&quot;url&quot;:&quot;https://substack.com/@secretsofprivacy/note/c-220937042&quot;}]},&quot;trackingParameters&quot;:{&quot;item_primary_entity_key&quot;:&quot;c-221958200&quot;,&quot;item_entity_key&quot;:&quot;c-221958200&quot;,&quot;item_type&quot;:&quot;comment&quot;,&quot;item_comment_id&quot;:221958200,&quot;item_content_user_id&quot;:169760400,&quot;item_content_timestamp&quot;:&quot;2026-03-02T17:26:45.870Z&quot;,&quot;item_context_type&quot;:&quot;comment&quot;,&quot;item_context_type_bucket&quot;:&quot;&quot;,&quot;item_context_timestamp&quot;:&quot;2026-03-02T17:26:45.870Z&quot;,&quot;item_context_user_id&quot;:169760400,&quot;item_context_user_ids&quot;:[],&quot;item_can_reply&quot;:false,&quot;item_last_impression_at&quot;:null,&quot;impression_id&quot;:&quot;f44dea60-3d0e-4ed8-80cd-90c061d59d2c&quot;,&quot;followed_user_count&quot;:233,&quot;subscribed_publication_count&quot;:24,&quot;is_following&quot;:true,&quot;is_explicitly_subscribed&quot;:false,&quot;note_velocity_factor&quot;:0.985486645171,&quot;note_delay_seconds&quot;:85,&quot;note_notes_per_hour&quot;:5446.599876,&quot;item_current_reaction_count&quot;:10,&quot;item_current_restack_count&quot;:2,&quot;item_current_reply_count&quot;:1}}],&quot;name&quot;:&quot;Secrets of Privacy&quot;,&quot;user_id&quot;:169760400,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53778fb9-dd8e-4594-82d5-b49708bb0864_3214x2880.png&quot;,&quot;user_bestseller_tier&quot;:null,&quot;userStatus&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}}" data-component-name="CommentPlaceholder"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics.</em></p><div><hr></div><h5><strong>Disclaimer: None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.</strong></h5><ul><li><p>Privacy freedom is more affordable than you think. We tackle the top Big Tech digital services and price out privacy friendly competitors <a href="https://www.secretsofprivacy.com/p/from-free-to-freedom-how-much-it-costs-to-take-back-your-online-privacy">here</a>. The results may surprise you.</p></li><li><p>Check out our new, free <a href="https://tools.secretsofprivacy.com/username-generator">username generator</a> to help you create unique usernames for different accounts. Reusing usernames is convenient, but terrible for your privacy. This tool makes it easy to create unique usernames on the fly.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Secrets of Privacy&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Secrets of Privacy</span></a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[The Warning Email That Might Be a Scam]]></title><description><![CDATA[Booking.com confirmed a breach this week. Here's the most concerning part.]]></description><link>https://www.secretsofprivacy.com/p/booking-com-breach-warning-email-scam</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/booking-com-breach-warning-email-scam</guid><pubDate>Wed, 15 Apr 2026 01:20:47 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a7f87790-907a-4c18-a0c9-4e254b349541_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Booking.com sent out breach notification emails yesterday. Names, email addresses, phone numbers, and booking details were accessed by unauthorized third parties. No financial data was taken, and the company says the issue is now contained.</p><p>That&#8217;s the official summary. Here&#8217;s what the official summary doesn&#8217;t help you with.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0NC_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0NC_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png 424w, https://substackcdn.com/image/fetch/$s_!0NC_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png 848w, https://substackcdn.com/image/fetch/$s_!0NC_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png 1272w, https://substackcdn.com/image/fetch/$s_!0NC_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0NC_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png" width="535" height="355" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:355,&quot;width&quot;:535,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:22436,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/194121854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0NC_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png 424w, https://substackcdn.com/image/fetch/$s_!0NC_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png 848w, https://substackcdn.com/image/fetch/$s_!0NC_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png 1272w, https://substackcdn.com/image/fetch/$s_!0NC_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0d57a2c-fc4b-450e-8beb-ab775b9d8e24_535x355.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When a breach involves booking details specifically, the follow-on scam isn&#8217;t generic phishing. It&#8217;s targeted. </p><p>A scammer who knows your name, your hotel, and your travel dates can send you a WhatsApp message that reads exactly like something your accommodation would send. Or call you, reference your reservation, and tell you there&#8217;s a payment problem with your booking. </p><p>The message will be well-written and the details will be accurate. Add it all up and the urgency will feel legitimate.</p><p>And this isn&#8217;t a theoretical scenario. </p><p>In November 2025, researchers at Sekoia documented a campaign in which attackers who had stolen hotel staff credentials used that access to contact guests over WhatsApp and email, referencing their real reservation details. The cover story was that a security issue had come up during verification of their banking details, and that confirming their information was a procedure Booking.com used to protect against cancellations. Victims who followed the link landed on a fake payment page built to look like the real thing.</p><p>The current breach didn&#8217;t involve hotel account access (thankfully). But the same logic applies: an attacker who already knows your name, your hotel, and your travel dates doesn&#8217;t need to compromise anything else to make an approach convincing.</p><p>The disorienting part is that the breach notification email itself looks like the kind of thing scammers send. Plenty of people receiving a legitimate email from <a href="mailto:noreply@booking.com">noreply@booking.com</a> this week will reasonably wonder whether to trust it. Reasonably so because a decade of phishing awareness training has taught people to distrust exactly this kind of message.</p><p>The actual risk hierarchy here is worth being clear about. On the positive side, the exposed data cannot be used to make purchases or drain accounts directly. What it can do is make someone more likely to hand over payment details voluntarily, because the person asking seems to already know things only Booking.com would know.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/booking-com-breach-warning-email-scam?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/booking-com-breach-warning-email-scam?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p><strong>One thing worth doing now:</strong> If you received a breach notification, or if you have an upcoming Booking.com reservation, treat any inbound contact claiming to be from Booking.com or from your accommodation as suspicious by default. That means phone calls, WhatsApp messages, and emails asking you to update payment details or &#8220;secure&#8221; your booking. If something seems urgent, navigate to booking.com directly by typing the URL and handle it from your account there. Don&#8217;t call back numbers from messages you received. Look up the number yourself.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qsn5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qsn5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qsn5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qsn5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qsn5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qsn5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59764,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/194121854?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qsn5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qsn5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qsn5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qsn5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F399081e4-09c2-4315-8ade-93227e5d11ea_500x500.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Booking.com says it has reset PINs for affected reservations, which is a reasonable containment step. What they haven&#8217;t said is how many reservations were affected or how the access happened. That opacity is frustrating, and it&#8217;s also a pattern for them: the company was fined &#8364;475,000 by Dutch regulators in 2021 for notifying authorities too late after a previous breach.</p><p>There&#8217;s a structural question buried in all of this. Travel platforms collect a surprising amount of contextual detail about where you&#8217;re going, when, with whom, and what you&#8217;ve requested. That data is operationally necessary in the short term. Whether it needs to be retained as long as it typically is, in the form it&#8217;s stored, is a question the industry hasn&#8217;t been forced to answer seriously yet.</p><p>If you&#8217;ve had a similar experience with scam follow-up after a travel booking, I&#8217;d be curious to hear about it. Reply to this email.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics.</em></p><div><hr></div><h5><strong>Disclaimer: None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.</strong></h5><ul><li><p>Privacy freedom is more affordable than you think. We tackle the top Big Tech digital services and price out privacy friendly competitors <a href="https://www.secretsofprivacy.com/p/from-free-to-freedom-how-much-it-costs-to-take-back-your-online-privacy">here</a>. The results may surprise you.</p></li><li><p>Check out our new, free <a href="https://tools.secretsofprivacy.com/username-generator">username generator</a> to help you create unique usernames for different accounts. Reusing usernames is convenient, but terrible for your privacy. This tool makes it easy to create unique usernames on the fly.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Secrets of Privacy&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Secrets of Privacy</span></a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[LinkedIn Is Reading Your Browser. Chrome Let It In.]]></title><description><![CDATA[The BrowserGate scandal has a simple fix that most people won't take.]]></description><link>https://www.secretsofprivacy.com/p/linkedin-browsergate-chrome-extensions</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/linkedin-browsergate-chrome-extensions</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Thu, 09 Apr 2026 11:06:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/560a09e0-a33c-4f9a-9d10-1593979278be_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Every time you visit LinkedIn in Google Chrome, a hidden script silently inventories your installed browser extensions. It probes for over 6,000 of them. </p><p>The results are quietly sent back to LinkedIn&#8217;s servers for processing and data mining. None of this is in LinkedIn&#8217;s privacy policy.</p><p>This is BrowserGate, a detailed investigation published last week by Fairlinked e.V., a European association of commercial LinkedIn users. BleepingComputer independently confirmed the scanning behavior through its own testing.</p><p>LinkedIn calls it a security measure. The rest of us call it covert surveillance of a billion users&#8217; browsing behavior at industrial scale. BrowserGate is a bad look for Microsoft owned LinkedIn and reinforces their poor privacy tactics. </p><p>But there&#8217;s a larger issue here beyond LinkedIn. And that is Google Chrome&#8217;s role, which makes this whole scheme possible (and all the similar ones out there you don&#8217;t know about yet). </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>What LinkedIn Can Actually Learn From Your Extensions</strong></h2><p>A list of browser extensions sounds like dry technical data. It isn&#8217;t.</p><p>Some of the extensions on LinkedIn&#8217;s scan list may indicate religious beliefs, political views, health conditions, or whether a user is actively seeking employment. </p><blockquote><p>The investigation found 509 job search tools on the list, including extensions for Indeed, Glassdoor, and Monster. If you&#8217;re quietly browsing jobs while your current employer can still see your profile, LinkedIn may already know.</p></blockquote><p>The list also includes extensions that identify practicing Muslims, tools built for neurodivergent users, and partisan news filters that reveal political leanings. Under EU law, this is special-category data. Collecting it without explicit consent is prohibited, not just discouraged.</p><p>Perhaps most interesting, LinkedIn scans for over 200 products that directly compete with its own sales tools, including Apollo, Lusha, and ZoomInfo. Because LinkedIn knows each user&#8217;s employer, it can map which companies use which competitor products. LinkedIn knows your real name, your job title, and where you work. When it spots a competitor&#8217;s tool in your browser, it doesn&#8217;t just know you have it. It knows your company has it. This data is extremely valuable. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/linkedin-browsergate-chrome-extensions?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/linkedin-browsergate-chrome-extensions?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2><strong>This is a Google Chrome Problem</strong></h2><p>Google built Chrome, and Google&#8217;s business model is advertising. </p><p>Chrome is the most widely used browser in the world, which means the data it makes available to websites (and to Google itself) flows at enormous scale. Google uses Chrome browsing data to inform its ad targeting systems. It has repeatedly introduced features that privacy advocates pushed back on, including a tracking system called the Privacy Sandbox that replaced third-party cookies not by eliminating tracking, but by moving it into the browser itself. Chrome still doesn&#8217;t block third-party tracking cookies by default, something Firefox, Brave, and Safari have done for years.</p><p>The extension architecture that makes LinkedIn&#8217;s scanning possible is a Chrome-specific design. Firefox and Safari expose extensions differently, which is why the scan doesn&#8217;t work there. </p><p>LinkedIn&#8217;s script actually checks whether you&#8217;re using Chrome before it fires. If you&#8217;re not using Chrome, nothing happens. </p><p>Now LinkedIn didn&#8217;t single out Chrome users. Chrome was simply the only browser where the technique works, and it covers roughly two thirds of all web traffic. That combination of architecture and reach is what made BrowserGate possible.</p><p>The scan list in this case started at 38 extensions in 2017. As is true with most privacy intrusions, it quickly grew. LinkedIn&#8217;s scanning now covers more than 6,000. Nearly a decade of growth, all enabled by the same Chrome design decisions that Google has never had much incentive to change. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!O_Zn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!O_Zn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png 424w, https://substackcdn.com/image/fetch/$s_!O_Zn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png 848w, https://substackcdn.com/image/fetch/$s_!O_Zn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png 1272w, https://substackcdn.com/image/fetch/$s_!O_Zn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!O_Zn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png" width="508" height="491" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:491,&quot;width&quot;:508,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:418989,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/193482379?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!O_Zn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png 424w, https://substackcdn.com/image/fetch/$s_!O_Zn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png 848w, https://substackcdn.com/image/fetch/$s_!O_Zn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png 1272w, https://substackcdn.com/image/fetch/$s_!O_Zn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fa087d-8e10-48f4-b74c-0ae31d348f4b_508x491.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>So Which Browser Should You Use?</strong></h2><p>If you switch from Google Chrome to Firefox or Safari, LinkedIn&#8217;s scanning script simply doesn&#8217;t run. That&#8217;s the cleanest fix, though not our recommendation. </p><p>Brave is also a meaningful upgrade over Google Chrome. Now Brave detractors will tell you that Brave is a chromium based browser, which is true. But that&#8217;s a misleading story. </p><p>Yes, Brave is built on the same underlying engine as Chrome, so LinkedIn&#8217;s script does target it. But Brave blocks the tracking endpoints where the collected data gets sent. A Brave privacy engineer confirmed this publicly, and even told users they could verify it themselves by opening LinkedIn in Brave and watching the DevTools network tab. The data collection is interrupted before it leaves your browser.</p><p>So what&#8217;s the practical solution hierarchy here? Firefox or Safari stops the scan entirely. Brave stops the data from being transmitted. Whichever browser you choose, you&#8217;re in a substantially better position than Google Chrome users.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Mdlk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Mdlk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png 424w, https://substackcdn.com/image/fetch/$s_!Mdlk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png 848w, https://substackcdn.com/image/fetch/$s_!Mdlk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png 1272w, https://substackcdn.com/image/fetch/$s_!Mdlk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Mdlk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png" width="519" height="161" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:161,&quot;width&quot;:519,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:25925,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/193482379?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6554c162-5120-4f35-97e9-517240c204b4_839x280.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Mdlk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png 424w, https://substackcdn.com/image/fetch/$s_!Mdlk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png 848w, https://substackcdn.com/image/fetch/$s_!Mdlk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png 1272w, https://substackcdn.com/image/fetch/$s_!Mdlk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F95d93e93-f805-4578-858d-13f5f5d4e752_519x161.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2><strong>Our Recommendation on What You Can Do Right Now</strong></h2><p><a href="https://brave.com/">Brave </a>is our recommended primary browser, and BrowserGate is a good illustration of why. </p><p>While Brave is built on the same underlying engine as Chrome, Brave blocks the tracking endpoints where the collected data gets sent. And in the grand scheme of things, Brave is the best overall privacy browser around. The reasons for that deserve a separate post, which is in our queue. </p><p>Firefox stops the scan from running at all, since LinkedIn&#8217;s script checks for Chrome&#8217;s architecture before it fires. But as regular readers know, we don&#8217;t recommend Firefox as a primary browser since they&#8217;ve strayed from their privacy first ways. But keeping it installed and using it as a dedicated browser for sites like LinkedIn is a reasonable approach. Either way, Firefox is a better choice than Google Chrome for anything privacy-sensitive.</p><p>The bottom line: </p><blockquote><p>if you&#8217;re using Google Chrome as your primary browser, you&#8217;re exposed to this LinkedIn scheme and to a long list of similar techniques that Chrome&#8217;s architecture enables. Switching to Brave costs you nothing and fixes the problem. </p></blockquote><p>Switching browsers is one of the easiest first steps toward removing Google from your daily life entirely. If you want a full roadmap for doing that, I put one together, and it covers the browser switch and everything beyond it. Paid annual subscribers get it for free but everyone else can get it for 20% off <a href="https://secretsofprivacy.gumroad.com/l/degoogle/9cyd9j0">here</a>. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://secretsofprivacy.gumroad.com/l/degoogle/9cyd9j0" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VqVM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png 424w, https://substackcdn.com/image/fetch/$s_!VqVM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png 848w, https://substackcdn.com/image/fetch/$s_!VqVM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png 1272w, https://substackcdn.com/image/fetch/$s_!VqVM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VqVM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png" width="338" height="437.5892857142857" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1885,&quot;width&quot;:1456,&quot;resizeWidth&quot;:338,&quot;bytes&quot;:3005196,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://secretsofprivacy.gumroad.com/l/degoogle/9cyd9j0&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/193482379?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VqVM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png 424w, https://substackcdn.com/image/fetch/$s_!VqVM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png 848w, https://substackcdn.com/image/fetch/$s_!VqVM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png 1272w, https://substackcdn.com/image/fetch/$s_!VqVM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda36d4d4-6be3-4b31-a45c-15efb1fd463d_1545x2000.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For further reading on the technical aspect of BrowserGate, check out this post from our friend Digital Mark: </p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:193104546,&quot;url&quot;:&quot;https://digitalmark.substack.com/p/the-linkedin-panopticon&quot;,&quot;publication_id&quot;:4727497,&quot;publication_name&quot;:&quot;Digital-Mark&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!mMvr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b6d4371-c459-4f32-af1f-3d2d542bc21d_499x499.png&quot;,&quot;title&quot;:&quot;The LinkedIn Panopticon&quot;,&quot;truncated_body_text&quot;:&quot;SPECIAL ANNIVERSARY BULLETIN: 04.03.2026&quot;,&quot;date&quot;:&quot;2026-04-03T21:02:25.052Z&quot;,&quot;like_count&quot;:54,&quot;comment_count&quot;:11,&quot;bylines&quot;:[{&quot;id&quot;:333383167,&quot;name&quot;:&quot;Digital-Mark&quot;,&quot;handle&quot;:&quot;digitalmark&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!s8gg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2566e681-5f29-4aa8-9e59-57c290adfe51_499x499.jpeg&quot;,&quot;bio&quot;:&quot;Defensive Infrastructure &amp; GRC. I design hardened systems that survive breach conditions, translating GDPR/Infosec compliance into real-world execution. While others analyze the news, my clients execute under breach conditions.&quot;,&quot;profile_set_up_at&quot;:&quot;2025-04-15T16:02:19.965Z&quot;,&quot;reader_installed_at&quot;:&quot;2025-04-15T18:21:03.113Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:4822487,&quot;user_id&quot;:333383167,&quot;publication_id&quot;:4727497,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:4727497,&quot;name&quot;:&quot;Digital-Mark&quot;,&quot;subdomain&quot;:&quot;digitalmark&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Get my monthly cybersecurity playbooks that teach you how to personally shield yourself from hackers &amp; scammers, while giving you the expert-level knowledge to build professionally bulletproof GRC programs.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b6d4371-c459-4f32-af1f-3d2d542bc21d_499x499.png&quot;,&quot;author_id&quot;:333383167,&quot;primary_user_id&quot;:333383167,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2025-04-15T16:03:08.875Z&quot;,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;Digital-Mark&quot;,&quot;founding_plan_name&quot;:&quot;Founding Members&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;enabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false,&quot;logo_url_wide&quot;:null}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://digitalmark.substack.com/p/the-linkedin-panopticon?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!mMvr!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b6d4371-c459-4f32-af1f-3d2d542bc21d_499x499.png" loading="lazy"><span class="embedded-post-publication-name">Digital-Mark</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">The LinkedIn Panopticon</div></div><div class="embedded-post-body">SPECIAL ANNIVERSARY BULLETIN: 04.03.2026&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">20 days ago &#183; 54 likes &#183; 11 comments &#183; Digital-Mark</div></a></div><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics.</em></p><div><hr></div><h5><strong>Disclaimer: None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.</strong></h5><ul><li><p>Privacy freedom is more affordable than you think. We tackle the top Big Tech digital services and price out privacy friendly competitors <a href="https://www.secretsofprivacy.com/p/from-free-to-freedom-how-much-it-costs-to-take-back-your-online-privacy">here</a>. The results may surprise you.</p></li><li><p>Check out our new, free <a href="https://tools.secretsofprivacy.com/username-generator">username generator</a> to help you create unique usernames for different accounts. Reusing usernames is convenient, but terrible for your privacy. This tool makes it easy to create unique usernames on the fly.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[They Researched Their Victims on Zillow Before Kicking Down the Door]]></title><description><![CDATA[Organized burglary crews are using publicly available data to stalk and rob homeowners. The privacy gaps they exploit are ones most people share.]]></description><link>https://www.secretsofprivacy.com/p/digital-casing-burglary-ring-privacy</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/digital-casing-burglary-ring-privacy</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Wed, 08 Apr 2026 01:18:42 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/0c2fcf69-0189-4726-a3b7-bae896de1cb8_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In December 2024, a home in Cascade Township, Michigan was burglarized while the owners were at work. Hundreds of thousands of dollars in cash, jewelry, and personal documents were taken.</p><p>Initially it looked like a one-off crime. Turns out it wasn&#8217;t. </p><p>Federal investigators eventually connected that break-in to at least 19 other burglaries across the United States, spanning both coasts, with total losses exceeding $1.6 million. Ten suspects were arrested in Michigan, California, New Jersey, and Wisconsin. According to federal court documents, the group had conducted weeks of surveillance on each target, researching victims through internet searches, open-source databases, and social media to study the layouts of their homes and identify items of value.</p><p>They didn&#8217;t pick their targets randomly. They built profiles on them, using tools that are freely available to anyone with an internet connection.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>The Digital Casing Playbook</h2><p>Think of traditional burglary as a physical operation. A thief drives through a wealthy neighborhood, looks for an unlocked door or an empty driveway, and takes their chances.</p><p>What federal prosecutors described in this case is fundamentally different. It&#8217;s a research operation that follows a repeatable playbook, one I&#8217;d call &#8220;digital casing.&#8221;</p><p>The playbook works in four stages.</p><p><strong>Stage 1 &#8212; Identify.</strong> Find a target through business directories, social media, or community visibility. In this case, the group focused on immigrant business owners, particularly those running restaurants, jewelry stores, and other enterprises where cash and gold might be kept at home.</p><p><strong>Stage 2 &#8212; Locate.</strong> Use people-search websites, open-source databases, and property records to connect a business owner&#8217;s name to a home address. These sites aggregate data from voting registries, property filings, motor vehicle records, and more. Many provide a home address for free.</p><p><strong>Stage 3 &#8212; Surveil.</strong> Study the home using real estate listing photos (which often remain online for years after a sale), Google Street View, and social media posts that reveal layouts, valuables, routines, and travel patterns. In one case tied to this ring, a neighbor of a victim in Kentucky found a camera hidden in the bushes, rigged with fake foliage and a wireless hotspot.</p><p><strong>Stage 4 &#8212; Execute.</strong> Time the break-in using GPS trackers placed on vehicles, knowledge of the family&#8217;s schedule, and even estimates of local police response times.</p><p>This four-stage process is what transformed a burglary into something closer to an intelligence operation. And every tool used in stages 1 through 3 is legal, commercially available, and accessible from a phone right now.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4sSi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4sSi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!4sSi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!4sSi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!4sSi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4sSi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:97122,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/191930211?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4sSi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!4sSi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!4sSi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!4sSi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06ea63c5-ea99-4148-80d0-72ea3d430327_1080x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/digital-casing-burglary-ring-privacy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/digital-casing-burglary-ring-privacy?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>This is Not an Isolated Case</h2><p>The Kent County case is part of a much larger pattern. The FBI has identified what it calls &#8220;South American Theft Groups&#8221; (SATGs) as a significant and growing criminal threat. These aren&#8217;t a single organization. According to Kent County Sheriff&#8217;s Sgt. Scott Dietrich, there are &#8220;tens, maybe hundreds of these groups all over the United States&#8221; that target specific people or specific things. (<a href="https://www.themidwesterner.news/2026/02/kent-county-burglary-leads-to-arrests-of-10-illegal-aliens-in-south-american-theft-group/">source</a>)</p><p>The scope is larger than you would think.</p><p>In Houston, law enforcement linked over 60 home burglaries to SATG-connected crews. West University Place Police Chief Gary Ratliff told Fox News Digital that these groups used signal jammers to disable Wi-Fi security cameras and alarm systems during break-ins, rendering wireless home security effectively useless. (<a href="https://www.foxnews.com/us/organized-south-american-crime-group-burglarizes-over-60-high-end-houston-area-homes-targeting-designer-goods">source</a>)</p><p>A separate Chilean burglary ring targeted the homes of professional athletes, including Patrick Mahomes, Travis Kelce, and Joe Burrow, using public social media posts and game schedules to time their break-ins for when the players were away. The FBI released a podcast episode in February 2025 specifically warning about this tactic ahead of the Super Bowl, noting that SATGs use &#8220;a combination of internet research, surveillance, and commercially available camera and tracking technologies to scope out their targets.&#8221; (<a href="https://www.fbi.gov/video-repository/inside-the-fbi-intercepting-the-south-american-theft-group-threat/view">source</a> and <a href="https://www.police1.com/investigations/thinking-like-a-criminal-how-osint-can-take-your-investigations-further">source</a>)</p><p>In Pennsylvania, a theft ring targeting Asian business owners led to six convictions, with suspects sentenced to up to 10 years in prison. (<a href="https://www.timesherald.com/2025/10/20/multi-county-burglary-spree-lands-south-american-theft-ring-member-in-prison/">source</a>)</p><p>And police in Riverside, California have confirmed that detectives routinely find Zillow and Redfin searches on phones seized from arrested burglary suspects. (<a href="https://www.foxnews.com/us/new-threat-facing-homeowners-whose-properties-featured-online">source</a>)</p><div class="pullquote"><p>That last detail deserves a moment. Zillow covers over 160 million homes. Listing photos, which often include every room, every entry point, and the exact locations of security cameras, frequently remain online for years after a home is sold. A former NYPD detective told Fox News Digital that modern burglars can now gather more useful intelligence from a real estate listing than they ever could sitting outside a house with binoculars. (<a href="https://www.foxnews.com/us/new-threat-facing-homeowners-whose-properties-featured-online">source</a>)</p></div><h2>This Is a Privacy Story More Than a Crime Story</h2><p>Most coverage of these burglary rings focuses on the criminal element. </p><p>And that&#8217;s understandable. </p><p>But the reason I&#8217;m writing about it is because the vulnerability these criminals exploited isn&#8217;t a broken lock or an open window. It&#8217;s the fact that an enormous amount of actionable intelligence about where you live, what you own, and when you&#8217;re home is publicly available by default.</p><p>Consider what a motivated person can assemble about you, right now, without breaking any laws.</p><p>From <strong>people-search sites</strong> like Spokeo, WhitePages, and BeenVerified, they can get your full name, home address, phone number, email, names of relatives, and sometimes estimated income or net worth. Many of these sites provide actionable results for free.</p><p>From <strong>real estate platforms</strong> like Zillow, Redfin, and Realtor.com, they can view interior photos of your home, floor plans, entry points, window types, and camera placements.</p><p>From <strong>Google Street View</strong>, they can study your property from multiple angles, check vehicles in your driveway, scope out fences and access points, and assess escape routes.</p><p>From <strong>social media</strong>, they can learn your daily routines, track when you&#8217;re on vacation, identify expensive purchases, and piece together your family structure.</p><p>From <strong>business registrations and licensing databases</strong>, they can connect you to a business and make assumptions about cash or inventory you might keep at home.</p><p>None of this requires hacking. None of it requires specialized skills. And critically, none of it requires the criminal to be anywhere near your home until they&#8217;re ready to act.</p><p>The court documents in the Kent County case put it plainly. </p><blockquote><p>These were not crimes of opportunity based on an unlocked door. Victims were targeted and stalked. The court noted that the &#8220;shadowing sense of fear that someone is coming after you is not unrealistic.&#8221;</p></blockquote><p>The immigrants who were victimized in this case had done most things right. They built businesses, followed the law, saved diligently. What they hadn&#8217;t done, and what almost nobody does, is manage their digital footprint. Because most people don&#8217;t realize there&#8217;s anything to manage.</p><p>That&#8217;s the gap. And it&#8217;s one that organized criminals have figured out how to exploit with industrial efficiency. The question is whether the rest of us are going to keep pretending this information is harmless just because it&#8217;s technically &#8220;public.&#8221;</p><p>The good news is that this is a solvable problem. Not perfectly, but meaningfully.</p><p>Most of the data these groups rely on during the &#8220;identify&#8221; and &#8220;locate&#8221; phases of their playbook can be removed or significantly reduced. And the surveillance tools they use during the &#8220;execute&#8221; phase, particularly Wi-Fi signal jammers, have known countermeasures that most homeowners haven&#8217;t implemented because they don&#8217;t know the threat exists.</p><p>Below I&#8217;ll walk you through exactly how to close each stage of the digital casing playbook, starting with the single most impactful step you can take in the next 10 minutes.</p><h2>How to Close Each Stage of the Digital Casing Playbook</h2><p>The digital casing playbook has four stages. Each one has countermeasures. I&#8217;ll walk through them in reverse order of difficulty, starting with the steps you can take today.</p>
      <p>
          <a href="https://www.secretsofprivacy.com/p/digital-casing-burglary-ring-privacy">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What Information Is Online About You? Here's How to Find Out]]></title><description><![CDATA[A step-by-step guide to auditing your digital footprint: what's out there, where to find it, and what to do about it.]]></description><link>https://www.secretsofprivacy.com/p/what-information-is-online-about-me</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/what-information-is-online-about-me</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Sat, 04 Apr 2026 11:34:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a23f7a97-fb7d-4c87-8cfc-58cc90e6dd87_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Most people assume they have a rough idea of what&#8217;s out there about them. A LinkedIn profile, maybe an old Facebook account, a few tagged photos.</p><p>Then they actually look, and it&#8217;s much more than that.</p><p>This guide walks you through exactly how to audit your own digital footprint: where to look, what you&#8217;ll find, and what to do about it.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>Start With a Basic Search (but do it right)</h2><p>The obvious first step is searching your own name in Google, DuckDuckGo, or Brave. But most people do this wrong and miss a lot.</p><p><strong>Do these searches:</strong></p><ul><li><p>Your full name in quotes: <code>"Jane Smith"</code></p></li><li><p>Your name plus your city: <code>"Jane Smith" Chicago</code></p></li><li><p>Your name plus your employer: <code>"Jane Smith" Acme Corp</code></p></li><li><p>Your name plus your phone number or email address</p></li><li><p>Your username, if you use the same one across sites</p></li></ul><p>Search on at least two engines. DuckDuckGo and Google surface different results, so start there first. What one buries, the other sometimes surfaces prominently.</p><p>Look past the first page. Most people stop at page one, but data brokers and people-search sites often rank lower and contain far more personal detail than anything on page one.</p><h2>Data Brokers Are the Real Problem</h2><p>Search engines show you what&#8217;s publicly indexed. Data brokers show you what&#8217;s been collected, aggregated, and sold.</p><p>Data brokers are companies that compile personal information from public records, purchase histories, loyalty programs, social media, voter registrations, property records, and dozens of other sources. They then package it into profiles they sell to marketers, landlords, employers, and anyone else willing to pay.</p><p>The profiles are detailed. A typical data broker entry might include your full name, current and past addresses, phone numbers, email addresses, relatives&#8217; names, estimated income, property ownership, court records, and social media handles &#8212; all on one page, available to anyone who searches.</p><p><strong>The major people-search sites to check first:</strong></p><ul><li><p>Spokeo</p></li><li><p>WhitePages</p></li><li><p>BeenVerified</p></li><li><p>Intelius</p></li><li><p>PeopleFinder</p></li><li><p>FastPeopleSearch</p></li><li><p>Radaris</p></li><li><p>MyLife</p></li></ul><p>Search your name on each one because what you find will vary. Some brokers have more complete records than others, and the data they hold updates at different rates.</p><p>This is uncomfortable for most people. The volume and specificity of what&#8217;s available is usually worse than expected.</p><h2>Check What Google Knows Specifically</h2><p>Beyond general search, Google maintains records of your activity across its own products. If you use Gmail, Google Maps, YouTube, or Android, there&#8217;s a detailed log of that activity attached to your account.</p><p>Go to <strong>myactivity.google.com</strong> and sign in. You&#8217;ll see a timeline of searches, sites visited, videos watched, locations visited, and more. This data often going back years.</p><p>Google also allows people to request removal of certain personal information from search results. If your phone number, home address, or other sensitive details appear in Google Search, you can submit a removal request at <strong>support.google.com/websearch/troubleshooter/9948276</strong>.</p><h2>Look at What Social Media Exposes, Including Accounts You Forgot About</h2><p>Social media platforms often expose more than people realize, especially when privacy settings drift from their defaults over time.</p><p><strong>Facebook:</strong> Check your profile as a non-friend or logged-out user. Go to your profile, click the three dots, and select &#8220;View As.&#8221; What&#8217;s visible may surprise you, and can include tagged photos, check-ins, and older posts are often more public than expected.</p><p><strong>LinkedIn:</strong> Your profile is typically fully public and indexed by search engines. Your connections list, employment history, education, and any posts or comments you&#8217;ve made are visible to anyone. LinkedIn is one of the most commonly harvested surfaces for scammers and data collectors because the information is both detailed and voluntarily provided.</p><p><strong>Instagram and Twitter/X:</strong> Both default to public. Old posts, location tags on photos, and comments under other people&#8217;s content all appear in search results.</p><p>Also think about accounts you may have created years ago and forgotten: old forums, Tumblr, Reddit, Disqus, Quora, and gaming platforms. Search your username across these. A username you&#8217;ve used consistently is one of the most reliable ways for someone to build a comprehensive profile of your activity online.</p><h2>Check Public Records</h2><p>A surprising amount of information is publicly available through government records:</p><ul><li><p><strong>Voter registration:</strong> In many US states, voter rolls are publicly accessible and include your name, address, date of birth, and party affiliation</p></li><li><p><strong>Property records:</strong> If you own property, your name, purchase price, and address are typically in public county records</p></li><li><p><strong>Court records:</strong> Civil and criminal court filings are often searchable online by name</p></li><li><p><strong>Business filings:</strong> If you&#8217;ve ever registered a business, LLC, or been listed as a registered agent, that information is typically in state records</p></li></ul><p>Many data brokers pull directly from these sources, which is why opting out of the broker itself doesn&#8217;t always prevent the information from resurfacing. The reason? They just re-pull from the original public record that never changes.</p><h2>What You&#8217;re Likely to Find</h2><p>After going through this process, most people discover some combination of the following:</p><ul><li><p>Current and past home addresses, sometimes going back decades</p></li><li><p>Phone numbers, including mobile numbers they never gave out publicly</p></li><li><p>Names of family members and their addresses</p></li><li><p>Estimated income and net worth ranges</p></li><li><p>A list of &#8220;associated&#8221; people (neighbors, relatives, former roommates)</p></li><li><p>Old email addresses</p></li><li><p>Court records, even minor ones</p></li><li><p>Photos pulled from social media, sometimes years old</p></li><li><p>URLs that you registered</p></li></ul><p>The goal of this audit isn&#8217;t to alarm you, rather it&#8217;s to give you an accurate picture of your actual exposure, rather than an assumed one.</p><h2>What to do About It</h2><p>Knowing what&#8217;s out there is step one. Step two is reducing it.</p><p>The highest-leverage moves, in order:</p><ol><li><p><strong>Opt out of the major data brokers.</strong> Most have opt-out processes, though they vary in difficulty and reliability. Some require ID verification, some require a written request, and some re-add your data after a period of time and need to be revisited.</p></li><li><p><strong>Tighten your social media privacy settings.</strong> Review what&#8217;s visible to non-connections and to search engines. Most platforms have a &#8220;view as public&#8221; option that shows you exactly what a stranger sees.</p></li><li><p><strong>Request Google removal</strong> for any personally identifying information that appears in search results.</p></li><li><p><strong>Use separate email addresses</strong> for different purposes so a data breach on one service doesn&#8217;t expose activity across others.</p></li><li><p><strong>Be selective with loyalty programs and apps</strong> that request location access. These are common data collection points.</p></li></ol><p>The honest answer is that a full cleanup takes time. The data broker opt-out process alone involves dozens of individual sites, each with its own process. But each step meaningfully reduces your exposure, and the high-leverage ones (like the major people-search sites) make an immediate difference.</p><p>If you want a structured path through all of this, including a step-by-step audit process, a data broker opt-out tracker with 75+ sites pre-loaded, and guides covering email privacy, LinkedIn, Apple settings, and more, the <a href="https://privacybundle.secretsofprivacy.com/">Secrets of Privacy Library</a> has everything in one place. <em>&#8220;Excellent content, really helpful and clear&#8221; - James Adams</em></p><div><hr></div><p><em>Published by Secrets of Privacy &#8212; practical privacy guidance for people who want real protection without going off-grid.</em></p>]]></content:encoded></item><item><title><![CDATA[Your Zoom Link Is a Public Invitation (Even When You Think It Isn't)]]></title><description><![CDATA[A company is turning public meeting links into AI podcasts without consent. Here's how to close the door on the major platforms.]]></description><link>https://www.secretsofprivacy.com/p/zoom-link-public-invitation-webinartv</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/zoom-link-public-invitation-webinartv</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Thu, 02 Apr 2026 10:14:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/83de3925-9c6f-42c9-a7aa-d5e3be1ea1c2_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Tom Rademacher runs online educational workshops. </p><p>He hosted a webinar on a sensitive topic and deliberately chose not to record it because the content was personal, the attendees were vulnerable, and he wanted no record to exist.</p><p>Weeks later, he received a cold email from a company called WebinarTV. It contained a direct link to his webinar session, which was now published as an AI-generated podcast episode on WebinarTV&#8217;s platform.</p><p>Rademacher hadn&#8217;t uploaded anything and hadn&#8217;t consented to the podcast creation. He hadn&#8217;t even recorded the webinar himself. </p><p>So what happened? </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><p>WebinarTV describes itself as &#8220;a search engine for the best webinars.&#8221; </p><p>What it actually does is scan the internet for publicly accessible Zoom meeting links, join those calls using bots or AI transcription tools, record the audio, and convert it into podcast content. The company then uses it as a sales pitch to the very people whose meetings it captured. Journalists at 404 Media found their own public event with the Freedom of Press Foundation listed on the platform without their knowledge or consent. (<a href="https://www.404media.co/this-company-is-secretly-turning-your-zoom-calls-into-ai-podcasts/">source</a>)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jge1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jge1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png 424w, https://substackcdn.com/image/fetch/$s_!Jge1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png 848w, https://substackcdn.com/image/fetch/$s_!Jge1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png 1272w, https://substackcdn.com/image/fetch/$s_!Jge1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jge1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png" width="481" height="398" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:398,&quot;width&quot;:481,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:53020,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/192425662?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jge1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png 424w, https://substackcdn.com/image/fetch/$s_!Jge1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png 848w, https://substackcdn.com/image/fetch/$s_!Jge1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png 1272w, https://substackcdn.com/image/fetch/$s_!Jge1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93fb6f3e-5949-4ffb-b1ab-1bcb03224613_481x398.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Zoom confirmed the activity is not the result of a vulnerability or security issue on its platform. (<a href="https://cybernews.com/ai-news/webinartv-zoom-podcast/">source</a>) The problem is the link itself and the settings controlled by the Zoom webinar creator. So no hacking. </p><h2>A Zoom Meeting Link is a Door With No Lock </h2><p>If that link is anywhere on the internet, such as embedded in a public calendar event, posted in a community forum, listed on an events page, it&#8217;s findable. WebinarTV&#8217;s bots scan for the &#8220;zoom.us/j/&#8221; string across public web pages, and if a link isn&#8217;t behind an authentication wall, it&#8217;s treated as public. (<a href="https://vocal.media/futurism/your-private-zoom-call-is-now-an-ai-podcast-the-rise-of-shadow-recording">source</a>) </p><p>The meeting being &#8220;private&#8221; in your mind means nothing if the link is public in practice. It&#8217;s the same logic as leaving your address on a public post and assuming only friends will show up.</p><p>The fix is the same across every major platform: </p><blockquote><p>stop treating the join link as the access control, and start requiring identity before entry.</p></blockquote><p><strong>Zoom:</strong> When scheduling a meeting in the Zoom web portal (not the desktop app), enable &#8220;Registration required&#8221; under the meeting settings. Set approval to &#8220;Manual&#8221; so you review each registrant before they receive a join link. Each approved participant gets a unique link tied to their registration, which means a generic link won&#8217;t get them in. This is the single most effective change you can make.</p><p><strong>Google Meet:</strong> In your Calendar invite, click the gear icon next to the Meet link and open Host controls. Set the meeting access type to &#8220;Trusted&#8221; or &#8220;Restricted,&#8221; then uncheck the box that says &#8220;Anyone with the meeting link can ask to join.&#8221; (<a href="https://workspaceupdates.googleblog.com/2025/06/google-meet-host-management-control-for-asking-to-join-a-meeting.html">source</a>) With that unchecked, only participants signed into their invited Google Account can enter. Bots attempting to knock via &#8220;Ask to join&#8221; are automatically denied without any action required by the host. (<a href="https://support.google.com/a/users/answer/11989526?hl=en">source</a>)</p><p><strong>Microsoft Teams:</strong> Before the meeting, open Meeting options and find &#8220;Who can bypass the lobby?&#8221; Set it to &#8220;People who were invited&#8221; so anyone who has the link but not an actual calendar invitation will wait in the lobby until you admit them. (<a href="https://learn.microsoft.com/en-us/microsoftteams/who-can-bypass-meeting-lobby">source</a>) Also disable the option that allows participants to forward the invitation, which closes a common secondary vector.</p><h2>One More Thing Worth Knowing </h2><p>CyberAlberta, a Canadian cybersecurity organization that investigated WebinarTV in depth, found that some access comes through AI note-taking browser extensions that users install voluntarily. These are extensions that quietly request calendar permissions and forward meeting details to the platform. (<a href="https://cyberalberta.ca/zooming-out-webinartvs-rampant-scraping-of-online-meetings">source</a>)</p><p>For individuals, the fix is straightforward: in Chrome, go to Settings &gt; Extensions and review what&#8217;s installed. For any extension with calendar or meeting access, check its permissions and remove anything you don&#8217;t actively use.</p><p>If you run a security or privacy program you may be rolling your eyes because you know that browser extensions are a major shadow IT problem. </p><p>Employees routinely install productivity and AI tools directly in the browser, grant them calendar and meeting access without a second thought, and IT often times never sees it happen. WebinarTV is an unusually visible consequence of that, but the underlying exposure is much broader because any extension with calendar permissions can see meeting links, attendee lists, and in some cases join URLs. </p><p>If you run a security program, the WebinarTV story is a useful conversation-starter for adjusting internal policies regarding browser extensions on corporate equipment. Browser extensions that touch calendar or meeting data should probably require explicit approval, not just user discretion. </p><p>Whether to ban web browser extensions all together is a conversation for another day. </p><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics.</em></p><div><hr></div><h5><strong>Disclaimer: None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.</strong></h5><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png" width="727" height="87" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:87,&quot;width&quot;:727,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33962,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/174034271?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">DeleteMe is our go to service for automatic removal of personal information from data broker sites. Click the affiliate link above for more info and to get 20% off.</figcaption></figure></div><ul><li><p>Privacy freedom is more affordable than you think. We tackle the top Big Tech digital services and price out privacy friendly competitors <a href="https://www.secretsofprivacy.com/p/from-free-to-freedom-how-much-it-costs-to-take-back-your-online-privacy">here</a>. The results may surprise you.</p></li><li><p>Check out our new, free <a href="https://tools.secretsofprivacy.com/username-generator">username generator</a> to help you create unique usernames for different accounts. Reusing usernames is convenient, but terrible for your privacy. This tool makes it easy to create unique usernames on the fly.</p></li><li><p>Do you own a Smart TV? If so, you won&#8217;t want to miss this reader fav post <strong>Smart TV Privacy Settings: How to Disable Tracking on Every Brand</strong>.</p></li></ul><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;b45699ab-4582-4d9f-9390-73ef7f126c80&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Smart TV Privacy Settings: How to Disable Tracking on Every Brand&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2025-09-17T01:13:36.498Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba945728-b80c-4596-bdc3-ad5149cebd2f_1200x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/smart-tv-privacy-settings&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:173689640,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:102,&quot;comment_count&quot;:16,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em>If you&#8217;re reading this but haven&#8217;t yet signed up, join for free (4.7K+ subscribers strong) and get our newsletter delivered to your inbox by subscribing here &#128071;</em></p>]]></content:encoded></item><item><title><![CDATA[You Didn't Give Them Your Phone Number. Here's How They Got It Anyway.]]></title><description><![CDATA[How a hidden layer of the ad industry connects your web visits to your phone number]]></description><link>https://www.secretsofprivacy.com/p/how-companies-get-your-phone-number</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/how-companies-get-your-phone-number</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Wed, 01 Apr 2026 01:16:12 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/effe375e-67df-4e8c-b8b8-d69d7098c73a_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Here&#8217;s a common question we see online quite a bit: </p><blockquote><p>&#8220;How are companies getting my phone number? I never gave it to them.&#8221;</p></blockquote><p>A recent example from a privacy forum illustrates the problem. </p><p>Someone recently visited the Samsung website for the first time, browsed a few phone models to compare prices, and left without adding anything to a cart or entering any information. The next day, Samsung called to ask why they hadn&#8217;t completed a purchase.</p><p>The person didn&#8217;t create an account, didn&#8217;t fill out a form and didn&#8217;t buy anything. He simply visited a website. </p><p>So how did Samsung get this guy&#8217;s phone number? </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!o0Xr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!o0Xr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png 424w, https://substackcdn.com/image/fetch/$s_!o0Xr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png 848w, https://substackcdn.com/image/fetch/$s_!o0Xr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png 1272w, https://substackcdn.com/image/fetch/$s_!o0Xr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!o0Xr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png" width="636" height="414" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:414,&quot;width&quot;:636,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:40743,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/191087761?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!o0Xr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png 424w, https://substackcdn.com/image/fetch/$s_!o0Xr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png 848w, https://substackcdn.com/image/fetch/$s_!o0Xr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png 1272w, https://substackcdn.com/image/fetch/$s_!o0Xr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80766cf7-4189-4b6b-bee3-d785f8b42d01_636x414.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The short answer is that he probably did give his number to them, just not to Samsung directly. The mechanism connecting those two facts is called <strong>identity resolution</strong>, and understanding it changes how you think about every form field you&#8217;ve ever filled out online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><p>You may recall that last month we ran a test on a free reverse phone lookup site. </p><p>We entered a family member&#8217;s phone number and got back his full name, home address, estimated income range, and a list of domain names he&#8217;d registered years ago and largely forgotten. We didn&#8217;t have to create an account or even make a payment. We typed in a 10-digit number and had detailed results a few seconds later. </p><p>That post was about what gets exposed once your phone number is in the data broker ecosystem. This situation is different and about how your number keeps getting passed around to companies even after you&#8217;ve done everything right.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;69510589-fa18-49bd-a714-177cbbd09212&quot;,&quot;caption&quot;:&quot;Last week an OSINT (Open Source Intelligence) account we follow on X posted a link to a website that does free reverse phone number lookups.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;We Searched a Phone Number on a Free Website. The Results Were More Detailed Than Expected.&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2026-03-04T02:17:14.366Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c5d4bb5c-2936-4938-bd33-62cdd968b929_1200x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/phone-number-osint-reverse-lookup-privacy&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:188501616,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:25,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h2><strong>What&#8217;s Actually Happening</strong></h2><p>When you visit a website, your browser sends a set of signals, such as your IP address, device type, browser version, and a collection of behavioral fingerprints that are surprisingly unique to you.</p><p>Most of that sounds familiar. What&#8217;s less understood is what happens to those signals next.</p><p>Companies like <a href="https://liveramp.com/">LiveRamp</a>, <a href="https://home.neustar/">Neustar</a>, and <a href="https://www.tapad.com/">Tapad</a> maintain what the industry calls &#8220;<strong>identity graphs</strong>&#8221;. Translated, that means databases linking device fingerprints, IP addresses, cookies, and mobile advertising IDs to real-world identifiers: names, email addresses, and phone numbers. </p><p>These graphs are built from years of data collected across millions of websites and apps. One company&#8217;s graph covers more than 260 million U.S. profiles.</p><p>When you visit a site carrying one of their tracking pixels, your signals get matched against that graph. If you ever entered your phone number into any form on any site carrying one of their trackers, such as a a checkout page, a loyalty program signup, a contact form, that number is now linked to your device. The site you&#8217;re visiting today can surface it, even if you&#8217;ve never interacted with that company before.</p><p>This is distinct from what session replay tools do (recording your keystrokes in real time, which we covered previously - see <a href="https://www.secretsofprivacy.com/p/session-replay-surveillance">here</a>) and from what reverse phone lookup sites do (serving your data to anyone who searches). </p><p>Identity resolution is the layer that feeds both of those systems. It&#8217;s also why opted-out data broker profiles keep reappearing a few weeks after removal.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zbr2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zbr2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!zbr2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!zbr2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!zbr2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zbr2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:95069,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/191087761?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zbr2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png 424w, https://substackcdn.com/image/fetch/$s_!zbr2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png 848w, https://substackcdn.com/image/fetch/$s_!zbr2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!zbr2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc43ef873-4116-4fa0-96f4-766227d08d3d_1080x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/how-companies-get-your-phone-number?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/how-companies-get-your-phone-number?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2><strong>The Phone Call is the Least Of It</strong></h2><p>Getting an unexpected phone call from a retailer is annoying. That&#8217;s the visible effect, and it&#8217;s the one that tends to generate Reddit threads.</p><p>What happens beneath the surface is considerably more significant.</p><blockquote><p>When identity resolution links your browsing behavior to your real phone number and name, it doesn&#8217;t just enable that call. It creates a behavioral record that is  attached to your actual identity. That could include a wide array of activities like what health symptoms you researched at 11pm, whether you spent time on a bankruptcy attorney&#8217;s site, what political content you engaged with, how often you visited a payday loan page. </p><p>That record flows into the same data broker ecosystem we covered in our reverse phone lookup post. From there, it becomes accessible to insurance underwriters, employers running background checks, lenders running risk models, and anyone else paying for enriched consumer profiles.</p></blockquote><p>The call is visible. The downstream use of the behavioral profile built in the process of identifying you is not. </p><p>There&#8217;s no notification, no audit trail, no way for most people to know what inferences have been drawn from their browsing history or how those inferences are affecting decisions made about them.</p><p>This is also why the standard privacy advice, such as opting out of data brokers, use incognito mode, clear your cookies, doesn&#8217;t address the actual problem. Incognito mode doesn&#8217;t prevent a site from running identity resolution scripts. Clearing cookies doesn&#8217;t erase your entry from an identity graph. And opting out of data brokers removes the current record but doesn&#8217;t stop the graph from re-linking your number to your device the next time you visit a tracked site.</p><h2><strong>One Thing You can Do Right Now</strong></h2><p>Stop using your primary phone number for anything outside trusted personal contacts and critical financial accounts. Every loyalty program, app signup, online order, and form gets a secondary number.</p><p>A Google Voice number works as a starting point (even if it does create a Google nexus). A prepaid SIM (a $5-10 card that reloads automatically) is more robust, since VoIP numbers are increasingly flagged by sites requiring verified numbers. </p><p>The secondary number can be handed out freely. Your real number stays out of the identity graphs, which means it stops accumulating behavioral data linked to your actual identity.</p><p>This is the correct upstream intervention. It&#8217;s why we recommend it in the reverse phone lookup post as a long-term protection strategy. Now you know the mechanism that makes it work.</p><p>The identity resolution industry is actively developing ways to maintain these graphs even as third-party cookies disappear. The infrastructure is expanding, not contracting. If you&#8217;ve wondered why your data broker profiles keep coming back after removal, or why a company seems to know more about you than you ever told them, this is the system responsible.</p><p>Reply and let us know: <strong>did you already suspect something like this was happening, or is this new information?</strong></p><div><hr></div><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics.</em></p><div><hr></div><h5><strong>Disclaimer: None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.</strong></h5><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png" width="727" height="87" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:87,&quot;width&quot;:727,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33962,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/174034271?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">DeleteMe is our go to service for automatic removal of personal information from data broker sites. Click the affiliate link above for more info and to get 20% off.</figcaption></figure></div><ul><li><p>Privacy freedom is more affordable than you think. We tackle the top Big Tech digital services and price out privacy friendly competitors <a href="https://www.secretsofprivacy.com/p/from-free-to-freedom-how-much-it-costs-to-take-back-your-online-privacy">here</a>. The results may surprise you.</p></li><li><p>Do you own a Smart TV? If so, you won&#8217;t want to miss this post from our three part series on how To make your smart TV less creepy.</p></li></ul><p><em>If you&#8217;re reading this but haven&#8217;t yet signed up, join for free (4.7K+ subscribers strong) and get our newsletter delivered to your inbox by subscribing here &#128071;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Two Men Just Pled Guilty to Hijacking Nearly 900 Women's Accounts. The Method Was Embarrassingly Simple.]]></title><description><![CDATA[Recovery codes have become the easiest way into your social media accounts. Two federal cases show exactly how it works.]]></description><link>https://www.secretsofprivacy.com/p/recovery-codes-new-passwords</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/recovery-codes-new-passwords</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Wed, 25 Mar 2026 00:22:03 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c338cb11-b95b-460a-bb53-57f318bd5caa_1200x630.gif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In February 2024, we wrote a post (provocatively) titled <a href="https://www.secretsofprivacy.com/p/avoiding-digital-stds">Avoiding Digital STDs</a> about a colleague whose Facebook account was hijacked to run a crypto scam. </p><p>That post created a hypothetical scenario about a woman we called &#8220;Tina&#8221; whose Instagram account gets taken over by a bad actor who then uses her real photos for exploitation.</p><p>We wrote that as a warning of where things were heading. As it turns out, a federal court case proved us right almost detail for detail.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><p>In late February, a 22-year-old Alabama man named Jamarcus Mosley pled guilty to computer fraud, extortion, and cyberstalking after hijacking the social media accounts of hundreds of young women, including minors, over a three-year period.</p><p>And shortly before that, a 27-year-old Illinois man named Kyle Svara pled guilty to hacking nearly 600 women&#8217;s Snapchat accounts. He sold and traded their stolen private photos online and even offered his hacking services on Reddit.</p><p>Two men. Two guilty pleas. Nearly 900 victims combined. And neither one used any sophisticated hacking tools.</p><h2>The Back Door to Your Account</h2><p>Both of these cases relied on the same basic approach, and it&#8217;s worth understanding because it does not require technical skill. It&#8217;s social engineering, which means <em>manipulating </em>people into giving up information they shouldn&#8217;t.</p><p>Think of it this way. </p><p>Your social media account has two doors. The front door is your password. </p><p>Most people have gotten reasonably good at locking that one (or at least they know they should). The back door is your account recovery system, the process platforms use to help you get back in when you&#8217;re locked out. That back door is now a huge target.</p><p>In both federal cases, the attackers didn&#8217;t crack passwords. They tricked victims into handing over the keys to the back door.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/recovery-codes-new-passwords?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/recovery-codes-new-passwords?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>Two Cases, One Playbook</h2><h3><strong>The Mosley Case</strong></h3><p>According to the U.S. Attorney&#8217;s Office for the Northern District of Georgia, Mosley ran his scheme from April 2022 through May 2025. His method was straightforward. He would use an already-compromised account belonging to a victim&#8217;s actual friend to reach out on Instagram or Snapchat. Because the message appeared to come from someone the victim knew and trusted, the request seemed legitimate.</p><p>In one case, Mosley used an Instagram account belonging to a 20-year-old Georgia woman&#8217;s high school friend. Pretending to be that friend, he asked the woman to help him recover &#8220;his&#8221; Snapchat account. She provided a recovery passcode, not realizing it was for her own account. Mosley used it to take full control, accessed her private images and videos, and then threatened to post them unless she complied with his demands.</p><p>When an 18-year-old Florida woman refused his demands for additional explicit photos, Mosley followed through on his threat and posted her stolen private photos publicly. He also targeted a 17-year-old in Illinois, tricking her into sharing her Snapchat &#8220;My Eyes Only&#8221; passcode. He then used her compromised account to contact her 13-year-old sister, sending a Snapchat map screenshot to show he knew where the younger girl lived.</p><p>The case was investigated by the Kennesaw Police Department and the U.S. Secret Service.</p><p><em>(Sources: <a href="https://www.bleepingcomputer.com/news/security/alabama-man-pleads-guilty-to-hacking-extorting-hundreds-of-women/">BleepingComputer</a>, <a href="https://www.wsbtv.com/news/local/cobb-county/man-pleads-guilty-extorting-cyberstalking-young-people-including-1-georgia/JDNLK2DEFNEBTJZR5ZPE7OPNU4/">WSB-TV</a>, <a href="https://www.fox5atlanta.com/news/alabama-man-extorting-kennesaw-woman">FOX 5 Atlanta</a>, <a href="https://www.mdjonline.com/news/police_fire/online-predator-pleads-guilty-to-hacking-social-media-accounts-following-kennesaw-investigation/article_f998b957-6075-4fa6-af2c-33b685c55825.html">Marietta Daily Journal</a>)</em></p><h3><strong>The Svara Case</strong></h3><p>Svara&#8217;s operation ran from May 2020 through February 2021. He took a slightly different approach.</p><p>Instead of impersonating friends, he posed as a Snapchat support representative. When his unauthorized login attempts triggered Snapchat&#8217;s security system to send verification codes to victims&#8217; phones, he would text the victims using a free VoIP service and ask them to share those codes. He contacted over 4,500 women. Roughly 570 provided the codes, and he accessed at least 59 of their accounts to download private images.</p><p>Svara then sold or traded the stolen photos on internet forums and advertised on Reddit that he could hack Snapchat accounts on demand. One of his paying clients was Steve Waithe, a former Northeastern University track and field coach who hired Svara to hack the accounts of student athletes he had coached. Waithe was sentenced to five years in federal prison in 2024 for cyberstalking and sextortion.</p><p><em>(Sources: <a href="https://therecord.media/illinois-man-pleads-guilty-snapchat-nude-photo-hacks">The Record</a>, <a href="https://www.cbsnews.com/chicago/news/oswego-man-pleads-guilty-hacking-snapchat-steal-sell-nude-photos/">CBS Chicago</a>, <a href="https://www.usnews.com/news/top-news/articles/2026-02-04/illinois-man-admits-to-hacking-snapchat-accounts-to-steal-nude-photos">Reuters via U.S. News</a>, <a href="https://www.bleepingcomputer.com/news/security/man-pleads-guilty-to-hacking-nearly-600-womens-snapchat-accounts/">BleepingComputer</a>)</em></p><h2>This Is a Pattern, Not an Anomaly</h2><p>These two cases are not outliers. They are part of a well-documented surge.</p><p>The FBI has reported a significant increase in sextortion cases involving minors in recent years. In fact, we wrote a heartbreaking post earlier in the year about a teen boy who took his own life because of a sextortion scam. See here: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;aebca620-63d0-43fd-96d6-012dc2fdcc6b&quot;,&quot;caption&quot;:&quot;On November 6, 2025, fifteen-year-old Bryce Tate came home from the gym, grabbed a snack, and shot some hoops in the driveway. At 4:37 PM, he received a text from an unknown number.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;How Scammers Studied a 15-Year-Old's Public Profile (Then Destroyed His Life in 3 Hours)&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2026-01-28T02:23:15.783Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7551ba4-289b-4037-84b2-a7dc668a9a03_1200x630.gif&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/sextortion-parents-guide&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:182462266,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:25,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>But between October 2021 and March 2023 alone, the FBI and Homeland Security Investigations received over 13,000 reports of online financial sextortion of minors, involving at least 12,600 victims. At least 20 of those victims died by suicide. The FBI observed a 20% increase in financially motivated sextortion reports involving minors in a six-month period compared to the prior year.</p><p>The National Center for Missing &amp; Exploited Children (NCMEC) reported that online enticement reports increased by more than 300% between 2021 and 2023. Research published by Thorn in late 2025 found that one in five teens reported experiencing sextortion.</p><p>And on Safer Internet Day in February 2026, just weeks before the Mosley plea, the FBI issued yet another public warning about the growing threat.</p><p><em>(Sources: <a href="https://www.fbi.gov/contact-us/field-offices/nashville/news/sextortion-a-growing-threat-targeting-minors">FBI Nashville</a>, <a href="https://www.fbi.gov/contact-us/field-offices/kansascity/news/on-safer-internet-day-fbi-warns-about-the-dangers-of-sextortion-schemes-against-minors">FBI Kansas City / Safer Internet Day 2026</a>, <a href="https://ourrescue.org/resources/child-exploitation/sextortion/online-sextortion-targeting-teens-surges-nationwide">NCMEC via Our Rescue</a>, <a href="https://www.thorn.org/blog/the-state-of-sextortion-in-2025/">Thorn</a>)</em></p><h2>Recovery Codes Are the New Passwords</h2><p>What stands out about these two cases is not that they happened. We know sextortion is a rapidly growing criminal activity. Rather, it&#8217;s how these cases happened.</p><p>Neither Mosley nor Svara needed to write a single line of code. They didn&#8217;t exploit a software vulnerability. They didn&#8217;t deploy malware. They used the platform&#8217;s own account recovery process as a weapon. Mosley impersonated friends. Svara impersonated Snapchat support. Both convinced real people to hand over recovery codes voluntarily.</p><p>This is the evolution we flagged in the 2024 article. Back then, the dominant threat was credential stuffing, where attackers take stolen username/password combos from data breaches and try them on other platforms. That&#8217;s still a problem, and password managers remain essential protection against it.</p><p>But attackers have adapted. </p><p>As more people adopt stronger passwords and two-factor authentication, the attack surface has shifted to the recovery process itself. Recovery codes bypass your password entirely. They bypass your two-factor authentication. They are designed to be the override, and that makes them the most valuable target.</p><p>The reality is that platform security features designed to help you regain access are now being turned against you. And the platforms have done very little to address this. Snapchat&#8217;s recovery process was exploited in both of these cases across a span of five years, from 2020 to 2025.</p><p>If these cases involved one isolated attacker, you could dismiss it. Two separate federal cases with nearly 900 combined victims should make it clear that this is a pattern, not an anomaly. And while these cases targeted young women, the underlying technique works on anyone. It only requires trust and a recovery code.</p><p>Most of the advice you&#8217;ll find about protecting yourself online still focuses on passwords. Use a strong one, don&#8217;t reuse them, get a password manager. </p><p>That&#8217;s all still true and it&#8217;s necessary. But it&#8217;s not sufficient anymore. The attack vector in these cases bypasses all of it.</p><p>There are specific steps you can take to protect yourself and your family against recovery code attacks. Some are settings you can change today in about five minutes. Others require a shift in how you think about account security altogether.</p><h2>What You Can Do About It</h2>
      <p>
          <a href="https://www.secretsofprivacy.com/p/recovery-codes-new-passwords">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[A Data Broker Opt-Out Shortcut]]></title><description><![CDATA[The opt-out process is more manageable than it looks (if you understand how the industry is actually structured)]]></description><link>https://www.secretsofprivacy.com/p/data-broker-opt-out-shortcut</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/data-broker-opt-out-shortcut</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Mon, 23 Mar 2026 00:28:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HRHg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>There are somewhere north of 750 official data brokers operating in the United States, and an estimated 5,000 globally. Each one may have a profile on you. There is no federal law requiring any of them to tell you that.</p><p>Most people who try to DIY opt out give up because the scope feels unmanageable. Dozens of sites, each with its own form, its own verification step, its own timeline. The project looks like it measures in days. </p><p>Turns out the math is more forgiving than it appears (at least a little).</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><p>What most opt-out guides don&#8217;t tell you is that a significant share of the data broker industry is owned by a small number of parent companies. Which means those parent companiess typically run a single opt-out process across all their properties. </p><p>Why is that good? </p><p>Because one submission can remove you from a dozen sites at once. Work through a handful of the right processes in the right order and you&#8217;ve covered far more ground than the site count suggets.</p><p>Free opt-out lists you find online tend to miss this entirely. They give you a column of URLs and leave you to figure out the rest. The ownership layer (i.e. which sites share a process, which submissions are redundant, which ones actually matter) usually isn&#8217;t there.</p><p>Understanding that structure is what separates people who make real progress from people who spend a weekend on it and still feel like they&#8217;ve barely started.</p><p>To help with that, we just released the Data Broker Opt-Out Tracker. It&#8217;s a formatted Excel workbook covering 76+ of the highest risk data broker sites. Best of all, it&#8217;s organized by parent company, priority tier, and what each opt-out actually requires. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HRHg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HRHg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!HRHg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!HRHg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!HRHg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HRHg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png" width="702" height="394.875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:702,&quot;bytes&quot;:204751,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/191164823?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HRHg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!HRHg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!HRHg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!HRHg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7d90a77-15af-411f-95f5-637ca890ad59_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It includes step-by-step instructions for each site and a built-in status tracker so you don&#8217;t lose your place. The goal is to give you a clear picture of how the industry is structured and a logical path through it, rather than just a list of links.</p><p>Annual paid subscribers get it free. Everyone else can grab it for $19, which includes lifetime updates to the tracker. </p><blockquote><p>Grab your copy here &#8212;&gt; <a href="https://secretsofprivacy.gumroad.com/l/data-removal-dashboard?layout=profile">Data Broker Opt-Out Tracker: 70+ Brokers with Direct Links, Methods, and Notes</a></p></blockquote><p>If you&#8217;ve been putting off the opt-out process because it felt like too much, the consolidation in this industry works in your favor, you just need to know where it is.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Secrets of Privacy&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Secrets of Privacy</span></a></p><div><hr></div><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics.</em></p><div><hr></div><h5><strong>Disclaimer: None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.</strong></h5><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jtsc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc037b46f-9509-41ba-87e5-08225588e145_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!Jtsc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc037b46f-9509-41ba-87e5-08225588e145_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!Jtsc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc037b46f-9509-41ba-87e5-08225588e145_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!Jtsc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc037b46f-9509-41ba-87e5-08225588e145_727x87.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jtsc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc037b46f-9509-41ba-87e5-08225588e145_727x87.png" width="727" height="87" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c037b46f-9509-41ba-87e5-08225588e145_727x87.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:87,&quot;width&quot;:727,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:38865,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/191164823?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c827e0-81a3-4e26-8814-95cb792afa03_727x87.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Jtsc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc037b46f-9509-41ba-87e5-08225588e145_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!Jtsc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc037b46f-9509-41ba-87e5-08225588e145_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!Jtsc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc037b46f-9509-41ba-87e5-08225588e145_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!Jtsc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc037b46f-9509-41ba-87e5-08225588e145_727x87.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">If DIY data removal is not your thing, DeleteMe is our go to service for automatic removal of personal information from data broker sites. Click the image above for an affiliate link for more info and to get 20% off.</figcaption></figure></div>]]></content:encoded></item><item><title><![CDATA[9 iPhone Privacy Settings Most People Skip ]]></title><description><![CDATA[A guide to the iPhone privacy settings Apple doesn't surface&#8212;from recovery keys to stolen device protection. What they do and how to enable them.]]></description><link>https://www.secretsofprivacy.com/p/iphone-privacy-settings</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/iphone-privacy-settings</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Wed, 18 Mar 2026 01:15:38 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7e4a311b-4031-4f1b-a858-1305c5b2f79c_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Your iPhone has a lot of privacy and security settings that you probably wish you knew about. Most of them are buried in menus you&#8217;ve probably never opened, and Apple doesn&#8217;t go out of its way to surface them.</p><p>That&#8217;s a problem, because some of these settings genuinely matter. They determine what happens to your account if you die, whether a thief can lock you out of your own Apple ID, and how much of your data Apple itself can access.</p><p>This post covers nine settings worth your attention. Some are foundational. Others are more situational. All of them are overlooked by the vast majority of iPhone users.</p><p>You don&#8217;t need to enable all nine today. But you should at least know they exist.</p><blockquote><p>Note for paid subscribers - we added two extra privacy/security features just for you  at the end. &#127873;</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>Two-Factor Authentication</strong></h2><p>Two-factor authentication is the baseline. If you haven&#8217;t enabled it, nothing else on this list matters much.</p><p>Here&#8217;s how it works: when you sign into your Apple ID on a new device, Apple sends a six-digit verification code to a device you already trust. Without that code, your password alone isn&#8217;t enough to get in.</p><p>This protects you from the most common attack vector: someone who&#8217;s obtained your password through a phishing attempt, a data breach, or simple guessing. Even if they have the password, they&#8217;re stuck without physical access to one of your trusted devices.</p><p>If you created your Apple ID in the last few years, two-factor authentication may already be enabled. But it&#8217;s worth checking.</p><blockquote><p><strong>To verify or enable:</strong> Settings &gt; [your name] &gt; Sign-In &amp; Security &gt; Two-Factor Authentication.</p></blockquote><p>If it&#8217;s off, turn it on. If it&#8217;s on, make sure your trusted phone numbers are current. That list is critical because if you lose access to all your trusted devices and your trusted phone numbers are outdated, recovery becomes significantly harder.</p><h2><strong>Recovery Key</strong></h2><p>A recovery key is a 28-character code that serves as a backup way into your Apple ID if you ever get locked out.</p><p>Once you enable a recovery key, Apple can no longer help you regain access to your account. The usual &#8220;forgot password&#8221; flow that relies on Apple verifying your identity? Gone. You&#8217;re on your own.</p><p>That might sound scary, but for privacy-conscious users, it&#8217;s actually a feature. It means Apple doesn&#8217;t have a back door into your account. No one at Apple can reset your password, which means no one can be socially engineered or legally compelled to do so either.</p><p>So the catch here is kind of obvious. If you lose your recovery key and get locked out, you&#8217;re done. There&#8217;s no appeal process. There&#8217;s no customer service escalation that will save you. Your account and everything in it (photos, documents, purchases, etc.) becomes permanently inaccessible. </p><blockquote><p><strong>To enable:</strong> Settings &gt; [your name] &gt; Sign-In &amp; Security &gt; Account Recovery &gt; Recovery Key.</p></blockquote><p>If you enable this protection, be sure to write the code down. Store it somewhere physically secure and separate from your devices. A safe deposit box or at home firebox are great locations. Treat it like you&#8217;d treat a passport or a birth certificate.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/iphone-privacy-settings?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/p/iphone-privacy-settings?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2><strong>Recovery Contacts</strong></h2><p>Recovery contacts offer a softer alternative to the recovery key.</p><p>Instead of relying entirely on a code you might lose, you designate one or more people you trust. If you ever get locked out, Apple can send them a verification code that helps confirm your identity. They don&#8217;t get access to your account, rather, they&#8217;re just vouching for you.</p><p>This is a good option for people who want a safety net but aren&#8217;t ready to go full self-sovereign with a recovery key. It&#8217;s also a reasonable complement to a recovery key, giving you multiple paths back into your account if something goes wrong.</p><blockquote><p><strong>To add a recovery contact:</strong> Settings &gt; [your name] &gt; Sign-In &amp; Security &gt; Recovery Contacts</p></blockquote><p>Choose someone who&#8217;s reliable, who won&#8217;t lose their own phone, and who you&#8217;ll still be in contact with years from now. You can add multiple people if you want redundancy.</p><p>One thing to keep in mind: <strong>recovery contacts won&#8217;t help you if you&#8217;ve enabled a recovery key and lost it</strong>. The recovery key overrides everything. So think of these as two different approaches rather than layers that stack on top of each other.</p><h2><strong>Legacy Contact</strong></h2><p>Here&#8217;s a question most people don&#8217;t think about: what happens to your Apple ID when you die?</p><p>By default, the answer is &#8220;nothing good.&#8221; Your family can&#8217;t access your account. They can&#8217;t retrieve your photos, your documents, your messages. Apple&#8217;s policy is to protect your privacy, even posthumously, which means your data stays locked unless someone navigates a complicated legal process involving death certificates and court orders.</p><p>A legacy contact changes that.</p><p>You designate someone, such as a spouse, a family member, or a trusted friend, and share an access key with them. When you die, they combine that key with a copy of your death certificate to gain access to your account. They can download your data, manage your digital legacy, and eventually memorialize or delete the account.</p><blockquote><p><strong>To set up a legacy contact:</strong> Settings &gt; [your name] &gt; Sign-In &amp; Security &gt; Legacy Contact &gt; Add Legacy Contact.</p></blockquote><p>You&#8217;ll be prompted to share an access key with the person you choose. You can send it digitally or print a physical copy. Either way, make sure they know where to find it and what it&#8217;s for.</p><p>This setting is especially important if you have photos or documents that would matter to your family. Without a legacy contact, those memories might be lost forever.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>Advanced Data Protection for iCloud</strong></h2><p>This is the most significant privacy setting Apple has introduced in years, and few people use it. Here&#8217;s a quick overview. </p><p>When you store data in iCloud, Apple encrypts it. But for most data types, Apple holds the encryption keys. That means Apple can technically access your data if they choose to or if they&#8217;re compelled to by law enforcement. Your iCloud backups, your photos, and your notes can be ready by Apple if the circumstances demand it.</p><p>Advanced Data Protection changes the equation. When you enable it, end-to-end encryption extends to almost everything in iCloud: backups, photos, notes, reminders, voice memos, and more. Apple no longer holds the keys. Only your devices can decrypt the data.</p><p>The practical effect is that your iCloud data becomes genuinely private. Even Apple can&#8217;t access it. Neither can hackers who breach Apple&#8217;s servers. Neither can government agencies serving Apple with warrants.</p><blockquote><p><strong>To enable:</strong> Settings &gt; [your name] &gt; iCloud &gt; Advanced Data Protection &gt; Turn On Advanced Data Protection.</p></blockquote><p>Apple will require you to set up account recovery first, either a recovery contact or a recovery key. That&#8217;s because if you get locked out with Advanced Data Protection enabled, Apple can&#8217;t help you. There&#8217;s no fallback.</p><p>This setting isn&#8217;t for everyone. If you&#8217;re worried about losing access to your account, the standard iCloud encryption is probably fine. But if you care about privacy and you&#8217;re disciplined about account recovery, this is one of the most meaningful steps you can take.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Secrets of Privacy&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Secrets of Privacy</span></a></p><h2><strong>Stolen Device Protection</strong></h2><p>Stolen Device Protection is relatively new, and it addresses a specific nightmare scenario that&#8217;s become increasingly common.</p><p>Think of a thief who watches you enter your passcode in public, such as a bar, on the subway, or concert. Then they steal your phone. With your passcode, they can change your Apple ID password, disable Find My iPhone, and lock you out of your own account. By the time you realize what&#8217;s happened, your digital life is gone.</p><p>Stolen Device Protection adds friction to this attack.</p><p>When it&#8217;s enabled, certain sensitive actions, like changing your Apple ID password, turning off Find My, or accessing saved passwords, require Face ID or Touch ID authentication. A passcode alone won&#8217;t work. And for the most critical actions, there&#8217;s also a one-hour security delay, but only when you&#8217;re away from familiar locations like your home or workplace.</p><p>The idea is that a thief can&#8217;t make irreversible changes to your account in the few minutes after stealing your phone. You have time to remotely lock or erase the device before they can do real damage.</p><blockquote><p><strong>To enable:</strong> Settings &gt; Face ID &amp; Passcode &gt; Stolen Device Protection.</p></blockquote><p>There are two levels: &#8220;Standard&#8221; applies the protections only when you&#8217;re away from familiar locations. &#8220;Always On&#8221; applies them everywhere. For most people, &#8220;Standard&#8221; strikes the right balance between security and convenience.</p><h2><strong>Significant Locations</strong></h2><p>This one&#8217;s less about security and more about awareness.</p><p>Your iPhone quietly tracks the places you visit most frequently. Apple calls these &#8220;Significant Locations,&#8221; and the stated purpose is to improve personalized services. Think predicting traffic, surfacing relevant photos, that sort of thing.</p><p>In practice, it means your phone maintains a detailed log of where you go and when.</p><p>Some people are fine with this. Others find it unsettling to discover that their phone has been silently building a dossier on their movements. Either way, you should probably know it&#8217;s happening.</p><blockquote><p><strong>To view or disable:</strong> Settings &gt; Privacy &amp; Security &gt; Location Services &gt; System Services &gt; Significant Locations.</p></blockquote><p>You&#8217;ll need to authenticate with Face ID or your passcode to access this menu. Once you&#8217;re in, you can see the history, like a list of cities and specific locations, with timestamps. You can clear the history, turn off the feature entirely, or leave it on if you find the personalization useful.</p><p>There&#8217;s no right answer here. It&#8217;s a personal decision based on how you weigh convenience against surveillance. But it&#8217;s a decision you should make consciously, not one that&#8217;s made for you by default.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2af9f5e8-691e-4a6a-ba65-cc997977573a&quot;,&quot;caption&quot;:&quot;Most people think turning off location sharing means your phone stops tracking you.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The iPhone Setting That Quietly Exposes Your Location History&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2025-06-23T01:12:23.146Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2cefbeaa-6463-4109-96d0-41fe741e5cb7_420x320.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/the-iphone-setting-that-quietly-exposes-your-location-history&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:166075969,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:119,&quot;comment_count&quot;:28,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h2><strong>Safety Check</strong></h2><p>Safety Check is designed for people in dangerous situations, such as domestic abuse, stalking, controlling relationships. But it&#8217;s useful for anyone who wants to quickly audit and revoke the access they&#8217;ve granted over time.</p><p>When you open Safety Check, you get two options: &#8220;Emergency Reset&#8221; and &#8220;Manage Sharing &amp; Access.&#8221;</p><p>Emergency Reset is the nuclear option. It immediately stops sharing your location with everyone, resets privacy permissions for all apps, limits FaceTime and Messages to the device in your hand, and signs you out of iCloud on your other devices. It&#8217;s designed for someone who needs to cut ties quickly and completely.</p><p>Manage Sharing &amp; Access is more surgical. It walks you through who has access to your location, which apps have permissions, and which devices are signed into your account. You can revoke access selectively, without blowing everything up.</p><blockquote><p><strong>To access:</strong> Settings &gt; Privacy &amp; Security &gt; Safety Check.</p></blockquote><p>Even if you&#8217;re not fleeing a dangerous situation, this is a useful tool. Over the years, you accumulate sharing relationships and app permissions that you forget about. Safety Check lets you see it all in one place and clean house if needed.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>App Privacy Report</strong></h2><p>App Privacy Report gives you visibility into what your apps are actually doing.</p><p>Once you enable it, your iPhone tracks how often each app accesses sensitive data: your location, your camera, your microphone, your contacts, your photos. It also shows you which network domains each app contacts, revealing who they&#8217;re sending data to behind the scenes.</p><p>The results can be illuminating. Some apps access your location hundreds of times a week even when you&#8217;re not using them. Others reach out to dozens of tracking domains the moment you open them. The information is all there, you just have to look.</p><blockquote><p><strong>To enable:</strong> Settings &gt; Privacy &amp; Security &gt; App Privacy Report &gt; Turn On App Privacy Report.</p></blockquote><p>Check it periodically. If an app&#8217;s behavior seems disproportionate to its function (e.g. a flashlight app hitting your location every hour or a game contacting dozens of ad networks), that&#8217;s a signal worth paying attention to.</p><h2><strong>Final Thought</strong></h2><p>None of these settings will make your iPhone perfectly private. iOS is still a closed system controlled by Apple, and Apple&#8217;s interests don&#8217;t always align with yours. Though it&#8217;s worth noting that the GrapheneOS project recently said that an iPhone 17 is the best private phone option behind a Pixel running their OS. &#128071;</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J5IZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J5IZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png 424w, https://substackcdn.com/image/fetch/$s_!J5IZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png 848w, https://substackcdn.com/image/fetch/$s_!J5IZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png 1272w, https://substackcdn.com/image/fetch/$s_!J5IZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J5IZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png" width="537" height="200" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:200,&quot;width&quot;:537,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:23989,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/189200139?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J5IZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png 424w, https://substackcdn.com/image/fetch/$s_!J5IZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png 848w, https://substackcdn.com/image/fetch/$s_!J5IZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png 1272w, https://substackcdn.com/image/fetch/$s_!J5IZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d001c7-a6e0-40ce-bf54-0d32864df51f_537x200.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>But these nine settings represent the controls Apple does give you. Most people never touch them. Now you know where they are and what they do.</p><p>Pick a few. Enable them. And if you found this useful, share it with someone who could use the nudge.</p><h2>Friendly Ask</h2><p>If you found this helpful or informative, chances are your friends and family will as well. Please share it with them to help spread awareness about the looming VPN bans. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-REb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-REb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png 424w, https://substackcdn.com/image/fetch/$s_!-REb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png 848w, https://substackcdn.com/image/fetch/$s_!-REb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png 1272w, https://substackcdn.com/image/fetch/$s_!-REb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-REb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png" width="1000" height="1232" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1232,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:107644,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/184499539?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!-REb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png 424w, https://substackcdn.com/image/fetch/$s_!-REb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png 848w, https://substackcdn.com/image/fetch/$s_!-REb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png 1272w, https://substackcdn.com/image/fetch/$s_!-REb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa0daf9c-6b78-4810-9178-973c9e54fd2a_1000x1232.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/iphone-privacy-settings?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/p/iphone-privacy-settings?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p><h2>Two More (For Paid Subscribers)</h2><p>Two more settings below, for paid subscribers only. The first addresses an attack vector that lets someone intercept your two-factor authentication codes and take over your accounts without ever touching your phone. The second stops email senders from tracking exactly when you read their messages and where you were when you did it. Both are fixable in minutes. Both are worth knowing about.</p>
      <p>
          <a href="https://www.secretsofprivacy.com/p/iphone-privacy-settings">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Your Anonymous Accounts Aren't So Anonymous Anymore]]></title><description><![CDATA[The viral claim that AI can unmask anyone for $1 is overblown. The real story is more nuanced, and more important.]]></description><link>https://www.secretsofprivacy.com/p/llm-deanonymization-pseudonym-protection</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/llm-deanonymization-pseudonym-protection</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Wed, 11 Mar 2026 01:20:37 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1eabde12-8ec9-4573-b3a1-32a3ad88b13a_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you were on X or LinkedIn the other week, you probably saw some version of this claim: </p><blockquote><p><em>Your anonymous internet identity can now be unmasked for $1.</em></p></blockquote><p>A research paper from ETH Zurich and Anthropic titled &#8220;Large-scale online deanonymization with LLMs&#8221; made the rounds, and the reaction was predictably alarmist. </p><p>Posts racked up millions of views. The framing was almost universally that AI has killed online anonymity, your Reddit throwaway is compromised, and it only costs a dollar.</p><p>Here&#8217;s a sample (pardon the language): </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZXOT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZXOT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png 424w, https://substackcdn.com/image/fetch/$s_!ZXOT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png 848w, https://substackcdn.com/image/fetch/$s_!ZXOT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png 1272w, https://substackcdn.com/image/fetch/$s_!ZXOT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZXOT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png" width="448" height="386.56969696969696" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1139,&quot;width&quot;:1320,&quot;resizeWidth&quot;:448,&quot;bytes&quot;:587568,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/189411903?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZXOT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png 424w, https://substackcdn.com/image/fetch/$s_!ZXOT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png 848w, https://substackcdn.com/image/fetch/$s_!ZXOT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png 1272w, https://substackcdn.com/image/fetch/$s_!ZXOT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5097ca9-ae23-420f-967a-a5e81ab36336_1320x1139.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>After reading the actual paper (twice), we decided the reality is more nuanced than the headlines suggest, but it&#8217;s also more concerning in ways that most of the social media commentary missed entirely.</p><p>The short version: </p><blockquote><p><strong>the current results are uneven, and the &#8220;unmask anyone for $1&#8221; framing is an exaggeration. But the trajectory of this technology is what should concern you.</strong> </p></blockquote><p>The techniques demonstrated in this paper will get better, fast. And most people&#8217;s online habits are not remotely prepared for where this is heading.</p><p>This post tackles the following:</p><ol><li><p>What the researchers actually found (and what they didn&#8217;t) </p></li><li><p>Explains the four-step pipeline that makes this work </p></li><li><p>Gives you our honest take on where the real risk sits today </p></li><li><p>Then walks through a concrete defensive playbook for future-proofing your digital anonymity before this technology matures. </p></li></ol><p>Let&#8217;s start with what actually happened.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>What the Researchers Actually Found</h2><p>The paper tests several different scenarios, and the results vary widely. </p><p>In the most impressive demonstration, the researchers gave an AI agent anonymized interview transcripts from 33 scientists and asked it to figure out who they were. No names, no usernames, no direct identifiers. </p><p>The agent searched the web on its own, cross-referenced details against published papers and university profiles, and correctly identified 9 of the 33 scientists. When it made a guess, it was right 82% of the time. (<a href="https://arxiv.org/abs/2602.16800">source</a>) </p><p>In a separate test on Reddit, the system matched pseudonymous users to their real identities at rates between 25% and 52%, depending on the community. </p><p>Those are real results, and they&#8217;re concerning. But let&#8217;s put them in perspective: most people in these experiments were <em>not</em> identified. A 27% success rate is not the all-seeing surveillance tool the viral posts implied.</p><p>So why are we still writing about this?</p><p>Three reasons. </p><p><strong>First</strong>, the cost: the entire experiment cost about $2,000, roughly $1 to $4 per person targeted. A year ago, this kind of investigation would have required a skilled human spending hours on a single target. </p><p><strong>Second</strong>, the comparison to older methods: classical deanonymization techniques scored close to 0% on these same tasks. LLMs didn&#8217;t just improve the old approach. They made an entirely new category of attack possible. </p><p><strong>Third</strong>, and most important, the trajectory: the researchers found that simply increasing the model&#8217;s reasoning effort doubled the success rate in some tests. As models get smarter and cheaper (both of which are happening fast), these numbers will climb.</p><p>To understand <em>why</em> this works and where you&#8217;re vulnerable, you need a simple framework.</p><h2>The Mental Model: Death by a Thousand Data Points</h2><p>Think of every piece of information you share online as a coordinate on a map. Your city is one coordinate. Your profession is another. </p><p>The programming language you use, the dog breed you own, the college you attended, the subreddit you comment in. Individually, none of these coordinates are identifying. Millions of people live in Portland. Thousands are software engineers. Hundreds have golden retrievers.</p><p>But the intersection of all your coordinates is almost certainly unique. There&#8217;s probably only one software engineer in Portland who has a golden retriever named Biscuit, graduated from Stanford, and has strong opinions about the Rust programming language.</p><p>In privacy research, these little details are called &#8220;<strong>micro-data.</strong>&#8221; </p><p>The concept goes back to Latanya Sweeney&#8217;s landmark research in the late 1990s, where she demonstrated that 87% of the U.S. population could be uniquely identified using just three data points: ZIP code, gender, and date of birth. (<a href="https://dataprivacylab.org/projects/identifiability/paper1.pdf">source</a>) That finding was later debated (some researchers put the figure closer to 63%), but the core principle is that combinations of ordinary facts about you form a fingerprint.</p><p>The problem has always been that exploiting this was <em>hard</em>. </p><p>Your micro-data was scattered across different platforms, buried in unstructured text, and connecting the dots required a skilled human investigator spending hours or days on a single target. That made mass deanonymization impractical. Only high-value targets (journalists, activists, political dissidents) were worth the effort.</p><p>LLMs remove that bottleneck.</p><h2>How the Attack Actually Works</h2><p>The researchers designed a four-step framework they call <strong>ESRC</strong>: Extract, Search, Reason, Calibrate. Understanding each step matters because it reveals where you&#8217;re most vulnerable.</p><p><strong>Extract.</strong> An LLM reads all of your posts on a given platform and builds a structured profile. It pulls out stated facts (you mentioned living in Austin), inferred facts (you seem to be in your 30s based on cultural references), and incidental disclosures (you mentioned walking your dog through a specific park). The model is remarkably good at this. It picks up on things you&#8217;d never think to scrub, like:</p><ul><li><p>spelling patterns that reveal your nationality</p></li><li><p>niche technical knowledge that narrows your field</p></li><li><p>opinions on local politics that pin you to a region</p></li></ul><p><strong>Search.</strong> Your extracted profile gets converted into a mathematical representation (an embedding) and compared against a database of candidate profiles. In the Reddit experiment, the candidate pool was 10,000 users. The system uses semantic similarity to find the closest matches, returning the top candidates most likely to be you.</p><p><strong>Reason.</strong> This is the step that separates AI deanonymization from older techniques. Instead of simply returning the closest mathematical match, the system feeds the top candidates into a more powerful reasoning model. That model examines each candidate&#8217;s profile against yours, looking for confirming evidence and contradictions. It weighs rare attributes more heavily than common ones. It catches false positives that pure pattern-matching would miss.</p><p><strong>Calibrate.</strong> Finally, the system assigns a confidence score. When it&#8217;s uncertain, it abstains rather than guessing wrong. This is what gives the attack its high precision.  In fact, the researchers tuned it so that when the system does make a prediction, it&#8217;s right roughly 9 out of 10 times.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!OqBa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!OqBa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png 424w, https://substackcdn.com/image/fetch/$s_!OqBa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png 848w, https://substackcdn.com/image/fetch/$s_!OqBa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png 1272w, https://substackcdn.com/image/fetch/$s_!OqBa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!OqBa!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png" width="1200" height="700" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:700,&quot;width&quot;:1200,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:197095,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/189411903?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!OqBa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png 424w, https://substackcdn.com/image/fetch/$s_!OqBa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png 848w, https://substackcdn.com/image/fetch/$s_!OqBa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png 1272w, https://substackcdn.com/image/fetch/$s_!OqBa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47925384-6fa0-4cef-a1a4-ad7991407f0b_1200x700.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The researchers benchmarked their approach against a classical technique modeled on the famous Netflix Prize deanonymization attack from 2008, where researchers proved they could identify Netflix users by matching their anonymous movie ratings against public IMDb profiles. (<a href="https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf">source</a>) </p><p>Across every experiment mentioned above, the classical method achieved close to 0% success on unstructured text. Not low success. Effectively zero. </p><p>What this means is that before LLMs, there was no viable way to deanonymize people from the kind of content they actually post online. </p><div class="pullquote"><p>Start Here: Know Your Exposure</p><p>Before you overhaul your posting habits, it helps to know where you actually stand. If you haven&#8217;t already, grab a copy of <em><a href="https://secretsofprivacy.com/">How Exposed Are You Online?</a></em>, our step-by-step guide for auditing your personal data exposure across the web. It walks you through finding what&#8217;s out there under your real name, which is exactly the candidate profile an attacker would try to match your anonymous posts against. The less that profile reveals, the harder every stage of this attack becomes. Reminder that paid annual subscribers get it for free with their subscription.</p></div><h2>The Full Picture: What They Tested and What It Actually Proves</h2><p>The researchers ran several different experiments. It&#8217;s important to understand what each one does and does not demonstrate, because the headlines tend to blur them together.</p><h3><strong>Experiments that actually unmask real identities:</strong></h3><p>The scientist interviews and the Reddit-to-real-identity tests are the most relevant results for most people. These show the system taking anonymous text and producing a real name. </p><p>The success rates (25-52% on Reddit, 27% on interview transcripts) are moderate but meaningful, especially at the price point. And the system is selective. When it isn&#8217;t confident, it abstains rather than guessing wrong, which means the guesses it does make are right roughly 80-90% of the time.</p><h3><strong>Cross-platform professional matching:</strong></h3><p>The researchers also collected 987 LinkedIn profiles linked to Hacker News accounts and tried to match them. After stripping out names, URLs, and other direct identifiers from the Hacker News side, the LLM pipeline correctly matched 55% of users at 90% precision, climbing to 45% recall even at 99% precision. (<a href="https://arxiv.org/abs/2602.16800">source</a>)</p><blockquote><p><strong>A significant caveat</strong>: these users had voluntarily linked their Hacker News and LinkedIn accounts, which means they probably weren&#8217;t trying to stay anonymous. People who publicly connect accounts across platforms tend to share more identifying details in their posts. The researchers acknowledge this bias. This number likely overstates the success rate against a genuinely privacy-conscious user.</p></blockquote><h3><strong>Experiments that link anonymous accounts to each other (but don&#8217;t reveal real names):</strong></h3><p>The researchers also tested whether the system could determine that two anonymous accounts belong to the same person. This is different from unmasking someone, but it&#8217;s still a serious threat. If an attacker can link your throwaway Reddit account to your main account, or connect your posts across different forums, they can build a much richer profile even without knowing your name.</p><p>In the strongest of these tests, they split 5,000 Reddit users&#8217; comment histories into &#8220;before&#8221; and &#8220;after&#8221; halves separated by a one-year gap, then tried to match them. The full pipeline correctly re-linked 67% of users at 90% precision from a pool of 10,000 candidates. (<a href="https://arxiv.org/abs/2602.16800">source</a>) </p><p>In a harder test using movie discussions across different subreddits, success rates were lower but still meaningful. Users who discussed ten or more of the same movies were identified at a 48% rate. Users who shared only a single movie title were caught just 3% of the time. (<a href="https://arxiv.org/abs/2602.16800">source</a>) </p><p>The classical (non-AI) baseline achieved close to 0% in both of these scenarios.</p><h3><strong>What the scaling projections suggest:</strong></h3><p>When the researchers extrapolated their results to larger candidate pools (closer to real-world scale), the numbers dropped but didn&#8217;t collapse. At a projected 1 million candidates, the LLM approach still estimated roughly 35% recall at 90% precision for account linking. (<a href="https://arxiv.org/abs/2602.16800">source</a> - figure 7a) These are rough projections, not guarantees. But they suggest that even at internet scale, the approach doesn&#8217;t just fall apart.</p><h2>Our Take: Not an All-Seeing Eye, But the Threat Is Real for Specific People</h2><p>We covered the cost and trajectory arguments above, so no need to repeat them. Instead, let&#8217;s focus on <em>who should actually be concerned right now</em>, because the answer isn&#8217;t &#8220;everyone equally.&#8221;</p><p>Even at today&#8217;s moderate success rates, this technology is dangerous for people in specific situations. </p><p>If a government wants to identify activists posting on an anonymous forum, they don&#8217;t need to unmask everyone. Identifying 25-30% of the users, with high confidence, is more than enough to have a chilling effect. If someone going through a bitter divorce wants to find their ex-spouse&#8217;s anonymous Reddit account, they only need to succeed once.</p><p>The researchers flag governments targeting journalists, corporations building advertising profiles from forum posts, and attackers crafting targeted social engineering campaigns. Here&#8217; a more mundane threat that is underappreciated: </p><blockquote><p>anyone in a personal dispute with both motivation and a few hundred dollars. Custody battles, workplace conflicts, stalking. The barrier to running this kind of investigation has dropped from &#8220;hire a professional investigator&#8221; to &#8220;use an API.&#8221;</p></blockquote><p>And remember, the 25% rate today could be 50% in a year. The account-linking capability that hits 67% today could approach near-certainty on active users. The time to build good habits is before you need them.</p><h2>What Legislators and Platforms Are Getting Wrong</h2><p>Most privacy regulation was designed for a world where the threat was structured data, such as databases, tracking cookies, browsing histories. The regulations ask companies to anonymize datasets by removing names and direct identifiers. The entire framework of data protection, from GDPR&#8217;s pseudonymization provisions to HIPAA&#8217;s Safe Harbor method, assumes that if you strip out the obvious identifiers, the remaining data is reasonably safe.</p><p>This research demonstrates that unstructured text (your comments, your posts, your forum contributions) is just as identifying as structured data, possibly more so. And no current regulatory framework addresses this. The data that makes online communities valuable is the same data that makes you identifiable.</p><p>Platforms aren&#8217;t much better positioned. Reddit, Hacker News, and most forums make user post histories publicly accessible by default. That&#8217;s a design choice that made sense when parsing those histories required human effort. It makes far less sense when an AI can process every comment you&#8217;ve ever written in seconds.</p><p><strong>Whether the current success rates worry you or not, the direction is clear. And the defensive steps that work against today&#8217;s pipeline will work even better against tomorrow&#8217;s.</strong> The attack has specific vulnerabilities at each stage, and understanding those vulnerabilities gives you a real playbook for reducing your exposure.</p><h2>Your Defensive Playbook: Disrupting Each Stage of the Attack</h2>
      <p>
          <a href="https://www.secretsofprivacy.com/p/llm-deanonymization-pseudonym-protection">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Age Verification Bills Are Bigger Than You Think]]></title><description><![CDATA[Governments are building identity verification into every digital layer: OS, app store, platform, SIM card. Different names, same infrastructure.]]></description><link>https://www.secretsofprivacy.com/p/the-digital-stack-is-closing-age-verification-laws-2026</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/the-digital-stack-is-closing-age-verification-laws-2026</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Mon, 09 Mar 2026 01:20:25 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/47c31ffe-a24c-442f-901f-a35587b12774_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>While the United States Congress debates the federal App Store Accountability Act, California has already signed a law requiring age verification at the operating system level. </p><p>Colorado&#8217;s Senate passed a copycat bill two days ago (which we covered <a href="https://x.com/compose/articles/edit/2026027208486297600">here</a>). Mexico just mandated biometric identity for all 127 million cell phone lines. And the federal versions of COPPA 2.0 and KOSA are advancing through committee.</p><p>These are not separate policy experiments. They are the same infrastructure being built at every layer of the digital stack, but under different names, across different jurisdictions, and justified by different rationales. The end result is the same though: </p><blockquote><p>verified identity tethered to digital access.</p></blockquote><p>I want to walk through the layers quickly, because the shape of this matters more than the details of any single bill.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://x.com/compose/articles/edit/2026027208486297600" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eHKj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eHKj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eHKj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eHKj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eHKj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg" width="680" height="272" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:272,&quot;width&quot;:680,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article cover image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://x.com/compose/articles/edit/2026027208486297600&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article cover image" title="Article cover image" srcset="https://substackcdn.com/image/fetch/$s_!eHKj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eHKj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eHKj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eHKj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda2908d9-7f4f-48d1-b630-d08dbaae1126_680x272.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Click the image &#9757;&#65039; to read our article &#8220;The Chokepoint Strategy: Age Verification Is Moving to the OS Layer&#8221;</figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>The Layers</h2><p><strong>Connectivity.</strong> Mexico enacted a law on January 9 requiring every cell phone line in the country to be biometrically linked to a government-credentialed individual by June 30. Fingerprints, iris scans, facial recognition, all tied to the national ID system. </p><p>Unregistered lines get suspended July 1. Mexico&#8217;s Supreme Court struck down a nearly identical law in 2022 as unconstitutional. The government repackaged it, and this time it appears to be sticking. In fact, registration is already underway, carriers are collecting biometric data at point of sale, and legal challenges have so far failed to stop the rollout.</p><p><strong>Operating system.</strong> California&#8217;s AB 1043, signed by Governor Newsom in October, requires every operating system provider (Windows, macOS, iOS, Android, Linux, etc.) to collect user age at account setup and broadcast an age bracket signal to app developers via API. It takes effect January 1, 2027. Colorado passed SB26-051 through the Senate on March 3, modeled directly on AB 1043. New York has a version in committee. The OS-level approach is already replicating before California&#8217;s law even takes effect.</p><p><strong>App store.</strong> Texas, Utah, and Louisiana have each passed App Store Accountability Acts requiring app stores to verify every user&#8217;s age and obtain parental consent for minors before any app download. Texas&#8217;s version was blocked by a federal judge in December as a likely First Amendment violation. A federal version (S.1586 / H.R.3149) is moving forward anyway, backed by 40 state attorneys general and bipartisan sponsors. </p><p><strong>Platform.</strong> COPPA 2.0 would extend regulated privacy protections from children under 13 to everyone under 17, ban targeted advertising to minors, and create an &#8220;eraser button&#8221; for personal data. KOSA would impose safety-by-design obligations on platforms. </p><p>Both advanced through a House subcommittee in December alongside 16 other child safety bills. The House versions are narrower than the Senate versions largely because of preemption clauses that would override stronger state-level protections.</p><div class="pullquote"><p>That last point deserves a pause. The preemption fight means that the federal bills marketed as protecting children would actually dismantle existing state laws that go further. The stated purpose and the structural effect are moving in opposite directions. Major &#128681;</p></div><h2>Same Infrastructure, Different Excuses</h2><p>The justifications for these laws vary by jurisdiction:, but here are the most common:  </p><ul><li><p>Child safety in the United States. </p></li><li><p>Content regulation in Brazil (whose OS-level age verification law takes effect March 17). </p></li><li><p>Crime prevention in Mexico. </p></li></ul><p>Once every layer of the digital stack requires identity verification, anonymous or pseudonymous digital existence does not just become illegal. It becomes nearly impossible to architecture around. There is no layer left to opt out of.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/the-digital-stack-is-closing-age-verification-laws-2026?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/the-digital-stack-is-closing-age-verification-laws-2026?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>The Federal App Store Accountability Act</h2><p>I posted a deep dive on X last week breaking down the federal App Store Accountability Act. Proponents of the ASAA are using the language of parental empowerment to promote the bill. There are three problems with that: </p><ol><li><p>the bill creates a universal identity verification system that applies to every smartphone user in the country - including adults</p></li><li><p>the tools it claims to provide already exist, for free, on every iPhone and Android device right now</p></li><li><p>the App store accountability concept is being pushed by Meta/facebook&#8217;s own Mark Zuckerberg</p></li></ol><p>Our article covers the privacy paradox at the heart of the bill (the liability structure incentivizes overcollection, not minimization), the rhetorical funnel that makes these laws politically impossible to vote against, and why the infrastructure they create will inevitably be repurposed. </p><p>Read it here if you haven&#8217;t already: </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://x.com/compose/articles/edit/2029575603611918336" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tLsD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tLsD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tLsD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tLsD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tLsD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg" width="680" height="272" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:272,&quot;width&quot;:680,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article cover image&quot;,&quot;title&quot;:&quot;Article cover image&quot;,&quot;type&quot;:null,&quot;href&quot;:&quot;https://x.com/compose/articles/edit/2029575603611918336&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article cover image" title="Article cover image" srcset="https://substackcdn.com/image/fetch/$s_!tLsD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg 424w, https://substackcdn.com/image/fetch/$s_!tLsD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg 848w, https://substackcdn.com/image/fetch/$s_!tLsD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!tLsD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ab1237-f3df-43ca-845a-ee84c743a2cb_680x272.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Click the image &#128070; to read The Parental Authority Illusion: The App Store Accountability Act is a Trojan Horse</figcaption></figure></div><p>And if you have kids and want to see what actual parental empowerment looks like without identity verification databases, our free <em>First iPhone Ready</em> course walks you through the entire setup in 45 minutes or less. No government ID required. Click the image below to get your copy. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://secretsofprivacy.gumroad.com/l/first-iphone-ready" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cPWQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!cPWQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!cPWQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!cPWQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cPWQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:163379,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://secretsofprivacy.gumroad.com/l/first-iphone-ready&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/190143262?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cPWQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!cPWQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!cPWQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!cPWQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff473fb47-4e67-4c9b-989a-fa6d83e7aa52_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>That&#8217;s a high level overview of the current attack on digital anonymity. And I didn&#8217;t even mention what&#8217;s going on in the United Kingdom. </p><p>Provided there&#8217;s enough interest, I will cover this topic in more depth as these bills advance. Log your vote below on whether I should continue covering this topic in the newsletter (I&#8217;m sure it&#8217;ll come up on X and Substack Notes). </p><div class="poll-embed" data-attrs="{&quot;id&quot;:469100}" data-component-name="PollToDOM"></div><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Secrets of Privacy&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Secrets of Privacy</span></a></p><div><hr></div><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics. </em></p><div><hr></div><h5><strong>Disclaimer:</strong> None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.  </h5><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png" width="727" height="87" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:87,&quot;width&quot;:727,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33962,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/174034271?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">DeleteMe is our go to service for automatic removal of personal information from data broker sites. Click the affiliate link above for more info and to get 20% off. </figcaption></figure></div><ul><li><p>Privacy freedom is more affordable than you think. We tackle the top Big Tech digital services and price out privacy friendly competitors <a href="https://www.secretsofprivacy.com/p/from-free-to-freedom-how-much-it-costs-to-take-back-your-online-privacy">here</a>. The results may surprise you.</p></li><li><p>Governments around the world are starting to crack down on VPNs, and not the usual suspects like Russia, China, and North Korea.  VPN bans are being proposed in Western countries as well, such as the United Kingdom and the United States. Get up to speed on the latest (and how to prepare) here:  </p></li></ul><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;a34c1843-abb2-4457-871b-e061c1ef9d43&quot;,&quot;caption&quot;:&quot;If you&#8217;ve been following the push for age verification laws in the UK, EU, and across US states, you&#8217;ve probably noticed something: every time governments mandate ID checks for websites, VPN usage surges.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;VPN Bans Are Coming&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2026-01-14T02:17:27.441Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa2e45d7-1a9a-400d-908c-6fdf55d833c1_1200x630.gif&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/vpn-bans-coming&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:182876539,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:26,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em>If you&#8217;re reading this but haven&#8217;t yet signed up, join for free (4.5K+ subscribers strong) and get our newsletter delivered to your inbox by subscribing here &#128071;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[We Searched a Phone Number on a Free Website. The Results Were More Detailed Than Expected.]]></title><description><![CDATA[The free OSINT tool that exposes your address, income, and more (and what you can do about it)]]></description><link>https://www.secretsofprivacy.com/p/phone-number-osint-reverse-lookup-privacy</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/phone-number-osint-reverse-lookup-privacy</guid><pubDate>Wed, 04 Mar 2026 02:17:14 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/457defd2-5ad0-4c34-b944-5dee954ce602_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week an OSINT (Open Source Intelligence) account we follow on X posted a link to a website that does free reverse phone number lookups.</p><p>Not the kind that just tells you whether it&#8217;s a landline or cell. The kind that pulls up names, addresses, income estimates, and more.</p><p>With a family member&#8217;s permission, we ran his primary cell phone number through the site. Within seconds, the results came back: </p><blockquote><p>full name, home address, estimated income range, and, perhaps most unsettling, several domain names he had registered years ago (including a few that were, let&#8217;s say, not ones he&#8217;d want a coworker or client finding).</p></blockquote><p>No account required. No payment. Just a phone number and a few seconds of patience. Here&#8217;s a sample from the free, no registration-required report. &#128071;</p><div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e19316cc-5407-4e7d-ae30-2003fcb34cee_465x419.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee1931d4-dcc0-436e-bd35-5a844beef8eb_422x417.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e20ec927-0109-4d4d-95ce-72ef7c83f264_529x359.png&quot;}],&quot;caption&quot;:&quot;screenshots from a free reverse phone number search site&quot;,&quot;alt&quot;:&quot;&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e64838fd-8869-47b9-a325-7d148a16ebe2_1456x474.png&quot;}},&quot;isEditorNode&quot;:true}"></div><p>We name the specific site down below, and also walk you through the other tools in this ecosystem and lay out the exact steps to scrub your information from all of them. </p><p>But first, let&#8217;s talk about why this matters and who&#8217;s already using these tools in ways most people haven&#8217;t considered.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>The Phone Number Problem</h2><p>Your phone number is no longer just a way to reach you. <strong>It&#8217;s now a key that unlocks your entire identity.</strong></p><p>Think about how many places have your phone number.</p><ul><li><p>Your bank.</p></li><li><p>Your doctor.</p></li><li><p>Many (if not most) apps on your phone.</p></li><li><p>Every online account that uses two-factor authentication.</p></li><li><p>Every delivery service, every loyalty program, every time you&#8217;ve scribbled it on a form at a checkout counter.</p></li></ul><p>Your phone number is the single most connected piece of personal data you own. And unlike an email address,  which most people have several of, most people have one phone number, and they&#8217;ve had it for years.</p><p>That persistence is the problem. </p><p>A phone number is a unique, long-lived identifier that ties together your financial life, your digital life, and your physical address into one searchable package. And a growing ecosystem of websites makes all of that searchable by anyone, for free.</p><h2>Who&#8217;s Actually Using This (And Why You Should Care)</h2><p>The obvious fear is hackers and stalkers. But the more likely (and arguably more insidious) misuse cases are the ones most people never think about:</p><p><strong>A potential employer.</strong> You applied for a job. The hiring manager Googles you, sure. But a quick reverse phone lookup on the number from your resume? Now they know your home address, an estimated income range (which gives them leverage in salary negotiations), and maybe your past addresses, which could reveal things about your background you didn&#8217;t volunteer.</p><p><strong>A car salesman.</strong> You walked onto the lot and filled out a &#8220;just looking&#8221; card with your phone number. Before you&#8217;ve finished your test drive, the salesperson has looked you up, knows your approximate income, and has tailored their pitch accordingly. This isn&#8217;t hypothetical, OSINT tools are increasingly marketed for sales and lead qualification.</p><p><strong>A date.</strong> You exchanged numbers with someone on a dating app. Before the first coffee, they&#8217;ve got your full name, home address, and whatever else the lookup returns. For most people, that&#8217;s just creepy. For someone escaping an abusive situation, it could be dangerous.</p><p><strong>A scammer.</strong> Phone-based social engineering attacks become dramatically more convincing when the caller already knows your name, address, and approximate financial situation. &#8220;Hi, this is [your bank] calling about suspicious activity at your [your actual address]&#8221; hits differently when every detail checks out.</p><p><strong>A neighbor, an angry commenter, a political opponent.</strong> Doxxing, the act of publicly revealing someone&#8217;s private information to harass or intimidate them, often starts with nothing more than a phone number.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/phone-number-osint-reverse-lookup-privacy?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/phone-number-osint-reverse-lookup-privacy?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>This Is a Real and Growing Threat</h2><p>The data broker industry, which collects, packages, and sells personal information, is enormous.</p><p>According to Grand View Research, the global data broker market was valued at roughly $278 billion in 2024 and is projected to surpass $512 billion by 2033. (<a href="https://www.grandviewresearch.com/industry-analysis/data-broker-market-report">source</a>)  These companies aggregate information from public records, app usage, purchase histories, and dozens of other sources, then make it available to anyone willing to pay, and in even some cases, for free.</p><p>The Privacy Rights Clearinghouse recently built a unified database by cross-referencing all five U.S. state data broker registries and identified over 750 registered data brokers. (<a href="https://privacyrights.org/data-brokers">source</a>) Some estimates put the global total at around 5,000. (<a href="https://www.maximizemarketresearch.com/market-report/global-data-broker-market/55670/">source</a>)  And that only counts the ones that bother to register.</p><p>Reverse phone lookup sites are the consumer-facing tip of this iceberg. They take the data that brokers collect, such as names, addresses, relatives, income estimates, property records, domain registrations, social media profiles, and make it searchable by phone number. </p><p>Some charge a fee. But a growing number offer basic results for free, which makes them especially dangerous. What was once the domain of professional investigators is now a hobby anyone can pick up over a lunch break.</p><p>The real-world consequences are playing out. A 2025 survey by SafeHome.org found that 77% of Americans are at least somewhat concerned about being doxxed, and personal safety fears around doxxing rose 8 percentage points year over year. (<a href="https://www.safehome.org/family-safety/doxxing-online-harassment-research/">source</a>) Yet only 25% of respondents said they&#8217;d know how to remove their personal information from the internet if they needed to.</p><p>Since 2024, doxxing and swatting incidents have increased significantly, according to the National Association of Attorneys General. (<a href="https://www.naag.org/attorney-general-journal/the-escalating-threats-of-doxxing-and-swatting-an-analysis-of-recent-developments-and-legal-responses/">source</a>) Texas has treated doxxing as a criminal offense since September 2023, defining it as posting someone&#8217;s private address or phone number online with intent to cause harm. But most states still have no specific anti-doxxing statute, and federal law has yet to catch up.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-TZh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-TZh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png 424w, https://substackcdn.com/image/fetch/$s_!-TZh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png 848w, https://substackcdn.com/image/fetch/$s_!-TZh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png 1272w, https://substackcdn.com/image/fetch/$s_!-TZh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-TZh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:350695,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/188501616?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-TZh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png 424w, https://substackcdn.com/image/fetch/$s_!-TZh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png 848w, https://substackcdn.com/image/fetch/$s_!-TZh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png 1272w, https://substackcdn.com/image/fetch/$s_!-TZh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa8d99f62-c691-430b-a738-e679a3c40116_1800x1800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Our Unique Take</h2><p>Here&#8217;s what most people (and most legislators) get wrong about this problem: </p><blockquote><p>they frame it as a <em>data breach</em> issue. They talk about hackers and dark web marketplaces and stolen databases. And those things are real threats. </p></blockquote><p>But the reverse phone lookup problem isn&#8217;t a breach. It&#8217;s a <em>feature</em>. This data isn&#8217;t stolen (at least not always). It&#8217;s collected legally, packaged commercially, and served up through a clean user interface with a search bar.</p><p>That distinction matters. It means the standard advice of &#8220;use strong passwords,&#8221; &#8220;enable two-factor authentication&#8221;, doesn&#8217;t help here. No password was compromised. No account was hacked. Someone just typed a phone number into a website, and the data broker ecosystem did the rest.</p><p>The rise of AI is about to make this worse, not better. </p><p>When someone can feed a phone number into a lookup tool, get a name and address, then hand that information to an AI that cross-references it across social media, public records, and breach databases in seconds, the amount of personal information extractable from a single phone number grows exponentially. </p><p>We&#8217;re not there yet for the average person, but we&#8217;re closer than most people realize.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;99307e92-c4f9-4c77-ad36-1c30d5f42c20&quot;,&quot;caption&quot;:&quot;Scammers don&#8217;t always need fresh hacks. Sometimes, they just recycle your old data and make it dangerous again.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Scammers Are Recycling Old Breach Data With AI. Here&#8217;s What To Do&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2025-10-08T01:23:50.828Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/be26b4df-4edb-43e5-8c06-0ca9c5e7134a_420x320.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/scammers-are-recycling-old-breach-data-with-ai-here-is-what-to-do&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:174034271,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:21,&quot;comment_count&quot;:5,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h2>So What&#8217;s the Solution?</h2><p>The good news is that this is a solvable problem, for those who know where to look and what steps to take. There are specific actions that remove your information from these databases, reduce your exposure, and make your phone number far less useful as an identity key. There&#8217;s even a brand-new government tool, launched just weeks ago, that makes part of this dramatically easier.</p><p>The data broker industry deliberately makes the opt out process confusing, fragmented, and tedious. </p><p>Below, we cut through all of that. We&#8217;ll name the specific reverse phone number site noted earlier, the other major tools in this ecosystem, and walk through the exact removal steps for each one.</p><h2>The Reverse Phone Number Site (And What It Found)</h2>
      <p>
          <a href="https://www.secretsofprivacy.com/p/phone-number-osint-reverse-lookup-privacy">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[14.7 Million People Trust These Health Apps. They Shouldn't.]]></title><description><![CDATA[Security researchers found over 1,500 vulnerabilities in popular mental health apps. Vibe coding is about to make the problem much worse.]]></description><link>https://www.secretsofprivacy.com/p/mental-health-apps-privacy-security-risk</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/mental-health-apps-privacy-security-risk</guid><dc:creator><![CDATA[Secrets of Privacy]]></dc:creator><pubDate>Mon, 02 Mar 2026 02:19:12 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a709bea9-2e63-4b51-8948-c31092d49e0b_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Ten mental health apps. </p><p>Over 14.7 million combined downloads on Google Play. </p><p>And more than 1,500 security vulnerabilities between them, including 54 rated high-severity.</p><p>That&#8217;s what mobile security firm Oversecured found when they scanned popular Android apps designed to help people with depression, anxiety, panic attacks, and bipolar disorder. (<a href="https://www.bleepingcomputer.com/news/security/android-mental-health-apps-with-147m-installs-filled-with-security-flaws/">source</a>)</p><p>One therapy app with over a million downloads had <em>85</em> medium- and high-severity flaws on its own. Some of these bugs could let an attacker access internal app activities that handle authentication tokens and session data. Which means your therapy records could be exposed. </p><p>Other apps stored data locally in a way that gave <em>any app on your phone</em> read access to your CBT session notes and mood logs.</p><p>And six of those ten apps? They explicitly told users their data was private or encrypted. Which as it turns out, wasn&#8217;t the case. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h3>Why This Is Worse Than a Typical Data Breach</h3><p>Mental health data isn&#8217;t like a leaked credit card number. </p><p>You can cancel a credit card in five minutes and you&#8217;re not responsible for fraudulent charges. You can&#8217;t un-share that you&#8217;re managing bipolar disorder, attending therapy for trauma, or tracking self-harm indicators.</p><p>The economics reflect this. </p><p>On dark web marketplaces, medical records routinely sell for $250 to over $1,000 per record, according to Experian and multiple cybersecurity firms. A stolen credit card number goes for $1 to $5. (<a href="https://www.patient-protect.com/post/healthcare-data-breach-statistics-2025-why-medical-records-are-worth-10-more-than-credit-cards">source</a>)</p><p>Mental health records are arguably worth even more than typical medical data because they carry massive blackmail and social engineering potential. Therapy session transcripts, medication schedules, mood logs are the kind of information that can destroy careers, relationships, and lives if it ends up in the wrong hands.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mwUG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mwUG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png 424w, https://substackcdn.com/image/fetch/$s_!mwUG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png 848w, https://substackcdn.com/image/fetch/$s_!mwUG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png 1272w, https://substackcdn.com/image/fetch/$s_!mwUG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mwUG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png" width="508" height="404" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:404,&quot;width&quot;:508,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:31828,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/189173946?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!mwUG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png 424w, https://substackcdn.com/image/fetch/$s_!mwUG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png 848w, https://substackcdn.com/image/fetch/$s_!mwUG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png 1272w, https://substackcdn.com/image/fetch/$s_!mwUG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101e66d0-bda2-4f78-827d-06c0041a2017_508x404.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Remember the Tea app? </h2><p>Last July, the dating safety app (which marketed itself as &#8220;the safest place&#8221; for women to share sensitive information) suffered a catastrophic breach. Over 72,000 user images (including government IDs) and 1.1 million private messages were leaked on 4chan, affecting more than 1.6 million users. </p><p>Women who had shared intimate details about their relationships, including discussions of abuse and infidelity, were suddenly exposed. Websites popped up where strangers could rate stolen selfies. The app now faces multiple class-action lawsuits.</p><p>Tea was a warning shot. Mental health apps are the next, much larger target.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;21f45dae-dbdc-4ae2-b97a-ddb2d042da65&quot;,&quot;caption&quot;:&quot;Last year we published a piece explaining why reading privacy notices is a waste of time. These documents are too long, too complicated, and (most importantly) often inaccurate. Companies either intentionally mislead you or unintentionally include incorrect information because they don&#8217;t fully understand their own data practices. There&#8217;s also a lazy factor.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Hidden Lesson From the Tea App Data Leak &quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2025-08-01T01:08:00.362Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/16fbc1c9-bcca-49ff-b9c7-6a14f9ed952e_420x320.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/the-hidden-lesson-from-the-tea-app-data-leak&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:169713297,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:13,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Why It&#8217;s About To Get Much Worse</h3><p>Here&#8217;s what connects these dots: </p><blockquote><p>we&#8217;re in the middle of an explosion in AI-generated apps, and security isn&#8217;t keeping up.</p></blockquote><p>The Google Play Store peaked at around 3.6 million apps in 2017, then <em>declined</em> for years as Google cleaned out low-quality listings. (<a href="https://www.businessofapps.com/data/google-play-statistics/">source</a>)</p><p>But that trend has reversed; the store is now back above 3.9 million apps and adding roughly 1,200 new ones every day. </p><p>A major driver? </p><p>&#8220;Vibe coding&#8221; &#8212; the practice of building apps by describing what you want to AI tools like Cursor, Replit, and Lovable, which then generate all the code. Collins Dictionary named it their Word of the Year for 2025. It lets people with zero security experience ship production apps to millions of users.</p><p>We&#8217;re trying not to be sensationalist, but the security track record is alarming. </p><p>Research from security firm Escape found over 2,000 vulnerabilities and 400+ exposed secrets across just 5,600 vibe-coded apps they analyzed.  (<a href="https://escape.tech/blog/methodology-how-we-discovered-vulnerabilities-apps-built-with-vibe-coding/">source</a>) Wiz Research reported that roughly 1 in 5 vibe-coded apps had security misconfigurations. (<a href="https://www.wiz.io/blog/common-security-risks-in-vibe-coded-apps">source</a>)</p><p>A Tenzai assessment of five leading vibe coding tools found 69 vulnerabilities across just 15 test applications, including several rated critical. (<a href="https://www.csoonline.com/article/4116923/output-from-vibe-coding-tools-prone-to-critical-security-flaws-study-finds.html">source</a>) And a 2025 study found that approximately 45% of AI-generated code contains security vulnerabilities. (<a href="https://www.wiz.io/academy/ai-security/vibe-coding-security">source</a>)</p><p>Now combine that with the mental health app market, where the data is extraordinarily sensitive, users are often in vulnerable emotional states, and the barrier to entry just dropped to &#8220;describe what you want and hit publish.&#8221;</p><div><hr></div><p>&#128204; <em><strong>If you missed it:</strong> We did a breakdown of the online age verification chokepoint strategy, and why Facebook&#8217;s Zuckerberg wants identity checks baked into your operating system. <a href="https://x.com/secretsofprivac/status/2026284557184454672">Read on X.</a></em></p><div><hr></div><h3>Our Take</h3><p>We&#8217;re headed toward a wave of mental health app breaches that will make the Tea incident look small. Circumstances are creating a perfect storm for a dangerous outcome:  </p><blockquote><p>a surge of AI-generated apps built by people who don&#8217;t understand security, handling some of the most sensitive data imaginable, downloaded by millions of users who trust the app store listing at face value.</p></blockquote><p>And the app stores aren&#8217;t going to save you here. </p><p>Google has tightened quality controls, but their review process doesn&#8217;t catch the kinds of vulnerabilities Oversecured found; things like hardcoded API keys, insecure session token generation, and misconfigured internal activities. These are architectural security failures, not policy violations.</p><p>We&#8217;re about 12&#8211;18 months away from a major mental health app breach that results in blackmail campaigns. The data is too valuable, the apps are too poorly built, and the attack surface is growing exponentially. Scammers and extortionists who currently buy medical records on the dark web will specifically target therapy and mental health platforms because the leverage is unmatched.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h3>What You Can Do Right Now</h3><p>Before you download any app, but especially a mental health or wellness app, check one thing: <strong>when was it last updated?</strong> </p><p>Oversecured noted that only four of the ten apps they tested had been updated this month; some hadn&#8217;t been touched since September 2024. An app that isn&#8217;t being actively maintained almost certainly isn&#8217;t being actively secured. It&#8217;s not a perfect signal, but it&#8217;s the fastest filter you have.</p><p>Beyond that, consider whether you actually <em>need</em> an app for this. A notes app with local-only storage and no cloud sync might serve you better than a slick AI therapy chatbot that&#8217;s sending your deepest thoughts to a poorly secured backend server.</p><h3>Looking Ahead</h3><p>This is one of the privacy stories we&#8217;ll be watching most closely this year. The intersection of AI-generated software, sensitive health data, and minimal oversight is a perfect storm.</p><p>And if this post has you wondering what&#8217;s already out there about you, from health apps, data brokers, or anything else, we created a guide for exactly that. <strong><a href="https://secretsofprivacy.gumroad.com/l/howexposedareyouonline">How Exposed Are You Online?</a></strong> walks you through finding out. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Secrets of Privacy&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Secrets of Privacy</span></a></p><div><hr></div><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics. </em></p><div><hr></div><h5><strong>Disclaimer:</strong> None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.  </h5><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png" width="727" height="87" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:87,&quot;width&quot;:727,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33962,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/174034271?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">DeleteMe is our go to service for automatic removal of personal information from data broker sites. Click the affiliate link above for more info and to get 20% off. </figcaption></figure></div><ul><li><p>Privacy freedom is more affordable than you think. We tackle the top Big Tech digital services and price out privacy friendly competitors <a href="https://www.secretsofprivacy.com/p/from-free-to-freedom-how-much-it-costs-to-take-back-your-online-privacy">here</a>. The results may surprise you.</p></li><li><p>Do you own a Smart TV? If so, you won&#8217;t want to miss this reader fav post <strong>Smart TV Privacy Settings: How to Disable Tracking on Every Brand</strong>. </p></li></ul><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c3d96bf2-210a-4cfc-99d3-6d4a0dc1d475&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Smart TV Privacy Settings: How to Disable Tracking on Every Brand&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2025-09-17T01:13:36.498Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba945728-b80c-4596-bdc3-ad5149cebd2f_1200x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/smart-tv-privacy-settings&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:173689640,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:91,&quot;comment_count&quot;:15,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em>If you&#8217;re reading this but haven&#8217;t yet signed up, join for free (4.5K+ subscribers strong) and get our newsletter delivered to your inbox by subscribing here &#128071;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[QR Code Scams Are Coming in the Mail Now]]></title><description><![CDATA[How scammers figured out that your mailbox is their most powerful weapon, and what to do about it.]]></description><link>https://www.secretsofprivacy.com/p/qr-code-scams-are-coming-in-the-mail</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/qr-code-scams-are-coming-in-the-mail</guid><pubDate>Wed, 25 Feb 2026 02:21:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/849bb9de-dcdd-4297-8fa4-4b3e0b563466_1200x630.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Something unexpected arrives in your mailbox. </p><p>Could be a package with your name on it. Could be a letter on official-looking letterhead from a company you trust. </p><p>Either way, there&#8217;s a QR code inside, and the message is urgent: </p><blockquote><p><em>scan this now.</em></p></blockquote><p>This is the new face of phishing.</p><p>It doesn&#8217;t come through email, where spam filters can catch it. It doesn&#8217;t pop up in a browser tab. </p><p>Instead, it arrives the old-fashioned way, through your front door. </p><p>This time though, it&#8217;s wearing a logo you trust, like Amazon, or Ledger, or Trezor. And because we&#8217;ve spent twenty years being trained to distrust suspicious emails but almost no time learning to distrust suspicious mail, the scammers are stacking some wins.</p><p>Two incidents in the past few weeks make this impossible to ignore. </p><p>One involves Amazon packages. Another involves cryptocurrency wallets. </p><p>But the people who should be most concerned aren&#8217;t just Amazon shoppers or crypto investors, they&#8217;re everyone who gets mail.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>The QR-Code Mailbox Attack</h2><p>Everything else in this piece follows from one idea: <strong>the attack surface is moving offline.</strong></p><p>Every piece of cybersecurity software you&#8217;ve ever used, whether spam filters, antivirus, browser warnings, or two-factor authentication prompts, is designed to catch threats that travel through <em>digital channels</em>.</p><p>Physical mail bypasses all of it.</p><p>A letter can&#8217;t be flagged by your email provider. A package can&#8217;t be scanned by your router&#8217;s firewall. And a QR code on a piece of paper hides its destination URL, making it harder to do something like hover over it the way you can hover over a link in an email.</p><p>Scammers have noticed. And they&#8217;re investing in postage.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/qr-code-scams-are-coming-in-the-mail?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/qr-code-scams-are-coming-in-the-mail?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>Two Incidents, Same Playbook</h2><h3>Incident 1: The &#8220;Mystery Gift&#8221; Amazon Package</h3><p>Police departments across the US are warning residents about a new twist on so-called <em>brushing scams</em>. Here&#8217;s how it works.</p><p>An unsolicited package arrives at your door. It has Amazon branding. It has <em>your</em> real name and address on the label. Inside, there&#8217;s either a small item, usually something cheap and lightweight, or just a note.</p><p>And there&#8217;s a QR code, asking you to scan it to &#8220;find out who sent this gift,&#8221; &#8220;claim your reward,&#8221; or &#8220;report a wrong delivery.&#8221;</p><p>The QR code doesn&#8217;t lead to Amazon. It leads to a fake Amazon page designed to steal your login credentials, or it prompts you to download something that hands over access to your banking information. (<a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/amazon-package-qr-code-scam">source</a>)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wtOi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wtOi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png 424w, https://substackcdn.com/image/fetch/$s_!wtOi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png 848w, https://substackcdn.com/image/fetch/$s_!wtOi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png 1272w, https://substackcdn.com/image/fetch/$s_!wtOi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wtOi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png" width="662" height="389" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:389,&quot;width&quot;:662,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:58131,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/188535493?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wtOi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png 424w, https://substackcdn.com/image/fetch/$s_!wtOi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png 848w, https://substackcdn.com/image/fetch/$s_!wtOi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png 1272w, https://substackcdn.com/image/fetch/$s_!wtOi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F983077b6-5e2a-4dac-9507-f9d5ff5ea2db_662x389.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The original brushing scam was annoying but mostly harmless and worked like this: sellers shipped you junk so they could post a &#8220;verified purchase&#8221; review. This is a different animal. The QR code turns what was a nuisance into an active threat. The package is the lure. The code is the trap.</p><h3>Incident 2: The Letter That Looked More Legitimate Than the Real Thing</h3><p>If the Amazon package scam is a low-budget operation, the campaign targeting cryptocurrency hardware wallet owners is something else entirely. And even if you don&#8217;t own any crypto, this incident matters to you for reasons we&#8217;ll get to shortly.</p><p>Starting around February 2026, people who own Ledger or Trezor hardware wallets (physical devices used to store cryptocurrency offline) began receiving physical letters in the mail. (<a href="https://www.bleepingcomputer.com/news/security/snail-mail-letters-target-trezor-and-ledger-users-in-crypto-theft-attacks/">source</a>) The letters appeared on official-looking letterheads. They included holograms. They included QR codes. They bore what appeared to be the signature of company executives.</p><p>The letters claimed that an urgent &#8220;Authentication Check&#8221; or &#8220;Transaction Check&#8221; had become mandatory. Recipients were told to scan the QR code and complete the process before a specific deadline or risk losing access to their wallet entirely.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Vnt_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vnt_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png 424w, https://substackcdn.com/image/fetch/$s_!Vnt_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png 848w, https://substackcdn.com/image/fetch/$s_!Vnt_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png 1272w, https://substackcdn.com/image/fetch/$s_!Vnt_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vnt_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png" width="656" height="433" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:433,&quot;width&quot;:656,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:142863,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/188535493?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Vnt_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png 424w, https://substackcdn.com/image/fetch/$s_!Vnt_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png 848w, https://substackcdn.com/image/fetch/$s_!Vnt_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png 1272w, https://substackcdn.com/image/fetch/$s_!Vnt_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7c11eb7-040f-4346-bf7c-b9b9d726a837_656x433.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Scanning the QR code led to a website that looked exactly like the official Trezor or Ledger setup interface. The site walked users through a plausible-sounding verification process and, at the very end, asked them to enter their wallet&#8217;s recovery phrase, the 12-, 20-, or 24-word master key that controls everything in the wallet. Once entered, the funds are gone. Within minutes.</p><h2>The Three Unfair Advantages of Mail Phishing</h2><p>Physical mail phishing works because it exploits three things simultaneously that digital phishing almost never can.</p><p><strong>First: it bypasses every filter you have.</strong> No spam folder. No browser warning. No antivirus scan. Your mailbox has zero security infrastructure.</p><p><strong>Second: it feels more trustworthy.</strong> We&#8217;ve been conditioned to distrust urgent emails from companies we do business with. We&#8217;re far less conditioned to distrust urgent letters. Physical mail carries a subconscious weight because someone spent money on paper, printing, and postage. It feels like it <em>means</em> something.</p><p><strong>Third: QR codes hide the destination.</strong> When you get a suspicious link in an email, you can hover over it and see where it actually goes. A QR code on paper gives you nothing. You can&#8217;t see the URL without scanning it. And most people don&#8217;t know how to preview a QR code before opening what it points to.</p><p>Combine these three factors and you have an attack that is genuinely harder to defend against than the average phishing email. Not because it&#8217;s more technically sophisticated, but because it exploits social and cognitive vulnerabilities that most people have never been warned about.</p><h2>This Is a Data Breach Problem, Not a Scammer Cleverness Problem</h2><p>Here&#8217;s what most coverage of these incidents is getting wrong.</p><p>The Ledger and Trezor letters aren&#8217;t impressive because the scammers are creative. They&#8217;re impressive because someone handed them a roadmap.</p><ul><li><p>In June 2020, Ledger suffered a data breach that ultimately exposed approximately 272,000 customer records (full names, phone numbers, and <em>home addresses) </em>which were later dumped publicly online.</p></li><li><p>In January 2024, Trezor disclosed a breach that exposed contact information for nearly 66,000 users, including emails.</p></li><li><p>And in January 2026, Ledger customers were notified of <em>another</em> exposure through a third-party payment processor called Global-e.</p></li></ul><p>That is a lot of home addresses and other PI in the wild. And home addresses are the only input you need to mail someone a very convincing letter.</p><p>The Amazon brushing scam works the same way. Scammers are buying or scraping real names and addresses to make their packages look legitimate.</p><p>We tend to think of data breaches as a password problem. Change your password, enable two-factor auth, move on. But your home address doesn&#8217;t change when a breach happens. It just sits there, in some hacker&#8217;s database, waiting to be monetized. The current generation of mail phishing attacks is that monetization. The breach happened years ago. The invoice is arriving now.</p><p>This is the part that should worry you: <strong>we are in the early stages of this trend.</strong> As more personal data leaks accumulate and more scammers realize that physical mail bypasses every digital defense, this attack vector is going to get more common, more sophisticated, and harder to distinguish from legitimate correspondence.</p><p>What legislators and most cybersecurity companies don&#8217;t fully grasp yet is that the protection framework needs to extend <em>offline.</em> And right now, almost none of it does.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;2e16c009-2845-4617-9673-c71f623858f7&quot;,&quot;caption&quot;:&quot;Scammers don&#8217;t always need fresh hacks. Sometimes, they just recycle your old data and make it dangerous again.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Scammers Are Recycling Old Breach Data With AI. Here&#8217;s What To Do&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2025-10-08T01:23:50.828Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/be26b4df-4edb-43e5-8c06-0ca9c5e7134a_420x320.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/scammers-are-recycling-old-breach-data-with-ai-here-is-what-to-do&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:174034271,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:21,&quot;comment_count&quot;:5,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h2>Where This Goes Next</h2><p>Here&#8217;s why you don&#8217;t need to own any crypto for this to matter to you.</p><p>Crypto users were the perfect population to test physical mail phishing against. They&#8217;re identifiable by name and address thanks to documented breaches. They hold high-value assets, which justifies the cost of printing, holograms, and postage (scammers need the per-victim payout to cover their materials). And they&#8217;re already primed to think about wallet security, so a letter about a &#8220;mandatory security check&#8221; lands believably.</p><p>But testing on crypto users was never the end goal. It was the proof of concept.</p><p>Once scammers confirm that physical mail phishing converts (that people scan QR codes from letters, that the ROI works) the playbook gets ported to target populations where the per-victim take is smaller but the volume is orders of magnitude larger. Here&#8217;s where what likely comes next:</p><p><strong>The IRS letter.</strong> Fake IRS correspondence is already the most successful phone scam category in America. A physical letter with a QR code is the obvious evolution.  Something like &#8220;scan to verify your identity before your refund is processed&#8221; or &#8220;respond within 14 days to avoid an audit hold&#8221;. The IRS already communicates exclusively by physical mail, which means recipients are specifically conditioned to take letters from them seriously. Nearly every adult American is a viable target.</p><p><strong>Medicare and Social Security.</strong> The demographic that trusts physical mail most deeply is also the demographic most heavily targeted by phone scams. A letter saying &#8220;your Medicare coverage requires reconfirmation &#8212; scan here to avoid a lapse in benefits&#8221; is perfectly engineered for that audience.</p><p><strong>Banks and credit unions.</strong> &#8220;Your account has been flagged for unusual activity &#8212; scan to verify your identity and avoid a temporary freeze.&#8221; Banks do send physical fraud alert letters. The format is completely plausible, and the credential harvest that follows works the same way it did with Amazon.</p><p><strong>Utilities and local government.</strong> &#8220;Final notice before service interruption&#8221; is a proven psychological lever. Fake utility QR-code letters have already appeared in parts of Europe. It&#8217;s a matter of time before this is widespread in the US.</p><p><strong>Healthcare and insurance.</strong> People managing chronic conditions receive regular correspondence from insurers, specialty pharmacies, and providers. They&#8217;re often dealing with something stressful enough that they act quickly when they see urgent mail, and healthcare data breaches have put millions of home addresses into circulation.</p><p><strong>Mortgage servicers and title companies.</strong> Homeowners receive physical mail from county assessors, mortgage servicers, and title companies constantly. A QR code on a letter appearing to be from your lender could be used to initiate wire transfer fraud. </p><p>The pattern in all of these: a sector where (a) physical mail is the established communication norm, (b) real urgency sometimes exists, and (c) a data breach has already put home addresses in the public domain. That describes most of modern life.</p><p>Scammers proved the model on crypto users because the payout justified the investment. The next phase is scaling it down in value and up in volume. If you pay taxes, have a bank account, or receive mail (and that&#8217;s basically everyone) you&#8217;re in the next wave of targets.</p><h2>The Actual Solution: How to Protect Yourself From Mail Phishing</h2><p>This section is more involved than &#8220;don&#8217;t scan QR codes from strangers,&#8221; though that&#8217;s the right instinct. Here&#8217;s a practical protocol.</p>
      <p>
          <a href="https://www.secretsofprivacy.com/p/qr-code-scams-are-coming-in-the-mail">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[The Surprising Hidden Cost of “Free” Budgeting Apps]]></title><description><![CDATA[You might be sharing your transactions with more companies than you think.]]></description><link>https://www.secretsofprivacy.com/p/hidden-privacy-cost-free-budgeting-apps</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/hidden-privacy-cost-free-budgeting-apps</guid><pubDate>Fri, 20 Feb 2026 02:16:16 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/84b5564f-0ffb-4db2-be28-7613f5fee194_1080x567.gif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Your budgeting app knows you better than your bank.</p><p>And when you tap &#8220;connect your bank,&#8221; you&#8217;re often giving a whole chain of companies ongoing access to your transactions, balances, and account details.</p><p>Most people never get a clear explanation of what happens next. They just want a clean dashboard and a spending chart that makes sense.</p><p>For this guest post we enlisted <strong>Vadim Semeniuk, co-founder of <a href="https://www.digitusdata.com/">Digitus Data</a> (</strong>a custom software studio) with over a decade in business. Vadim breaks down the hidden privacy tradeoff behind &#8220;free&#8221; budgeting apps: the data-sharing ecosystem that sits between you and your bank. </p><p>We asked Vadim to write a guest post after checking out his privacy friendly personal finance statement analyzer called <strong><a href="https://spendsum.com/">SpendSum</a></strong>. This is not an ad and there&#8217;s no affiliate relationship. We just thought it was a cool project and wanted to tap into Vadim&#8217;s expertise in this area. </p><p>In this guest post, you&#8217;ll learn what that &#8220;connect your bank&#8221; button really does, why financial data aggregators matter (even if you&#8217;ve never heard of them), and how to do a few high privacy IQ cleanups that make you a harder target.</p><p>By the end, you&#8217;ll have a simple action plan: </p><ul><li><p>how to audit and disconnect old bank connections</p></li><li><p>what to look for in a privacy policy before linking accounts</p></li><li><p>how to tighten up Venmo settings</p></li><li><p>a couple of safer ways to track spending without handing over your entire financial life.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><div><hr></div><p>In March 2024, Intuit shut down Mint.com. Over 20 million people had used the app at its peak. Most of them got a polite email telling them to migrate to Credit Karma, another Intuit product. Same company, same data ecosystem. Most users never thought twice about it and migrated. </p><p>What that email didn&#8217;t explain was what had already happened to years of their financial data. Or where it went. Or who paid for access to it.</p><p>Mint was free. And like most free apps, the product was never the budgeting tool. The product was you.</p><p>That was one app. But every budgeting app that asks to &#8220;connect your bank&#8221; feeds the same machine. If you&#8217;ve ever tapped that button, you&#8217;re part of it. And chances are you have since a majority of US adults use digital tools to manage their money. </p><p>After Mint died, millions moved to Rocket Money, YNAB, Monarch, Copilot. The app changed. The question didn&#8217;t: </p><blockquote><p>what happens to your data after you hand it over?</p></blockquote><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/hidden-privacy-cost-free-budgeting-apps?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/hidden-privacy-cost-free-budgeting-apps?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>The Company Between You and Your Bank</h2><p>When a budgeting app asks you to connect your bank account, you&#8217;re almost certainly not connecting to your bank directly. You&#8217;re going through a financial data aggregator, a company that acts as a middleman between you and your bank.</p><p>The biggest is <strong>Plaid</strong>. </p><p>According to Plaid&#8217;s own marketing, one in two US adults have connected a financial account through their system. They link to over 12,000 financial institutions and power more than 7,000 apps. </p><p>If you&#8217;ve used Venmo, Cash App, Robinhood, or Coinbase, you&#8217;ve used Plaid. Other major aggregators include <strong>Yodlee</strong> (sold by Envestnet to private equity firm STG in 2025), <strong>MX</strong>, and <strong>Finicity</strong> (acquired by Mastercard in 2020).</p><p>Most users have no idea these companies exist, let alone that they&#8217;re involved.</p><p>Here&#8217;s how it used to work (and in many cases still does): </p><blockquote><p>you&#8217;d type your bank username and password into what looked like your bank&#8217;s login screen. Except it wasn&#8217;t. It was Plaid&#8217;s interface, designed to mimic your bank. Plaid would then log into your bank <em>as you</em> and scrape your account data. This practice, called screen scraping, was the industry standard for years.</p></blockquote><p>Newer connections use token-based access, which is better. But the core dynamic is the same. A company you never chose now has ongoing access to your transactions, balances, account numbers, income, and investment holdings.</p><p>And that access doesn&#8217;t necessarily expire when you stop using the app.</p><h2>Your Spending Data Is More Revealing Than Your Search History</h2><p>Your search history shows what you&#8217;re curious about. Your transaction history shows what you actually do.</p><p>A peer-reviewed study published in <em>Psychological Science</em> analyzed spending records from over 2,000 people and found that purchase data alone could predict personality traits like: </p><ul><li><p>neuroticism</p></li><li><p>extraversion</p></li><li><p>self-control</p></li><li><p>materialism. </p></li></ul><p>Open-minded people spent more on flights, extraverts on dining and drinks, the conscientious on savings. All from bank transactions.</p><p>But it gets more personal than personality types. Look at what your transactions actually say about you.</p><p>A pharmacy charge is a health record. A therapy copay hints at a diagnosis. Donations map your politics and your faith.</p><p>Then there&#8217;s the stuff you&#8217;d rather keep private: gambling app charges, liquor store runs, late-night delivery orders. Splitwise payments and divorce attorney retainers trace your relationships in real time. Payday loans and overdraft fees tell anyone watching that you&#8217;re struggling.</p><p>Even your daily coffee stop and Tuesday grocery run build a map of your routine. Most people wouldn&#8217;t willingly hand that to a stranger.</p><p>Researchers at USC and UT Austin analyzed 389 million public Venmo transactions over an eight-year period and found that about 40% of users in the dataset had publicly leaked sensitive information through their transaction notes. Health conditions, political orientation, drug and alcohol use, all sitting in plain text.</p><p>No single data source reveals more about a person&#8217;s actual life than their spending.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>Who&#8217;s Making Money Off Your Money Data</h2><p>It starts with the aggregators.</p><p>Plaid settled a $58 million class action in 2022 after consumers alleged the company harvested and sold financial data without consent. People who signed up for Venmo didn&#8217;t know Plaid was collecting their transaction history, investment data, and salary information. Each affected consumer got about $36. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hHsY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hHsY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png 424w, https://substackcdn.com/image/fetch/$s_!hHsY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png 848w, https://substackcdn.com/image/fetch/$s_!hHsY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png 1272w, https://substackcdn.com/image/fetch/$s_!hHsY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hHsY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png" width="629" height="318" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:318,&quot;width&quot;:629,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:57237,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/187775622?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hHsY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png 424w, https://substackcdn.com/image/fetch/$s_!hHsY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png 848w, https://substackcdn.com/image/fetch/$s_!hHsY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png 1272w, https://substackcdn.com/image/fetch/$s_!hHsY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05379558-d1c2-4872-a202-5539bb90cbf2_629x318.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Yodlee was worse. </p><p>Three members of Congress (Senators Wyden and Brown, and Representative Eshoo) demanded the FTC investigate after reports surfaced that Yodlee had been selling bank and credit card transaction data of tens of millions of Americans to investment and research firms. The data showed &#8220;how much people spent and where.&#8221;</p><p>A class action alleged they shared some of this data in unencrypted files. A court later sanctioned them for destroying evidence in a separate case.</p><p>Then there are the apps themselves. </p><p>Mint&#8217;s business model was showing users financial product offers (credit cards, loans, insurance) and collecting referral fees. The catch: <strong>the products with the highest fees were rarely the best fit for users</strong>. </p><p>One analysis noted this &#8220;created misaligned incentives between the company and its users.&#8221; When Intuit killed Mint, they funneled users toward Credit Karma, a platform with over 130 million members whose entire business is recommending financial products based on your profile.</p><p>This is how free budgeting apps stay free. Advertisers pay more to reach someone actively managing debt or saving for a home, and your spending data tells them exactly which bucket you&#8217;re in.</p><p>Your own bank is in on it too. </p><p>JPMorgan Chase launched Chase Media Solutions in 2024, an advertising business that lets brands target Chase customers based on their purchase history. Pilot campaigns with Air Canada, Solo Stove, and Whataburger. The bank charges advertisers only when a customer actually buys something, meaning your past spending directly feeds the algorithm predicting your next purchase.</p><p>Mastercard sells access to billions of purchase transactions through more than 25 data service products, according to a US PIRG investigation. Buyers include ad networks, data brokers, insurance companies, and employers.</p><p>And all of it feeds a bigger market. </p><p>The data brokerage industry is projected to reach $462 billion by 2031 (per Transparency Market Research). Spending data sells for a premium because nothing predicts what someone will do next like what they already spent. Brokers use it to sort people into categories tied to ethnicity, religion, health status, political affiliation, and income level.</p><div class="pullquote"><p>This is where a lot of people miss an easy privacy win: it&#8217;s not just about limiting new data sharing, it&#8217;s also about cleaning up the data that&#8217;s already circulating. If you want help with that, <strong>DeleteMe</strong> is a reputable data broker removal service that can handle opt-outs on your behalf (saving you lots of time). Use <a href="https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM">this affiliate link</a> to get started and get 20% off. </p></div><h2>When the Data Gets Loose</h2><p>Data that gets collected eventually gets breached.</p><p>In 2021, a former Cash App employee accessed customer financial reports after leaving the company, exposing the names, brokerage account numbers, and portfolio information of 8.2 million people. That breach led to a $15 million settlement. Separately, Cash App&#8217;s parent company Block was hit with an $80 million fine from 48 state regulators in January 2025 for anti-money laundering failures. Two different problems, same company, same customers bearing the risk.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6GVi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6GVi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png 424w, https://substackcdn.com/image/fetch/$s_!6GVi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png 848w, https://substackcdn.com/image/fetch/$s_!6GVi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png 1272w, https://substackcdn.com/image/fetch/$s_!6GVi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6GVi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png" width="792" height="538" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:538,&quot;width&quot;:792,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:268106,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/187775622?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6GVi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png 424w, https://substackcdn.com/image/fetch/$s_!6GVi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png 848w, https://substackcdn.com/image/fetch/$s_!6GVi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png 1272w, https://substackcdn.com/image/fetch/$s_!6GVi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa2d4ba73-2003-424d-aedb-898339cd6cea_792x538.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Across fintech, 41.8% of breaches originate from third-party vendors, according to a 2025 SecurityScorecard report analyzing the top 250 fintech companies. Those third parties are often the same aggregators and data processors handling your bank connection.</p><p>And then there&#8217;s Venmo. </p><p>Transactions on Venmo were public by default for years. In 2018, a researcher scraped 207 million public transactions, documenting &#8220;users&#8217; lives: everything from cannabis sales to budding romances, to breakups, to how much pizza they ate and how much Coke they bought.&#8221; </p><p>In March 2025, reporters discovered that National Security Adviser Mike Waltz had a public Venmo friends list with 328 contacts, including White House staffers, military officers, and journalists. The account was only made private after the press reached out to the White House.</p><h2>Don&#8217;t Count on Regulators</h2><p>If you&#8217;re waiting for the government to sort this out, it&#8217;s going to be a long wait.</p><p>The Biden-era CFPB proposed two rules that could have helped. One (Section 1033) would have given consumers more control over how their financial data gets shared. The other would have treated data brokers as consumer reporting agencies, forcing them to get consent before selling your information.</p><p>Both are dead.</p><p>A federal judge enjoined the Section 1033 rule in late 2025, and the CFPB is now rewriting it from scratch. The data broker rule was withdrawn entirely in May 2025. The CFPB&#8217;s decided it was not necessary or appropriate at this time. (<a href="https://www.consumerfinancialserviceslawmonitor.com/2025/05/cfpb-withdraws-proposed-fcra-data-broker-rule/">source</a>)</p><h2>What You Can Do</h2><p>None of this means you should stop tracking your spending. It means you should care about how you do it.</p><p><strong>Audit your bank connections.</strong> Start at <a href="https://my.plaid.com/">my.plaid.com</a>. You&#8217;ll see every financial account you&#8217;ve ever connected through Plaid, often including ones you forgot about years ago. Disconnect anything you&#8217;re not actively using. Then check your bank&#8217;s own &#8220;connected apps&#8221; or &#8220;data sharing&#8221; section and revoke anything stale there too.</p><p><strong>Read the privacy policy before connecting.</strong> Specifically, search for &#8220;data sharing&#8221; and &#8220;third parties.&#8221; If a financial app is free, find out how they make money. That will tell you what&#8217;s happening to your data.</p><p><strong>Use tools that don&#8217;t require bank access.</strong> This is why I built <a href="https://spendsum.com/">SpendSum</a>, a statement analyzer that runs entirely in your browser. You download a CSV from your bank, drop it in, and the analysis happens on your machine. No bank connections, no accounts, no third-party aggregators touching your data. Nothing leaves your device.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XUgi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XUgi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png 424w, https://substackcdn.com/image/fetch/$s_!XUgi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png 848w, https://substackcdn.com/image/fetch/$s_!XUgi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png 1272w, https://substackcdn.com/image/fetch/$s_!XUgi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XUgi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png" width="612" height="470" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/75725256-b9a6-461e-bff6-42503ba895dd_612x470.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:470,&quot;width&quot;:612,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:124796,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/187775622?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XUgi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png 424w, https://substackcdn.com/image/fetch/$s_!XUgi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png 848w, https://substackcdn.com/image/fetch/$s_!XUgi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png 1272w, https://substackcdn.com/image/fetch/$s_!XUgi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75725256-b9a6-461e-bff6-42503ba895dd_612x470.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Use your bank&#8217;s own tools.</strong> Most banks now offer basic spending breakdowns in their apps. Less detailed, but the data stays with your bank.</p><p><strong>Lock down Venmo.</strong> Switch your default transaction visibility to private (Settings &gt; Privacy &gt; Default Privacy Setting &gt; Private) and review your friends list visibility while you&#8217;re there.</p><p><strong>Keep transaction notes vague.</strong> On any payment app, write &#8220;dinner&#8221; not &#8220;Dr. Martinez copay.&#8221; Notes are stored, analyzed, and on Venmo, potentially public.</p><h2>One Question Worth Asking</h2><p>Twenty million Mint users got that polite migration email in 2024. Most clicked through to Credit Karma without a second thought. Intuit already had years of their spending data. The cycle just continued with a different app.</p><p>Next time an app asks to connect your bank, ask yourself: who else gets to see this data? If you can&#8217;t answer that clearly, maybe the app isn&#8217;t as free as it looks.</p><p>Your spending data is the most detailed record of your daily life that exists anywhere. Treat it that way.</p><h2>Friendly Ask</h2><p>If you found this helpful or informative, chances are your friends and family will as well. Please share it with them to help spread awareness. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/hidden-privacy-cost-free-budgeting-apps?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/p/hidden-privacy-cost-free-budgeting-apps?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics. </em></p><div><hr></div><h5><strong>Disclaimer:</strong> None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.  </h5><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png" width="727" height="87" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:87,&quot;width&quot;:727,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33962,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/174034271?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">DeleteMe is our go to service for automatic removal of personal information from data broker sites. Click the affiliate link above for more info and to get 20% off. </figcaption></figure></div><ul><li><p>Privacy freedom is more affordable than you think. We tackle the top Big Tech digital services and price out privacy friendly competitors <a href="https://www.secretsofprivacy.com/p/from-free-to-freedom-how-much-it-costs-to-take-back-your-online-privacy">here</a>. The results may surprise you.</p></li><li><p>Do you own a Smart TV? If so, you won&#8217;t want to miss this post from our three part series on how To make your smart TV less creepy. </p></li></ul><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c1c4120c-a7b9-4e61-8265-af2413de5114&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Smart TV Privacy Settings: How to Disable Tracking on Every Brand&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2025-09-17T01:13:36.498Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba945728-b80c-4596-bdc3-ad5149cebd2f_1200x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/smart-tv-privacy-settings&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:173689640,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:100,&quot;comment_count&quot;:16,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em>If you&#8217;re reading this but haven&#8217;t yet signed up, join for free (4.4K+ subscribers strong) and get our newsletter delivered to your inbox by subscribing here &#128071;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[What To Do About Your Old Usernames]]></title><description><![CDATA[Your old usernames are still out there, and still searchable. Learn how to audit, update, or delete forgotten accounts.]]></description><link>https://www.secretsofprivacy.com/p/old-usernames-cleanup</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/old-usernames-cleanup</guid><pubDate>Wed, 18 Feb 2026 02:08:14 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f7d351b3-a652-4028-8ef6-243a3b51a947_1200x630.gif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Using unique usernames is a great habit. And as we announced a few weeks back, we created a simple tool to make the process easy for you. See here: </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;dc973d7b-8ed1-4957-a4f1-8f57d0e8c5de&quot;,&quot;caption&quot;:&quot;You&#8217;ve heard it a thousand times: use a unique password for every account.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Password Advice Everyone Misses&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2026-01-21T02:11:18.334Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94149f97-67be-4f41-9ca8-87e194ca0ce5_1200x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/unique-usernames-security&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:182587618,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:21,&quot;comment_count&quot;:4,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>But what about the accounts you&#8217;ve already created?</p><p>Even if you start fresh today, your old usernames are still searchable. OSINT tools can find that gaming handle you used in 2012, connect it to your yahoo account, and keep pulling the thread until they&#8217;ve built a profile on you. The past doesn&#8217;t disappear just because you&#8217;ve changed your habits.</p><p>So what do you do about it?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>Schedule an Account Cleanup Day</h2><p>Rather than trying to fix everything at once (you won&#8217;t), block 30-60 minutes on your calendar for an account cleanup. It could be quarterly, monthly, or some other frequency. The important part is that it&#8217;s something you can follow through on. </p><p>Is this annoying? Of course. </p><p>Is it necessary? Depends on your risk profile and how much you like to try and future proof things. </p><p>If you decide this is a worthwhile exercise, here&#8217;s how to spend that time:</p><p><strong>1. Pull up your password manager.</strong> Sort by oldest accounts or just scroll through the list. You&#8217;ll probably be surprised by how many you&#8217;ve forgotten.</p><blockquote><p>Don't have a password manager? Your email inbox is the next best thing. Search for terms like "welcome," "confirm your account," "verify your email," or "thanks for registering." You'll be surprised how many forgotten accounts surface. This is also a good reminder to start using a password manager, which makes future cleanup days much easier.</p></blockquote><p><strong>2. For each account, ask three questions:</strong></p><ul><li><p>Do I still use this? If not, delete it.</p></li><li><p>Can I change the username? If yes, swap it for a unique one.</p></li><li><p>Is this a high-value account? Prioritize email, banking, healthcare, and anything tied to your real identity.</p></li></ul><p><strong>3. Close what you don&#8217;t need.</strong> Old accounts are liabilities. They sit in breach databases, they&#8217;re searchable by OSINT tools, and they add to your attack surface. If you haven&#8217;t logged in for a year, you probably don&#8217;t need it. Sites like justdelete.me can help you find the delete option (some companies bury it on purpose).</p><div class="pullquote"><p>Before deleting an old account, it&#8217;s best practice to change as much information in the account as you can. Switch any personal information to non-identifying data. For example, your name become Jack/Jane Doe, you make up a DOB, you make up an email address, etc. This is because although you delete your account, the account data remains in the company&#8217;s system for a set period of time. If there&#8217;s a breach a year from now, your fake data gets leaked, not your real data that you thought was deleted. </p></div><h2>Prioritize the High-Value Targets</h2><p>If you&#8217;re short on time, this section lays out how we recommend prioritizing the accounts. </p><ul><li><p><strong>Email accounts</strong> &#8212; The skeleton key to your digital life. If someone gets into your email, they can reset passwords everywhere else.</p></li><li><p><strong>Financial accounts</strong> &#8212; Banks, credit cards, investment platforms.</p></li><li><p><strong>Healthcare portals</strong> &#8212; Contain sensitive personal data.</p></li><li><p><strong>Social media with your real identity</strong> &#8212; LinkedIn, Facebook, anything with your actual name attached.</p></li><li><p><strong>Your password manager itself</strong> &#8212; If you&#8217;re using your email as the username, consider changing it.</p></li></ul><p>Everything else, like old forums, random shopping accounts, that app you tried once, can wait for your next cleanup day.</p><p>There is one problem you will run into rather soon: </p><blockquote><p>many websites won&#8217;t let you change your username. </p></blockquote><p>If you encounter that, your options are, unfortunately, not great. If you need to have an account with the website, you can try reach out to tech support to request a manual username change. That probably won&#8217;t work, but it&#8217;s worth a shot. </p><p>Another option is to start over with a fresh account, though those use cases are limited. Closing a bank account and then opening a new one, for example, probably isn&#8217;t worth the effort. In the end, don&#8217;t go crazy here unless you have a high risk profile or enjoy the challenge. </p><h2>The Bigger Picture</h2><p>If you want to go deeper than usernames, our <em><a href="https://secretsofprivacy.gumroad.com/l/howexposedareyouonline">How Exposed Are You Online?</a></em> guide walks you through a full self-audit using the same OSINT techniques that investigators and doxxers use. It covers key exposure areas and links to the tools (many free) so you can see exactly what&#8217;s findable about you, and fix it.</p><p>But even without the full audit, scheduling a cleanup day twice a year will put you ahead of most people. Small upgrades snowball into big wins over time.</p><p>Your past doesn&#8217;t have to stay searchable forever. The important part is to <strong>start pulling those threads on your time</strong>, before someone else does.</p><h2>&#128278; Bookmark Our Username Generator</h2><p>Don&#8217;t forget to bookmark our free <a href="https://tools.secretsofprivacy.com/username-generator">username generator</a>. You can even add a shortcut to your mobile phone home screen for easy access. That helps remove the friction with creating unique usernames and puts you ahead of 99% of the population. </p><h2>Friendly Ask</h2><p>If you found this helpful or informative, chances are your friends and family will as well. Please share it with them to help spread awareness. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/old-usernames-cleanup?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.secretsofprivacy.com/p/old-usernames-cleanup?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><p><em>Looking for help with a privacy issue or privacy concern? Chances are we&#8217;ve covered it already or will soon. Follow us on <a href="https://twitter.com/secretsofprivac">X</a> and <a href="https://www.linkedin.com/company/secrets-of-privacy/">LinkedIn</a> for updates on this topic and other internet privacy related topics. </em></p><div><hr></div><h5><strong>Disclaimer:</strong> None of the above is to be deemed legal advice of any kind. These are *opinions* written by a privacy and tech attorney with years of working for, with and against Big Tech and Big Data. And this post is for informational purposes only and is not intended for use in furtherance of any unlawful activity. This post may also contain affiliate links, which means that at no additional cost to you, we earn a commission if you click through and make a purchase.  </h5><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png" width="727" height="87" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:87,&quot;width&quot;:727,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33962,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://joindeleteme.com/refer?coupon=RFR-54888-FDDKNM&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/174034271?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VeO6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 424w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 848w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1272w, https://substackcdn.com/image/fetch/$s_!VeO6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9cca34c-99de-434e-9291-e258879a8dc0_727x87.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">DeleteMe is our go to service for automatic removal of personal information from data broker sites. Click the affiliate link above for more info and to get 20% off. </figcaption></figure></div><ul><li><p>Privacy freedom is more affordable than you think. We tackle the top Big Tech digital services and price out privacy friendly competitors <a href="https://www.secretsofprivacy.com/p/from-free-to-freedom-how-much-it-costs-to-take-back-your-online-privacy">here</a>. The results may surprise you.</p></li><li><p>Do you own a Smart TV? If so, you won&#8217;t want to miss this reader fav post <strong>Smart TV Privacy Settings: How to Disable Tracking on Every Brand</strong>. </p></li></ul><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6b0ba522-e8e7-420e-a6ac-64bed532677a&quot;,&quot;caption&quot;:&quot;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Smart TV Privacy Settings: How to Disable Tracking on Every Brand&quot;,&quot;publishedBylines&quot;:[],&quot;post_date&quot;:&quot;2025-09-17T01:13:36.498Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba945728-b80c-4596-bdc3-ad5149cebd2f_1200x630.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.secretsofprivacy.com/p/smart-tv-privacy-settings&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:173689640,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:91,&quot;comment_count&quot;:15,&quot;publication_id&quot;:1961031,&quot;publication_name&quot;:&quot;Secrets of Privacy&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yQg9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cc9649c-9d5f-41b2-9190-62cd7b3f1762_1000x1000.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p><em>If you&#8217;re reading this but haven&#8217;t yet signed up, join for free (4.4K+ subscribers strong) and get our newsletter delivered to your inbox by subscribing here &#128071;</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Your AI Assistant Is About to Start Selling to You]]></title><description><![CDATA[OpenAI just announced conversation-based ads in ChatGPT. Here's what other privacy guides miss about protecting yourself.]]></description><link>https://www.secretsofprivacy.com/p/chatgpt-ads-conversation-targeting-privacy-solution</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/chatgpt-ads-conversation-targeting-privacy-solution</guid><pubDate>Wed, 11 Feb 2026 02:18:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d752ebf9-df38-4d70-bae8-8af669e9abd5_1200x630.gif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>On January 16, 2026, OpenAI announced it will begin testing advertisements inside ChatGPT. These are ads that appear based on what you&#8217;re discussing with the AI. (<a href="https://openai.com/index/our-approach-to-advertising-and-expanding-access/">source</a>)</p><p>If you ask about planning a vacation, expect travel ads. Mention a health concern, and pharmaceutical companies are paying attention. The feature is rolling out to free users and the $8/month &#8220;Go&#8221; tier in the coming weeks.</p><p>Here&#8217;s what makes this different from every other ad platform you&#8217;ve encountered:</p><blockquote><p>ChatGPT doesn&#8217;t just know what you clicked or what page you visited. It knows <em>why</em>. It knows your doubts, your questions, your vulnerabilities. It knows the context that led you to search for something, not just the search itself.</p></blockquote><p>As one privacy commentator put it, &#8220;prompts inside ChatGPT can reveal intent, uncertainty, and vulnerability in ways that traditional advertising platforms don&#8217;t see.&#8221; (<a href="https://techreport.com/news/innovation/chatgpts-move-into-advertising-raises-concerns-about-ai-regulation-and-data-governance/">source</a>)</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>Reframing Advertising in the AI Era </h2><p>Conversational AI exploits something fundamental about human psychology, which is we overshare when we think we're having a private conversation. This creates an &#8220;intimacy trap&#8221; to the disadvantage of the human and the benefit of the AI. This scenario does not exist in the same way for traditional digital advertising. </p><p>Traditional digital advertising works on breadcrumbs. For example, you visited a shoe website, so shoe ads follow you around. That&#8217;s surveillance, but it&#8217;s one-dimensional. </p><p>Conversational AI advertising works on confessions. You told ChatGPT you&#8217;re struggling with insomnia and asked for natural remedies. You explained your budget constraints and mentioned you&#8217;re skeptical of prescription drugs. That&#8217;s fundamentality different from the breadcrumb trail type tracking we&#8217;re all used to. </p><p>Put simply: Google gets the question while ChatGPT gets the story.</p><p>Google knows you searched for &#8220;insomnia remedies.&#8221; ChatGPT knows you&#8217;ve tried melatonin, it didn&#8217;t work, you&#8217;re worried about dependency, and you have a wedding in three weeks. </p><p>One is a keyword. The other is a marketing goldmine.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AbXq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AbXq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png 424w, https://substackcdn.com/image/fetch/$s_!AbXq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png 848w, https://substackcdn.com/image/fetch/$s_!AbXq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png 1272w, https://substackcdn.com/image/fetch/$s_!AbXq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AbXq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png" width="616" height="277" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:277,&quot;width&quot;:616,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:14357,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/186883696?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AbXq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png 424w, https://substackcdn.com/image/fetch/$s_!AbXq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png 848w, https://substackcdn.com/image/fetch/$s_!AbXq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png 1272w, https://substackcdn.com/image/fetch/$s_!AbXq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F978e1d1b-6bf5-4ef4-a427-86bba685b0a3_616x277.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Rollout Is Already Underway </h2><p>Internal documents reviewed by <em>The Information</em> in December 2025 revealed OpenAI employees discussing giving sponsored results &#8220;preferential treatment&#8221; over non-sponsored ones. (<a href="https://futurism.com/artificial-intelligence/openai-chatgpt-sponsored-ads">source</a>) In one example, a user asking about ibuprofen dosage might see a promoted Advil ad, while actual dosage information gets buried.</p><p>Even paying customers aren&#8217;t safe from the erosion. </p><p>In early December 2025, ChatGPT Pro subscribers (people paying $200/month) started seeing &#8220;app suggestions&#8221; that looked suspiciously like ads. One user posted on X: </p><blockquote><p>&#8220;ChatGPT has started posting ads on Pro accounts. I hope this is just testing/a mistake, else it&#8217;s an instant unsubscribe from me.&#8221; </p></blockquote><p>OpenAI claims ads won&#8217;t influence ChatGPT&#8217;s responses and conversations will remain &#8220;private from advertisers.&#8221; But that sounds like a half-truth to us and legal weasel wording. </p><p>While advertisers may not see your specific chats, OpenAI <em>must</em> process your conversation content internally to decide which ads to serve. That means your conversations-including sensitive queries about health, relationships, finances, and personal struggles-are being analyzed, categorized, and used to determine what products to push.</p><p>The company has committed over $1.4 trillion to AI infrastructure deals and needs $20 billion in annual revenue to break even. That&#8217;s not going to come from the ~2% of users paying for Plus or Pro subscriptions. It&#8217;s coming from the 800 million people using the free tier-which makes their conversations the product.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/p/chatgpt-ads-conversation-targeting-privacy-solution?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/p/chatgpt-ads-conversation-targeting-privacy-solution?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><h2>The Creep That&#8217;s Coming</h2><p>Here&#8217;s what OpenAI&#8217;s PR team and other privacy pros won&#8217;t tell you: this is just the beachhead.</p><p>OpenAI says ads will be &#8220;separate and clearly labeled.&#8221; They say personalization is &#8220;opt-out.&#8221; They say they&#8217;ll &#8220;never&#8221; sell your data to advertisers. Maybe that really is the intent. At least for now.</p><p>But look at the financial incentives. </p><p>Every major tech company that introduced advertising with restrictions and promises has, over time, loosened those restrictions as revenue pressures mounted. Here are two of the most obvious ones: </p><ul><li><p>Facebook started with &#8220;targeted ads based on profile information.&#8221; Now they track you across the entire internet. </p></li><li><p>Google started with text ads next to search results. Now they inject Shopping results directly into your search, often pushing organic results below the fold.</p></li></ul><p>The pattern is always the same:</p><blockquote><p>Start conservative, build dependency, expand gradually, claim it&#8217;s what users want.</p></blockquote><p>What makes AI advertising particularly insidious is that conversational data creates something unprecedented: <strong>the ability to target emotional states in real-time</strong>. Someone asking ChatGPT for help with anxiety isn&#8217;t just &#8220;interested in mental health products&#8221;. They&#8217;re likely anxious <em>right now</em>, in this moment, seeking help. The advertising potential isn&#8217;t just more precise. It&#8217;s predatory by design.</p><p>Here&#8217;s a prediction:</p><blockquote><p>within 18 months, OpenAI will introduce &#8220;helpful suggestions&#8221; that blur the line between organic responses and sponsored content. The justification will be user experience: &#8220;We&#8217;re showing you this product because it genuinely solves your problem.&#8221; The reality will be that the product got shown because someone paid for preferential placement.</p></blockquote><div class="pullquote"><p>And here&#8217;s the part that should really concern you: every conversation you&#8217;ve ever had with ChatGPT is potentially training data for this system. Even if you&#8217;re on a paid plan without ads now, those past conversations could be used to build and refine the behavioral models that make conversation-based advertising effective. It&#8217;s just a terms of service change away from happening. </p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>Practical Solutions and Counter Measures</h2><p>People will tell you to &#8220;just pay for Plus&#8221; or &#8220;switch to [Competitor X]&#8221; to avoid advertising. That&#8217;s a reasonable short term solution, but it does nothing to address the direction things are going.</p><p>And the real solution isn&#8217;t about avoiding ChatGPT or paying your way out. It&#8217;s about fundamentally changing how you interact with AI tools. Below are some things that actually work. One is so simple and effective we&#8217;re genuinely surprised it&#8217;s not more widely recommended.</p>
      <p>
          <a href="https://www.secretsofprivacy.com/p/chatgpt-ads-conversation-targeting-privacy-solution">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[That Website Is Watching You Type (Yes, Really)]]></title><description><![CDATA[The hidden scripts capturing your keystrokes, mouse movements, and deleted text]]></description><link>https://www.secretsofprivacy.com/p/session-replay-surveillance</link><guid isPermaLink="false">https://www.secretsofprivacy.com/p/session-replay-surveillance</guid><pubDate>Wed, 04 Feb 2026 02:12:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7c2341a0-2ffc-4741-9fa8-15de87e00431_1200x630.gif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Here&#8217;s a common scenario we can all relate to.</p><p>You&#8217;re browsing a website. You start filling out a form, then change your mind and close the tab. </p><p>No harm done, right? Not quite, as it turns out. </p><p>There&#8217;s a good chance that website recorded everything you did: your mouse movements, your scrolling, that half-typed credit card number you deleted, even that embarrassing search query you backspaced over.</p><p>We&#8217;re all familiar with increased AI driven surveillance in bricks and mortar retail stores. We&#8217;ve reported on that before.</p><p>And of course we all know about tracking pixels and cookies in the digital world. But most don&#8217;t know that websites are recording what you do live like an IRL security camera.</p><p>Welcome to the world of <strong>session replay tools</strong>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.secretsofprivacy.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.secretsofprivacy.com/subscribe?"><span>Subscribe now</span></a></p><h2>What Are Session Replay Tools?</h2><p>Companies like <a href="https://www.fullstory.com/">FullStory</a>, <a href="https://www.hotjar.com/">Hotjar</a>, <a href="https://logrocket.com/">LogRocket</a>, and dozens of others offer a simple pitch to website owners: <em>Watch your users like they&#8217;re sitting right next to you.</em></p><p>These tools embed invisible JavaScript on websites that captures:</p><ul><li><p>Every mouse movement and click</p></li><li><p>Everything you type (including deleted text)</p></li><li><p>How far you scroll</p></li><li><p>Where you hesitate</p></li><li><p>Your entire journey through the site, reconstructed as a video</p></li></ul><p>The marketing copy sounds benign: &#8220;Diagnose UI issues, improve support, and get context on nuanced user behavior.&#8221; And yes, these tools can legitimately help companies fix broken checkout flows or confusing navigation.</p><p>What these sites don&#8217;t mention to visitors, of course, is that you&#8217;re being filmed without your knowledge.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AD1E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AD1E!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png 424w, https://substackcdn.com/image/fetch/$s_!AD1E!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png 848w, https://substackcdn.com/image/fetch/$s_!AD1E!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png 1272w, https://substackcdn.com/image/fetch/$s_!AD1E!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AD1E!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png" width="1136" height="437.93369313801077" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:500,&quot;width&quot;:1297,&quot;resizeWidth&quot;:1136,&quot;bytes&quot;:44024,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/182051993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38772c7f-f729-47ef-9202-822889b13f23_1400x500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!AD1E!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png 424w, https://substackcdn.com/image/fetch/$s_!AD1E!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png 848w, https://substackcdn.com/image/fetch/$s_!AD1E!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png 1272w, https://substackcdn.com/image/fetch/$s_!AD1E!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8fa6726-69c3-49b4-bd1c-ccdcfff8888d_1297x500.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Privacy Problem With Session Replay Tech</h2><p><strong>1. You probably have no idea it&#8217;s happening</strong></p><p>Most websites bury session recording disclosure deep in privacy policies, if they mention it at all. There&#8217;s no recording indicator. No consent popup specifically for replay tools. You&#8217;re just being filmed.</p><p><strong>2. Sensitive data leaks are common</strong></p><p>In theory, these tools are supposed to mask passwords, credit card numbers, and personal data. In practice? A study by Princeton University researchers (<a href="https://blog.citp.princeton.edu/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">source</a>) found that session replay scripts on major websites were capturing:</p><ul><li><p>Passwords in plain text</p></li><li><p>Credit card numbers</p></li><li><p>Medical information</p></li><li><p>Private messages</p></li></ul><p>The researchers analyzed seven of the top session replay providers and found these scripts running on 482 of the top 50,000 websites, including sites belonging to The Guardian, Reuters, Samsung, Adobe, and Microsoft. The masking simply wasn&#8217;t working, or wasn&#8217;t configured at all.</p><p><strong>3. Your &#8220;deleted&#8221; text isn&#8217;t deleted</strong></p><p>Changed your mind about that angry customer service message? Decided not to enter your social security number? Too late. Session replay captures keystrokes in real-time. That text you backspaced over? It&#8217;s sitting on a third-party server.</p><p><strong>4. Third parties now have your behavioral data</strong></p><p>Your session isn&#8217;t just stored by the website you visited. It&#8217;s on FullStory&#8217;s servers, or Hotjar&#8217;s, or whoever else. That&#8217;s another company with your data, another potential breach vector, another privacy policy you never agreed to.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ued3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ued3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png 424w, https://substackcdn.com/image/fetch/$s_!Ued3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png 848w, https://substackcdn.com/image/fetch/$s_!Ued3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png 1272w, https://substackcdn.com/image/fetch/$s_!Ued3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ued3!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png" width="1200" height="424.80270574971814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:314,&quot;width&quot;:887,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:42383,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/182051993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd79fa209-6ce0-4b95-baf5-990d47ac01a5_900x340.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ued3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png 424w, https://substackcdn.com/image/fetch/$s_!Ued3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png 848w, https://substackcdn.com/image/fetch/$s_!Ued3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png 1272w, https://substackcdn.com/image/fetch/$s_!Ued3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa57c0e05-ae15-4672-adb3-dc9cc560cb04_887x314.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>How Widespread Is This?</h2><p>More than you&#8217;d think. Session replay tools are embedded on:</p><ul><li><p>Major e-commerce sites</p></li><li><p>Banking and financial services</p></li><li><p>Healthcare portals</p></li><li><p>Government websites</p></li><li><p>News publications</p></li></ul><p>The Princeton study found session replay scripts on nearly 1% of the top 50,000 sites, and that only covered seven session replay providers. The actual number is likely much higher. And adoption is growing: the &#8220;product analytics&#8221; market is projected to hit $20+ billion by 2028.</p><div class="pullquote"><p>Want to see if a particular site uses session replay tech? The authors of the Princeton study created a neat search tool to do just that. The database is not 100% accurate, and doesn&#8217;t include every site, so use it more for fun than to make any decisions. Access it <a href="https://webtransparency.cs.princeton.edu/no_boundaries/session_replay_sites.html">here</a>. </p></div><h2>What About Mobile?</h2><p>If you&#8217;re thinking &#8220;I mostly browse on my phone, so I&#8217;m probably fine,&#8221; we have some bad news.</p><p><strong>Mobile web browsers are just as vulnerable.</strong> The same JavaScript runs whether you&#8217;re on desktop Chrome or mobile Safari.</p><p><strong>Mobile apps can be even worse.</strong> FullStory, LogRocket, and other providers offer mobile SDKs that record taps, swipes, and screen contents directly within apps. That banking app? That health tracking app? They could be recording your sessions too.</p><p><strong>Blocking is harder on mobile.</strong> Most mobile browsers don&#8217;t support extensions like uBlock Origin. Safari on iOS and Chrome on Android offer no way to install content blockers that would catch these scripts.</p><p>No surprise to regular readers, but Brave mobile browser is the exception<strong>.</strong> Available on both iPhones and Android devices, it has the same aggressive built-in tracking protection as the desktop version, blocking many analytics and replay scripts without requiring any extensions.</p><p>Safari&#8217;s built-in Intelligent Tracking Prevention helps with some tracking, but it&#8217;s not specifically designed to block session replay tools.</p><p>The bottom line:</p><blockquote><p>mobile users have fewer defenses unless they switch to Brave, and may face additional exposure through apps (which have their own session replay SDKs that browsers can&#8217;t block at all).</p></blockquote><div><hr></div><p>It's hard to grasp how invasive session replay is until you see it for yourself. So we built a tool that lets you experience it firsthand. </p><p>Access this interactive tool <a href="https://tools.secretsofprivacy.com/session-replay">here</a>. </p><p>Once you&#8217;re there, type in the form fields (don't worry, nothing is actually recorded or sent anywhere) and watch the "recording log" capture every character, every click, every hesitation. That&#8217;s what is happening all the time on major websites and mobile apps unless you have blockers in place. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sizM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sizM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif 424w, https://substackcdn.com/image/fetch/$s_!sizM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif 848w, https://substackcdn.com/image/fetch/$s_!sizM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif 1272w, https://substackcdn.com/image/fetch/$s_!sizM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sizM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2159276,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/182051993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sizM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif 424w, https://substackcdn.com/image/fetch/$s_!sizM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif 848w, https://substackcdn.com/image/fetch/$s_!sizM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif 1272w, https://substackcdn.com/image/fetch/$s_!sizM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09008bdc-d255-43f0-a35b-1bfe9e4c9472_1280x720.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Here&#8217;s a look at the tool we built to demonstrate how session replay spy tools work. The right hand column documents every move you make on the website, and in this case, when completing the form.  </figcaption></figure></div><div><hr></div><h2>What Won&#8217;t Help: VPNs</h2><p>Some of you may be thinking (hoping?) that using a VPN will protect you here.</p><p>Unfortunately, <strong>that&#8217;s not the case.</strong></p><p>A VPN hides your IP address and encrypts traffic between your device and the VPN server. But session replay scripts run <em>inside your browser</em> after the page has already loaded. The JavaScript executes locally on your device and captures your behavior directly. Your VPN never sees it.</p><p>Think of it this way: a VPN protects you from people watching the road between your house and your destination. But session replay is like someone already inside the destination, watching everything you do once you arrive.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0GR0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0GR0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png 424w, https://substackcdn.com/image/fetch/$s_!0GR0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png 848w, https://substackcdn.com/image/fetch/$s_!0GR0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png 1272w, https://substackcdn.com/image/fetch/$s_!0GR0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0GR0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png" width="700" height="180" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:180,&quot;width&quot;:700,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:34530,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.secretsofprivacy.com/i/182051993?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0GR0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png 424w, https://substackcdn.com/image/fetch/$s_!0GR0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png 848w, https://substackcdn.com/image/fetch/$s_!0GR0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png 1272w, https://substackcdn.com/image/fetch/$s_!0GR0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F456d5f8e-ff84-4d93-a5f6-025880153dfb_700x180.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2>What You Can Do About It</h2><p>We have some good news. You can significantly reduce your exposure with some adjustments to your personal privacy stack. And many of you are already using tools and apps that will help you (so no significant change). Here are some options. </p>
      <p>
          <a href="https://www.secretsofprivacy.com/p/session-replay-surveillance">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>