Protecting privacy in post-Roe world
Content

Our Newsletter

Get Our Resources Delivered Straight To Your Inbox

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We respect your privacy. Learn more here.

In the wake of our loss of the constitutional right to abortion, there has been an overwhelming loss of trust in government protection of individual privacy. Our country is at a critical moment of defining to what extent privacy exists and how the government uses data to expand – or restrict – citizens’ rights.

Recently, Zendata launched a Chrome extension that allows users to opt out of third party cookies and trackers, and monitor sites and bodies that may be monitoring them. What’s more, we released a privacy score that captures how sites safeguard individuals’ privacy, and we immediately flag those that may violate or risk user privacy. 

You can checkout the extension here: https://bit.ly/3v8AM8a

Test Scores - Zendata

Beyond this, here are a few important things to keep in mind to protect individual privacy.

The problems with government surveillance

In an environment of surveillance, there are usually two major concerns: access and anonymity. That is, can I access the website or platform I want to without restrictions, and while I access the internet, will my information and identity remain secure? 

In a state where web activity is being monitored by the government, it is important for users to maintain anonymity and prevent any personally identifiable information from being exposed. 

One workaround is to use a VPN to access a website which was banned in a particular country, or a website that only operates in a particular geography. While VPNs are popular and work well in many circumstances, this approach is problematic for a few reasons: 

  • Traffic through VPNs is only encrypted until it reaches the VPN server, and in some instances, VPN services can provide the government with backdoor access to user data – making it possible for government officials to identify individuals accessing banned sites.
  • When accessing a website through a VPN, the typical tracking and identification mechanisms used to identify users – from cookies to device fingerprinting – still work. So, identifying user information is still being captured and the issue of anonymity is not being addressed.

So, how can users maintain anonymity while accessing banned sites?

That’s where the Tor browser comes in.

 Any time a user inputs a search request, Tor splits the request and response traffic across multiple devices called relays.There are thousands of relays run by a volunteer network, and traffic is encrypted multiple times. With this approach, the relay servers only know the previous relay and next relay – making it virtually impossible to track a search back to an individual user. What’s more, even in the event the government blocks Tor relays, you can request an unlisted bridge (i.e. an unlisted relay) as an intermediary to get around the block.

 In addition to split requests, Tor does not allow cookies and it prevents device fingerprinting – a mechanism used to identify a user’s device uniquely – with very few exceptions. Tor users can also access the dark web to upload and share files anonymously through a tool like Securedrop (operated by Free of Press Foundation), which adds another layer of security only accessible through a Tor browser. For secure internet searches, Tor even lets you access browsers like DuckDuckGo on the dark web.

Contact Us For More Information

If you’d like to understand more about Zendata’s solutions and how we can help you, please reach out to the team today.

On top of this, users need to understand that secure apps like Signal and WhatsApp are encrypted, but they can still be traced. 

Even with encryption securing the content of messages, these apps are still tied to individual phone numbers. This means that the minute a user gets apprehended and has their phone confiscated, authorities can use their Signal or WhatsApp history to implicate anyone with whom they have been in contact based on the phone number used to access these services. In order to avoid this scenario, users should look for services like Threema and Discord that do not require a phone number to sign up.

That said, most privacy tricks and tools aren’t foolproof.

This is why it’s important for users to protect – or withhold – their personal data as much as possible, no matter what browser, app or platform they use to access the internet. Let’s say a website requires you to sign up in order to access its services. Rather than using your real name, phone number, etc., there are services like Faux ID that generate synthetic data in the format that is unique to your geography. On top of this, using email addresses that are unique to each website will prevent one website from using aggregate individual data to tie back to a person. 

Providers like ProtonMail allow users to generate multiple email addresses that get forwarded to one inbox. This lets users receive their regular email communication all in one place, but since each e-mail address is different, they can’t be used to identify users by connecting activity across multiple websites. As the stakes for privacy get higher, it’s important to know what resources offer the absolute best data & privacy protection.  Still, the absolute best way to protect personal information is by not sharing it. 

Our Newsletter

Get Our Resources Delivered Straight To Your Inbox

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We respect your privacy. Learn more here.

Related Blogs

What California's AB 1008 Could Mean For Data Privacy and AI
  • Data Privacy & Compliance
  • September 12, 2024
Learn About California's AB 1008 And How It Could Impact Your Business
The EU-U.S. Data Privacy Framework: Safeguarding Transatlantic Data Transfers
  • Data Privacy & Compliance
  • August 22, 2024
Discover Everything You Need To Know About The EU-US DPF
How Easy Is It To Re-Identify Data and What Are The Implications?
  • Data Privacy & Compliance
  • August 22, 2024
Learn About Data Re-Identification And What It Means For Your Business
Understanding Data Flows in the PII Supply Chain
  • Data Privacy & Compliance
  • July 1, 2024
Maximise Data Utility By Learning About Your Data Supply Chain
Data Minimisation 101: Collecting Only What You Need for AI and Compliance
  • Data Privacy & Compliance
  • June 28, 2024
Learn About Data Minimisation For AI And Compliance
Data Privacy Compliance 101: Key Regulations and Requirements
  • Data Privacy & Compliance
  • June 28, 2024
Learn Everything You Need To Know About Data Privacy Compliance
How Zendata Improves Privacy Policy Compliance
  • Data Privacy & Compliance
  • May 30, 2024
Learn About Privacy Policies And Why They Matter
Data Anonymization 101: Techniques for Protecting Sensitive Information
  • Data Privacy & Compliance
  • May 16, 2024
Learn The Basics of Data Anonymization In This Short Guide
Data Pseudonymisation 101: Protecting Personal Data & Enabling AI Innovation
  • Data Privacy & Compliance
  • May 15, 2024
Learn More About Data Pseudonymisation In Our Short Guide
More Blogs

Contact Us For More Information

If you’d like to understand more about Zendata’s solutions and how we can help you, please reach out to the team today.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.





Contact Us Today

If you’d like to understand more about Zendata’s solutions and how we can help you, please reach out to the team today.

Protecting privacy in post-Roe world

July 25, 2022

In the wake of our loss of the constitutional right to abortion, there has been an overwhelming loss of trust in government protection of individual privacy. Our country is at a critical moment of defining to what extent privacy exists and how the government uses data to expand – or restrict – citizens’ rights.

Recently, Zendata launched a Chrome extension that allows users to opt out of third party cookies and trackers, and monitor sites and bodies that may be monitoring them. What’s more, we released a privacy score that captures how sites safeguard individuals’ privacy, and we immediately flag those that may violate or risk user privacy. 

You can checkout the extension here: https://bit.ly/3v8AM8a

Test Scores - Zendata

Beyond this, here are a few important things to keep in mind to protect individual privacy.

The problems with government surveillance

In an environment of surveillance, there are usually two major concerns: access and anonymity. That is, can I access the website or platform I want to without restrictions, and while I access the internet, will my information and identity remain secure? 

In a state where web activity is being monitored by the government, it is important for users to maintain anonymity and prevent any personally identifiable information from being exposed. 

One workaround is to use a VPN to access a website which was banned in a particular country, or a website that only operates in a particular geography. While VPNs are popular and work well in many circumstances, this approach is problematic for a few reasons: 

  • Traffic through VPNs is only encrypted until it reaches the VPN server, and in some instances, VPN services can provide the government with backdoor access to user data – making it possible for government officials to identify individuals accessing banned sites.
  • When accessing a website through a VPN, the typical tracking and identification mechanisms used to identify users – from cookies to device fingerprinting – still work. So, identifying user information is still being captured and the issue of anonymity is not being addressed.

So, how can users maintain anonymity while accessing banned sites?

That’s where the Tor browser comes in.

 Any time a user inputs a search request, Tor splits the request and response traffic across multiple devices called relays.There are thousands of relays run by a volunteer network, and traffic is encrypted multiple times. With this approach, the relay servers only know the previous relay and next relay – making it virtually impossible to track a search back to an individual user. What’s more, even in the event the government blocks Tor relays, you can request an unlisted bridge (i.e. an unlisted relay) as an intermediary to get around the block.

 In addition to split requests, Tor does not allow cookies and it prevents device fingerprinting – a mechanism used to identify a user’s device uniquely – with very few exceptions. Tor users can also access the dark web to upload and share files anonymously through a tool like Securedrop (operated by Free of Press Foundation), which adds another layer of security only accessible through a Tor browser. For secure internet searches, Tor even lets you access browsers like DuckDuckGo on the dark web.

Contact Us For More Information

If you’d like to understand more about Zendata’s solutions and how we can help you, please reach out to the team today.

On top of this, users need to understand that secure apps like Signal and WhatsApp are encrypted, but they can still be traced. 

Even with encryption securing the content of messages, these apps are still tied to individual phone numbers. This means that the minute a user gets apprehended and has their phone confiscated, authorities can use their Signal or WhatsApp history to implicate anyone with whom they have been in contact based on the phone number used to access these services. In order to avoid this scenario, users should look for services like Threema and Discord that do not require a phone number to sign up.

That said, most privacy tricks and tools aren’t foolproof.

This is why it’s important for users to protect – or withhold – their personal data as much as possible, no matter what browser, app or platform they use to access the internet. Let’s say a website requires you to sign up in order to access its services. Rather than using your real name, phone number, etc., there are services like Faux ID that generate synthetic data in the format that is unique to your geography. On top of this, using email addresses that are unique to each website will prevent one website from using aggregate individual data to tie back to a person. 

Providers like ProtonMail allow users to generate multiple email addresses that get forwarded to one inbox. This lets users receive their regular email communication all in one place, but since each e-mail address is different, they can’t be used to identify users by connecting activity across multiple websites. As the stakes for privacy get higher, it’s important to know what resources offer the absolute best data & privacy protection.  Still, the absolute best way to protect personal information is by not sharing it.