What is Privacy Checklist?
A practical, step-by-step list of actions anyone can take to significantly improve their digital privacy, from quick wins to advanced measures.
A prioritized privacy checklist, from essential basics to advanced protection.
Essential (Do These First)
- Use a password manager (Bitwarden, 1Password, KeePassXC)
- Enable 2FA on email, banking, and social media (TOTP app or hardware key)
- Switch to a privacy browser (Brave or Firefox + uBlock Origin)
- Use a privacy-focused search engine (DuckDuckGo, Brave Search, Kagi)
- Switch to encrypted messaging (Signal)
- Review and tighten social media privacy settings
- Check if your email has been in breaches (Have I Been Pwned)
Important (Do These Next)
- Use a trustworthy VPN (Mullvad, IVPN, Proton VPN)
- Switch to encrypted email (Proton Mail, Tuta)
- Use email aliases for different services (SimpleLogin, addy.io)
- Opt out of data broker sites (or use a removal service)
- Disable advertising ID on your phone
- Switch DNS to a privacy-respecting provider (Quad9, NextDNS)
- Enable full-disk encryption on all devices
Advanced
- Use Tor Browser for sensitive browsing
- Set up compartmentalized identities
- Form an anonymous LLC for business activities
- Use a privacy-focused mobile OS (GrapheneOS, CalyxOS)
- Use hardware security keys for critical accounts
- Self-host services where practical
- Conduct a full privacy audit
Ongoing
- Monitor for new data breaches
- Re-check data broker sites quarterly
- Review app permissions regularly
- Update software promptly
- Strip metadata from files before sharing
Related Terms
Digital Footprint
The trail of data you leave behind when using the internet — every search, click, post, purchase, and login creates a record that can be collected and analyzed.
Privacy Audit
A comprehensive assessment of your digital privacy posture, examining browser exposure, website security, email configuration, data broker presence, and overall threat model.
Threat Modeling
The systematic process of identifying potential threats, vulnerabilities, and attack vectors to determine appropriate security and privacy measures.
Have more questions?
Use our guided flow to get the right next privacy step for Privacy Checklist.
Open Guided Flow