<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Privacy Guides</title><description>Privacy Guides is the most popular &amp; trustworthy non-profit privacy resource to find privacy tools and learn about protecting your digital life.</description><link>https://www.privacyguides.org/articles/</link><atom:link href="https://www.privacyguides.org/articles/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/privacyguides/privacyguides.org</docs><language>en</language> <pubDate>Sun, 04 May 2025 14:57:36 -0000</pubDate> <lastBuildDate>Sun, 04 May 2025 14:57:36 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Privacy Guides</title><link>https://www.privacyguides.org/articles/</link> </image> <item> <title>A Flaw With the Security Level Slider in Tor Browser</title> <author>Jonah Aragon</author> <category>News</category> <category>PSA</category> <category>Tor</category> <description>&lt;h1 id=&#34;a-flaw-with-the-security-level-slider-in-tor-browser&#34;&gt;A Flaw With the Security Level Slider in Tor Browser&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Illustration showing Tor&#39;s security level options with question marks next to the selected Safer level&#34; src=&#34;../../../../assets/images/tor-security-slider-flaw/cover.png&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides&lt;/small&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/en/tor/#tor-browser&#34;&gt;Tor Browser&lt;/a&gt; and &lt;a href=&#34;https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser&#34;&gt;Mullvad Browser&lt;/a&gt; users should be aware of a flaw with the Security Level slider: Not all protections advertised by the browser are properly engaged until the browser is fully restarted.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;This flaw was anonymously reported to &lt;em&gt;Privacy Guides&lt;/em&gt; by a member of our &lt;a href=&#34;https://discuss.privacyguides.net/&#34;&gt;community&lt;/a&gt;, and I confirmed it via the latest Tor Browser 14.5.1 on macOS. Additionally, I confirmed this behavior in Mullvad Browser 14.5.1 on macOS.&lt;/p&gt;&lt;p&gt;&lt;del&gt;I was unable to find any documentation or open GitLab issues with Tor regarding the need to take additional steps before security settings are fully applied, and&lt;/del&gt; Tor Browser documentation does not note that a restart is required, nor does it prompt users to restart the browser after security changes are made. (update: see below)&lt;/p&gt;&lt;p&gt;This presents a high risk to people who switch from Standard to Safer security during a browsing session with the goal to protect themselves from browser exploits.&lt;/p&gt;&lt;h2 id=&#34;demonstration&#34;&gt;Demonstration&lt;/h2&gt;&lt;p&gt;The effect can be easily demonstrated in your own Tor Browser install by running a JavaScript benchmark such as &lt;a href=&#34;https://browserbench.org/JetStream/&#34;&gt;JetStream 2.2&lt;/a&gt;. These benchmarks rely on a technology called Just-in-Time (JIT) compilation to improve performance, but JIT is linked to numerous security vulnerabilities in modern web browsers. The &#34;Safer&#34; security level normally disables JIT entirely to prevent these issues, however, you can see virtually no performance impact when switching to the Safer security level in Tor Browser and running the benchmark again:&lt;/p&gt;&lt;figure&gt; &lt;img alt=&#34;JetStream2 benchmark results with a score of 196 and the shield indicator in the browser&#39;s toolbar indicating that Standard security level is set&#34; src=&#34;../../../../assets/images/tor-security-slider-flaw/standard-level-jetstream2.png&#34; /&gt; &lt;figcaption&gt;JetStream 2.2 benchmark results in &lt;strong&gt;Standard&lt;/strong&gt; mode&lt;/figcaption&gt;&lt;/figure&gt;&lt;figure&gt; &lt;img alt=&#34;JetStream2 benchmark results with a score of 191 and the shield indicator in the browser&#39;s toolbar indicating that Safer security level is set&#34; src=&#34;../../../../assets/images/tor-security-slider-flaw/safer-level-before-restart-jetstream2.png&#34; /&gt; &lt;figcaption&gt;JetStream 2.2 benchmark results in &lt;strong&gt;Safer&lt;/strong&gt; mode, &lt;em&gt;without&lt;/em&gt; restarting Tor Browser&lt;/figcaption&gt;&lt;/figure&gt;&lt;p&gt;While the performance is virtually identical between these two runs, &lt;em&gt;after&lt;/em&gt; restarting Tor Browser and re-running the test, we see drastically lower performance results, in line with what we would expect with JIT properly disabled:&lt;/p&gt;&lt;figure&gt; &lt;img alt=&#34;JetStream2 benchmark results with a score of 33 and the shield indicator in the browser&#39;s toolbar indicating that Safer security level is set&#34; src=&#34;../../../../assets/images/tor-security-slider-flaw/safer-level-after-restart-jetstream2.png&#34; /&gt; &lt;figcaption&gt;JetStream 2.2 benchmark results in &lt;strong&gt;Safer&lt;/strong&gt; mode, &lt;em&gt;after&lt;/em&gt; restarting Tor Browser&lt;/figcaption&gt;&lt;/figure&gt;&lt;p&gt;As you can see, there is no visible indicator that anything is different between the last two runs, and there was no prompt to restart the browser after changing these settings. However, this clearly indicates that JavaScript technologies that are meant to be disabled in Safer mode can still be accessed by websites until the browser is restarted, potentially opening you up to browser exploits if you are unaware of the additional steps required to secure yourself.&lt;/p&gt;&lt;h2 id=&#34;safest-mode&#34;&gt;Safest Mode&lt;/h2&gt;&lt;p&gt;We have not tested or verified the full extent of security features which require a browser restart. We tested whether JIT remained enabled after switching to Safer mode because it was the easiest feature to test. Safest mode disables JavaScript entirely, so the demonstration above will not demonstrate this problem exists when switching to Safest mode.&lt;/p&gt;&lt;p&gt;However, it is possible that there are &lt;em&gt;other&lt;/em&gt; features normally disabled by Safest mode which remain enabled until you restart your browser. Out of an abundance of caution, we recommend always restarting your browser after changing this setting, regardless of whether you are switching to Safer or Safest mode.&lt;/p&gt;&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion&lt;/h2&gt;&lt;p&gt;The Tor Project advertises the security slider as a way to conveniently adjust the protections that the Tor Browser provides, but does not note additional steps necessary to ensure those settings actually go into effect.&lt;/p&gt;&lt;p&gt;This is our public service announcement to make sure you &lt;strong&gt;always completely restart Tor Browser after adjusting your security settings.&lt;/strong&gt; Relying on these indicators can create a false sense of security and potentially expose users relying on this security level slider to greater risk than they expect based on Tor Browser&#39;s UI and documentation.&lt;/p&gt;&lt;p&gt;Hopefully, Tor Browser will prompt or force their users to restart the browser after adjusting these settings in a future update.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;strong&gt;Update (5/3):&lt;/strong&gt; A few hours following the publication of this article, the Tor Project emailed us the following statement:&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;The Tor Project is aware of this issue, and it is being tracked and activelyaddressed. Those interested can follow the discussion and progress here:&lt;a href=&#34;https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42572&#34;&gt;https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42572&lt;/a&gt;. Inaddition to a restart prompt, we’re also exploring broader improvements to thesecurity level system, including aligning it more closely with Tor Browser&#39;supdated threat model[1] and possibly delegating even more of its back-endto NoScript for additional flexibility. These improvements may be part of theupcoming 15.0 release cycle.&lt;/p&gt;&lt;p&gt;[1]: &lt;a href=&#34;https://gitlab.torproject.org/tpo/applications/wiki/-/wikis/&#34;&gt;https://gitlab.torproject.org/tpo/applications/wiki/-/wikis/&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt;</description><link>https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/</link> <pubDate>Sat, 03 May 2025 15:00:00 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/05/02/tor-security-slider-flaw/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/05/02/tor-security-slider-flaw.png" type="image/png" length="None" /> </item> <item> <title>In Praise of Tor: Why You Should Support and Use Tor</title> <author>Em</author> <category>Explainers</category> <description>&lt;h1 id=&#34;in-praise-of-tor-why-you-should-support-and-use-tor&#34;&gt;In Praise of Tor: Why You Should Support and Use Tor&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;The Tor Project logo over a series of Tor icons on a purple background.&#34; src=&#34;../../../../assets/images/in-praise-of-tor/tor-cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Logo and icons: The Tor Project&lt;/small&gt;&lt;/p&gt;&lt;p&gt;You might have heard of Tor in the news a few times, yet never dared to try it yourself. Despite being around for decades, Tor is still a tool too few people know about.&lt;/p&gt;&lt;p&gt;Today, Tor is easy to use for anyone. It helps not only journalists and activists, but anybody who seeks greater privacy online or access to information regardless of location. But what is Tor exactly? How can Tor help you? And why is it such an important tool?&lt;!-- more --&gt;&lt;/p&gt;&lt;h2 id=&#34;what-is-tor&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 21.82v-1.46A8.36 8.36 0 0 0 20.36 12 8.36 8.36 0 0 0 12 3.64V2.18A9.83 9.83 0 0 1 21.82 12 9.83 9.83 0 0 1 12 21.82m0-5.09A4.74 4.74 0 0 0 16.73 12 4.74 4.74 0 0 0 12 7.27V5.82A6.17 6.17 0 0 1 18.18 12 6.17 6.17 0 0 1 12 18.18zm0-7.27A2.54 2.54 0 0 1 14.55 12 2.54 2.54 0 0 1 12 14.54zM0 12a12 12 0 0 0 12 12 12 12 0 0 0 12-12A12 12 0 0 0 12 0 12 12 0 0 0 0 12&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; What is Tor&lt;/h2&gt;&lt;p&gt;Tor is an overlay network that was specifically designed to protect the privacy of its users. The Tor Network uses multiple layers of encryption and relays in order to protect a person&#39;s location and other potential identifiers, such as an &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address.&lt;/p&gt;&lt;p&gt;Its name comes from the acronym for &lt;strong&gt;The Onion Router&lt;/strong&gt;, a &lt;a href=&#34;https://en.wikipedia.org/wiki/Onion_routing&#34;&gt;routing system&lt;/a&gt; using multiple layers that can get peeled off at each step, like an onion 🧅&lt;/p&gt;&lt;p&gt;This special network can be easily accessed by anyone, for free, through the Tor Browser. The Tor Browser is as easy to use as any other browser you are familiar with already.&lt;/p&gt;&lt;p&gt;Both the tools for the Tor Network and the Tor Browser are maintained by a nonprofit organization called the Tor Project.&lt;/p&gt;&lt;h3 id=&#34;the-tor-network&#34;&gt;The Tor Network&lt;/h3&gt;&lt;p&gt;The &lt;a href=&#34;https://en.wikipedia.org/wiki/Tor_(network)&#34;&gt;Tor Network&lt;/a&gt; was deployed in 2002, although its core principle was developed in the mid 1990s. It was first created at the United States Naval Research Laboratory in order to protect intelligence communication online.&lt;/p&gt;&lt;p&gt;In 2004, the laboratory released the project&#39;s code under a free and open source license, and the Electronic Frontier Foundation (EFF) began funding its development. A few years later, the onion routing project officially became the Tor Project.&lt;/p&gt;&lt;p&gt;Today, Tor is one of the &lt;a href=&#34;https://metrics.torproject.org/&#34;&gt;largest&lt;/a&gt; anonymity networks, with thousands of relays and millions of users worldwide.&lt;/p&gt;&lt;h4 id=&#34;how-does-it-work&#34;&gt;How does it work&lt;/h4&gt;&lt;p&gt;The Tor Network is run by a community of volunteers who operate the relays required for the network to function.&lt;/p&gt;&lt;p&gt;Each time someone uses the Tor Network, the communication passes through at least 3 relays: A Guard Relay, a Middle Relay, and an Exit Relay. Each relay has a different function to protect the communication.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;The Guard Relay&lt;/strong&gt; knows where the communication is from (&lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address), but doesn&#39;t know where it&#39;s going (which website is visited, for example). This relay only knows that you want to access the Tor Network. Its task is to send your encrypted communication to a Middle Relay, but it cannot read it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;The Middle Relay&lt;/strong&gt; doesn&#39;t really know anything. It doesn&#39;t know who you are nor where you are going. It only knows a Guard Relay wants to send encrypted data to an Exit Relay. The Middle Relay transfers this communication from one relay to another, and it cannot read it either.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;The Exit Relay&lt;/strong&gt; has no idea who you are. It only knows someone, somewhere, wants to access this website (or other content). The Exit Relay will get the information from the website, then send it back to the Middle Relay, so that you can receive it from the Guard Relay. If you only visit pages using &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;, the Exit Relay can know someone is visiting this website, but cannot know what they are doing on it. Visiting &lt;em&gt;non-onion&lt;/em&gt; websites using &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; instead of just &lt;abbr title=&#34;Hypertext Transfer Protocol&#34;&gt;HTTP&lt;/abbr&gt; is &lt;strong&gt;&lt;a href=&#34;https://support.torproject.org/https/https-1/&#34;&gt;very important&lt;/a&gt;&lt;/strong&gt; for security and privacy.&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Onion service websites&lt;/p&gt;&lt;p&gt;Onion service websites are special websites that can only be accessed using the Tor Network.&lt;/p&gt;&lt;p&gt;They are easy to recognize because they use the .onion domain at the end, and are often composed of a long string of seemingly random characters. Onion websites offer protections equivalent to &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;.&lt;/p&gt;&lt;p&gt;You can see this represented by the &lt;a href=&#34;https://support.torproject.org/onionservices/onionservices-5/&#34;&gt;onion padlock icon&lt;/a&gt; in the Tor Browser.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;how-tor-works-using-a-letter-and-envelopes-analogy&#34;&gt;How Tor works using a letter and envelopes analogy&lt;/h4&gt;&lt;p&gt;Tor works a bit as if you put a letter (request) into an envelope with someone&#39;s address. Then, you put this envelope in another envelope addressed to someone else, with instructions. Finally, you put this second envelope in yet another one.&lt;/p&gt;&lt;p&gt;Each envelope protects the content of the other, and can only be opened one at the time by each recipient. In this analogy, each recipient (relay) has a key that can only open the envelope addressed to them, and not the others.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Graphic representation of a Tor Circuit composed of a Guard Relay, a Middle Relay, and an Exit Relay using a letter and envelopes analogy.&#34; src=&#34;../../../../assets/images/in-praise-of-tor/tor-diagram.webp&#34; /&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides&lt;/small&gt;&lt;/p&gt;&lt;h4 id=&#34;what-is-a-tor-circuit&#34;&gt;What is a Tor Circuit&lt;/h4&gt;&lt;p&gt;The network of randomly selected relays to complete a request on the Tor Network is called a Tor Circuit. This circuit changes each time a new connection is established.&lt;/p&gt;&lt;p&gt;From the Tor Browser, you can see each relay that was selected for a circuit, and even change it manually. To generate a new circuit, click on the &#34;Tor Circuit&#34; button on the upper-left of the browser, then on &#34;New Tor circuit for this site&#34; at the bottom.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot from the Tor Browser showing a popup window from the Tor Circuit button.&#34; src=&#34;../../../../assets/images/in-praise-of-tor/tor-torcircuit.webp&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;the-tor-browser&#34;&gt;The Tor Browser&lt;/h3&gt;&lt;p&gt;The &lt;a href=&#34;https://www.torproject.org/download/&#34;&gt;Tor Browser&lt;/a&gt; was created in 2008 to facilitate access to the Tor Network. It is a modified version of Mozilla&#39;s Firefox browser, and can be installed on Linux, macOS, Windows, and Android systems.&lt;/p&gt;&lt;p&gt;The Tor Browser start configuration is private by default. No additional extensions are required to make it more secure or more private. Actually, it&#39;s even discouraged to install any additional extensions, as this would weaken its &lt;a href=&#34;https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead/&#34;&gt;fingerprinting resistance&lt;/a&gt;.&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Highest security settings&lt;/p&gt;&lt;p&gt;Even if the Tor Browser is configured to be private by default, if you are in an especially sensitive situation, for example if you are using Tor as a whistleblower or a dissident activist, you might want to adjust the Tor Browser security level to &#34;Safest&#34;.&lt;/p&gt;&lt;p&gt;For this, click on the shield icon on the upper-right, then on the &#34;Settings&#34; button in blue, and select &#34;Safest&#34; instead of the default &#34;Standard&#34;.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot from the Tor Browser showing a warning from the SecureDrop website to adjust Tor security level to Safest.&#34; src=&#34;../../../../assets/images/in-praise-of-tor/tor-safestsetting.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;The default search engine is the privacy-focused &lt;a href=&#34;https://www.privacyguides.org/en/search-engines/#duckduckgo&#34;&gt;DuckDuckGo&lt;/a&gt;. You will not even find Google in the options for the default search engine. More browsers should follow this good practice.&lt;/p&gt;&lt;p&gt;The first page opening with the Tor Browser will give the option to Connect to Tor. From there, you can click on &#34;Connect&#34; to start browsing through Tor, or on &#34;Configure Connection&#34; if you need additional settings. For example, if you need to set up a &lt;a href=&#34;https://bridges.torproject.org/&#34;&gt;Bridge&lt;/a&gt; because Tor is blocked from your country.&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Only connect to Tor if it is safe for you&lt;/p&gt;&lt;p&gt;Be careful when using Tor from a country where Tor might be blocked or perceived as suspicious. Similarly, be careful if you connect from a location where revealing you have been using Tor &lt;a href=&#34;#depending-on-where-you-are-using-tor-is-likely-safe&#34;&gt;could&lt;/a&gt; be dangerous to you.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot from the Tor Browser showing the &amp;quot;Connect to Tor&amp;quot; welcome page.&#34; src=&#34;../../../../assets/images/in-praise-of-tor/tor-torbrowser.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Once connected to the Tor Network, you will be directed to the DuckDuckGo welcome page, and you can search or type any URLs in the address bar, like you would with any other browser.&lt;/p&gt;&lt;p&gt;If you know an organization has an onion site (a website that is only accessible through Tor), you can type this onion address directly in the address bar.&lt;/p&gt;&lt;p&gt;If you don&#39;t know if an organization has an onion site, you might find it from its regular URL. For example, if you visit privacyguides.org from the Tor Browser, you will notice a purple button on the right informing you that an onion version of this website is available, click on it to get redirected to it.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot from the Tor Browser showing the Privacy Guides website with an onion available purple button right to the address bar.&#34; src=&#34;../../../../assets/images/in-praise-of-tor/tor-privacyguides.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Mullvad Browser and the Tor Project&lt;/p&gt;&lt;p&gt;If you are familiar with the Mullvad Browser, know that the Mullvad Browser was developed by the Tor Project team!&lt;/p&gt;&lt;p&gt;The Mullvad Browser was born of a &lt;a href=&#34;https://blog.torproject.org/releasing-mullvad-browser/&#34;&gt;collaboration&lt;/a&gt; between Mullvad &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; and the Tor Project, to build a browser that offers similar privacy features to the Tor Browser, but while using it through a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; instead of through the Tor Network (both offering different benefits).&lt;/p&gt;&lt;p&gt;The Mullvad Browser can also be used without a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, and will still provide better privacy protections than most other browsers. It cannot be used to access the Tor Network, however.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;the-tor-project&#34;&gt;The Tor Project&lt;/h3&gt;&lt;p&gt;The &lt;a href=&#34;https://www.torproject.org/&#34;&gt;Tor Project&lt;/a&gt; is the US-based nonprofit organization maintaining the software and community for the Tor Network, and developing and maintaining the Tor Browser. It&#39;s also a privacy advocacy organization, with a mission to advance human rights and freedoms around the world through the free technology it creates.&lt;/p&gt;&lt;p&gt;The nonprofit was founded in 2006 and gets its funding from &lt;a href=&#34;https://www.torproject.org/about/supporters/&#34;&gt;various sources&lt;/a&gt; including government grants, independent contributors, and individual &lt;a href=&#34;https://donate.torproject.org/&#34;&gt;donations&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;what-tor-can-do&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M4 4a4 4 0 0 1 8 0v2h.25c.966 0 1.75.784 1.75 1.75v5.5A1.75 1.75 0 0 1 12.25 15h-8.5A1.75 1.75 0 0 1 2 13.25v-5.5C2 6.784 2.784 6 3.75 6H4Zm8.25 3.5h-8.5a.25.25 0 0 0-.25.25v5.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-5.5a.25.25 0 0 0-.25-.25M10.5 6V4a2.5 2.5 0 1 0-5 0v2Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; What Tor can do&lt;/h2&gt;&lt;h3 id=&#34;improve-privacy&#34;&gt;Improve Privacy&lt;/h3&gt;&lt;p&gt;Tor is not magical, but it&#39;s by far one of the best privacy tool we have. Using Tor will not make you perfectly anonymous online, but it will greatly reduce the traces your leave online.&lt;/p&gt;&lt;p&gt;Here are a few benefits Tor can provide for your privacy:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Tor can prevent the websites you are visiting from collecting your &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address (and your &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address can indeed lead to identifying &lt;em&gt;you&lt;/em&gt;).&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Tor can prevent your Internet Service Provider (&lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;), Virtual Private Network (&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;) provider, or authorities requesting information from them to collect a list of the websites you have visited. They will know however that you have been using Tor.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;The Tor Browser isolates each website you visit. This prevents ads and trackers from following you around, potentially popping up later in your &lt;a href=&#34;https://www.intomore.com/culture/you/facebook-ads-outed-me/&#34;&gt;Facebook ads and accidentally outing you&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;The Tor Browser is fingerprinting resistant. This reduces the ways you can be tracked and identified online, even without your &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;When keeping the default settings, the Tor Browser only uses private windows and will not keep any traces of your browsing history. It will also delete all cookies and site data when closing.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;circumvent-censorship&#34;&gt;Circumvent censorship&lt;/h3&gt;&lt;p&gt;Because of how the Tor Network redirects traffic, it&#39;s a perfect tool to resist censorship. Using Tor can give access to websites or services that aren&#39;t accessible from a country blocking them.&lt;/p&gt;&lt;p&gt;Even from a region where Tor itself is actively blocked, the network can still be accessed using &lt;a href=&#34;https://tb-manual.torproject.org/circumvention/&#34;&gt;pluggable transports&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Using this type of measures to circumvent government censorship will make Tor accessible even from countries with heavily censored internet, such as &lt;a href=&#34;https://support.torproject.org/censorship/connecting-from-china/&#34;&gt;China&lt;/a&gt;, &lt;a href=&#34;https://blog.torproject.org/call-for-webtunnel-bridges/&#34;&gt;Russia&lt;/a&gt;, &lt;a href=&#34;https://forum.torproject.org/t/iran-circumventing-censorship-with-tor/4590&#34;&gt;Iran&lt;/a&gt;, and many others.&lt;/p&gt;&lt;div class=&#34;admonition question&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;If you can&#39;t download the Tor Browser from your country&lt;/p&gt;&lt;p&gt;If you cannot download the Tor Browser because of your country&#39;s censorship, and &lt;strong&gt;if it is safe for you to do&lt;/strong&gt;, you can try downloading the browser from a proxy website such as the &lt;a href=&#34;https://tor.eff.org/&#34;&gt;EFF website&lt;/a&gt;, the &lt;a href=&#34;https://tor.calyxinstitute.org/&#34;&gt;Calyx Institute website&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;You can even directly email &lt;strong&gt;&lt;a href=&#34;&amp;#109;&amp;#97;&amp;#105;&amp;#108;&amp;#116;&amp;#111;&amp;#58;&amp;#103;&amp;#101;&amp;#116;&amp;#116;&amp;#111;&amp;#114;&amp;#64;&amp;#116;&amp;#111;&amp;#114;&amp;#112;&amp;#114;&amp;#111;&amp;#106;&amp;#101;&amp;#99;&amp;#116;&amp;#46;&amp;#111;&amp;#114;&amp;#103;&#34;&gt;&amp;#103;&amp;#101;&amp;#116;&amp;#116;&amp;#111;&amp;#114;&amp;#64;&amp;#116;&amp;#111;&amp;#114;&amp;#112;&amp;#114;&amp;#111;&amp;#106;&amp;#101;&amp;#99;&amp;#116;&amp;#46;&amp;#111;&amp;#114;&amp;#103;&lt;/a&gt;&lt;/strong&gt; and send the name of your operating system (Linux, macOS, Windows) to get a direct link to download the Tor Browser.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;If you want to help people around the world access the internet freely, you can volunteer to run a &lt;a href=&#34;https://snowflake.torproject.org/&#34;&gt;Tor Snowflake&lt;/a&gt; proxy. For more tech-savvy volunteers, you can also help by running a &lt;a href=&#34;https://community.torproject.org/relay/setup/bridge/&#34;&gt;Tor Bridge&lt;/a&gt;, or even a &lt;a href=&#34;https://community.torproject.org/relay/setup/webtunnel/&#34;&gt;WebTunnel Bridge&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;why-tor-is-so-important&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;m8 14.25.345.666a.75.75 0 0 1-.69 0l-.008-.004-.018-.01a7 7 0 0 1-.31-.17 22 22 0 0 1-3.434-2.414C2.045 10.731 0 8.35 0 5.5 0 2.836 2.086 1 4.25 1 5.797 1 7.153 1.802 8 3.02 8.847 1.802 10.203 1 11.75 1 13.914 1 16 2.836 16 5.5c0 2.85-2.045 5.231-3.885 6.818a22 22 0 0 1-3.744 2.584l-.018.01-.006.003h-.002ZM4.25 2.5c-1.336 0-2.75 1.164-2.75 3 0 2.15 1.58 4.144 3.365 5.682A20.6 20.6 0 0 0 8 13.393a20.6 20.6 0 0 0 3.135-2.211C12.92 9.644 14.5 7.65 14.5 5.5c0-1.836-1.414-3-2.75-3-1.373 0-2.609.986-3.029 2.456a.749.749 0 0 1-1.442 0C6.859 3.486 5.623 2.5 4.25 2.5&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Why Tor is so important&lt;/h2&gt;&lt;h3 id=&#34;tor-is-vital-for-human-rights-and-democracy&#34;&gt;Tor is vital for human rights and democracy&lt;/h3&gt;&lt;p&gt;Tor is an essential tool for journalists, activists, whistleblowers, dissidents, and people in vulnerable situations everywhere. It is one of the best tool we have to increase privacy online, and to resist censorship from oppressive regimes.&lt;/p&gt;&lt;p&gt;Thanks to Tor, activists have a safe way to continue fighting for human rights.&lt;/p&gt;&lt;p&gt;Some of the most respected human rights organizations use Tor to offer safe access to their services and information. This includes organizations such as &lt;a href=&#34;https://www.amnesty.org/en/latest/news/2023/12/global-amnesty-international-website-launches-on-tor-network-to-help-universal-access/&#34;&gt;Amnesty International&lt;/a&gt;, &lt;a href=&#34;https://www.eff.org/deeplinks/2023/04/eff-now-has-tor-onions&#34;&gt;Electronic Frontier Foundation&lt;/a&gt;, Freedom of The Press Foundation, and of course the Tor Project.&lt;/p&gt;&lt;p&gt;Without Tor, journalists would lose invaluable sources of information provided by courageous whistleblowers reporting in the public interest.&lt;/p&gt;&lt;p&gt;Without Tor, brave citizens fighting against authoritarian governments would be at much greater risk when organizing and bringing vital information to the public&#39;s attention.&lt;/p&gt;&lt;p&gt;Without Tor, victims of domestic violence and LGBTQ+ people living in hostile environments could be in much greater danger when researching life-saving information online.&lt;/p&gt;&lt;p&gt;Without Tor, people living in oppressive regimes would not have access to the crucial information they need to fight for freedom, democracy, and peace.&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Add an onion service for your organization&#39;s website&lt;/p&gt;&lt;p&gt;If you would like to add this service for your website to help more people access it safely, you can &lt;a href=&#34;https://blog.torproject.org/more-onions-porfavor/&#34;&gt;read more&lt;/a&gt; about onion services on the Tor Project Blog. As of 2021, you can even &lt;a href=&#34;https://blog.torproject.org/tls-certificate-for-onion-site/&#34;&gt;get&lt;/a&gt; domain-validated certificates for your onion site using HARICA, an operator founded by a nonprofit civil society from Greece.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;tor-is-for-everyone-to-use&#34;&gt;Tor is for everyone to use&lt;/h3&gt;&lt;p&gt;Tor is a tool that can help so many people. But Tor isn&#39;t &lt;em&gt;only&lt;/em&gt; for people in highly sensitive situations like whistleblowers and journalists, Tor is for everyone!&lt;/p&gt;&lt;p&gt;Of course, people in more dangerous situations will &lt;em&gt;need&lt;/em&gt; Tor to stay safe, but everyone can benefit from Tor&#39;s privacy protections in their daily lives. I personally use Tor when I am forced to visit Google Map. Not because it&#39;s dangerous to me, but just because I greatly dislike the idea of Google tracking my location activities.&lt;/p&gt;&lt;p&gt;Tor can also help fighting surveillance capitalism!&lt;/p&gt;&lt;p&gt;Moreover, you can considerably help people in dangerous situations by using Tor for trivial reasons like I do.&lt;/p&gt;&lt;p&gt;By using Tor for banal activities, when you aren&#39;t in any danger worse than a nasty ad-attack, you help to normalize the use of Tor and add more noise to the traffic. The more people do this, the more using Tor becomes just something people do when they care about privacy online, and nothing more.&lt;/p&gt;&lt;h3 id=&#34;who-uses-tor&#34;&gt;Who uses Tor?&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;Anyone who cares about privacy!&lt;/li&gt;&lt;li&gt;Journalists who need to conduct research and protect their sources.&lt;/li&gt;&lt;li&gt;Whistleblowers using special websites to communication information to newspapers anonymously.&lt;/li&gt;&lt;li&gt;Democracy activists fighting against authoritarian governments who require anonymity online to stay safe from persecution.&lt;/li&gt;&lt;li&gt;People living under oppressive regimes who need to circumvent their country&#39;s censorship to access information freely.&lt;/li&gt;&lt;li&gt;Victims of domestic violence who need to research safe shelters and supportive resources without raising suspicion from their aggressor.&lt;/li&gt;&lt;li&gt;LGBTQ+ people living in hostile environments who need to access information online and stay connected with their community.&lt;/li&gt;&lt;li&gt;Generous people who want to &lt;a href=&#34;https://blog.torproject.org/support-tor-project-share-your-story/&#34;&gt;help and support&lt;/a&gt; all the above 💜&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The Tor community has gathered this &lt;a href=&#34;https://community.torproject.org/outreach/stories/&#34;&gt;wonderful collection of anonymous user stories&lt;/a&gt; from people describing why they use Tor.&lt;/p&gt;&lt;h3 id=&#34;tor-is-critical-public-infrastructure&#34;&gt;Tor is critical public infrastructure&lt;/h3&gt;&lt;p&gt;To keep Tor strong for everyone, it&#39;s essential to support and grow the network of volunteer-operated relays forming the Tor Network.&lt;/p&gt;&lt;p&gt;Thousands of journalists and activists rely on the Tor Network every day to stay safe and to continue their important work.&lt;/p&gt;&lt;p&gt;Furthermore, &lt;strong&gt;countless privacy-oriented projects depend on the Tor Network&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;To name only a few, the messaging applications &lt;a href=&#34;https://briarproject.org/&#34;&gt;Briar&lt;/a&gt;, &lt;a href=&#34;https://docs.cwtch.im/&#34;&gt;Cwtch&lt;/a&gt;, and &lt;a href=&#34;https://simplex.chat/&#34;&gt;SimpleX&lt;/a&gt; all use Tor to harden some of their privacy-preserving features.&lt;/p&gt;&lt;p&gt;For whistleblowers to stay safe, both &lt;a href=&#34;https://securedrop.org/&#34;&gt;SecureDrop&lt;/a&gt; and &lt;a href=&#34;https://hushline.app/&#34;&gt;Hush Line&lt;/a&gt; use the Tor Network. Many &lt;a href=&#34;https://securedrop.org/directory/&#34;&gt;newsrooms around the world&lt;/a&gt; host onion services to protect sources, such as The Guardian in the UK, CBC in Canada, ProPublica in the US, and many more.&lt;/p&gt;&lt;p&gt;There&#39;s also all the applications protecting people with the highest needs such as &lt;a href=&#34;https://tails.net/&#34;&gt;Tails&lt;/a&gt;, &lt;a href=&#34;https://onionshare.org/&#34;&gt;OnionShare&lt;/a&gt;, and &lt;a href=&#34;https://github.com/Polycarbohydrate/awesome-tor&#34;&gt;more&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Losing the Tor Network would mean losing all the applications and features relying on it.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This would be disastrous for the privacy community, journalists, activists, dissidents, victims of domestic violence, LGBTQ+ population, and so many worldwide.&lt;/p&gt;&lt;p&gt;From a human rights perspective, &lt;strong&gt;we simply cannot afford to lose Tor&lt;/strong&gt;.&lt;/p&gt;&lt;h2 id=&#34;things-to-consider-when-using-tor&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.92 6.085h.001a.749.749 0 1 1-1.342-.67c.169-.339.436-.701.849-.977C6.845 4.16 7.369 4 8 4a2.76 2.76 0 0 1 1.637.525c.503.377.863.965.863 1.725 0 .448-.115.83-.329 1.15-.205.307-.47.513-.692.662-.109.072-.22.138-.313.195l-.006.004a6 6 0 0 0-.26.16 1 1 0 0 0-.276.245.75.75 0 0 1-1.248-.832c.184-.264.42-.489.692-.661q.154-.1.313-.195l.007-.004c.1-.061.182-.11.258-.161a1 1 0 0 0 .277-.245C8.96 6.514 9 6.427 9 6.25a.61.61 0 0 0-.262-.525A1.27 1.27 0 0 0 8 5.5c-.369 0-.595.09-.74.187a1 1 0 0 0-.34.398M9 11a1 1 0 1 1-2 0 1 1 0 0 1 2 0&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Things to consider when using Tor&lt;/h2&gt;&lt;h3 id=&#34;tor-compared-to-vpn-protections&#34;&gt;Tor compared to &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; protections&lt;/h3&gt;&lt;p&gt;When using a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; will not know which websites you visit online (or other activities). Your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; will see that you are connecting to a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, but will not know what you do from there. Your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; however &lt;em&gt;could&lt;/em&gt; know which websites you visit. Using a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; is a transfer of trust from your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;. When using a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, you should always trust your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider more than your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt;.&lt;/p&gt;&lt;p&gt;The websites you visit will see the &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address of your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider instead of yours. This can help protect your identity and location, but they will know this connection uses a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;.&lt;/p&gt;&lt;p&gt;VPNs can offer great benefits for your privacy. However, if your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider was compelled by law to provide the logs of the websites you visited (or will visit), it is &lt;em&gt;technically&lt;/em&gt; possible to do for them.&lt;/p&gt;&lt;p&gt;When using the Tor Network correctly, no one knows which websites &lt;em&gt;you visited&lt;/em&gt;, or other services you accessed. Your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; or &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider will only know you have accessed Tor, but will not know which websites you have visited from there. Even if compelled by law, they could only share that you have accessed Tor, at this specific time.&lt;/p&gt;&lt;p&gt;The websites you have visited also won&#39;t know who you are (unless you tell them). They will only know someone accessed their websites through Tor, at this specific time.&lt;/p&gt;&lt;p&gt;The relays used for a Tor Circuit cannot alone re-recreate the link between your &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address and the websites you visit either. This offers much stronger protection for your privacy than a &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; does.&lt;/p&gt;&lt;h3 id=&#34;who-knows-you-are-using-tor&#34;&gt;Who knows you are using Tor&lt;/h3&gt;&lt;p&gt;When using the Tor Network, your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; and the Guard Relay will both know you (the &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address you are using) are using Tor.&lt;/p&gt;&lt;p&gt;To prevent this, you &lt;a href=&#34;https://www.privacyguides.org/en/advanced/tor-overview/#safely-connecting-to-tor&#34;&gt;could&lt;/a&gt; use Tor from a &lt;a href=&#34;https://www.privacyguides.org/en/vpn/&#34;&gt;trustworthy &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;If you do so, your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; provider will know you are using Tor, but your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; will not. Your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; will only see you are accessing your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;, and the Tor Guard Relay will see your &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&#39;s &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address instead of yours.&lt;/p&gt;&lt;h3 id=&#34;https-for-non-onion-websites&#34;&gt;&lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; for non-onion websites&lt;/h3&gt;&lt;p&gt;The Exit Relay from the Tor Circuit will see someone is accessing this website (or other service).&lt;/p&gt;&lt;p&gt;If you were to use Tor to visit a non-onion website that isn&#39;t protected with &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;, and log in with your credentials, this Exit Relay &lt;em&gt;could&lt;/em&gt; technically read this information. Using &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; with non-onion websites is &lt;em&gt;very&lt;/em&gt; important when using Tor. Onion sites offer protections that are equivalent to &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;.&lt;/p&gt;&lt;h3 id=&#34;be-careful-with-files-when-using-tor&#34;&gt;Be careful with files when using Tor&lt;/h3&gt;&lt;p&gt;While it&#39;s safe to visit secured websites through Tor, be careful when downloading files or opening documents.&lt;/p&gt;&lt;p&gt;Depending on what kind of files it is, there are a number of problems that could arise. For example, it&#39;s a &lt;a href=&#34;https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea&#34;&gt;bad idea&lt;/a&gt; to download torrent files over Tor. Additionally, Tor will not protect you from downloading malware or exposing metadata with shared files.&lt;/p&gt;&lt;p&gt;If you need to share files through Tor with a &lt;em&gt;trusted&lt;/em&gt; contact, &lt;a href=&#34;https://www.privacyguides.org/en/file-sharing/#onionshare&#34;&gt;OnionShare&lt;/a&gt; is a good option.&lt;/p&gt;&lt;h2 id=&#34;addressing-misconceptions&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M4.47.22A.75.75 0 0 1 5 0h6c.199 0 .389.079.53.22l4.25 4.25c.141.14.22.331.22.53v6a.75.75 0 0 1-.22.53l-4.25 4.25A.75.75 0 0 1 11 16H5a.75.75 0 0 1-.53-.22L.22 11.53A.75.75 0 0 1 0 11V5c0-.199.079-.389.22-.53Zm.84 1.28L1.5 5.31v5.38l3.81 3.81h5.38l3.81-3.81V5.31L10.69 1.5ZM8 4a.75.75 0 0 1 .75.75v3.5a.75.75 0 0 1-1.5 0v-3.5A.75.75 0 0 1 8 4m0 8a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Addressing misconceptions&lt;/h2&gt;&lt;p&gt;There has been misconceptions floating around about Tor. Most of them repeat similar misinformation attributed to many other privacy tools: Why using this if you have nothing to hide? But this argument is incredibly flawed and comes from a naive understanding of privacy rights and needs.&lt;/p&gt;&lt;p&gt;Most people use privacy tools for protection, and everyone needs protection. Moreover, &lt;a href=&#34;https://www.privacyguides.org/videos/2025/04/17/is-privacy-dead/&#34;&gt;privacy is a fundamental right&lt;/a&gt; intrinsically connected to democracy and civil liberties.&lt;/p&gt;&lt;h3 id=&#34;the-dark-web-the-deep-web-and-the-surface-web&#34;&gt;The dark web, the deep web, and the surface web&lt;/h3&gt;&lt;p&gt;Some misconceptions have spread from confusion on what the &lt;em&gt;deep&lt;/em&gt; web and the &lt;em&gt;dark&lt;/em&gt; web are. Because yes, Tor is part of the dark web.&lt;/p&gt;&lt;p&gt;While using the term &#34;dark web&#34; might make for great sensationalist news title, the dark web isn&#39;t anything to fear.&lt;/p&gt;&lt;p&gt;It&#39;s not &#34;dark&#34; as in &#34;dark intent&#34; or the &#34;dark side of the Force&#34;. It&#39;s really just dark as in &#34;it&#39;s so dark on this road, I can&#39;t read the addresses around&#34;.&lt;/p&gt;&lt;p&gt;This dark web needs special software, configuration, or authorization to access it. For example, &lt;strong&gt;the Tor Browser is the streetlight you need to navigate on the Onion roads&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;If you use Tor to visit the Privacy Guides onion site, you will be using the dark web. It&#39;s a website (or website version) that can only be accessed using a specialized tool. That&#39;s it!&lt;/p&gt;&lt;p&gt;The dark web is part of the deep web, which is simply all the online information that isn&#39;t indexed by any standard web search engines. Aren&#39;t you happy your bank account is on the deep web?&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Illustration of an iceberg where the tip above water represents the surface web, the part underwater represents the deep web, and the part under the iceberg represents the dark web.&#34; src=&#34;../../../../assets/images/in-praise-of-tor/tor-darkweb.webp&#34; /&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Inspired by: &lt;a href=&#34;https://commons.wikimedia.org/wiki/File:Iceberg_of_Webs.svg&#34;&gt;Ranjithsiji&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;h3 id=&#34;criminals-use-envelopes-doors-and-clothing-too&#34;&gt;Criminals use envelopes, doors, and clothing too&lt;/h3&gt;&lt;p&gt;Some fear that Tor is used by criminals. While that might be true some criminals use Tor, a lot of people who aren&#39;t criminals at all also use Tor.&lt;/p&gt;&lt;p&gt;This kind of argument really leads nowhere. Criminals also use Google, Facebook, and Twitter (a lot actually). Criminals use envelopes to hide their ransom letters, closed doors to hide their crimes, and clothing to conceal weapons! Are we going to forbid clothing because some (all?) criminals use clothing to hide their weapons?&lt;/p&gt;&lt;p&gt;&lt;strong&gt;We shouldn&#39;t ban clothing, and we shouldn&#39;t ban Tor either.&lt;/strong&gt; There are other better ways to catch criminals than removing a tool millions use to stay safe online.&lt;/p&gt;&lt;h3 id=&#34;tor-receives-government-funding&#34;&gt;Tor receives government funding&lt;/h3&gt;&lt;p&gt;Yes, Tor does receive government funding, and that&#39;s a good thing. A lot of nonprofit organizations receive government funding as a stable (&lt;a href=&#34;https://www.privacyguides.org/articles/2025/02/03/the-future-of-privacy/#the-tools-you-use-might-depend-on-government-funding&#34;&gt;usually&lt;/a&gt;) source of income. Our governments &lt;em&gt;should&lt;/em&gt; be contributing financially to the tools we all use to improve our security and privacy for free, moreover if they are using it themselves.&lt;/p&gt;&lt;p&gt;While any organization should thrive to diversify its sources of income to reduce its dependency on large contributors, it&#39;s not always easy to do.&lt;/p&gt;&lt;p&gt;If you feel uneasy about a privacy tool you use receiving government funding, the best thing you can do to fight this is to &lt;a href=&#34;https://donate.torproject.org/&#34;&gt;donate&lt;/a&gt; directly to reduce its dependence to it.&lt;/p&gt;&lt;h3 id=&#34;depending-on-where-you-are-using-tor-is-likely-safe&#34;&gt;Depending on where you are, using Tor is likely safe&lt;/h3&gt;&lt;p&gt;If you are not living under an oppressive regime with heavy censorship, it&#39;s likely that using Tor is safe for you, and will not put you on &#34;a list&#34;. Even if it was putting you on &#34;a list&#34;, it likely is a list full of great people working to defend human rights and privacy rights online.&lt;/p&gt;&lt;p&gt;That being said, &lt;strong&gt;if you are living in a region where using Tor is dangerous&lt;/strong&gt;, and could put you on a list of anti-regime dissidents, you &lt;em&gt;should absolutely&lt;/em&gt; be careful and take special measures to hide your usage of Tor.&lt;/p&gt;&lt;p&gt;Additionally, &lt;strong&gt;if you are in a vulnerable situation&lt;/strong&gt; where an aggressor has access to your device or &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; information, and could hurt you if they knew you have used Tor, you should use a Tor Bridge and only &lt;a href=&#34;https://www.privacyguides.org/articles/2025/01/29/installing-and-using-tails/&#34;&gt;access Tor through Tails&lt;/a&gt;.&lt;/p&gt;&lt;h3 id=&#34;tor-is-fantastic-for-your-privacy-but-is-not-magical&#34;&gt;Tor is fantastic for your privacy, but is not magical&lt;/h3&gt;&lt;p&gt;Tor is a great tool to improve your privacy online and make it much harder to identify you, your location, and the content you access online. However, it will not make you magically anonymous.&lt;/p&gt;&lt;p&gt;If you use Tor with files containing metadata about you, this metadata can still identify you.&lt;/p&gt;&lt;p&gt;If you use Tor to log in your Facebook account, then of course Facebook still knows it&#39;s you, and now also knows you are using Tor.&lt;/p&gt;&lt;p&gt;If you use Tor to create a new account, but use an email address, phone number, username, or profile picture you used elsewhere when not connected through Tor, then your Tor activity can get linked to your previous activity.&lt;/p&gt;&lt;p&gt;If you use Tor to reveal information so specific that only you, or only someone at your company, or only someone in this small government department could know, then of course authorities can identify you this way.&lt;/p&gt;&lt;p&gt;You should also consider correlation in time when using Tor. If your activity is so specific that it can be narrowed down to only a few people, and your &lt;abbr title=&#34;Internet Service Provider&#34;&gt;ISP&lt;/abbr&gt; or &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; knows you have accessed Tor at this specific time (and shares this information with authorities), a correlation in time could be enough to de-anonymize you.&lt;/p&gt;&lt;h3 id=&#34;misconceptions-are-very-detrimental-to-tor-and-other-privacy-tools&#34;&gt;Misconceptions are very detrimental to Tor, and other privacy tools&lt;/h3&gt;&lt;p&gt;We need to be extremely careful when spreading information that could be inaccurate or hasn&#39;t been verified when talking about Tor (or any other privacy tools).&lt;/p&gt;&lt;p&gt;Misinformation can create mistaken fears and stop people from using a tool they would greatly benefit from.&lt;/p&gt;&lt;p&gt;If someone is so scared of Tor because of some rumor they heard, that they continue their activism from the surface web instead, they could needlessly put themselves at risk.&lt;/p&gt;&lt;p&gt;Furthermore, unjustified bad reputations can severely hurt funding for tools like Tor. This leads to less resources to continue developing the browser, the network, and to advocate for privacy everywhere.&lt;/p&gt;&lt;p&gt;We all have a responsibility to verify which information we share with others, make sure we stop misinformation at its root, and correct harmful misconceptions everywhere we hear them.&lt;/p&gt;&lt;h2 id=&#34;tor-needs-our-support&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M16 3.23Q17.065 2 18.7 2c.91 0 1.67.33 2.3 1s.96 1.43 1 2.3c0 .7-.33 1.51-1 2.46s-1.32 1.74-1.97 2.39q-.975.96-3.03 2.85-2.085-1.89-3.06-2.85c-.975-.96-1.31-1.44-1.97-2.39S10 6 10 5.3c0-.91.32-1.67.97-2.3s1.43-.96 2.34-1c1.07 0 1.96.41 2.69 1.23M22 19v1l-8 2.5-7-1.94V22H1V11h7.97l6.16 2.3A2.89 2.89 0 0 1 17 16h2c1.66 0 3 1.34 3 3M5 20v-7H3v7zm14.9-1.43c-.16-.33-.51-.57-.9-.57h-5.35c-.54 0-1.07-.08-1.58-.25l-2.38-.79.63-1.9 2.38.79c.3.1 2.3.15 2.3.15 0-.37-.23-.7-.57-.83L8.61 13H7v5.5l6.97 1.91z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Tor needs our support&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Tor is at risk, and needs our help.&lt;/strong&gt; Despite its strength and history, Tor isn&#39;t safe from the same attacks oppressive regimes and misinformed legislators direct at encryption and many other privacy-enhancing technologies.&lt;/p&gt;&lt;p&gt;Moreover, due to its US government funding, Tor has already been on the destruction path of the recent hectic government cuts. Thankfully, the US Agency for Global Media finally &lt;a href=&#34;https://www.theregister.com/2025/03/25/otf_tor_lets_encrypt_funding_lawsuit/?td=rt-3a&#34;&gt;rescinded the grant termination&lt;/a&gt; it had announced on March 15th to the Open Technology Fund, which the Tor Project benefits from. Sadly, considering the unpredictability of the current US administration, this doesn&#39;t mean the Tor Project is safe from cuts later on.&lt;/p&gt;&lt;p&gt;As much as the Tor Network relies on generous volunteers to run it, the nonprofit Tor Project relies on grants and donations to survive.&lt;/p&gt;&lt;p&gt;The good news is, we can help with both!&lt;/p&gt;&lt;p&gt;The more individuals donate to the Tor Project, the less it depends on government funding, and the more stable its donation income becomes.&lt;/p&gt;&lt;p&gt;Similarly, the more people volunteer to run a Tor relay, the more stable and reliable the Tor Network becomes.&lt;/p&gt;&lt;p&gt;Tor is a privacy tool so many people, organizations, and applications need to stay safe and secure. It is &lt;strong&gt;our collective responsibility to contribute what we can&lt;/strong&gt; to keep Tor strong and thriving for all of us.&lt;/p&gt;&lt;h3 id=&#34;how-to-support-tor&#34;&gt;How to support Tor&lt;/h3&gt;&lt;p&gt;There are many ways to help Tor survive and thrive! You can help by:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://donate.torproject.org/&#34;&gt;Donating to the Tor Project (includes really neat merch!)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://community.torproject.org/outreach/&#34;&gt;Spreading the word about Tor&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://community.torproject.org/&#34;&gt;Joining the Tor community&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://community.torproject.org/onion-services/setup/&#34;&gt;Making your website accessible as an onion service&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://toruniversity.eff.org/&#34;&gt;Asking your university to run a Tor relay&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://community.torproject.org/relay/&#34;&gt;Running a Tor relay yourself&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://community.torproject.org/relay/setup/snowflake/&#34;&gt;Running a Snowflake proxy to help fight censorship&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Using Tor for anything from important to trivial&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Sharing this article 💜&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2 id=&#34;onion-sites-you-can-visit-using-the-tor-browser&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M3 2.75C3 1.784 3.784 1 4.75 1h6.5c.966 0 1.75.784 1.75 1.75v11.5a.75.75 0 0 1-1.227.579L8 11.722l-3.773 3.107A.751.751 0 0 1 3 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v9.91l3.023-2.489a.75.75 0 0 1 .954 0l3.023 2.49V2.75a.25.25 0 0 0-.25-.25Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Onion sites you can visit using the Tor Browser&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion/en/&#34;&gt;Privacy Guides website&lt;/a&gt; 💛&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;http://discuss.6xotdxvg7pexnean3xu6b7ivs7g52zcwsdbnz4mdm4byivc3yfv65aid.onion/&#34;&gt;Privacy Guides forum&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.amnestyl337aduwuvpf57irfl54ggtnuera45ygcxzuftwxjvvmpuzqd.onion&#34;&gt;Amnesty International&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.iykpqm7jiradoeezzkhj7c4b33g4hbgfwelht2evxxeicbpjy44c7ead.onion/&#34;&gt;Electronic Frontier Foundation&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;http://fpfjxcrmw437h6z2xl3w4czl55kvkmxpapg37bbopsafdu7q454byxid.onion/&#34;&gt;Freedom of the Press Foundation&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;http://sdolvtfhatvsysc6l34d65ymdwxcujausv7k5jk4cy5ttzhjoi6fzvyd.onion/directory/&#34;&gt;Secure Drop directory (for whistleblowers)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;http://p53lf57qovyuvwsc6xnrppyply3vtqm7l6pcobkmyqsiofyeznfu5uqd.onion/&#34;&gt;ProPublica&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://archivep75mbjunhxc6x4j5mwjmomyxb573v42baldlqu56ruil2oiad.onion/&#34;&gt;Internet Archive&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion/&#34;&gt;OnionShare (file sharing)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/&#34;&gt;Proton Mail&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion&#34;&gt;Tor Project&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;hr /&gt;&lt;p&gt;For more in-depth information about Tor, you can consult our &lt;a href=&#34;https://www.privacyguides.org/en/advanced/tor-overview/&#34;&gt;Tor Overview&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Unless credited otherwise, all screenshots from: Privacy Guides&lt;/small&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/04/30/in-praise-of-tor/</link> <pubDate>Wed, 30 Apr 2025 20:24:37 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/04/30/in-praise-of-tor/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/04/30/in-praise-of-tor.png" type="image/png" length="None" /> </item> <item> <title>Privacy Pass: The New Protocol for Private Authentication</title> <author>fria</author> <category>Explainers</category> <category>Privacy Pass</category> <description>&lt;h1 id=&#34;privacy-pass-the-new-protocol-for-private-authentication&#34;&gt;Privacy Pass: The New Protocol for Private Authentication&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Cover photo of the Privacy Pass logo over a yellow background&#34; src=&#34;../../../../assets/images/privacy-pass/cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Background Image: Thomas Ensley / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Services that require authentication can correlate your activity on that service with your account, and that account is normally linked with payment information that could potentially link back to your real identity. With the Privacy Pass protocol, it doesn&#39;t have to be that way.&lt;!-- more --&gt;&lt;/p&gt;&lt;h2 id=&#34;history&#34;&gt;History&lt;/h2&gt;&lt;p&gt;The story of Privacy Pass begins with a &lt;a href=&#34;https://dl.acm.org/doi/pdf/10.1145/4372.4373&#34;&gt;paper&lt;/a&gt; by David Chaum from 1985 (he actually has an earlier paper from &lt;a href=&#34;https://chaum.com/wp-content/uploads/2022/02/chaum_dissertation.pdf&#34;&gt;1982&lt;/a&gt;, but I&#39;ll be referencing this one), in which he laments the ever-increasing data collection by companies and government agencies.&lt;/p&gt;&lt;p&gt;It&#39;s funny that all the way back in 1985 he talks about the same issues we deal with today: persistent identifiers tied to our real identity for transactions, government IDs, etc.&lt;/p&gt;&lt;p&gt;Chaum proposes three solutions to the state of affairs he describes.&lt;/p&gt;&lt;h3 id=&#34;pseudorandom-identifiers&#34;&gt;Pseudorandom Identifiers&lt;/h3&gt;&lt;p&gt;Instead of persistent identifiers like we now have with our government IDs, credit cards, etc., Chaum suggests randomly generated identifiers. For example, you could have a one-time unique identifier for each transaction at a shop.&lt;/p&gt;&lt;p&gt;For ongoing relationships such as a bank, you can use a single pseudorandom identifier for that organization that you use continuously.&lt;/p&gt;&lt;h3 id=&#34;card-computers&#34;&gt;Card Computers&lt;/h3&gt;&lt;p&gt;One of the more quaint ideas in the paper is the idea of a small &#34;card computer&#34; on which you would perform transactions. Chaum&#39;s theoretical device resembles &#34;a credit-card-sized calculator, and [includes] a character display, keyboard, and a limited distance communication capability (like that of a television remote control)&#34;.&lt;/p&gt;&lt;p&gt;Nowadays, we carry around credit-card sized computers like it&#39;s nothing. The secret &#34;card number&#34; he describes would probably be your device PIN or even biometric authentication, which are already used to authenticate transactions.&lt;/p&gt;&lt;p&gt;We still haven&#39;t &lt;em&gt;quite&lt;/em&gt; reached Chaum&#39;s vision yet in some areas. His idea is for these &#34;card computers&#34; to fully replace ATMs and checkout terminals in stores. Essentially, he wants all transactions to be online transactions, with something like Apple Pay or Google Pay on your device mediating the transaction and using your device PIN to prevent fraudulent transactions.Making all transactions online transactions is an interesting idea. I think most people can share in the frustration of dealing with checkout terminals, especially the self-checkout ones with cameras pointed at your face.&lt;/p&gt;&lt;p&gt;We&#39;re still falling short in a major area though.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;card computers could be purchased or constructed just like any other personal computer, and would have no secrets from or structures unmodifiable by their owners.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;Current smartphones are non-upgradeable by their owners and can&#39;t be built from scratch like a desktop computer can. They also contain lots of black-box proprietary code. Even a Google Pixel, the gold standard of Android smartphone freedom that allows you to install your own operating system securely, still suffers from the same pitfalls.&lt;/p&gt;&lt;h3 id=&#34;cryptography&#34;&gt;Cryptography&lt;/h3&gt;&lt;p&gt;How do we ensure the pseudonyms can&#39;t be linked together? We already use cryptography to protect our communications. Chaum presents ways to similarly protect unlinkability using cryptography:&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;Simple mathematical proofs show that, with appropriate use of the systems, even conspiracy of all organizations and tapping of all communication lines cannot yield enough information to link the pseudonyms-regardless of how clever the approach is or how much computation is expended.&lt;/p&gt;&lt;/blockquote&gt;&lt;h2 id=&#34;blind-signatures&#34;&gt;Blind Signatures&lt;/h2&gt;&lt;p&gt;Digital signatures normally are used to ensure that something like a piece of software or a message comes from the original sender and hasn&#39;t been tampered with. You want to know who the signer is for this system to work.&lt;/p&gt;&lt;p&gt;But what if the signer and the one sending a request are different? Say you have a membership to a hypothetical &lt;em&gt;PrivacyGuides+ subscription service&lt;/em&gt;, and you want to authenticate with it, but don&#39;t want to identify yourself. That&#39;s where blind signatures come in.&lt;/p&gt;&lt;h3 id=&#34;how-it-works&#34;&gt;How it Works&lt;/h3&gt;&lt;p&gt;You can imagine blind signatures like an envelope that&#39;s been wrapped in &lt;a href=&#34;https://en.wikipedia.org/wiki/Carbon_paper&#34;&gt;carbon paper&lt;/a&gt; with a window showing your pseudonym for that account, whether it be an account number, username, etc. They never see anything but the account identifier, or whatever they need to verify that you&#39;re a valid customer.The organization then signs it, indicating you&#39;re a valid customer, and you&#39;re allowed to access the service.&lt;/p&gt;&lt;p&gt;Later, when you&#39;re presented with a request to authenticate as an active subscriber of PrivacyGuides+, you unwrap the envelope and discard it along with the carbon paper. You rewrap it in a new envelope with a window showing the signature and a different pseudonym, and the requester can then be sure that you&#39;re allowed to access PrivacyGuides+.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;A diagram showing an envelope being wrapped in carbon paper, transferred to an organization, then passing over a boundary representing the unlinkability between the two transactions. Then the envelope is unwrapped, put in a new envelope with a window showing the signature from the previous organization, and presented to a different organization.&#34; src=&#34;../../../../assets/images/privacy-pass/blind-signatures.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: &lt;a href=&#34;https://dl.acm.org/doi/pdf/10.1145/4372.4373&#34;&gt;David Chaum&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;p&gt;This system relies on the same strong cryptography that tried and true systems use, with the difference being the unlinkability between the credential issuer and the credential receiver.&lt;/p&gt;&lt;h2 id=&#34;problems&#34;&gt;Problems&lt;/h2&gt;&lt;p&gt;Services that don&#39;t require an account or payment to use are great; you can use them with Tor, clear your browser history, whatever you need to do to keep your activity private.&lt;/p&gt;&lt;p&gt;But logging into an account completely invalidates all of that. Every time you log in or authenticate with a service, you have to identify yourself as the same person, linking all your previous activity together. Increasingly, we&#39;re asked to provide personal information in order to be able to use certain websites or services.&lt;/p&gt;&lt;h3 id=&#34;linkability&#34;&gt;Linkability&lt;/h3&gt;&lt;p&gt;As long as you&#39;re logged into an account with a service, all your previous and current activity can be linked together, along with any data you provided such as an email address, payment information, etc.&lt;/p&gt;&lt;h3 id=&#34;data-collection&#34;&gt;Data Collection&lt;/h3&gt;&lt;p&gt;A lot of websites and services want to — &lt;a href=&#34;https://en.wikipedia.org/wiki/Social_media_age_verification_laws_in_the_United_States&#34;&gt;or are forced to&lt;/a&gt; — filter out users below a certain age.&lt;/p&gt;&lt;p&gt;We&#39;re starting to see a rise in extremely privacy-invasive age verification systems such as submitting a government ID when you want to access a website or invasive facial scans.&lt;/p&gt;&lt;h3 id=&#34;blocking-vpn-and-tor-users&#34;&gt;Blocking &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; and Tor Users&lt;/h3&gt;&lt;p&gt;Bots are a rampant problem for online services, leading them to sometimes block non-residential &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; addresses such as those used for commercial VPNs and Tor.&lt;/p&gt;&lt;h3 id=&#34;captchas&#34;&gt;CAPTCHAs&lt;/h3&gt;&lt;p&gt;When &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; and Tor users aren&#39;t blocked, they often have to deal with annoying &lt;a href=&#34;http://www.captcha.net&#34;&gt;CAPTCHAs&lt;/a&gt; that take up your precious time and use invasive &lt;a href=&#34;https://developers.google.com/recaptcha/docs/v3&#34;&gt;fingerprinting&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;CAPTCHAs aren&#39;t even particularly good at detecting bots. With advances in AI, &lt;a href=&#34;https://arxiv.org/pdf/2307.12108&#34;&gt;bots can solve CAPTCHAs better than humans can&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;privacy-pass&#34;&gt;Privacy Pass&lt;/h2&gt;&lt;p&gt;Several blind signature-based solutions are in various states, some being implemented but not widely used, some being proposed browser APIs, and some being IETF standards.&lt;/p&gt;&lt;p&gt;The landscape is very confusing right now, so I&#39;ll try to elucidate what I&#39;ve found.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://privacypass.github.io&#34;&gt;Privacy Pass&lt;/a&gt; started out as an attempt at a privacy-preserving way to bypass CAPTCHAs.&lt;/p&gt;&lt;p&gt;It started out and is still an extension that can be installed on the &lt;a href=&#34;https://chromewebstore.google.com/detail/silk-privacy-pass-client/ajhmfdgkijocedmfjonnpjfojldioehi&#34;&gt;Chrome&lt;/a&gt; or &lt;a href=&#34;https://addons.mozilla.org/en-US/firefox/addon/privacy-pass/&#34;&gt;Firefox&lt;/a&gt; extension store, but it&#39;s since expanded to become an &lt;a href=&#34;https://datatracker.ietf.org/wg/privacypass/about/&#34;&gt;IETF standard&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;The Privacy Pass protocol has massively outgrown its original purpose. It&#39;s been updated to support multiple different schemes and purposes.&lt;/p&gt;&lt;p&gt;There are three main roles that need to be played for the authentication mechanism to work. These can be filled by all the same party, by three separate parties, or any combination in between. You&#39;ll have increased privacy the more separation there is between each role, so ideally they should all be filled by different parties.&lt;/p&gt;&lt;h3 id=&#34;origin&#34;&gt;Origin&lt;/h3&gt;&lt;p&gt;The origin is the original website or service that&#39;s requesting a token for redemption. The client presents a valid token, or it must request more tokens.&lt;/p&gt;&lt;h3 id=&#34;attester&#34;&gt;Attester&lt;/h3&gt;&lt;p&gt;The attester is responsible for verifying something about the client. There are several ways it can achieve this, and it can use multiple at the same time if desired.&lt;/p&gt;&lt;h4 id=&#34;captcha&#34;&gt;CAPTCHA&lt;/h4&gt;&lt;p&gt;The attester can make the client solve a CAPTCHA to prove that it&#39;s not a bot. Not the most elegant solution but solving one CAPTCHA instead of multiple is preferable.&lt;/p&gt;&lt;h4 id=&#34;client-state&#34;&gt;Client State&lt;/h4&gt;&lt;p&gt;The attester can verify something about the client&#39;s state like the geographic location, whether the client has a valid account, or the number of issuance protocol invocations.&lt;/p&gt;&lt;h4 id=&#34;trusted-device&#34;&gt;Trusted Device&lt;/h4&gt;&lt;p&gt;If your client is running on hardware that&#39;s capable of producing device-level attestation, like a device with a secure element, then it can use that to verify that the device is trusted.&lt;/p&gt;&lt;p&gt;For example, in Apple&#39;s Private Access Token implementation, they use certificates stored in the Secure Enclave and verify that your Apple account is in good standing.&lt;/p&gt;&lt;h3 id=&#34;issuer&#34;&gt;Issuer&lt;/h3&gt;&lt;p&gt;The issuer is responsible for issuing tokens in response to requests from clients.&lt;/p&gt;&lt;p&gt;The client presents tokens to the Origin once they&#39;re provided by the issuer.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;diagram showing the structure of Private Access Tokens. The origin asks the client for a token, the client forwards the request to the attester which then forwards it to the issuer which then generates a token, sends it to the client which then sends it to the origin.&#34; src=&#34;../../../../assets/images/privacy-pass/private-access-tokens.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: &lt;a href=&#34;https://blog.cloudflare.com/eliminating-captchas-on-iphones-and-macs-using-new-standard/&#34;&gt;Cloudflare&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;p&gt;The tokens need to identify which issuers are trusted.&lt;/p&gt;&lt;p&gt;They can also be interactive or non-interactive. Interactive means that you need a fresh token based on the challenge, whereas a non-interactive token can be stored for later use.&lt;/p&gt;&lt;p&gt;Tokens can also be constrained to one specific Origin, or they can be used across Origins.&lt;/p&gt;&lt;h3 id=&#34;private-state-tokens&#34;&gt;Private State Tokens&lt;/h3&gt;&lt;p&gt;&lt;a href=&#34;https://developers.google.com/privacy-sandbox/protections/private-state-tokens&#34;&gt;Private State Tokens&lt;/a&gt; (PSTs) are a &lt;a href=&#34;https://github.com/WICG/trust-token-api&#34;&gt;proposed browser API&lt;/a&gt; by Google as part of their &lt;a href=&#34;https://developers.google.com/privacy-sandbox&#34;&gt;Privacy Sandbox&lt;/a&gt;. They&#39;re based on the Privacy Pass protocol.&lt;/p&gt;&lt;p&gt;The main benefit of PSTs is that they provide a secure place for websites to store their tokens so that you don&#39;t need a separate extension for every service.&lt;/p&gt;&lt;p&gt;A browser-level API, I imagine, would significantly reduce the development burden of browser-based services looking to implement Privacy Pass, but it would leave non-browser apps like VPNs high and dry.&lt;/p&gt;&lt;h3 id=&#34;private-access-tokens&#34;&gt;Private Access Tokens&lt;/h3&gt;&lt;p&gt;&lt;a href=&#34;https://blog.cloudflare.com/eliminating-captchas-on-iphones-and-macs-using-new-standard/&#34;&gt;Private Access Tokens&lt;/a&gt; are based on Privacy Pass as well, but they don&#39;t seem to be specifically bound to the browser.&lt;/p&gt;&lt;p&gt;It&#39;s unclear to me what really makes Private Access Tokens different from Privacy Pass itself, other than that Private Access Tokens seem to call for separation of the Attester and Issuer while Privacy Pass allows the origin, attester, and issuer to be the same. Delegating each role to a different party adds extra privacy.&lt;/p&gt;&lt;p&gt;The origin website only knows your URL and &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; from the initial connection.&lt;/p&gt;&lt;p&gt;The attester only knows the data needed to verify you as a valid user.&lt;/p&gt;&lt;p&gt;The issuer knows the site you visited, but doesn&#39;t know any of your device information that the attester used to verify you.&lt;/p&gt;&lt;h3 id=&#34;kagi&#34;&gt;Kagi&lt;/h3&gt;&lt;p&gt;There are scant services actively using Privacy Pass to authenticate users, but a recent and very exciting example is &lt;a href=&#34;https://blog.kagi.com/kagi-privacy-pass&#34;&gt;Kagi&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;With their implementation, you can now install their extension for &lt;a href=&#34;https://addons.mozilla.org/en-US/firefox/addon/kagi-privacy-pass/&#34;&gt;Firefox&lt;/a&gt; and &lt;a href=&#34;https://chromewebstore.google.com/detail/kagi-search/cdglnehniifkbagbbombnjghhcihifij&#34;&gt;Chrome&lt;/a&gt;. Safari isn&#39;t supported at the moment, but their &lt;a href=&#34;https://chromewebstore.google.com/detail/kagi-search/cdglnehniifkbagbbombnjghhcihifij&#34;&gt;Orion&lt;/a&gt; browser supports it and is WebKit-based.&lt;/p&gt;&lt;p&gt;The need for an extension and lack of support for some platforms highlights the need for widespread support for Privacy Pass in browsers and platforms. It&#39;s not reasonable to expect every single platform to implement Privacy Pass themselves and users likely don&#39;t want to install a separate extension for every platform either.&lt;/p&gt;&lt;p&gt;That said, I applaud Kagi for their efforts. They went above and beyond to protect their users&#39; privacy. A few notes for future improvements, though.&lt;/p&gt;&lt;h4 id=&#34;no-account-requirement&#34;&gt;No Account Requirement&lt;/h4&gt;&lt;p&gt;Currently, Kagi requires an account in order to use it. Although they allow you to put in a fake email address on account creation since they don&#39;t &lt;a href=&#34;https://kagifeedback.org/d/3813-enable-anonymous-registration-no-email/16&#34;&gt;check it&lt;/a&gt;, it&#39;s still a persistent identifier that could be eliminated.&lt;/p&gt;&lt;p&gt;Their announcement blog post states that the ability to use Kagi fully without an account is a possibility for the future with an invitation to request the feature on their &lt;a href=&#34;https://kagifeedback.org/d/6163-kagi-privacy-pass&#34;&gt;forum&lt;/a&gt;, so feel free to add your voice. A fully accountless search engine that doesn&#39;t rely on ads would be great to see.&lt;/p&gt;&lt;h4 id=&#34;separation-of-origin-attester-issuer&#34;&gt;Separation of Origin, Attester, Issuer&lt;/h4&gt;&lt;p&gt;Kagi uses the &lt;a href=&#34;https://www.ietf.org/archive/id/draft-ietf-privacypass-architecture-03.html?_fsi=jKxFixnl#section-4.1&#34;&gt;Shared Origin, Attester, Issuer&lt;/a&gt; model for their implementation, which leaves the possibility of data being correlated between each step of the process, such as device fingerprinting or &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address being used to correlate a user who is issued tokens with when they redeem them.&lt;/p&gt;&lt;p&gt;Kagi&#39;s onion service helps to mitigate this issue, but I think it would be a significant privacy improvement to separate all three entities.&lt;/p&gt;&lt;h4 id=&#34;remove-requirement-for-an-extension&#34;&gt;Remove Requirement for an Extension&lt;/h4&gt;&lt;p&gt;Having to install an extension is annoying as an end user and surely incurs some development cost in both the initial development and upkeep over time. I&#39;m not sure how it would be possible to get rid of the extension as it seems like there&#39;s no good way to do so at the moment, but I&#39;m hopeful that the Private State Token API could be used for that in the future if it ever gets fully standardized as a browser API.&lt;/p&gt;&lt;h2 id=&#34;future-possibilities&#34;&gt;Future Possibilities&lt;/h2&gt;&lt;p&gt;Overall, Privacy Pass is an exciting standard that is already improving the privacy of users on a wide scale.&lt;/p&gt;&lt;h3 id=&#34;easier-adoption&#34;&gt;Easier Adoption&lt;/h3&gt;&lt;p&gt;However, for widespread adoption of anonymous authentication for all online services, there needs to be an easier way for developers to implement it. I see Private State Tokens and Private Access Tokens as paths toward that goal, but they have their own limitations.&lt;/p&gt;&lt;p&gt;Private State Tokens seem to be restricted to browsers, which is mostly fine since so many online services are accessed through the browser. It does put services like VPNs that operate outside the browser in a tight spot though.&lt;/p&gt;&lt;p&gt;Private Access Tokens seem like a possible solution for device-wide Privacy Pass authentication, but the only place I&#39;ve seen them implemented is in Apple&#39;s operating systems to identify users as real iOS or macOS users. I&#39;d like to see wider adoption for more use cases than just that. It&#39;s unclear what the vision for Private Access Tokens is for the moment.&lt;/p&gt;&lt;h3 id=&#34;carriers&#34;&gt;Carriers&lt;/h3&gt;&lt;p&gt;One of the biggest and most privacy-invasive services is mobile carriers. They take lots of personal information when you sign up, and then you have permanent identifiers, both &lt;abbr title=&#34;International Mobile Subscriber Identity&#34;&gt;IMSI&lt;/abbr&gt; identifying you as a subscriber and &lt;abbr title=&#34;International Mobile Equipment Identity&#34;&gt;IMEI&lt;/abbr&gt; identifying your device, tied to that information while you use it. Because of how the cell network works, they also can tie that information to your physical location and all the traffic you send through their network.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.cape.co/research&#34;&gt;Cape&lt;/a&gt; is a privacy-focused carrier that says they&#39;re &#34;studying the use of blinded tokens and zero-knowledge proofs to disaggregate subscriber information.&#34; This would have a massive impact on user privacy, possibly allowing a &lt;abbr title=&#34;Know Your Customer&#34;&gt;KYC&lt;/abbr&gt;&#39;d mobile subscriber to use their carrier at least semi-anonymously (it&#39;s unclear how &lt;abbr title=&#34;International Mobile Subscriber Identity&#34;&gt;IMSI&lt;/abbr&gt; and &lt;abbr title=&#34;International Mobile Equipment Identity&#34;&gt;IMEI&lt;/abbr&gt; fit into this scheme, as well as location information).&lt;/p&gt;&lt;h3 id=&#34;vpns&#34;&gt;VPNs&lt;/h3&gt;&lt;p&gt;Commercial VPNs typically require some kind of account identifier, even if it&#39;s just a randomized number.&lt;/p&gt;&lt;p&gt;Apple&#39;s iCloud Private Relay uses RSA blind signatures to anonymously authenticate users to each of the two hops.&lt;/p&gt;&lt;p&gt;Google&#39;s former &lt;a href=&#34;https://www.gstatic.com/vpn/google_vpn_white_paper.pdf&#34;&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/a&gt; service also used blind signatures to protect users.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Diagram showing Google&#39;s blind signature VPN authentication scheme&#34; src=&#34;../../../../assets/images/privacy-pass/google-vpn.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image: &lt;a href=&#34;https://www.gstatic.com/vpn/google_vpn_white_paper.pdf&#34;&gt;Google&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Hopefully we can see more &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; companies start to use Privacy Pass to authenticate users, I think it would be a massive improvement to user privacy.&lt;/p&gt;&lt;h3 id=&#34;digital-cash&#34;&gt;Digital Cash&lt;/h3&gt;&lt;p&gt;Part of Chaum&#39;s vision was anonymous digital transactions using blind signatures, which he made a reality with his company &lt;a href=&#34;https://chaum.com/wp-content/uploads/2022/01/05-27-94-World_s-first-electronic-cash-payment-over-computer-networks.pdf&#34;&gt;DigiCash&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;For whatever reason, &lt;em&gt;eCash&lt;/em&gt;, as it was called, never caught on and the company filed for bankruptcy in 1998. We&#39;re left with the terrible current system where you need to input your credit card and personal information in order to make a transaction, which is easily traceable back to you. Not to mention the security implications, &lt;a href=&#34;https://www.security.org/digital-safety/credit-card-fraud-report/&#34;&gt;credit card fraud&lt;/a&gt; is rampant today.&lt;/p&gt;&lt;p&gt;The dream isn&#39;t dead, however. Chaum&#39;s &lt;a href=&#34;https://chaum.com/ecash-2-0/&#34;&gt;eCash 2.0&lt;/a&gt; is quantum-resistant and has been built and tested in the Bank for International Settlements&#39; &lt;a href=&#34;https://www.bis.org/about/bisih/topics/cbdc/tourbillon.htm&#34;&gt;Project Tourbillon&lt;/a&gt;.&lt;/p&gt;&lt;h3 id=&#34;digital-id&#34;&gt;Digital ID&lt;/h3&gt;&lt;p&gt;Laws are being passed forcing 18+ websites and even &lt;a href=&#34;https://thehill.com/policy/technology/5179865-utah-app-store-age-verification-law/&#34;&gt;app stores&lt;/a&gt; to collect verify the ID of users. This is a massive slap in the face to the privacy and security of everyone. Data breaches and tracking are inevitable under the current system.&lt;/p&gt;&lt;p&gt;Blind signatures could provide a private and secure way to verify age or other information without having to submit your entire ID or submit invasive face scans.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/04/21/privacy-pass/</link> <pubDate>Mon, 21 Apr 2025 17:25:55 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/04/21/privacy-pass/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/04/21/privacy-pass.png" type="image/png" length="None" /> </item> <item> <title>Signal Configuration and Hardening Guide</title> <author>Privacy Guides</author> <author>mbananasynergy</author> <author>Daniel Gray</author> <category>Instant Messengers</category> <category>Molly</category> <category>Signal</category> <category>Tutorials</category> <description>&lt;h1 id=&#34;signal-configuration-and-hardening-guide&#34;&gt;Signal Configuration and Hardening Guide&lt;/h1&gt;&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication#signal&#34;&gt;Signal&lt;/a&gt; is a widely regarded instant messaging service that is not only easy to use but is also private and secure. Signal&#39;s strong &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; implementation and metadata protections provide a level of assurance that only you and your intended recipients are able to read communications.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;This guide details actions you can take to configure and harden Signal in accordance with your &lt;a href=&#34;https://www.privacyguides.org/en/basics/threat-modeling/&#34;&gt;threat model&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;signal-configuration&#34;&gt;Signal Configuration&lt;/h2&gt;&lt;h3 id=&#34;signal-pin&#34;&gt;Signal PIN&lt;/h3&gt;&lt;p&gt;When you register for Signal with your phone number, you will be asked to set up a Signal PIN. This PIN can be used to recover your profile, settings, contacts and who you&#39;ve blocked in case you ever lose or switch devices.&lt;/p&gt;&lt;p&gt;Additionally, your Signal PIN can also double as a registration lock that prevents others from registering with your number.&lt;/p&gt;&lt;div class=&#34;admonition attention&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Registration Lock&lt;/p&gt;&lt;p&gt;The server will not enforce the registration lock after 7 days of inactivity. After that, someone will be able to reset the PIN at registration and register with your phone number. This will wipe the data stored in your Signal account, as it is encrypted by the PIN, but it won&#39;t prevent someone from registering with your number provided that they can receive a text on it.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;strong&gt;Important update&lt;/strong&gt;: since this blog post was published, there have been changes to the registration flow for Signal. You should read about this &lt;a href=&#34;../../../11/10/signal-number-registration-update/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;If you haven&#39;t set up a Signal PIN, or have previously opted out of setting one up, follow these steps on Android/iOS:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Account&lt;/strong&gt; &amp;gt; &lt;strong&gt;Signal PIN&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Create new PIN&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Signal will prompt you to enter a PIN. We suggest using a strong alphanumeric PIN that can be stored in a &lt;a href=&#34;https://www.privacyguides.org/en/passwords/&#34;&gt;password manager&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Once you have done that, or if you already have set up a PIN, make sure that &lt;strong&gt;Registration Lock&lt;/strong&gt; is also enabled.&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Account&lt;/strong&gt; &amp;gt; &lt;strong&gt;Signal PIN&lt;/strong&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Turn on &lt;strong&gt;Registration Lock&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class=&#34;admonition important&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Important&lt;/p&gt;&lt;p&gt;If you forget the PIN and have enabled a registration lock, you may be locked out of your account for up to 7 days.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;You can learn more about Signal PIN on &lt;a href=&#34;https://support.signal.org/hc/en-us/articles/360007059792-Signal-PIN&#34;&gt;Signal&#39;s website&lt;/a&gt;.&lt;/p&gt;&lt;h3 id=&#34;safety-numbers&#34;&gt;Safety Numbers&lt;/h3&gt;&lt;p&gt;Safety numbers are a feature in Signal that allows you to ensure that messages are delivered securely between verified devices.&lt;/p&gt;&lt;p&gt;It is best practice to always compare safety numbers with your contacts. This can be done in a couple of ways:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Scanning your contact&#39;s QR code while viewing their safety number.&lt;/li&gt;&lt;li&gt;Comparing the safety numbers on both ends, be it visually or audibly.&lt;/li&gt;&lt;/ul&gt;&lt;div class=&#34;admonition important&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Important&lt;/p&gt;&lt;p&gt;In order for safety numbers to also verify that the intended recipient has access to the device you&#39;re verifying, you need a secondary communication channel where you can authenticate the person that is holding the device. For example, an in-person meeting or during a video call.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;To view the safety number for a particular contact, you need to follow these steps within Signal:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Go to a chat with a contact.&lt;/li&gt;&lt;li&gt;Select the chat header or &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;View Safety Number&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Once you&#39;ve compared the safety numbers on both devices, you can mark that contact as &lt;strong&gt;Verified&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;A checkmark will appear in the chat header by your contact&#39;s name when the safety number is marked as verified. It will remain verified unless the safety number changes, or you manually change the verification status.&lt;/p&gt;&lt;p&gt;After doing that, any time the safety number changes, you&#39;ll be notified.&lt;/p&gt;&lt;p&gt;If the safety number with one of your contacts changes, we recommend asking the contact what happened (if they switched to a new device or re-installed Signal, for example) and verify the safety numbers again.&lt;/p&gt;&lt;p&gt;For more demanding threat models, you should agree on a protocol with your contacts in advance on what to do in case the safety number ever changes.&lt;/p&gt;&lt;p&gt;You can learn more about safety numbers on &lt;a href=&#34;https://support.signal.org/hc/en-us/articles/360007060632-What-is-a-safety-number-and-why-do-I-see-that-it-changed-&#34;&gt;Signal&#39;s website&lt;/a&gt;.&lt;/p&gt;&lt;h3 id=&#34;disappearing-messages&#34;&gt;Disappearing Messages&lt;/h3&gt;&lt;p&gt;While communication in Signal is &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;, the messages are still available on the devices, unless they are manually deleted.&lt;/p&gt;&lt;p&gt;It is good practice to set up disappearing messages in Signal&#39;s settings so that any chats you start will disappear after a specified amount of time has passed.&lt;/p&gt;&lt;p&gt;On Android/iOS:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Privacy&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Under &lt;strong&gt;Disappearing messages&lt;/strong&gt;, select &lt;strong&gt;Default timer for new chats&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select the desired amount of time and select &lt;strong&gt;Save&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Override the global default for specific contacts&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Go to a chat with a contact&lt;/li&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; on the top right&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Disappearing messages&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select the desired amount of time and select &lt;strong&gt;Save&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;We recommend setting up a reasonable timer by default, such as one week, and adjusting it per contact as you see fit.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Snapchat-like Functionality&lt;/p&gt;&lt;p&gt;Signal allows you to send &#34;view-once&#34; media that are automatically removed from the conversation after they have been viewed.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;disable-link-previews&#34;&gt;Disable Link Previews&lt;/h3&gt;&lt;p&gt;Signal offers the ability to retrieve previews of webpages linked within a conversation.&lt;/p&gt;&lt;p&gt;This means that when you send a link, a request will be sent to that website so that a preview of the website can be displayed alongside the link. Thus, we recommend disabling link previews.&lt;/p&gt;&lt;p&gt;Your recipient doesn&#39;t make any requests unless they open the link on their end.&lt;/p&gt;&lt;p&gt;On Android/iOS:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Chats&lt;/strong&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Turn off &lt;strong&gt;Generate link previews&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;screen-security&#34;&gt;Screen Security&lt;/h3&gt;&lt;p&gt;Signal allows you to prevent a preview of the app being shown (i.e., in the app switcher) unless you explicitly open it.&lt;/p&gt;&lt;p&gt;On Android:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Privacy&lt;/strong&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Turn on &lt;strong&gt;Screen Security&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;On iOS:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Privacy&lt;/strong&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Turn on &lt;strong&gt;Hide Screen in App Switcher&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;screen-lock&#34;&gt;Screen Lock&lt;/h3&gt;&lt;p&gt;If someone gets a hold of your device while it is unlocked, you run the risk of them being able to open the Signal app and look at your conversations.&lt;/p&gt;&lt;p&gt;To mitigate this, you can leverage the Screen Lock option to require additional authentication before Signal can be accessed.&lt;/p&gt;&lt;p&gt;On Android/iOS:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Privacy&lt;/strong&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Turn on &lt;strong&gt;Screen Lock&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;notification-privacy&#34;&gt;Notification Privacy&lt;/h3&gt;&lt;p&gt;Even when your phone is locked, anyone who can lay eyes on the device can read messages and sender names from your lock screen.&lt;/p&gt;&lt;p&gt;On Signal, you have the ability to hide message content and sender name, or just the message content itself.&lt;/p&gt;&lt;p&gt;On Android:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Notifications&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Show&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;No name or message&lt;/strong&gt; or &lt;strong&gt;Name only&lt;/strong&gt; respectively.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;On iOS:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Notifications&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Show&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;No name or Content&lt;/strong&gt; or &lt;strong&gt;Name Only&lt;/strong&gt; respectively.&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;call-relaying&#34;&gt;Call Relaying&lt;/h3&gt;&lt;p&gt;Signal allows you to relay all calls (including video calls) through the Signal server to avoid revealing your &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address to your contact. This may reduce call quality.&lt;/p&gt;&lt;p&gt;On Android/iOS:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Privacy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Advanced&lt;/strong&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Turn on &lt;strong&gt;Always Relay Calls&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;For incoming calls from people who are not in your Contacts app, the call will be relayed through the Signal server regardless of how you&#39;ve set it up.&lt;/p&gt;&lt;h3 id=&#34;bypass-internet-censorship&#34;&gt;Bypass Internet Censorship&lt;/h3&gt;&lt;p&gt;If Signal is blocked in your country, it has a built-in &#34;Censorship Circumvention&#34; feature that uses domain fronting to bypass restrictions.&lt;/p&gt;&lt;p&gt;On Android/iOS:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; → &lt;strong&gt;Settings&lt;/strong&gt; → &lt;strong&gt;Privacy&lt;/strong&gt; → &lt;strong&gt;Advanced&lt;/strong&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Turn on &lt;strong&gt;Censorship Circumvention&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Additionally, Signal allows you to set up a proxy to bypass censorship.&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Warning&lt;/p&gt;&lt;p&gt;All traffic remains opaque to the proxy operator. However, the censoring party could learn that you are using Signal through a proxy because the app &lt;a href=&#34;https://community.signalusers.org/t/traffic-not-routed-to-tls-proxies-can-expose-users-to-censors/27479&#34;&gt;fails to route all the &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; connections to the proxy&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;You can learn more about Signal&#39;s proxy support on their &lt;a href=&#34;https://support.signal.org/hc/en-us/articles/360056052052-Proxy-Support&#34;&gt;website&lt;/a&gt;.&lt;/p&gt;&lt;h3 id=&#34;disable-signal-call-history-ios&#34;&gt;Disable Signal Call History (iOS)&lt;/h3&gt;&lt;p&gt;Signal allows you to see your call history from your regular phone app. This allows your iOS device to sync your call history with iCloud, including whom you spoke to, when, and for how long.&lt;/p&gt;&lt;p&gt;If you use iCloud and you don’t want to share call history on Signal, confirm it’s turned off:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li&gt;Select &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 16a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2m0-6a2 2 0 0 1 2 2 2 2 0 0 1-2 2 2 2 0 0 1-2-2 2 2 0 0 1 2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Privacy&lt;/strong&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Turn off &lt;strong&gt;Show Calls in Recents&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2 id=&#34;signal-hardening&#34;&gt;Signal Hardening&lt;/h2&gt;&lt;h3 id=&#34;avoid-device-linking&#34;&gt;Avoid Device Linking&lt;/h3&gt;&lt;p&gt;While it may be tempting to link your Signal account to your desktop device for convenience, keep in mind that this extends your trust to an additional and potentially less secure operating system.&lt;/p&gt;&lt;p&gt;Avoid linking your Signal account to a desktop device to reduce your &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt;, if your threat model calls for protecting against &lt;a class=&#34;pg-orange&#34; href=&#34;https://www.privacyguides.org/en/basics/common-threats/#security-and-privacy&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20 8h-2.81c-.45-.8-1.07-1.5-1.82-2L17 4.41 15.59 3l-2.17 2.17a6 6 0 0 0-2.83 0L8.41 3 7 4.41 8.62 6c-.75.5-1.36 1.21-1.81 2H4v2h2.09c-.06.33-.09.66-.09 1v1H4v2h2v1c0 .34.03.67.09 1H4v2h2.81A5.99 5.99 0 0 0 15 20.18c.91-.52 1.67-1.28 2.19-2.18H20v-2h-2.09c.06-.33.09-.66.09-1v-1h2v-2h-2v-1c0-.34-.03-.67-.09-1H20zm-4 7a4 4 0 0 1-4 4 4 4 0 0 1-4-4v-4a4 4 0 0 1 4-4 4 4 0 0 1 4 4zm-2-5v2h-4v-2zm-4 4h4v2h-4z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Passive Attacks&lt;/a&gt;.&lt;/p&gt;&lt;h3 id=&#34;molly-android&#34;&gt;Molly (Android)&lt;/h3&gt;&lt;p&gt;If you use &lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/#molly-android&#34;&gt;Molly&lt;/a&gt; on Android to access the Signal network, there are many privacy and security-enhancing features that you may want to explore.&lt;/p&gt;&lt;h4 id=&#34;privacy-and-security-features&#34;&gt;Privacy and Security Features&lt;/h4&gt;&lt;p&gt;Molly has implemented database encryption at rest, which means that you can encrypt the app&#39;s database with a passphrase to ensure that none of its data is accessible without it.&lt;/p&gt;&lt;div class=&#34;admonition note&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Note&lt;/p&gt;&lt;p&gt;As long as Molly is locked, you will not receive notifications for any incoming messages or calls until you unlock it again.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Once enabled, a configurable lock timer can be set, after which point Molly will lock itself if you haven&#39;t unlocked your device for that specific time period. Alternatively, you can manually lock the app whenever you want.&lt;/p&gt;&lt;p&gt;For the database encryption feature to be useful, two conditions must be met:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Molly has to be locked at the time an attacker gains access to the device. This can include a physical attack in which the attacker seizes your device and manages to unlock the device itself, or a remote attack, in which the device is compromised and manages to elevate privileges to root.&lt;/li&gt;&lt;li&gt;If you become aware that your device has been compromised, you should not unlock Molly&#39;s database.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;If both of the above conditions are met, the data within Molly is safe as long as the passphrase is not accessible to the attacker.&lt;/p&gt;&lt;p&gt;To supplement the database encryption feature, Molly securely wipes your device&#39;s RAM once the database is locked to defend against forensic analysis.&lt;/p&gt;&lt;p&gt;While Molly is running, your data is kept in RAM. When any app closes, its data remains in RAM until another app takes the same physical memory pages. That can take seconds or days, depending on many factors. To prevent anyone from dumping the RAM to disk and extracting your data after Molly is locked, the app overrides all free RAM memory with random data when you lock the database.&lt;/p&gt;&lt;p&gt;There is also the ability to configure a SOCKS proxy in Molly to route its traffic through the proxy or &lt;a href=&#34;https://www.privacyguides.org/en/tor#orbot&#34;&gt;Tor via Orbot&lt;/a&gt;. When enabled, all traffic is routed through the proxy and there are no known &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; or &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; leaks. When using this feature, &lt;a href=&#34;#call-relaying&#34;&gt;call relaying&lt;/a&gt; will always be enabled, regardless of the setting.&lt;/p&gt;&lt;p&gt;Signal adds everyone who you have communicated with to its database. Molly allows you to delete those contacts and stop sharing your profile with them.&lt;/p&gt;&lt;p&gt;To supplement the feature above, as well as for additional security and to fight spam, Molly offers the ability to block unknown contacts that you&#39;ve never been in contact with or those that are not in your contact list without you having to manually block them.&lt;/p&gt;&lt;p&gt;You can find a full list of Molly&#39;s &lt;a href=&#34;https://github.com/mollyim/mollyim-android#features&#34;&gt;features&lt;/a&gt; on the project&#39;s repository.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2022/07/07/signal-configuration-and-hardening/</link> <pubDate>Tue, 15 Apr 2025 04:00:00 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2022/07/07/signal-configuration-and-hardening/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2022/07/07/signal-configuration-and-hardening.png" type="image/png" length="None" /> </item> <item> <title>Hide Nothing</title> <author>Dan Arel</author> <category>Government</category> <category>Opinion</category> <description>&lt;h1 id=&#34;hide-nothing&#34;&gt;Hide Nothing&lt;/h1&gt;&lt;p&gt;In the wake of the September 11, 2001, attack on the United States, the US government enacted laws that weakened citizen privacy in the name of national emergency. This sent up many red flags for human rights and privacy advocates.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;These concerns were met with “if you have nothing to hide, you have nothing to fear.” The argument goes that if you&#39;re not doing anything illegal, then these violations of your privacy shouldn&#39;t bother you. If you care about privacy, you clearly can&#39;t be up to anything good.&lt;/p&gt;&lt;p&gt;On the surface, this seems true to many people – but the reality is very different. We may not have had anything to hide in the immediate aftermath of 9/11, but that was not the only information being sought after by governments. Indeed, following the passage of the Patriot Act in the US, the FBI issued 192,499 &lt;a href=&#34;https://www.aclu.org/other/national-security-letters&#34;&gt;National Security Letters&lt;/a&gt;, meaning they collected the records and online activity of nearly 200,000 people.&lt;/p&gt;&lt;p&gt;In the end it only convicted one person.&lt;/p&gt;&lt;p&gt;Now, many have argued that stopping one terrorist might be worth giving up some security for, but &lt;a href=&#34;https://web.archive.org/web/20230318132243/https://www.aclu.org/issues/national-security/privacy-and-surveillance/surveillance-under-patriot-act&#34;&gt;according&lt;/a&gt; to the ACLU, the conviction would have occurred without the Patriot Act.&lt;/p&gt;&lt;p&gt;Many legal actions you take today could be deemed illegal by future laws or future government. In the US today there is discussion around the possibility of Roe v. Wade being overturned, allowing states to outlaw abortions. You may not currently feel the need to hide internet searches, menstrual cycle apps, or donations to women&#39;s health clinics today because it&#39;s not illegal, but tomorrow that information could be used against you.&lt;/p&gt;&lt;p&gt;In countries were organizing around political dissent is legal, that doesn&#39;t mean the government is tracking those taking part and using that information to create informants or infiltrate such groups. Or worse, when or if laws change, using that surveillance to punish those involved.&lt;/p&gt;&lt;p&gt;And even if you break away from the legal aspects, we all have something to hide. You may not be ready to reveal your sexual or gender identity, but your internet usage could potentially do that for you. You don&#39;t want to make your bank account public; you have that information to hide. And you can continue to list things about your life you&#39;d just rather not make public, regardless of potential legality.&lt;/p&gt;&lt;p&gt;In July 2021, a Catholic priest by the name of Jeffrey Burrill lost his job and was forced to resign after data collected through his cell phone showed that he was active on the gay dating app Grindr, and that he had visited multiple gay bars in the area. &lt;a href=&#34;https://www.washingtonpost.com/religion/2021/07/20/bishop-misconduct-resign-burrill/&#34;&gt;According&lt;/a&gt; to the &lt;em&gt;Washington Post&lt;/em&gt;:&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;“A mobile device correlated to Burrill emitted app data signals from the location-based hookup app Grindr on a near-daily basis during parts of 2018, 2019, and 2020 —– at both his USCCB office and his USCCB-owned residence, as well as during USCCB meetings and events in other cities,” the Pillar reported.&lt;/p&gt;&lt;p&gt;“The data obtained and analyzed by The Pillar conveys mobile app date signals during two 26-week periods, the first in 2018 and the second in 2019 and 2020. The data was obtained from a data vendor and authenticated by an independent data consulting firm contracted by The Pillar,” the site reported. It did not identify who the vendor was or if the site bought the information or got it from a third party.&lt;/p&gt;&lt;p&gt;The Pillar story says app data “correlated” to Burrill&#39;s phone shows the priest visited gay bars, including while traveling for the USCCB.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;While it was not clear who was tracking Burrill&#39;s device, the Post went on to say that:&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;Privacy experts have long raised concerns about “anonymized” data collected by apps and sold to or shared with aggregators and marketing companies. While the information is typically stripped of obviously identifying fields, like a user&#39;s name or phone number, it can contain everything from age and gender to a device ID. It&#39;s possible for experts to de-anonymize some of this data and connect it to real people.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;While Burrill was without a doubt in violation of his work&#39;s own code of conduct, he did decide on his own to be a priest. However, his personal life was not harming others and was just that, his personal life. While the question looms about who was tracking him to begin with and why, the fact it was so easy to do is alarming.&lt;/p&gt;&lt;p&gt;What if Burrill wasn&#39;t a priest, but just happened to work for someone who held anti-homosexual views who used this data to out him, humiliate him, and fire him under false pretenses? This data, which should be private could (and likely did in the real-life circumstance) ruin his life.&lt;/p&gt;&lt;p&gt;That is what makes internet privacy so important. It&#39;s not hiding nefarious activity, it&#39;s that we all have an innate right to our privacy.&lt;/p&gt;&lt;p&gt;You might not feel today that you have anything to hide, but you might not feel that way tomorrow and once something is public, it cannot be made private again.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2022/06/09/hide-nothing/</link> <pubDate>Sat, 12 Apr 2025 02:26:12 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2022/06/09/hide-nothing/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2022/06/09/hide-nothing.png" type="image/png" length="None" /> </item> <item> <title>Encryption Is Not a Crime</title> <author>Em</author> <category>Opinion</category> <description>&lt;h1 id=&#34;encryption-is-not-a-crime&#34;&gt;Encryption Is Not a Crime&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Photo of a red key on an all black background.&#34; src=&#34;../../../../assets/images/encryption-is-not-a-crime/encryption-is-not-a-crime-cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Matt Artz / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Contrary to what some policymakers seem to believe, whether naively or maliciously, encryption is not a crime. Anyone asserting encryption is a tool for crime is either painfully misinformed or is attempting to manipulate legislators to gain oppressive power over the people.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;Encryption is not a crime, encryption is a shield.&lt;/p&gt;&lt;p&gt;Encryption is the digital tool that protects us against all sorts of attacks. It is the lock on your digital door preventing harmful intruders from entering your home. Encryption is also the door itself, protecting your privacy and intimacy from creepy eavesdroppers while you go about your life.&lt;/p&gt;&lt;p&gt;It&#39;s not a crime to lock your home&#39;s door for protection, &lt;strong&gt;why would it be a crime to lock your digital door?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;../../../03/25/privacy-means-safety/&#34;&gt;Encryption protects you&lt;/a&gt; from cyberattack, identity theft, discrimination, doxxing, stalking, sexual violence, physical harm, and much more.&lt;/p&gt;&lt;h2 id=&#34;who-says-encryption-is-a-crime&#34;&gt;Who says encryption is a crime&lt;/h2&gt;&lt;p&gt;Anyone who is well-informed will find it hard to believe someone could want to sabotage such fantastic protection.&lt;/p&gt;&lt;p&gt;Yet, &lt;a href=&#34;https://www.wired.com/1993/02/crypto-rebels/&#34;&gt;year&lt;/a&gt; after &lt;a href=&#34;https://www.wired.com/story/a-new-era-of-attacks-on-encryption-is-starting-to-heat-up/&#34;&gt;year&lt;/a&gt;, oppressive regimes and lazy or greedy &lt;a href=&#34;https://www.techradar.com/computing/cyber-security/anonymity-is-not-a-fundamental-right-experts-disagree-with-europol-chiefs-request-for-encryption-back-door&#34;&gt;law enforcement&lt;/a&gt; entities around the world have attempted to &lt;a href=&#34;https://www.howtogeek.com/544727/what-is-an-encryption-backdoor/&#34;&gt;undermine encryption&lt;/a&gt; using the pretext this is needed to &#34;solve crime&#34;, despite all the experts &lt;em&gt;repeatedly&lt;/em&gt; warning on how &lt;a href=&#34;https://arstechnica.com/tech-policy/2019/08/post-snowden-tech-became-more-secure-but-is-govt-really-at-risk-of-going-dark/&#34;&gt;unnecessary&lt;/a&gt; and &lt;a href=&#34;https://www.globalencryption.org/2020/11/breaking-encryption-myths/&#34;&gt;dangerous&lt;/a&gt; this would be. And this is without accounting for all the countries where encryption is &lt;em&gt;already&lt;/em&gt; &lt;a href=&#34;https://www.gp-digital.org/world-map-of-encryption/&#34;&gt;severely restricted&lt;/a&gt;, such as Russia, China, India, Iran, Egypt, Cuba, and others.&lt;/p&gt;&lt;p&gt;Whether breaking encryption is brought up naively by misinformed authorities, or as a disguised excuse for mass surveillance is up for debate.&lt;/p&gt;&lt;p&gt;Nevertheless, the result is the same: An attempt to destroy &lt;strong&gt;a tool we all need to stay safe&lt;/strong&gt;.&lt;/p&gt;&lt;h2 id=&#34;encryption-is-a-protective-shield&#34;&gt;Encryption is a protective shield&lt;/h2&gt;&lt;p&gt;Encryption, moreover end-to-end encryption, is a tool we all use in our digital life to stay safe.&lt;/p&gt;&lt;p&gt;In today&#39;s world, the boundary between online and offline life is largely dissolved. Almost everything we do &#34;offline&#34; has a record of it &#34;online&#34;. Online life is regular life now. It&#39;s not just your browsing history.&lt;/p&gt;&lt;p&gt;Your medical record from a visit at the clinic, your purchase transaction from a trip to the store, your travel photos saved in the cloud, your text conversations with your friends, family, and children, are all likely protected with encryption, perhaps even with &lt;em&gt;end-to-end&lt;/em&gt; encryption.&lt;/p&gt;&lt;p&gt;Such a large trove of personal data needs to be protected against eavesdropping and malicious attacks for everyone to stay safe.&lt;/p&gt;&lt;p&gt;Encryption offers this protection. End-to-end encryption all the more.&lt;/p&gt;&lt;h2 id=&#34;what-is-end-to-end-encryption-and-what-is-the-war-against-it&#34;&gt;What is end-to-end encryption, and what is the war against it&lt;/h2&gt;&lt;p&gt;End-to-end encryption is a type of encryption where only the intended recipient(s) have the ability to decrypt (read) the encrypted data.&lt;/p&gt;&lt;p&gt;This means that if you send a message through &lt;a href=&#34;https://signal.org/&#34;&gt;Signal&lt;/a&gt; for example, only the participants to this conversation will be able to read the content of this conversation. Even Signal cannot know what is being discussed on Signal.&lt;/p&gt;&lt;p&gt;This greatly annoys some over-controlling authorities who would like to be granted unlimited power to spy on anyone anytime they wish, for vaguely defined purposes that could change at any moment.&lt;/p&gt;&lt;p&gt;End-to-end encryption can also mean a situation where you are &#34;both ends&#34; of the communication.&lt;/p&gt;&lt;p&gt;For example, when enabling Apple&#39;s &lt;a href=&#34;https://support.apple.com/en-ca/guide/security/sec973254c5f/web&#34;&gt;Advanced Data Protection for iCloud&lt;/a&gt; (ADP), it activates end-to-end encryption protection for almost all of iCloud data, including photos. This means that even Apple could not see your photos, or be forced to share your photos with a governmental entity.&lt;/p&gt;&lt;p&gt;Without ADP, Apple can read or share your photos (or other data) if they are legally compelled to, or if they feel like it. The same is true for Google&#39;s services, Microsoft&#39;s services, and any other online services that aren&#39;t end-to-end encrypted.&lt;/p&gt;&lt;p&gt;This is at the root of the latest attack on encryption:&lt;/p&gt;&lt;p&gt;In February this year, it was reported that &lt;a href=&#34;../../../02/28/uk-forced-apple-to-remove-adp/&#34;&gt;Apple was served with a notice&lt;/a&gt; from the UK&#39;s Home Office to force it to break ADP&#39;s end-to-end encryption. In response, Apple removed access to ADP from the UK entirely, making this protection unavailable to UK residents.&lt;/p&gt;&lt;p&gt;Do not mistakenly think this attack is limited to the UK and Apple users, however. If this regulation notice or a similar one gets enforced, it would &lt;strong&gt;impact the whole world.&lt;/strong&gt; Other countries would likely soon follow, and other services would likely soon get under attack as well.&lt;/p&gt;&lt;p&gt;Moreover, do not feel unaffected just because you use end-to-end encryption with &lt;a href=&#34;https://www-svt-se.translate.goog/nyheter/inrikes/signal-lamnar-sverige-om-regeringens-forslag-pa-datalagring-klubbas?_x_tr_sl=auto&amp;amp;_x_tr_tl=en&amp;amp;_x_tr_hl=en-US&amp;amp;_x_tr_pto=wapp&#34;&gt;Signal&lt;/a&gt; or &lt;a href=&#34;https://www.techradar.com/vpn/vpn-privacy-security/secure-encryption-and-online-anonymity-are-now-at-risk-in-switzerland-heres-what-you-need-to-know&#34;&gt;Proton&lt;/a&gt; services instead of Apple, they are both &lt;strong&gt;under attack&lt;/strong&gt; as well in this war.&lt;/p&gt;&lt;p&gt;Just in recent years, the war against encryption has affected the &lt;a href=&#34;https://www.eff.org/deeplinks/2023/04/earn-it-bill-back-again-seeking-scan-our-messages-and-photos&#34;&gt;US&lt;/a&gt;, the &lt;a href=&#34;https://www.bbc.co.uk/news/articles/cgj54eq4vejo&#34;&gt;UK&lt;/a&gt;, &lt;a href=&#34;https://www.globalencryption.org/2025/04/joint-letter-on-swedish-data-storage-and-access-to-electronic-information-legislation/&#34;&gt;Sweden&lt;/a&gt;, &lt;a href=&#34;https://www.laquadrature.net/en/warondrugslaw/&#34;&gt;France&lt;/a&gt;, &lt;a href=&#34;https://www.theverge.com/2020/10/12/21513212/backdoor-encryption-access-us-canada-australia-new-zealand-uk-india-japan&#34;&gt;Australia, New Zealand, Canada, India, Japan&lt;/a&gt;, and all the European Union countries with proposals such as &lt;a href=&#34;../../../02/03/the-future-of-privacy/#chat-control-wants-to-break-end-to-end-encryption&#34;&gt;Chat Control&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;the-arguments-given-to-break-encryption-make-no-sense&#34;&gt;The arguments given to break encryption make no sense&lt;/h2&gt;&lt;p&gt;Authoritarian entities generally use the same populist excuses to justify their senseless demands. &#34;Protecting the children&#34; is always a fashionable disingenuous argument.&lt;/p&gt;&lt;p&gt;Because no one would disagree that protecting the children is important, it is often used as an attempt to deceitfully make an irrefutable argument to justify breaking encryption.&lt;/p&gt;&lt;p&gt;The problem is, &lt;strong&gt;breaking encryption doesn&#39;t protect the children&lt;/strong&gt;, it &lt;a href=&#34;https://www.theguardian.com/technology/2022/jan/21/end-to-end-encryption-protects-children-says-uk-information-watchdog&#34;&gt;endangers&lt;/a&gt; them.&lt;/p&gt;&lt;p&gt;When law enforcement officials claim they need to be able to read everyone&#39;s messages and see everyone&#39;s personal photos to be able to fight child predators, they seem to neglect that:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;This means they will expose the children&#39;s messages, contact information, locations, and photos in the process, potentially &lt;em&gt;endangering the children further&lt;/em&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Exposing everyone&#39;s data will make this data much more likely to be found and exploited by criminals, making &lt;em&gt;everyone&lt;/em&gt; more vulnerable to attacks.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Predators will simply move to underground channels, &lt;a href=&#34;https://www.schneier.com/blog/archives/2015/07/back_doors_wont.html&#34;&gt;unbothered&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;They use the same kind of deceptive argument trying to justify weakening the protections we have to supposedly catch &#34;criminals&#34; and &#34;terrorists&#34;.&lt;/p&gt;&lt;p&gt;Of course the exact definition of what is a &#34;criminal&#34; or a &#34;terrorist&#34; is always vague and subject to change. In the past, human rights activists and authoritarian regime dissidents have been labeled as such, climate change activists as well, LGBTQ+ people even in some countries. Maybe next year this label will include &#34;DEI advocates&#34;, who knows where they draw the line and what can be considered a &#34;criminal&#34; worth spying on.&lt;/p&gt;&lt;p&gt;You &lt;em&gt;cannot&lt;/em&gt; remove everyone&#39;s right to privacy and protection from harm while pretending it is to protect them. No one who is well-informed and well-intended could possibly consider this a smart thing to do.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;An attack on end-to-end encryption isn&#39;t an attack on criminals, it&#39;s an attack on all of us.&lt;/strong&gt;&lt;/p&gt;&lt;h2 id=&#34;magical-backdoor-only-for-the-good-guys-is-a-complete-fantasy&#34;&gt;Magical backdoor only for &#34;the good guys&#34; is a complete fantasy&lt;/h2&gt;&lt;p&gt;Let&#39;s say the strategy is akin to creating a MagicalKey that unlocks every door (a magical key because thinking encryption backdoors would only be used by &#34;the good guys&#34; is a great example of &lt;a href=&#34;https://www.britannica.com/science/magical-thinking&#34;&gt;magical thinking&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;Imagine, for the sake of this exercise, the MagicalLock for this MagicalKey is impossible to pick, and imagine only police officers have MagicalKeys. Let&#39;s say one thousand police officers each have a MagicalKey.&lt;/p&gt;&lt;p&gt;They argue they need to be able to unlock anyone&#39;s door if they suspect a crime is happening inside. &#34;It&#39;s for safety!&#34;&lt;/p&gt;&lt;p&gt;Overtime, let&#39;s say only 1% of the police officers accidentally lose their MagicalKey. This kind of things happen. Now 10 MagicalKeys are lost in the wild and could be used by anyone else, for any purposes, including crime.&lt;/p&gt;&lt;p&gt;Then, let&#39;s say only 0.1% of police officers get corrupted by a crime gang. That&#39;s just one right? This corrupted &#34;good guy&#34; lets the gang create a double of the MagicalKey. Which crime gang wouldn&#39;t want a key that can magically open any door? They pay the police officer good money for this. It&#39;s an investment.&lt;/p&gt;&lt;p&gt;Now, the gang creates doubles of the MagicalKey they have. They obfuscate its serial number, so it cannot be traced back to them. They use it subtly at first to avoid detection. They make sure they never leave traces behind, so victims have no idea their door got unlocked.&lt;/p&gt;&lt;p&gt;During this time, they steal your data, they sell it, they use it to impersonate you, they use it to harm you and your loved ones.&lt;/p&gt;&lt;p&gt;Then, another criminal figures out on their own how to emulate a MagicalKey without even having access to one. The criminal creates a reproducible mold for this Emulated-MagicalKey and sells it to other criminals on the criminal market. Now, the MagicalKey™️ is available to any criminals looking for it. Restrictions on the backdoor are off. &lt;strong&gt;Your personal data is up for grabs.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This is what is going to happen if backdoors are implemented in end-to-end encryption. But don&#39;t worry they say, &#34;it&#39;s only for the good guys!&#34;.&lt;/p&gt;&lt;p&gt;At least, the criminals&#39; data will also be up for grabs, right?&lt;/p&gt;&lt;p&gt;Nope! The criminals knew about this, so they just started using different channels that weren&#39;t impacted. Criminals will have their privacy intact, they don&#39;t care about using illegal tools, but &lt;strong&gt;your legal privacy protections will be gone&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Backdoored&lt;/em&gt; end-to-end encryption isn&#39;t end-to-end anymore, it&#39;s just open-ended encryption. This offers pretty much no protection at all.&lt;/p&gt;&lt;h2 id=&#34;ignoring-experts-doesnt-make-facts-disappear&#34;&gt;Ignoring experts doesn&#39;t make facts disappear&lt;/h2&gt;&lt;p&gt;Where is the opposition to this? Where are the experts pushing against this nightmare? Everywhere.&lt;/p&gt;&lt;p&gt;Thankfully, opposition has been strong, despite the relentless ignorance or malevolence from authoritarian authorities repeatedly pushing against encryption.&lt;/p&gt;&lt;p&gt;Many people and groups have been fighting valiantly to defend our collective right to privacy and security. Countless experts have patiently taken the time to explain &lt;a href=&#34;https://signal.org/blog/uk-online-safety-bill/&#34;&gt;again&lt;/a&gt; and &lt;a href=&#34;https://www.globalencryption.org/2020/10/cdt-gpd-and-internet-society-reject-time-worn-argument-for-encryption-backdoors/&#34;&gt;again&lt;/a&gt; and &lt;a href=&#34;https://www.schneier.com/wp-content/uploads/2016/09/paper-keys-under-doormats-CSAIL.pdf&#34;&gt;again&lt;/a&gt; how an encryption backdoor only for &#34;the good guys&#34; is simply impossible.&lt;/p&gt;&lt;p&gt;Weakening encryption to let &#34;the good guys&#34; enter, lets &lt;em&gt;anyone&lt;/em&gt; enter, including criminals. There is no way around this.&lt;/p&gt;&lt;p&gt;Seemingly ignoring warnings and advice from the most respected specialists in the field, authoritarian officials continue to push against encryption. So much so that it has become difficult to assume good intent misguided by ignorance at this point.&lt;/p&gt;&lt;p&gt;Unfortunately, ignoring the experts or silencing the debate will not make the facts magically disappear.&lt;/p&gt;&lt;p&gt;In an encouraging development this week, Apple &lt;a href=&#34;https://www.bbc.co.uk/news/articles/cvgn1lz3v4no&#34;&gt;won a case&lt;/a&gt; fighting an attempt from the UK Home Office to hide from the public details of their latest attack on encryption.&lt;/p&gt;&lt;p&gt;This battle and all battles to protect our privacy rights, &lt;em&gt;must&lt;/em&gt; be fought is broad daylight, for all to see and to support.&lt;/p&gt;&lt;h2 id=&#34;fight-for-encryption-rights-everywhere-you-can&#34;&gt;Fight for encryption rights everywhere you can&lt;/h2&gt;&lt;p&gt;The war against encryption isn&#39;t anything new, it has been happening for decades. However, the quantity of data, personal and sensitive data, that is collected, stored, and shared about us is much larger today. It is essential we use the proper tools to secure this information.&lt;/p&gt;&lt;p&gt;This is what have changed, and what is making encryption and end-to-end encryption even more indispensable today.&lt;/p&gt;&lt;p&gt;Mass surveillance will not keep us safe, it will endanger us further and damage our democracies and freedoms in irreparable ways.&lt;/p&gt;&lt;p&gt;We must fight to keep our right to privacy, and use of strong end-to-end encryption to protect ourselves, our friends, our family, and yes also to protect the children.&lt;/p&gt;&lt;h3 id=&#34;how-can-you-support-the-right-to-encryption&#34;&gt;How can you support the right to encryption?&lt;/h3&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Use end-to-end encryption everywhere you can.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Talk about the benefits of end-to-end encryption to everyone around you, especially your loved ones less knowledgeable about technology. Talk about how it is essential to protect everyone&#39;s data, including the children&#39;s.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Use social media to promote the benefits of end-to-end encryption and post about how it protects us all.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Write or call your government representatives to let them know you care about end-to-end encryption and are worried about dangerous backdoors or chat control proposals.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Support organizations fighting for encryption, such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.globalencryption.org/&#34;&gt;Global Encryption Coalition&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.openrightsgroup.org/campaign/save-encryption/&#34;&gt;Open Rights Group&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.makedmssafe.com/&#34;&gt;Fight For The Future&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://signal.org/donate/&#34;&gt;Signal app&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.internetsociety.org/open-letters/fix-the-take-it-down-act-to-protect-encryption/&#34;&gt;Internet Society&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.eff.org/issues/end-end-encryption&#34;&gt;Electronic Frontier Foundation&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/en/about/donate/&#34;&gt;Privacy Guides&lt;/a&gt; 💛&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Finally, have a look at our &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;recommendations&lt;/a&gt; if you want to start using more tools protecting your privacy using end-to-end encryption.&lt;/p&gt;&lt;p&gt;This is a long war, but the importance of it doesn&#39;t allow us to give up.&lt;/p&gt;&lt;p&gt;We must continue fighting for the right to protect our data with end-to-end encryption, &lt;strong&gt;we owe it to ourselves, our loved ones, and the future generations.&lt;/strong&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/04/11/encryption-is-not-a-crime/</link> <pubDate>Fri, 11 Apr 2025 15:58:03 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/04/11/encryption-is-not-a-crime/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/04/11/encryption-is-not-a-crime.png" type="image/png" length="None" /> </item> <item> <title>The Dangers of End-to-End Encryption</title> <author>Anita Key</author> <category>April Fools</category> <category>Opinion</category> <description>&lt;h1 id=&#34;the-dangers-of-end-to-end-encryption&#34;&gt;The Dangers of End-to-End Encryption&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;An image showing a burning car&#34; src=&#34;../../../../assets/images/the-dangers-of-end-to-end-encryption/cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Flavio / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;In the digital age, nothing is more important than convenience and easy access to data. Unfortunately, there has been an alarming trend among technologists to implement &lt;strong&gt;End-to-End Encryption&lt;/strong&gt; (&lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;) in their applications, to the detriment of all the important work being done by countless organizations, including the best and brightest intelligence agencies and big tech companies.&lt;!-- more --&gt;&lt;/p&gt;&lt;div class=&#34;admonition tip inline&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;April Fools!&lt;/p&gt;&lt;p&gt;This article was published on April 1st, 2025.&lt;/p&gt;&lt;p&gt;Privacy Guides supports strong encryption as a cornerstone of digital security and personal freedom. End-to-end encryption ensures that &lt;strong&gt;your&lt;/strong&gt; communications remain &lt;strong&gt;yours&lt;/strong&gt;, which is a principle worth preserving.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Security-focused developers and misguided &#34;advocates&#34; have long attempted to convince those involved in privacy and security that &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; is an advanced security measure designed to protect your sensitive data, and &lt;em&gt;Privacy Guides&lt;/em&gt; has stood by for far too long not setting the record straight.&lt;/p&gt;&lt;p&gt;In this article, we are going to explore how these &#34;protections&#34; actually endanger you and pose critical threats to society at large. Threats that are so grave that numerous government agencies around the world insist that we immediately limit or eliminate &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; entirely, before our world as we know it falls apart.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Privacy Guides&lt;/em&gt; is acutely aware of these serious concerns, and believes privacy should always be a conditional right, used &lt;em&gt;responsibly&lt;/em&gt;.&lt;/p&gt;&lt;h2 id=&#34;e2ee-hampers-legitimate-government-surveillance&#34;&gt;&lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; hampers &lt;em&gt;legitimate&lt;/em&gt; government surveillance&lt;/h2&gt;&lt;p&gt;Every day, intelligence agencies carry out perfectly legitimate surveillance activities against both their own citizens and foreigners. There is no question that these agencies are crucial to the upkeep of our national security, and it is our moral obligation to assist them in these warrantless activities, whether we know it or not.&lt;/p&gt;&lt;p&gt;When services like &lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/&#34;&gt;Signal&lt;/a&gt; or &lt;a href=&#34;https://www.privacyguides.org/en/email/&#34;&gt;Tuta&lt;/a&gt; keep all of their users messages locked in an impenetrable vault, how are they supposed to keep tabs on potential criminals using their services?&lt;/p&gt;&lt;p&gt;The reality is that if the government is not allowed to read &lt;em&gt;every&lt;/em&gt; message being sent, they might never encounter the &lt;em&gt;one&lt;/em&gt; that actually warrants suspicion.&lt;/p&gt;&lt;p&gt;It&#39;s true that end-to-end encryption also protects the lives of journalists, whistleblowers, and human-rights activists from those few governments which are &lt;em&gt;actually&lt;/em&gt; oppressive, but these edge-cases should not be used as an excuse to hinder legitimate governments like in the US or the UK.&lt;/p&gt;&lt;h2 id=&#34;e2ee-encourages-crime&#34;&gt;&lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; encourages crime&lt;/h2&gt;&lt;p&gt;With end-to-end encryption, criminals are granted a free pass for unlimited criminal activity. &lt;em&gt;Nobody&lt;/em&gt; can read their messages besides them! Shocking, isn&#39;t it?&lt;/p&gt;&lt;p&gt;If platforms simply removed all forms of encryption from their services, we could solve cybercrime, illegal drug dealing, dangerous hacking attempts, child exploitation, and terrorism overnight... right?&lt;/p&gt;&lt;p&gt;There is plenty of historical precedent here. Platforms like Snapchat which &lt;em&gt;don&#39;t&lt;/em&gt; utilize end-to-end encryption have bravely been &lt;a href=&#34;https://www.bbc.com/news/world-europe-68099669&#34;&gt;involved in noble arrests&lt;/a&gt;, stopping criminals in their tracks before they had a chance to act.&lt;/p&gt;&lt;p&gt;Users of these platforms who aren&#39;t criminals do benefit a bit from end-to-end encryption. It protects them from identity theft, surveillance, and data breaches every day. With any sort of trade-off like this, this is certainly a factor to consider. We believe it is very clear that giving up minor protections like this is a small price to pay to potentially intercept the next dangerous joke in a group text.&lt;/p&gt;&lt;h2 id=&#34;it-prevents-helpful-backdoors&#34;&gt;It prevents &lt;em&gt;helpful&lt;/em&gt; backdoors&lt;/h2&gt;&lt;p&gt;Many tech companies have tried to &lt;a href=&#34;https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life&#34;&gt;introduce backdoors into their end-to-end encrypted platforms&lt;/a&gt;, only to be lambasted by the legion of completely unreasonable &#34;privacy advocates&#34; out there. Our stance on privacy is far more principled, and we believe there is a middle-ground to be found in the laws of mathematics.&lt;/p&gt;&lt;p&gt;The solution proposed by companies like Apple and agencies like the FBI is a sound one. They will protect your messages, &lt;em&gt;unless&lt;/em&gt; they encounter something suspicious. At that point, keys to decrypt your data will be given &lt;strong&gt;only to the good guys&lt;/strong&gt;, so that they can enforce the law.&lt;/p&gt;&lt;p&gt;This approach makes a lot of sense. By carefully controlling access to these skeleton keys, it&#39;s trivial for companies to make sure they only fall into the right hands. The notion that they might be leaked, or that someone with enough resources could replicate that access, is so far into slippery slope territory that it borders on nonsense. Let&#39;s stick with what we know about the security capabilities of these companies today, instead of imagining ridiculous scenarios where they are breached.&lt;/p&gt;&lt;h2 id=&#34;it-harms-innovation&#34;&gt;It harms innovation&lt;/h2&gt;&lt;p&gt;Think about all the services you use online every day. The companies behind those services &lt;em&gt;rely&lt;/em&gt; on collecting as much of your personal data as possible in order to constantly produce exciting new innovations. Without mass data collection, how would you get personalized ads for weeks about different new sneakers, because you bought that pair on Amazon yesterday? How else would companies emulate the real-life experience of constantly being hounded by a salesperson in a store selling you the exact thing you desperately need?&lt;/p&gt;&lt;p&gt;&lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; prevents companies from truly knowing their users, stifling these massive advances in advanced user profiling!&lt;/p&gt;&lt;p&gt;Big tech companies monetizing your personal data in ways that you don&#39;t need to understand nor consent to is what makes the internet such a magical place. If your private chats are protected with &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;, companies won&#39;t be able to serve you the moment you even &lt;em&gt;think&lt;/em&gt; about a new lawnmower. What do you think about that?&lt;/p&gt;&lt;h2 id=&#34;its-challenging-for-developers&#34;&gt;It&#39;s challenging for developers&lt;/h2&gt;&lt;p&gt;Another way &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; slows down innovation even in the digital security realm is its complexity. Implementing robust cryptographic libraries and user-friendly key management systems is complicated, and software development is supposed to be a piece of cake.&lt;/p&gt;&lt;p&gt;The problem of digital security has already been solved: simply store that information in a database and protect that database from anyone who isn&#39;t approved to see it. Protections beyond this tend to be complexity for the sake of complexity. If we did away with the countless developer hours wasted on protection nobody &lt;em&gt;really&lt;/em&gt; needs, we&#39;d have more time to add longer animations and innovative features like infinite scrolling to keep users happily using their apps for hours on end.&lt;/p&gt;&lt;h2 id=&#34;e2ee-is-a-slippery-slope&#34;&gt;&lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; is a slippery slope!&lt;/h2&gt;&lt;p&gt;Constantly pushing &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; sets up consumers with a wildly unreasonable expectation, that privacy should be the default. If people got comfortable communicating without tech companies and governments constantly peeking over their shoulder, it&#39;s impossible to imagine what they might start thinking next. Maybe they&#39;d start to believe personal liberty is a right, instead of a &lt;em&gt;privilege&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;End-to-end encryption is an insidious technology that has crept its way into some of the best instant messengers, &lt;a href=&#34;https://www.privacyguides.org/en/cloud/&#34;&gt;cloud storage providers&lt;/a&gt;, and other apps. It stands in the way of law enforcement, government security agencies, data-collecting corporations, and anyone else who might need to peek into your personal life.&lt;/p&gt;&lt;p&gt;It&#39;s time we took a stand against this technology and demand a true solution from our governments: &lt;strong&gt;Sensible&lt;/strong&gt; regulations that allow for &lt;em&gt;partial&lt;/em&gt; protections while keeping the option for these entities to decrypt it when necessary intact. The sense of security is all that truly matters to most people anyway.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.privacyguides.org/en/basics/why-privacy-matters/&#34;&gt;Who needs &lt;em&gt;complete&lt;/em&gt; privacy&lt;/a&gt; when you can have a half-baked version easily circumvented by the good guys? What is privacy in the first place, if not a convenient cover for wrongdoing? If we can&#39;t read all messages (just in case), how are we expected to keep society safe?&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;This article was published on April Fools&#39; Day. If you&#39;ve made it to the end, and you haven&#39;t noticed how we buried the real benefits of end-to-end encryption in our hyperbolic worst-case scenarios, well... surprise! 😄&lt;/p&gt;&lt;p&gt;Privacy Guides supports strong encryption as a cornerstone of digital security and personal freedom. End-to-end encryption ensures that &lt;strong&gt;your&lt;/strong&gt; communications remain &lt;strong&gt;yours&lt;/strong&gt;, which is a principle worth preserving.&lt;/p&gt;&lt;p&gt;If the &#34;dangers&#34; of &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; upset you, maybe it is time to reflect on how crucial privacy is to everyone: You, me, whistleblowers, activists, and everyday people who just want to live their lives. Happy April 1st, and stay secure out there!&lt;/p&gt;&lt;p&gt;&lt;em&gt;Written by: Jonah Aragon&lt;/em&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/04/01/the-dangers-of-end-to-end-encryption/</link> <pubDate>Fri, 11 Apr 2025 15:58:03 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/04/01/the-dangers-of-end-to-end-encryption/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/04/01/the-dangers-of-end-to-end-encryption.png" type="image/png" length="None" /> </item> <item> <title>Interview with Micah Lee: Cyd, Lockdown Systems, OnionShare, and more</title> <author>Em</author> <category>News</category> <description>&lt;h1 id=&#34;interview-with-micah-lee-cyd-lockdown-systems-onionshare-and-more&#34;&gt;Interview with Micah Lee: Cyd, Lockdown Systems, OnionShare, and more&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Photo of Micah Lee over a yellow and purple graphic background, and with the name Micah Lee written on the right.&#34; src=&#34;../../../../assets/images/interview-with-micah-lee/micah-lee-cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Micah Lee&lt;/small&gt;&lt;/p&gt;&lt;p&gt;If you don&#39;t know who Micah Lee is yet, here&#39;s why you should: Micah is an information security engineer, a software engineer, a journalist, and an author who has built an impressive career developing software for the public good, and working with some of the most respected digital rights organizations in the United States.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;If you have been following software development related to data privacy and security for a while, you probably already know one of Micah&#39;s projects such as &lt;a href=&#34;https://onionshare.org/&#34;&gt;OnionShare&lt;/a&gt;, &lt;a href=&#34;https://dangerzone.rocks/&#34;&gt;Dangerzone&lt;/a&gt;, the &lt;a href=&#34;https://github.com/torproject/torbrowser-launcher&#34;&gt;Tor Browser Launcher&lt;/a&gt;, and more recently &lt;a href=&#34;https://cyd.social/&#34;&gt;Cyd&lt;/a&gt; (a rebirth of Semiphemeral). Additionally, he is also a core contributor to the &lt;a href=&#34;https://www.torproject.org/&#34;&gt;Tor Project&lt;/a&gt; and a contributor to &lt;a href=&#34;https://hushline.app/&#34;&gt;Hush Line&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Besides software development, Micah is a board member for &lt;a href=&#34;https://scidsg.org/&#34;&gt;Science &amp;amp; Design&lt;/a&gt; and &lt;a href=&#34;https://ddosecrets.com/&#34;&gt;Distributed Denial of Secrets&lt;/a&gt;, a former board member and cofounder of &lt;a href=&#34;https://freedom.press&#34;&gt;Freedom of the Press Foundation&lt;/a&gt;, and has been a Staff Technologist for the &lt;a href=&#34;https://www.eff.org/&#34;&gt;Electronic Frontier Foundation&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;You might have already read some of Micah&#39;s articles when he worked at &lt;a href=&#34;https://theintercept.com/staff/micah-lee/&#34;&gt;The Intercept&lt;/a&gt;, or even read his new &lt;a href=&#34;https://hacksandleaks.com/&#34;&gt;book&lt;/a&gt; Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data.&lt;/p&gt;&lt;p&gt;We spoke with Micah over email and are delighted that he decided to talk with us at Privacy Guides. Let&#39;s get into it!&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;Hi Micah! We&#39;re thrilled that you have accepted to give us this interview at Privacy Guides. Thank you for taking time off your busy schedule to talk with us.&lt;/em&gt;&lt;/p&gt;&lt;h2 id=&#34;cyd-the-app-to-claw-back-your-data-from-big-tech&#34;&gt;Cyd: The app to claw back your data from Big Tech&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;Let&#39;s start with your newest project. &lt;a href=&#34;https://cyd.social&#34;&gt;Cyd&lt;/a&gt; is an application you have created in 2024 to help people backing up and deleting their tweets on X-(Twitter). This app emerged from the ashes of &lt;a href=&#34;https://micahflee.com/2024/07/like-a-phoenix-semiphemeral-will-rise-from-the-ashes/&#34;&gt;Semiphemeral&lt;/a&gt;, a great tool that was unfortunately rendered unusable when Twitter decided to &lt;a href=&#34;https://mashable.com/article/twitter-ending-free-api-tier-elon-musk-worst-decision&#34;&gt;shut off its API&lt;/a&gt;. I personally loved Semiphemeral and used it to delete thousands of my tweets before eventually deleting my whole Twitter account later on. Can you tell us more about how Cyd works despite not using X&#39;s API?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;APIs make it way simpler for programmers to interact with online services, but they&#39;re not the only way. As long as social media platforms like X still run websites, and it&#39;s still possible for you, the human, to manually scroll through your tweets and delete them, it&#39;s possible to write a program that can do this for you.&lt;/p&gt;&lt;p&gt;This is basically how Cyd works. It&#39;s a desktop app that includes an embedded web browser. When you add an X account to it, you login to your account in the browser, and then Cyd takes over. You can tell it that you want to delete your tweets, or likes, or bookmarks, or unfollow everyone, or save a backup of your DMs, or plenty of other things, and it does this by automating the embedded browser on your behalf. No API required.&lt;/p&gt;&lt;p&gt;Cyd uses open APIs when they&#39;re available and make sense. For example, if you want to quit X but you don&#39;t want your old tweets to disappear forever, Cyd can migrate them to Bluesky using Bluesky&#39;s API -- soon we&#39;ll add support for migrating to Mastodon too. But for closed platforms that suck (like X, and Facebook too, which we&#39;re adding support for right now), we&#39;re forced to do it the hard way.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;Talking about openness, recently this year you have decided to &lt;a href=&#34;https://infosec.exchange/@micahflee/113885066507235250&#34;&gt;make Cyd open source&lt;/a&gt;. This is fantastic news! What did you take into consideration before making this decision and what kind of &lt;a href=&#34;https://github.com/lockdown-systems/cyd&#34;&gt;contributions&lt;/a&gt; or feedback are you hoping to receive from the community?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;I&#39;m extremely happy that Cyd is now open source. I&#39;ve open-sourced most code that I&#39;ve ever written, so it honestly felt kind of weird starting out making Cyd proprietary.&lt;/p&gt;&lt;p&gt;My biggest concern with making it open was that I want Cyd to be a sustainable business, where some of the features are free and some of the features are premium and cost money -- enough so that me, and eventually other people working on it, could get paid a decent wage. And as an open source app, it would be easy for someone to &lt;abbr title=&#34;A new software project created by copying an existing project and adding to it independently&#34;&gt;fork&lt;/abbr&gt; it and remove the bits of code that check if you&#39;ve paid for premium access.&lt;/p&gt;&lt;p&gt;But after talking it through with some other people who are very experienced open source devs, I decided that this isn&#39;t that big of a deal, and that the benefits of being open source far outweigh the costs.&lt;/p&gt;&lt;p&gt;Now when you use Cyd, you can now &lt;em&gt;confirm&lt;/em&gt; that it doesn&#39;t have access to your social media accounts or any of the data in it. Having an open issue tracker on GitHub is great too, because people in the community can open issues, post comments, and track the progress of features they&#39;re looking forward to. Also being open source means we have the ability to accept grants and donations, in addition to selling premium accounts. You can check out our Open Collective page at &lt;a href=&#34;https://opencollective.com/lockdown-systems&#34;&gt;https://opencollective.com/lockdown-systems&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;I&#39;m hoping that members of the community will discuss features we&#39;re making, or even contribute code directly to our project. Right now, Cyd is only available in English, but we&#39;re also hoping to translate it into many different languages going forward, so I&#39;m hoping that people will eventually chip in it to help translate Cyd to their native languages.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;Having access to Cyd in multiple languages would really be wonderful. Likewise for multiple social media, when additional ones will be added later on. But at the moment, Cyd definitely seems to be &lt;a href=&#34;https://cyd.social/want-to-quit-x-in-2025-heres-how-to-do-it-the-right-way-with-cyd/&#34;&gt;focusing&lt;/a&gt; on X. You have personally been on the receiving end of Elon Musk&#39;s vengeful whims before when your Twitter account got &lt;a href=&#34;https://micahflee.com/2023/05/elon-banned-me-from-twitter-for-doing-journalism-good-riddance/&#34;&gt;banned&lt;/a&gt; in 2022 for criticizing him. I would say this qualifies as a badge of honor. Do you think you could still be on his radar with Cyd focusing on &lt;a href=&#34;https://cyd.social/delete-all-your-tweets-for-free-with-cyd/&#34;&gt;data deletion for X&lt;/a&gt; even though X has shut off its API? Have you taken any specific measures about this?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;I think it&#39;s actually more likely that I&#39;ll be on Elon Musk&#39;s radar because of my &lt;a href=&#34;https://www.youtube.com/live/APHo7bea_p4?si=stSrkmo1MWy5_iVX&amp;amp;t=3338&#34;&gt;recent work&lt;/a&gt; with the Tesla Takedown movement than with Cyd... Right now, Musk is spending all of his time purging the US government of critics and consolidating executive power under Trump. So maybe he&#39;s too distracted on his fascism project to care about what we&#39;re doing with deleting tweets?&lt;/p&gt;&lt;p&gt;But that said, Musk is litigious and we&#39;re definitely concerned about legal threats. We&#39;ve consulted lawyers and we&#39;re trying to be as safe as possible.&lt;/p&gt;&lt;h2 id=&#34;lockdown-systems-the-new-organization-developing-cyd&#34;&gt;Lockdown Systems: The new organization developing Cyd&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;Cyd is a project of &lt;a href=&#34;https://lockdown.systems&#34;&gt;Lockdown Systems&lt;/a&gt;, a new organization you have created with colleagues just a few months ago. Can you tell us more about the structure of this organization and who else is involved?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;We&#39;re still finalizing the paperwork, but Lockdown Systems is a new worker-owned collective! At the moment there are five of us:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;me&lt;/li&gt;&lt;li&gt;Jen, a former SecureDrop engineer who was the technical editor of my book and, for several years, my Dungeons &amp;amp; Dragons dungeon master&lt;/li&gt;&lt;li&gt;Saptak, a talented human-rights-focused open source developer who I work with on OnionShare&lt;/li&gt;&lt;li&gt;Yael, an investigative journalist friend who, among other things, broke a story with me about how Zoom had lied about supporting end-to-end encryption just as everyone started using it during the pandemic&lt;/li&gt;&lt;li&gt;Akil, a talented newsroom engineer I worked closely with at The Intercept&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Most companies are owned by investors who only care about profit. They don&#39;t care about the workers, and they definitely don&#39;t care about the end-users of the software they make. This is why it&#39;s so common for tech companies to end up spying on their users and selling that data: it&#39;s an additional way to make a profit for their investors.&lt;/p&gt;&lt;p&gt;We&#39;re different. Lockdown Systems is owned by its workers, and we don&#39;t have outside investors. We have all agreed to the explicit goals of: ensuring the well-being of our members; making tools that help fight fascism and authoritarianism; and prioritizing impact over profit.&lt;/p&gt;&lt;p&gt;We make decisions by coming to consensus, and everyone in the collective gets paid the same wage. Even though I started Cyd, I don&#39;t have more say than anyone else.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;That is such a great organizational structure for software development. Lockdown Systems really has an impressive team of skilled and dedicated people. Presently, it seems from the website and &lt;a href=&#34;https://github.com/lockdown-systems&#34;&gt;GitHub page&lt;/a&gt; that Lockdown Systems is focusing on developing and growing Cyd only. Are you planning on using Lockdown Systems mainly for Cyd or are you envisaging other applications getting added to Lockdown Systems in the near (or far) future?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;So far, Cyd is our only product. There are many features we plan on building, and we also need to get it the point where it can fund our continued work. Most likely, this will be our main project for the near future.&lt;/p&gt;&lt;p&gt;That said, we&#39;re definitely open to branching out. We make software that directly empowers individuals, helping them reclaim their autonomy and privacy. So if we see an opportunity to build something that will directly help people who are facing fascist threats -- whether it&#39;s supporting abortion access, keeping immigrants safe, helping communities organize mutual aid, etc. -- we will absolutely do it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;If one day some generous millionaire (let&#39;s keep it at millionaire, we all know what happens at billionaire) decided to give Lockdown Systems a huge budget bump no string attached, how would you like to grow the organization with this money?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;One cool thing about being a member of a collective is that if this happened, the whole collective would brainstorm together and we&#39;d come up with ideas that are far better than what I could come up with alone. But that said, I definitely have some thoughts.&lt;/p&gt;&lt;p&gt;Right now, everyone is working part time, between about 10 and 30 hours a week each. If we had the resources, many of us would work on Cyd full-time, and we&#39;d be able to offer benefits like health care and retirement contributions. We could also increase how many people are part of the collective, and build out new features at a much faster rate.&lt;/p&gt;&lt;p&gt;In my mind, future Cyd will be a single app (possible available on mobile devices, not just desktop) where you can have total control over all of your data that&#39;s currently stored by tech companies (X, Facebook, Instagram, TikTok, LinkedIn, Reddit, Bluesky, Mastodon, Discord, Slack, Telegram, Amazon, Airbnb, Substack, and on and on). You can backup all your data and then have choice over where you want the rest of it: you can delete &lt;em&gt;everything&lt;/em&gt;, or you can choose to keep your online presence that you&#39;re proud of. You can easily cross-post to multiple platforms, and also automatically delete your older posts from the corporate platforms, while keeping them live on the open ones. Or, however else you choose to do it.&lt;/p&gt;&lt;p&gt;If we had a bigger team to pay for more labor, there&#39;s a lot that we could get done.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;In the meantime, I imagine one million $1 donations could also help. If our readers would like to support the development of Lockdown Systems, they can make a &lt;a href=&#34;https://opencollective.com/lockdown-systems&#34;&gt;donation on this page&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&lt;h2 id=&#34;onionshare-the-app-to-share-files-host-websites-and-chat-anonymously-through-tor&#34;&gt;OnionShare: The app to share files, host websites, and chat anonymously through Tor&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;Our community is likely familiar with this great application included in so many security and privacy-focused projects, including &lt;a href=&#34;https://tails.net/&#34;&gt;Tails&lt;/a&gt;, &lt;a href=&#34;https://www.qubes-os.org/&#34;&gt;Qubes &lt;abbr title=&#34;Operating System&#34;&gt;OS&lt;/abbr&gt;&lt;/a&gt;, &lt;a href=&#34;https://www.whonix.org/&#34;&gt;Whonix&lt;/a&gt;, and &lt;a href=&#34;https://parrotsec.org/&#34;&gt;Parrot &lt;abbr title=&#34;Operating System&#34;&gt;OS&lt;/abbr&gt;&lt;/a&gt;. What motivated you to create &lt;a href=&#34;https://onionshare.org&#34;&gt;OnionShare&lt;/a&gt; more than 10 years ago, and what do you think is the best way to use it now?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;I made OnionShare in 2014 while I was helping journalists report on the Snowden documents. The big motivation was a border search: Glenn Greenwald&#39;s partner, David, traveled from Berlin, where he was visiting Laura Poitras, back to his home in Rio de Janeiro. He was carrying an encrypted hard drive, on an assignment for The Guardian. During his layover at Heathrow airport in London, UK authorities detained him and searched him.&lt;/p&gt;&lt;p&gt;None of this was necessary. Using the internet, encryption, and Tor, it&#39;s possible to securely move documents around the world without putting anyone at risk at a border crossing. In fact, I was already doing something similar with journalists I was collaborating with on Snowden stories myself. To send someone secret documents, I&#39;d first encrypt them using &lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt;, and then place them in a folder on my laptop. I&#39;d start up a web server with a simple directory listing for that folder, and then make that web server accessible as a Tor onion service.&lt;/p&gt;&lt;p&gt;While this wasn&#39;t too hard for me, an experienced Linux nerd, to set up, it would be very challenging for most people. I made OnionShare basically as a user-friendly way for anyone to be able to securely share files, peer-to-peer, without needing to first upload them to some third party service like Dropbox.&lt;/p&gt;&lt;p&gt;Today, OnionShare has more features. It&#39;s basically like a graphical interface to do cool things with Tor onion services -- you can send files, but you can also turn your laptop into an anonymous dropbox so people can upload files to you, and you can quickly host onion websites and spin up temporary chatrooms too. And there are Android and iPhone apps!&lt;/p&gt;&lt;p&gt;The last time I used OnionShare myself was last week. On my personal newsletter, I&#39;m writing a &lt;a href=&#34;https://micahflee.com/exploring-the-paramilitary-leaks/&#34;&gt;series of posts&lt;/a&gt; exploring the Paramilitary Leaks, 200 GB of data from the American militia movement, obtained by an infiltrator name John Williams. While working on one of my posts, John used OnionShare to send me some additional documents.&lt;/p&gt;&lt;h2 id=&#34;other-projects-and-thoughts&#34;&gt;Other projects and thoughts&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;You have been a prolific writer as a journalist for &lt;a href=&#34;https://theintercept.com/staff/micah-lee/&#34;&gt;The Intercept&lt;/a&gt;, your own &lt;a href=&#34;https://micahflee.com/&#34;&gt;Blog&lt;/a&gt;, and in January 2024 you &lt;a href=&#34;https://micahflee.com/2023/12/hacks-leaks-and-revelations-the-art-of-analyzing-hacked-and-leaked-data/&#34;&gt;released&lt;/a&gt; a book called Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data. What is this book about, and who is it written for?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;I spent many years reporting on hacked and leaked datasets, starting with the Snowden archive. Since then, I&#39;ve seen the amount of hacked and leaked data grow exponentially. And at the same time, journalists and researchers -- the people who really need to dig through this data and find the good stories -- don&#39;t even know where to start.&lt;/p&gt;&lt;p&gt;So that&#39;s what my book is, an interactive guide to downloading and exploring datasets. It doesn&#39;t require any prior knowledge, but it does get pretty technically, including two chapters teaching Python programming. If you&#39;re following along, near the beginning of the book you&#39;ll encrypt a USB hard drive and then download a copy of BlueLeaks to it -- hundreds of gigabytes of hacked police documents from the middle of the Black Lives Matter uprising in 2020. You&#39;ll use this dataset, along with several others, as examples as you learn how to make sense of data like this.&lt;/p&gt;&lt;p&gt;You should definitely buy the book if you&#39;re interested and you can, but information wants to be free, so I also released the whole book under a Creative Commons license. You can read the whole thing online at &lt;a href=&#34;https://hacksandleaks.com/&#34;&gt;hacksandleaks.com&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;I can see how much of a valuable skill this is to learn for journalists and researchers in this day and age. Even if nothing compares to having a physical paper copy (in my opinion), it&#39;s wonderful that you share your book online for people who, for various reasons, cannot order a copy. You have worked or still work with the Electronic Frontier Foundation, Freedom of the Press Foundation, Science &amp;amp; Design, the Tor Project, and Distributed Denial of Secrets. Your contribution and commitment to digital rights is undeniable. From your experience, what are you envisioning for the future of digital rights activism?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;I don&#39;t have all of the answers, but I do think that it&#39;s important for digital rights activists to meet the moment. Fascist politicians are gaining power around the world. The gap between the ultra rich and everyone else is wider than it&#39;s ever been before. Elon Musk has openly bought the US government, and the Trump-supporting oligarchs control all of our critical tech infrastructure. Climate change deniers and anti-vaxxers are the ones in charge right now, at least in the US. Things are pretty bad.&lt;/p&gt;&lt;p&gt;Whatever we do, we should have the goal of shifting power away from the fascists and billionaires and towards everyone else. We need alternative platforms that are not only open and democratic, but also just as easy to use as the corporate walled gardens. We need digital rights, not to mention digital security, to fully integrate itself into the rest of the mass movements going on now, whether it&#39;s to save the planet from climate change, to protect immigrants getting sent to gulags, or to stop the genocide in Gaza.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;Absolutely, and digital rights advocates and organizations undeniably have a crucial role to play in these movements. Finally, is there anything else you would like to share with us that we haven&#39;t discussed yet?&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Micah:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;If you want to support Lockdown Systems and you work for an organization that might be interested in offering Cyd as a benefit to their employees, check out Cyd for Teams! If we can get organizations on board this will go a long way to making sure we can continue to get paid doing this work: &lt;a href=&#34;https://docs.cyd.social/docs/cyd-for-teams/intro&#34;&gt;https://docs.cyd.social/docs/cyd-for-teams/intro&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Em:&lt;/em&gt;&lt;/strong&gt; &lt;em&gt;Thank you so much Micah for taking the time to answer our questions today! The new projects you are working on are fascinating, and so important in the current landscape. I&#39;m excited for more people to discover Cyd and Lockdown Systems, and will myself be following their evolution and expansion enthusiastically.&lt;/em&gt;&lt;/p&gt;&lt;h2 id=&#34;consider-supporting-micah-lees-projects&#34;&gt;Consider supporting Micah Lee&#39;s projects&lt;/h2&gt;&lt;p&gt;If you would like to follow Micah Lee&#39;s work and support his projects, consider:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://infosec.exchange/@micahflee&#34;&gt;Following Micah Lee on Mastodon&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://micahflee.com/&#34;&gt;Reading Micah Lee&#39;s Blog&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://opencollective.com/lockdown-systems&#34;&gt;Donating to Cyd and Lockdown Systems&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://docs.cyd.social/docs/cyd-for-teams/sign-up&#34;&gt;Signing up for Cyd for Teams&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://hacksandleaks.com/&#34;&gt;Getting a copy of Hacks, Leaks, and Revelations&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://github.com/micahflee&#34;&gt;Contributing to one of Micah Lee&#39;s software&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/articles/2025/03/28/interview-with-micah-lee/</link> <pubDate>Fri, 28 Mar 2025 16:56:55 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/03/28/interview-with-micah-lee/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/03/28/interview-with-micah-lee.png" type="image/png" length="None" /> </item> <item> <title>Privacy Means Safety</title> <author>Em</author> <category>News</category> <description>&lt;h1 id=&#34;privacy-means-safety&#34;&gt;Privacy Means Safety&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Photo of a padlock with &amp;quot;SOS&amp;quot; written on it and a drawn heart instead of an &amp;quot;O&amp;quot; letter. It is locked on a metal fence.&#34; src=&#34;../../../../assets/images/privacy-means-safety/privacy-means-safety-cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Georgy Rudakov / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Privacy is a human right that should be granted to everyone, no matter the reason. That being said, it&#39;s also important to remember that for millions of people around the world, data privacy is crucial for physical safety. For people in extreme situations, privacy can literally mean life or death.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;Many of us have experienced moments when our privacy concerns have been minimized or even completely dismissed.&lt;/p&gt;&lt;p&gt;This general hostility towards data protection is dangerous. Yes, dangerous. &lt;strong&gt;Data privacy isn&#39;t a trivial matter.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;There are many circumstances where inadvertently or maliciously exposed data can put someone in grave danger. Worse, sometimes this danger might not even be known at the time, but might become incredibly important later on.&lt;/p&gt;&lt;p&gt;We should never downplay the serious risk of exposing someone&#39;s data, even if this isn&#39;t a situation we personally experience, or even understand.&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Content Warning: This article contains mention of sexual assault, violence, and death.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;leaked-data-can-have-grave-consequences&#34;&gt;Leaked data can have grave consequences&lt;/h2&gt;&lt;p&gt;This isn&#39;t a hypothetical situation. There has been many tragic events where people have been harmed and even killed because data about them was leaked, stolen, or otherwise revealed to someone hostile.&lt;/p&gt;&lt;h3 id=&#34;children&#34;&gt;Children&lt;/h3&gt;&lt;p&gt;The data of children is something our society should be much more invested in protecting, yet most new legislation &lt;a href=&#34;../../../02/03/the-future-of-privacy/#chat-control-wants-to-break-end-to-end-encryption&#34;&gt;proposed&lt;/a&gt; or &lt;a href=&#34;../../../02/03/the-future-of-privacy/#age-verification-wants-to-collect-your-sensitive-data&#34;&gt;passed&lt;/a&gt; to supposedly protect the children are doing the complete &lt;em&gt;opposite&lt;/em&gt;, endangering everyone&#39;s data, &lt;em&gt;including&lt;/em&gt; the children&#39;s.&lt;/p&gt;&lt;p&gt;As for the data protection we already have, they are insufficient to protect most people&#39;s data, also including the children&#39;s.&lt;/p&gt;&lt;p&gt;In 2020, the Irish child and family agency, Tusla, was fined €75,000 for a breach of the General Data Protection Regulation (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;). Investigation &lt;a href=&#34;https://www.irishtimes.com/news/crime-and-law/tusla-becomes-first-organisation-fined-for-gdpr-rule-breach-1.4255692&#34;&gt;revealed&lt;/a&gt; three instances where data about children had been negligently disclosed to unauthorized parties.&lt;/p&gt;&lt;p&gt;In one case, the location and contact information of a mother and child was revealed to an alleged abuser. In another, the agency neglectfully &lt;a href=&#34;https://www.irishtimes.com/ireland/social-affairs/2025/03/04/abusers-using-data-protection-law-to-get-details-on-victims/&#34;&gt;provided&lt;/a&gt; the address of a child and the mother&#39;s phone number to a man accused of child sexual abuse.&lt;/p&gt;&lt;p&gt;Such data leaks should never be tolerated. Sadly, much stronger fines will be required to stop organizations from being so dangerously careless.&lt;/p&gt;&lt;p&gt;In 2018, an incredibly unfortunate 12-year-old gamer and his mother were both likely &lt;a href=&#34;https://www.pcgamesn.com/fortnite/fortnite-stream-swatting&#34;&gt;traumatized for life&lt;/a&gt; by a violent &lt;a href=&#34;https://en.wikipedia.org/wiki/Swatting&#34;&gt;swatting attack&lt;/a&gt; when the child&#39;s home address was exposed online. The outcome of this horrible attack could have ended much more tragically. The story doesn&#39;t explain how the child&#39;s address was found.&lt;/p&gt;&lt;p&gt;Swatting attacks have become such a &lt;a href=&#34;#mistaken-identity&#34;&gt;problem&lt;/a&gt; in the United States that the Federal Bureau of Investigation (FBI) recently &lt;a href=&#34;https://www.nbcnews.com/news/us-news/fbi-formed-national-database-track-prevent-swatting-rcna91722&#34;&gt;created&lt;/a&gt; a national database to help track and prevent such attacks.&lt;/p&gt;&lt;h3 id=&#34;victims-of-stalkers&#34;&gt;Victims of stalkers&lt;/h3&gt;&lt;p&gt;Stalking victims are incredibly vulnerable to any data leak. People in such situation can often be gravely endangered by data broker services, data breaches, information they might have shared online recently or decades ago, and information shared about them by friends and family.&lt;/p&gt;&lt;p&gt;Unfortunately, this kind of horrifying situation isn&#39;t rare.&lt;/p&gt;&lt;p&gt;The danger to victims of online stalkers should never be minimized. Stalking and harassment are serious crimes that should be reported and severely punished. Overlooking these offenses is being ignorant to how quickly the consequences of such crimes can escalate.&lt;/p&gt;&lt;p&gt;In 2019, a 21-year-old Japanese pop star got stalked and sexually &lt;a href=&#34;https://www.bbc.co.uk/news/world-asia-50000234&#34;&gt;assaulted&lt;/a&gt; by a man who found her location from a picture she posted online. The photo had such high definition that the perpetrator was able to see and identify a specific train station that was visible &lt;em&gt;through a reflection in the singer&#39;s eyes&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;The aggressor also gathered information about the victim&#39;s home by examining the photos she posted from her apartment to determine the exact unit location. He then went to the train station he identified from the photo, waited for her, and followed her home.&lt;/p&gt;&lt;p&gt;In 2023, a podcast host and her husband were &lt;a href=&#34;https://www.nbcnews.com/news/us-news/podcast-host-killed-stalker-deep-seated-fear-safety-records-reveal-rcna74842&#34;&gt;killed&lt;/a&gt; by an online stalker. Despite having requested a protection order against the murderer, and despite blocking his phone number and social media accounts, after months of intense harassment online, the man eventually found the podcaster&#39;s home address, broke in, and fatally shot her and her husband.&lt;/p&gt;&lt;h3 id=&#34;victims-of-domestic-violence&#34;&gt;Victims of domestic violence&lt;/h3&gt;&lt;p&gt;Victims of domestic violence are at an elevated risk of severe or even fatal repercussions when their data gets leaked or shared. People in this extreme situation often have to take extreme measures to protect data that could allow their abuser to find their new location.&lt;/p&gt;&lt;p&gt;Things as banal as exposing someone&#39;s license plate, or posting online a photo taken in a public space could literally get a person in such situation killed.&lt;/p&gt;&lt;p&gt;Moreover, some abusers are &lt;a href=&#34;https://www.irishtimes.com/ireland/social-affairs/2025/03/04/abusers-using-data-protection-law-to-get-details-on-victims/&#34;&gt;weaponizing&lt;/a&gt; subject access requests in an attempt to find the location of the victims fleeing them.&lt;/p&gt;&lt;p&gt;It is imperative to ensure that data access legislation cannot be misused in such a dangerous way. Data legally shared with a subject should never lead to the harm of someone else.&lt;/p&gt;&lt;p&gt;In another instance, a woman who was raped by a former partner was unable to safely receive counseling care because the notes from her counseling sessions could have been &lt;a href=&#34;https://www.irishtimes.com/crime-law/courts/2025/01/17/calls-for-law-to-be-changed-to-end-access-to-rape-victims-counselling-notes/&#34;&gt;shared&lt;/a&gt; in court with the perpetrator.&lt;/p&gt;&lt;p&gt;Data privacy regulations should protect such sensitive data from being shared without explicit and free consent from the patient.&lt;/p&gt;&lt;h3 id=&#34;healthcare-seekers&#34;&gt;Healthcare seekers&lt;/h3&gt;&lt;p&gt;People seeking essential healthcare in adverse jurisdictions can be prosecuted when their private communications or locations are intercepted.&lt;/p&gt;&lt;p&gt;In 2023, a mother from Nebraska (US) was arrested and criminally &lt;a href=&#34;https://www.theverge.com/2023/7/11/23790923/facebook-meta-woman-daughter-guilty-abortion-nebraska-messenger-encryption-privacy&#34;&gt;charged&lt;/a&gt; after she helped her 17-year-old daughter get an abortion.&lt;/p&gt;&lt;p&gt;The woman was arrested partly based on the Facebook messages she exchanged with her daughter discussing medication for the abortion. Police obtained a copy of the private Facebook conversation by serving a warrant to Meta, which the company quickly complied with.&lt;/p&gt;&lt;h3 id=&#34;whistleblowers-and-activists&#34;&gt;Whistleblowers and activists&lt;/h3&gt;&lt;p&gt;Whistleblowers and activists are at especially high risk of harm, particularly if they have publicly opposed or exposed oppressive regimes or criminal groups.&lt;/p&gt;&lt;p&gt;Governments around the world, especially more authoritarian ones, have been increasingly &lt;a href=&#34;https://privacyinternational.org/long-read/5337/social-media-monitoring-uk-invisible-surveillance-tool-increasingly-deployed&#34;&gt;monitoring social media&lt;/a&gt; to track, identify, and persecute critics, activists, and journalists.&lt;/p&gt;&lt;p&gt;Authorities have also been mandating direct collaboration from service providers to arrest activists. In 2021, a French climate activist was &lt;a href=&#34;https://techcrunch.com/2021/09/06/protonmail-logged-ip-address-of-french-activist-after-order-by-swiss-authorities/&#34;&gt;arrested&lt;/a&gt; after Proton Mail was legally &lt;a href=&#34;https://proton.me/blog/climate-activist-arrest&#34;&gt;compelled&lt;/a&gt; by Swiss laws to log and share the activist&#39;s &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; address with authorities.&lt;/p&gt;&lt;p&gt;In 2017, a 25-year-old working for the American National Security Agency (NSA) as a contractor was arrested after she was &lt;a href=&#34;https://arstechnica.com/information-technology/2017/06/how-a-few-yellow-dots-burned-the-intercepts-nsa-leaker/&#34;&gt;identified&lt;/a&gt; as the whistleblower who leaked a report about Russian electoral interference in the United States.&lt;/p&gt;&lt;p&gt;The whistleblower had mailed the classified document to The Intercept anonymously. However, when the news organization tried to confirm the authenticity of the document with the NSA, the agency was able to determine which printer was used to print this copy, and from there deanonymized &lt;a href=&#34;https://en.wikipedia.org/wiki/Reality_Winner&#34;&gt;Reality Winner&lt;/a&gt;. The technique used to track the document was the reading of almost invisible &lt;a href=&#34;https://en.wikipedia.org/wiki/Printer_tracking_dots&#34;&gt;printer tracking dots&lt;/a&gt; that many laser printers and photocopiers produce on all printed documents.&lt;/p&gt;&lt;p&gt;This year on March 7th, community activist and whistleblower Pamela Mabini was &lt;a href=&#34;https://www.hrw.org/news/2025/03/11/activist-and-whistleblower-killed-south-africa&#34;&gt;shot and killed&lt;/a&gt; just outside her home in South Africa. She was an activist working with the &lt;a href=&#34;https://www.dailydispatch.co.za/local-heroes/2023-07-10-helping-others-is-the-reason-for-pamela-mabinis-smile/&#34;&gt;Maro Foundation&lt;/a&gt;, a nonprofit organization dedicated to fighting poverty and gender-based violence.&lt;/p&gt;&lt;p&gt;Mabini&#39;s murder has sparked a debate on the importance of protections offered to whistleblowers &lt;a href=&#34;https://www.citizen.co.za/news/another-high-profile-whistleblower-gunned-down-how-safe-speak-out/&#34;&gt;exposing criminals&lt;/a&gt; to justice. Following the activist&#39;s death, organizations have been calling to fast-track the &lt;a href=&#34;https://www.iol.co.za/news/south-africa/calls-for-government-to-fast-track-protection-bill-following-activists-murder-3e8adc20-be58-4f3d-9a55-4a5818171c92&#34;&gt;Whistleblower Protection Bill&lt;/a&gt; to bring more protections to those fighting for justice in South Africa.&lt;/p&gt;&lt;h3 id=&#34;trans-and-queer-activists&#34;&gt;Trans and queer activists&lt;/h3&gt;&lt;p&gt;Trans and queer activists are at elevated risk of harassment online in today&#39;s political climate. In 2022, 28-year-old trans activist Clara Sorrenti was victim of a swatting attack after police believed a fake report about violent threats made by her aggressor.&lt;/p&gt;&lt;p&gt;She was arrested at gunpoint by the police, handcuffed, had her electronic devices seized, and her apartment searched for eight hours for non-existent evidence. The aggressor who made the false threats had &lt;a href=&#34;https://www.cbc.ca/news/canada/london/trans-twitch-star-arrested-at-gunpoint-fears-for-life-after-someone-sent-police-to-her-london-ont-home-1.6546015&#34;&gt;provided&lt;/a&gt; her name and home address to police.&lt;/p&gt;&lt;h3 id=&#34;journalists&#34;&gt;Journalists&lt;/h3&gt;&lt;p&gt;Journalists around the world can become vulnerable to attacks even from governments when they report on oppressive regimes. This kind of situation can be extremely dangerous, considering the almost unlimited resources state-backed attackers can have to identify, track, and persecute their victims.&lt;/p&gt;&lt;p&gt;In 2018, the prominent journalist and critic of Saudi Arabia&#39;s government Jamal Khashoggi was &lt;a href=&#34;https://www.bbc.co.uk/news/world-europe-45812399&#34;&gt;murdered&lt;/a&gt;. Despite being based in the United States, the journalist traveled to Istanbul&#39;s Saudi consulate in Turkey to pick up official documents. Khashoggi was killed inside the consulate a few days later on October 2nd.&lt;/p&gt;&lt;p&gt;Investigations revealed that people close to Khashoggi had their devices infected by NSO&#39;s &lt;a href=&#34;https://freedom.press/digisec/blog/journalists-targeted-with-pegasus-yet-again/&#34;&gt;Pegasus spyware&lt;/a&gt;. This likely allowed the attacker to gather information about Khashoggi traveling outside the United States.&lt;/p&gt;&lt;p&gt;Many other journalists, politicians, and human rights activists have been &lt;a href=&#34;https://www.bbc.co.uk/news/world-57891506&#34;&gt;targeted&lt;/a&gt; by state-backed spyware such as Pegasus.&lt;/p&gt;&lt;p&gt;In 2022, Human Rights Watch &lt;a href=&#34;https://www.hrw.org/news/2022/12/05/iran-state-backed-hacking-activists-journalists-politicians&#34;&gt;reported&lt;/a&gt; that two of their staff members and at least 18 other activists, researchers, or journalists working on Middle East issues had been targeted by a phishing campaign coming from a group affiliated with the Iranian government. The entity succeeded in stealing emails and other sensitive data from at least three human rights defenders.&lt;/p&gt;&lt;h3 id=&#34;targeted-harassment&#34;&gt;Targeted harassment&lt;/h3&gt;&lt;p&gt;Another danger of leaked data that shouldn&#39;t be minimized is targeted harassment. Targeted harassment can have devastating consequences ranging from silencing their victims, to suicide, to death by swatting attack.&lt;/p&gt;&lt;p&gt;A well-known example of targeted harassment is Gamergate. Gamergate was a loosely organized &lt;a href=&#34;https://en.wikipedia.org/wiki/Gamergate_(harassment_campaign)&#34;&gt;harassment campaign&lt;/a&gt; targeting women in the video game industry. It started in 2014 when Zoë Quinn&#39;s ex-partner published a blog post with false insinuation about Quinn, a video game developer.&lt;/p&gt;&lt;p&gt;Quinn was subsequently subjected to an incredibly intrusive &lt;a href=&#34;https://en.wikipedia.org/wiki/Doxing&#34;&gt;doxxing&lt;/a&gt; campaign, and even received rape threats and death threats. Attackers were able to steal an insecure password and &lt;a href=&#34;https://time.com/4927076/zoe-quinn-gamergate-doxxing-crash-override-excerpt/&#34;&gt;break into&lt;/a&gt; one of Quinn&#39;s account, which resulted in horrible consequences. The harassment campaign later expanded to target others who had defended Quinn online.&lt;/p&gt;&lt;p&gt;In another case, targeted harassment resulted in one death and a five years prison sentence. In 2020, Mark Herring started receiving requests asking him to give up his Twitter handle, which he refused. Herring&#39;s &#34;crime&#34; was to have been quick enough to secure the handle &#34;@Tennessee&#34; shortly after Twitter came online.&lt;/p&gt;&lt;p&gt;Over weeks, harassment escalated from sustained text messaging to random food delivery to his house. After Herring&#39;s harasser posted his home address in &lt;a href=&#34;https://krebsonsecurity.com/2021/07/serial-swatter-who-caused-death-gets-five-years-in-prison/&#34;&gt;a Discord chat room used by criminals&lt;/a&gt;, someone used this data to direct a swatting attack at Herring&#39;s place. Police surrounded his home and demanded he crawl under a back fence, despite his health. After crawling under the fence, 60-year-old Mark Herring stoop up then collapsed from a heart attack, and died soon after.&lt;/p&gt;&lt;h3 id=&#34;mistaken-identity&#34;&gt;Mistaken identity&lt;/h3&gt;&lt;p&gt;What is more, everyone can get victimized by exposed data, even people who are not online and even people who are not a whistleblower, a journalist, an activist, a victim of domestic violence, or someone who has committed the &#34;unthinkable crime&#34; of securing a cool Twitter handle.&lt;/p&gt;&lt;p&gt;In 2017, 28-year-old Andrew Finch was &lt;a href=&#34;https://edition.cnn.com/2019/09/14/us/swatting-sentence-casey-viner/index.html&#34;&gt;shot and killed&lt;/a&gt; by police during a swatting attack in the United States.&lt;/p&gt;&lt;p&gt;The attack was conducted after the perpetrator had an argument online over a multiplayer first-person shooter game. The perpetrator, who was later sentenced, threatened another player he was upset with to &#34;swat&#34; him. The perpetrator then enlisted another man to call the police and conduct the attack on the player, with the home address the player provided. This address turned out to be the previous address of the player, which was now Andrew Finch&#39;s address.&lt;/p&gt;&lt;p&gt;When police arrived at Andrew Finch&#39;s home and surrounded the place, Finch, completely unaware of what was happening, barely had the time to comply and get outside when the police shot and killed him at the front door.&lt;/p&gt;&lt;p&gt;The man who conducted the swatting attack for the perpetrator got &lt;a href=&#34;https://en.wikipedia.org/wiki/2017_Wichita_swatting&#34;&gt;sentenced&lt;/a&gt; to 20 years in federal prison.&lt;/p&gt;&lt;p&gt;In 2021, an Australian 15-year-old girl was &lt;a href=&#34;https://www.abc.net.au/news/2021-03-26/canberra-family-doxxed-sent-death-threats-after-social-video/100014706&#34;&gt;mistakenly targeted&lt;/a&gt; and later doxxed with her real information after she had been wrongly identified online as someone who had participated in a racist social media video posted on Facebook.&lt;/p&gt;&lt;p&gt;A few hours after her name was shared online, the girl started to be inundated by hateful messages and unspeakable threats from all around the world. Her phone number and home address were eventually shared online. Her family received hateful messages from strangers as well.&lt;/p&gt;&lt;p&gt;During the ordeal, her mother had to be hospitalized for heart disease. The girl, who had absolutely nothing to do with the racist video that spawned the attacks, contemplated suicide due to the violence of the harassment. She and her mother no longer felt safe.&lt;/p&gt;&lt;p&gt;Digital traces of the personal data that was exposed during the attacks will likely remain online forever, even if the girl and her family were completely innocent and unrelated to what triggered the cyber-swarming.&lt;/p&gt;&lt;p&gt;The 26-year-old American who incorrectly identified the Australian girl and shared her name and social media accounts online later apologized for his mistake.&lt;/p&gt;&lt;h2 id=&#34;how-data-finds-its-way-to-an-aggressor&#34;&gt;How data finds its way to an aggressor&lt;/h2&gt;&lt;h3 id=&#34;targeted-research-attack-and-spyware&#34;&gt;Targeted research, attack, and spyware&lt;/h3&gt;&lt;p&gt;For targeted attacks, aggressors will often use simple techniques to find a victim&#39;s data from what is already leaked online, or openly shared on social media. For more sophisticated attacks, perpetrators might use criminal methods such as impersonation for &lt;a href=&#34;https://en.wikipedia.org/wiki/SIM_swap_scam&#34;&gt;&lt;abbr title=&#34;Subscriber Identity Module&#34;&gt;SIM&lt;/abbr&gt; swap attacks&lt;/a&gt;. When attackers have more resources, such as a state-backed attackers, more sophisticated processes might be used, like device infection with &lt;a href=&#34;https://citizenlab.ca/tag/nso-group/&#34;&gt;NSO Group&#39;s spyware&lt;/a&gt;.&lt;/p&gt;&lt;h3 id=&#34;maliciously-stolen-or-negligently-leaked&#34;&gt;Maliciously stolen or negligently leaked&lt;/h3&gt;&lt;p&gt;Data can be stolen maliciously in all sort of ways, but even more often and common, data is leaked online from banal &lt;em&gt;negligence&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;Once data is leaked online, it will likely become accessible to anyone looking for it eventually. Additionally, any data breach happening now has the potential to endanger someone years down the line. Perhaps it&#39;s a home address that has not changed in years, a phone number used for a decade, a legal name, a photograph, or even a &lt;a href=&#34;https://krebsonsecurity.com/2024/04/man-who-mass-extorted-psychotherapy-patients-gets-six-years/&#34;&gt;medical file&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Unfortunately, the data broker industry thrives on bundling up all this data together in neat packages to be sold to anyone looking for it, making any attacker&#39;s job much easier.&lt;/p&gt;&lt;h4 id=&#34;unencrypted-data&#34;&gt;Unencrypted data&lt;/h4&gt;&lt;p&gt;When the data leaked or stolen is well encrypted, the &lt;a href=&#34;https://www.maketecheasier.com/how-secure-stolen-encrypted-data/&#34;&gt;risk is reduced&lt;/a&gt;. If the leaked data cannot be decrypted easily, this will greatly mitigate the damage done by a breach. Conversely, unencrypted leaked data will always inflict maximum damage.&lt;/p&gt;&lt;p&gt;This is why we should demand that all the services we use implement strong, &lt;em&gt;end-to-end&lt;/em&gt; encryption wherever possible.&lt;/p&gt;&lt;h3 id=&#34;obliviously-shared-without-consent&#34;&gt;Obliviously shared without consent&lt;/h3&gt;&lt;p&gt;Sometimes, the data endangering someone isn&#39;t leaked negligently or stolen maliciously, but simply shared by a friend or a family member oblivious to the danger.&lt;/p&gt;&lt;p&gt;This is &lt;a href=&#34;../../10/the-privacy-of-others/&#34;&gt;a cultural problem we all need to work on&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Despite all the technological protections we can put on data, and despite all the regulations we can ask organizations to comply with, if our culture doesn&#39;t understand the danger of sharing the data of others, we will fail to protect the most vulnerable people in our society.&lt;/p&gt;&lt;h2 id=&#34;protecting-data-for-everyones-safety-is-a-societal-communal-and-individual-responsibility&#34;&gt;Protecting data for everyone&#39;s safety is a societal, communal, and individual responsibility&lt;/h2&gt;&lt;p&gt;Protecting data isn&#39;t simply a matter of preference, although it can absolutely be. But for so many people around the world, it is vital to understand how &lt;em&gt;crucial&lt;/em&gt; data privacy is.&lt;/p&gt;&lt;p&gt;As explicitly demonstrated above, data protection can literally mean life or death for people in vulnerable situations. Beyond that, it is unfortunately also true for anyone unlucky enough to get mistakenly targeted when their data is shared.&lt;/p&gt;&lt;p&gt;In all of these situations, &lt;strong&gt;data privacy means safety&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;We must demand that governments, corporations, and organizations of all kinds do better to improve data protection practices and technologies.&lt;/p&gt;&lt;p&gt;As a community, we also have a responsibility to protect the most vulnerable people from harm caused by data leaks.&lt;/p&gt;&lt;p&gt;And finally, as individuals, we share this duty of care and must all work on improving the way we protect our own data, but even more importantly, the data of everyone around us.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Privacy means safety, for everyone.&lt;/strong&gt;&lt;/p&gt;&lt;hr /&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Resources in the United States &amp;amp; Canada&lt;/p&gt;&lt;p&gt;If you or someone you know is in one of the situations described above, these additional resources may help. Make sure to take &lt;a href=&#34;https://www.privacyguides.org/en/basics/threat-modeling/&#34;&gt;appropriate measures&lt;/a&gt; to protect your privacy if your situation is sensitive. If you are in a high risk situation, you might want to access these resources using &lt;a href=&#34;https://www.privacyguides.org/en/advanced/tor-overview/&#34;&gt;Tor&lt;/a&gt; or &lt;a href=&#34;../../../01/29/installing-and-using-tails/&#34;&gt;Tails&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Suicide &amp;amp; Crisis Support Line&lt;/strong&gt; &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 15V9h8V4.16L19.84 12 12 19.84V15z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &lt;a href=&#34;https://988lifeline.org/&#34;&gt;988 Lifeline&lt;/a&gt; Phone number: 988 (US &amp;amp; Canada)&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Trans Peer Support&lt;/strong&gt; &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 15V9h8V4.16L19.84 12 12 19.84V15z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &lt;a href=&#34;https://translifeline.org/hotline/&#34;&gt;Trans Lifeline Hotline&lt;/a&gt; Phone number US: 1-877-565-8860 / Canada: 1-877-330-6366&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Stalking Victim Support&lt;/strong&gt; &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 15V9h8V4.16L19.84 12 12 19.84V15z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; US: &lt;a href=&#34;https://www.safehorizon.org/get-help/stalking/&#34;&gt;SafeHorizon&lt;/a&gt; / Canada: &lt;a href=&#34;https://crcvc.ca/wp-content/uploads/2021/09/Cyberstalking-_DISCLAIMER_Revised-Aug-2022_FINAL.pdf&#34;&gt;The Canadian Resource Centre for Victims of Crime&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Domestic Violence Victim Support&lt;/strong&gt; &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 15V9h8V4.16L19.84 12 12 19.84V15z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; US: &lt;a href=&#34;https://www.thehotline.org/&#34;&gt;The National Domestic Violence Hotline&lt;/a&gt; Phone number: 1-800-799-7233 / Canada: &lt;a href=&#34;https://www.canada.ca/en/public-health/services/health-promotion/stop-family-violence/services.html&#34;&gt;Canadian resources by situation and province&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Reproductive Rights &amp;amp; Healthcare&lt;/strong&gt; &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 15V9h8V4.16L19.84 12 12 19.84V15z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; US: &lt;a href=&#34;https://www.plannedparenthood.org/&#34;&gt;Planned Parenthood&lt;/a&gt; / Canada: &lt;a href=&#34;https://www.actioncanadashr.org/resources/services&#34;&gt;Action Canada for Sexual Health &amp;amp; Rights&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Journalists and Whistleblowers&lt;/strong&gt; &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 15V9h8V4.16L19.84 12 12 19.84V15z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; US: &lt;a href=&#34;https://freedom.press/digisec/guides/&#34;&gt;Freedom or the Press Foundation Guides &amp;amp; Resources&lt;/a&gt; / Canada: &lt;a href=&#34;https://caj.ca/advocacy/digital-security/&#34;&gt;Canadian Association of Journalists&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Protesters&lt;/strong&gt; &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 15V9h8V4.16L19.84 12 12 19.84V15z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; &lt;a href=&#34;../../../01/23/activists-guide-securing-your-smartphone/&#34;&gt;The Protesters&#39; Guide to Smartphone Security&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;hr /&gt;&lt;p&gt;&lt;strong&gt;Correction (Mar. 27):&lt;/strong&gt; This article was updated to correct a typo in a date. The previous version wrongly described the arrest of a French climate activist happening in 2012, when these events actually happened in 2021. &lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/03/25/privacy-means-safety/</link> <pubDate>Thu, 27 Mar 2025 18:55:13 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/03/25/privacy-means-safety/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/03/25/privacy-means-safety.png" type="image/png" length="None" /> </item> <item> <title>The Future of Privacy: How Governments Shape Your Digital Life</title> <author>Em</author> <category>News</category> <description>&lt;h1 id=&#34;the-future-of-privacy-how-governments-shape-your-digital-life&#34;&gt;The Future of Privacy: How Governments Shape Your Digital Life&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Black and white photo of a street post at night. The street post has some ripped stickers on it and a stencilled graffiti saying Big Data is Watching You.&#34; src=&#34;../../../../assets/images/the-future-of-privacy/cover.webp&#34; /&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: ev / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Data privacy is a vast subject that encompasses so much. Some might think it is a niche focus interesting only a few. But in reality, it is a wide-ranging field influenced by intricate relationships between politics, law, technology, and much more. Further, it affects &lt;strong&gt;everyone&lt;/strong&gt; in one way or another, whether they care about it or not.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;I routinely read articles discussing changes in politics on the advocacy side of data privacy. Then, I read articles talking about changes in regulations on the legal side of data privacy. And then, I see all the articles and guides presenting new tools and privacy features on the tech side of data privacy. Of course, all of this is linked together.&lt;/p&gt;&lt;p&gt;Let&#39;s talk about how politics, law, and technological features are intertwined, all at once.&lt;/p&gt;&lt;h2 id=&#34;privacy-laws-are-always-one-election-away-from-getting-better-or-worse&#34;&gt;Privacy laws are always one election away from getting better, or worse&lt;/h2&gt;&lt;p&gt;Each change in government can have a serious effect on data privacy legislation. Privacy is a politically charged field. For example, authoritarian regimes might want to remove or weaken privacy rights to exert strict control over their population. While democratic governments generally bring more freedom and protections to its citizens, including privacy rights. It&#39;s important to keep in mind who in the past has bettered citizen rights and protections, and who has actively worked to undermine civil rights.&lt;/p&gt;&lt;p&gt;Each time a new government takes power, its values will be put forward and influence legislation in place, or legislation not in place yet. While the Western world has benefited from some improvements in data privacy law for the past few years, we must consider these gains are fragile and protections could get removed or lessened at any time.&lt;/p&gt;&lt;p&gt;Unfortunately, it seems there is currently a political push towards deregulation, mass surveillance, and a focus on corporate gains. This is &lt;strong&gt;extremely worrisome for the future of privacy rights&lt;/strong&gt;, human rights, and individual liberties.&lt;/p&gt;&lt;p&gt;Following politics and advocating for better privacy rights and legislation is essential in improving access to privacy tools and features around the world. Privacy is never politically neutral.&lt;/p&gt;&lt;h2 id=&#34;the-tools-you-use-might-depend-on-government-funding&#34;&gt;The tools you use might depend on government funding&lt;/h2&gt;&lt;p&gt;Many &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;privacy tools&lt;/a&gt; we use depend at least partially on government funding or on other tools which depend on government funding. This is especially true for open-source nonprofit organizations needing some (usually) more stable income, in addition to donations.&lt;/p&gt;&lt;h3 id=&#34;which-privacy-and-security-tools-could-be-impacted&#34;&gt;Which privacy and security tools could be impacted&lt;/h3&gt;&lt;p&gt;One notable example of a privacy-related project receiving government funding is the &lt;a href=&#34;https://www.torproject.org/&#34;&gt;Tor Project&lt;/a&gt;. If this source of funding &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/executive-order-state-department-sideswipes-freedom-tools-threatens-censorship&#34;&gt;were cut off&lt;/a&gt;, the impact on Tor could be quite detrimental, not only to the Tor Project but to all projects relying on Tor as well. Many privacy-focus software are built around the &lt;a href=&#34;https://en.wikipedia.org/wiki/Tor_(network)&#34;&gt;Tor network&lt;/a&gt;. To name only a few, whistleblowing software such as &lt;a href=&#34;https://hushline.app/&#34;&gt;Hush Line&lt;/a&gt; and &lt;a href=&#34;https://securedrop.org/&#34;&gt;SecureDrop&lt;/a&gt; both utilize the Tor network to harden privacy. &lt;a href=&#34;https://briarproject.org/&#34;&gt;Briar&lt;/a&gt;, &lt;a href=&#34;https://cwtch.im/&#34;&gt;Cwtch&lt;/a&gt;, and &lt;a href=&#34;https://simplex.chat/&#34;&gt;SimpleX&lt;/a&gt;, are examples of messaging applications also using Tor to add a layer of security and privacy to communications. &lt;strong&gt;Tor is critical infrastructure&lt;/strong&gt; in the world of data privacy.&lt;/p&gt;&lt;p&gt;Another important project receiving government funding is &lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let&#39;s Encrypt&lt;/a&gt;. Let&#39;s Encrypt is a nonprofit Certificate Authority providing &lt;a href=&#34;https://en.wikipedia.org/wiki/Transport_Layer_Security&#34;&gt;&lt;abbr title=&#34;Transport Layer Security&#34;&gt;TLS&lt;/abbr&gt;&lt;/a&gt; certificates to websites. It is run by the Internet Security Research Group (ISRG), which &lt;a href=&#34;https://www.abetterinternet.org/sponsors/&#34;&gt;receives funding&lt;/a&gt; from the Sovereign Tech Agency, &lt;a href=&#34;https://www.sovereign.tech/faq&#34;&gt;supported by&lt;/a&gt; the German Federal Ministry for Economic Affairs and Climate Action. The ISRG also receives funding from the &lt;a href=&#34;https://www.opentech.fund/&#34;&gt;Open Technology Fund&lt;/a&gt; (OTF), which receives the &lt;a href=&#34;https://www.opentech.fund/about/about-our-funding/&#34;&gt;majority&lt;/a&gt; of its funding from the United States government, through the U.S. Agency for Global Media.&lt;/p&gt;&lt;p&gt;In current events, last month an &lt;a href=&#34;https://web.archive.org/web/20250131165539/https://new.nsf.gov/executive-orders&#34;&gt;executive order&lt;/a&gt; in the United States from the Trump administration led the National Science Foundation (NSF) to &lt;a href=&#34;https://www.npr.org/sections/shots-health-news/2025/01/27/nx-s1-5276342/nsf-freezes-grant-review-trump-executive-orders-dei-science&#34;&gt;freeze grant reviews&lt;/a&gt;. This is currently impacting many important projects in the tech world, &lt;a href=&#34;https://www.linkedin.com/posts/sethmlarson_national-science-foundation-freezes-grant-activity-7290072485423656960-n2eJ/&#34;&gt;including&lt;/a&gt; the Python Software Foundation (PSF). &lt;strong&gt;The repercussions of this freeze could be devastating for many open-source projects, in privacy and beyond.&lt;/strong&gt;&lt;/p&gt;&lt;h3 id=&#34;government-funding-should-support-civil-liberties-and-protections&#34;&gt;Government funding should support civil liberties and protections&lt;/h3&gt;&lt;p&gt;Governments funding nonprofit projects and organizations working on improving human rights, civil liberties, and technological security and safety is a good thing. This can bring an important source of stable income to nonprofit projects that could not stay afloat solely from donations.&lt;/p&gt;&lt;p&gt;However, this dependency can become precarious when governments aren&#39;t working for the good of the people anymore, and when organizations rely too heavily on such support, making them vulnerable to change in power. Such a change of regime can have devastating repercussions on the privacy tools we use.&lt;/p&gt;&lt;h2 id=&#34;the-gdpr-gave-you-deletion-features-in-your-apps&#34;&gt;The &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; gave you deletion features in your apps&lt;/h2&gt;&lt;p&gt;On the good side of regulatory influence, there are regulations like the &lt;a href=&#34;https://gdpr-info.eu/&#34;&gt;General Data Protection Regulation&lt;/a&gt; (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;). Saying the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; revolutionized the world of data privacy would not be an overstatement. While many privacy regulations pre-date the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;, in the Western world none had the scope nor the grit the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; has.&lt;/p&gt;&lt;h3 id=&#34;what-is-the-gdpr&#34;&gt;What is the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;&lt;/h3&gt;&lt;p&gt;The &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; is a data privacy regulation that was adopted by the European Union (EU) in 2016 and became effective in May 2018. Its scope encompasses all the EU member states as well as all the countries part of the European Economic Area (&lt;abbr title=&#34;European Economic Area&#34;&gt;EEA&lt;/abbr&gt;), which together count 30 countries to this day. The United Kingdom also uses an &lt;a href=&#34;https://www.gdpreu.org/differences-between-the-uk-and-eu-gdpr-regulations/&#34;&gt;amended version&lt;/a&gt; of the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; post-Brexit.&lt;/p&gt;&lt;p&gt;However, the reach of the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; isn&#39;t limited to Europe. Every organization based &lt;em&gt;outside the EU&lt;/em&gt; that is offering goods or services to, or is monitoring the behavior of, individuals located in the EU &lt;a href=&#34;https://commission.europa.eu/law/law-topic/data-protection/rules-business-and-organisations/application-regulation/who-does-data-protection-law-apply_en&#34;&gt;must comply&lt;/a&gt; as well. This means that &lt;strong&gt;most organizations operating worldwide, regardless of where they are located in the world, must comply&lt;/strong&gt; with the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;.&lt;/p&gt;&lt;p&gt;As is often the case with data privacy laws, it took a few years before &lt;a href=&#34;https://www.gdprsummary.com/gdpr-definitions/data-subject/&#34;&gt;Data Subjects&lt;/a&gt; (your legal designation under the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;) noticed any concrete changes. One change that has become prominent in the past few years, and is likely a direct product of the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;, is data deletion features within apps and accounts.&lt;/p&gt;&lt;h3 id=&#34;what-does-the-gdpr-have-to-do-with-data-deletion-features&#34;&gt;What does the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; have to do with data deletion features&lt;/h3&gt;&lt;p&gt;An important right granted by the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; to Data Subjects is the &lt;a href=&#34;https://gdpr-info.eu/art-17-gdpr/&#34;&gt;Right to Erasure&lt;/a&gt; (or the Right to be Forgotten). Other legislation such as the &lt;a href=&#34;https://www.oag.ca.gov/privacy/ccpa&#34;&gt;California Consumer Privacy Act&lt;/a&gt; (CCPA) calls for a similar right, the &lt;em&gt;Right to Delete&lt;/em&gt;. This and similar rights have existed before, but through the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt; and its enforcement it has affected technology in a much broader and impactful way.&lt;/p&gt;&lt;p&gt;Slowly since 2018, applications requiring accounts have started to implement data deletion and account deletion features within the account itself. A probable reason for this is that due to the &lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;, and a now &lt;a href=&#34;https://iapp.org/resources/article/us-state-privacy-legislation-tracker/&#34;&gt;growing number&lt;/a&gt; of privacy regulations from various states in the United States, organizations are obligated to respond to Data Subject &lt;a href=&#34;https://www.gdprsummary.com/data-subject-rights/&#34;&gt;requests&lt;/a&gt; to get their personal data deleted. Managing this can be quite cumbersome for organizations. The burden of answering and implementing each data deletion request manually is often not worth the value of the data itself. Organizations with enough resources have simply added it as an internal product feature. This makes data deletion requests manageable by each Data Subject themselves (at least partially), freeing the organization from legally having to answer each individual request. When implemented properly, this is what we can call a win-win situation.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Request to delete&lt;/p&gt;&lt;p&gt;Unfortunately, not all applications have integrated automatic deletion features internally (yet). Additionally, some applications and accounts will allow you to delete information only partially this way.&lt;/p&gt;&lt;p&gt;If you wish to exercise or have questions related to your Right to Erasure or Right to Delete, first consult your local privacy regulation to check if you have this right as a &lt;em&gt;Data Subject&lt;/em&gt;, &lt;em&gt;Individual,&lt;/em&gt; or &lt;em&gt;Consumer&lt;/em&gt;. Then, you can contact the organization&#39;s &lt;em&gt;Privacy Officer&lt;/em&gt; with your request. You can usually find information about an organization&#39;s designated &lt;em&gt;Privacy Officer&lt;/em&gt; by reading its privacy policy or privacy notice. In any case, it never hurts to ask.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;chat-control-wants-to-break-end-to-end-encryption&#34;&gt;Chat Control wants to break end-to-end encryption&lt;/h2&gt;&lt;p&gt;If you are not European, please bear with me. First, everyone outside of Europe should care about what is happening in Europe, regardless. But even if you don&#39;t care, you should know &lt;strong&gt;this kind of mass surveillance proposition will inevitably leak west&lt;/strong&gt;, and if adopted will affect us all globally.&lt;/p&gt;&lt;h3 id=&#34;what-is-chat-control&#34;&gt;What is Chat Control&lt;/h3&gt;&lt;p&gt;In 2021, the EU &lt;a href=&#34;https://www.patrick-breyer.de/en/chatcontrol-european-parliament-approves-mass-surveillance-of-private-communications/&#34;&gt;approved a derogation&lt;/a&gt; to the &lt;a href=&#34;https://en.wikipedia.org/wiki/EPrivacy_Directive&#34;&gt;ePrivacy Directive&lt;/a&gt; to allow communication service providers to scan all exchanged messages to detect child sexual abuse material (CSAM). Although this first derogation was not mandatory, some policymakers kept pushing with new propositions.&lt;/p&gt;&lt;p&gt;A year later, a &lt;a href=&#34;https://edri.org/wp-content/uploads/2022/10/EDRi-Position-Paper-CSAR-short.pdf&#34;&gt;new regulation&lt;/a&gt; (CSAR) was proposed by the European Commissioner for Home Affairs to make scanning messages for CSAM &lt;em&gt;mandatory&lt;/em&gt; for all EU countries, and also allow them to &lt;strong&gt;break end-to-end encryption&lt;/strong&gt;. In 2023, the UK passed a similar legislation called the &lt;a href=&#34;https://hackaday.com/2023/10/29/the-uk-online-safety-bill-becomes-law-what-does-it-mean/&#34;&gt;Online Safety Act&lt;/a&gt;. These types of messaging mass scanning regulations have been called by critics &lt;em&gt;Chat Control&lt;/em&gt;.&lt;/p&gt;&lt;h3 id=&#34;why-is-chat-control-horrible-for-privacy-and-for-children&#34;&gt;Why is Chat Control horrible for privacy, and for children&lt;/h3&gt;&lt;p&gt;Such legislation might sound like a noble cause at first, but consider this: Scanning all messages exchanged for any reason treats everyone like a criminal, no matter what. &lt;strong&gt;This is not hunting criminals, this is mass surveillance.&lt;/strong&gt; Not only is this horrifying for privacy rights, but it also endangers democracy. Once a system to mass monitor all written communications is implemented to (supposedly) stop CSAM, new topics to detect, block, and report could be added anytime, and by any future governments. There is nothing that would prevent much less reasonable topics from being added to the list to be filtered out at a later date.&lt;/p&gt;&lt;p&gt;Chat Control would hurt everyone, &lt;a href=&#34;https://digitalcommons.law.uw.edu/wlr/vol99/iss1/9/&#34;&gt;including the children&lt;/a&gt;. Not only would mass scanning of all messages be &lt;a href=&#34;https://volteuropa.org/news/chat-control-wont-protect-children&#34;&gt;ineffective&lt;/a&gt; at reducing CSAM, but it would endanger the children even further by also scanning their communications. Because yes, children also communicate online. Parents also communicate sensitive information about their children online, with trusted family or doctors. All this data would get scanned and collected, only &lt;a href=&#34;https://techcrunch.com/2025/01/28/powerschool-begins-notifying-students-and-teachers-after-massive-data-breach/&#34;&gt;one breach away&lt;/a&gt; from being made public.&lt;/p&gt;&lt;p&gt;&lt;em&gt;Protecting the children&lt;/em&gt; is a pretext regularly used to implement abusive regulations undermining individual liberties and protections. Do not get fooled by this demagogic stratagem. &lt;strong&gt;Chat Control is the opposite of protecting the children.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Chat Control would only lead to destroying the end-to-end encryption messaging features that are protecting us and the children so well already. Criminals exploiting children would simply move to underground channels, unbothered.&lt;/p&gt;&lt;h3 id=&#34;who-opposes-chat-control&#34;&gt;Who opposes Chat Control&lt;/h3&gt;&lt;p&gt;Thankfully, opposition from experts and advocates alike has been strong. To name only a few, Meredith Whittaker, president of the Signal Foundation which develops the messaging app &lt;a href=&#34;https://signal.org/&#34;&gt;Signal&lt;/a&gt;, has taken &lt;a href=&#34;https://signal.org/blog/uk-online-safety-bill/&#34;&gt;a clear stand&lt;/a&gt; against Chat Control. The Electronic Frontier Foundation has also &lt;a href=&#34;https://www.eff.org/deeplinks/2024/06/now-eu-council-should-finally-understand-no-one-wants-chat-control&#34;&gt;firmly opposed&lt;/a&gt; Chat Control legislation. In the UK, the Open Rights Group has led &lt;a href=&#34;https://www.openrightsgroup.org/campaign/save-encryption/&#34;&gt;powerful campaigns&lt;/a&gt; to fight against the Online Safety Act. In Europe, privacy advocacy organization &lt;a href=&#34;https://noyb.eu/en/noyb-files-complaint-against-eu-commission-over-targeted-chat-control-ads&#34;&gt;noyb&lt;/a&gt; and former Member of the European Parliament Patrick Breyer have both been fervent defenders of privacy rights &lt;a href=&#34;https://www.patrick-breyer.de/en/posts/messaging-and-chat-control/&#34;&gt;raising relentless resistance&lt;/a&gt; to Chat Control.&lt;/p&gt;&lt;p&gt;Harmful policies such as Chat Control are a direct example of how politics can affect laws that can cause &lt;strong&gt;unimaginable damage&lt;/strong&gt; to the privacy-preserving technologies we use every day.&lt;/p&gt;&lt;h2 id=&#34;age-verification-wants-to-collect-your-sensitive-data&#34;&gt;Age Verification wants to collect your sensitive data&lt;/h2&gt;&lt;p&gt;Another potent example of the &lt;em&gt;protecting-the-children stratagem&lt;/em&gt; to undermine privacy rights is &lt;a href=&#34;https://www.jonaharagon.com/posts/age-verification-is-incompatible-with-the-internet/&#34;&gt;Age Verification legislation&lt;/a&gt;. In the past few years, this idea of controlling which online content should be accessible to children has raised new proposals around the world.&lt;/p&gt;&lt;p&gt;Age Verification policies generally start with the premise that some content should not be accessible to children online. Again, this could seem like a reasonable idea at first. Nobody would debate that children should be shielded from some type of content. Sadly, we have all witnessed how horrifying the internet can be at times. However, both the premise and methodology to achieve this goal are wrong.&lt;/p&gt;&lt;h3 id=&#34;who-will-decide-what-content-should-be-walled-online&#34;&gt;Who will decide what content should be walled online?&lt;/h3&gt;&lt;p&gt;First, even putting aside the fact that there is plenty of disturbing content accessible &lt;em&gt;outside&lt;/em&gt; the internet (newspapers, television, movies, radio, advertising, etc.), who would be &lt;a href=&#34;https://www.eff.org/deeplinks/2025/01/impact-age-verification-measures-goes-beyond-porn-sites&#34;&gt;the deciders&lt;/a&gt; of which specific content can be accessed by children or not? This can be extremely problematic, to say the least.&lt;/p&gt;&lt;p&gt;There is no objective measure to decide on this, and what might be deemed appropriate by one might not be by another. More importantly in the context of our discussion, what one government might judge appropriate might be very different from the next or previous administration.&lt;/p&gt;&lt;p&gt;This is again &lt;strong&gt;a dangerous slippery slope opening the door wide to authoritarian policies&lt;/strong&gt;.&lt;/p&gt;&lt;h3 id=&#34;age-verification-undermines-privacy-and-security&#34;&gt;Age Verification undermines privacy and security&lt;/h3&gt;&lt;p&gt;Secondly, &lt;a href=&#34;https://www.woodhullfoundation.org/fact-checked/online-age-verification-is-not-the-same-as-flashing-your-id-at-a-liquor-store/&#34;&gt;how can age be verified online&lt;/a&gt;? Of course by collecting more data, on everyone. Age Verification policies don&#39;t affect only the children, they affect everyone who wants to access content online. If a website is deemed to display content that should not be accessed by children, the only way to enforce this rule would be to ask for some form of official identity verification from all adults who want to access it.&lt;/p&gt;&lt;p&gt;Proponents of these regulations often refer to &#34;age assurance processes&#34; and suppose these processes to be undoubtedly secure. Anyone familiar with data security will understand how naive this approach is. I will not go into the details here, but you probably can already see how having each private website (or third-party processor) collect such sensitive information from each visitor is horrendous for privacy rights, and data security as well. Of course, these websites or third-party &#34;age assurance processors&#34; will unavoidably become a large treasure trove for thieves, and their sensitive data will be &lt;a href=&#34;https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/&#34;&gt;inevitably leaked or stolen&lt;/a&gt; sooner rather than later.&lt;/p&gt;&lt;p&gt;Age Verification is one of the biggest privacy threats online. Continuing in this direction could ultimately lead to the end of pseudonymous browsing. Additionally, this could also mean the end of your official ID having any value at all. After all, what unique identification value does a piece of ID keep after it has been leaked in a thousand different data breaches? Maybe even one day bought on a &lt;a href=&#34;https://en.wikipedia.org/wiki/Darknet_market&#34;&gt;darknet market&lt;/a&gt; by a curious teenager in need of accessing some website...&lt;/p&gt;&lt;h3 id=&#34;age-verification-is-already-here-sadly&#34;&gt;Age Verification is already here, sadly&lt;/h3&gt;&lt;p&gt;Regrettably, this is not a hypothetical scare. Age Verification legislation has already passed in &lt;a href=&#34;https://www.thehindu.com/news/international/what-is-australias-online-safety-amendment-about-explained/article69026251.ece&#34;&gt;Australia&lt;/a&gt;, in the &lt;a href=&#34;https://www.ofcom.org.uk/online-safety/protecting-children/age-checks-to-protect-children-online/&#34;&gt;UK&lt;/a&gt;, as well as in &lt;a href=&#34;https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/&#34;&gt;many U.S. states&lt;/a&gt;. It is also on the table federally in the &lt;a href=&#34;https://www.eff.org/deeplinks/2024/10/eff-new-york-age-verification-threatens-everyones-speech-and-privacy&#34;&gt;United States&lt;/a&gt;, &lt;a href=&#34;https://www.eff.org/deeplinks/2024/09/canadas-leaders-must-reject-overbroad-age-verification-bill&#34;&gt;Canada&lt;/a&gt;, &lt;a href=&#34;https://www.politico.eu/article/france-doubles-down-on-social-media-age-limit-at-15/&#34;&gt;France&lt;/a&gt;, &lt;a href=&#34;https://www.euractiv.com/section/politics/news/norwegian-government-sets-15-year-age-limit-for-using-social-media/&#34;&gt;Norway&lt;/a&gt;, and &lt;a href=&#34;https://digital-strategy.ec.europa.eu/en/funding/call-tenders-development-consultancy-and-support-age-verification-solution&#34;&gt;Europe&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;There is some &lt;a href=&#34;https://www.eff.org/deeplinks/2024/12/global-age-verification-measures-2024-year-review&#34;&gt;tenacious opposition&lt;/a&gt; to Age Verification policies from digital rights and free speech advocates. Unfortunately, there is also a strong push in support of Age Verification from the rapidly growing &#34;age assurance&#34; and identity verification &lt;a href=&#34;https://avpassociation.com/thought-leadership/2025-the-year-of-implementation-for-age-assurance/&#34;&gt;industry&lt;/a&gt;, and from many governments worldwide &lt;strong&gt;moving towards a surveillance state&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Again, government values are deciding on digital features that impact our data privacy in disastrous ways. If you want to &lt;strong&gt;take a stand against Age Verification&lt;/strong&gt;, you can join the &lt;a href=&#34;https://www.stoponlineidchecks.org/&#34;&gt;Stop Online ID Checks&lt;/a&gt; campaign from the nonprofit organization Fight for the Future.&lt;/p&gt;&lt;h2 id=&#34;the-future-of-privacy&#34;&gt;The future of privacy&lt;/h2&gt;&lt;p&gt;There&#39;s a lot to be worrying about in today&#39;s privacy landscape. Unfortunately, recent political tendencies in the Western world make it difficult to stay optimistic. The trend toward authoritarian regimes and surveillance capitalism is bad news for the future of privacy around the globe.&lt;/p&gt;&lt;p&gt;There is no question that privacy is intrinsically intertwined with politics, and can therefore never be politically neutral. The latest decisions taken by the new U.S. administration running full speed into deregulation and defunding, growing pressure in Europe to break end-to-end encryption in favor of a surveillance state, and invasive age verification policies to censor the web and collect even more data on every netizen is admittedly frightening.&lt;/p&gt;&lt;p&gt;But one thing frightens me even more than all of this. One thing that could end privacy rights, forever. This threat to privacy is never far and always looming.&lt;/p&gt;&lt;p&gt;This threat is giving up.&lt;/p&gt;&lt;p&gt;Despite all the gloom menacing privacy rights, &lt;strong&gt;privacy will never be dead as long as we stand up to defend it&lt;/strong&gt;. Governments might have the power to remove our privacy rights on paper and proclaim privacy features illegal. But the people have the power to keep pushing for better privacy rights and to keep developing even more robust and more accessible privacy tools.&lt;/p&gt;&lt;p&gt;We must continue to advocate loudly for privacy rights and &lt;em&gt;all&lt;/em&gt; human rights every chance we have. The fight for better privacy rights is only over when we give up.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Do not give up.&lt;/strong&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/02/03/the-future-of-privacy/</link> <pubDate>Tue, 25 Mar 2025 20:38:17 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/02/03/the-future-of-privacy/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/02/03/the-future-of-privacy.png" type="image/png" length="None" /> </item> <item> <title>Privacy is Also Protecting the Data of Others</title> <author>Em</author> <category>Explainers</category> <description>&lt;h1 id=&#34;privacy-is-also-protecting-the-data-of-others&#34;&gt;Privacy is Also Protecting the Data of Others&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Illustration from a photo of two children standing in a grass field. The taller child holds a yellow umbrella protecting the smaller child.&#34; src=&#34;../../../../assets/images/the-privacy-of-others/cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Photo: J W / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;In privacy, we talk a lot about how to protect our own data, but what about our responsibility to protect the data of others?&lt;/p&gt;&lt;p&gt;If you care about privacy rights, you must also care for the data of the people around you. To make privacy work, we need to develop a culture that normalizes caring for everyone&#39;s data, not just our own. Privacy cannot solely be a personal responsibility, data privacy is team work.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;Whatever measures and tools you use to protect your own data, you would never be able to protect it fully without the collaboration of others.&lt;/p&gt;&lt;p&gt;In this context, the people around you might be your family or your friends, but also includes your boss, your doctor, your therapist, your school, your government, and any other person or organization that has control over some of your data.&lt;/p&gt;&lt;p&gt;Conversely, you are also in control of other people&#39;s data.&lt;/p&gt;&lt;p&gt;Even if you are not a boss, a doctor, or a therapist yourself, you probably have some photos of your friends, a list of contact information, and copies of sensitive conversations exchanged in private messages with your family. All of this data is under your guard too.&lt;/p&gt;&lt;p&gt;Once you have control over someone else&#39;s data, &lt;strong&gt;you become its guardian&lt;/strong&gt;.&lt;/p&gt;&lt;h2 id=&#34;data-protection-is-a-communal-responsibility&#34;&gt;Data protection is a communal responsibility&lt;/h2&gt;&lt;p&gt;Now to be clear, this isn&#39;t necessarily in relationship with the law, although it can be part of it. In this context, I am referring more to ethics. Do we have a moral obligation to care for and protect others to at least the same level we wish to be protected ourselves?&lt;/p&gt;&lt;p&gt;As a connected society, we constantly exchange information with each other. This information is now mostly stored on digital mediums, and can be very easily duplicated and shared elsewhere. Actually, on a technical level, it&#39;s even &lt;em&gt;difficult&lt;/em&gt; not to constantly involuntarily create duplicates of this data and send it elsewhere.&lt;/p&gt;&lt;p&gt;This is why &lt;strong&gt;we must increase our vigilance&lt;/strong&gt; about protecting the data of others.&lt;/p&gt;&lt;p&gt;Considering the quantity of data that ends up in everyone&#39;s possession, data has become a communal responsibility.&lt;/p&gt;&lt;h2 id=&#34;we-must-develop-a-culture-that-normalizes-data-privacy&#34;&gt;We must develop a culture that normalizes data privacy&lt;/h2&gt;&lt;p&gt;Privacy is a human right, and a good starting point to protect any human right is legislation. Legislation is undeniably an aspect of data privacy that is in constant evolution, and we can hope that privacy laws will only get better over time. Well, let&#39;s not just hope, let&#39;s also work to make sure it does.&lt;/p&gt;&lt;p&gt;That being said, &lt;strong&gt;laws simply aren&#39;t enough&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;To truly improve data privacy rights, we &lt;em&gt;must&lt;/em&gt; integrate them into our &lt;em&gt;whole culture&lt;/em&gt;. This might sound like an over-ambitious endeavor, but culture is flexible and evolves with people&#39;s needs.&lt;/p&gt;&lt;p&gt;In the past few decades, our culture and customs have begun to shift &lt;em&gt;against&lt;/em&gt; data privacy. Some of us are old enough to remember a time when everyone didn&#39;t have a camera in their pocket. At that time, it would have been considered unacceptable in most places to suddenly point a recording camera at a stranger in the street and start filming them without any explanation and without their consent.&lt;/p&gt;&lt;p&gt;Now this kind of disrespectful behavior is a common occurrence, because everyone has the tool to do it. Our society evolved with technological tools, but &lt;strong&gt;we neglected to course-correct our culture for it&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;We have reached a point where we need to develop a culture of individual responsibility towards each other&#39;s data.&lt;/p&gt;&lt;p&gt;This means caring not just for our own data, but &lt;strong&gt;caring for everyone&#39;s data&lt;/strong&gt;, whether it&#39;s the data of our friends, our family, our employees, our patients, or even complete strangers in the streets, or online.&lt;/p&gt;&lt;p&gt;This will take a lot of time and effort, but we owe it to the next generations to start now.&lt;/p&gt;&lt;h2 id=&#34;the-principles-we-should-consider-in-relation-to-privacy&#34;&gt;The principles we should consider in relation to privacy&lt;/h2&gt;&lt;p&gt;Our society already has adopted or improved many ethical principles in the past decades that are intimately linked to data privacy.&lt;/p&gt;&lt;p&gt;Some of these principles and values have become much more prevalent in our culture recently, consent being one great example for this.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Consent&lt;/strong&gt; in privacy is incredibly important. What one person might feel comfortable sharing publicly might be completely different from another person, for example. Privacy cannot be established on a fixed basis without considering individuality and circumstances.&lt;/p&gt;&lt;p&gt;Someone might be happy sharing their name on social media, and someone else might safeguard this information and only use pseudonyms. One person might feel safe sharing their home address online, yet another person could be killed for doing this.&lt;/p&gt;&lt;p&gt;This is why &lt;em&gt;informed&lt;/em&gt; and &lt;em&gt;explicit&lt;/em&gt; individual consent (with true choices) should always be the center of such decisions, for any type of personal information.&lt;/p&gt;&lt;p&gt;Other principles we must integrate in our culture of data privacy include &lt;strong&gt;empathy&lt;/strong&gt; (my threat model isn&#39;t your threat model), &lt;strong&gt;trust and respect&lt;/strong&gt; (secure this data properly if you must collect it), &lt;strong&gt;safety&lt;/strong&gt; (consider someone could get severely harmed by a data breach), and &lt;strong&gt;individual liberties&lt;/strong&gt; (sharing data must be a personal choice, even if there&#39;s no danger, it&#39;s still valid even if it&#39;s just a preference).&lt;/p&gt;&lt;p&gt;Of course, these are only a few principles indispensable to build a culture of data privacy, but since most people are already familiar with these we&#39;ll start here.&lt;/p&gt;&lt;h2 id=&#34;how-we-can-start-building-a-better-culture-around-data-privacy&#34;&gt;How we can start building a better culture around data privacy&lt;/h2&gt;&lt;p&gt;So, what concrete actions can we take &lt;em&gt;right now&lt;/em&gt; to improve our culture around data privacy? What can we do today at the individual level to start better protecting the data of others?&lt;/p&gt;&lt;p&gt;Here are a few practices you can adopt in your daily life to improve the data of the people around you. However, I insist you not just demand others do this for you, but &lt;strong&gt;do this for others too&lt;/strong&gt;. Re-shaping our culture needs to start with ourselves:&lt;/p&gt;&lt;h3 id=&#34;ask-for-consent-before-sharingposting-photos&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M1.2 4.47 2.5 3.2 20 20.72 18.73 22l-2-2H4a2 2 0 0 1-2-2V6c0-.22.04-.43.1-.63zM7 4l2-2h6l2 2h3a2 2 0 0 1 2 2v12c0 .6-.26 1.13-.68 1.5l-4.99-5c.43-.73.67-1.59.67-2.5a5 5 0 0 0-5-5c-.91 0-1.77.24-2.5.67L5.82 4zm0 8a5 5 0 0 0 5 5c.5 0 1.03-.08 1.5-.23L11.72 15A3.064 3.064 0 0 1 9 12.28L7.23 10.5c-.15.47-.23 1-.23 1.5m5-3a3 3 0 0 1 3 3 3 3 0 0 1-.17 1L11 9.17A3 3 0 0 1 12 9&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Ask for consent before sharing/posting photos&lt;/h3&gt;&lt;p&gt;Do not post photos of people online without their prior consent. Especially if there are children involved! Before sharing photos of others online, &lt;em&gt;always&lt;/em&gt; ask for their consent first.&lt;/p&gt;&lt;h3 id=&#34;be-mindful-when-sharing-photos-of-protests&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M9 11.75A1.25 1.25 0 0 0 7.75 13 1.25 1.25 0 0 0 9 14.25 1.25 1.25 0 0 0 10.25 13 1.25 1.25 0 0 0 9 11.75m6 0A1.25 1.25 0 0 0 13.75 13 1.25 1.25 0 0 0 15 14.25 1.25 1.25 0 0 0 16.25 13 1.25 1.25 0 0 0 15 11.75M12 2A10 10 0 0 0 2 12a10 10 0 0 0 10 10 10 10 0 0 0 10-10A10 10 0 0 0 12 2m0 18a8 8 0 0 1-8-8 4 4 0 0 1 0-.86 10.05 10.05 0 0 0 5.26-5.37A9.99 9.99 0 0 0 17.42 10c.76 0 1.51-.09 2.25-.26 1.25 4.26-1.17 8.69-5.41 9.93-.76.22-1.5.33-2.26.33M0 2a2 2 0 0 1 2-2h4v2H2v4H0zm24 20a2 2 0 0 1-2 2h-4v-2h4v-4h2zM2 24a2 2 0 0 1-2-2v-4h2v4h4v2zM22 0a2 2 0 0 1 2 2v4h-2V2h-4V0z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Be mindful when sharing photos of protests&lt;/h3&gt;&lt;p&gt;Be very careful when &lt;a href=&#34;https://www.privacyguides.org/articles/2025/01/23/activists-guide-securing-your-smartphone/&#34;&gt;taking pictures during a protest&lt;/a&gt;. There&#39;s a lot of nuance to this because it&#39;s also important to show protests and make them known (that&#39;s usually the goal!), but in some circumstances people might be put in danger if their faces are shown online associated with certain causes.&lt;/p&gt;&lt;p&gt;Be mindful and make sure no one is singled out without consent in your pictures if you post them online. When possible, try to blur/block the faces of the people you couldn&#39;t ask for consent.&lt;/p&gt;&lt;h3 id=&#34;blur-license-plates&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m5 11 1.5-4.5h11L19 11m-1.5 5a1.5 1.5 0 0 1-1.5-1.5 1.5 1.5 0 0 1 1.5-1.5 1.5 1.5 0 0 1 1.5 1.5 1.5 1.5 0 0 1-1.5 1.5m-11 0A1.5 1.5 0 0 1 5 14.5 1.5 1.5 0 0 1 6.5 13 1.5 1.5 0 0 1 8 14.5 1.5 1.5 0 0 1 6.5 16M18.92 6c-.2-.58-.76-1-1.42-1h-11c-.66 0-1.22.42-1.42 1L3 12v8a1 1 0 0 0 1 1h1a1 1 0 0 0 1-1v-1h12v1a1 1 0 0 0 1 1h1a1 1 0 0 0 1-1v-8z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Blur license plates&lt;/h3&gt;&lt;p&gt;When taking photos in the streets and posting them online, be mindful to blur license plates. This might sound extreme but imagine a situation where someone is a victim of domestic violence and their abuser sees their car parked at a shelter, or at someone&#39;s place. This information could literally get someone killed. Always keep in mind different people have different &lt;a href=&#34;https://www.privacyguides.org/en/basics/threat-modeling/&#34;&gt;threat models&lt;/a&gt;.&lt;/p&gt;&lt;h3 id=&#34;safeguard-contact-information&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20 0H4v2h16zM4 24h16v-2H4zM20 4H4a2 2 0 0 0-2 2v12a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V6a2 2 0 0 0-2-2m-8 2.75A2.25 2.25 0 0 1 14.25 9 2.25 2.25 0 0 1 12 11.25 2.25 2.25 0 0 1 9.75 9 2.25 2.25 0 0 1 12 6.75M17 17H7v-1.5c0-1.67 3.33-2.5 5-2.5s5 .83 5 2.5z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Safeguard contact information&lt;/h3&gt;&lt;p&gt;Never share the contact information of someone with someone else (or something else) without their prior explicit consent. This includes email addresses, phone numbers, legal names, locations, photos, and &lt;em&gt;especially&lt;/em&gt; home addresses. This information in the wrong hands could literally get someone killed. &lt;strong&gt;Always ask first!&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Additionally, be vigilant when importing your contact list in a new application. This could get it shared further than you intended. Ideally, always keep your contact list in an end-to-end encrypted application only.&lt;/p&gt;&lt;h3 id=&#34;be-careful-when-sharing-files-from-and-with-others&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M17 18c.56 0 1 .44 1 1s-.44 1-1 1-1-.44-1-1 .44-1 1-1m0-3c-2.73 0-5.06 1.66-6 4 .94 2.34 3.27 4 6 4s5.06-1.66 6-4c-.94-2.34-3.27-4-6-4m0 6.5a2.5 2.5 0 0 1-2.5-2.5 2.5 2.5 0 0 1 2.5-2.5 2.5 2.5 0 0 1 2.5 2.5 2.5 2.5 0 0 1-2.5 2.5m-7.86-1.75L8.85 19l.29-.74C10.43 15.06 13.5 13 17 13c1.05 0 2.06.21 3 .56V8l-6-6H6c-1.11 0-2 .89-2 2v16a2 2 0 0 0 2 2h4.5c-.55-.66-1-1.42-1.36-2.25M13 3.5 18.5 9H13z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Be careful when sharing files from and with others&lt;/h3&gt;&lt;p&gt;If someone trusted you with a file (photo, music, video, PDF, text file, etc.), always ask for consent before sharing this file with someone else.&lt;/p&gt;&lt;p&gt;Additionally, always keep this file only locally or stored in a secure end-to-end encrypted service. If this person gives you consent to share this file, ensure that metadata has been &lt;a href=&#34;https://www.privacyguides.org/en/data-redaction/&#34;&gt;removed&lt;/a&gt; from it. This person might not be aware of the metadata on this file.&lt;/p&gt;&lt;h3 id=&#34;keep-confidences-secret&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m12 21.35-1.45-1.32C5.4 15.36 2 12.27 2 8.5 2 5.41 4.42 3 7.5 3c1.74 0 3.41.81 4.5 2.08C13.09 3.81 14.76 3 16.5 3 19.58 3 22 5.41 22 8.5c0 3.77-3.4 6.86-8.55 11.53z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Keep confidences secret&lt;/h3&gt;&lt;p&gt;If someone trusts you enough to share something personal with you, do not betray that trust by talking about it with someone else, and &lt;em&gt;especially&lt;/em&gt; not on unencrypted services such as Gmail or Twitter&#39;s DM. In doing so, you would expose this secret to even more unintended recipients. Respect people&#39;s trust in you. Do not share confidences.&lt;/p&gt;&lt;h3 id=&#34;safeguard-and-delete-private-messages-on-social-media&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20 2H4a2 2 0 0 0-2 2v18l4-4h14a2 2 0 0 0 2-2V4a2 2 0 0 0-2-2M6 9h12v2H6m8 3H6v-2h8m4-4H6V6h12&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Safeguard and delete private messages on social media&lt;/h3&gt;&lt;p&gt;If you have private conversations on social media, be mindful not to spread this information elsewhere. If you delete your account, be mindful to also &lt;a href=&#34;https://docs.cyd.social/docs/x/delete#delete-my-direct-messages&#34;&gt;delete&lt;/a&gt; the information of others you have stored in your private messages. If someone wants to share sensitive information with you, always invite them to move to an end-to-end encrypted &lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/&#34;&gt;messaging service&lt;/a&gt; instead.&lt;/p&gt;&lt;h3 id=&#34;safeguard-and-delete-intimate-pictures-you-received&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M5 3h14a2 2 0 0 1 2 2v14a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2m7 14 .72-.66C15.3 14 17 12.46 17 10.57c0-1.54-1.21-2.75-2.75-2.75-.87 0-1.7.41-2.25 1.05a3 3 0 0 0-2.25-1.05C8.21 7.82 7 9.03 7 10.57c0 1.89 1.7 3.43 4.28 5.77z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Safeguard and delete intimate pictures you received&lt;/h3&gt;&lt;p&gt;If someone trust you enough to send you intimate photos of themselves, take this responsibility &lt;em&gt;extremely&lt;/em&gt; seriously. If they use an end-to-end encrypted service, do not move the photos out of there. If you do, you could inadvertently upload them to an unencrypted service and compromise the security of these pictures.&lt;/p&gt;&lt;p&gt;If your relationship with this person ends, you &lt;em&gt;should&lt;/em&gt; delete all intimate pictures you have received. This is extremely important for their safety, and also possibly for &lt;em&gt;yours&lt;/em&gt;. Things could get very problematic legally if your copies were to get accidentally leaked or stolen. No matter how difficult this might be emotionally, do the right thing and delete these pictures fully.&lt;/p&gt;&lt;p&gt;If you are still unconvinced about this one, maybe have a look at Ted Lasso season 3, &lt;a href=&#34;https://screenrant.com/ted-lasso-season-3-episode-8-keeley-story-response/&#34;&gt;episode 8&lt;/a&gt; which has a great story demonstrating the dangers related to this.&lt;/p&gt;&lt;h3 id=&#34;avoid-taking-screenshot-of-peoples-posts&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M7 1a2 2 0 0 0-2 2v18a2 2 0 0 0 2 2h10a2 2 0 0 0 2-2V3a2 2 0 0 0-2-2zm0 3h10v16H7zm2 2v4h1.5V7.5H13V6zm4.5 8v2.5H11V18h4v-4z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Avoid taking screenshot of people&#39;s posts&lt;/h3&gt;&lt;p&gt;Each time you take a screenshot of someone&#39;s post to repost it somewhere else, you are effectively removing this person&#39;s ability to delete their content later. This is horrible for privacy &lt;em&gt;and&lt;/em&gt; for consent. Instead, use links to other people&#39;s posts. That way, if they decide later to delete their content, the link will simply not work anymore, but their right to deletion will remain intact.&lt;/p&gt;&lt;h3 id=&#34;notify-guests-if-you-are-using-a-smart-speaker&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 2A10 10 0 0 0 2 12a10 10 0 0 0 10 10 10 10 0 0 0 10-10A10 10 0 0 0 12 2m0 7a3 3 0 0 1 3 3 3 3 0 0 1-3 3 3 3 0 0 1-3-3 3 3 0 0 1 3-3&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Notify guests if you are using a smart speaker&lt;/h3&gt;&lt;p&gt;If you are using a smart speaker device in your home such as Amazon&#39;s Echo (Alexa), Apple&#39;s HomePod (Siri), Google&#39;s Nest, inform your guests about it when they enter your home. These devices have the &lt;a href=&#34;https://www.makeuseof.com/tag/alexa-amazon-echo-privacy-risk/&#34;&gt;capacity&lt;/a&gt; to record all conversations, and there has already been instances of accidental privacy invasion &lt;a href=&#34;https://www.cnet.com/home/smart-home/alexa-sent-private-audio-to-a-random-contact-portland-family-says/&#34;&gt;reported&lt;/a&gt; about this. Even if you don&#39;t mind yourself, offer your guests to &lt;em&gt;unplug&lt;/em&gt; your smart speaker while they are visiting you. The same is valid for any voice assistant on your phone.&lt;/p&gt;&lt;h3 id=&#34;do-not-use-windows-recall-or-anything-similar&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M11.83 9 15 12.16V12a3 3 0 0 0-3-3zm-4.3.8 1.55 1.55c-.05.21-.08.42-.08.65a3 3 0 0 0 3 3c.22 0 .44-.03.65-.08l1.55 1.55c-.67.33-1.41.53-2.2.53a5 5 0 0 1-5-5c0-.79.2-1.53.53-2.2M2 4.27l2.28 2.28.45.45C3.08 8.3 1.78 10 1 12c1.73 4.39 6 7.5 11 7.5 1.55 0 3.03-.3 4.38-.84l.43.42L19.73 22 21 20.73 3.27 3M12 7a5 5 0 0 1 5 5c0 .64-.13 1.26-.36 1.82l2.93 2.93c1.5-1.25 2.7-2.89 3.43-4.75-1.73-4.39-6-7.5-11-7.5-1.4 0-2.74.25-4 .7l2.17 2.15C10.74 7.13 11.35 7 12 7&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Do not use Windows Recall (or anything similar)&lt;/h3&gt;&lt;p&gt;If you are a Microsoft user, make sure to &lt;a href=&#34;https://www.ytechb.com/how-to-uninstall-microsoft-recall-in-windows-11/&#34;&gt;&lt;em&gt;disable&lt;/em&gt;&lt;/a&gt; Windows Recall from your computer. If it&#39;s enabled, this application will &lt;a href=&#34;https://www.theverge.com/2024/6/3/24170305/microsoft-windows-recall-ai-screenshots-security-privacy-issues&#34;&gt;continuously&lt;/a&gt; take screenshots of your computer, including the faces of anyone video-chatting with you on Signal, the email content of anyone contacting your through Tuta Mail, the secrets of anyone chatting with you on Matrix. Windows Recall completely defeats the protections of anyone using end-to-end encryption to contact you. This is a huge breach of trust! If you somehow use this feature, at least be mindful to disable it each time you communicate with others.&lt;/p&gt;&lt;h3 id=&#34;dont-use-metas-ray-ban-ai-glasses&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 576 512&#34;&gt;&lt;!--! Font Awesome Free 6.7.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2024 Fonticons, Inc.--&gt;&lt;path d=&#34;M118.6 80c-11.5 0-21.4 7.9-24 19.1L57 260.3c20.5-6.2 48.3-12.3 78.7-12.3 32.3 0 61.8 6.9 82.8 13.5 10.6 3.3 19.3 6.7 25.4 9.2 3.1 1.3 5.5 2.4 7.3 3.2.9.4 1.6.7 2.1 1l.6.3.2.1h.1l-6.3 12.7 6.3-12.7c5.8 2.9 10.4 7.3 13.5 12.7h40.6c3.1-5.3 7.7-9.8 13.5-12.7l6.3 12.7-6.3-12.7h.1l.2-.1.6-.3c.5-.2 1.2-.6 2.1-1 1.8-.8 4.2-1.9 7.3-3.2 6.1-2.6 14.8-5.9 25.4-9.2 21-6.6 50.4-13.5 82.8-13.5 30.4 0 58.2 6.1 78.7 12.3L481.4 99.1c-2.6-11.2-12.6-19.1-24-19.1-3.1 0-6.2.6-9.2 1.8l-31.3 12.5c-12.3 4.9-26.3-1.1-31.2-13.4s1.1-26.3 13.4-31.2l31.3-12.5c8.6-3.4 17.7-5.2 27-5.2 33.8 0 63.1 23.3 70.8 56.2l43.9 188c1.7 7.3 2.9 14.7 3.5 22.1.3 1.9.5 3.8.5 5.7v64c0 61.9-50.1 112-112 112h-44.3c-59.4 0-108.5-46.4-111.8-105.8l-1.4-22.2h-37.2l-1.2 22.2C264.9 433.6 215.8 480 156.3 480H112C50.1 480 0 429.9 0 368v-64c0-1.9.2-3.8.5-5.7.6-7.4 1.8-14.8 3.5-22.1l43.9-188C55.5 55.3 84.8 32 118.6 32c9.2 0 18.4 1.8 27 5.2l31.3 12.5c12.3 4.9 18.3 18.9 13.4 31.2s-18.9 18.3-31.2 13.4l-31.3-12.5c-2.9-1.2-6-1.8-9.2-1.8M64 325.4V368c0 26.5 21.5 48 48 48h44.3c25.5 0 46.5-19.9 47.9-45.3l2.5-45.6c-2.3-.8-4.9-1.7-7.5-2.5-17.2-5.4-39.9-10.5-63.6-10.5s-46.2 5.1-63.2 10.5c-3.1 1-5.9 1.9-8.5 2.9zM512 368v-42.6c-2.6-.9-5.5-1.9-8.5-2.9-17-5.4-39.5-10.5-63.2-10.5s-46.4 5.1-63.6 10.5c-2.7.8-5.2 1.7-7.5 2.5l2.5 45.6c1.4 25.4 22.5 45.3 47.9 45.3h44.3c26.5 0 48-21.5 48-48z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Don&#39;t use Meta&#39;s Ray-Ban &#34;AI&#34; glasses!&lt;/h3&gt;&lt;p&gt;Don&#39;t use &#34;smart&#34; glasses recording people.&lt;/p&gt;&lt;p&gt;Just don&#39;t.&lt;/p&gt;&lt;p&gt;Ever.&lt;/p&gt;&lt;p&gt;This is &lt;em&gt;extremely&lt;/em&gt; creepy.&lt;/p&gt;&lt;p&gt;Never buy nor use this.&lt;/p&gt;&lt;p&gt;If you encounter someone in the street wearing this, run away.&lt;/p&gt;&lt;h2 id=&#34;this-is-only-a-start-but-together-we-can-do-this&#34;&gt;This is only a start, but together we can do this&lt;/h2&gt;&lt;p&gt;Improving our culture around data privacy will take time and effort, but we have to start now. The best place to start is with yourself.&lt;/p&gt;&lt;p&gt;Remember:&lt;/p&gt;&lt;p&gt;&#34;Be the change you wish to see in the world.&#34;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Be the data protector you wish to see in the world.&lt;/strong&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/03/10/the-privacy-of-others/</link> <pubDate>Tue, 25 Mar 2025 20:38:17 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/03/10/the-privacy-of-others/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/03/10/the-privacy-of-others.png" type="image/png" length="None" /> </item> <item> <title>Privacy-Respecting European Tech Alternatives</title> <author>Jonah Aragon</author> <category>News</category> <description>&lt;h1 id=&#34;privacy-respecting-european-tech-alternatives&#34;&gt;Privacy-Respecting European Tech Alternatives&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;European Union flag and Privacy Guides logo side by side&#34; src=&#34;../../../../assets/images/private-european-alternatives/eu-alternatives.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides&lt;/small&gt;&lt;/p&gt;&lt;p&gt;There is a growing sentiment that the US shouldn&#39;t be relied upon for the technologies that many people and businesses use every day. Lately, the US has been unilaterally &lt;a href=&#34;https://archive.ph/EJ26f&#34;&gt;cutting off&lt;/a&gt; access to critical technologies to European countries, prompting &lt;a href=&#34;https://techcrunch.com/2025/03/16/european-tech-industry-coalition-calls-for-radical-action-on-digital-sovereignty-starting-with-buying-local/&#34;&gt;calls for &#34;radical action&#34;&lt;/a&gt; to bolster European tech stacks from EU lawmakers.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;At Privacy Guides, we generally value technical guarantees over matters like jurisdiction. There is simply no alternative to privacy technologies like strong &lt;em&gt;end-to-end encryption&lt;/em&gt; when it comes to protecting your information.&lt;/p&gt;&lt;p&gt;That being said, the United States &lt;em&gt;certainly&lt;/em&gt; does not have a monopoly on the best technologies, and many of our favorite &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;recommended tools&lt;/a&gt; come from Europe and all over the world. Tools from the European Union also generally benefit from much stronger data protection laws, thanks to the EU&#39;s General Data Protection Regulation (&lt;abbr title=&#34;General Data Protection Regulation&#34;&gt;GDPR&lt;/abbr&gt;).&lt;/p&gt;&lt;p&gt;If supporting the European tech industry is something that is important to you, here&#39;s a non-exhaustive list of some of our favorites. We have many more recommendations throughout our website if you are interested in learning more about privacy-respecting tech alternatives!&lt;/p&gt;&lt;h2 id=&#34;email-services&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m20 8-8 5-8-5V6l8 5 8-5m0-2H4c-1.11 0-2 .89-2 2v12a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V6a2 2 0 0 0-2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Email Services&lt;/h2&gt;&lt;p&gt;Many people and businesses are tied to Google&#39;s Gmail or Microsoft&#39;s Outlook products, but there are &lt;em&gt;far&lt;/em&gt; more secure and private &lt;a href=&#34;https://www.privacyguides.org/en/email/&#34;&gt;alternative email providers&lt;/a&gt; out there!&lt;/p&gt;&lt;h3 id=&#34;tuta&#34;&gt;Tuta &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt;&lt;/h3&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Tuta logo&#34; src=&#34;../../../../assets/img/email/tuta.svg#only-light&#34; /&gt;&lt;img align=&#34;right&#34; alt=&#34;Tuta logo&#34; src=&#34;../../../../assets/img/email/tuta-dark.svg#only-dark&#34; /&gt;&lt;/p&gt;&lt;p&gt;Based in Hanover, Germany, &lt;strong&gt;Tuta&lt;/strong&gt; is an email service with a focus on security and privacy through the use of encryption. Tuta has been in operation since 2011.&lt;/p&gt;&lt;p&gt;Free accounts start with 1 GB of storage.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/email/#tuta&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://tuta.com&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;proton-mail&#34;&gt;Proton Mail &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt;&lt;/h3&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Proton Mail logo&#34; src=&#34;../../../../assets/img/email/protonmail.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;Based in Geneva, Switzerland, &lt;strong&gt;Proton Mail&lt;/strong&gt; is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013.&lt;/p&gt;&lt;p&gt;The Proton Mail Free plan comes with 500 MB of Mail storage, which you can increase up to 1 GB for free.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/email/#proton-mail&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://proton.me&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;office-suites&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M6 2c-1.11 0-2 .89-2 2v16a2 2 0 0 0 2 2h4v-1.91L12.09 18H6v-2h8.09l2-2H6v-2h12.09L20 10.09V8l-6-6zm7 1.5L18.5 9H13zm7.15 9.5a.55.55 0 0 0-.4.16l-1.02 1.02 2.09 2.08 1.02-1.01c.21-.22.21-.58 0-.79l-1.3-1.3a.54.54 0 0 0-.39-.16m-2.01 1.77L12 20.92V23h2.08l6.15-6.15z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Office Suites&lt;/h2&gt;&lt;p&gt;Of course, email isn&#39;t the only thing offered by solutions like Google Workspace and Microsoft 365. Many people use their entire suite of &lt;a href=&#34;https://www.privacyguides.org/en/document-collaboration/&#34;&gt;productivity tools&lt;/a&gt; to manage their businesses and collaborate with others.&lt;/p&gt;&lt;p&gt;Luckily, there are plenty of alternatives that incorporate strong encryption and can even be self-hosted, which will not only decrease your reliance on the traditional Big Tech companies, but keep your data far more secure as well.&lt;/p&gt;&lt;h3 id=&#34;cryptpad&#34;&gt;CryptPad &lt;img alt=&#34;🇫🇷&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1eb-1f1f7.svg&#34; title=&#34;:flag_fr:&#34; /&gt;&lt;/h3&gt;&lt;p&gt;Developed and hosted by &lt;em&gt;XWiki&lt;/em&gt; in Paris, France, &lt;strong&gt;CryptPad&lt;/strong&gt; is a complete online office suite with applications including Documents, Rich Text, Spreadsheets, Code/Markdown, Kanban, Slides, Whiteboard and Forms.&lt;/p&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;CryptPad logo&#34; src=&#34;../../../../assets/img/document-collaboration/cryptpad.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CryptPad&lt;/strong&gt; is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/document-collaboration/#cryptpad&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://cryptpad.org&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M19 3a2 2 0 0 1 2 2v14a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2zm-3.42 14-.95-4.08 3.16-2.73-4.17-.36L12 6l-1.62 3.84-4.17.36 3.16 2.73L8.42 17 12 14.84z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; We recently did a &lt;a href=&#34;../../../02/07/cryptpad-review/&#34;&gt;full review of CryptPad&lt;/a&gt;, which you should definitely check out if you might be interested in switching!&lt;/p&gt;&lt;h3 id=&#34;nextcloud&#34;&gt;Nextcloud &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt;&lt;/h3&gt;&lt;p&gt;&lt;strong&gt;Nextcloud&lt;/strong&gt; comes from German startup &lt;em&gt;Nextcloud GmbH&lt;/em&gt;, and offers a complete cloud drive alternative to Google Drive or OneDrive.&lt;/p&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Nextcloud logo&#34; src=&#34;../../../../assets/img/document-collaboration/nextcloud.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Nextcloud&lt;/strong&gt; is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/document-collaboration/#nextcloud&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://nextcloud.com&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;libreoffice&#34;&gt;LibreOffice &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt;&lt;/h3&gt;&lt;p&gt;&lt;strong&gt;LibreOffice&lt;/strong&gt; is developed by &lt;em&gt;The Document Foundation&lt;/em&gt; based in Berlin, Germany. It&#39;s a free and open-source office suite with extensive functionality.&lt;/p&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;LibreOffice logo&#34; src=&#34;../../../../assets/img/office-suites/libreoffice.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;Web-based editors aren&#39;t for everyone. If you need a full-fledged office suite that runs locally on your computer, &lt;strong&gt;LibreOffice&lt;/strong&gt; is a fantastic alternative to Microsoft Office.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/office-suites/#libreoffice&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://libreoffice.org&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;search-engines&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m15.5 14 5 5-1.5 1.5-5-5v-.79l-.27-.28A6.47 6.47 0 0 1 9.5 16 6.5 6.5 0 0 1 3 9.5 6.5 6.5 0 0 1 9.5 3 6.5 6.5 0 0 1 16 9.5c0 1.61-.59 3.09-1.57 4.23l.28.27zm-6-9.5-.55.03c-.24.52-.61 1.4-.88 2.47h2.86c-.27-1.07-.64-1.95-.88-2.47-.18-.03-.36-.03-.55-.03M13.83 7a4.94 4.94 0 0 0-2.68-2.22c.24.53.55 1.3.78 2.22zM5.17 7h1.9c.23-.92.54-1.69.78-2.22A4.94 4.94 0 0 0 5.17 7M4.5 9.5c0 .5.08 1.03.23 1.5h2.14l-.12-1.5.12-1.5H4.73c-.15.47-.23 1-.23 1.5m9.77 1.5c.15-.47.23-1 .23-1.5s-.08-1.03-.23-1.5h-2.14a9.5 9.5 0 0 1 0 3zm-6.4-3-.12 1.5.12 1.5h3.26a9.5 9.5 0 0 0 0-3zm1.63 6.5c.18 0 .36 0 .53-.03.25-.52.63-1.4.9-2.47H8.07c.27 1.07.65 1.95.9 2.47zm4.33-2.5h-1.9c-.23.92-.54 1.69-.78 2.22A4.94 4.94 0 0 0 13.83 12m-8.66 0a4.94 4.94 0 0 0 2.68 2.22c-.24-.53-.55-1.3-.78-2.22z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Search Engines&lt;/h2&gt;&lt;p&gt;One of the most frequently used tools on the internet is the venerable search engine. Switching from &lt;strong&gt;Google&lt;/strong&gt; to an &lt;a href=&#34;https://www.privacyguides.org/en/search-engines/&#34;&gt;alternative&lt;/a&gt; is one of the biggest impact approaches to improving your privacy that you can make.&lt;/p&gt;&lt;h3 id=&#34;startpage&#34;&gt;Startpage &lt;img alt=&#34;🇳🇱&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f3-1f1f1.svg&#34; title=&#34;:flag_nl:&#34; /&gt;&lt;/h3&gt;&lt;p&gt;Headquartered and developed in the Netherlands, Startpage is one great alternative to Google you could consider:&lt;/p&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Startpage logo&#34; src=&#34;../../../../assets/img/search-engines/startpage.svg#only-light&#34; /&gt;&lt;img align=&#34;right&#34; alt=&#34;Startpage logo&#34; src=&#34;../../../../assets/img/search-engines/startpage-dark.svg#only-dark&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Startpage&lt;/strong&gt; is a private search engine. One of Startpage&#39;s unique features is the &lt;a href=&#34;https://startpage.com/en/anonymous-view&#34;&gt;Anonymous View&lt;/a&gt;, which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding &lt;a href=&#34;https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details&#34;&gt;some&lt;/a&gt; network and browser properties. However, unlike the name suggests, the feature should not be relied upon for &lt;em&gt;total&lt;/em&gt; anonymity.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/search-engines/#startpage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Homepage&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://startpage.com&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;p&gt;It is worth noting that &lt;a href=&#34;../../../../2020/05/03/relisting-startpage/&#34;&gt;since 2020&lt;/a&gt;, Startpage has been a subsidiary of American company System1. Their operations and employees remain in the Netherlands, and you can choose to utilize only European servers if you wish.&lt;/p&gt;&lt;h2 id=&#34;web-browsers&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M17.9 17.39c-.26-.8-1.01-1.39-1.9-1.39h-1v-3a1 1 0 0 0-1-1H8v-2h2a1 1 0 0 0 1-1V7h2a2 2 0 0 0 2-2v-.41a7.984 7.984 0 0 1 2.9 12.8M11 19.93c-3.95-.49-7-3.85-7-7.93 0-.62.08-1.22.21-1.79L9 15v1a2 2 0 0 0 2 2m1-16A10 10 0 0 0 2 12a10 10 0 0 0 10 10 10 10 0 0 0 10-10A10 10 0 0 0 12 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Web Browsers&lt;/h2&gt;&lt;p&gt;Web browsers are historically very tricky to build, and the three major browser engines, Chromium, Gecko (Firefox), and WebKit (Safari) are all &lt;em&gt;primarily&lt;/em&gt; developed by American companies. This is a space that could certainly use improvement.&lt;/p&gt;&lt;h3 id=&#34;mullvad-browser&#34;&gt;Mullvad Browser &lt;img alt=&#34;🇸🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f8-1f1ea.svg&#34; title=&#34;:flag_se:&#34; /&gt;&lt;/h3&gt;&lt;p&gt;One of our &lt;a href=&#34;https://www.privacyguides.org/en/desktop-browsers/&#34;&gt;recommended browsers&lt;/a&gt; is spearheaded by Swedish &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; company &lt;em&gt;Mullvad&lt;/em&gt;, although it&#39;s worth noting that its development is somewhat reliant on American non-profits Mozilla and the Tor Project, being a Tor Browser &lt;abbr title=&#34;A new software project created by copying an existing project and adding to it independently&#34;&gt;fork&lt;/abbr&gt;.&lt;/p&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Mullvad Browser logo&#34; src=&#34;../../../../assets/img/browsers/mullvad_browser.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Mullvad Browser&lt;/strong&gt; is a version of Tor Browser with Tor network integrations removed. It aims to provide to &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; users Tor Browser&#39;s anti-fingerprinting browser technologies, which are key protections against mass surveillance programs. It is developed by the Tor Project and distributed by Mullvad, although it does &lt;em&gt;not&lt;/em&gt; require the use of Mullvad&#39;s &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/desktop-browsers/#mullvad-browser&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://mullvad.net/en/browser&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;maps-navigation&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m15 19-6-2.11V5l6 2.11M20.5 3h-.16L15 5.1 9 3 3.36 4.9c-.21.07-.36.25-.36.48V20.5a.5.5 0 0 0 .5.5c.05 0 .11 0 .16-.03L9 18.9l6 2.1 5.64-1.9c.21-.1.36-.25.36-.48V3.5a.5.5 0 0 0-.5-.5&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Maps &amp;amp; Navigation&lt;/h2&gt;&lt;p&gt;Mapping and location apps like Google Maps can track your every move, and that data is used by tech companies for a wide variety of purposes, including for military and defense. The best mapping apps for your privacy can be used completely offline:&lt;/p&gt;&lt;h3 id=&#34;organic-maps&#34;&gt;Organic Maps &lt;img alt=&#34;🇪🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ea-1f1ea.svg&#34; title=&#34;:flag_ee:&#34; /&gt;&lt;/h3&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Organic Maps logo&#34; src=&#34;../../../../assets/img/maps/organic-maps.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;Based in Estonia, &lt;strong&gt;Organic Maps&lt;/strong&gt; is an open source, community-developed map display and satnav-style navigation app for walkers, drivers, and cyclists. The app offers worldwide offline maps based on OpenStreetMap data, and navigation with privacy — no location tracking, no data collection, and no ads. The app can be used completely offline.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/maps/#organic-maps&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://organicmaps.app&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;osmand&#34;&gt;OsmAnd &lt;img alt=&#34;🇳🇱&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f3-1f1f1.svg&#34; title=&#34;:flag_nl:&#34; /&gt;&lt;/h3&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;OsmAnd logo&#34; src=&#34;../../../../assets/img/maps/osmand.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;Based in the Netherlands, &lt;strong&gt;OsmAnd&lt;/strong&gt; is an offline map and navigation application based on OpenStreetMap, offering turn-by-turn navigation for walking, cycling, driving, as well as public transport. It is open-source and does not collect any user data.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/maps/#osmand&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://osmand.net&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;password-managers&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M17 7h5v10h-5v2a1 1 0 0 0 1 1h2v2h-2.5c-.55 0-1.5-.45-1.5-1 0 .55-.95 1-1.5 1H12v-2h2a1 1 0 0 0 1-1V5a1 1 0 0 0-1-1h-2V2h2.5c.55 0 1.5.45 1.5 1 0-.55.95-1 1.5-1H20v2h-2a1 1 0 0 0-1 1zM2 7h11v2H4v6h9v2H2zm18 8V9h-3v6zM8.5 12A1.5 1.5 0 0 0 7 10.5 1.5 1.5 0 0 0 5.5 12 1.5 1.5 0 0 0 7 13.5 1.5 1.5 0 0 0 8.5 12m4.5-1.11c-.61-.56-1.56-.51-2.12.11-.56.6-.51 1.55.12 2.11.55.52 1.43.52 2 0z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Password Managers&lt;/h2&gt;&lt;h3 id=&#34;keepassxc&#34;&gt;KeePassXC &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt;&lt;/h3&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;KeePassXC logo&#34; src=&#34;../../../../assets/img/password-management/keepassxc.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;KeePassXC&lt;/strong&gt; is a community &lt;abbr title=&#34;A new software project created by copying an existing project and adding to it independently&#34;&gt;fork&lt;/abbr&gt; of KeePassX, a native cross-platform port of KeePass Password Safe, with the goal of extending and improving it with new features and bug fixes to provide a feature-rich, cross-platform, and modern open-source password manager.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/passwords/#keepassxc&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://keepassxc.org&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M19 3a2 2 0 0 1 2 2v14a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2zm-3.42 14-.95-4.08 3.16-2.73-4.17-.36L12 6l-1.62 3.84-4.17.36 3.16 2.73L8.42 17 12 14.84z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; We recently published an article on &lt;a href=&#34;../../18/installing-keepassxc-and-yubikey/&#34;&gt;securely using KeePassXC with a YubiKey&lt;/a&gt;!&lt;/p&gt;&lt;h3 id=&#34;proton-pass&#34;&gt;Proton Pass &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt;&lt;/h3&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Proton Pass logo&#34; src=&#34;../../../../assets/img/password-management/protonpass.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Proton Pass&lt;/strong&gt; is an open-source, end-to-end encrypted password manager developed by the Swiss company Proton AG, the team behind Proton Mail. It securely stores your login credentials, generates unique email aliases, and supports and stores passkeys.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/passwords/#proton-pass&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://proton.me/pass&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;instant-messengers&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 3c5.5 0 10 3.58 10 8s-4.5 8-10 8c-1.24 0-2.43-.18-3.53-.5C5.55 21 2 21 2 21c2.33-2.33 2.7-3.9 2.75-4.5C3.05 15.07 2 13.13 2 11c0-4.42 4.5-8 10-8m5 9v-2h-2v2zm-4 0v-2h-2v2zm-4 0v-2H7v2z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Instant Messengers&lt;/h2&gt;&lt;p&gt;Switching off of WhatsApp, Facebook Messenger, or iMessage in favor of a more &lt;a href=&#34;https://www.privacyguides.org/en/real-time-communication/&#34;&gt;private instant messenger&lt;/a&gt; is an excellent way to safeguard your chats.&lt;/p&gt;&lt;h3 id=&#34;element&#34;&gt;Element &lt;img alt=&#34;🇬🇧&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ec-1f1e7.svg&#34; title=&#34;:flag_gb:&#34; /&gt;&lt;/h3&gt;&lt;p&gt;Element is based in the United Kingdom, which is of course no longer in the European Union. However, it is a trusted messaging platform by the &lt;a href=&#34;https://element.io/case-studies/tchap&#34;&gt;French government&lt;/a&gt;, and the &lt;a href=&#34;https://element.io/case-studies/bundeswehr&#34;&gt;German military&lt;/a&gt;, among many other organizations in Europe and around the world looking for sovereignty from Big Tech messaging platforms like Slack and Google Messages.&lt;/p&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Element logo&#34; src=&#34;../../../../assets/img/messengers/element.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Element&lt;/strong&gt; is the flagship client for the &lt;a href=&#34;https://matrix.org/docs/chat_basics/matrix-for-im&#34;&gt;Matrix&lt;/a&gt; protocol, an &lt;a href=&#34;https://spec.matrix.org/latest&#34;&gt;open standard&lt;/a&gt; for secure decentralized real-time communication.&lt;/p&gt;&lt;p&gt;Messages and files shared in private rooms (those which require an invite) are by default &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;, as are one-to-one voice and video calls.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/real-time-communication/#element&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://element.io&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;simplex&#34;&gt;SimpleX &lt;img alt=&#34;🇬🇧&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ec-1f1e7.svg&#34; title=&#34;:flag_gb:&#34; /&gt;&lt;/h3&gt;&lt;p&gt;Another open-source option from the United Kingdom, SimpleX chat has very strong security features, and can be entirely self-hosted anywhere in the world if you prefer the assurances a &lt;a href=&#34;https://simplex.chat/docs/server.html&#34;&gt;custom server&lt;/a&gt; can bring.&lt;/p&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Simplex logo&#34; src=&#34;../../../../assets/img/messengers/simplex.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SimpleX Chat&lt;/strong&gt; is an instant messenger that doesn&#39;t depend on any unique identifiers such as phone numbers or usernames. Its decentralized network makes SimpleX Chat an effective tool against censorship.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/real-time-communication/#simplex-chat&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://simplex.chat&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M8 2c1.981 0 3.671.992 4.933 2.078 1.27 1.091 2.187 2.345 2.637 3.023a1.62 1.62 0 0 1 0 1.798c-.45.678-1.367 1.932-2.637 3.023C11.67 13.008 9.981 14 8 14s-3.671-.992-4.933-2.078C1.797 10.83.88 9.576.43 8.898a1.62 1.62 0 0 1 0-1.798c.45-.677 1.367-1.931 2.637-3.022C4.33 2.992 6.019 2 8 2M1.679 7.932a.12.12 0 0 0 0 .136c.411.622 1.241 1.75 2.366 2.717C5.176 11.758 6.527 12.5 8 12.5s2.825-.742 3.955-1.715c1.124-.967 1.954-2.096 2.366-2.717a.12.12 0 0 0 0-.136c-.412-.621-1.242-1.75-2.366-2.717C10.824 4.242 9.473 3.5 8 3.5s-2.825.742-3.955 1.715c-1.124.967-1.954 2.096-2.366 2.717M8 10a2 2 0 1 1-.001-3.999A2 2 0 0 1 8 10&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;briar&#34;&gt;Briar &lt;img alt=&#34;🌍&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f30d.svg&#34; title=&#34;:earth_africa:&#34; /&gt;&lt;/h3&gt;&lt;p&gt;Briar is an open source project not legally incorporated in any jurisdiction, although it has received funding from European initiatives like &lt;a href=&#34;https://ngi.eu/&#34;&gt;NGI&lt;/a&gt; and the &lt;a href=&#34;https://nlnet.nl/&#34;&gt;NLnet Foundation&lt;/a&gt;, and includes many Europeans in their voluntary board and team.&lt;/p&gt;&lt;div class=&#34;admonition recommendation&#34;&gt;&lt;p&gt;&lt;img align=&#34;right&#34; alt=&#34;Briar logo&#34; src=&#34;../../../../assets/img/messengers/briar.svg&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Briar&lt;/strong&gt; is an encrypted instant messenger that &lt;a href=&#34;https://briarproject.org/how-it-works&#34;&gt;connects&lt;/a&gt; to other clients using the Tor Network, making it an effective tool at circumventing censorship. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem.&lt;/p&gt;&lt;p&gt;&lt;a class=&#34;md-button md-button--primary&#34; href=&#34;https://www.privacyguides.org/en/real-time-communication/#briar&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M0 8a8 8 0 1 1 16 0A8 8 0 0 1 0 8m8-6.5a6.5 6.5 0 1 0 0 13 6.5 6.5 0 0 0 0-13M6.5 7.75A.75.75 0 0 1 7.25 7h1a.75.75 0 0 1 .75.75v2.75h.25a.75.75 0 0 1 0 1.5h-2a.75.75 0 0 1 0-1.5h.25v-2h-.25a.75.75 0 0 1-.75-.75M8 6a1 1 0 1 1 0-2 1 1 0 0 1 0 2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; More Info&lt;/a&gt;&lt;a class=&#34;card-link&#34; href=&#34;https://briarproject.org&#34; title=&#34;Homepage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 16 16&#34;&gt;&lt;path d=&#34;M6.906.664a1.75 1.75 0 0 1 2.187 0l5.25 4.2c.415.332.657.835.657 1.367v7.019A1.75 1.75 0 0 1 13.25 15h-3.5a.75.75 0 0 1-.75-.75V9H7v5.25a.75.75 0 0 1-.75.75h-3.5A1.75 1.75 0 0 1 1 13.25V6.23c0-.531.242-1.034.657-1.366l5.25-4.2Zm1.25 1.171a.25.25 0 0 0-.312 0l-5.25 4.2a.25.25 0 0 0-.094.196v7.019c0 .138.112.25.25.25H5.5V8.25a.75.75 0 0 1 .75-.75h3.5a.75.75 0 0 1 .75.75v5.25h2.75a.25.25 0 0 0 .25-.25V6.23a.25.25 0 0 0-.094-.195Z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;more-services&#34;&gt;More Services...&lt;/h2&gt;&lt;p&gt;Looking for more? Here&#39;s a short (and non-exhaustive) list of other recommendations of ours which are based in Europe:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/vpn/&#34;&gt;&lt;strong&gt;&lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt; Services&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇸🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f8-1f1ea.svg&#34; title=&#34;:flag_se:&#34; /&gt; &lt;a href=&#34;https://www.privacyguides.org/en/vpn/#mullvad&#34;&gt;Mullvad&lt;/a&gt; and &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt; &lt;a href=&#34;https://www.privacyguides.org/en/vpn/#proton-vpn&#34;&gt;Proton &lt;abbr title=&#34;Virtual Private Network&#34;&gt;VPN&lt;/abbr&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/dns/#recommended-providers&#34;&gt;&lt;strong&gt;&lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt; Providers&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇫🇷&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1eb-1f1f7.svg&#34; title=&#34;:flag_fr:&#34; /&gt; &lt;a href=&#34;https://dns0.eu/&#34;&gt;dns0.eu&lt;/a&gt;, &lt;img alt=&#34;🇸🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1f8-1f1ea.svg&#34; title=&#34;:flag_se:&#34; /&gt; &lt;a href=&#34;https://mullvad.net/en/help/dns-over-https-and-dns-over-tls&#34;&gt;Mullvad &lt;abbr title=&#34;Domain Name System&#34;&gt;DNS&lt;/abbr&gt;&lt;/a&gt;, and &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt; &lt;a href=&#34;https://quad9.net/&#34;&gt;Quad9&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/calendar/&#34;&gt;&lt;strong&gt;Calendars&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt; &lt;a href=&#34;https://tuta.com/calendar&#34;&gt;Tuta&lt;/a&gt; and &lt;img alt=&#34;🇨🇭&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e8-1f1ed.svg&#34; title=&#34;:flag_ch:&#34; /&gt; &lt;a href=&#34;https://proton.me/calendar&#34;&gt;Proton Calendar&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/notebooks/&#34;&gt;&lt;strong&gt;Notes Apps&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇬🇧&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ec-1f1e7.svg&#34; title=&#34;:flag_gb:&#34; /&gt; &lt;a href=&#34;https://joplinapp.org/&#34;&gt;Joplin&lt;/a&gt; and &lt;img alt=&#34;🇪🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1ea-1f1ea.svg&#34; title=&#34;:flag_ee:&#34; /&gt; &lt;a href=&#34;https://crypt.ee/&#34;&gt;Crypt.ee&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/pastebins/&#34;&gt;&lt;strong&gt;Pastebins&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇫🇷&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1eb-1f1f7.svg&#34; title=&#34;:flag_fr:&#34; /&gt; &lt;a href=&#34;https://privatebin.info/&#34;&gt;PrivateBin&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://www.privacyguides.org/en/desktop/&#34;&gt;&lt;strong&gt;Linux Distros&lt;/strong&gt;&lt;/a&gt;: &lt;img alt=&#34;🇩🇪&#34; class=&#34;twemoji&#34; src=&#34;https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.1.0/assets/svg/1f1e9-1f1ea.svg&#34; title=&#34;:flag_de:&#34; /&gt; &lt;a href=&#34;https://www.opensuse.org/&#34;&gt;openSUSE&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;If you&#39;re in Europe and looking to build or host your &lt;em&gt;own&lt;/em&gt; European technology, there are also plenty of alternatives to the typical American IT providers. Topics like cloud computing platforms, web analytics services, and content delivery networks are currently out of scope for what we cover here at Privacy Guides, but &lt;a href=&#34;https://european-alternatives.eu/&#34;&gt;European Alternatives&lt;/a&gt; is one great resource for finding more services like these.&lt;/p&gt;&lt;p&gt;At the end of the day, we trust &lt;em&gt;all&lt;/em&gt; of our &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;recommended privacy tools&lt;/a&gt; to keep you safe from prying eyes, but there are many valid reasons you may prefer to stick to the European market.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/03/19/private-european-alternatives/</link> <pubDate>Wed, 19 Mar 2025 20:18:17 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/03/19/private-european-alternatives/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/03/19/private-european-alternatives.png" type="image/png" length="None" /> </item> <item> <title>KeePassXC + YubiKey: How to set up a local-only password manager</title> <author>Em</author> <category>Tutorials</category> <description>&lt;h1 id=&#34;keepassxc-yubikey-how-to-set-up-a-local-only-password-manager&#34;&gt;KeePassXC + YubiKey: How to set up a local-only password manager&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Illustration showing a laptop computer with the KeePassXC logo on it. On the right is a green plus sign and a photo of a YubiKey.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-cover.webp&#34; /&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Privacy Guides | Graphics: Yubico | Logo: KeePassXC&lt;/small&gt;&lt;/p&gt;&lt;p&gt;If you are looking for a good remote password manager you can use from anywhere, there are plenty of excellent &lt;a href=&#34;https://www.privacyguides.org/en/passwords/&#34;&gt;options&lt;/a&gt; to choose from. However, if you prefer to only store your passwords locally, &lt;a href=&#34;https://www.privacyguides.org/en/passwords/#keepassxc&#34;&gt;KeePassXC&lt;/a&gt; is what you need. In this tutorial, we will set up KeePassXC to work with &lt;a href=&#34;https://www.privacyguides.org/en/security-keys/#yubikey&#34;&gt;YubiKey&lt;/a&gt; as an additional factor to secure your local-only password database.&lt;!-- more --&gt;&lt;/p&gt;&lt;h2 id=&#34;keepassxc-summary&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 0C5.378 0 0 5.378 0 12c0 6.623 5.378 12 12 12 6.623 0 12-5.377 12-12 0-6.622-5.377-12-12-12m0 .791a11.203 11.203 0 0 1 11.209 11.21A11.2 11.2 0 0 1 12 23.208 11.203 11.203 0 0 1 .791 12 11.203 11.203 0 0 1 12.001.791zm0 1.871a9.4 9.4 0 0 0-1.705.162A1.746 1.746 0 0 0 12 4.95a1.746 1.746 0 0 0 1.706-2.126A9.3 9.3 0 0 0 12 2.662M7.2 4a9.34 9.34 0 0 0-4.54 8 9.338 9.338 0 0 0 18.677 0 9.34 9.34 0 0 0-4.54-7.998 4.89 4.89 0 0 1-2.701 5.365l-.12 2.066 1.482 1.483-1.483 1.482.989.989-.989.988.12 1.857L12 20.328l-2.096-2.096V9.367A4.89 4.89 0 0 1 7.2 4m3.4 6.543v6.99h.7v-6.99z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; KeePassXC summary&lt;/h2&gt;&lt;p&gt;KeePassXC is a free, open-source, and desktop-only password manager. The community-driven project was first released in 2012 and is a &lt;abbr title=&#34;A new software project created by copying an existing project and adding to it independently&#34;&gt;fork&lt;/abbr&gt; of both the &lt;em&gt;KeePass Password Safe&lt;/em&gt; application and &lt;em&gt;KeePassX&lt;/em&gt;, which is no longer actively maintained.&lt;/p&gt;&lt;p&gt;In addition to having its &lt;a href=&#34;https://github.com/keepassxreboot/keepassxc&#34;&gt;code&lt;/a&gt; available for all to see, KeePassXC also went through an independent &lt;a href=&#34;https://keepassxc.org/blog/2023-04-15-audit-report/&#34;&gt;security review&lt;/a&gt; in 2023.&lt;/p&gt;&lt;p&gt;Because it does not automatically sync with any remote cloud service, KeePassXC works offline by default. This offers additional protections for your privacy, and potentially for your security as well, depending on your specific situation.&lt;/p&gt;&lt;h3 id=&#34;platforms&#34;&gt;Platforms&lt;/h3&gt;&lt;p&gt;KeePassXC can run on Linux, macOS, and Windows computers. There is no direct option for a KeePassXC application on mobile. The KeePassXC team &lt;a href=&#34;https://keepassxc.org/docs/#faq-platform-mobile&#34;&gt;suggests&lt;/a&gt; using &lt;a href=&#34;https://www.keepassdx.com/&#34;&gt;KeePassDX&lt;/a&gt; or &lt;a href=&#34;https://play.google.com/store/apps/details?id=keepass2android.keepass2android&#34;&gt;KeePass2Android&lt;/a&gt; on Android phones, and &lt;a href=&#34;https://strongboxsafe.com/&#34;&gt;Strongbox&lt;/a&gt; or &lt;a href=&#34;https://keepassium.com/&#34;&gt;KeePassium&lt;/a&gt; on iPhones.&lt;/p&gt;&lt;h3 id=&#34;database-cloud-backup&#34;&gt;Database cloud backup&lt;/h3&gt;&lt;p&gt;KeePassXC is local-first and will not automatically back up your password database in the cloud. This can be both an advantage for security and privacy, and a disadvantage if something were to happen to your device.&lt;/p&gt;&lt;p&gt;To prevent losing access to your passwords, it is recommended to regularly back up your encrypted database &lt;code&gt;.kdbx&lt;/code&gt; file in a remote &lt;a href=&#34;https://www.privacyguides.org/en/cloud/&#34;&gt;cloud storage&lt;/a&gt; of your choice, or on an encrypted external drive or USB stick.&lt;/p&gt;&lt;p&gt;When copying this file to a third-party cloud service, it will &lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_storing_your_database&#34;&gt;remain fully encrypted&lt;/a&gt; and only get decrypted locally on your device. That being said, it&#39;s still always best to select an end-to-end encrypted cloud storage whenever possible.&lt;/p&gt;&lt;h3 id=&#34;feature-overview&#34;&gt;Feature overview&lt;/h3&gt;&lt;p&gt;This tutorial only covers the basic installation to get you ready using KeePassXC locally, with a main password secured with a YubiKey. However, KeePassXC offers a lot of features you might also want to have a look at.&lt;/p&gt;&lt;p&gt;In addition to the features we will set up here, KeePassXC offers the following:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_passkeys&#34;&gt;Passkey support&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_password_generator&#34;&gt;Password generator&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_command_line_tool&#34;&gt;Command line tool&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_ssh_agent_integration&#34;&gt;&lt;abbr title=&#34;Secure Shell&#34;&gt;SSH&lt;/abbr&gt; agent integration&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_database_sharing_with_keeshare&#34;&gt;KeeShare and groups&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_importing_databases&#34;&gt;Import password databases from 1Password, Bitwarden, Proton Pass, KeePass, &lt;abbr title=&#34;Comma-Separated Values&#34;&gt;CSV&lt;/abbr&gt; files&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_exporting_databases&#34;&gt;Export databases to &lt;abbr title=&#34;Comma-Separated Values&#34;&gt;CSV&lt;/abbr&gt;, HTML, or XML files&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_GettingStarted#_features&#34;&gt;And more&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;whats-new-with-keepassxc-2710&#34;&gt;What&#39;s new with KeePassXC 2.7.10&lt;/h3&gt;&lt;p&gt;On March 4th, KeePassXC released its most recent update. This update includes the capacity to import Proton Pass databases, to generate passphrases using &lt;em&gt;mixed&lt;/em&gt; case (a mix of uppercase and lowercase), and many other &lt;a href=&#34;https://keepassxc.org/blog/2025-03-04-2.7.10-released/&#34;&gt;useful features&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;requirements-and-preparation&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M18 16h-2v-1H8v1H6v-1H2v5h20v-5h-4zm2-8h-3V6c0-1.1-.9-2-2-2H9c-1.1 0-2 .9-2 2v2H4c-1.1 0-2 .9-2 2v4h4v-2h2v2h8v-2h2v2h4v-4c0-1.1-.9-2-2-2m-5 0H9V6h6z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Requirements and preparation&lt;/h2&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Operating systems&lt;/p&gt;&lt;p&gt;This tutorial was completed using macOS, but your experience shouldn&#39;t be much different if you are using Linux or Windows.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;For this tutorial you will need:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Computer running Linux, macOS, or Windows&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Internet connection&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Ability to install software on this computer&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; One or two YubiKeys (ideally two)&lt;/li&gt;&lt;/ul&gt;&lt;h2 id=&#34;setting-up-keepassxc&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 2c5.5 0 10 4.5 10 10s-4.5 10-10 10S2 17.5 2 12 6.5 2 12 2M8 17h8v-2H8zm8-7h-2.5V6h-3v4H8l4 4z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Setting up KeePassXC&lt;/h2&gt;&lt;h3 id=&#34;step-1-download-and-install-keepassxc&#34;&gt;Step 1: Download and Install KeePassXC&lt;/h3&gt;&lt;p&gt;Go to KeePassXC&#39;s download page and download the application version for your operating system. If the website doesn&#39;t detect your system automatically, you can change it on the top menu, or click on the &#34;See more options&#34; yellow button for previous versions.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC website download page.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-1-download.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Verifying signatures&lt;/p&gt;&lt;p&gt;For ideal security, you can verify the authenticity and integrity of the file you just downloaded by verifying the file&#39;s signatures. To do this, &lt;a href=&#34;https://keepassxc.org/verifying-signatures/&#34;&gt;follow the instructions&lt;/a&gt; from the website to guarantee the file you downloaded was created by the KeePassXC Team and has not been tampered with.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Complete the process for your respective &lt;abbr title=&#34;Operating System&#34;&gt;OS&lt;/abbr&gt; to install and open the application once verified.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the application installation window for KeePassXC on macOS.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-2-install.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;On macOS, you will be prompted with a warning message saying &#34;&lt;strong&gt;“KeePassXC.app” is an app downloaded from the Internet. Are you sure you want to open it?&lt;/strong&gt;&#34;, click &#34;Open&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a macOS warning popup before opening an application that was downloaded from the Internet.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-3-installwarning.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;KeePassXC blocks screenshots by default&lt;/p&gt;&lt;p&gt;Interestingly, KeePassXC has a security feature that &lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_screenshot_security&#34;&gt;blocks&lt;/a&gt; screenshots and recordings of the application window on macOS and Windows.&lt;/p&gt;&lt;p&gt;This is a great feature to prevent accidentally sharing your decrypted password database information during a meeting presentation, for example.&lt;/p&gt;&lt;p&gt;Thankfully for writing this tutorial, there is a way to disable it temporarily, but &lt;strong&gt;you&lt;/strong&gt; should definitely keep it on.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-2-adjust-the-settings&#34;&gt;Step 2: Adjust the settings&lt;/h3&gt;&lt;p&gt;Once you have installed and opened KeePassXC, before creating a database for your passwords, click on the &#34;Settings&#34; gear button on the upper-right, on the &lt;em&gt;toolbar&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the Settings section.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-4-settings.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;From there, you will see many options you can adjust to your preferences. The default settings are already good, but you might want to tweak a few things to your specific usage.&lt;/p&gt;&lt;h4 id=&#34;keep-a-previous-version-backup-recommended&#34;&gt;Keep a previous version backup (recommended)&lt;/h4&gt;&lt;p&gt;Scrolling down to the &#34;File Management&#34; section, you might want to enable the option to &#34;Backup database file before saving&#34;. This will ensure you always have a backup of the previous version of your database, in case you accidentally delete important information for example.&lt;/p&gt;&lt;p&gt;You can store this backup in the same or a different directory. You can change this backup&#39;s name or keep the default that will append &lt;code&gt;.old&lt;/code&gt; to your database filename.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the Settings General section with the Backup database file before saving checkbox checked.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-5-backupprevious.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;add-icons-specific-to-each-service-optional&#34;&gt;Add icons specific to each service (optional)&lt;/h4&gt;&lt;p&gt;If you want to use icons specific to each service for your password entries, you can go to the &#34;Security&#34; subsection on the left-side menu, then in &#34;Privacy&#34; at the bottom &lt;em&gt;enable&lt;/em&gt; &#34;Use DuckDuckGo service to download website icons&#34;. This isn&#39;t enabled by default. Then click &#34;OK&#34; on the lower-right.&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Offline only?&lt;/p&gt;&lt;p&gt;Do not enable this if you wish to use KeePassXC offline only. You will still be able to use different default icons for you entries instead of downloading specific icons from the internet.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the Settings Security section with the checkbox for DuckDuckGo checked.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-6-duckduckgo.webp&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;step-3-create-a-database&#34;&gt;Step 3: Create a database&lt;/h3&gt;&lt;p&gt;A database in KeePassXC is an encrypted file that will contain all the passwords you register.&lt;/p&gt;&lt;p&gt;You can use multiple separate databases with KeePassXC. For example, you could have a database for work, a database for your family, and a database for your personal accounts. All stored in separate files with separate main passwords. In the application, each database can be opened in its own tab.&lt;/p&gt;&lt;p&gt;To create a new database, from the Welcome section click on the &#34;Create Database&#34; button on the lower-left.&lt;/p&gt;&lt;p&gt;If you want to create a secondary database, you can also click on the dropdown Database menu on the application menu bar, then select &#34;New Database&#34;.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Importing an existing database&lt;/p&gt;&lt;p&gt;If you already have a password database file in the format &lt;code&gt;.kdbx&lt;/code&gt;, you can import it from the Welcome page by clicking on &#34;Import File&#34; on the lower-right.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;You will see a window pop up with &#34;General Database Information&#34;. Pick a name and description for your database and click on &#34;Continue&#34; at the bottom.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the popup to Create a new KeePassXC database.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-7-databasecreation.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;For the second step, an &#34;Encryption Settings&#34; section will pop up. From there, you will be able to change the settings to your preferences. If you are not familiar with encryption algorithms, simply keep the defaults on and click &#34;Continue&#34; again.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the popup to Create a new KeePassXC database in the Encryption Settings.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-8-databaseencryption.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;For the next step, a &#34;Database Credentials&#34; section will pop up. From there, you will be able to choose a main password to lock your entire password database.&lt;/p&gt;&lt;p&gt;At this step, it is very important to &lt;a href=&#34;https://www.privacyguides.org/en/basics/passwords-overview/#best-practices&#34;&gt;choose a password&lt;/a&gt; that is &lt;strong&gt;unique, complex, and long&lt;/strong&gt;. This is the password that will protect all your other passwords. It should be easy to remember for you, but it must be &lt;em&gt;unique&lt;/em&gt; and &lt;em&gt;long&lt;/em&gt;. Ideally, pick a &lt;strong&gt;passphrase&lt;/strong&gt;.&lt;/p&gt;&lt;h4 id=&#34;generate-a-main-password-optional&#34;&gt;Generate a main password (optional)&lt;/h4&gt;&lt;p&gt;If you do not feel inspired, you can use the &#34;Generate password&#34; dice button on the right to help you pick a strong password.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the popup to Generate Password.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-9-passwordgenerate.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;No matter if you invent or generate your main password/passphrase, &lt;strong&gt;make sure to remember this main password well&lt;/strong&gt;. You cannot rely on your password manager for this one.&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;This step isn&#39;t over yet!&lt;/p&gt;&lt;p&gt;This is where you will be adding your YubiKey to further secure your database. Keep the &#34;Database Credentials&#34; application window open and &lt;strong&gt;continue with the step below&lt;/strong&gt; &lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M9 4h6v8h4.84L12 19.84 4.16 12H9z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;securing-your-database-with-a-yubikey&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 8a1 1 0 0 1 1 1 1 1 0 0 1-1 1 1 1 0 0 1-1-1 1 1 0 0 1 1-1m9 3c0 5.55-3.84 10.74-9 12-5.16-1.26-9-6.45-9-12V5l9-4 9 4zm-9-5a3 3 0 0 0-3 3c0 1.31.83 2.42 2 2.83V18h2v-2h2v-2h-2v-2.17c1.17-.41 2-1.52 2-2.83a3 3 0 0 0-3-3&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Securing your database with a YubiKey&lt;/h2&gt;&lt;p&gt;To add a YubiKey to secure your KeePassXC database, you will first need to prepare your YubiKey(s) for it, if it&#39;s not already ready to use with a &lt;a href=&#34;https://docs.yubico.com/yesdk/users-manual/application-otp/challenge-response.html&#34;&gt;Challenge-Response&lt;/a&gt; application.&lt;/p&gt;&lt;details class=&#34;note&#34;&gt;&lt;summary&gt;Using a YubiKey will not add authentication per se (read more)&lt;/summary&gt;&lt;p&gt;Technically speaking, adding a YubiKey to your KeePassXC database isn&#39;t a second factor of authentication because KeePassXC isn&#39;t a service, therefore it cannot &#34;authenticate&#34; you.&lt;/p&gt;&lt;p&gt;However, adding a YubiKey to secure your KeePassXC database will make decryption of your database more secure by enhancing the encryption key of your database.&lt;/p&gt;&lt;p&gt;The Challenge-Response will remain the same each time you decrypt your database, &lt;em&gt;however&lt;/em&gt;, it will change each time the database is updated (each time there is a change to it, such as adding an entry, removing an entry, adding a note, etc.). Note that the previous versions of your database could get unlocked with your main password + your key&#39;s previous Challenge-Response, however.&lt;/p&gt;&lt;p&gt;If your key&#39;s Challenge-Response were to become compromised, you could update your database (by adding or changing an entry for example), then fully delete all previous versions of your database. This would effectively make all previous Challenge-Response obsolete to unlock your current database.&lt;/p&gt;&lt;p&gt;You can read more on this in KeePassXC&#39;s &lt;a href=&#34;https://keepassxc.org/docs/&#34;&gt;documentation&lt;/a&gt;.&lt;/p&gt;&lt;/details&gt;&lt;h3 id=&#34;step-4-prepare-your-yubikeys&#34;&gt;Step 4: Prepare your YubiKey(s)&lt;/h3&gt;&lt;p&gt;Because you cannot register two YubiKeys for this type of application, you should first make sure that you either have a secure backup for this Challenge-Response, or that you have cloned it to two YubiKeys, or more. This is important in case you were to lose your YubiKey.&lt;/p&gt;&lt;p&gt;If you do have two YubiKeys, we have a &lt;a href=&#34;../../06/yubikey-reset-and-backup/&#34;&gt;guide on how to reset your YubiKeys entirely and set up multiple keys as a backup&lt;/a&gt; which you may be interested in.&lt;/p&gt;&lt;p&gt;If you only need to learn more about the Challenge-Response YubiKey application, jump to &lt;a href=&#34;../../06/yubikey-reset-and-backup/#step-9-create-and-clone-your-keys-challenge-response&#34;&gt;this section&lt;/a&gt; of the tutorial directly.&lt;/p&gt;&lt;h3 id=&#34;step-5-add-your-yubikey&#34;&gt;Step 5: Add your YubiKey&lt;/h3&gt;&lt;p&gt;Once your YubiKey&#39;s Challenge-Response slot has been properly configured and backed up, return to the KeePassXC&#39;s &#34;Database Credentials&#34; window, and click on the &#34;Add additional protection&#34; button in the middle.&lt;/p&gt;&lt;p&gt;This will open a new section with &#34;Key File&#34; and &#34;Challenge-Response&#34; options. Scroll down to &#34;Challenge-Response&#34;. Plug in your YubiKey in your computer&#39;s port (only plug one key at the time), then click on the &#34;Add Challenge-Response&#34; button.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the popup to Create a new KeePassXC database in the Database Credentials section and highlighting the Add Challenge-Response button.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-10-challengeresponse.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition question&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;YubiKey or OnlyKey&lt;/p&gt;&lt;p&gt;You can also use an OnlyKey to secure your KeePassXC database in the same way.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;You should see your YubiKey&#39;s model and serial number listed, and also which YubiKey slot you have stored your Challenge-Response in. Once the correct key is selected, click on &#34;Done&#34; at the bottom.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the popup to Create a new KeePassXC database in the Database Credentials section when a YubiKey is plugged in.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-11-selectyubikey.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;A window will pop up to ask where you want to save your password database. Name your database file and save it in a secure directory on your computer. You will then be asked to touch your YubiKey.&lt;/p&gt;&lt;p&gt;Touch the gold part of your YubiKey to save your database file. You will have to touch your YubiKey each time you save this database, and the file will be saved each time you make changes to it.&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Important! Unlocking your database&lt;/p&gt;&lt;p&gt;Each time you unlock your KeePassXC database, make sure to first plug in your YubiKey and verify that the &#34;Use hardware key&#34; checkbox is checked. Then, enter your main password and touch the gold part of your YubiKey when prompted.&lt;/p&gt;&lt;p&gt;If you do not plug in your YubiKey first, an error will be triggered, and you will be unable to unlock your database.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;using-keepassxc&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 448 512&#34;&gt;&lt;!--! Font Awesome Free 6.7.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2024 Fonticons, Inc.--&gt;&lt;path d=&#34;M224 64c-44.2 0-80 35.8-80 80v48h240c35.3 0 64 28.7 64 64v192c0 35.3-28.7 64-64 64H64c-35.3 0-64-28.7-64-64V256c0-35.3 28.7-64 64-64h16v-48C80 64.5 144.5 0 224 0c57.5 0 107 33.7 130.1 82.3 7.6 16 .8 35.1-15.2 42.6s-35.1.8-42.6-15.2C283.4 82.6 255.9 64 224 64m32 320c17.7 0 32-14.3 32-32s-14.3-32-32-32h-64c-17.7 0-32 14.3-32 32s14.3 32 32 32z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Using KeePassXC&lt;/h2&gt;&lt;p&gt;Using KeePassXC is quite simple and resembles most other password manager applications. The biggest difference is that your passwords will remain stored locally, unless you decide to back up your password database to a cloud service of your choice.&lt;/p&gt;&lt;p&gt;All the options to manage and use your entries credentials will be located on the &lt;em&gt;toolbar&lt;/em&gt; at the top.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing an empty database section.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-12-databasenew.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Locking the database&lt;/p&gt;&lt;p&gt;At all time when the application is open, you can click in the &#34;Lock Database&#34; padlock button on the toolbar to lock your database. You can also adjust the settings to lock your database each time you minimize the application window (this is disabled by default).&lt;/p&gt;&lt;p&gt;Your database will already lock itself automatically when your laptop lid is closed, the session is locked, or if your switch user (unless you disabled these options manually in settings).&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-6-create-a-password-entry&#34;&gt;Step 6: Create a password entry&lt;/h3&gt;&lt;p&gt;To create a &lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_GettingStarted#_entry_handling&#34;&gt;new entry&lt;/a&gt; for a password, click on the &#34;Add a new entry&#34; plus-shaped button on the toolbar.&lt;/p&gt;&lt;p&gt;From this section, you will be able to register a &#34;Title&#34;, &#34;Username&#34;, &#34;Password&#34; (or generate one), &#34;URL&#34; (this is important if you use the browser extension), &#34;Tags&#34;, &#34;Expires&#34; date, &#34;Notes&#34;, and more.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the Add entry section filled with information.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-13-newentry.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Keep your YubiKey plugged in when changing your database&lt;/p&gt;&lt;p&gt;When adding/removing entries or changing your database in any other way, make sure your YubiKey is plugged in. You will have to touch it each time you save changes to your database.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Before saving your entry by clicking &#34;OK&#34; on the lower-right, explore the options on the left-side menu.&lt;/p&gt;&lt;p&gt;For example, in the &#34;Advanced&#34; section you can add additional attributes and store attachments, in the &#34;Icon&#34; section you can select an icon to represent your password entry (or download one from the web), in the &#34;Auto-type&#34; section you can enable/disable Auto-type, and in the &#34;Properties&#34; section you will see additional metadata for this entry.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the Add entry section in the Icon subsection.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-14-entryicons.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Once you have set up all the information you need for this password entry, click &#34;OK&#34; to save it to your database. You will be prompted to touch the gold part of your YubiKey to complete the operation. You should now see your entry listed in your database.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the database section with one password entry filled.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-15-entrycreated.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Each time you need this information, you can select an entry and click on the &#34;Copy username to clipboard&#34; character-shaped button, or the &#34;Copy password to clipboard&#34; key-shaped button, or the &#34;Copy URL to clipboard&#34; earth-shaped button on the toolbar.&lt;/p&gt;&lt;p&gt;The data will stay in your computer&#39;s clipboard for 10 seconds then will get cleared (unless you changed this from the default setting). Once copied, paste this information in the appropriate field for your service.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the database section with all three buttons Username, Password, and URL for entry pointed at with arrows.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-16-useentry.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Accidental deletion danger!&lt;/p&gt;&lt;p&gt;Be careful not to mistakenly click on the dangerous &#34;Delete Entry&#34; trash-shaped button left to the &#34;Copy username to clipboard&#34; button on the toolbar!&lt;/p&gt;&lt;p&gt;You would have to touch your YubiKey to confirm deletion, but remain careful. If you click on it accidentally, do NOT touch your YubiKey to confirm!&lt;/p&gt;&lt;p&gt;If this accident happened to you, you might see your entry has been moved to a &#34;Recycle Bin&#34; directory on the left. Right-click on your entry and select &#34;Restore Entry&#34; at the top of the entry menu. Touch your YubiKey when prompted. You should now see your entry back in the &#34;Root&#34; directory on the left-side menu.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-7-back-up-your-database&#34;&gt;Step 7: Back up your database&lt;/h3&gt;&lt;p&gt;There are many ways to &lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_database_backup_options&#34;&gt;back up&lt;/a&gt; your KeePassXC database:&lt;/p&gt;&lt;h4 id=&#34;automatic-local-backup&#34;&gt;Automatic local backup&lt;/h4&gt;&lt;p&gt;If you enabled this setting on &lt;a href=&#34;#step-2-adjust-the-settings&#34;&gt;Step 2&lt;/a&gt;, you will see a second file getting saved in the same directory with the same name but with an appended &lt;code&gt;.old&lt;/code&gt; to it when you make a change to your password database.&lt;/p&gt;&lt;p&gt;This is the previous version of your database. If you delete a password entry by mistake for example, you can easily restore it with this secondary database backup file.&lt;/p&gt;&lt;h4 id=&#34;manual-backup-from-the-application-menu&#34;&gt;Manual backup from the application menu&lt;/h4&gt;&lt;p&gt;When your database is unlocked, you can click on the dropdown &#34;Database&#34; menu in the application menu bar (not the toolbar), then select &#34;Save Database Backup&#34;.&lt;/p&gt;&lt;p&gt;You will have the option to rename this file and choose a different location. Then, you will be prompted to touch your YubiKey to confirm.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the application menu with the Database dropdown menu rolled down and the Save Database Backup option selected.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-17-savedatabase.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;manual-backup-from-copying-the-database-file&#34;&gt;Manual backup from copying the database file&lt;/h4&gt;&lt;p&gt;Another way to keep a backup of your password database is to simply copy the database &lt;code&gt;.kdbx&lt;/code&gt; file somewhere else.&lt;/p&gt;&lt;p&gt;You can copy this file to another local directory, an external drive (ideally encrypted), or a secure &lt;a href=&#34;https://www.privacyguides.org/en/cloud/&#34;&gt;cloud service&lt;/a&gt; of your choice (ideally an end-to-end encrypted one). Even if your database will be encrypted, it&#39;s always better to choose secure cloud services that offer solid end-to-end encryption.&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Entry history&lt;/p&gt;&lt;p&gt;Within your database, KeePassXC also maintains a history of changes made to each of your entries. You can read more about this feature from KeePassXC&#39;s &lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_history&#34;&gt;documentation&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-8-install-the-browser-extension-optional&#34;&gt;Step 8: Install the browser extension (optional)&lt;/h3&gt;&lt;p&gt;When you need to use KeePassXC to fill credentials in a browser or an app, you can always copy the entry field you need manually, as explained on &lt;a href=&#34;#step-6-create-a-password-entry&#34;&gt;Step 6&lt;/a&gt;. But if you prefer, to facilitate filling credentials for web-based services, you can take advantage of KeePassXC&#39;s &lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_browser_integration&#34;&gt;browser extension&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;To install the extension, go to &lt;a href=&#34;https://keepassxc.org/download/#browser&#34;&gt;this page&lt;/a&gt; from the KeePassXC website and click on your browser&#39;s &lt;em&gt;category&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;This means that for any Firefox-based browser, you can click on the Firefox logo, and for any Chromium-based browser, you can click on the Chrome logo. Some browsers might not be supported, however.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC website page to download the browser extension.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-18-downloadextension.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Privacy warning&lt;/p&gt;&lt;p&gt;Keep in mind that although browser extensions can be very convenient, they can also introduce some risk to your privacy.&lt;/p&gt;&lt;p&gt;Even if the KeePassXC browser extension only &lt;a href=&#34;https://keepassxc.org/privacy/&#34;&gt;runs locally&lt;/a&gt;, it does need to collect some information for its functionalities, and any additional extension installed has the potential to &lt;a href=&#34;https://www.privacyguides.org/en/browser-extensions/&#34;&gt;introduce&lt;/a&gt; a new &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt;.&lt;/p&gt;&lt;p&gt;Additionally, the more unique your combination of hardware, software, and browser extensions is, the more you are vulnerable to &lt;a href=&#34;https://neat.tube/w/fdszTYBKzeoE3ySQUGTzmo&#34;&gt;browser fingerprinting&lt;/a&gt;. Always be mindful to consider your specific threat model when installing new browser extensions.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Once you have installed the extension for your browser, go back to the KeePassXC application and click on the &#34;Settings&#34; gear button on toolbar. Click on &#34;Browser Integration&#34; on the left-side menu and check the box for &#34;Enable browser integration&#34; at the top of the section.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the KeePassXC application showing the Settings section in the Browser Integration subsection with the checkbox for Enable browser integration checked.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-19-browserintegration.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;From this &lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_configure_keepassxc_browser&#34;&gt;section&lt;/a&gt;, check the box for the browser(s) or browser type(s) you have installed the extension on. You can also enable the option &#34;Search in all opened databases for matching credentials&#34; if you are using multiple databases. Then click &#34;OK&#34; on the lower-right to save these options.&lt;/p&gt;&lt;p&gt;Make sure your KeePassXC database is &lt;em&gt;unlocked&lt;/em&gt;, then &lt;strong&gt;restart your browser&lt;/strong&gt;.&lt;/p&gt;&lt;h4 id=&#34;if-you-encounter-an-error-while-running-the-extension&#34;&gt;If you encounter an error while running the extension&lt;/h4&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;You don&#39;t have to use the extension&lt;/p&gt;&lt;p&gt;If you are not able to make the KeePassXC extension work with the browser you use, you can still use KeePassXC by manually copy-pasting your entries&#39; credentials. It can even be a more secure and more private way to use it.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;After installing the extension and enabling it from the KeePassXC settings, you might encounter an error where the KeePassXC icon in a credential field is &lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_GettingStarted#_using_the_browser_extension&#34;&gt;marked&lt;/a&gt; with a red &#34;&lt;strong&gt;X&lt;/strong&gt;&#34;, a red &#34;&lt;strong&gt;!&lt;/strong&gt;&#34;, or a padlock icon.&lt;/p&gt;&lt;p&gt;If this happens, try the following:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;Make sure your KeePassXC application is open, and your database is &lt;em&gt;unlocked&lt;/em&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Check if your YubiKey is &lt;em&gt;plugged&lt;/em&gt; in your computer&#39;s port.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Verify that your browser is &lt;em&gt;compatible&lt;/em&gt; and does not use protections that could block the extension from working.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Follow KeePassXC&#39;s &lt;a href=&#34;https://keepassxc.org/docs/KeePassXC_UserGuide#_using_the_browser_extension&#34;&gt;instructions&lt;/a&gt; to connect your KeePassXC database to your KeePassXC browser extension.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Look for possible solutions from KeePassXC&#39;s &lt;a href=&#34;https://github.com/keepassxreboot/keepassxc-browser/wiki/Troubleshooting-guide&#34;&gt;troubleshooting guide&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the CryptPad website login page showing in the Username field the KeePassXC logo greyed out and marked with a red &amp;quot;X&amp;quot;.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-20-errorconnection.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;filling-credentials-using-the-extension&#34;&gt;Filling credentials using the extension&lt;/h4&gt;&lt;div class=&#34;admonition note&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;The database is connected but the logo is greyed out&lt;/p&gt;&lt;p&gt;If you do not have an entry for this website, or if you have not registered a URL (or the correct one) for this entry, your will see the KeePassXC logo greyed out. This simply means your database could not find any credentials matching this website&#39;s URL.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Once configured and connected properly, you should see a green KeePassXC logo in the credential fields, when you have a corresponding entry in your database.&lt;/p&gt;&lt;p&gt;Click on the green KeePassXC logo to populate all credential fields automatically.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the CryptPad website login page showing in the Username field the KeePassXC logo in green and both the credentials for Username and Password are filled.&#34; src=&#34;../../../../assets/images/installing-keepassxc-and-yubikey/keepassxc-21-credentialsextension.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Congratulation! You&#39;re in!&lt;/p&gt;&lt;p&gt;You are now logged in, thanks to KeePassXC!&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;consider-supporting-keepassxc&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M20 17q.86 0 1.45.6t.58 1.4L14 22l-7-2v-9h1.95l7.27 2.69q.78.31.78 1.12 0 .47-.34.82t-.86.37H13l-1.75-.67-.33.94L13 17zM16 3.23Q17.06 2 18.7 2q1.36 0 2.3 1t1 2.3q0 1.03-1 2.46t-1.97 2.39T16 13q-2.08-1.89-3.06-2.85t-1.97-2.39T10 5.3q0-1.36.97-2.3t2.34-1q1.6 0 2.69 1.23M.984 11H5v11H.984z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Consider supporting KeePassXC&lt;/h2&gt;&lt;p&gt;KeePassXC is a free and open-source project built by the community. If you use and love this application, it&#39;s always a great idea to support the project if you can.&lt;/p&gt;&lt;p&gt;Here are a few ways you can help keep KeePassXC thriving:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;https://github.com/keepassxreboot/keepassxc/blob/develop/.github/CONTRIBUTING.md&#34;&gt;Contributing on GitHub&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://fosstodon.org/@keepassxc&#34;&gt;Following KeePassXC on Mastodon&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&#34;https://keepassxc.org/donate/&#34;&gt;Donating to KeePassXC to help with the development and maintenance of the application&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;For more information on KeePassXC and its many features, you can consult the official &lt;a href=&#34;https://keepassxc.org/docs/&#34;&gt;Documentation and FAQ&lt;/a&gt; or even have a look at KeePassXC&#39;s &lt;a href=&#34;https://github.com/keepassxreboot/keepassxc&#34;&gt;code&lt;/a&gt; on GitHub.&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Unless credited otherwise, all screenshots from: Privacy Guides&lt;/small&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/03/18/installing-keepassxc-and-yubikey/</link> <pubDate>Fri, 14 Mar 2025 00:50:26 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/03/18/installing-keepassxc-and-yubikey/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/03/18/installing-keepassxc-and-yubikey.png" type="image/png" length="None" /> </item> <item> <title>How to Reset Your YubiKey and Create a Backup</title> <author>Em</author> <category>Tutorials</category> <description>&lt;h1 id=&#34;how-to-reset-your-yubikey-and-create-a-backup&#34;&gt;How to Reset Your YubiKey and Create a Backup&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Photo of YubiKey on a table between a MacBook and a phone.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/cover.webp&#34; /&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Yubico&lt;/small&gt;&lt;/p&gt;&lt;p&gt;If you are not familiar with it already, a YubiKey is a physical &lt;a href=&#34;https://www.privacyguides.org/en/security-keys/&#34;&gt;security key&lt;/a&gt; produced by &lt;a href=&#34;https://www.yubico.com/&#34;&gt;Yubico&lt;/a&gt; that can be used for various authentication and security purposes. One common usage is to use it as a second factor of authentication for a &lt;a href=&#34;https://www.yubico.com/works-with-yubikey/catalog/&#34;&gt;service or product&lt;/a&gt;. This tutorial explains how to reset a YubiKey to factory defaults and create a near copy of it for backup purposes.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;The biggest security &lt;em&gt;advantage&lt;/em&gt; to using a physical security key is that it&#39;s something you have that cannot be accessed remotely or easily emulated.&lt;/p&gt;&lt;p&gt;The biggest security &lt;em&gt;disadvantage&lt;/em&gt; of using a physical security key is the risk of losing it. This is why you should always &lt;strong&gt;get two&lt;/strong&gt; physical security keys, to use the second one as a &lt;strong&gt;backup&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;There are many brands of physical security key, but this tutorial is specifically for YubiKey, one of the &lt;a href=&#34;https://www.privacyguides.org/en/security-keys/&#34;&gt;most recommended brands&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;To follow this tutorial, you will need to have &lt;strong&gt;two YubiKeys&lt;/strong&gt; from either the series 5, 5 FIPS, 4, or 4 FIPS. Both these keys should not be currently in use with any of your accounts, as described in &lt;a href=&#34;#step-1-remove-your-keys-from-all-accounts&#34;&gt;Step 1&lt;/a&gt;.&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Danger! Reset is irreversible!&lt;/p&gt;&lt;p&gt;Do &lt;strong&gt;not&lt;/strong&gt; skip Step 1 below! If one or both of your YubiKey(s) are registered with any account before starting the reset, &lt;strong&gt;you must&lt;/strong&gt; first remove the key(s) from this account&#39;s settings.Once a YubiKey application is reset, this operation is irreversible and previous settings will be lost permanently. &lt;strong&gt;Be very careful about this!&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;why-would-you-need-to-reset-your-yubikey&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 8a1 1 0 0 1 1 1 1 1 0 0 1-1 1 1 1 0 0 1-1-1 1 1 0 0 1 1-1m9 3c0 5.55-3.84 10.74-9 12-5.16-1.26-9-6.45-9-12V5l9-4 9 4zm-9-5a3 3 0 0 0-3 3c0 1.31.83 2.42 2 2.83V18h2v-2h2v-2h-2v-2.17c1.17-.41 2-1.52 2-2.83a3 3 0 0 0-3-3&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Why would you need to reset your YubiKey?&lt;/h2&gt;&lt;p&gt;Resetting your YubiKey &lt;em&gt;isn&#39;t&lt;/em&gt; something you should be doing regularly.&lt;/p&gt;&lt;p&gt;If you use your key with a lot of services, it can be a laborious and even dangerous task, for example if you forget to remove an account and get permanently locked out once your key is reset. However, there are a few situations where you might want to do this:&lt;/p&gt;&lt;h3 id=&#34;you-accidentally-doxxed-yourself&#34;&gt;You accidentally &#34;doxxed&#34; yourself&lt;/h3&gt;&lt;p&gt;When using a security key regularly, it isn&#39;t rare to accidentally touch your YubiKey and inadvertently trigger its &lt;a href=&#34;https://docs.yubico.com/yesdk/users-manual/application-otp/challenge-response.html&#34;&gt;Challenge-response&lt;/a&gt; in an inappropriate field. If this happens in the &lt;em&gt;wrong field&lt;/em&gt;, this information could get stored in a service provider&#39;s log files for example.&lt;/p&gt;&lt;p&gt;Perhaps you also just &#34;doxxed&#34; yourself by unintentionally texting your key&#39;s Challenge-response to a puzzled recipient in a personal unencrypted social media Direct Message (true story).&lt;/p&gt;&lt;p&gt;The privacy risk of this is low but, depending on your situation, leaking your YubiKey&#39;s One-Time Password (&lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;) Challenge-response in a plain text field &lt;em&gt;could&lt;/em&gt; technically create a link between accounts. This is because despite the second part of the string changing every time, the first 12 characters are static, meaning this part always remains the same. This static part is the &lt;a href=&#34;https://docs.yubico.com/yesdk/users-manual/application-otp/yubico-otp.html&#34;&gt;Public ID&lt;/a&gt; of your YubiKey. When resetting your YubiKey, you can change this static part.&lt;/p&gt;&lt;h3 id=&#34;your-key-is-compromised&#34;&gt;Your key is compromised&lt;/h3&gt;&lt;p&gt;Another situation that could make you want to reset your YubiKey is if you are in a very high risk situation and a sophisticated malicious actor had physical access to your key, especially if your key&#39;s firmware is &lt;a href=&#34;https://www.yubico.com/support/security-advisories/ysa-2024-03/&#34;&gt;older than 5.7&lt;/a&gt;. If this person or group were able to physically accessed your key with older firmware, under some rare conditions, they &lt;a href=&#34;https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/&#34;&gt;&lt;em&gt;could&lt;/em&gt;&lt;/a&gt; have cloned it.&lt;/p&gt;&lt;p&gt;If you are at risk and this happens to you, you would first need to revoke access to all the services you&#39;ve used your compromised key with.&lt;/p&gt;&lt;p&gt;Then, to re-register a key with your services, the safest course of action would be to get an entirely new set of keys. But if this isn&#39;t possible, a second option could be to reset your key and re-register it with new credentials.&lt;/p&gt;&lt;h3 id=&#34;you-need-to-set-up-a-backup&#34;&gt;You need to set up a backup&lt;/h3&gt;&lt;p&gt;This is the most common situation we will be focusing on. You might need to reset your YubiKeys&#39; applications simply to create a clone of it so that you have a backup.&lt;/p&gt;&lt;p&gt;Keeping a backup of your key is especially important for usages such as setting up a YubiKey as a second factor of authentication with KeePassXC, for example.&lt;/p&gt;&lt;p&gt;Some services will allow you to register two or more &lt;em&gt;different&lt;/em&gt; keys to authenticate your account, but other services might only allow you to register one. This is when you want to make sure your have a backup of this key.&lt;/p&gt;&lt;h2 id=&#34;requirements-and-preparation&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M18 16h-2v-1H8v1H6v-1H2v5h20v-5h-4zm2-8h-3V6c0-1.1-.9-2-2-2H9c-1.1 0-2 .9-2 2v2H4c-1.1 0-2 .9-2 2v4h4v-2h2v2h8v-2h2v2h4v-4c0-1.1-.9-2-2-2m-5 0H9V6h6z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Requirements and preparation&lt;/h2&gt;&lt;p&gt;For this tutorial you will need:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Two YubiKeys (from series 5, 5 FIPS, 4, or 4 FIPS)&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Computer running Linux, macOS, or Windows&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Internet connection&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Ability to install software on this computer&lt;/li&gt;&lt;/ul&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;It is recommended to follow this tutorial from a desktop computer.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-1-remove-your-keys-from-all-accounts&#34;&gt;Step 1: Remove your keys from all accounts&lt;/h3&gt;&lt;p&gt;First, make sure you are &lt;em&gt;not&lt;/em&gt; using these two YubiKeys with any account, service, or product. &lt;strong&gt;The importance of this cannot be stressed enough.&lt;/strong&gt; You do not want to realize next month you are &lt;em&gt;permanently locked out&lt;/em&gt; of an account because you reset your key and forgot it was set up with that account.&lt;/p&gt;&lt;p&gt;If you are using these keys with any account, remove the keys from the setting of each account and test multiple times that you are able to log in without it. Ideally, start with fresh keys.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;YubiKey&#39;s applications can be reset independently&lt;/p&gt;&lt;p&gt;Depending on your situation, you might want to reset one of your YubiKeys&#39; application and not all.&lt;/p&gt;&lt;p&gt;Except for the YubiKey Bio Series Multi-protocol Edition (which we don&#39;t cover in this tutorial), each YubiKey application can be reset independently without affecting the others. You could for example reset your &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; slots without affecting your FIDO2 settings, and vice versa. For this tutorial, we will reset every application. Skip the ones you do not need to reset.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-2-download-and-install-the-yubico-authenticator&#34;&gt;Step 2: Download and install the Yubico Authenticator&lt;/h3&gt;&lt;p&gt;Go to this Yubico website &lt;a href=&#34;https://www.yubico.com/products/yubico-authenticator/#h-download-yubico-authenticator&#34;&gt;page&lt;/a&gt;, click on the link for your specific Operating System, then download and &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/installation.html&#34;&gt;install&lt;/a&gt; the &lt;strong&gt;Yubico Authenticator&lt;/strong&gt; application on your computer.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a browser showing the page to download the Yubico Authenticator.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-1-download.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a YubiKey icon with &amp;quot;Insert your YubiKey&amp;quot;.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-2-yubicoapp.webp&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;step-3-open-the-yubico-authenticator-and-plug-in-your-keys&#34;&gt;Step 3: Open the Yubico Authenticator and plug in your keys&lt;/h3&gt;&lt;p&gt;Open the &lt;strong&gt;Yubico Authenticator&lt;/strong&gt; application. If you can, insert both your YubiKeys in your computer&#39;s ports. If you can&#39;t insert both keys at once, insert your main YubiKey first, then for each step unplug your main key once you are done, plug in your spare key, and repeat each step.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Home menu and 2 YubiKeys plugged in. The application window showing the main YubiKey is colored green.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-3-keysplugged.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;From the &#34;Home&#34; section, you can see your keys&#39; serial number, firmware version, as well as which applications are installed on your key. You can also set labels for each key and change the interface&#39;s color to make it easier to see which key you are configuring.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Home menu with a spare YubiKey. The application window is colored teal.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-4-keyspluggedspare.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;If you don&#39;t see the menu options&lt;/p&gt;&lt;p&gt;If you do not see the menu on the left (Home, Accounts, Passkeys, Certificates, Slots), make the &lt;strong&gt;Yubico Authenticator&lt;/strong&gt; window wider or click on the 3-bar button on the upper-left. If you do not see the menu on the right (Device, Application), click on the 3-dot button on the upper-right.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;resetting-your-yubikey-to-factory-defaults&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 6.5C4 4 6 2 8.5 2S13 4 13 6.5c0 1.96-1.25 3.63-3 4.24V15h3v3h-3v4H7V10.74c-1.75-.61-3-2.28-3-4.24m3 0C7 7.33 7.67 8 8.5 8S10 7.33 10 6.5 9.33 5 8.5 5 7 5.67 7 6.5M18 7h2v6h-2m0 4h2v-2h-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Resetting your YubiKey to factory defaults&lt;/h2&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Disabling applications&lt;/p&gt;&lt;p&gt;From the &#34;Device&#34; menu, you can click on &#34;Toggle applications&#34; to enable or disable applications independently. Note that disabling a YubiKey application doesn&#39;t reset it, all credentials and settings will be &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/settings.html#toggle-yubikey-applications-on-off&#34;&gt;preserved&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-4-delete-your-yubikeys-one-time-password-otp-application&#34;&gt;Step 4: Delete your YubiKey&#39;s One-Time Password (&lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;) application&lt;/h3&gt;&lt;p&gt;This step will not reset your YubiKey&#39;s &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; application to exact factory defaults, but it will emulate a factory reset very closely once you have added new credentials in the following sections.&lt;/p&gt;&lt;h4 id=&#34;41-from-the-yubico-authenticator&#34;&gt;4.1. From the Yubico Authenticator&lt;/h4&gt;&lt;p&gt;Click on the &#34;Slots&#34; button in the left-side menu. You will see 2 slots listed there labeled as &#34;Short touch&#34; and &#34;Long touch&#34; slots. If these slots are configured already, under the label you will see &#34;Slot is configured&#34;. Click on each configured slot.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-5-slots.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;42-delete-credential&#34;&gt;4.2. Delete credential&lt;/h4&gt;&lt;p&gt;This will open a new menu on the right. Click on &#34;Delete credential&#34; (if you cannot see this option, it could be because your program window isn&#39;t big enough, scroll down to see more options).&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section with the Short touch slot selected.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-6-deletecredential.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;A &#34;Delete credential&#34; message will pop up with a warning, click &#34;Delete&#34; on the lower-right.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Delete credential popup.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-7-deletepopup.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Verify that you see both slots labeled with &#34;Slot is empty&#34; in the Slots section.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section with the two slots labeled empty.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-8-slotsempty.webp&#34; /&gt;&lt;/p&gt;&lt;h3 id=&#34;step-5-reset-your-yubikeys-fido2-oath-and-piv-applications&#34;&gt;Step 5: Reset your YubiKey&#39;s FIDO2, OATH, and PIV applications&lt;/h3&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Compatibility:&lt;/p&gt;&lt;p&gt;This step might not work fully with models older than YubiKey 5 and 5 FIPS Series&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;51-reset-oath&#34;&gt;5.1. Reset OATH&lt;/h4&gt;&lt;p&gt;From the &lt;strong&gt;Yubico Authenticator&lt;/strong&gt;, in the &#34;Device&#34; menu on the right, click on &#34;Factory reset&#34;. On the &#34;Factory reset&#34; popup section, click on &#34;OATH&#34;. You will see a checkmark appear over &#34;OATH&#34;, then click on &#34;Reset&#34; on the lower-right.&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Danger! This step is irreversible!&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Reset cannot be reversed!&lt;/strong&gt; Make sure you have properly unpaired all your accounts from this key before clicking &#34;Reset&#34;.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Factory reset popup with the OATH option selected.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-9-reset-oath.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;52-reset-fido2&#34;&gt;5.2. Reset FIDO2&lt;/h4&gt;&lt;p&gt;From the &#34;Device&#34; menu, click on &#34;Factory reset&#34; again. This time click on &#34;FIDO2&#34;. You will see a checkmark appear over &#34;FIDO2&#34;, then click on &#34;Reset&#34; on the lower-right.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing Factory reset popup with the FIDO2 option selected.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-10-reset-fido2.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;You will be prompted to unplug your YubiKey from your computer. Unplug it, wait for the Status message to change with &#34;Reinsert your YubiKey&#34; then plug it in again.&lt;/p&gt;&lt;p&gt;When prompted to &#34;Touch the button on your YubiKey now&#34;, touch the gold part of your key.&lt;/p&gt;&lt;p&gt;You will see a confirmation message saying &#34;&lt;abbr title=&#34;Fast IDentity Online&#34;&gt;FIDO&lt;/abbr&gt; application reset&#34;. You can now click on &#34;Close&#34; on the lower-right.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing Factory reset popup with a warning before reset.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-11-reset-fido2close.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;53-reset-piv&#34;&gt;5.3. Reset PIV&lt;/h4&gt;&lt;p&gt;From the &#34;Device&#34; menu again, click on &#34;Factory reset&#34; again. This time click on &#34;PIV&#34;. You will see a checkmark appear over &#34;PIV&#34;, then click on &#34;Reset&#34; on the lower-right.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing Factory reset popup with the PIV option selected.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-12-reset-piv.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Reset your spare key too!&lt;/p&gt;&lt;p&gt;If you inserted both of your keys at once, click on your spare key on the left-side key menu. Repeat the 3 steps above for your spare key. If you inserted only one key at the time, insert your second key and repeat this process.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-6-reset-your-yubikeys-openpgp-and-yubihsm-auth-applications&#34;&gt;Step 6: Reset your YubiKey&#39;s &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; and YubiHSM Auth applications&lt;/h3&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Compatibility for YubiHSM Auth&lt;/p&gt;&lt;p&gt;The YubiHSM Auth application is only available for YubiKeys with firmware version 5.4 or higher. Use the &lt;strong&gt;Yubico Authenticator&lt;/strong&gt; to determine your YubiKey&#39;s firmware version.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;To reset the &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; and YubiHSM Auth applications of your YubiKey, you will need to install a Yubico &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt; program called &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/ykman/Using_the_ykman_CLI.html&#34;&gt;&lt;strong&gt;ykman &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt;&lt;/strong&gt;&lt;/a&gt; and use a terminal application.&lt;/p&gt;&lt;p&gt;You can install &lt;strong&gt;ykman &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt;&lt;/strong&gt; using a package manager such as &lt;strong&gt;pip&lt;/strong&gt; or &lt;strong&gt;brew&lt;/strong&gt;, or by downloading the package from the Yubico developer&#39;s website:&lt;/p&gt;&lt;h4 id=&#34;61-install-ykman-cli&#34;&gt;6.1. Install ykman &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt;&lt;/h4&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M21 16H3V4h18m0-2H3c-1.11 0-2 .89-2 2v12a2 2 0 0 0 2 2h7v2H8v2h8v-2h-2v-2h7a2 2 0 0 0 2-2V4a2 2 0 0 0-2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; From any &lt;abbr title=&#34;Operating System&#34;&gt;OS&lt;/abbr&gt;, using the &lt;strong&gt;pip&lt;/strong&gt; package manager:&lt;/p&gt;&lt;p&gt;Open a terminal application and type:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;pip install --user yubikey-manager&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;For Linux users&lt;/p&gt;&lt;p&gt;Yubico makes the &lt;strong&gt;ykman &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt;&lt;/strong&gt; Python program files available on its &lt;a href=&#34;https://developers.yubico.com/yubikey-manager/Releases/&#34;&gt;website&lt;/a&gt; and on its &lt;a href=&#34;https://github.com/Yubico/yubikey-manager&#34;&gt;GitHub repository&lt;/a&gt;. Consult the documentation provided to ensure you have all the programs required for the installation. Certain third-party package maintainers might also offer &lt;strong&gt;ykman &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt;&lt;/strong&gt; (also called YubiKey Manager &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt;) for several Linux distributions other than Ubuntu.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M14.62 8.35c-.42.28-1.75 1.04-1.95 1.19-.39.31-.75.29-1.14-.01-.2-.16-1.53-.92-1.95-1.19-.48-.31-.45-.7.08-.92 1.64-.69 3.28-.64 4.91.03.49.21.51.6.05.9m7.22 7.28c-.93-2.09-2.2-3.99-3.84-5.66a4.3 4.3 0 0 1-1.06-1.88c-.1-.33-.17-.67-.24-1.01-.2-.88-.29-1.78-.7-2.61-.73-1.58-2-2.4-3.84-2.47-1.81.05-3.16.81-3.95 2.4-.21.43-.36.88-.46 1.34-.17.76-.32 1.55-.5 2.32-.15.65-.45 1.21-.96 1.71-1.61 1.57-2.9 3.37-3.88 5.35-.14.29-.28.58-.37.88-.19.66.29 1.12.99.96.44-.09.88-.18 1.3-.31.41-.15.57-.05.67.35.65 2.15 2.07 3.66 4.24 4.5 4.12 1.56 8.93-.66 9.97-4.58.07-.27.17-.37.47-.27.46.14.93.24 1.4.35.49.09.85-.16.92-.64.03-.26-.06-.49-.16-.73&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; From Linux (Ubuntu), using the Yubico developer&#39;s website:&lt;/p&gt;&lt;p&gt;On &lt;a href=&#34;https://developers.yubico.com/yubikey-manager/Releases/&#34;&gt;this page&lt;/a&gt;, download the latest &lt;strong&gt;&lt;code&gt;tar.gz&lt;/code&gt;&lt;/strong&gt; file and decompress it. Run the &lt;strong&gt;ykman&lt;/strong&gt; Python program using the command line from the directory you have installed it in.&lt;/p&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M14.62 8.35c-.42.28-1.75 1.04-1.95 1.19-.39.31-.75.29-1.14-.01-.2-.16-1.53-.92-1.95-1.19-.48-.31-.45-.7.08-.92 1.64-.69 3.28-.64 4.91.03.49.21.51.6.05.9m7.22 7.28c-.93-2.09-2.2-3.99-3.84-5.66a4.3 4.3 0 0 1-1.06-1.88c-.1-.33-.17-.67-.24-1.01-.2-.88-.29-1.78-.7-2.61-.73-1.58-2-2.4-3.84-2.47-1.81.05-3.16.81-3.95 2.4-.21.43-.36.88-.46 1.34-.17.76-.32 1.55-.5 2.32-.15.65-.45 1.21-.96 1.71-1.61 1.57-2.9 3.37-3.88 5.35-.14.29-.28.58-.37.88-.19.66.29 1.12.99.96.44-.09.88-.18 1.3-.31.41-.15.57-.05.67.35.65 2.15 2.07 3.66 4.24 4.5 4.12 1.56 8.93-.66 9.97-4.58.07-.27.17-.37.47-.27.46.14.93.24 1.4.35.49.09.85-.16.92-.64.03-.26-.06-.49-.16-.73&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; From Linux (Ubuntu), using Yubico&#39;s &lt;strong&gt;yubico/stable PPA&lt;/strong&gt; type:&lt;/p&gt;&lt;p&gt;Open a terminal application and type:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;span class=&#34;filename&#34;&gt;Terminal&lt;/span&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;sudo apt-add-repository ppa:yubico/stable&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;sudo apt update&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;sudo apt install yubikey-manager&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M18.71 19.5c-.83 1.24-1.71 2.45-3.05 2.47-1.34.03-1.77-.79-3.29-.79-1.53 0-2 .77-3.27.82-1.31.05-2.3-1.32-3.14-2.53C4.25 17 2.94 12.45 4.7 9.39c.87-1.52 2.43-2.48 4.12-2.51 1.28-.02 2.5.87 3.29.87.78 0 2.26-1.07 3.81-.91.65.03 2.47.26 3.64 1.98-.09.06-2.17 1.28-2.15 3.81.03 3.02 2.65 4.03 2.68 4.04-.03.07-.42 1.44-1.38 2.83M13 3.5c.73-.83 1.94-1.46 2.94-1.5.13 1.17-.34 2.35-1.04 3.19-.69.85-1.83 1.51-2.95 1.42-.15-1.15.41-2.35 1.05-3.11&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; From macOS, using the &lt;a href=&#34;https://brew.sh/&#34;&gt;Homebrew&lt;/a&gt; package manager:&lt;/p&gt;&lt;p&gt;Open a terminal application and type:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;brew install ykman&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M18.71 19.5c-.83 1.24-1.71 2.45-3.05 2.47-1.34.03-1.77-.79-3.29-.79-1.53 0-2 .77-3.27.82-1.31.05-2.3-1.32-3.14-2.53C4.25 17 2.94 12.45 4.7 9.39c.87-1.52 2.43-2.48 4.12-2.51 1.28-.02 2.5.87 3.29.87.78 0 2.26-1.07 3.81-.91.65.03 2.47.26 3.64 1.98-.09.06-2.17 1.28-2.15 3.81.03 3.02 2.65 4.03 2.68 4.04-.03.07-.42 1.44-1.38 2.83M13 3.5c.73-.83 1.94-1.46 2.94-1.5.13 1.17-.34 2.35-1.04 3.19-.69.85-1.83 1.51-2.95 1.42-.15-1.15.41-2.35 1.05-3.11&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; From macOS, using the Yubico developer&#39;s website:&lt;/p&gt;&lt;p&gt;On &lt;a href=&#34;https://developers.yubico.com/yubikey-manager/Releases/&#34;&gt;this page&lt;/a&gt;, download the latest &lt;strong&gt;&lt;code&gt;mac.pkg&lt;/code&gt;&lt;/strong&gt; file, then double-click on it to complete the installation.&lt;/p&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M3 12V6.75l6-1.32v6.48zm17-9v8.75l-10 .15V5.21zM3 13l6 .09v6.81l-6-1.15zm17 .25V22l-10-1.91V13.1z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; From Windows, using the Yubico developer&#39;s website:&lt;/p&gt;&lt;p&gt;On &lt;a href=&#34;https://developers.yubico.com/yubikey-manager/Releases/&#34;&gt;this page&lt;/a&gt;, download the latest &lt;strong&gt;&lt;code&gt;win64.msi&lt;/code&gt;&lt;/strong&gt; file, then double-click on it to complete the installation.&lt;/p&gt;&lt;h4 id=&#34;62-navigate-to-the-application-directory&#34;&gt;6.2. Navigate to the application directory&lt;/h4&gt;&lt;p&gt;You might need to navigate to the application&#39;s directory first:&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Installation path&lt;/p&gt;&lt;p&gt;If you have chosen a different installation path from default, you will need to navigate to this installation path instead.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M18.71 19.5c-.83 1.24-1.71 2.45-3.05 2.47-1.34.03-1.77-.79-3.29-.79-1.53 0-2 .77-3.27.82-1.31.05-2.3-1.32-3.14-2.53C4.25 17 2.94 12.45 4.7 9.39c.87-1.52 2.43-2.48 4.12-2.51 1.28-.02 2.5.87 3.29.87.78 0 2.26-1.07 3.81-.91.65.03 2.47.26 3.64 1.98-.09.06-2.17 1.28-2.15 3.81.03 3.02 2.65 4.03 2.68 4.04-.03.07-.42 1.44-1.38 2.83M13 3.5c.73-.83 1.94-1.46 2.94-1.5.13 1.17-.34 2.35-1.04 3.19-.69.85-1.83 1.51-2.95 1.42-.15-1.15.41-2.35 1.05-3.11&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; From macOS, in the terminal navigate to:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;cd /Applications/Yubico\ Authenticator.app/Contents/MacOS/&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M3 12V6.75l6-1.32v6.48zm17-9v8.75l-10 .15V5.21zM3 13l6 .09v6.81l-6-1.15zm17 .25V22l-10-1.91V13.1z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; From Windows, in the command prompt navigate to:&lt;/p&gt;&lt;p&gt;64-bit Systems:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;&amp;quot;C:\Program Files\Yubico\YubiKey Manager CLI\ykman.exe &amp;quot;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;32-bit Systems:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;&amp;quot;C:\Program Files (x86)\Yubico\YubiKey Manager CLI\ykman.exe &amp;quot;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h4 id=&#34;63-reset-the-applications&#34;&gt;6.3. Reset the applications&lt;/h4&gt;&lt;p&gt;To make sure you reset both keys properly in this step, &lt;strong&gt;only plug one key at the time&lt;/strong&gt; in your computer. Complete all the operations, unplug your main key then plug in your &lt;em&gt;spare&lt;/em&gt; key and repeat.&lt;/p&gt;&lt;p&gt;Once your main key is plugged in, in the terminal or command prompt type this line:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;ykman openpgp reset&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;When prompted with this warning, type &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-y&#34;&gt;Y&lt;/kbd&gt;&lt;/span&gt;:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;&amp;quot;WARNING! This will delete all stored OpenPGP keys and data and restore factory settings. Proceed? [y/N]:&amp;quot;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;You should see this confirmation message:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;&amp;quot;Reset complete. OpenPGP data has been cleared and default PINs are set.&amp;quot;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Security warning&lt;/p&gt;&lt;p&gt;This operation will set default PINs for your YubiKey&#39;s &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application.&lt;/p&gt;&lt;p&gt;If you need to use this application later, you will need the default PINs. After reset, you should set up a new unique PIN and Admin PIN for this application, as explained on &lt;a href=&#34;#step-11-generate-and-copy-an-openpgp-key-and-subkeys-to-your-yubikeys&#34;&gt;Step 11&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;You can see more setting commands for this application in Yubico&#39;s &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/ykman/OpenPGP_Commands.html&#34;&gt;documentation&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;From the terminal, type this line:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;ykman hsmauth reset&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;When prompted with this warning, type &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-y&#34;&gt;Y&lt;/kbd&gt;&lt;/span&gt;:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;&amp;quot;WARNING! This will delete all stored YubiHSM Auth data and restore factory setting. Proceed? [y/N]:&amp;quot;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;You should see this confirmation message:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;&amp;quot;Reset complete. All YubiHSM Auth data has been cleared from the YubiKey.&amp;quot;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a terminal window showing the two commands for the OpenPGP and HSMauth resets.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-13-reset-cli.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Reset your spare key too!&lt;/p&gt;&lt;p&gt;Don&#39;t forget to unplug your &lt;em&gt;main&lt;/em&gt; key, plug in your &lt;em&gt;spare&lt;/em&gt; key, and repeat the process from &lt;a href=&#34;#63-reset-the-applications&#34;&gt;Step 6.3&lt;/a&gt; to reset your spare key as well.&lt;/p&gt;&lt;/div&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;The ykman &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt; program&lt;/p&gt;&lt;p&gt;You can use the &lt;strong&gt;ykman &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt;&lt;/strong&gt; program to do a lot more with your YubiKey. If you want to explore this program further, you can consult Yubico&#39;s &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/ykman/Using_the_ykman_CLI.html&#34;&gt;documentation&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;setting-up-and-backing-up-of-your-yubikeys&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M7.5 2c2 0 3.6 1.2 4.2 3H21v3h-3v3h-3V8h-3.3c-.6 1.8-2.3 3-4.2 3C5 11 3 9 3 6.5S5 2 7.5 2m0 3C6.7 5 6 5.7 6 6.5S6.7 8 7.5 8 9 7.3 9 6.5 8.3 5 7.5 5m0 8c2 0 3.6 1.2 4.2 3H21v3h-1v3h-2v-3h-2v3h-3v-3h-1.3c-.6 1.8-2.3 3-4.2 3C5 22 3 20 3 17.5S5 13 7.5 13m0 3c-.8 0-1.5.7-1.5 1.5S6.7 19 7.5 19 9 18.3 9 17.5 8.3 16 7.5 16&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Setting up and backing up of your YubiKeys&lt;/h2&gt;&lt;p&gt;Now that you have a set of two freshly reset YubiKeys, we will set up your main key while creating a backup of each application that allows it to your spare key. The goal here is to create a spare key that you can safely keep as a backup, in the unfortunate event that you were to lose your main key.&lt;/p&gt;&lt;p&gt;Keep in mind that your accounts and services will be only as protected as your &lt;em&gt;least&lt;/em&gt; secured key. Make sure to &lt;strong&gt;protect both keys&lt;/strong&gt; well.&lt;/p&gt;&lt;h3 id=&#34;step-7-secure-your-keys&#34;&gt;Step 7: Secure your keys&lt;/h3&gt;&lt;p&gt;Before starting to use your keys, Yubico &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/piv-certificates.html&#34;&gt;recommends&lt;/a&gt; changing the default &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/piv-certificates.html#changing-the-pin&#34;&gt;PIN&lt;/a&gt;, &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/piv-certificates.html#changing-the-puk&#34;&gt;PUK&lt;/a&gt;, and &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/piv-certificates.html#changing-the-management-key&#34;&gt;Management Key&lt;/a&gt; from their factory values. If you are using a YubiKey from the 5 FIPS Series with firmware 5.7 or later, changing this is required to enter the &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/settings.html#settings-home-fips-status&#34;&gt;FIPS approved mode&lt;/a&gt;.&lt;/p&gt;&lt;h4 id=&#34;71-from-the-yubico-authenticator&#34;&gt;7.1. From the Yubico Authenticator&lt;/h4&gt;&lt;p&gt;On the left-side menu, click on the &#34;Certificates&#34; button. You will see a section for various certificates in the center and in the right-side &#34;Manage&#34; menu, buttons to &#34;Change PIN&#34;, &#34;Change PUK&#34;, and &#34;Management key&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Certificates section.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-14-config-certificates.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;72-change-the-default-pin&#34;&gt;7.2. Change the default PIN&lt;/h4&gt;&lt;p&gt;Click on the &#34;Change PIN&#34; button and a section will pop up. Enter a new PIN that is between 6 and 8 characters long, then click &#34;Save&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Change PIN popup.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-15-config-certificatespin.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;73-change-the-default-puk&#34;&gt;7.3. Change the default PUK&lt;/h4&gt;&lt;p&gt;Click on the &#34;Change PUK&#34; button and a section will pop up. Enter a new PUK number that is between 6 and 8 characters long, then click &#34;Save&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Change PUK popup.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-16-config-certificatespuk.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;74-change-the-default-management-key&#34;&gt;7.4. Change the default Management key&lt;/h4&gt;&lt;p&gt;Click on the &#34;Management key&#34; button and a section will pop up. Enter or generate a &#34;New management key&#34; with a maximum of 64 characters. You can also change the encryption algorithm to &#34;TDES&#34;, &#34;AES128&#34;, &#34;AES192&#34;, or &#34;AES256&#34; and add a pin protection by clicking on &#34;Protect with PIN&#34;. Then click &#34;Save&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Change management key popup.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-17-config-certificateskey.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Secure your spare key too! Don&#39;t forget to repeat all of these steps for your spare key!&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-8-create-and-register-each-keys-otp&#34;&gt;Step 8: Create and register each key&#39;s &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;&lt;/h3&gt;&lt;p&gt;First, you will need to set up your keys&#39; &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; and register them with &lt;a href=&#34;https://www.yubico.com/products/yubicloud/&#34;&gt;YubiCloud&lt;/a&gt;. For security reasons, this setup &lt;a href=&#34;https://support.yubico.com/hc/en-us/articles/360016614880-Can-I-duplicate-a-YubiKey&#34;&gt;cannot be cloned&lt;/a&gt; on your spare key. For services using &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;, you will need to register both of your keys which each service or product.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Add both keys&lt;/p&gt;&lt;p&gt;Each time you secure a new account with your YubiKey, make sure to add both keys right at the start. This will save you the complication of going back to add your spare key to your accounts later on.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;81-from-the-yubico-authenticator&#34;&gt;8.1. From the Yubico Authenticator&lt;/h4&gt;&lt;p&gt;Click on the &#34;Slots&#34; button in the left-side menu. You will see 2 slots listed there labeled as &#34;Short touch&#34; and &#34;Long touch&#34; slots, both slots should be empty after the reset.&lt;/p&gt;&lt;p&gt;Click on the first &#34;Short touch&#34; slot, then on the right-side menu, click on the &#34;Yubico &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;&#34; button in &#34;Setup&#34;. A &#34;Yubico &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;&#34; section will pop up with three text fields.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section with the Yubico OTP button selected on the right.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-18-config-otp.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Yubico OTP popup.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-19-config-otpfields.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;82-for-the-public-id-field&#34;&gt;8.2. For the Public ID field&lt;/h4&gt;&lt;p&gt;The &lt;a href=&#34;https://developers.yubico.com/OTP/OTPs_Explained.html&#34;&gt;&lt;strong&gt;Public ID&lt;/strong&gt;&lt;/a&gt; of your YubiKey will be the first 12 characters of your key&#39;s &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; string. This is the static part that &lt;em&gt;could&lt;/em&gt; technically create a link between your accounts if you leak it somewhere inappropriate.&lt;/p&gt;&lt;p&gt;You can click on the &#34;Use serial&#34; star button on the right to generate a &lt;a href=&#34;https://docs.yubico.com/yesdk/users-manual/application-otp/modhex.html&#34;&gt;ModHex&lt;/a&gt; string from your key&#39;s serial number, or you can type your own manually.&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;If you decide to manually type your Public ID&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Remember the string must be &lt;strong&gt;12-characters&lt;/strong&gt; long&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;You must only choose characters comprised within: &lt;strong&gt;&lt;code&gt;bcdefghijklnrtuv&lt;/code&gt;&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Because this string remains constant, to increase your privacy, favor a random string that isn&#39;t recognizable or specifically interesting. For example, resist the temptation to choose something irresistibly cool like &#34;&lt;code&gt;vvbetterdude&lt;/code&gt;&#34; or &#34;&lt;code&gt;vvfiercenerd&lt;/code&gt;&#34;.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h4 id=&#34;83-for-the-private-id-field&#34;&gt;8.3. For the Private ID field&lt;/h4&gt;&lt;p&gt;The &lt;a href=&#34;https://developers.yubico.com/OTP/OTPs_Explained.html&#34;&gt;&lt;strong&gt;Private ID&lt;/strong&gt;&lt;/a&gt; of your YubiKey will also be 12-characters long but will not show in your key&#39;s &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; string. This &lt;strong&gt;Private ID&lt;/strong&gt; can be used to store a private identity that can be accessed by a remote validation server holding the AES key used to encrypt the &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;.&lt;/p&gt;&lt;p&gt;You can click on the &#34;Generate random&#34; circle-arrow button on the right to generate a random ID, or you can type your own manually.&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;If you decide to manually type your Private ID&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Remember the string must be &lt;strong&gt;12-characters&lt;/strong&gt; long&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;You must only choose characters comprised within: &lt;strong&gt;&lt;code&gt;abcdef0123456789&lt;/code&gt;&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;If you want to increase your privacy, again favor a random string that isn&#39;t recognizable or specifically interesting. For example, resist the overwhelming temptation to choose something unbearably cool like &#34;&lt;code&gt;c0de1337cafe&lt;/code&gt;&#34; or &#34;&lt;code&gt;bada55babe42&lt;/code&gt;&#34;&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;h4 id=&#34;84-for-the-secret-key-field&#34;&gt;8.4. For the Secret key field&lt;/h4&gt;&lt;p&gt;The &lt;strong&gt;Secret key&lt;/strong&gt; of your YubiKey&#39;s &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; is a 32-character long random string. Again, you can click on the &#34;Generate random&#34; circle-arrow button on the right to generate a random Secret key, or you can type your own manually. If you decide to use your own Secret key, characters must be comprised within the allowed &lt;strong&gt;&lt;code&gt;abcdef0123456789&lt;/code&gt;&lt;/strong&gt;.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;To remove automatic carriage return&lt;/p&gt;&lt;p&gt;Automatically once you have filled all the fields, the option &#34;Append&#34; will get a checkmark. This means that each time you trigger your key&#39;s &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;, a carriage return will be added so that you will not have to press &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-enter&#34;&gt;Enter&lt;/kbd&gt;&lt;/span&gt; each time. If you do not wish this to happen, you can click on &#34;Append&#34; to disable it.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;85-save-your-otp-credentials&#34;&gt;8.5. Save your &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; credentials&lt;/h4&gt;&lt;p&gt;On the drop-down menu next to Append at the bottom, click on &#34;No export file&#34; and select &#34;Select file&#34;. This will allow you to save this information locally and create a backup. You will need this information to register your keys later in &lt;a href=&#34;#87-register-your-keys&#34;&gt;Step 8.7&lt;/a&gt;.&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Caution! Safeguard this file properly!&lt;/p&gt;&lt;p&gt;This text file contains sensitive information in plain text. Make sure to pick a location to store it that is secure and encrypted. For example, do &lt;strong&gt;not&lt;/strong&gt; store this file in a cloud service that isn&#39;t end-to-end encrypted. Ideally, only keep this file offline on an encrypted drive.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Yubico OTP popup with all text fields filled.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-20-config-otpfieldsfilled.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a popup Choose File Name window to save a file.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-21-config-otpfile.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Once all the information is filled, click on &#34;Save&#34; at the lower-right. The file you save will have the following coma-separated format:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;[serial_number],[public_id],[private_id],,[secret_key],[date],&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h4 id=&#34;86-set-up-the-otp-credentials-for-your-spare-key&#34;&gt;8.6. Set up the &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; credentials for your spare key&lt;/h4&gt;&lt;p&gt;To set up the &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; for your spare key, go back to the &#34;Slots&#34; section and click on your &lt;em&gt;spare&lt;/em&gt; key listed on the upper-left key menu. If you were only able to plug one key at the time, unplug your &lt;em&gt;main&lt;/em&gt; key and plug in your &lt;em&gt;spare&lt;/em&gt; key. Repeat Steps 8.1 to 8.5 with your spare key. Make sure to select a different file name for &lt;a href=&#34;#85-save-your-otp-credentials&#34;&gt;Step 8.5&lt;/a&gt; to not overwrite your main key&#39;s credential file.&lt;/p&gt;&lt;h4 id=&#34;87-register-your-keys&#34;&gt;8.7. Register your keys&lt;/h4&gt;&lt;p&gt;Now you will need to upload your keys&#39; &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; credentials to the YubiCloud validation service. To avoid confusion, unplug one of your key and only keep one key plugged in at the time during the registration process.&lt;/p&gt;&lt;p&gt;Go to Yubico&#39;s &lt;a href=&#34;https://upload.yubico.com/&#34;&gt;validation page&lt;/a&gt; from a secure browser. Open the credentials file you have saved on &lt;a href=&#34;#85-save-your-otp-credentials&#34;&gt;Step 8.5&lt;/a&gt; and copy each field in the corresponding section.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a browser window showing the Yubico OTP key upload web page.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-22-config-register.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;For the &#34;&lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; from YubiKey&#34; field, click on the text field and touch your key&#39;s gold part to generate it. Then click on &#34;I&#39;m not a robot&#34;, solve the annoying CAPTCHA, and click on &#34;Upload&#34;.&lt;/p&gt;&lt;p&gt;On the next page, you should see &#34;Yubico &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; key upload&#34; and under it the confirmation: &#34;Success!&#34; and &#34;Key upload successful&#34;.&lt;/p&gt;&lt;p&gt;Under you key&#39;s Public ID, you will see 3 steps validating your key. This can take some time, be patient and do not close this page.&lt;/p&gt;&lt;p&gt;Once your key&#39;s &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; credentials are fully uploaded to YubiCloud&#39;s validation server, you will see a &#34;Try it out&#34; green button appear. Click on it.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a browser window showing the Yubico OTP key upload web page validating a key registration.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-23-config-registersuccess.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;On this testing page, you can verify that your key&#39;s &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; slot works properly. Click on the &#34;Yubico &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;&#34; text field and touch the gold part of your key. You should see a small popup message on the lower-left confirming &#34;&lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; is valid&#34;. Try it a few times, then you can close this page.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a browser window showing the Yubico OTP testing web page.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-24-config-tryitout.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Finally, unplug your main key, plug in your &lt;em&gt;spare&lt;/em&gt; key, and repeat this step using your spare key&#39;s saved credentials. It&#39;s important to &lt;strong&gt;register both your main and spare keys&lt;/strong&gt;.&lt;/p&gt;&lt;h3 id=&#34;step-9-create-and-clone-your-keys-challenge-response&#34;&gt;Step 9: Create and clone your key&#39;s Challenge-response&lt;/h3&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;For use with KeePassXC&lt;/p&gt;&lt;p&gt;This step is not necessary for all services, but is important for some services and products that will only allow you to register one key. For example, this is important if you wish to use YubiKey as a second factor to unlock your KeePassXC password database.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;91-from-the-yubico-authenticator&#34;&gt;9.1. From the Yubico Authenticator&lt;/h4&gt;&lt;p&gt;If you can, insert both your main and spare keys at once, and start configuring your main key on the upper-left key menu.&lt;/p&gt;&lt;p&gt;Click on the &#34;Slots&#34; button in the left-side menu. You will see 2 slots listed there labeled as &#34;Short touch&#34; and &#34;Long touch&#34; slots.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section with the Long touch slot selected and the Challenge-response button selected on the right.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-25-config-challenge.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Verify configuration&lt;/p&gt;&lt;p&gt;If you have configured your keys&#39; &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; in the previous step, the &#34;Short touch&#34; slot should now be labeled with &#34;Slot is configured&#34; and the &#34;Long touch&#34; slot should be empty.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Click on the &#34;Long touch&#34; slot, and on the right-side menu click on the &#34;Challenge-response&#34; button in &#34;Setup&#34;. A &#34;Challenge-response&#34; section will pop up with a &#34;Secret key&#34; text field.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Challenge-response popup.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-26-config-challengepopup.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;92-generate-a-secret-key-and-save-it&#34;&gt;9.2. Generate a Secret key and save it&lt;/h4&gt;&lt;p&gt;Click on the &#34;Generate random&#34; circle-arrow button on the right to generate a key. Before clicking save, you must copy this &lt;strong&gt;Secret key&lt;/strong&gt; at least temporarily somewhere safe. This is how you will be able to clone your key&#39;s &lt;a href=&#34;https://docs.yubico.com/yesdk/users-manual/application-otp/challenge-response.html&#34;&gt;Challenge-response&lt;/a&gt; to your spare key.&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Caution! Safeguard this Secret key properly!&lt;/p&gt;&lt;p&gt;This &lt;strong&gt;Secret key&lt;/strong&gt; can be used to clone your YubiKey&#39;s Challenge-response on any other keys.&lt;/p&gt;&lt;p&gt;If you only want to create one spare key, only copy this Secret key to a local text file and delete it fully once the configuration is completed and tested.&lt;/p&gt;&lt;p&gt;If you want to keep it to create more spare keys later on, make sure to choose a location to store it that is secure and encrypted. For example, do &lt;strong&gt;not&lt;/strong&gt; store this Secret key in a cloud service that isn&#39;t end-to-end encrypted. Do &lt;strong&gt;not&lt;/strong&gt; store this Secret key in the same password manager you will unlock it with. Ideally, only keep this Secret key locally, offline, on an encrypted drive.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Click on &#34;Require touch&#34; if you wish to have to touch your YubiKey each time your key&#39;s Challenge-response is solicited. This is recommended as it will limit your key&#39;s Challenge-response being triggered unintentionally. Then, click on &#34;Save&#34; on the lower-right.&lt;/p&gt;&lt;h4 id=&#34;93-clone-your-keys-challenge-response-to-your-spare-key&#34;&gt;9.3. Clone your key&#39;s Challenge-response to your spare key&lt;/h4&gt;&lt;p&gt;Back to the &#34;Slots&#34; section, click on your &lt;em&gt;spare&lt;/em&gt; key in the upper-left key menu. The click on &#34;Long touch&#34; and on &#34;Challenge-response&#34; again. Make sure you have selected your &lt;em&gt;spare key&lt;/em&gt; this time.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section with the spare key selected. The Long touch is labeled empty.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-27-config-challengespare.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;In the &#34;Challenge-response&#34; text field for your &#34;Secret key&#34;, instead of generating a random one, paste the Secret key you have copied from your main key in the previous step. Click again on &#34;Require touch&#34; to enable it if you wish (optional), then click &#34;Save&#34;. You should now see both your spare key&#39;s &#34;Short touch&#34; and &#34;Long touch&#34; labeled as configured.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section with the spare key selected. The Long touch is labeled configured.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-28-config-spareconfigured.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Make a note of which application is in each slot&lt;/p&gt;&lt;p&gt;Although you can swap your YubiKey&#39;s slots, make a note of which application you have set up in which slot. If later on you need to delete an application to configure a different one, you want to make sure you delete the right one.&lt;/p&gt;&lt;/div&gt;&lt;h3 id=&#34;step-10-register-and-copy-your-keys-oath-totps-passkeys-static-passwords-and-oath-hotps&#34;&gt;Step 10: Register and copy your key&#39;s OATH-TOTPs, Passkeys, Static passwords, and OATH-HOTPs&lt;/h3&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;YubiKey only has 2 configurable slots&lt;/p&gt;&lt;p&gt;You can only set up 2 YubiKey slot applications at the time.&lt;/p&gt;&lt;p&gt;If you have already configured the 2 slots for the &lt;strong&gt;Yubico &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;&lt;/strong&gt; and &lt;strong&gt;Challenge-response&lt;/strong&gt; applications, and want to keep it that way, you will have no space to add a Static password or OATH-&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt; codes.&lt;/p&gt;&lt;p&gt;In this case, you might want to skip the optional Steps 10.3, 10.4, and 10.5. You will still be able to add OATH-&lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; codes and Passkeys, because these applications are not stored in slots.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;101-register-and-copy-oath-time-based-one-time-password-oath-totp-codes&#34;&gt;10.1. Register and copy OATH Time-based One-Time Password (OATH-&lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt;) codes&lt;/h4&gt;&lt;p&gt;To copy the OATH-&lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; authentication codes to your spare key, you will need to &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/tips.html#oath-accounts&#34;&gt;use the same QR code&lt;/a&gt; your were provided when originally registering an account on your main key.&lt;/p&gt;&lt;p&gt;When you &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/oath.html#oath-add-an-account&#34;&gt;add a new account&lt;/a&gt; to your YubiKey&#39;s OATH-TOTPs, keep a copy of the QR code provided by the service or product to be able to register it again with your spare key. Ideally, register both keys at once. Make sure to &lt;strong&gt;secure this QR code properly&lt;/strong&gt;, as it could be used to register it with any other authenticator.&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;If you have already registered an account&lt;/p&gt;&lt;p&gt;If you have already registered an account and have not kept the QR code for your spare key, you can deregister your main key from this account and start the process over to add an authenticator app to this account. This time, use the QR code provided to register both keys at once, or securely keep a copy of the QR code to add it later.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Once you have registered a new OATH-&lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; code on your main key, you will not need to provide another time-based one-time password to this account when registering your spare key. You will only need to configure your spare key&#39;s OATH-&lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; code in the &lt;strong&gt;Yubico Authenticator&lt;/strong&gt; application.&lt;/p&gt;&lt;p&gt;If you successfully completed the setup for both your main and spare keys, the OATH-&lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; code generated should be the same on both keys. You will be able to see all the OATH-&lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; codes registered on your keys from the &lt;strong&gt;Yubico Authenticator&lt;/strong&gt;. For this, click on the &#34;Accounts&#34; button on the left-side menu.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Accounts section.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-29-config-oathtotp.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;To keep your accounts secure, delete the copy of the QR code you have kept once you have completed the registration setup for a new OATH-&lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; account on both your main and spare key (unless you need to keep a backup for other purposes).&lt;/p&gt;&lt;p&gt;Additionally, always make sure to note and secure well any account recovery information provided when adding a second factor of authentication. This is important to avoid getting locked out permanently of services or products.&lt;/p&gt;&lt;h4 id=&#34;102-register-and-copy-passkeys&#34;&gt;10.2. Register and copy Passkeys&lt;/h4&gt;&lt;p&gt;To copy your &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/fido2.html#fido2&#34;&gt;&lt;strong&gt;Passkeys&lt;/strong&gt;&lt;/a&gt; to your spare key, simply repeat the same setup process that was used to register the Passkey to your main YubiKey. To see a list of all the Passkeys stored on your key, in the &lt;strong&gt;Yubico Authenticator&lt;/strong&gt; click on the &#34;Passkeys&#34; button on the left-side menu.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Passkeys section.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-30-config-passkeys.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;From the &#34;Passkeys&#34; section, you can also click on the &#34;Set PIN&#34; button the on right to &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/fido2.html#creating-and-managing-the-fido2-pin&#34;&gt;set up a password&lt;/a&gt; protection for your Passkeys.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Set PIN popup.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-31-config-passkeyspin.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;103-optional-delete-yubikeys-slots-to-install-other-applications&#34;&gt;10.3. Optional: Delete YubiKey&#39;s slot(s) to install other application(s)&lt;/h4&gt;&lt;p&gt;If you are not using the &lt;strong&gt;Yubico &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;&lt;/strong&gt; and/or &lt;strong&gt;Challenge-response&lt;/strong&gt; applications installed and copied in the previous steps, you might want to delete one or both slots to install either the &lt;strong&gt;Static password&lt;/strong&gt; or the &lt;strong&gt;OATH-&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt;&lt;/strong&gt; application instead. YubiKeys only have 2 slots, so you cannot use them all at once.&lt;/p&gt;&lt;p&gt;To delete a slot, click on the &#34;Slots&#34; button on the left-side menu, then select the slot you wish to delete. On the right-side menu, scroll down the &#34;Setup&#34; menu and click on &#34;Delete credential&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section with the Long touch selected and the Delete credential button selected on the right.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-32-deleteslot.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;You will be prompted with a warning message, then select &#34;Delete&#34;. &lt;strong&gt;Be careful however&lt;/strong&gt;, once deleted, there will be no way to restore the credentials you had stored there unless you have noted it elsewhere.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Delete credential popup.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-33-deleteslotpopup.webp&#34; /&gt;&lt;/p&gt;&lt;h4 id=&#34;104-optional-setup-and-copy-static-passwords&#34;&gt;10.4. Optional: Setup and copy Static passwords&lt;/h4&gt;&lt;p&gt;To set up the &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/yubico-otp.html#static-passwords&#34;&gt;&lt;strong&gt;Static password&lt;/strong&gt;&lt;/a&gt; application on your key, you must first allocate a slot to it. Click on the &#34;Slots&#34; button on the left-side menu, select the slot you wish to use, then click on &#34;Static password&#34; in the right-side menu.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section with the Long touch slot selected, and the Static password button selected on the right.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-34-config-static.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;A section will pop up with a text field, click on the &#34;Generate random&#34; circle-arrow button on the right to generate a &lt;strong&gt;Password&lt;/strong&gt;. You can click on &#34;Append&#34; to deselect the carriage return if you prefer it removed from the end of your Password. This means you will have to press &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-enter&#34;&gt;Enter&lt;/kbd&gt;&lt;/span&gt; manually to confirm each entry.&lt;/p&gt;&lt;p&gt;By default, the &#34;Keyboard MODHEX&#34; will be selected, but you can select a different &#34;keyboard&#34; if you prefer. This will change the type of characters used in your random Password.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Static password popup with a keyboard selection drop-down menu.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-35-config-statickeyboards.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Before confirming, copy this Password in a secure local text file temporarily. Then click &#34;Save&#34;. Back to the &#34;Slots&#34; section, click on your &lt;em&gt;spare&lt;/em&gt; key in the upper-left key menu. Then click on the same slot you have used with you main key and select again &#34;Static password&#34; on the right. When prompted with the text field again, paste the Password you have copied (make sure to select the same &#34;keyboard&#34; type). Then, click on &#34;Save&#34;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing a Static Password popup with a Password field filled.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-36-config-staticspare.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;If you forgot to note your Static password&lt;/p&gt;&lt;p&gt;You can trigger your &lt;strong&gt;Static password&lt;/strong&gt; from your main key by opening a secure local text file and touch the gold part of your YubiKey. If you have configured your &lt;strong&gt;Static password&lt;/strong&gt; in the &#34;Short touch&#34; slot, only touch the key for a second. If you have configured it in the &#34;Long touch&#34; slot, touch your key for about 3 seconds until a string is generated (make sure not to trigger a different application). You can then copy this Static password string to your spare key.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;105-optional-setup-and-copy-oath-hmac-based-one-time-password-oath-hotp-codes&#34;&gt;10.5. Optional: Setup and copy OATH HMAC-based One-Time Password (OATH-&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt;) codes&lt;/h4&gt;&lt;p&gt;To set up &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/yubico-otp.html#yubico-otp-hotp&#34;&gt;&lt;strong&gt;OATH-&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt;&lt;/strong&gt;&lt;/a&gt; 6 or 8 digits counter-based codes on your YubiKeys, you must first allocate a slot to it. Click on the &#34;Slots&#34; button on the left-side menu, select the slot you wish to use, then click on &#34;OATH-&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt;&#34; in the right-side menu.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing the Slots section with the Long touch slot selected, and the OATH-HOTP button selected in the right.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-37-config-hotp.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;An &#34;OATH-&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt;&#34; section will pop up with a &#34;Secret key&#34; text field. Enter a unique and secure Secret key of your choice.&lt;/p&gt;&lt;p&gt;Make sure the Secret key you choose has:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;A maximum of 32 characters&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;An &lt;strong&gt;even&lt;/strong&gt; number of characters (ex: not 31, but 32 will work)&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Only uses characters comprised within: letters from a to z, numbers from 2 to 7&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div class=&#34;admonition bug&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;If you are asked for an Access code&lt;/p&gt;&lt;p&gt;If you type a Secret key that is longer than 32 characters, you might encounter a bug where an &#34;Access code&#34; window will pop up, even if your key doesn&#39;t have any access code set up. If this happens, verify that your Secret key has 32 or fewer characters, and an even number of characters.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of the Yubico Authenticator application showing an OATH-HOTP popup with a Secret key field filled.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-38-config-oathhotppopup.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Keep a &lt;strong&gt;secure copy of this Secret key in a local text file&lt;/strong&gt;. You will need it to register with the validation server for each account, and for your spare key.&lt;/p&gt;&lt;p&gt;You can click on &#34;Append&#34; to deselect it if you prefer the carriage return not be included at the end of your Secret key. This means you will have to press &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-enter&#34;&gt;Enter&lt;/kbd&gt;&lt;/span&gt; manually to confirm each entry. Select either &#34;6 digits&#34; or &#34;8 digits&#34; for your OATH-&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt; codes, then click &#34;Save&#34;.&lt;/p&gt;&lt;p&gt;To configure your spare key for the &lt;a href=&#34;https://www.yubico.com/resources/glossary/oath-hotp/&#34;&gt;OATH-&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt;&lt;/a&gt; counter-based codes, you will need to repeat this step with your &lt;em&gt;spare&lt;/em&gt; key and use the &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/tips.html#register-a-spare-yubikey&#34;&gt;same&lt;/a&gt; OATH-&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt; Secret key and &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; length as your main key&#39;s configuration.&lt;/p&gt;&lt;h3 id=&#34;step-11-generate-and-copy-an-openpgp-key-and-subkeys-to-your-yubikeys&#34;&gt;Step 11: Generate and copy an &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key and subkeys to your YubiKeys&lt;/h3&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Default PINs&lt;/p&gt;&lt;p&gt;If you have reset the &lt;strong&gt;&lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application&lt;/strong&gt; on &lt;a href=&#34;#63-reset-the-applications&#34;&gt;Step 6.3&lt;/a&gt;, you will need both default PINs to set up new ones. After a factory reset of the &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application, the default PIN is &#34;123456&#34;, and the default Admin PIN is &#34;12345678&#34;.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;111-secure-your-yubikeys-openpgp-application-with-a-new-pin-and-admin-pin&#34;&gt;11.1. Secure your YubiKeys&#39; &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application with a new PIN and Admin PIN&lt;/h4&gt;&lt;p&gt;To secure this application after a reset, you should first set up new unique PINs for it. To do so, you will need to use the &lt;strong&gt;ykman &lt;abbr title=&#34;Command Line Interface&#34;&gt;CLI&lt;/abbr&gt;&lt;/strong&gt; program you have installed on &lt;a href=&#34;#61-install-ykman-cli&#34;&gt;Step 6.1&lt;/a&gt; from a terminal application.&lt;/p&gt;&lt;p&gt;First, navigate to the application directory as described on &lt;a href=&#34;#62-navigate-to-the-application-directory&#34;&gt;Step 6.2&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;To change the first &lt;strong&gt;default PIN&lt;/strong&gt;, type the following command in the terminal:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;ykman openpgp access change-pin&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;When prompted, enter the default PIN: &lt;strong&gt;123456&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Then, enter a &lt;strong&gt;new unique 6-127 digits PIN&lt;/strong&gt;, and confirm this new PIN.&lt;/p&gt;&lt;p&gt;Your terminal should confirm with the message &#34;User PIN has been changed.&#34; Note this new PIN somewhere secure where you will find it back easily, you will need it for the next steps.&lt;/p&gt;&lt;p&gt;To change the &lt;strong&gt;default Admin PIN&lt;/strong&gt;, type the following command in the terminal:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;ykman openpgp access change-admin-pin&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;When prompted, enter the default PIN: &lt;strong&gt;12345678&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Then, enter a &lt;strong&gt;new unique 8-127 digits PIN&lt;/strong&gt;, and confirm this new Admin PIN.&lt;/p&gt;&lt;p&gt;Your terminal should confirm with the message &#34;Admin PIN has been changed.&#34; Note this new Admin PIN somewhere secure where you will find it back easily, you will need it for the next steps.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a terminal window showing the commands to change the OpenPGP PIN and Admin PIN.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-39-config-pgppins.webp&#34; /&gt;&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Secure your spare key as well!&lt;/p&gt;&lt;p&gt;Unplug your &lt;em&gt;main&lt;/em&gt; YubiKey and plug in your &lt;em&gt;spare&lt;/em&gt; YubiKey. Repeat these steps to secure your spare key as well.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;112-open-or-install-the-appropriate-gpg-application-for-your-os&#34;&gt;11.2. Open or install the appropriate &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; application for your &lt;abbr title=&#34;Operating System&#34;&gt;OS&lt;/abbr&gt;&lt;/h4&gt;&lt;p&gt;Use the pre-installed software (Linux), or download and install a third-party software such as &lt;a href=&#34;https://gpgtools.org/gpgsuite.html&#34;&gt;&lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; Suite&lt;/a&gt; (macOS) or &lt;a href=&#34;https://www.gpg4win.org/download.html&#34;&gt;GPG4Win&lt;/a&gt; (Windows) to generate and manage an &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key.&lt;/p&gt;&lt;div class=&#34;admonition warning&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Security recommendation&lt;/p&gt;&lt;p&gt;Yubico strongly &lt;a href=&#34;https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP&#34;&gt;recommends&lt;/a&gt; to generate &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; keys on an offline system, such as a live Linux distribution.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;113-generate-an-openpgp-key-externally&#34;&gt;11.3. Generate an &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key externally&lt;/h4&gt;&lt;p&gt;Open a terminal application and type the following command:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --expert --full-gen-key&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;When prompted to select the type of key you wish to generate, enter &lt;code&gt;1&lt;/code&gt; for &#34;RSA and RSA (default)&#34;.&lt;/p&gt;&lt;p&gt;When asked &#34;What keysize do you want?&#34;, type &lt;code&gt;4096&lt;/code&gt;. Type &lt;code&gt;4096&lt;/code&gt; as well for the subkey.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a terminal window showing an OpenPGP key generation.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-40-config-pgpgeneratekey.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Follow the instructions to choose an expiration date for your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key, and confirm with &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-y&#34;&gt;Y&lt;/kbd&gt;&lt;/span&gt;.&lt;/p&gt;&lt;p&gt;When prompted with &#34;&lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GnuPG&lt;/abbr&gt; needs to construct a user ID to identify your key&#34;, enter the &lt;strong&gt;name&lt;/strong&gt; and &lt;strong&gt;email address&lt;/strong&gt; you wish to use with this key. Finally, enter a &lt;strong&gt;comment&lt;/strong&gt; you want associated with this key (optional), and confirm with &lt;code&gt;O&lt;/code&gt; for Okay.&lt;/p&gt;&lt;p&gt;Once confirmed, a dialogue box should pop up from your &lt;strong&gt;&lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; software&lt;/strong&gt;. Create a &lt;strong&gt;passphrase&lt;/strong&gt; to protect your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a GPG software application asking to set up a passphrase.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-41-config-pgppassphrase.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Go back to your terminal application, and type this command to find your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&#39;s ID:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --list-keys --keyid-format=long&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;If you have multiple keys already stored on your computer, this command will list all of your keys.&lt;/p&gt;&lt;p&gt;Only look at the last &#34;key block&#34; listed, and note its &lt;strong&gt;key ID&lt;/strong&gt;. Each &#34;key block&#34; starts with a &lt;strong&gt;&lt;code&gt;pub&lt;/code&gt;&lt;/strong&gt; line, followed by a &lt;strong&gt;&lt;code&gt;uid&lt;/code&gt;&lt;/strong&gt; line(s), with potentially one or more &lt;strong&gt;sub&lt;/strong&gt; lines (for subkeys).&lt;/p&gt;&lt;p&gt;Your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; &lt;strong&gt;key ID&lt;/strong&gt; will be a string of numbers and uppercase letters on the &lt;strong&gt;&lt;code&gt;pub&lt;/code&gt;&lt;/strong&gt; line, after the &#34;rsa4096&#34; key type, and separated by a &lt;strong&gt;/&lt;/strong&gt; character as follows:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;pub rsa4096/[key_id]&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Note this &lt;strong&gt;[key_id]&lt;/strong&gt; for the next steps.&lt;/p&gt;&lt;h4 id=&#34;114-add-subkeys&#34;&gt;11.4. Add subkeys&lt;/h4&gt;&lt;p&gt;You do not need to have any of your YubiKeys plugged in yet for this step.&lt;/p&gt;&lt;div class=&#34;admonition note&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;You might not need to add each subkey type&lt;/p&gt;&lt;p&gt;For this step, we will add one subkey for each of the 3 YubiKey &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application slots: &lt;strong&gt;Signature key&lt;/strong&gt;, &lt;strong&gt;Encryption key&lt;/strong&gt;, and &lt;strong&gt;Authentication key&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Depending on your usage, you might only need a specific type and not the others. Pick and choose what you need and ignore instructions for the others, if they&#39;re not relevant to you.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;In a terminal application, type:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --expert --edit-key [key_id]&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;This will start a &lt;strong&gt;&lt;code&gt;gpg&lt;/code&gt;&lt;/strong&gt; program prompt in your terminal. From there, type:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;addkey&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a terminal window showing the command to edit and add subkeys.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-42-config-pgpaddkeys.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;When prompted with &#34;Please select what kind of key you want&#34; type &lt;code&gt;8&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;You will be asked to toggle on or off some subkey options. Here, we will generate all 3 subkeys at once, but adjust this step to your required usage. You might also need different encryption algorithms for different subkeys (see options available from the previous &lt;strong&gt;&lt;code&gt;gpg&lt;/code&gt;&lt;/strong&gt; program question).&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;To generate subkeys separately&lt;/p&gt;&lt;p&gt;To add a &lt;strong&gt;Signature subkey&lt;/strong&gt;: Toggle &lt;code&gt;E&lt;/code&gt; to &lt;em&gt;disable&lt;/em&gt; encrypt.&lt;/p&gt;&lt;p&gt;To add an &lt;strong&gt;Encryption subkey&lt;/strong&gt;: Toggle &lt;code&gt;S&lt;/code&gt; to &lt;em&gt;disable&lt;/em&gt; sign.&lt;/p&gt;&lt;p&gt;To add an &lt;strong&gt;Authentication subkey&lt;/strong&gt;: Toggle &lt;code&gt;S&lt;/code&gt;, then toggle &lt;code&gt;E&lt;/code&gt;, then toggle &lt;code&gt;A&lt;/code&gt; to keep only Authenticate &lt;em&gt;enable&lt;/em&gt;.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;To generate all 3 subkeys, type &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-a&#34;&gt;A&lt;/kbd&gt;&lt;/span&gt; to &lt;em&gt;enable&lt;/em&gt; Authenticate as well (Sign and Encrypt will already be enabled). On the line above the options, you should now see &#34;Current allowed actions: Sign Encrypt Authenticate&#34;.&lt;/p&gt;&lt;p&gt;The type &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-q&#34;&gt;Q&lt;/kbd&gt;&lt;/span&gt; to confirm your selection (Finished).&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a terminal window showing the option for subkey types.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-43-config-pgp3subkeys.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;You will then be asked to choose a keysize, type &lt;code&gt;4096&lt;/code&gt;.&lt;/p&gt;&lt;p&gt;Select an &lt;strong&gt;expiration date&lt;/strong&gt; again (it should be the &lt;strong&gt;same as the main &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&lt;/strong&gt;). Confirm with &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-y&#34;&gt;Y&lt;/kbd&gt;&lt;/span&gt; then &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-y&#34;&gt;Y&lt;/kbd&gt;&lt;/span&gt; again.&lt;/p&gt;&lt;p&gt;When prompted by your &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; software, enter your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&#39;s passphrase, then click &#34;OK&#34;.&lt;/p&gt;&lt;p&gt;Once the &lt;strong&gt;&lt;code&gt;gpg&lt;/code&gt;&lt;/strong&gt; prompt is back in your terminal, exit the program by typing &lt;code&gt;quit&lt;/code&gt;, then save the changes with &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-y&#34;&gt;Y&lt;/kbd&gt;&lt;/span&gt;.&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;For more options on subkeys&lt;/p&gt;&lt;p&gt;You might want to consult Yubico&#39;s &lt;a href=&#34;https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP&#34;&gt;documentation&lt;/a&gt; for more information on &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; keys and subkeys.&lt;/p&gt;&lt;/div&gt;&lt;h4 id=&#34;115-backup-your-openpgp-private-key-and-subkeys&#34;&gt;11.5. Backup your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; Private Key and subkeys&lt;/h4&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Security warning&lt;/p&gt;&lt;p&gt;Be careful to store your &lt;abbr title=&#34;Pretty Good Privacy (see OpenPGP)&#34;&gt;PGP&lt;/abbr&gt; Private Key securely. This information is very sensitive and should never be shared or stored on an unencrypted volume. For better security, store it externally offline on a fully encrypted USB stick.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;If it is reasonably secure to store your private key and subkeys locally on your current device, type the following lines in your terminal (replace &lt;code&gt;[key_id]&lt;/code&gt; with your specific key&#39;s ID).&lt;/p&gt;&lt;div class=&#34;admonition tip&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Change de default path&lt;/p&gt;&lt;p&gt;Unless you change the path, this command will create a backup of your private key located in the directory you currently are in your terminal.&lt;/p&gt;&lt;p&gt;If you wish to store your private key backup elsewhere, navigate to another directory or add a specific path before the &lt;code&gt;backup_private_key.asc&lt;/code&gt;. For example: &lt;code&gt;/Volumes/[secure_volume]/[secure_directory]/backup_private_key.asc&lt;/code&gt;&lt;/p&gt;&lt;/div&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --armor --output backup_private_key.asc --export-secret-key [key_id]&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;You will be prompted by your &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; software to enter your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&#39;s passphrase, enter it then click &#34;OK&#34;.&lt;/p&gt;&lt;p&gt;To also keep a copy of your subkeys, type the following line:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --armor --output backup_private_subkeys.asc --export-secret-subkeys [key_id]&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;You will be prompted by your &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; software again to enter your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&#39;s passphrase, enter it then click &#34;OK&#34;.&lt;/p&gt;&lt;h4 id=&#34;116-move-your-openpgp-key-and-subkeys-to-your-yubikeys&#34;&gt;11.6. Move your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key and subkeys to your YubiKeys&lt;/h4&gt;&lt;p&gt;&lt;strong&gt;Insert your YubiKey&lt;/strong&gt; in your computer&#39;s port, then type:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --edit-key [key_id]&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;This will show the details for the &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key (&lt;strong&gt;&lt;code&gt;sec&lt;/code&gt;&lt;/strong&gt;) you just created and its subkeys (&lt;strong&gt;&lt;code&gt;ssb&lt;/code&gt;&lt;/strong&gt;).&lt;/p&gt;&lt;p&gt;In the terminal &lt;strong&gt;&lt;code&gt;gpg&lt;/code&gt;&lt;/strong&gt; prompt, type the command:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;keytocard&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a terminal window showing details of the OpenPGP key and its subkeys.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-44-config-pgpimportsubkeys.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;When prompted with &#34;Really move the primary key? (y/N)&#34; type &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-y&#34;&gt;Y&lt;/kbd&gt;&lt;/span&gt;.&lt;/p&gt;&lt;div class=&#34;admonition bug&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;If you encounter an error&lt;/p&gt;&lt;p&gt;If you encounter a problem at this step, you might want to exit the terminal &lt;strong&gt;&lt;code&gt;gpg&lt;/code&gt;&lt;/strong&gt; program with &lt;code&gt;quit&lt;/code&gt;, unplug your YubiKey from your computer, plug it in again, then start &lt;a href=&#34;#116-move-your-openpgp-key-and-subkeys-to-your-yubikeys&#34;&gt;Step 11.6&lt;/a&gt; over.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;Assuming you have created all 3 subkey types in the previous step, when prompted with &#34;Your selection?&#34;, type &lt;code&gt;1&lt;/code&gt; to move the &lt;strong&gt;Signature subkey&lt;/strong&gt; to your YubiKey:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;span class=&#34;filename&#34;&gt;Terminal&lt;/span&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;gpg&amp;gt; keytocard&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;Really move the primary key? (y/N) y&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;Please select where to store the key:&lt;/span&gt;&lt;span class=&#34;go&#34;&gt; (1) Signature key&lt;/span&gt;&lt;span class=&#34;go&#34;&gt; (3) Authentication key&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;Your selection? 1&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Your &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; software will pop up and require you enter your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&#39;s passphrase. There will then be 2 more popups requiring you enter the &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application&#39;s &lt;strong&gt;Admin PIN&lt;/strong&gt; you have just setup on &lt;a href=&#34;#111-secure-your-yubikeys-openpgp-application-with-a-new-pin-and-admin-pin&#34;&gt;Step 11.1&lt;/a&gt;. You will be asked for your Admin PIN &lt;em&gt;twice&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot of a GPG software popup window requiring to enter an Admin PIN.&#34; src=&#34;../../../../assets/images/yubikey-reset-and-backup/yubikey-45-config-pgpadminpin.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Back to the terminal &lt;strong&gt;&lt;code&gt;gpg&lt;/code&gt;&lt;/strong&gt; prompt, type &lt;code&gt;key 1&lt;/code&gt; then &lt;code&gt;keytocard&lt;/code&gt; again. This time select &lt;code&gt;2&lt;/code&gt; to move the &lt;strong&gt;Encryption subkey&lt;/strong&gt; to your YubiKey:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;span class=&#34;filename&#34;&gt;Terminal&lt;/span&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;gpg&amp;gt; key 1&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;---- [key_information] ----&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;gpg&amp;gt; keytocard&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;Please select where to store the key:&lt;/span&gt;&lt;span class=&#34;go&#34;&gt; (2) Encryption key&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;Your selection? 2&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Again, enter your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&#39;s passphrase and your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application&#39;s Admin PIN when prompted by your &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; software.&lt;/p&gt;&lt;p&gt;Back to the terminal &lt;strong&gt;&lt;code&gt;gpg&lt;/code&gt;&lt;/strong&gt; prompt, type &lt;code&gt;key 1&lt;/code&gt; then &lt;code&gt;key 2&lt;/code&gt; then &lt;code&gt;keytocard&lt;/code&gt; again. This time select &lt;code&gt;3&lt;/code&gt; to move the &lt;strong&gt;Authentication subkey&lt;/strong&gt; to your YubiKey:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;span class=&#34;filename&#34;&gt;Terminal&lt;/span&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;gpg&amp;gt; key 1&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;---- [key_information] ----&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;gpg&amp;gt; key 2&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;---- [key_information] ----&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;gpg&amp;gt; keytocard&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;Please select where to store the key:&lt;/span&gt;&lt;span class=&#34;go&#34;&gt; (1) Signature key&lt;/span&gt;&lt;span class=&#34;go&#34;&gt; (2) Encryption key&lt;/span&gt;&lt;span class=&#34;go&#34;&gt; (3) Authentication key&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt;Your selection? 3&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Enter your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key passphrase and your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application&#39;s Admin PIN when prompted by your &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; software.&lt;/p&gt;&lt;p&gt;Finally, type &lt;code&gt;quit&lt;/code&gt;, then &lt;span class=&#34;keys&#34;&gt;&lt;kbd class=&#34;key-y&#34;&gt;Y&lt;/kbd&gt;&lt;/span&gt; to save the changes before exiting the &lt;strong&gt;&lt;code&gt;gpg&lt;/code&gt;&lt;/strong&gt; terminal program.&lt;/p&gt;&lt;h4 id=&#34;117-verify-that-all-your-subkeys-are-stored-properly-to-your-yubikey&#34;&gt;11.7. Verify that all your subkeys are stored properly to your YubiKey&lt;/h4&gt;&lt;p&gt;From the terminal, type:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --card-edit&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;This will display the information stored inside your YubiKey&#39;s &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application.&lt;/p&gt;&lt;p&gt;From the information displayed in the terminal, you can see your YubiKey&#39;s serial number, version, some attributes, your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key information, and the 3 subkey slots.&lt;/p&gt;&lt;p&gt;If you have completed the steps above properly, above &#34;General key info&#34; you should see the lines &#34;Signature key&#34;, &#34;Encryption key&#34;, and &#34;Authentication key&#34; all have information stored in it. Otherwise, instead of a string of uppercase letters and numbers you will see &#34;[none]&#34;.&lt;/p&gt;&lt;p&gt;If all 3 slots are filled as expected, type &lt;code&gt;quit&lt;/code&gt; to leave this &lt;strong&gt;card&lt;/strong&gt; program.&lt;/p&gt;&lt;h4 id=&#34;118-copy-your-openpgp-key-and-subkeys-to-your-spare-yubikey&#34;&gt;11.8. Copy your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key and subkeys to your spare YubiKey&lt;/h4&gt;&lt;p&gt;To make this operation work, you will have to delete your local key and subkeys and restore them from your backups.&lt;/p&gt;&lt;p&gt;First, &lt;strong&gt;unplug your main YubiKey&lt;/strong&gt;. For the next step, you will need your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&#39;s and subkeys&#39; &lt;em&gt;grip&lt;/em&gt; strings. Type the following command in your terminal:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --list-secret-keys --with-keygrip&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;If you have multiple keys listed, only look at the last block for &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key and subkeys you just created.&lt;/p&gt;&lt;p&gt;Note carefully the &lt;strong&gt;Keygrip&lt;/strong&gt; string for each key and subkeys.&lt;/p&gt;&lt;p&gt;For your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key, look at the lines starting with &#34;&lt;code&gt;sec&amp;gt;&lt;/code&gt;&#34; on the left. The &lt;strong&gt;Keygrip&lt;/strong&gt; string will be just above &#34;Card serial no&#34;.&lt;/p&gt;&lt;p&gt;For the subkeys, look at each block starting with &#34;&lt;code&gt;ssb&amp;gt;&lt;/code&gt;&#34; on the left. The &lt;strong&gt;Keygrip&lt;/strong&gt; string will be on the second line for each. It should look something like this:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;span class=&#34;filename&#34;&gt;Terminal&lt;/span&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;sec&amp;gt; rsa4096 2025-03-04 [SC] [expires: 2025-03-06]&lt;/span&gt;&lt;span class=&#34;go&#34;&gt; ABC42ABC42ABC42ABC42ABC42[key_id]&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt; Keygrip = [key_grip]&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;go&#34;&gt; Card serial no. = 0000 [yubikey_serial_number]&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;uid [ultimate] Name (Comment) &amp;lt;email@example.org&amp;gt;&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;ssb&amp;gt; rsa4096 2025-03-04 [E] [expires: 2025-03-06]&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt; Keygrip = [subkey_grip]&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;go&#34;&gt;ssb&amp;gt; rsa4096 2025-03-04 [SEA] [expires: 2025-03-06]&lt;/span&gt;&lt;span class=&#34;hll&#34;&gt;&lt;span class=&#34;go&#34;&gt; Keygrip = [subkey_grip]&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Send a delete command for each key and subkeys:&lt;/p&gt;&lt;div class=&#34;admonition danger&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Danger! Make sure to delete the right key!&lt;/p&gt;&lt;p&gt;If you have multiple keys stored on this computer, when noting the &lt;strong&gt;Keygrip&lt;/strong&gt; make sure to note the correct one for the &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key you have just created and all its subkeys. You would not want to delete &lt;em&gt;another&lt;/em&gt; important key you need.&lt;/p&gt;&lt;p&gt;For safety, it is recommended to keep a backup of your other keys as well before running the deletion commands below.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;You will need to send a delete command to the &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; agent in order to be able to restore and copy your subkeys to your spare YubiKey. Type the following command and replace &lt;code&gt;[key_grip]&lt;/code&gt; with the string you have noted above:&lt;/p&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg-connect-agent &amp;quot;DELETE_KEY [key_grip]&amp;quot; /bye&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Once you see the &#34;OK&#34;, type the following command for your subkeys and replace &lt;code&gt;[subkey_grip]&lt;/code&gt; with the strings you have noted above.&lt;/p&gt;&lt;div class=&#34;admonition success&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Repeat this command for each subkey with their respective Keygrip string.&lt;/p&gt;&lt;/div&gt;&lt;div class=&#34;highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg-connect-agent &amp;quot;DELETE_KEY [subkey_grip]&amp;quot; /bye&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Restore your key and subkeys:&lt;/p&gt;&lt;p&gt;To restore your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key and subkeys from your backup, type the following command (add the specific directory path you used, if any):&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --import backup_private_key.asc&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Enter your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&#39;s passphrase when prompted by your &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; software. Then, for your subkeys type:&lt;/p&gt;&lt;div class=&#34;yaml copy highlight&#34;&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class=&#34;go&#34;&gt;gpg --import backup_private_subkeys.asc&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Enter your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key&#39;s passphrase again if prompted by your &lt;abbr title=&#34;GNU Privacy Guard (PGP implementation)&#34;&gt;GPG&lt;/abbr&gt; software.&lt;/p&gt;&lt;p&gt;Copy your &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; key and subkeys to your spare YubiKey:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Plug in your &lt;em&gt;spare&lt;/em&gt; YubiKey&lt;/strong&gt; in your computer&#39;s port. Make sure your main YubiKey is &lt;em&gt;unplugged&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;Repeat all the operations from &lt;a href=&#34;#116-move-your-openpgp-key-and-subkeys-to-your-yubikeys&#34;&gt;Step 11.6&lt;/a&gt; for your &lt;em&gt;spare&lt;/em&gt; YubiKey. Use the same &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; &lt;strong&gt;[key_id]&lt;/strong&gt; you have used with your main YubiKey.&lt;/p&gt;&lt;p&gt;Again, verify that all your YubiKey&#39;s &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application slots have been filled properly by repeating &lt;a href=&#34;#117-verify-that-all-your-subkeys-are-stored-properly-to-your-yubikey&#34;&gt;Step 11.7&lt;/a&gt; with your spare YubiKey.&lt;/p&gt;&lt;p&gt;You can now &lt;code&gt;quit&lt;/code&gt; this &lt;strong&gt;card&lt;/strong&gt; program, unplug your &lt;em&gt;spare&lt;/em&gt; YubiKey, plug in your main YubiKey again, and type &lt;code&gt;gpg --card-edit&lt;/code&gt; again to verity that both your main and spare YubiKeys have the exact same &#34;Signature key&#34;, &#34;Encryption key&#34;, and &#34;Authentication key&#34; registered.&lt;/p&gt;&lt;p&gt;Following this procedure correctly, each of these subkey slots should be identical on your main and spare YubiKeys. The &#34;General key info&#34; should also be identical between your YubiKeys, but each &#34;Serial number&#34; should be different.&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;The gpg-card program&lt;/p&gt;&lt;p&gt;From this command, you can change other parameters for your YubiKey&#39;s &lt;abbr title=&#34;Open-source implementation of Pretty Good Privacy (PGP)&#34;&gt;OpenPGP&lt;/abbr&gt; application if needed. To see more options, you can consult Yubico&#39;s &lt;a href=&#34;https://developers.yubico.com/PGP/PGP_Walk-Through.html&#34;&gt;documentation&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;div class=&#34;admonition bug&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;Troubleshooting&lt;/p&gt;&lt;p&gt;If you need additional help to troubleshoot, reset, setup, or copy information to your spare YubiKey, you can contact Yubico&#39;s Customer Support service from &lt;a href=&#34;https://support.yubico.com/hc/en-us/requests/new&#34;&gt;this form&lt;/a&gt;.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&#34;review-your-configuration&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12.67 13.67c-.47.46-1.04.83-1.67 1.06V23H8v-2H5v-3h3v-3.28c-1.74-.62-3-2.26-3-4.22C5 8 7 6 9.5 6h.1c-.47.95-.68 2-.57 3.08-.59.2-1.03.76-1.03 1.42 0 .83.67 1.5 1.5 1.5.23 0 .45-.06.65-.15.64.84 1.52 1.47 2.52 1.82m8.06 5.77-2.76 1.16-.78-1.84-2.76 1.17-1.17-2.77L16.03 16l-1.27-3c-1.85.08-3.65-.95-4.41-2.75-.96-2.29.12-4.93 2.41-5.9.24-.1.5-.17.74-.23C12.84 2.87 11.5 2 10 2 7.79 2 6 3.79 6 6v.24c-.3.26-.6.58-.85.91C5.06 6.78 5 6.4 5 6c0-2.76 2.24-5 5-5s5 2.24 5 5c0 1.42-.6 2.67-1.55 3.57.42.43 1.05.56 1.63.31.77-.32 1.12-1.2.8-1.96a1 1 0 0 0-.14-.26C15.9 7.13 16 6.58 16 6c0-.63-.1-1.24-.28-1.81 1.28.36 2.38 1.25 2.93 2.57.76 1.8.24 3.81-1.15 5.05zM13 8.6c.37-.41.65-.89.82-1.42-.54.27-.85.82-.82 1.42&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Review your configuration&lt;/h2&gt;&lt;p&gt;Once you have fully reset and reconfigured your 2 YubiKeys, make sure that you have:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Registered both keys with the YubiCloud validation server.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Tested each YubiKey application you will use on both keys before registering them with any service or product.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Configured properly all the protections and pins available to secure your keys.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Deleted the temporary files containing secrets that you no longer need for backup purposes.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Stored your spare key in a different secure location, once it&#39;s registered with your services and accounts.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Finally, do not forget to register your freshly re-programmed YubiKey(s) with the services and accounts you had to remove it from. Do not leave your accounts unprotected!&lt;/p&gt;&lt;div class=&#34;admonition info&#34;&gt;&lt;p class=&#34;admonition-title&#34;&gt;More information&lt;/p&gt;&lt;p&gt;This tutorial only covers a few features and usages possible with YubiKeys, consult &lt;strong&gt;Yubico Authenticator&lt;/strong&gt;&#39;s &lt;a href=&#34;https://docs.yubico.com/software/yubikey/tools/authenticator/auth-guide/&#34;&gt;complete documentation&lt;/a&gt; and &lt;a href=&#34;https://www.yubico.com/setup/&#34;&gt;guides&lt;/a&gt; for more information.&lt;/p&gt;&lt;/div&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Unless credited otherwise, all screenshots from: Privacy Guides&lt;/small&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/03/06/yubikey-reset-and-backup/</link> <pubDate>Thu, 13 Mar 2025 15:29:25 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/03/06/yubikey-reset-and-backup/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/03/06/yubikey-reset-and-backup.png" type="image/png" length="None" /> </item> <item> <title>Toward a Passwordless Future</title> <author>fria</author> <category>Explainers</category> <category>Passkeys</category> <category>Passwords</category> <description>&lt;h1 id=&#34;toward-a-passwordless-future&#34;&gt;Toward a Passwordless Future&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Article cover showing a rusted, broken lock on a door latch&#34; src=&#34;../../../../assets/images/toward-a-passwordless-future/cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jordan / Privacy Guides | Photo: Gowtham AGM / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Passwords are annoying, vulnerable to attack, and prone to human error. The multitude of issues with passwords has cost &lt;a href=&#34;https://www.ibm.com/downloads/documents/us-en/107a02e94948f4ec&#34;&gt;millions&lt;/a&gt; of dollars and forced terrible band-aid solutions in how we handle signing up for, logging in to, and securing online accounts. I&#39;d like to break down some of these design paradigms that have entrenched themselves in our lives and how passkeys can lead to more secure and private online accounts.&lt;!-- more --&gt;&lt;/p&gt;&lt;h2 id=&#34;how-did-we-get-here&#34;&gt;How did we get here?&lt;/h2&gt;&lt;h3 id=&#34;ancient-rome&#34;&gt;Ancient Rome&lt;/h3&gt;&lt;p&gt;Passwords are a surprisingly old concept, dating all the way back to ancient Rome. The ancient Roman historian Polybius in his &lt;em&gt;&lt;a href=&#34;http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.01.0234%3Abook%3D6%3Achapter%3D34&#34;&gt;Histories&lt;/a&gt;&lt;/em&gt; describes how the Roman military would pass around a wooden tablet, or &lt;em&gt;tessera&lt;/em&gt;, inscribed with a &#34;watchword&#34; that would allow them to identify each other as friendly.&lt;/p&gt;&lt;h3 id=&#34;prohibition&#34;&gt;Prohibition&lt;/h3&gt;&lt;p&gt;During Prohibition in the 1920s US, speakeasies, or private, unlicensed bars selling illegal alcohol, would require a spoken &lt;a href=&#34;https://prohibition.themobmuseum.org/the-history/the-prohibition-underworld/the-speakeasies-of-the-1920s/&#34;&gt;password&lt;/a&gt; to gain entry. The name comes from how quietly you had to say the password, so law enforcement didn&#39;t overhear.&lt;/p&gt;&lt;h3 id=&#34;world-war-ii&#34;&gt;World War II&lt;/h3&gt;&lt;p&gt;The US military later used &lt;a href=&#34;https://en.wikipedia.org/wiki/Countersign_(military)#cite_note-2&#34;&gt;countersigns&lt;/a&gt;, consisting of a challenge and a password to identify allies. On D-Day, they used the challenge &#34;flash&#34; and the password &#34;thunder.&#34; Thunder was used specifically because it was difficult for Germans to pronounce, since the English &#34;th&#34; sound doesn&#39;t exist in German. This is an example of a shibboleth, or a way of distinguishing groups of people based on cultural differences.&lt;/p&gt;&lt;h3 id=&#34;1960s&#34;&gt;1960&#39;s&lt;/h3&gt;&lt;p&gt;It wasn&#39;t long after the dawn of the electronic computer that a solution for authentication was needed. Computers in the 1950s were expensive and slow, only able to handle one problem at a time.&lt;/p&gt;&lt;p&gt;MIT&#39;s Compatible Time Sharing System (CTSS), pioneered by Fernando Corbató, aimed to solve this problem by allowing multiple users to do work at the same time, but they needed a way to authenticate specific users. &#34;Putting a password on for each individual user as a lock seemed like a very straightforward solution&#34; Corbató told Wired in an &lt;a href=&#34;https://www.wired.com/2012/01/computer-password/&#34;&gt;interview&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;These passwords weren&#39;t designed to be very secure. Fred Schneider, a computer science professor at Cornell University, said in the same Wired article &#34;nobody wanted to devote many machine resources to this authentication stuff.&#34;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Fernando Corbató standing next to the CTSS&#34; src=&#34;../../../../assets/images/toward-a-passwordless-future/ctss.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Fernando Corbató with the CTSS | Photo: &lt;a href=&#34;https://www.computerhistory.org/timeline/1961/&#34;&gt;Computer History Museum&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;h3 id=&#34;first-password-breach&#34;&gt;First Password Breach&lt;/h3&gt;&lt;p&gt;The first password breach occurred not long after in 1962, detailed in a &lt;a href=&#34;https://www.multicians.org/thvv/compatible-time-sharing-system.pdf&#34;&gt;pamphlet&lt;/a&gt; written to commemorate the CTSS.&lt;/p&gt;&lt;p&gt;Allan Scherr, a Ph.D. researcher at MIT, wanted more time for his detailed simulations. He knew that the passwords were stored in a plaintext file, so he requested it to be printed offline and that was that: he now had everyone&#39;s password and all the time he could ask for.&lt;/p&gt;&lt;p&gt;A later incident in 1966 saw all users&#39; passwords being printed at login due to the administrator accidentally swapping the master password file and the message of the day.&lt;/p&gt;&lt;h3 id=&#34;early-attempts-at-securing-passwords&#34;&gt;Early Attempts at Securing Passwords&lt;/h3&gt;&lt;p&gt;Clearly there was work to be done on securely storing passwords. A &lt;a href=&#34;https://rist.tech.cornell.edu/6431papers/MorrisThompson1979.pdf&#34;&gt;paper&lt;/a&gt; from 1979 by Robert Morris and Ken Thompson of Bell Laboratories outlines some requirements to bolster the security of passwords on a UNIX system.&lt;/p&gt;&lt;h4 id=&#34;hashing&#34;&gt;Hashing&lt;/h4&gt;&lt;p&gt;One of which is the need for passwords to not be stored in plaintext on the system, instead recommending storing a hash.&lt;/p&gt;&lt;p&gt;A hash is a one-way function: you give a certain input, and it spits out data that can&#39;t be easily reversed back to the input, even knowing the algorithm that was used. But, given the same input, you&#39;ll get the same output, allowing you to compare an inputted user password to a stored one.&lt;/p&gt;&lt;p&gt;In order to make it hard to brute force, the hashing algorithm should be fairly slow.&lt;/p&gt;&lt;h4 id=&#34;password-requirements&#34;&gt;Password Requirements&lt;/h4&gt;&lt;p&gt;They recommend certain requirements on the password entry program such as the classic 6-character minimum password length to prevent easily guessable passwords.&lt;/p&gt;&lt;h4 id=&#34;salting&#34;&gt;Salting&lt;/h4&gt;&lt;p&gt;Password salting, a technique wherein a random string of characters is added to the end of the user&#39;s password before hashing, gets a mention as well. This prevents an attacker from simply pre-computing many password hashes ahead of time, and also prevents an attacker from knowing if the same password has been used on multiple systems just from comparing the hashes.&lt;/p&gt;&lt;p&gt;These guidelines would remain mostly unchanged for decades, save for improved hashing and salting algorithms.&lt;/p&gt;&lt;h2 id=&#34;unforeseen-consequences&#34;&gt;Unforeseen Consequences&lt;/h2&gt;&lt;p&gt;What was originally a system designed for a few people sharing a computer in an academic and research setting has somehow remained almost unchanged decades later.&lt;/p&gt;&lt;h3 id=&#34;password-overload&#34;&gt;Password Overload&lt;/h3&gt;&lt;p&gt;Instead of remembering a single password for your computer, you now have potentially hundreds of passwords for various online accounts. A recent &lt;a href=&#34;https://nordpass.com/blog/how-many-passwords-does-average-person-have/&#34;&gt;survey&lt;/a&gt; by NordPass estimates that the average person has around 168 personal accounts, with a nearly 70% increase in just the last three years since the survey was taken. This is an untenable number of passwords for a human to remember, so we don&#39;t.&lt;/p&gt;&lt;h3 id=&#34;email-requirement&#34;&gt;Email Requirement&lt;/h3&gt;&lt;p&gt;With the ever-present threat of users forgetting their passwords and therefore losing access to their account irrevocably, there needed to be a way to recover the account.&lt;/p&gt;&lt;p&gt;By the end of the dotcom bubble, email was fairly ubiquitous, so it made sense as a fallback way of authenticating. This had the added benefit of giving companies a way of contacting (read: spamming with ads) their customers.&lt;/p&gt;&lt;p&gt;While it&#39;s hard to say when it started happening, major websites like eBay were requiring email addresses on signup as far back as &lt;a href=&#34;http://web.archive.org/web/19991122073209/http://pages.ebay.com/services/registration/register.html&#34;&gt;1999&lt;/a&gt;. Amazon was doing it back in &lt;a href=&#34;https://web.archive.org/web/20011107052853/http://www.amazon.com/exec/obidos/flex-sign-in/?opt=oa&amp;amp;page=recs/sign-in-secure.html&amp;amp;response=tg/recs/recs-post-login-dispatch/-/recs&#34;&gt;2001&lt;/a&gt;. People I interviewed said that email-based signup was commonplace by the late 90s.&lt;/p&gt;&lt;p&gt;And so the precedent of requiring personal contact information to sign up for an account was born, at least partially due to the shortcomings of passwords.&lt;/p&gt;&lt;h3 id=&#34;terrible-security&#34;&gt;Terrible Security&lt;/h3&gt;&lt;h4 id=&#34;single-point-of-failure&#34;&gt;Single Point of Failure&lt;/h4&gt;&lt;p&gt;On top of the extra personal data now required for each online account, email acts as a one-stop shop for attackers looking to hack your accounts, either by getting into your email account itself or by sending you convincing password reset emails that send you to a phishing page that looks exactly like the real page.&lt;/p&gt;&lt;p&gt;With the advent of AI, phishing attacks have only gotten cheaper and easier.&lt;/p&gt;&lt;p&gt;Laughably, we&#39;re told to &#34;look for typos&#34; or &#34;just feel out the vibes man&#34; in order to defend against these attacks. What hope did we ever have?&lt;/p&gt;&lt;p&gt;This intersects a bit with how I think email is a terrible, outdated protocol that needs to be replaced, but that&#39;s a blog post for another day.&lt;/p&gt;&lt;p&gt;What&#39;s followed as a consequence of the tech industry&#39;s refusal to adapt to the security landscape is an unprecedented cybercrime industry, stealing an estimated &lt;a href=&#34;https://aag-it.com/the-latest-phishing-statistics/&#34;&gt;$44.2 million&lt;/a&gt; in 2021 through phishing scams. These are people whose only contribution to society is draining grandma&#39;s bank account, and they&#39;re absolutely raking it in.&lt;/p&gt;&lt;h4 id=&#34;service-provider-negligence&#34;&gt;Service Provider Negligence&lt;/h4&gt;&lt;p&gt;But even if you do everything right and never fall for a phishing email, you can still be compromised due to the negligence of any one of the hundreds of service providers you rely on. Passwords need to be stored on a server somewhere, and if a service provider doesn&#39;t hash and salt them properly, a data breach will leave your account vulnerable.&lt;/p&gt;&lt;p&gt;Even if the &lt;em&gt;service provider&lt;/em&gt; does everything right in terms of storing the password (which you have absolutely no way of verifying), in the event of a data breach the attackers will still have a hash of your password to attack.&lt;/p&gt;&lt;p&gt;There&#39;s typically also a period between the server receiving your password from the encrypted &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; tunnel and storing it securely as a hash where it handles your password in plaintext in order to compare it with what it has on file. Any vulnerabilities in the hardware could be catastrophic.&lt;/p&gt;&lt;p&gt;If you think this sounds like minor nitpicking, consider that in 2019, Facebook realized it had accidentally been storing &lt;a href=&#34;https://about.fb.com/news/2019/03/keeping-passwords-secure/&#34;&gt;hundreds of millions of user passwords in plaintext&lt;/a&gt;.&lt;/p&gt;&lt;h4 id=&#34;human-error&#34;&gt;Human Error&lt;/h4&gt;&lt;p&gt;Even ignoring all of that, passwords rely on randomness to be secure, but they also rely on humans to generate them.&lt;/p&gt;&lt;p&gt;Humans are very bad at generating random numbers. We&#39;re so bad at it that it&#39;s possible to &lt;a href=&#34;https://pubmed.ncbi.nlm.nih.gov/23626943/&#34;&gt;uniquely identify&lt;/a&gt; you based on your pattern of &#34;random&#34; numbers.&lt;/p&gt;&lt;p&gt;That doesn&#39;t even matter though, since passwords, by requiring the user to type them whenever they want to log in and requiring the user to remember them, encourage minimum randomness and minimum length.&lt;/p&gt;&lt;p&gt;Most of us, even &lt;a href=&#34;https://www.hipaajournal.com/92-of-it-leaders-guilty-of-password-reuse/&#34;&gt;IT experts&lt;/a&gt;, reuse passwords because we are so heavily incentivized to do so by how they fundamentally work.&lt;/p&gt;&lt;p&gt;The strategy historically has been to shame people for using bad passwords whenever their account gets hacked, which has prevented us from seeing the fundamental issues with the way we authenticate and instead making it every individual&#39;s responsibility to somehow fight the incentives of the system they rely on.&lt;/p&gt;&lt;p&gt;Imagine if every time you connected to a website with &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt;, you had to come up with your own encryption key. Would that be a secure system?&lt;/p&gt;&lt;h2 id=&#34;band-aid-solutions&#34;&gt;Band-aid Solutions&lt;/h2&gt;&lt;p&gt;A common theme with passwords, and frankly many other things in the tech world, is stapling band-aid solutions on top of them to try and make them fit a modern use case they were never meant to serve.&lt;/p&gt;&lt;h3 id=&#34;password-managers&#34;&gt;Password Managers&lt;/h3&gt;&lt;p&gt;Password managers solve the issue of forgetting your passwords by acting as a secure repository for of all your passwords. You can even conveniently have them autofill your information for you on the login screen. They can generate strong passwords for you as well.&lt;/p&gt;&lt;h4 id=&#34;single-point-of-failure_1&#34;&gt;Single Point of Failure&lt;/h4&gt;&lt;p&gt;Essentially, password managers try to eliminate the human error element of passwords. But in doing so, they introduce more &lt;abbr title=&#34;The total number of possible entry points for unauthorized access to a system&#34;&gt;attack surface&lt;/abbr&gt;: you now have a repository of all your login credentials conveniently located on your device, so if your device is compromised, all your accounts are also compromised.&lt;/p&gt;&lt;p&gt;So a user with a password manager has to worry about passwords being guessed, potential compromise of their email, or compromise of their password manager.&lt;/p&gt;&lt;h4 id=&#34;security-isnt-enforced&#34;&gt;Security isn&#39;t Enforced&lt;/h4&gt;&lt;p&gt;Not to mention that many of the protections of a password manager are optional. A user isn&#39;t required to generate secure passwords, many will just continue using the same passwords they always have.&lt;/p&gt;&lt;h4 id=&#34;poor-phishing-protection&#34;&gt;Poor Phishing Protection&lt;/h4&gt;&lt;p&gt;Although some argue autofill protects against phishing attacks, really it doesn&#39;t since as soon as it doesn&#39;t autofill, a user will simply copy and paste their password into the field. A proper anti-phishing mitigation would make it nearly impossible to authenticate with the wrong website. Autofill can introduce its own set of &lt;a href=&#34;https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x&#34;&gt;vulnerabilities&lt;/a&gt; as well.&lt;/p&gt;&lt;h3 id=&#34;salting-and-hashing&#34;&gt;Salting and Hashing&lt;/h3&gt;&lt;p&gt;Salting and hashing themselves I would consider band-aid solutions, as they were stapled on top of the existing system as security concerns grew. They rely a lot on the service providers implementing them properly and even still there are gaps in security as I previously mentioned.&lt;/p&gt;&lt;h3 id=&#34;two-factor-authentication&#34;&gt;Two-Factor Authentication&lt;/h3&gt;&lt;p&gt;Because of the risk of compromise with passwords, most websites implement some form of two-factor authentication.&lt;/p&gt;&lt;h4 id=&#34;email-2fa&#34;&gt;Email &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt;&lt;/h4&gt;&lt;p&gt;By far the most common is email &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt;, which on top of all the problems with using email as an authentication method stated before, usually only happens the first time you log in to a website on each device (until you clear your cookies that is).&lt;/p&gt;&lt;h4 id=&#34;sms-2fa&#34;&gt;&lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt;&lt;/h4&gt;&lt;p&gt;&lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt; is also common. This method is vulnerable to &lt;a href=&#34;https://www.verizon.com/about/account-security/sim-swapping&#34;&gt;&lt;abbr title=&#34;Subscriber Identity Module&#34;&gt;SIM&lt;/abbr&gt; swap attacks&lt;/a&gt; in which an attacker tricks your carrier into swapping your phone number onto a new &lt;abbr title=&#34;Subscriber Identity Module&#34;&gt;SIM&lt;/abbr&gt; card under their control. &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; is also completely unencrypted, lacking even transport encryption.&lt;/p&gt;&lt;p&gt;The SS7 system underlying &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; is inherently &lt;a href=&#34;https://youtu.be/wVyu7NB7W6Y?si=S8yzlWWh8zwuGraq&#34;&gt;vulnerable to interception&lt;/a&gt;. The idea of using &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; as a security tool is, frankly, laughable.&lt;/p&gt;&lt;h4 id=&#34;otp&#34;&gt;&lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;&lt;/h4&gt;&lt;p&gt;That brings us to &lt;a href=&#34;https://www.onelogin.com/learn/otp-totp-hotp&#34;&gt;&lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;&lt;/a&gt; or One Time Password. This &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt; method relies on two things: a shared secret between you and the website called a &#34;seed&#34;, and a &#34;moving factor&#34;.&lt;/p&gt;&lt;p&gt;The moving factor changes, allowing you both to generate a temporary password based on the seed that you need to type in on login.&lt;/p&gt;&lt;p&gt;There are two main approaches to &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;.&lt;/p&gt;&lt;h5 id=&#34;hotp&#34;&gt;&lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt;&lt;/h5&gt;&lt;p&gt;Hash-based Message Authentication Code &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt;, or &lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt;, increments the moving factor each time you successfully log in.&lt;/p&gt;&lt;h5 id=&#34;totp&#34;&gt;&lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt;&lt;/h5&gt;&lt;p&gt;In Time-based &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; or &lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt;, the moving factor is time. The generated passwords will be valid for only about 30 to 60 seconds. The amount of time they&#39;re valid for is called a &lt;em&gt;time step&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;Of the two, &lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; is newer and considered more secure since the passwords are constantly expiring.&lt;/p&gt;&lt;h5 id=&#34;issues&#34;&gt;Issues&lt;/h5&gt;&lt;p&gt;While a massive step up from &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt; in terms of both privacy and security, they&#39;re still lacking in phishing resistance.&lt;/p&gt;&lt;p&gt;If you are sent to a fake login screen and put in your &lt;abbr title=&#34;HMAC (Hash-based Message Authentication Code) based One-Time Password&#34;&gt;HOTP&lt;/abbr&gt; or &lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; password, the attacker can simply put that in to the real login screen. At least with &lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; there&#39;s a somewhat limited timeframe they can do it in, but these days phishing operations are fully automated, so it really doesn&#39;t matter.&lt;/p&gt;&lt;p&gt;Also since both you and the website are storing the same seed, any breach of either your device or the servers will leave you compromised. You could store your secret on a separate device or on a separate app on your phone, but this leaves the risk of either not having your phone with you to log in to your accounts or losing your &lt;abbr title=&#34;Time-based One-Time Password&#34;&gt;TOTP&lt;/abbr&gt; codes due to the file getting corrupted or a bad update. Overall, &lt;abbr title=&#34;One-Time Password&#34;&gt;OTP&lt;/abbr&gt; is better than &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt; but still leaves a lot to be desired.&lt;/p&gt;&lt;h3 id=&#34;shoulder-surfing&#34;&gt;Shoulder Surfing&lt;/h3&gt;&lt;p&gt;Another oft-forgotten issue with passwords is that someone could just &lt;a href=&#34;https://www.insideedition.com/thieves-are-snatching-phones-and-stealing-personal-info-after-studying-victims-passwords-81548&#34;&gt;watch you type it&lt;/a&gt; in and hack your account that way. Most password fields replace the characters in your password with stars or dots to combat this, but they usually still give you the option to show your password in plaintext anyway. The screen isn&#39;t the only way you can leak your password either, someone filming or watching you type it in a keyboard or on your phone screen would have your password with little effort. A human doesn&#39;t even need to be present, AI models can now work out your password just by &lt;a href=&#34;https://www.royalholloway.ac.uk/research-and-education/departments-and-schools/information-security/news/study-suggests-that-ai-can-detect-your-password-from-the-sound-of-keys-being-pressed/#:~:text=Artificial%20Intelligence%20can%20work%20out,Royal%20Holloway%2C%20University%20of%20London.&#34;&gt;listening&lt;/a&gt; to you type it.&lt;/p&gt;&lt;p&gt;All of these are attempts, with varying success, at fixing the individual flaws with passwords rather than designing a solution from the ground up with security in mind. They add complexity, more steps in the process where either you or a service provider can screw something up.&lt;/p&gt;&lt;h2 id=&#34;passkeys-the-password-replacement&#34;&gt;Passkeys: The Password Replacement&lt;/h2&gt;&lt;p&gt;&lt;a href=&#34;https://fidoalliance.org/passkeys/&#34;&gt;Passkeys&lt;/a&gt; are &lt;abbr title=&#34;Fast IDentity Online&#34;&gt;FIDO&lt;/abbr&gt; credentials tied to a specific app or website that let you sign in with the same method you use to unlock your device, be that biometrics or a PIN.&lt;/p&gt;&lt;iframe title=&#34;Passkey Authentication&#34; src=&#34;https://neat.tube/videos/embed/aa1e8c86-5ccb-41ca-bc20-7d1afe026759&#34; frameborder=&#34;0&#34; allowfullscreen=&#34;&#34; sandbox=&#34;allow-same-origin allow-scripts allow-popups allow-forms&#34; width=&#34;230&#34; height=&#34;440&#34;&gt;&lt;/iframe&gt;&lt;p&gt;As long as you can remember your phone password, you can log in to your accounts. This frees you up to set a secure password on your device, since that&#39;s the only password you&#39;d need to remember.&lt;/p&gt;&lt;p&gt;You may have heard of passkeys from Apple or Google and assumed they&#39;re some proprietary feature, but they&#39;re based on &lt;abbr title=&#34;Fast IDentity Online&#34;&gt;FIDO&lt;/abbr&gt; standards and the word &#34;passkey&#34; is meant to be a common noun like &#34;password,&#34; not tied to any platform or company.&lt;/p&gt;&lt;h3 id=&#34;no-personal-info&#34;&gt;No Personal Info&lt;/h3&gt;&lt;p&gt;You also won&#39;t need to use a username or email when logging in with passkeys, although currently most implementations still require it. Passkeys can fully replace every aspect of logging in.&lt;/p&gt;&lt;p&gt;That means no email to send phishing attacks to or hack, and no &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; to be &lt;abbr title=&#34;Subscriber Identity Module&#34;&gt;SIM&lt;/abbr&gt; swapped.&lt;/p&gt;&lt;h3 id=&#34;phishing-resistance&#34;&gt;Phishing Resistance&lt;/h3&gt;&lt;p&gt;Passkeys operate using public-key cryptography just like how &lt;abbr title=&#34;Hypertext Transfer Protocol Secure&#34;&gt;HTTPS&lt;/abbr&gt; works, so your private key isn&#39;t stored on the service provider&#39;s server, completely eliminating data breach issues with passwords. They were designed from the ground up to be phishing resistant and secure.&lt;/p&gt;&lt;h3 id=&#34;privacy&#34;&gt;Privacy&lt;/h3&gt;&lt;p&gt;Since a unique key pair is generated for each account, you don&#39;t have to worry about being identified between accounts either. Hopefully soon you won&#39;t need to pay for that email aliasing service just to not be tracked across accounts.&lt;/p&gt;&lt;h3 id=&#34;protection-against-losing-your-account&#34;&gt;Protection Against Losing Your Account&lt;/h3&gt;&lt;p&gt;You can even generate multiple passkeys per account in case you lose one somehow. Essentially this replaces the need for a recovery method; you can just add as many as you need, and they&#39;ll be available on all your devices anyway so losing your phone won&#39;t lock you out of your account.&lt;/p&gt;&lt;h3 id=&#34;anti-shoulder-surfing&#34;&gt;Anti-Shoulder Surfing&lt;/h3&gt;&lt;p&gt;Passkeys fight shoulder surfing by allowing you to use biometrics on your device to sign in. Even in the event someone got your device password, they would still need the actual private key associated with your account, either through physical possession of your device or some other compromise of your password manager. Since the private key stays in your possession and is never sent anywhere unencrypted, the risk is minimal.&lt;/p&gt;&lt;h3 id=&#34;fully-syncable&#34;&gt;Fully Syncable&lt;/h3&gt;&lt;p&gt;Passkeys can be synced across devices and in the cloud as well, so you don&#39;t have to worry about losing them. And they&#39;ll be &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;. Many password managers support passkeys, including Apple&#39;s and Google&#39;s built-in ones, so you can likely start using them right now.&lt;/p&gt;&lt;h3 id=&#34;try-it-out&#34;&gt;Try It Out&lt;/h3&gt;&lt;p&gt;You can test out passkeys at &lt;a href=&#34;https://webauthn.io&#34;&gt;webauthn.io&lt;/a&gt;. Even if your passkeys aren&#39;t synced to the device you&#39;re currently using, you can still login via a QR code, allowing your phone to act as a sort of wireless security key.&lt;/p&gt;&lt;h3 id=&#34;barriers&#34;&gt;Barriers&lt;/h3&gt;&lt;p&gt;The main barrier to passkey adoption currently is lack of support from websites and apps. They either don&#39;t support passkeys at all, or still force you to sign up with a password, email, etc. with no way to delete them. I encourage you to contact any website or apps that don&#39;t have passkey support and request it, with the ability to signup and login without ever setting a password.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/03/08/toward-a-passwordless-future/</link> <pubDate>Sat, 08 Mar 2025 16:21:29 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/03/08/toward-a-passwordless-future/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/03/08/toward-a-passwordless-future.png" type="image/png" length="None" /> </item> <item> <title>The UK Government Forced Apple to Remove Advanced Data Protection: What Does This Mean for You?</title> <author>Em</author> <category>News</category> <description>&lt;h1 id=&#34;the-uk-government-forced-apple-to-remove-advanced-data-protection-what-does-this-mean-for-you&#34;&gt;The UK Government Forced Apple to Remove Advanced Data Protection: What Does This Mean for You?&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Photo of a person reading a book. The book is George Orwell&#39;s 1984. In the upper left corner is an Apple logo with two bites taken off.&#34; src=&#34;../../../../assets/images/uk-forced-apple-to-remove-adp/cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Em / Privacy Guides | Photo: Edward Eyer / Pexels&lt;/small&gt;&lt;/p&gt;&lt;p&gt;On February 7th this year, Joseph Menn &lt;a href=&#34;https://www.washingtonpost.com/technology/2025/02/07/apple-encryption-backdoor-uk/&#34;&gt;reported&lt;/a&gt; from the &lt;em&gt;Washington Post&lt;/em&gt; that officials in the United Kingdom had contacted Apple to demand the company allows them to access data from any iCloud user &lt;a href=&#34;https://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/draft-investigatory-powers-bill-committee/draft-investigatory-powers-bill/written/26341.html&#34;&gt;worldwide&lt;/a&gt;. This included users who had activated Apple&#39;s &lt;a href=&#34;https://www.privacyguides.org/en/os/ios-overview/#icloud&#34;&gt;Advanced Data Protection&lt;/a&gt;, effectively requesting Apple break its strong end-to-end encrypted feature.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;Sources familiar with the matter told the &lt;em&gt;BBC&lt;/em&gt; and the &lt;em&gt;Washington Post&lt;/em&gt; that UK&#39;s Home Office served a &lt;a href=&#34;https://arstechnica.com/tech-policy/2017/05/investigatory-powers-act-legal-analysis/&#34;&gt;technical capability notice&lt;/a&gt; to Apple under the UK Investigatory Powers Act. Details are scarce about exactly what happened between the UK government and Apple because &lt;a href=&#34;https://www.bbc.co.uk/news/articles/cgj54eq4vejo&#34;&gt;neither Apple nor the Home Office&lt;/a&gt; have publicly commented on the notice.&lt;/p&gt;&lt;p&gt;However, &lt;a href=&#34;https://www.eff.org/deeplinks/2025/02/cornered-uks-demand-encryption-backdoor-apple-turns-its-strongest-security-setting&#34;&gt;last week&lt;/a&gt; apparently in response, Apple has completely removed the opt-in Advanced Data Protection feature from the UK. As of the 21st, Apple users located in the UK cannot activate Advanced Data Protection (end-to-end encryption) for their iCloud Drive, iCloud Backup, Photos, Notes, and more.&lt;/p&gt;&lt;p&gt;This is terrible news for anyone in the UK, and a frightening omen for everyone worldwide.&lt;/p&gt;&lt;h2 id=&#34;why-is-end-to-end-encryption-so-important&#34;&gt;Why is end-to-end encryption so important?&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;End-to-end encryption is a &lt;em&gt;crucial&lt;/em&gt; technology for digital privacy and security.&lt;/strong&gt; When data is encrypted end-to-end, this means that only the sender(s)/owner(s) and intended recipient(s) (if any) can access it.&lt;/p&gt;&lt;p&gt;For example, if data stored on Apple&#39;s servers is end-to-end encrypted, this means that even Apple could not read this data. If a government wanted to scan all the end-to-end data stored by Apple, it would be impossible to do because even Apple does not possess the keys to decrypt (read) this data.&lt;/p&gt;&lt;p&gt;In the same line, if a criminal were to steal end-to-end encrypted data from Apple&#39;s servers, they would not be able to decrypt it either. &lt;strong&gt;End-to-end encryption is the best defense against unauthorized access&lt;/strong&gt;, including data stolen by criminals or negligently leaked by organizations with poor security.&lt;/p&gt;&lt;p&gt;Any proposition to implement a &#34;backdoor&#34; to end-to-end encryption is &lt;em&gt;tragically misinformed&lt;/em&gt;. While it might at first sound appealing and a fair way to grant access to supposedly benevolent entities only, this approach is &lt;em&gt;incredibly&lt;/em&gt; naive and misguided.&lt;/p&gt;&lt;p&gt;Governments have repeatedly tried to propose these delusive policies, but it is simply impossible to add secret access to end-to-end encryption that would only be accessed by the intended groups no matter how good the intention. This is as absurd as poking a hole in a bowl and &lt;em&gt;demanding&lt;/em&gt; only apple juice leak through it but not water or any other liquid. It&#39;s just impossible.&lt;/p&gt;&lt;p&gt;End-to-end encryption with a backdoor is simply not end-to-end anymore. As Signal Foundation&#39;s President Meredith Whittaker &lt;a href=&#34;https://signal.org/blog/uk-online-safety-bill/&#34;&gt;said so well&lt;/a&gt;: &#34;&lt;strong&gt;Encryption is either broken for everyone, or it works for everyone. There is no way to create a safe backdoor.&lt;/strong&gt;&#34;&lt;/p&gt;&lt;p&gt;The only way to keep the benefit of end-to-end encryption with all the protections it offers is to keep it thoroughly and strictly end-to-end, for everyone.&lt;/p&gt;&lt;h2 id=&#34;why-some-governments-want-to-break-encryption&#34;&gt;Why some governments want to break encryption?&lt;/h2&gt;&lt;p&gt;&lt;a href=&#34;https://www.zdnet.com/article/the-encryption-war-is-on-again-and-this-time-government-has-a-new-strategy/&#34;&gt;Some governments&lt;/a&gt; have been pushing really hard to demand access to end-to-end encrypted data from tech companies. While the ground for this might seem reasonable at first, it fails to consider how the technology works. &lt;strong&gt;Encryption isn&#39;t magical, it is mathematical.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;American cryptographer Bruce Schneier &lt;a href=&#34;https://www.schneier.com/blog/archives/2025/02/an-icloud-backdoor-would-make-our-phones-less-safe.html&#34;&gt;explains&lt;/a&gt; this clearly, &#34;it’s a restriction enforced by mathematics—cryptography—and not policy.&#34;&lt;/p&gt;&lt;p&gt;No matter how good a reason a third-party might have to decrypt a single piece of end-to-end encrypted data, if there is a way to access it by an unauthorized entity, then it offers no protection at all against any other accesses, whether legal or criminal.&lt;/p&gt;&lt;p&gt;Besides the this-is-actually-mathematically-impossible argument, let&#39;s say we were to remove end-to-end encryption protections entirely for everyone everywhere (which a backdoor would effectively do). The other problem governments and law enforcement seem to fail to understand is that &lt;strong&gt;citizens&#39; rights and safety should be the priority&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Removing the lock on everyone&#39;s entry door possibly &lt;em&gt;could&lt;/em&gt; make it easier for law enforcement to catch &lt;em&gt;some&lt;/em&gt; criminals, it&#39;s true. But this would also &lt;strong&gt;expose &lt;em&gt;everyone&lt;/em&gt; to home invasion&lt;/strong&gt;, theft, vandalism, physical harm, and worse.&lt;/p&gt;&lt;p&gt;The price of removing the locks on everyone&#39;s doors is too high. Similarly, &lt;strong&gt;the price of removing the locks on everyone&#39;s digital doors is also too high&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Moreover, these governments always seem to assume that they, all well-intended benevolent governments of course, are assuredly reasonable and will only use this access to monitor the worst of criminals. Even if that was undoubtedly true &lt;em&gt;now&lt;/em&gt;, these supposedly benevolent governments fail to consider these conditions might not always stay true.&lt;/p&gt;&lt;p&gt;What is a benevolent government today might very well turn into an authoritarian nightmare tomorrow.&lt;/p&gt;&lt;p&gt;Once implemented into the system, &lt;strong&gt;the tools for mass surveillance can quickly turn against its own citizens&lt;/strong&gt; and victimize its most vulnerable population. This threat is always only &lt;a href=&#34;../../03/the-future-of-privacy/&#34;&gt;one change of government away&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;why-did-apple-remove-this-feature-from-the-uk&#34;&gt;Why did Apple remove this feature from the UK?&lt;/h2&gt;&lt;p&gt;Apple first introduced Advanced Data Protection in 2022. At the time, there was already in &lt;a href=&#34;https://www.theguardian.com/technology/2022/dec/08/privacy-changes-apple-uk-government-online-safety-bill&#34;&gt;a potential conflict&lt;/a&gt; with the UK&#39;s forthcoming Online Safety &lt;em&gt;Bill&lt;/em&gt;, which despite &lt;a href=&#34;https://www.openrightsgroup.org/campaign/online-safety-bill-campaign-hub/&#34;&gt;strong opposition&lt;/a&gt; became law in 2023 and is now the Online Safety &lt;em&gt;Act&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;Although attacks on encryption coming from governments aren&#39;t new, policymakers in favor of mass surveillance have recently increased the pressure on tech organizations to implement and normalize systemic monitoring, even in democratic countries. This is an &lt;strong&gt;extremely dangerous threat to privacy rights&lt;/strong&gt; and &lt;a href=&#34;https://www.amnesty.org/en/latest/news/2025/02/uk-encryption-order-threatens-global-privacy-rights/&#34;&gt;human rights&lt;/a&gt; around the world.&lt;/p&gt;&lt;p&gt;The giant Apple has long complied with law enforcement around the world and offers extensive &lt;a href=&#34;https://www.apple.com/legal/privacy/law-enforcement-guidelines-outside-us.pdf&#34;&gt;documentation&lt;/a&gt; to facilitate legal processes. However, when law enforcement requests access to data protected by end-to-end encryption, Apple does &lt;em&gt;not&lt;/em&gt; have access to this data, by definition.&lt;/p&gt;&lt;p&gt;The only way for Apple to provide law enforcement with access to end-to-end encrypted data would be to either lie to customers and secretly break the encryption, or remove the feature entirely. Apple chose the latter this week.&lt;/p&gt;&lt;p&gt;This is horrifying news for anyone located in the UK losing access to this great protection. Moreover, it sets a dangerous precedent for other controlling governments to follow suit.&lt;/p&gt;&lt;p&gt;It&#39;s difficult to fully judge the situation while the notice process is shrouded in secrecy, but Apple could have certainly put more pressure against it. If there is a big tech company who can afford to fight back in defense of privacy rights it&#39;s certainly Apple. Especially with all the privacy promises Apple gave to its users.&lt;/p&gt;&lt;p&gt;At the risk of quoting Bruce Schneier&#39;s excellent &lt;a href=&#34;https://www.schneier.com/blog/archives/2025/02/an-icloud-backdoor-would-make-our-phones-less-safe.html&#34;&gt;essay&lt;/a&gt; twice in this article: &lt;strong&gt;&#34;The companies need to resist, and—more importantly—we need to demand they do.&#34;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Each time a large organization like Apple gives in to oppressive requests, it increases the chance of these requests multiplying.&lt;/p&gt;&lt;h2 id=&#34;which-apple-applications-are-affected&#34;&gt;Which Apple applications are affected?&lt;/h2&gt;&lt;p&gt;At the moment, it&#39;s not possible for anyone located in the UK to activate Apple&#39;s opt-in Advanced Data Protection (ADP) feature anymore.&lt;/p&gt;&lt;p&gt;For UK users who have already activated ADP &lt;a href=&#34;https://www.macrumors.com/2025/02/26/advanced-data-protection-uk-need-to-know/&#34;&gt;instructions&lt;/a&gt; should follow soon, but it&#39;s probably a good time to look for alternative options (see &lt;a href=&#34;#what-to-do-if-you-are-living-in-the-uk&#34;&gt;below&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;With ADP enabled, Apple users can benefit from end-to-end encryption on many more Apple applications. These applications include: iCloud Backup (including device and message backups), iCloud Drive, Photos, Notes, Reminders, Safari Bookmarks, Siri Shortcuts, Voice Memos, Wallet Passes, Freeform, and potentially some &lt;a href=&#34;https://support.apple.com/102651&#34;&gt;third-party app data&lt;/a&gt;. If you cannot use ADP anymore, you will lose end-to-end encryption protections for these applications.&lt;/p&gt;&lt;p&gt;Some Apple services that aren&#39;t part of ADP will remain end-to-end encrypted in the UK (for now). Regardless, considering the political climate, it&#39;s likely a good idea to start &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;moving to alternatives&lt;/a&gt; that are perhaps less likely to get compromised or removed in the near future.&lt;/p&gt;&lt;p&gt;Apple&#39;s applications that &lt;a href=&#34;https://support.apple.com/102651&#34;&gt;still benefit&lt;/a&gt; from end-to-end encryption to this day in the UK include: Passwords and Keychain, Health data, Journal data, Home data, iMessage (only if iCloud Backup is &lt;em&gt;disabled&lt;/em&gt;!), Payment information, Apple Card transactions, Maps, QuickType Keyboard, Safari, Screen Time, Siri information, Wi-Fi passwords, Memoji.&lt;/p&gt;&lt;h2 id=&#34;what-does-this-mean-for-people-in-the-uk-and-the-rest-of-the-world&#34;&gt;What does this mean for people in the UK, and the rest of the world?&lt;/h2&gt;&lt;p&gt;For people in the UK, this is of course bad news and a very disappointing development. If this regional ADP block is maintained, it is a huge drawback for any Apple user&#39;s privacy rights, and a loss of data security as well.&lt;/p&gt;&lt;p&gt;For people outside the UK, &lt;strong&gt;this is a loud warning alarm&lt;/strong&gt;. The UK government isn&#39;t the only one that has repeatedly tried to undermine encryption and privacy rights. While this might sound obvious for some authoritarian regimes, it&#39;s sadly also true for other governments considered open and democratic.&lt;/p&gt;&lt;p&gt;This push for mass surveillance seems to have gained even more force in the past few years, as end-to-end encryption features make their way more frequently into the market.&lt;/p&gt;&lt;p&gt;For anyone who cares about human rights, privacy rights, and democracy worldwide, &lt;strong&gt;it is essential to push back hard against these legal proposal to undermine encryption&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Likewise, it&#39;s not too late for UK residents to also push back and make themselves heard by their government by loudly opposing new (and old) legislation undermining encryption.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Systemic surveillance should never be normalized.&lt;/strong&gt; Human rights can be lost, but they can also be won back with &lt;a href=&#34;https://www.openrightsgroup.org/press-releases/org-response-to-apple-killing-its-data-protection-tools-for-uk-users-encryption/&#34;&gt;strong opposition&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;what-to-do-about-it&#34;&gt;What to do about it?&lt;/h2&gt;&lt;p&gt;But what about concrete actions? What can a concerned netizen of the world do right now?&lt;/p&gt;&lt;p&gt;Here are a few things that might help you protect your data better from now on, and find alternatives to the end-to-end encryption features you might have lost:&lt;/p&gt;&lt;h3 id=&#34;what-to-do-if-you-are-living-in-the-uk&#34;&gt;What to do if you are living in the UK&lt;/h3&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Support and follow the Open Rights Group&#39;s &lt;a href=&#34;https://www.openrightsgroup.org/campaign/save-encryption/&#34;&gt;campaign to save encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Support &lt;a href=&#34;https://you.38degrees.org.uk/petitions/keep-our-apple-data-encrypted&#34;&gt;the petition&lt;/a&gt; organized by &lt;a href=&#34;https://www.openrightsgroup.org/&#34;&gt;Open Rights Group&lt;/a&gt; to tell your representatives you care about Apple&#39;s end-to-end encryption.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Replace iCloud Drive with an &lt;a href=&#34;https://www.privacyguides.org/en/cloud/&#34;&gt;end-to-end encrypted cloud service&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Backup your Apple device(s) &lt;em&gt;locally only&lt;/em&gt; and &lt;a href=&#34;https://support.apple.com/108353&#34;&gt;encrypt your backups&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Stop syncing your photos with iCloud. Either use a recommended end-to-end encrypted &lt;a href=&#34;https://www.privacyguides.org/en/cloud/&#34;&gt;cloud service&lt;/a&gt; to sync it, or only keep your photos locally.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Replace Apple Notes with another &lt;a href=&#34;https://www.privacyguides.org/en/notebooks/&#34;&gt;end-to-end encryption note application&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Replace Safari with a &lt;a href=&#34;https://www.privacyguides.org/en/desktop-browsers/&#34;&gt;privacy-respecting browser&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; If you can, &lt;a href=&#34;https://www.digitaltrends.com/mobile/how-to-turn-off-siri/&#34;&gt;disable Siri entirely&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Go through all your Apple devices&#39; settings, and be mindful to disable each option that could send data to Apple&#39;s servers if you do not want this data to potentially be scanned by a government or other entities.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Look for more privacy-respectful alternatives to Apple&#39;s products by browsing our &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;recommendations&lt;/a&gt; section.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Continue to fight for privacy rights and encryption rights every chance you get! The battle isn&#39;t over.&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 id=&#34;what-to-do-if-you-are-living-in-or-outside-the-uk&#34;&gt;What to do if you are living in or outside the UK&lt;/h3&gt;&lt;p&gt;Get information from and support organizations defending encryption rights like:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.globalencryption.org/about/&#34;&gt;Global Encryption Coalition&lt;/a&gt; (you can even &lt;a href=&#34;https://www.globalencryption.org/about/members/&#34;&gt;join the coalition&lt;/a&gt;!)&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.amnesty.org/en/tech/&#34;&gt;Amnesty Tech&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://cdt.org/insights/cdt-joins-global-encryption-coalition-letter-on-uk-governments-use-of-investigatory-powers-act-to-attack-end-to-end-encryption/&#34;&gt;Center for Democracy &amp;amp; Technology&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.eff.org/deeplinks/2024/12/defending-encryption-us-and-abroad&#34;&gt;EFF&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://www.makedmssafe.com/&#34;&gt;Fight for the Future&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a href=&#34;https://donate.magicgrants.org/privacyguides&#34;&gt;Privacy Guides&lt;/a&gt; 💛&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Use end-to-end encryption everywhere you can:&lt;/p&gt;&lt;ul class=&#34;task-list&#34;&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; If you are an Apple user outside the UK, &lt;a href=&#34;https://support.apple.com/108756&#34;&gt;activate Advanced Data Protection&lt;/a&gt; on your devices.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Regardless of where you are and which device you use, &lt;strong&gt;use end-to-end encryption features everywhere you can.&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; If you cannot find a cloud service you trust, you can &lt;a href=&#34;https://www.privacyguides.org/en/encryption/&#34;&gt;locally encrypt your data&lt;/a&gt; before uploading it to a cloud service of your choice.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Look for other privacy-respectful alternatives browsing our &lt;a href=&#34;https://www.privacyguides.org/en/tools/&#34;&gt;recommendations&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;&lt;li class=&#34;task-list-item&#34;&gt;&lt;p&gt;&lt;label class=&#34;task-list-control&#34;&gt;&lt;input type=&#34;checkbox&#34; disabled checked/&gt;&lt;span class=&#34;task-list-indicator&#34;&gt;&lt;/span&gt;&lt;/label&gt; Fight for privacy rights and encryption rights every chance you get!&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</description><link>https://www.privacyguides.org/articles/2025/02/28/uk-forced-apple-to-remove-adp/</link> <pubDate>Fri, 28 Feb 2025 17:29:36 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/02/28/uk-forced-apple-to-remove-adp/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/02/28/uk-forced-apple-to-remove-adp.png" type="image/png" length="None" /> </item> <item> <title>Bad-Faith Arguments in the Privacy Community</title> <author>Jonah Aragon</author> <category>Announcements</category> <category>Privacy Guides</category> <description>&lt;h1 id=&#34;bad-faith-arguments-in-the-privacy-community&#34;&gt;Bad-Faith Arguments in the Privacy Community&lt;/h1&gt;&lt;p&gt;The Privacy Guides community is one of the best privacy-related communities on the internet, and I think we have generally done a good job at promoting a positive and respectful environment where people can learn and grow.&lt;/p&gt;&lt;p&gt;Unfortunately, as a public forum we are not immune to the small minority of individuals who feel empowered to spread anger, hostility, and divisiveness by their anonymity and general lack of consequences on the internet.&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;From now on, we are going to be strict about requiring all posts in our communities to be made in good faith.&lt;/p&gt;&lt;p&gt;We will consider the following questions when reviewing posts:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Is the poster presenting their criticism as informed or factual, when it&#39;s actually a matter of personal opinion, or worse, misinformation or false?&lt;/li&gt;&lt;li&gt;Has the poster failed to provide reasoning for their criticism, and demonstrated an unwillingness to learn or discuss the topic?&lt;/li&gt;&lt;li&gt;Is the poster writing something as if it is true and informed, when they&#39;re actually just speculating?&lt;/li&gt;&lt;li&gt;Is the poster simply spreading negativity instead of actually trying to improve something?&lt;/li&gt;&lt;li&gt;Is the poster engaging in ad hominem attacks against us or our community?&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;If these answer to any of these questions is yes, the post will be removed and the poster will be asked to revise their statement. We will suspend posters who repeatedly engage in bad faith arguments.&lt;/p&gt;&lt;p&gt;For almost everyone here, you won&#39;t see any negative impacts of this new policy. It is simply designed to allow us to remove the small number of people who occasionally join to spread unproductive negativity in the privacy space, at the expense of legitimate projects making the world a better place. Hopefully you will notice improvements in discussion quality overall.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;To give an example, there are two specific behaviors we want to discourage with this new policy.&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;p&gt;The constant use of words like &#34;shilling,&#34; &#34;fanboys,&#34; etc. to describe people who have a difference in opinion to your own is not acceptable.&lt;/p&gt;&lt;p&gt;To &#34;&lt;a href=&#34;https://en.wikipedia.org/wiki/Shill&#34;&gt;shill&lt;/a&gt;&#34; something is to promote something you have an employer relationship or some other actual conflict of interest with. To accuse someone in our community of being a planted shill without any evidence, simply because they like something that you dislike, is both a serious accusation and a bad-faith argument.&lt;/p&gt;&lt;p&gt;Even the use of terms like these informally to describe people who like a certain product more than others is disrespectful, and sows uncertainty and distrust within our community, so it will no longer be tolerated.&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;A very small portion of GrapheneOS community members continually attempt to derail any conversations mentioning GrapheneOS with irrelevant details and confrontational attitudes.&lt;/p&gt;&lt;p&gt;This is not a reflection on the GrapheneOS project itself, but unfortunately this has become a repeated situation with certain community members of this specific project more than anyone else, so we have to call it out.&lt;/p&gt;&lt;p&gt;Making unfounded accusations against Privacy Guides community members of harassment towards GrapheneOS simply because they presented their criticism of the project is not a good faith argument. Similarly, presenting unverified statements from the GrapheneOS community as factual has led to misinformation being spread in the past. It is critical to always differentiate between opinions/beliefs and factual information.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Privacy Guides community spaces are not GrapheneOS discussion forums, and the drama from their community is not automatically on-topic in ours.&lt;/strong&gt; Please do not make new topics in our forum that simply link to drama posts from the GrapheneOS community. A good rule of thumb is that unless a post from GrapheneOS is specifically talking about GrapheneOS-specific, privacy-related functionality and not about other projects/software/etc., it is probably off-topic here.&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;</description><link>https://www.privacyguides.org/articles/2024/09/09/bad-faith-arguments/</link> <pubDate>Fri, 28 Feb 2025 14:59:16 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2024/09/09/bad-faith-arguments/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2024/09/09/bad-faith-arguments.png" type="image/png" length="None" /> </item> <item> <title>Biometrics Explained</title> <author>fria</author> <category>Biometrics</category> <category>Explainers</category> <description>&lt;h1 id=&#34;biometrics-explained&#34;&gt;Biometrics Explained&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Glowing fingerprint on glass&#34; src=&#34;../../../../assets/images/biometrics-explained/biometrics.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Jair Lázaro / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Biometrics are a convenient and secure way to authenticate our devices. Many of us use and trust the biometrics of our devices without much thought, but are they really secure? With so many &lt;a href=&#34;https://www.biometricsinstitute.org/what-is-biometrics/types-of-biometrics/&#34;&gt;options&lt;/a&gt;, which ones are the best?&lt;!-- more --&gt;&lt;/p&gt;&lt;h2 id=&#34;fingerprint-sensors&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M17.81 4.47c-.08 0-.16-.02-.23-.06C15.66 3.42 14 3 12 3c-1.97 0-3.85.47-5.56 1.41-.24.13-.54.04-.68-.2a.506.506 0 0 1 .2-.68C7.82 2.5 9.86 2 12 2s4 .47 6.04 1.5c.25.15.34.45.21.69a.48.48 0 0 1-.44.28M3.5 9.72c-.1 0-.2-.03-.29-.09a.517.517 0 0 1-.12-.7c.99-1.4 2.25-2.5 3.75-3.27C10 4.04 14 4.03 17.15 5.65c1.5.77 2.76 1.85 3.75 3.25.16.22.1.54-.12.7-.23.16-.54.11-.7-.1a9.26 9.26 0 0 0-3.39-2.96c-2.87-1.47-6.54-1.47-9.4.01-1.36.7-2.5 1.7-3.4 2.95-.08.15-.23.22-.39.22m6.25 12.07c-.13 0-.25-.05-.35-.15-.87-.87-1.34-1.43-2.01-2.64-.69-1.23-1.05-2.73-1.05-4.34 0-2.97 2.54-5.39 5.66-5.39s5.66 2.42 5.66 5.39a.5.5 0 0 1-.5.5.5.5 0 0 1-.5-.5c0-2.42-2.09-4.39-4.66-4.39s-4.66 1.97-4.66 4.39c0 1.44.32 2.77.93 3.84.64 1.16 1.08 1.65 1.85 2.43.19.2.19.51 0 .71-.12.1-.24.15-.37.15m7.17-1.85c-1.19 0-2.24-.3-3.1-.89-1.49-1.01-2.38-2.65-2.38-4.39a.5.5 0 0 1 .5-.5.5.5 0 0 1 .5.5c0 1.41.72 2.74 1.94 3.56.71.48 1.54.71 2.54.71.24 0 .64-.03 1.04-.1.27-.05.54.13.58.41.05.26-.13.53-.41.58-.57.11-1.07.12-1.21.12M14.91 22h-.13c-1.59-.46-2.63-1.05-3.72-2.12a7.28 7.28 0 0 1-2.17-5.22c0-1.62 1.38-2.94 3.08-2.94s3.08 1.32 3.08 2.94c0 1.07.95 1.94 2.08 1.94 1.15 0 2.08-.87 2.08-1.94 0-3.77-3.25-6.83-7.25-6.83-2.84 0-5.46 1.58-6.61 4.03-.39.81-.59 1.76-.59 2.8 0 .78.07 2.01.67 3.61.1.26-.03.55-.29.64a.504.504 0 0 1-.64-.29c-.5-1.31-.73-2.62-.73-3.96 0-1.2.23-2.29.68-3.24 1.33-2.79 4.28-4.6 7.51-4.6 4.54 0 8.25 3.51 8.25 7.83 0 1.62-1.38 2.94-3.08 2.94s-3.08-1.32-3.08-2.94c0-1.07-.93-1.94-2.08-1.94s-2.08.87-2.08 1.94c0 1.71.66 3.31 1.87 4.51.95.94 1.86 1.46 3.27 1.84.27.08.42.36.35.62-.05.23-.26.38-.47.38&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Fingerprint sensors&lt;/h2&gt;&lt;p&gt;One of the most recognizable types of biometric authentication has to be the fingerprint reader. The idea is that everyone has a fairly unique fingerprint, so we should be able to distinguish between your fingerprint and someone else&#39;s reliably.&lt;/p&gt;&lt;p&gt;There are three main types of fingerprint: loops, whorls, and arches. Fingerprint sensors categorize your finger into these groups before using other details to uniquely identify your fingerprint. You might think that you could count the number of arches/whorls/loops, but there can be many people with the same configuration and number of these. Also fingerprint sensors won&#39;t be able to see your entire fingerprint most of the time, they are designed to work at weird angles and with a partial scan, so it&#39;s not viable to use the whole fingerprint for authentication.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Examples of loop, whorl, and arch fingerprints&#34; src=&#34;../../../../assets/images/biometrics-explained/types-of-fingerprint.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image Credit: &lt;a href=&#34;https://engines.egr.uh.edu/episode/2529&#34;&gt;University of Houston&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;p class=&#34;annotate&#34;&gt;&lt;a href=&#34;https://sites.rutgers.edu/fingerprinting/no-two-finger-prints-are-alike/&#34;&gt;Finger minutiae&lt;/a&gt; data is used to identify a fingerprint as unique. This data consists of the points on your fingerprint where lines split, abruptly end, individual dots, etc. Two people can have the same number of arches, loops, and whorls, but they won&#39;t have the exact same configurations of minutiae. (1)&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M17.81 4.47c-.08 0-.16-.02-.23-.06C15.66 3.42 14 3 12 3c-1.97 0-3.85.47-5.56 1.41-.24.13-.54.04-.68-.2a.506.506 0 0 1 .2-.68C7.82 2.5 9.86 2 12 2s4 .47 6.04 1.5c.25.15.34.45.21.69a.48.48 0 0 1-.44.28M3.5 9.72c-.1 0-.2-.03-.29-.09a.517.517 0 0 1-.12-.7c.99-1.4 2.25-2.5 3.75-3.27C10 4.04 14 4.03 17.15 5.65c1.5.77 2.76 1.85 3.75 3.25.16.22.1.54-.12.7-.23.16-.54.11-.7-.1a9.26 9.26 0 0 0-3.39-2.96c-2.87-1.47-6.54-1.47-9.4.01-1.36.7-2.5 1.7-3.4 2.95-.08.15-.23.22-.39.22m6.25 12.07c-.13 0-.25-.05-.35-.15-.87-.87-1.34-1.43-2.01-2.64-.69-1.23-1.05-2.73-1.05-4.34 0-2.97 2.54-5.39 5.66-5.39s5.66 2.42 5.66 5.39a.5.5 0 0 1-.5.5.5.5 0 0 1-.5-.5c0-2.42-2.09-4.39-4.66-4.39s-4.66 1.97-4.66 4.39c0 1.44.32 2.77.93 3.84.64 1.16 1.08 1.65 1.85 2.43.19.2.19.51 0 .71-.12.1-.24.15-.37.15m7.17-1.85c-1.19 0-2.24-.3-3.1-.89-1.49-1.01-2.38-2.65-2.38-4.39a.5.5 0 0 1 .5-.5.5.5 0 0 1 .5.5c0 1.41.72 2.74 1.94 3.56.71.48 1.54.71 2.54.71.24 0 .64-.03 1.04-.1.27-.05.54.13.58.41.05.26-.13.53-.41.58-.57.11-1.07.12-1.21.12M14.91 22h-.13c-1.59-.46-2.63-1.05-3.72-2.12a7.28 7.28 0 0 1-2.17-5.22c0-1.62 1.38-2.94 3.08-2.94s3.08 1.32 3.08 2.94c0 1.07.95 1.94 2.08 1.94 1.15 0 2.08-.87 2.08-1.94 0-3.77-3.25-6.83-7.25-6.83-2.84 0-5.46 1.58-6.61 4.03-.39.81-.59 1.76-.59 2.8 0 .78.07 2.01.67 3.61.1.26-.03.55-.29.64a.504.504 0 0 1-.64-.29c-.5-1.31-.73-2.62-.73-3.96 0-1.2.23-2.29.68-3.24 1.33-2.79 4.28-4.6 7.51-4.6 4.54 0 8.25 3.51 8.25 7.83 0 1.62-1.38 2.94-3.08 2.94s-3.08-1.32-3.08-2.94c0-1.07-.93-1.94-2.08-1.94s-2.08.87-2.08 1.94c0 1.71.66 3.31 1.87 4.51.95.94 1.86 1.46 3.27 1.84.27.08.42.36.35.62-.05.23-.26.38-.47.38&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; It&#39;s theorized that the reason humans have fingerprints in the first place is to &lt;a href=&#34;https://www.science.org/doi/10.1126/science.1166467&#34;&gt;enhance our sense of touch&lt;/a&gt;.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;img alt=&#34;Example of finger minutiae including forks (where one line splits into multiple lines), ends (where a line ends), islands (isolated dots), and inclosures (lines that split into two and then reconnect)&#34; src=&#34;../../../../assets/images/biometrics-explained/finger-minutiae.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image Credit: &lt;a href=&#34;https://sites.rutgers.edu/fingerprinting/no-two-finger-prints-are-alike/&#34;&gt;Rutgers University&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Using these details for identification gives several advantages over trying to read the whole fingerprint. It allows the device to use less processing power, as well as providing some flexibility in case your finger is smudged or at a strange angle. The sensor doesn&#39;t even need to see your whole fingerprint. You might notice some fingerprint readers are very thin and might be located in a convenient place like a power button; finger minutiae is what allows them to still operate securely.&lt;/p&gt;&lt;p&gt;There are &lt;a href=&#34;https://www.androidauthority.com/how-fingerprint-scanners-work-670934/&#34;&gt;three&lt;/a&gt; main ways we accomplish this in consumer devices: optical sensors, capacitive sensors, and ultrasonic sensors.&lt;/p&gt;&lt;h3 id=&#34;optical&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 4h3l2-2h6l2 2h3a2 2 0 0 1 2 2v12a2 2 0 0 1-2 2H4a2 2 0 0 1-2-2V6a2 2 0 0 1 2-2m8 3a5 5 0 0 0-5 5 5 5 0 0 0 5 5 5 5 0 0 0 5-5 5 5 0 0 0-5-5m0 2a3 3 0 0 1 3 3 3 3 0 0 1-3 3 3 3 0 0 1-3-3 3 3 0 0 1 3-3&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Optical&lt;/h3&gt;&lt;p&gt;An optical sensor works by taking a picture of your fingerprint and turning it into data. They are the cheapest and least secure option. Since optical sensors capture two-dimensional images, an attacker may gain access by simply taking a picture of your fingerprint.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Diagram showing a closeup of how an optical fingerprint sensor works by reflecting light off the skin&#34; src=&#34;../../../../assets/images/biometrics-explained/optical-diagram.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image Credit: &lt;a href=&#34;https://clockit.io/fingerprint-scanner/&#34;&gt;clockit.io&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Many devices implement one of these sensors under the display.&lt;/p&gt;&lt;p&gt;Optical sensors can struggle in the presence of bright sunlight, which is an issue on a mobile device that you take around with you and use wherever you are.&lt;/p&gt;&lt;h3 id=&#34;capacitive&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M11 15H6l7-14v8h5l-7 14z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Capacitive&lt;/h3&gt;&lt;p&gt;Capacitive sensors measure the electrical conductivity of your finger. These are much more secure than optical sensors since they can&#39;t be fooled with an image. They&#39;re also tough to fool with prosthetics as different materials will have different electrical properties.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Diagram showing a closeup of how a capacitive fingerprint sensor works by detecting the electrical difference in the ridges and valleys of a finger&#34; src=&#34;../../../../assets/images/biometrics-explained/capacitve-diagram.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image Credit: &lt;a href=&#34;https://www.bayometric.com/capacitive-vs-optical/&#34;&gt;Bayometric&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Capacitive sensors won&#39;t work if the &lt;a href=&#34;https://www.livescience.com/62393-dead-fingerprint-unlock-phone.html&#34;&gt;tissue is dead&lt;/a&gt;, since dead tissue loses all electrical charge. So morbid worries about someone using your dead body to unlock your phone can be assuaged.&lt;/p&gt;&lt;p&gt;Conveniently they also don&#39;t require a light source under them to work, although they will struggle in the presence of moisture.&lt;/p&gt;&lt;h3 id=&#34;ultrasonic&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M14 3.23v2.06c2.89.86 5 3.54 5 6.71s-2.11 5.84-5 6.7v2.07c4-.91 7-4.49 7-8.77s-3-7.86-7-8.77M16.5 12c0-1.77-1-3.29-2.5-4.03V16c1.5-.71 2.5-2.24 2.5-4M3 9v6h4l5 5V4L7 9z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Ultrasonic&lt;/h3&gt;&lt;p&gt;Ultrasonic fingerprint sensors use sound to create a detailed 3D representation of your fingerprint using ultrasound waves (sound waves with a frequency greater than 20khz). It&#39;s a similar concept to what&#39;s used to map the ocean floor: sound is emitted from transducers and bounces off your skin. By measuring the time it takes for the sound to reach the microphones, your phone can create a detailed map of the ridges and valleys in your finger.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Diagram showing the transducers emitting ultrasound waves and reflecting off the finger tissue bouncing back and then being picked up by microphones&#34; src=&#34;../../../../assets/images/biometrics-explained/ultrasonic-diagram.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image Credit: &lt;a href=&#34;https://www.researchgate.net/publication/285770473_Piezoelectric_Micromachined_Ultrasonic_Transducers_for_Fingerprint_Sensing&#34;&gt;Yipeng Lu&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;p&gt;This is the most expensive type of sensor, but it produces the most accurate readings with the highest reliability. It doesn&#39;t matter if your finger is a bit dirty or wet, it will still work unlike optical or capacitive sensors.&lt;/p&gt;&lt;p&gt;Ultrasonic sensors can&#39;t be fooled by 2D images.&lt;/p&gt;&lt;p&gt;One downside is that you lose the protection against dead tissue that capacitive sensors offer, but this is not relevant for most people.&lt;/p&gt;&lt;h3 id=&#34;additional-considerations&#34;&gt;Additional considerations&lt;/h3&gt;&lt;p&gt;Fingerprint unlock will inherently be vulnerable to someone forcing you to put your finger on the sensor to unlock your device, so keep this in mind when threat modeling.&lt;/p&gt;&lt;p&gt;They also won&#39;t work with gloves and sometimes screen protectors can interfere, so make sure that the sensor is uncovered and making direct contact with your actual finger, or otherwise using an &lt;abbr title=&#34;Original Equipment Manufacturer&#34;&gt;OEM&lt;/abbr&gt;-approved covering.&lt;/p&gt;&lt;p&gt;Fingerprint authentication will protect you against someone filming you surreptitiously while typing in your password or shoulder surfing. This is an especially relevant attack if your threat model includes thieves as a common attack is watching you type your passcode in and then stealing your phone.&lt;/p&gt;&lt;h2 id=&#34;face-unlock&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M9 11.75A1.25 1.25 0 0 0 7.75 13 1.25 1.25 0 0 0 9 14.25 1.25 1.25 0 0 0 10.25 13 1.25 1.25 0 0 0 9 11.75m6 0A1.25 1.25 0 0 0 13.75 13 1.25 1.25 0 0 0 15 14.25 1.25 1.25 0 0 0 16.25 13 1.25 1.25 0 0 0 15 11.75M12 2A10 10 0 0 0 2 12a10 10 0 0 0 10 10 10 10 0 0 0 10-10A10 10 0 0 0 12 2m0 18a8 8 0 0 1-8-8 4 4 0 0 1 0-.86 10.05 10.05 0 0 0 5.26-5.37A9.99 9.99 0 0 0 17.42 10c.76 0 1.51-.09 2.25-.26 1.25 4.26-1.17 8.69-5.41 9.93-.76.22-1.5.33-2.26.33M0 2a2 2 0 0 1 2-2h4v2H2v4H0zm24 20a2 2 0 0 1-2 2h-4v-2h4v-4h2zM2 24a2 2 0 0 1-2-2v-4h2v4h4v2zM22 0a2 2 0 0 1 2 2v4h-2V2h-4V0z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Face unlock&lt;/h2&gt;&lt;p&gt;Many devices come with the capability to unlock them using your face. The &lt;a href=&#34;https://www.androidauthority.com/face-unlock-smartphones-3043993/&#34;&gt;implementations&lt;/a&gt; of this technology can vary wildly between manufacturers since a secure implementation requires a lot of special hardware, so many &lt;abbr title=&#34;Original Equipment Manufacturers&#34;&gt;OEMs&lt;/abbr&gt; choose to cheap out. All forms of face unlock are more likely to allow a twin or sibling into your device since their face is more similar to yours than a random person off the street, so keep that in mind in your threat model.&lt;/p&gt;&lt;h3 id=&#34;2d-camera-based&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M7 2h10v10.5c0-1.67-3.33-2.5-5-2.5s-5 .83-5 2.5M17 0H7a2 2 0 0 0-2 2v14a2 2 0 0 0 2 2h10a2 2 0 0 0 2-2V2a2 2 0 0 0-2-2m-5 8a2 2 0 0 0 2-2 2 2 0 0 0-2-2 2 2 0 0 0-2 2 2 2 0 0 0 2 2m2 12v2h5v-2m-9 0H5v2h5v2l3-3-3-3z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; 2D camera-based&lt;/h3&gt;&lt;p&gt;Every phone already has a camera, so why not use it for face unlock?&lt;/p&gt;&lt;p&gt;If you&#39;re relying on a plain 2D image, then there&#39;s always the possibility that it could be fooled by a &lt;a href=&#34;https://www.theregister.com/2023/05/19/2d_photograph_facial_recog/&#34;&gt;regular photo&lt;/a&gt;. Someone getting in to your phone because they have a picture of your face is a security nightmare scenario and the only thing stopping it is the whims of whatever algorithm was programmed into your phone.&lt;/p&gt;&lt;p&gt;This form of face unlock is also less likely to work in low-light conditions than infrared variants.&lt;/p&gt;&lt;h3 id=&#34;2d-infrared-based&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m8.5 4.5-3.1 5 3.1 5.2-3.3 5.8-1.8-.9 2.7-4.9L3 9.5l3.7-5.9zm6.2-.1-3.1 5.1 3.1 5-3.3 5.8-1.8-.9 2.7-4.9-3.1-5 3.7-6zm6.3 0-3.1 5.1 3.1 5-3.3 5.8-1.8-.9 2.7-4.9-3.1-5 3.7-6z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; 2D infrared-based&lt;/h3&gt;&lt;p&gt;The next step up in security is an infrared sensor. This requires dedicated hardware to be built into the device, which eats up space and adds cost. But what you get in return is a form of face unlock that&#39;s more reliable in low-light conditions and more resistant to photographs.&lt;/p&gt;&lt;h3 id=&#34;3d-mapping&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M17 22v-2h3v-3h2v3.5c0 .39-.16.74-.46 1.04s-.65.46-1.04.46zM7 22H3.5c-.39 0-.74-.16-1.04-.46S2 20.89 2 20.5V17h2v3h3zM17 2h3.5c.39 0 .74.16 1.04.46s.46.65.46 1.04V7h-2V4h-3zM7 2v2H4v3H2V3.5c0-.39.16-.74.46-1.04S3.11 2 3.5 2zm6 15.25 4-2.3v-4.59l-4 2.3zm-1-6.33 4-2.29-4-2.35-4 2.35zm-5 4.03 4 2.3v-4.59l-4-2.3zm11.23-7.36c.5.32.77.75.77 1.32v6.32c0 .57-.27 1-.77 1.32l-5.48 3.18q-.75.48-1.5 0l-5.48-3.18c-.5-.32-.77-.75-.77-1.32V8.91c0-.57.27-1 .77-1.32l5.48-3.18c.25-.13.5-.19.75-.19s.5.06.75.19z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; 3D mapping&lt;/h3&gt;&lt;p&gt;The potential of this technology truly shines when 2D face unlock is combined with an infrared flood illuminator. These are able to shine thousands of invisible infrared dots on your face and record the distance of each one, creating a 3D map of your face. As you can probably imagine, this tech takes up quite a bit of space and adds yet more cost to the device, as well as likely being the main reason for the &#34;notch&#34; on iPhones. This drawback is well worth it though. According to &lt;a href=&#34;https://support.apple.com/en-us/102381&#34;&gt;Apple&lt;/a&gt;:&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;The probability that a random person in the population could look at your iPhone or iPad Pro and unlock it using Face ID is less than 1 in 1,000,000 with a single enrolled appearance whether or not you&#39;re wearing a mask.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;They put the odds for Touch ID around &lt;a href=&#34;https://support.apple.com/en-us/105095&#34;&gt;1 in 50,000&lt;/a&gt; for comparison.&lt;/p&gt;&lt;p&gt;3D face unlock is immune to 2D images and requires a 3D reconstruction of a face before it has a chance of being fooled.&lt;/p&gt;&lt;h3 id=&#34;additional-considerations_1&#34;&gt;Additional considerations&lt;/h3&gt;&lt;p&gt;You&#39;ll likely want an implementation with some protection against another person pointing your phone at your face to unlock it. iOS allows you to enable a setting where you need to be looking at the phone before it will unlock (called &#34;Require Attention for Face ID&#34;), look for a similar feature when shopping for a device.&lt;/p&gt;&lt;p&gt;Some devices allow for unlocking with a facemask. This is less secure than without a facemask, so keep that in mind when enabling this setting.&lt;/p&gt;&lt;h2 id=&#34;iris-sensors&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M12 9a3 3 0 0 0-3 3 3 3 0 0 0 3 3 3 3 0 0 0 3-3 3 3 0 0 0-3-3m0 8a5 5 0 0 1-5-5 5 5 0 0 1 5-5 5 5 0 0 1 5 5 5 5 0 0 1-5 5m0-12.5C7 4.5 2.73 7.61 1 12c1.73 4.39 6 7.5 11 7.5s9.27-3.11 11-7.5c-1.73-4.39-6-7.5-11-7.5&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Iris sensors&lt;/h2&gt;&lt;p&gt;A spy movie classic but newcomer in the consumer electronics field, iris sensors offer authentication via the unique properties of your eyes. The Apple Vision Pro is the most notable example with its &lt;a href=&#34;https://support.apple.com/en-us/118483&#34;&gt;Optic ID&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;It uses near-infrared light to reveal highly unique patterns independent of the pigmentation of your eyes. Apple estimates the likelihood of a random person being able to unlock your Optic ID at less than 1 in 1,000,000, similar to Face ID.&lt;/p&gt;&lt;p&gt;The extremely short distance this technology operates at makes it very difficult for someone to unlock your device without you noticing, and you can simply close your eyes to prevent someone from forcing you to unlock it.&lt;/p&gt;&lt;h2 id=&#34;algorithm&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M2 2h4v2H4v16h2v2H2zm18 2h-2V2h4v20h-4v-2h2zM9 5h1v5h1v1H8v-1h1V6l-1 .5v-1zm6 8h1v5h1v1h-3v-1h1v-4l-1 .5v-1zm-6 0c1.1 0 2 1.34 2 3s-.9 3-2 3-2-1.34-2-3 .9-3 2-3m0 1c-.55 0-1 .9-1 2s.45 2 1 2 1-.9 1-2-.45-2-1-2m6-9c1.1 0 2 1.34 2 3s-.9 3-2 3-2-1.34-2-3 .9-3 2-3m0 1c-.55 0-1 .9-1 2s.45 2 1 2 1-.9 1-2-.45-2-1-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Algorithm&lt;/h2&gt;&lt;p&gt;Because biometric systems need to translate the physical properties of your body to data, they rely on an algorithm to determine if their reading matches closely enough.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://source.android.com/docs/security/features/biometric&#34;&gt;Android&lt;/a&gt; has guidelines on how &lt;abbr title=&#34;Original Equipment Manufacturers&#34;&gt;OEMs&lt;/abbr&gt; should implement biometrics and how they can &lt;a href=&#34;https://source.android.com/docs/security/features/biometric/measure&#34;&gt;test&lt;/a&gt; them for security. If you&#39;re performing your own security research, you should look here for guidance on testing methodology.&lt;/p&gt;&lt;p&gt;There is also independent research into the security of biometric systems. This combination of external and internal rigor helps ensure the security of these systems, although more well known brands like Apple and Google will receive more scrutiny than lesser-known ones.&lt;/p&gt;&lt;h2 id=&#34;typing-biometrics&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M19 10h-2V8h2m0 5h-2v-2h2m-3-1h-2V8h2m0 5h-2v-2h2m0 6H8v-2h8m-9-5H5V8h2m0 5H5v-2h2m1 0h2v2H8m0-5h2v2H8m3 1h2v2h-2m0-5h2v2h-2m9-5H4c-1.11 0-2 .89-2 2v10a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V7a2 2 0 0 0-2-2&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Typing biometrics&lt;/h2&gt;&lt;p&gt;Companies like &lt;a href=&#34;https://www.typingdna.com&#34;&gt;TypingDNA&lt;/a&gt; claim to be able to identify users by how they type.&lt;/p&gt;&lt;p&gt;The stated use case is &lt;abbr title=&#34;2-Factor Authentication&#34;&gt;2FA&lt;/abbr&gt; and continuous authentication for employee devices. Likely you&#39;ll only encounter this technology on work devices, especially since this type of biometrics will be affected by the type of keyboard you&#39;re using. It only really makes sense to authenticate on a specific device that you&#39;ll be using continuously and typing on a lot, such as a work laptop.&lt;/p&gt;&lt;p&gt;It could also be used on websites to uniquely identify you, so type in a text editor program then copy/paste into the browser window to avoid this specific type of fingerprinting.&lt;/p&gt;&lt;h2 id=&#34;gait-biometrics&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M14.12 10H19V8.2h-3.62l-2-3.33c-.3-.5-.84-.84-1.46-.84-.18 0-.34.03-.5.08L6 5.8V11h1.8V7.33l2.11-.66L6 22h1.8l2.87-8.11L13 17v5h1.8v-6.41l-2.49-4.54.73-2.87M14 3.8c1 0 1.8-.8 1.8-1.8S15 .2 14 .2 12.2 1 12.2 2 13 3.8 14 3.8&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Gait biometrics&lt;/h2&gt;&lt;p&gt;Possibly the most insidious of the biometric systems in widespread use is gait recognition. Yes, you can be uniquely identified just by how you walk.&lt;/p&gt;&lt;h3 id=&#34;camera&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M4 4h3l2-2h6l2 2h3a2 2 0 0 1 2 2v12a2 2 0 0 1-2 2H4a2 2 0 0 1-2-2V6a2 2 0 0 1 2-2m8 3a5 5 0 0 0-5 5 5 5 0 0 0 5 5 5 5 0 0 0 5-5 5 5 0 0 0-5-5m0 2a3 3 0 0 1 3 3 3 3 0 0 1-3 3 3 3 0 0 1-3-3 3 3 0 0 1 3-3&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Camera&lt;/h3&gt;&lt;p&gt;This technology can work using only 2D footage and doesn&#39;t even require close proximity or high resolution sensors like other forms of biometrics. Combined with the huge network of cameras deployed in most cities, you can potentially be identified and tracked around even with a fully covered face.&lt;/p&gt;&lt;p&gt;This type of biometric can work without your consent and when other identifiable features such as face and fingerprints are hidden. It&#39;s also very difficult to impersonate someone else&#39;s gait.&lt;/p&gt;&lt;p&gt;There are two approaches for extracting biometric data from video.&lt;/p&gt;&lt;h4 id=&#34;model-based&#34;&gt;Model-based&lt;/h4&gt;&lt;p&gt;This approach attempts to model the human body in order to track the different parts of it. A well-known example of this approach is the Microsoft Kinect, which only consists of a fairly low-resolution camera. It simplifies the human body into a stick figure, which you can see in footage of the &lt;a href=&#34;https://www.youtube.com/watch?v=33AsuE-WP64&#34;&gt;Kinect&lt;/a&gt; in action. It then uses the distances and joint angles of the model for gait recognition.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Diagram showing the Kinect&#39;s model of the human body, a 2D skeleton made up of various parts&#34; src=&#34;../../../../assets/images/biometrics-explained/kinect-skeleton.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image Credit: &lt;a href=&#34;https://www.researchgate.net/publication/334049964_Markerless_Human_Motion_Tracking_Using_Microsoft_Kinect_SDK_and_Inverse_Kinematics&#34;&gt;Alireza Bilesan, Saeed Behzadipour, Teppei Tsujita, Shunsuke Komizunai, and Atsushi Konno&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;h4 id=&#34;model-free&#34;&gt;Model-free&lt;/h4&gt;&lt;p&gt;Model-free approaches don&#39;t try to model the human body but instead use the whole motion of human silhouettes. This gives a few advantages: it works regardless of camera quality, and it takes significantly fewer resources.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Diagram showing the process of turning raw camera input into a silhouette useful for gait recognition&#34; src=&#34;../../../../assets/images/biometrics-explained/model-free-gait.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Image Credit: &lt;a href=&#34;https://doi.org/10.1007/s11227-023-05156-9&#34;&gt;Yousef, R.N., Khalil, A.T., Samra, A.S. et al.&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;&lt;h3 id=&#34;accelerometer&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m12 2 4 4h-3v7.85l6.53 3.76L21 15.03l1.5 5.47-5.5 1.46 1.53-2.61L12 15.58l-6.53 3.77L7 21.96 1.5 20.5 3 15.03l1.47 2.58L11 13.85V6H8z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Accelerometer&lt;/h3&gt;&lt;p&gt;Accelerometers such as those found in your smartphone can also be used for gait recognition. These need to be worn on a person&#39;s body, so they can&#39;t be used from long distance like camera-based approaches.&lt;/p&gt;&lt;p&gt;Accelerometers work by measuring the accelerations in 3D space in X, Y, and Z coordinates. They tend to also utilize gyroscopes, which measure the orientation of a device.&lt;/p&gt;&lt;h3 id=&#34;floor-sensor&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M16 2a2 2 0 1 1-2 2 2 2 0 0 1 2-2m-3.96 1a1.5 1.5 0 1 1-1.5 1.5 1.5 1.5 0 0 1 1.5-1.5M9.09 4.5a1 1 0 1 1-1 1 1 1 0 0 1 1-1M7.04 6a1 1 0 1 1-1 1 1 1 0 0 1 1-1m7.49 6A2.5 2.5 0 0 0 17 9.24 2.6 2.6 0 0 0 14.39 7h-2.48a6 6 0 0 0-5.79 4.4 2 2 0 0 0 .11 1.4 6.8 6.8 0 0 1 .68 2.96 6.9 6.9 0 0 1-.69 2.79 1.92 1.92 0 0 0 .08 1.76 3.62 3.62 0 0 0 3.89 1.6 3.5 3.5 0 0 0 2.17-5.28 2.8 2.8 0 0 1-.45-1.63s-.23-3 2.62-3&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Floor sensor&lt;/h3&gt;&lt;p&gt;It&#39;s possible to identify individuals using &lt;a href=&#34;https://www.amti.biz/product/bms464508/&#34;&gt;sensors&lt;/a&gt; in the floor that measure the pressure of your steps as you take them. There are already companies offering software/hardware &lt;a href=&#34;https://www.scanalyticsinc.com/how-it-works&#34;&gt;installations&lt;/a&gt; for tracking customers within a store using this technology.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;Scanalytics floor sensors capture up to 100% of foot traffic through your buildings and spaces. Capturing individual footsteps and the paths they form, we are able to monitor and analyze complete space movements and usage.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;Floor sensors are especially concerning since they&#39;re completely invisible to you.&lt;/p&gt;&lt;h3 id=&#34;radar&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;m19.07 4.93-1.41 1.41A8.01 8.01 0 0 1 20 12a8 8 0 0 1-8 8 8 8 0 0 1-8-8c0-4.08 3.05-7.44 7-7.93v2.02C8.16 6.57 6 9.03 6 12a6 6 0 0 0 6 6 6 6 0 0 0 6-6c0-1.66-.67-3.16-1.76-4.24l-1.41 1.41C15.55 9.9 16 10.9 16 12a4 4 0 0 1-4 4 4 4 0 0 1-4-4c0-1.86 1.28-3.41 3-3.86v2.14c-.6.35-1 .98-1 1.72a2 2 0 0 0 2 2 2 2 0 0 0 2-2c0-.74-.4-1.38-1-1.72V2h-1A10 10 0 0 0 2 12a10 10 0 0 0 10 10 10 10 0 0 0 10-10c0-2.76-1.12-5.26-2.93-7.07&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Radar&lt;/h3&gt;&lt;p&gt;Radar works by transmitting a signal and measuring how long it takes for that signal to return, allowing you to measure how far an object is from you. In addition, if an object is moving relative to the sensor, the reflected waves will be a different frequency than when they were transmitted due to the &lt;a href=&#34;https://www.noaa.gov/jetstream/doppler/how-radar-works&#34;&gt;Doppler effect&lt;/a&gt;. This can be used to determine the speed of an object and whether it&#39;s moving toward or away from you.&lt;/p&gt;&lt;p&gt;Using a continuous wave (CW) radar that&#39;s constantly emitting a signal, it&#39;s possible to measure the movements of all the different parts of your body during your gait to identify you uniquely. This is called a &lt;a href=&#34;https://books.google.com/books?hl=en&amp;amp;lr=&amp;amp;id=SVCQDwAAQBAJ&amp;amp;oi=fnd&amp;amp;pg=PA1&amp;amp;ots=cqJxAh_rPv&amp;amp;sig=bBz1w4h-C4nDrzNwiRvZUexKbnc#v=onepage&amp;amp;q&amp;amp;f=false&#34;&gt;micro-Doppler&lt;/a&gt; signature. These sensors can even be sensitive enough that they can pick up breathing and heartbeats of humans trapped in rubble during rescue operations.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://gaitmetrics.com/applications/&#34;&gt;GaitMetrics&lt;/a&gt; is a company claiming to offer mmWave gait recognition technology.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;It is also possible to identify the intruder’s unique radio gait IDs and capture them in a database. Any intruder with an unknown radio gait ID detected within the premises will trigger an alarm, and the intruder’s location will be tracked down.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;They claim it can uniquely identify individuals as well as penetrate walls, a worrying combination.&lt;/p&gt;&lt;h2 id=&#34;what-makes-biometrics-private&#34;&gt;What makes biometrics private?&lt;/h2&gt;&lt;h3 id=&#34;local-storage&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M19.8 22.6 17.15 20H6.5q-2.3 0-3.9-1.6T1 14.5q0-1.92 1.19-3.42 1.19-1.51 3.06-1.93.08-.2.15-.39.1-.19.15-.41L1.4 4.2l1.4-1.4 18.4 18.4m.4-2.45L8.05 5.23q.88-.6 1.86-.92Q10.9 4 12 4q2.93 0 4.96 2.04Q19 8.07 19 11q1.73.2 2.86 1.5 1.14 1.28 1.14 3 0 1-.37 1.81-.38.84-1.03 1.44&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Local Storage&lt;/h3&gt;&lt;p&gt;As with most things, keeping everything on your device is the key to private biometrics. A secure and private biometric authentication system should store any biometric data fully on-device and further, shouldn&#39;t make it accessible at all, even to the user. Biometric data is so incredibly sensitive and uniquely identifying that it needs to be treated with the utmost care. For example, apps on your phone don&#39;t have direct access to your fingerprint or face data, they must use an &lt;a href=&#34;https://developer.apple.com/documentation/localauthentication&#34;&gt;API&lt;/a&gt; to use biometric authentication.&lt;/p&gt;&lt;p&gt;On the other end of the spectrum we have companies like &lt;a href=&#34;https://www.idemia.com&#34;&gt;IDEMIA&lt;/a&gt; which boast about their &lt;a href=&#34;https://www.idemia.com/wp-content/uploads/2021/01/augmented-vision-platform-idemia-brochure-202102.pdf&#34;&gt;Augmented Vision&lt;/a&gt;, designed to take video data from the myriad surveillance cameras littering every US city and track you around everywhere you go. It combines facial recognition, object recognition, plate reading, and much more to create an Orwellian surveillance apparatus that stores all your data in some server somewhere, fully accessible to their customers (or any hackers that want a treasure trove of surveillance data). They also have a product called &lt;a href=&#34;https://www.idemia.com/wp-content/uploads/2021/02/mobile-biometric-check-idemia-brochure-202007.pdf&#34;&gt;Mobile Biometric Check&lt;/a&gt; that allows cops to use their phone camera to take a picture of your fingerprints and compare them to a database. This is the exact opposite of responsible biometrics.&lt;/p&gt;&lt;h3 id=&#34;secure-element&#34;&gt;&lt;span class=&#34;twemoji&#34;&gt;&lt;svg xmlns=&#34;http://www.w3.org/2000/svg&#34; viewBox=&#34;0 0 24 24&#34;&gt;&lt;path d=&#34;M6 4h12v1h3v2h-3v2h3v2h-3v2h3v2h-3v2h3v2h-3v1H6v-1H3v-2h3v-2H3v-2h3v-2H3V9h3V7H3V5h3zm5 11v3h1v-3zm2 0v3h1v-3zm2 0v3h1v-3z&#34;/&gt;&lt;/svg&gt;&lt;/span&gt; Secure Element&lt;/h3&gt;&lt;p&gt;All forms of biometric authentication rely on proper hardware such as a secure element in order to be secure. The secure element provides a secure and tamper-resistant place to store your biometric data separate from the rest of the system, so it can&#39;t be easily extracted. Examples include Apple&#39;s &lt;a href=&#34;https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/web&#34;&gt;Secure Enclave&lt;/a&gt; and Google&#39;s &lt;a href=&#34;https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html&#34;&gt;Titan M&lt;/a&gt; series of chips. You should avoid devices that lack a secure element; they won&#39;t be able to properly implement secure biometrics without one.&lt;/p&gt;&lt;h3 id=&#34;final-thoughts&#34;&gt;Final thoughts&lt;/h3&gt;&lt;p&gt;Like all technology, biometrics aren&#39;t inherently good or bad. They&#39;re used to secure our devices and make authentication smooth and easy, but they&#39;re also used for &lt;a href=&#34;https://therecord.media/europe-gait-recognition-study-pilot-program&#34;&gt;mass surveillance&lt;/a&gt;. Especially now with the rise of AI, we&#39;ve started to leave the realm of scientifically rigorous usages and into the realm of digital snake oil, with companies like Cursor Insight launching their &lt;a href=&#34;https://www.motionscore.ai&#34;&gt;MotionScore&lt;/a&gt; product.&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;Our patent-pending AI technology identifies hidden patterns in signatures and online or mobile user interactions. These patterns can reflect behaviors and personal characteristics relevant to creditworthiness and reliability.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;It should go without saying that making decisions about whom to give a loan to based on... how they sign their name or some other mystery movement data is ludicrous, laughable if it wasn&#39;t affecting real people&#39;s lives. Now more than ever we need to be educated about the biometric technology that we use and that&#39;s used against us. The &lt;a href=&#34;https://sls.eff.org/technologies/biometric-surveillance&#34;&gt;EFF&lt;/a&gt; is a great resource that documents and fights against abuses of biometric technology.&lt;/p&gt;&lt;p&gt;Many of the same technologies used for mass surveillance are also used for &lt;a href=&#34;https://www.amti.biz/2024/08/28/amti-technology-featured-in-triple-crown-power-5-fastpitch-tournament/&#34;&gt;helpful&lt;/a&gt; purposes. It&#39;s up to us to ensure responsible use of technology going forward.&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/02/13/biometrics-explained/</link> <pubDate>Fri, 28 Feb 2025 14:59:16 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/02/13/biometrics-explained/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/02/13/biometrics-explained.png" type="image/png" length="None" /> </item> <item> <title>Choosing the Right Messenger</title> <author>Dan Arel</author> <category>Instant Messengers</category> <category>Opinion</category> <description>&lt;h1 id=&#34;choosing-the-right-messenger&#34;&gt;Choosing the Right Messenger&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;&amp;quot;Choosing The Right Messenger&amp;quot; cover image&#34; src=&#34;../../../../assets/images/choosing-the-right-messenger/cover.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Illustration: Jonah Aragon / Privacy Guides | Photo: Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;One of the most common questions users have when it comes to privacy is about messaging services. It seems almost all of them mention some level of privacy or encryption to entice the user to sign up for their service, but how can you be sure you’re using the most secure, privacy respecting platform?&lt;!-- more --&gt;&lt;/p&gt;&lt;p&gt;The answer actually lies in one’s &lt;a href=&#34;https://www.privacyguides.org/basics/threat-modeling/&#34;&gt;threat model&lt;/a&gt;, which is often an ignored step in choosing all privacy related apps and services, meaning a lot of users limit their internet and communication experience because they believe they need Edward Snowden level privacy settings.&lt;/p&gt;&lt;p&gt;The truth is, each user needs to decide what their privacy goals are. Is your goal to stop corporations from tracking you, targeting you, and profiting from your data? Or, are you are trying to hide communications from the government or law enforcement, which is common for journalists and activists who want to protect their sources or communications from government eyes?&lt;/p&gt;&lt;p&gt;Once you understand your goals you can start to look at messengers and their upsides and downsides, and it’s important to remember, there is no perfect solution. Each service, no matter how secure can be compromised, because at the end of the day, you’re dealing with other humans who can screenshot, copy, or forward your messages to parties you did not intend to see them. So, it’s also important to know who you are messaging, verifying their keys, and ensuring that you place the utmost trust in them with the content you are sending.&lt;/p&gt;&lt;p&gt;If your goal is to simply avoid corporate tracking and the harvesting of your data from your communications, you can eliminate apps such as Facebook Messenger and WhatsApp, both services owned by Facebook and while offering encrypted messaging (optional in Messenger), Facebook &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://www.digitaltrends.com/social-media/facebook-reads-messenger-messages/&#34;&gt;reads your non-encrypted messages&lt;/a&gt;, and WhatsApp has &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://www.forbes.com/sites/zakdoffman/2019/05/14/whatsapps-cybersecurity-breach-phones-hit-with-israeli-spyware-over-voice-calls/#734cec155549&#34;&gt;fallen victim&lt;/a&gt; to security breaches.&lt;/p&gt;&lt;p&gt;For this type of user, your options are much more wide as you may be more willing to share your email address or phone number at signup and can be less concerned with metadata (we will get to that shortly), and you want to look for a messenger that simply isn’t scanning your content or behavior to sell it.&lt;/p&gt;&lt;p&gt;If your goal is to evade more massive state-sponsored surveillance programs, the aforementioned apps are out of the question, but so are many others.&lt;/p&gt;&lt;p&gt;This is because when it comes to these apps, and other like it, you don’t own the encryption keys, the service does, so they are able to decrypt your messages, for their own use, or for the use of government officials who request it. This is something important you’ll want to remember as you choose the messenger that is right for you.&lt;/p&gt;&lt;p&gt;Even Apple’s iMessage, which is encrypted, while more secure than Facebook’s offerings, still control the keys and can access your messages if necessary. Apple does also collect data based on your behavior, so while using iMessage isn’t the same as handing your data over to Facebook, you’re still messaging with a variety of privacy vulnerabilities. On Android, you’re using &lt;abbr title=&#34;Short Message Service (standard text messaging)&#34;&gt;SMS&lt;/abbr&gt; messages which are even less secure and can be &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin&#34;&gt;easily hijacked&lt;/a&gt; by someone with just enough know-how.&lt;/p&gt;&lt;h2 id=&#34;metadata&#34;&gt;Metadata&lt;/h2&gt;&lt;p&gt;One important aspect of messaging apps you need to be sure of is what kind of &lt;a href=&#34;https://ssd.eff.org/en/glossary/metadata&#34;&gt;metadata&lt;/a&gt; it exposes, what is encrypted and what isn’t.&lt;/p&gt;&lt;p&gt;Wire, a popular encrypted messenger app has always been criticized for its decision not to encrypt user metadata, such as the date and time of registration, &lt;abbr title=&#34;Internet Protocol&#34;&gt;IP&lt;/abbr&gt; geographical coordinates, and the date and time of creation, creator, name, and list of participants in a conversation.&lt;/p&gt;&lt;p&gt;Metadata can be used to place you in a certain location, speaking to a certain person and can be used against you by law enforcement, even if they have no idea and no access to what the conversation was about.&lt;/p&gt;&lt;p&gt;Apps such as Signal, or Wickr encrypt metadata, making the conversations between two or more parties more secure and harder to track individual users with.&lt;/p&gt;&lt;p&gt;When it comes to avoiding corporate data mining, your metadata won’t be as useful, especially if you’re using a service that is not profiting from your data to begin with. For those avoiding state-sponsored surveillance, &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://theintercept.com/2019/08/04/whistleblowers-surveillance-fbi-trump/&#34;&gt;metadata can be a killer&lt;/a&gt;.&lt;/p&gt;&lt;h2 id=&#34;encryption&#34;&gt;Encryption&lt;/h2&gt;&lt;p&gt;This article will not get into the complexities of the best kinds of end-to-end encryption (&lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt;), but ensuring your messenger has it, that must be discussed.&lt;/p&gt;&lt;p&gt;The popular messaging app Telegram has come under fire the most for this. Telegram says on their homepage that, “Telegram messages are heavily encrypted and can self-destruct.” Yet, this statement is only partially true. Yes, you can set your messages to self-destruct, a great privacy feature for some, and yes, they do offer encryption, but what they don’t tell users is that encryption isn’t turned on by default.&lt;/p&gt;&lt;p&gt;In an &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://gizmodo.com/why-you-should-stop-using-telegram-right-now-1782557415&#34;&gt;interview&lt;/a&gt; with Gizmodo, Christopher Soghoian, Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union said that, &#34;There are many Telegram users who think they are communicating in an [end-to-end] encrypted way, when they’re not because they don’t realize that they have to turn on an additional setting,&#34; he continued to say that while he’s happy they offer the encryption, it’s not useful if it’s turned off.&lt;/p&gt;&lt;p&gt;Apps such as Signal, Keybase, and Wickr offer &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; by default. Less popular but quickly growing apps such as Element, offer &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; but like Telegram, have not made it a default setting, though the Matrix.org team has &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://github.com/vector-im/element-web/issues/6779&#34;&gt;said&lt;/a&gt; that default encryption is on their road map.&lt;/p&gt;&lt;p&gt;Ensuring your conversations and metadata are &lt;abbr title=&#34;End-to-End Encryption/Encrypted&#34;&gt;E2EE&lt;/abbr&gt; is one of the best practices you can have when choosing a messenger.&lt;/p&gt;&lt;h2 id=&#34;registration-process&#34;&gt;Registration Process&lt;/h2&gt;&lt;p&gt;When it comes to your goals and threat model, you will need to decide how much, if any, information you’re willing to give this company on signup. Do they require a phone number and or &lt;abbr title=&#34;Subscriber Identity Module&#34;&gt;SIM&lt;/abbr&gt; card? Do they require an email address, or do they allow completely anonymous signups, and how anonymous is anonymous? Are they storing that info (remember the metadata) unencrypted?&lt;/p&gt;&lt;p&gt;Giving up your phone number or email won’t be a big deal for many, as any good privacy policy will state they won’t use it for any purpose other than those you’ve granted permission for. Yet, for those avoiding state-sponsored surveillance, you may have a regularly changing number, no number, or would rather not risk giving that information up. The same goes for email.&lt;/p&gt;&lt;p&gt;So, you will want to find a service that fits this need. While Signal is currently testing signup without a phone number, currently you’re unable to do so. Element, Wickr, many &lt;abbr title=&#34;Extensible Messaging and Presence Protocol&#34;&gt;XMPP&lt;/abbr&gt; services, don’t require anything but choosing a username.&lt;/p&gt;&lt;h2 id=&#34;source-code&#34;&gt;Source Code&lt;/h2&gt;&lt;p&gt;Open source may be the most used phrase in all of privacy and security, and for good reason. It’s really helpful to be able to review the source code of the product you’re trusting. Experts can look for backdoors, leaks, and other bugs. Organizations that opt to open source their code are showing good faith effort to increase trust between them and the user.&lt;/p&gt;&lt;p&gt;Yet, open source can also limit your options, again, depending on your threat model and goals. Signal, Wire, and Keybase all offer open source repositories of their applications, and sometimes even the server software itself.&lt;/p&gt;&lt;p&gt;Open source also doesn’t mean secure. This is often misunderstood, and people hear open source and assume it must be good. Look at the apps code you want to use, you don’t need to be able to check it, but are others? An open source app that no one follows, or contributes to is no more or less secure than a closed source app.&lt;/p&gt;&lt;p&gt;Wickr, Threema, and others are closed source. They don’t offer the ability to check the source, but that doesn’t immediately rule them out either. When the Electronic Frontier Foundation (EFF) had a comparison chart for messenger apps, it gave Wickr 5-stars. This doesn’t mean it’s perfect for someone like Snowden, but for those avoiding Facebook and Google, it could be a usable option.&lt;/p&gt;&lt;p&gt;It’s also important to remember there’s no way to check that someone is always using the source code in their repository in the app or server you’re downloading from the Apple Store or Google Play. When it comes to this, reputation becomes a key player in your decision, as does trust, which we will get to next.&lt;/p&gt;&lt;p&gt;If you’re unsure what to do here, it’s always a safe bet to stick with open source that has a large contributor base and strong reputation. It’s always best to use open source options when they are available and only recommend closed source when there isn’t a usable open source option. This is generally a good way to pick a messenger app as well.&lt;/p&gt;&lt;h2 id=&#34;ownership-trust&#34;&gt;Ownership &amp;amp; Trust&lt;/h2&gt;&lt;p&gt;An often overlooked, but increasingly important part of choosing a secure messenger is, who owns the company that’s providing your service? What would the gain or lose from selling your data, and who does the company answer to?&lt;/p&gt;&lt;p&gt;Wire &lt;a href=&#34;https://web.archive.org/web/20210729190737/https://blog.privacytools.io/delisting-wire/&#34;&gt;recently lost&lt;/a&gt; a great deal of trust and standing in the privacy world because they quietly sold their company and moved it to the US. They also changed parts of their privacy policy, making it harder for users to tell when Wire would share customer data. They did all of this while never updating their current users of such changes, either to the change of the privacy policy, or the move to the US.&lt;/p&gt;&lt;p&gt;Wire also took in more than $8 million in venture capital funding. So now, users wanted to know more about who owned their data and what jurisdictional rights were changing with the move from Europe to the United States?&lt;/p&gt;&lt;p&gt;These are questions we must ask of all services. Wire now has investors to answer to who will want a return on their millions of dollars.&lt;/p&gt;&lt;p&gt;Signal on the other hand is a &lt;a href=&#34;https://signal.org/blog/signal-foundation/&#34;&gt;non-profit&lt;/a&gt; which does not rely on investors and instead relies on donations, sponsorships, and grants. Because of their non-profit status in the US, they must also be highly transparent about not only where the money comes from, but how they spend it. So, users can see where this money goes, and who it’s going to.&lt;/p&gt;&lt;p&gt;Matrix.org (the service Element uses) runs a similar business model as Signal, located in the UK instead of the US, they reply on donations, partnerships, and grants. Matrix.org is heavily supported by New Vector, a venture capital backed company, however, Matrix.org as a non-profit is transparent about its spending, income, and influences.&lt;/p&gt;&lt;p&gt;Not all services are non-profit, and that should not rule them out immediately. You can also follow their funding goals. Wire lost credibility because instead of simply relying on user signups, they wanted to be the next Skype for Business and wanted to build a larger enough user base to get the attention of investors. Meanwhile, apps such as Wickr, while for-profit, is transparent about taking limited investors to become sustainable on subscriptions.&lt;/p&gt;&lt;p&gt;This can take some time, because it’s important to know who the investors are, and what the organizational goals are. Will they eventually need to resort to data harvesting to sustain itself, if they do, and you decide to leave the platform, will you leave behind data you don’t want them to get their hands on?&lt;/p&gt;&lt;h2 id=&#34;making-your-choice&#34;&gt;Making Your Choice&lt;/h2&gt;&lt;p&gt;Now it’s time to choose a messenger and no one can do that for you. Popularity will need to play a role here, there’s no point in joining the new up and coming messenger service if you don’t have a single contact using it as well. One reason Telegram has been so popular is they have managed to convince more than 100 million people to sign up. If you sign in today, you’ll likely see a group of your friends in there. Signal isn’t as far behind, and others are catching up.&lt;/p&gt;&lt;p&gt;You’ll need to decide who you trust, and who your other contacts trust, and then compare all of that with your goals and your threat model. How much information are you willing to give on signup, does metadata matter to your threat model, and is the service you’re choosing likely to sell itself to the highest bidder once enough people sign up?&lt;/p&gt;&lt;p&gt;The important thing to remember is there is no one size fits all for messengers, and that each user must decide what is best for them. If someone is an avid WhatsApp or Facebook Messenger user, even Telegram is a step in the right direction. Yet, if that user is concerned with more than just giving data over to Facebook, they may need to look at more secure options.&lt;/p&gt;&lt;p&gt;Ensure you keep your messenger apps up to date. You don’t want to discover you’ve been compromised because a bug found in version 1 was fixed in version 2, but you didn’t bother upgrading your apps.&lt;/p&gt;&lt;p&gt;One last piece of advice is that users need to be diligent and never become complacent in their decision. You must be willing to change services if the goals and values of your messenger of choice change in a way that no longer match yours. Look for news of sales, mergers, or acquisitions that could compromise the organization.&lt;/p&gt;&lt;hr /&gt;&lt;p&gt;&lt;em&gt;Dan Arel is a journalist, author, and privacy advocate. This article was originally published to &lt;a href=&#34;https://hackernoon.com/choosing-the-right-messenger-mm3x2z47&#34;&gt;Hacker Noon&lt;/a&gt; on November 27th, 2019.&lt;/em&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2019/11/27/choosing-the-right-messenger/</link> <pubDate>Fri, 28 Feb 2025 14:59:16 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2019/11/27/choosing-the-right-messenger/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2019/11/27/choosing-the-right-messenger.png" type="image/png" length="None" /> </item> <item> <title>How to Clear Your Browser History on Chrome, Firefox, and Other Browsers</title> <author>Kevin Pham</author> <category>Browsers</category> <category>Chrome</category> <category>Firefox</category> <category>Safari</category> <category>Tutorials</category> <description>&lt;h1 id=&#34;how-to-clear-your-browser-history-on-chrome-firefox-and-other-browsers&#34;&gt;How to Clear Your Browser History on Chrome, Firefox, and Other Browsers&lt;/h1&gt;&lt;p&gt;&lt;img alt=&#34;Article cover photo showing baked cookies&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/dimmis-vart-JPu345g_OYM-unsplash.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;&lt;small aria-hidden=&#34;true&#34;&gt;Photo: Dimmis Vart / Unsplash&lt;/small&gt;&lt;/p&gt;&lt;p&gt;Your browsing data — such as cache, cookies, and browsing history — can accumulate over time, potentially damaging your privacy. Whether you trying to free up storage, limit tracking, or protect yourself from digital forensics, clearing browsing data is an important first step on your privacy journey. In this guide, we will explain how to clear your browsing data on five popular web browsers: Chrome, Firefox, Safari, Brave, and Edge.&lt;!-- more --&gt;&lt;/p&gt;&lt;h2 id=&#34;understanding-browsing-data&#34;&gt;Understanding Browsing Data&lt;/h2&gt;&lt;p&gt;Cookies are &lt;a href=&#34;https://www.cloudflare.com/learning/privacy/what-are-cookies/&#34;&gt;small files that a website generates and sends to a browser&lt;/a&gt;. They associate browsing activity to a given user session, allowing people to visit websites without logging in repeatedly. Cookies also facilitate &lt;a href=&#34;https://www.forbes.com/councils/forbestechcouncil/2023/04/11/the-internet-of-you-how-web-personalization-is-shaping-the-future/&#34;&gt;&lt;strong&gt;personalization&lt;/strong&gt;&lt;/a&gt;, where websites &#34;remember&#34; your preferences and actions. Websites utilize personalization cookies to send targeted advertisements and track your location.&lt;/p&gt;&lt;p&gt;Website cache data &lt;a href=&#34;https://learn.g2.com/what-is-cached-data&#34;&gt;refers to offline website data that your browser stores&lt;/a&gt;. By preloading content like webpages and images, subsequent visits to a website becomes faster. Unlike cookies, a cache does not expire and must be manually cleared. If you are concerned about &lt;a href=&#34;https://hawkeyeforensic.com/2024/03/30/browser-forensics-examining-browser-artifacts/&#34;&gt;digital forensics&lt;/a&gt;, consider clearing it.&lt;/p&gt;&lt;p&gt;Similarly, your browsing history must be deleted. As its name suggest, your web browser keeps a record of all visited websites offline. Your &lt;a href=&#34;https://www.androidauthority.com/isp-tracking-1167088/&#34;&gt;internet service provider could still view your history&lt;/a&gt;; however, you might want to prevent access from someone living with you.&lt;/p&gt;&lt;h2 id=&#34;clearing-browsing-data-on-google-chrome&#34;&gt;Clearing Browsing Data on Google Chrome&lt;/h2&gt;&lt;p&gt;To start, &lt;strong&gt;launch&lt;/strong&gt; Google Chrome. On the upper right-hand corner, click on the &lt;strong&gt;three-dots icon&lt;/strong&gt; to see a list of options. Then, click on &lt;strong&gt;Settings&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Google Home Page&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/chrome1.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;You should see the following menu.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Google Chrome Settings&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/chrome2.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;On the left, navigate to &lt;strong&gt;Privacy and Security&lt;/strong&gt;. You should see the following screen.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Google Chrome Privacy and Security Settings&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/chrome3.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Click &lt;strong&gt;Delete browsing data.&lt;/strong&gt; Here, you can check whether to clear your &lt;strong&gt;browsing history&lt;/strong&gt;, &lt;strong&gt;cookies&lt;/strong&gt;, and &lt;strong&gt;cached images &amp;amp; files&lt;/strong&gt;. Chrome also allows you select the &lt;strong&gt;time range&lt;/strong&gt; of the data marked for deletion.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Google Chrome browser data options&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/chrome4.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;After making any necessary changes, click &lt;strong&gt;Delete data&lt;/strong&gt;.&lt;/p&gt;&lt;h2 id=&#34;clearing-browsing-data-on-firefox&#34;&gt;Clearing Browsing Data on Firefox&lt;/h2&gt;&lt;p&gt;Start by launching &lt;strong&gt;Firefox&lt;/strong&gt;. On the upper right-hand corner, click on the &lt;strong&gt;three-dot icon&lt;/strong&gt; to see a list of options. There, click on &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Firefox browser with Privacy Guides Homepage&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/firefox1.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;On the left, navigate to &lt;strong&gt;Privacy and Security&lt;/strong&gt;. You should see the following screen.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Firefox Settings&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/firefox2.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Scroll down to &lt;strong&gt;Cookies and Site Data&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Firefox Settings&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/firefox3.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;You have the option of either clearing your browsing data within a time range or in selected websites. Note that the latter deletes the website&#39;s cookies and cache, not history.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Firefox Settings prompt displaying browser data&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/firefox5.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Click on &lt;strong&gt;Clear data&lt;/strong&gt; if you prefer the former. Like Google Chrome, you can chose what types of data to delete and its time range. After making your selection, click &lt;strong&gt;Clear&lt;/strong&gt; to finalize the process.&lt;/p&gt;&lt;h2 id=&#34;clearing-browsing-data-on-safari&#34;&gt;Clearing Browsing Data on Safari&lt;/h2&gt;&lt;p&gt;Unlike Chrome and Firefox, Safari separates history settings from its privacy settings. For the purposes of this guide, we will delete browsing history first.&lt;/p&gt;&lt;p&gt;After opening Safari, move your cursor to the upper left-hand corner. Click &lt;strong&gt;History&lt;/strong&gt; once the title bar appears.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Safari with Privacy Guides Homepage&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/history1.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;If you want to clear browsing history in a specified time range, select &lt;strong&gt;Clear History&lt;/strong&gt; at the bottom and follow the prompt. Otherwise, click &lt;strong&gt;Show All History&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: History Panel in Safari&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/history2.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;In this menu, you can choose websites to delete from your history. Use the search bar to find the exact name of the website. You can also navigate to a specific data and time.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: History Panel in Safari&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/history3.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Now, lets delete the cookies and cache data. Move your cursor to the title bar again and click &lt;strong&gt;Safari&lt;/strong&gt; to see a drop down menu.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Safari title bar&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/safari.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Then, click &lt;strong&gt;Settings&lt;/strong&gt; and then navigate to &lt;strong&gt;Privacy&lt;/strong&gt;. You will see this screen.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Safari Privacy Settings&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/safariprivacy1.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Click &lt;strong&gt;Manage Website Data...&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Prompt displaying website browser data&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/safariprivacy2.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Another menu will appear with a list of websites and their corresponding browsing data types. As always, you can mark specified websites for deletion. Once you are done, click &lt;strong&gt;Remove&lt;/strong&gt;.&lt;/p&gt;&lt;h2 id=&#34;clearing-browsing-data-on-brave-browser&#34;&gt;Clearing Browsing Data on Brave Browser&lt;/h2&gt;&lt;p&gt;As a Chromium-based browser, Brave is quite similar to Chrome. To start, &lt;strong&gt;launch&lt;/strong&gt; Brave. On the upper right-hand corner, click on the &lt;strong&gt;three-bars icon&lt;/strong&gt; to see a list of options. Then, click on &lt;strong&gt;Settings&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Brave Home Page&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/brave2.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;You should see the following menu.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Brave Settings&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/brave3.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;On the left, select &lt;strong&gt;Privacy and Security&lt;/strong&gt;. You should see the following screen.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Brave Privacy and Security Settings&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/brave4.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Click &lt;strong&gt;Delete browsing data.&lt;/strong&gt; Here, you can check whether to clear your &lt;strong&gt;browsing history&lt;/strong&gt;, &lt;strong&gt;cookies&lt;/strong&gt;, and &lt;strong&gt;cached images &amp;amp; files&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Brave browser data options&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/brave5.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Under &lt;strong&gt;Advanced&lt;/strong&gt;, Brave also allows you select the &lt;strong&gt;time range&lt;/strong&gt; of the data marked for deletion.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Brave Browser data options&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/brave6.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;After making any necessary changes, click &lt;strong&gt;Delete data&lt;/strong&gt;.&lt;/p&gt;&lt;h2 id=&#34;clearing-browsing-data-on-microsoft-edge&#34;&gt;Clearing Browsing Data on Microsoft Edge&lt;/h2&gt;&lt;p&gt;Finally, we will finish this tutorial with Microsoft Edge. Start by launching the browser. On the upper right-hand corner, click on the &lt;strong&gt;three-dots icon&lt;/strong&gt;. Next, click &lt;strong&gt;Settings&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Edge Home Page&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/edge2.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;In the settings page, navigate to &lt;strong&gt;Privacy, Search, and Services&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Edge Settings&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/edge3.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Under &lt;strong&gt;Delete Browsing Data&lt;/strong&gt;, click on &lt;strong&gt;Choose What to Clear&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Edge Settings &#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/edge4.webp&#34; /&gt;&lt;/p&gt;&lt;p&gt;Modify the time range and data to be deleted. Afterwards, click &lt;strong&gt;Clear Now&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;img alt=&#34;Screenshot: Edge data options&#34; src=&#34;../../../../assets/images/clearing-your-browsing-data/edge5.webp&#34; /&gt;&lt;/p&gt;</description><link>https://www.privacyguides.org/articles/2025/02/13/clearing-browsing-data/</link> <pubDate>Fri, 28 Feb 2025 14:59:16 +0000</pubDate><source url="https://www.privacyguides.org/articles/feed_rss_updated.xml">Privacy Guides</source><guid isPermaLink="true">https://www.privacyguides.org/articles/2025/02/13/clearing-browsing-data/</guid> <enclosure url="https://www.privacyguides.org/articles/assets/images/social/2025/02/13/clearing-browsing-data.png" type="image/png" length="None" /> </item> </channel></rss>