How to Audit Your Digital Privacy Settings
Review and tighten privacy settings across browsers, social media, mobile devices, and cloud services.
Password Generator
Generate strong, random passwords
Digital Privacy Audit
Your digital footprint grows automatically through default settings that favor data collection over privacy. A periodic privacy audit identifies and closes these gaps.
Browser Privacy
Disable third-party cookies (most browsers now do this by default). Review installed extensions — each one can see your browsing data. Remove extensions you don't actively use. Check auto-fill settings and remove saved credit card numbers and passwords you'd rather manage through a dedicated password manager. Enable DNS-over-HTTPS (DoH) to prevent your ISP from seeing your DNS queries.
Social Media Settings
Each platform has a privacy settings page that controls who sees your posts, whether your profile appears in search engines, and what data is used for ad targeting. Review: profile visibility, post audience defaults, tag review, location sharing, and ad preferences. Download your data archive periodically to see exactly what each platform has collected. Delete old posts that no longer represent you.
Mobile Device Privacy
Review app permissions — many apps request camera, microphone, contacts, and location access without needing them. Revoke unnecessary permissions. On iOS, use App Tracking Transparency to deny cross-app tracking. On Android, use the Privacy Dashboard to see which apps accessed sensitive data recently. Disable Wi-Fi and Bluetooth scanning when not in use — these can be used for location tracking.
Cloud Service Audit
Review sharing settings on Google Drive, Dropbox, and iCloud — old shared links may still be accessible. Check which third-party apps have access to your Google, Microsoft, and Apple accounts (OAuth authorizations). Revoke access for apps you no longer use. Enable two-factor authentication on every cloud service.
Annual Privacy Checklist
Update passwords for critical accounts. Review and revoke unused OAuth authorizations. Check your accounts on haveibeenpwned.com. Review and clean browser auto-fill data. Update recovery email addresses and phone numbers. Review privacy settings on any new services you've started using.
関連ツール
関連ガイド
How to Check if Your Password Has Been Compromised
Data breaches expose millions of passwords regularly. Learn how to check whether your credentials have been leaked without risking further exposure, using k-anonymity-based services and local hash comparison.
Password Managers Compared: Features That Matter
A password manager is the single most impactful security tool for most people. This comparison covers the key features to evaluate when choosing a password manager for personal or team use.
How to Strip EXIF Metadata From Photos for Privacy
Photos contain hidden metadata including GPS coordinates, device info, and timestamps. Before sharing photos online, learn how to remove this data to protect your privacy and prevent location tracking.
Encryption Best Practices for Personal Data
Encryption protects your data from unauthorized access, whether stored on your devices or transmitted over the internet. This guide covers practical encryption strategies for personal data protection.
Troubleshooting SSL/TLS Certificate Errors
SSL/TLS certificate errors prevent secure connections and scare away visitors. This guide explains common certificate warnings, their causes, and step-by-step fixes for website operators and visitors.