There are few secrets in our digital worlds.
Many details about us can be â" and often are â" tracked, collected, collated and analyzed. Companies mine personal information in the name of profit. Government authorities mine it in the name of security.
Privacy advocates say most Americans do not know they are being tracked. That is why, these experts argue, new laws and policies should be adopted to limit data collection, increase transparency and protect everyoneâs privacy. Otherwise, some people will take steps to protect themselves and others wonât.
âDo we really want a cadre of people who protect themselves, a privacy elite? What does that make everyone else, easy pickings?â said Frank Pasquale, a professor at Seton Hall School of Law who is writing a book on technology called âThe Black Box Society.â âI think self-help is a complete myth. There is no good self-defense.â
The only real way to avoid data profiling would be to go off the grid. No Internet. No mobie phones. No credit cards. Basically, none of the conveniences and connectivity of modern life. That isnât an option for most of us. But there are ways to minimize our digital footprints and at least nominally impede government or commercial surveillance. Here are a few of them:
LOSE THE SMARTPHONE
Alexei Miagkov, a leading product engineer for Ghostery, a free browser extension that lets Internet users track and control third-party data collection, carries an old âdumb phone,â the kind that can make calls, send text messages, take photos â" and thatâs about it. Smartphones, he says, are de facto tracking devices.
âIf you think about a smartphone, itâs a little computer in your pocket, and itâs always connected,â he said. Using a low-tech phone âreduces my footprint, my privacy exposure, because I donât have unknown third parties collecting my information.â
USE GHOST E-MAIL
Dan Auerbach, a staff technologist at t! he Electronic Frontier Foundation, a digital rights group in San Francisco, uses a variety of e-mail addresses, some of them fake, to help obfuscate his online activities.
That is because companies can share peopleâs e-mail addresses, he says, allowing some analytics or marketing companies to connect the activities of a person who logs in with the same e-mail address across many sites. If users register for a service using addresses containing their real names or variations of their names, companies may be able to connect those address with those peopleâs identities.
âI think itâs common to be wary of giving out your personal information for every single service,â Mr. Auerbach said. âIf you are going to give me a sign-up form, I am going to give you a bogus answer back. I think thatâs a perfectly legitimate thing to do.â
CRUSH THE COOKIES
When a person goes online, companies like ad networks and data brokers may use cookies â" bits of code â" and oher techniques to track that user around the Web. Jonathan Mayer, a graduate student in computer science and law at Stanford, employs an arsenal of cookie countermeasures.
Mr. Mayer turns on private browsing mode, a setting that prevents the browser from storing information about Web sites visited during a particular online session. He has also installed free browser extensions, like Adblock Plus, that allow him to block ads and disable online tracking. These programs can also be used to disable buttons from social networks like Facebook and Google Plus, preventing the networks from following a userâs online activities from site to site.
âI donât want companies I never heard of to know what I am doing on the Web,â Mr. Mayer said. Even with services he does use, he said, âI would like not to have everything I look for be correlated, what articles I read, the videos I watch.â
USE MULTIPLE BROWSERS
To inhibit online trackers, Edward W. Felten, a prof! essor of ! computer science and public affairs at Princeton, uses three different browsers: Google Chrome, Apple Safari and Mozilla Firefox. He says he reserves one browser for e-mail, another for social networking and a third for general browsing. And never the three shall meet.
âTo the extent that you as a consumer can frustrate the trackers,â Professor Felten said, âyou may reduce the amount of tracking going on.â
PAY CASH
Credit cards, debit cards, loyalty cards â" all leave digital trails that are easy to track. That may be fine with most people for most transactions, but experts like Professor Felten recommend that people pay cash for items they want to keep private, like health products.
âYou can buy something with cash and without a loyalty card and it probably will not end up in a record,â he says.
Other experts recommend paying cash for products like alcohol, cigarettes, condoms or fast food.
âThings that you reveal in transactions that youdo with your name attached, you should assume people can make inferences and it can be difficult to predict what those inferences might be,â Professor Felten said. âYou might decide itâs O.K. and make peace with it. Or you might decide to pull back and be a little more cautious.â
In other words, that old countermeasure to flesh-and-blood busybodies espoused by Hester Prynne in âThe Scarlet Letter,â a sensation of 1850, remains good advice even in an era of Big Data.
âWe must not always talk in the marketplace,â Hester Prynne said, âof what happens to us in the forest.â