Introduction

One of the most common questions I get from people who are starting to realize the need for personal privacy is “Where do I start?”

While this question is not one I can answer for you, I wanted to go ahead and put together a recommendation of the order of steps I would take if starting from scratch in my privacy journey today.

Please remember that not all threat models are equal, and not all people have the same priorities – so be sure to take what is below (especially the order!) with a grain of salt and try to assess the best path for you, personally.

For more on threat modeling, check out the following resources:

1. Find a privacy-loving community

The first in the list might not be a technical solution, but it’s by far the most important in my experience. Having a group of people around you to support you, give solid feedback, and bounce ideas off of is an essential aspect of a successful journey towards privacy.

Not only is this type of community beneficial along the way, they can often help with many of the feelings that come along with falling down the privacy “rabbit hole”, like nihilism, loneliness, etc.

Before you go any further, I’d recommend this step be priority number one for you no matter your own personal threat model. Below are some recommended communities that I have found helpful along the way:

2. Use a privacy-preserving browser

The next step is one that can be daunting, but thankfully there are excellent browser alternatives out there these days. We spend more and more of our lives in web apps as time goes by, and so a browser that is more privacy-preserving by default (and tuned to be even better!) can be a huge win in decreasing the amount of data that 3rd-parties can collect about you from simply browsing.

If you happen to be running one of the recommended browsers, awesome! Just take a look at the tuning links (if applicable) and the recommended extensions to see if they’re of interest to you.

Browsers:

  • Firefox
    • “Yet Another Firefox Hardening Guide”
      • By far my favorite hardening guide for Firefox, goes step by step with very simple instructions and walks you through the process. Don’t let it scare you! It’s very straightforward, and only needs to be done once per computer you have/use.
  • Brave Browser
  • Ungoogled Chromium
    • Ungoogled Chromium takes the best of Chrome Browser and strips Google from it, making a very compelling and very fast browser. It can be a bit tricky to get and keep updated on some operating systems, and extension installation and updates are a bit of a pain, but it’s a great option for those who are a bit more hardcore but like the Chrome web engine.

Extensions:

  • uBlock Origin
    • By far the most important extension and available for all of the browsers mentioned above, uBlock goes far beyond just blocking ads, and handles a wide swath of ad, tracker, and script blocking in a way that is very rarely detrimental to the browsing experience but has a massive impact on privacy and load times for pages. An absolute must install, no matter which browser you choose.
  • LocalCDN
    • Similarly to Decentraleyes, LocalCDN helps to improve privacy by replacing externally hosted assets with local ones, reducing network calls and reducing the risk of compromised assets being delivered by web pages. Deeply understanding what this does takes a deep knowledge of how the modern Internet works, but none of that is necessary here – LocalCDN just works and works well.
  • Password manager extension
    • This extension will change based on the password manager you choose in the next step, but I highly recommend installing the password manager extension (where available) for much simpler autofill and password management when browsing.

3. Use a password manager

While this step isn’t technically privacy related, properly securing accounts can lead to much better privacy by reducing the amount of data leaks and hacks you experience as a result of stolen or leaked credentials. Password managers make it extremely simple to manage usernames and passwords across all of the sites and apps you use, without needing to re-use password (or username or email!) in order to remember them. This has drastic implications on security, and is a huge step forward in your journey.

Migrating to a password manager is also a great chance to think twice about which accounts you actually need, and close those you don’t in the process.

  • Bitwarden
    • Bitwarden is my personal favorite and what my wife and I use. It works very well, is open-source, cross-platform, and can be self-hosted (if desired).
  • KeepassXC
    • KeepassXC is a well-respected FOSS password manager, but importantly does not integrate sync across devices natively, which is a deal-breaker for me. Outside of that, though, it works extremely well and has a long and solid history.

4. Use a privacy-preserving email service

Many people choose to start here, and I fully understand if you feel the same way, but to me the process of switching email providers was a long one and quite involved, so I would generally have done this after improving my browsing and having a password manager handy. Migrating email and passwords (with a good password manager) go hand-in-hand quite well, and can save you a lot of time if you can couple the two tasks.

Using an email provider that is privacy-preserving and uses some native method of E2EE as well is a key way to reduce the data available about your communication, shopping, job hunting, etc. from an invasive company like Google or Microsoft. This is a very important step, and gives you an awesome chance to evaluate what subscriptions and accounts you want to keep, and make a clean break from the rest.

  • ProtonMail
    • Probably the most well-known name in the privacy-preserving email space, and for good reason. ProtonMail has many solid features out of the box, a usable free tier, and solid cross-platform clients to go with a long history of supporting user privacy. Their excellent UX and support make this my preferred email provider, and how I do all of my email.
  • Tutanota
    • While I haven’t used them, I know many people I trust who do and have heard nothing but great things. They also provide steep discounts to FOSS and non-profit organizations, so well worth a look if you happen to be a part of either of those.

5. Use a privacy-preserving search engine

This step can seem extremely annoying at first as none of the privacy-preserving search engines are quite as fast or complete as simply using Google, but the data you provide to a search engine tells a lot about you, and removing that data point is a key step towards reducing your digital footprint.

Each of the alternatives have some key pros and cons, and are really up to personal choice – I’d recommend trying them each for a day or more as your default and see what solution fits you best.

  • DuckDuckGo
    • DDG uses Bing results on the back-end, but is one of the more polished and fast user experiences in the space. They’re one of the easiest to switch to, for sure.
  • Whoogle
    • I personally host a public instance of Whoogle and really appreciate the ability to get Google search results without revealing IP address and without the extra bloat of Google searches. It’s also quite easy to self-host, if desired.
    • Public instances
  • Searx
    • Searx is probably the most hard-core of the options, but provides a very solid experience and search results across multiple sources.
    • Public instances

6. Switch yourself and your friends/family to a more private messaging service/app

Step 6 can be one of the most difficult ones, as to get the most benefit you really need your friends and family (those you chat with most) to jump ship to a private messaging app as well. Thankfully, I was able to get all of my friends and family to switch to Signal, but I know that’s not always possible.

Introducing a private-by-default and end-to-end encrypted messaging app into your workflow helps prevent self-censorship, surveillance, and state censorship in private chats, and is an essential tool to liberty long-term.

The “messaging wars” continue to rage, but I’ll make my recommendations based only on what I’ve used heavily here.

  • Signal
    • Signal holds the brand recognition they do for a reason – it’s extremely easy to use, easy to onboard new people, and has the core feature-set that most messaging apps do. Even though it’s not perfect, it’s an incredible tool and has been a huge boon for the privacy space and free speech so far. Signal’s ability to handle SMS messages as well makes it an extremely capable iMessage replacement and a much easier sell in the US where SMS is still quite popular (for some reason).
    • Note that Signal does require a phone number to use, but that comes with the important ability to handle SMS natively in Signal. It’s also important to note this does not harm reduce the privacy provided by Signal, but can be detrimental if pseudonymity or anonymity in messaging are key to your threat model.
    • I tend to use Signal with people I know personally, and couldn’t live without it.
  • Threema
    • Threema takes the template of WhatsApp and orients the app around preserving user-privacy, including end-to-end encrypted chats by default, voice messages, and other features users of WhatsApp will be very familiar with. It also drops the phone number requirement of Signal, which is a big win for pseudonymity (but does make it incapable of handling SMS messages, unlike Signal).
    • I tend to use Threema for chats with people I don’t know personally, and have really enjoyed the experience (both with direct and group messaging).

7. Use a more privacy-preserving form of money

This step can definitely slide around in order, but can be an extremely helpful one to get down before pursuing a VPN service or mobile OS to help enable private ways to pay for these types of services and hardware.

While cryptocurrencies like Bitcoin are commonly considered private or anonymous, it’s important that you realize that most cryptocurrencies are not privacy preserving by default, and merely enable fragile pseudonymity at best. With this in mind, here are a couple recommendations for using cryptocurrencies while preserving your privacy.

8. Use a non-logging and trustworthy VPN provider

NOTE: My podcast, Opt Out, is sponsored by one of the VPNs recommended here. That does not, however, change my recommendation, but I wanted to state it plainly so you can make a well-informed decision. This post (and its content) are not sponsored in any way, however.

VPNs often get a bad rap as there are so many malicious and predatory VPN providers out there with tons of money throwing around bad advertisements. VPNs as a tool, however, are an important part of a privacy journey, in my opinion.

Using a non-logging and trustworthy VPN is a great way to shift the trust from your network provider (home ISP, mobile carrier, etc.) to a 3rd-party you trust more than them (and that don’t have your personal information or address). When selecting a VPN it’s extremely important that you do your own research and come to your own conclusions, but I will recommend two VPNs as great starting points.

I have used both of the below VPNs extensively and they also come recommended by many people I trust dearly.

  • IVPN
    • I’ve spoken at length on why I trust and use IVPN, but for more details check out this link.
    • tl;dr – trustworthy team, incredible cross-platform clients, strong reputation, extremely honest about shortcomings of VPNs generally, externally audited, fast, Wireguard support
  • Mullvad
    • Mullvad is an amazing VPN provider and have long been a recommendation of mine. They have a long and storied history, great service, accountless setup, and solid cross-platform clients.

To help you make your own well-informed choices, here are some excellent resources:

9. Use a privacy-preserving mobile operating system

This section is a bit more drastic than the others, but switching to an operating system that is designed around protecting user privacy gives you a strong foundation for all of the other steps to live on top of and enhances their effect (and often makes them easier!).

The only real recommendation I have here is below, but note that for some threat models using an iPhone can be a solid approach to gaining strong 3rd-party privacy (i.e. from other data collection, but not from Apple).

  • CalyxOS
    • I’ve long been a huge fan of CalyxOS, have run it for almost a year, and am a financial supporter of the Calyx Institute, the non-profit organization behind CalyxOS. CalyxOS is an incredibly powerful tool, one that takes the open-source Android operating system created by Google and strips Google’s tracking and services out of it, and then builds it back up with a focus on user privacy and FOSS app stores (like F-Droid).
    • For more on CalyxOS and my experience/recommendations, see my blog post “Switching to CalyxOS”.

10. Use a more privacy-conscious desktop operating system

This last step can be very daunting at first, but is a good step once you’re a bit deeper down the privacy and self-sovereignty rabbit hole. Things are getting better each year, but switching to Linux is still something that requires some extra know-how and dedication to find alternative apps and tools.

I do think the switch is well worth it and not nearly as painless as I expected, and I have switched entirely to running Linux on both my desktop and laptop without serious issues, but I understand my approach and tools used can be quite different to many people.

There are many options to choose from when considering switching to Linux, but I’ll just give my top two recommendations that are relatively easy to switch to and use, comparatively:

  • Pop_OS! by System76
    • This is the Linux distribution (distro) that I use on all my computers, and is a great balance between productivity and ease-of-use in my opinion. It’s based on Ubuntu and provides sane defaults, a powerful app store, and consistent and stable updates.
    • System76, the company behind Pop_OS!, also sells their own laptops and desktops that are custom-built for using Pop_OS!, often integrating FOSS firmware, Coreboot, and other extremely powerful and important features.
  • ZorinOS
    • While I haven’t used this personally, I’ve heard excellent things from people I trust and I love the “easy to switch” approach that ZorinOS takes. This may be the easiest visual switch from Windows or macOS, and if you’re willing to pay you can get a lot of extra features, support, and bundled apps as well.

Conclusion

While these steps are certainly not the end-all-be-all of privacy, they’re hopefully a solid and straightforward set of steps to get you thinking about where to go next in your privacy journey. Take them with a grain of salt and see what is most important to you personally, then make the jump into the next step of your journey!

If you have any questions from this post or would like more information on a specific aspect, I’d love to hear from you via Signal, Matrix, Threema, or email.