What Privacy Experts Do About Their Own Digital Privacy
Even simple steps can make it harder for companies to collect and use your personal data. Then again, some experts go to extremes.
Privacy experts often recommend fairly cumbersome techniques to keep companies from collecting too much of your personal information.
But do they practice what they preach? Do these privacy professors, company executives, and researchers follow their own instructions for privacy health, or even take additional protective steps? Or do they secretly opt for convenience, carelessly sharing even intimate data?
We asked some top scholars and specialists in the field of digital privacy to reveal what they do to safeguard digital privacy in their own lives. We found a wide variety of practices. Like many of us, privacy professionals seem torn between the convenience offered by everyday technology and their desire to limit data collection.
Their answers may provide clues to what really matters most when it comes to protecting our own information from data brokers, marketers, and their corporate clients.
To Alexa or Not to Alexa?
The so-called internet of things includes all the web-connected appliances and devices that are increasingly common in our homes (along with our cars and everywhere else, too).
Adam Schwartz, senior staff attorney at the Electronic Frontier Foundation, an advocacy organization, explains that internet-connected sensors now appear throughout many homes, from washing machines to video doorbells.
“The sensors are constantly gathering information,” he says. “Businesses are mining it to know when to send you a coupon for more laundry soap or whether to send you advertisements for new insulation for your house based on your heating patterns.”
Cashing in on Freebies
Privacy experts appreciate discounts as much as anyone else, but many don’t like the idea of sharing personal information to get them. Rather than lose out, some have figured out how to guard their real phone numbers and emails and still get deals from retailers.
“I have a longtime personal email and phone number that I rarely share with folks outside my very close-knit personal network,” says Shillingford, who is now president and CEO of DeepSee.ai, which uses machine learning to automate business practices.
Instead, he creates substitute emails and telephone numbers for supermarkets, pharmacy chains, and other companies.
“I don’t give it out at Safeway,” he says. “I don’t give it to folks when they say, ‘Hey, can I get your phone number?’ I never use it for log-ins. I use these other throwaway emails, and I even have several phone numbers that I use. Walgreens wants a phone number, so you can get a discount. So I use a number that is not attached to the one I’ve had for 22 years.”
“I sign up with Netflix under a pseudo name,” Shillingford continues. “And I actually have credit cards that are tied to that pseudo name that allow me to sort of create a little bit of a proxy between Netflix and Steve Shillingford’s tastes in documentaries and comedy.”
Justin Brookman, the director of consumer privacy and technology Consumer Reports, takes a similar approach. “I lie to sites that demand my email address or personal information—say, to get access to WiFi,” he says.
Creating these secondary identities is not as complicated as it may sound. A number of companies offer services that quickly conjure up substitute emails, telephone numbers, and one-time credit cards, including MySudo from Anonyome, the company Shillingford founded.
The Fortified Bunker
If the spectrum of privacy choices ranges from running naked (figuratively) on the internet to wearing a suit of armor, Eben Moglen navigates the internet in the equivalent of a tank.
A Columbia Law School professor and founder and executive director of the Software Freedom Law Center, Moglen stands out even among privacy experts for his strong aversion to anything linked to big technology companies. “I have never, ever, used a computer running Microsoft Windows, and I never touch, let alone use, any object made by Apple,” he says.
He does not have accounts with Google, Facebook, Twitter, or Zoom. Instead, he runs his own private network.
In 2010 he launched a project called FreedomBox, which allows people to use a combination of hardware and software to share files and encrypt messages privately, as well as make calls and edit documents through their own home servers.
“FreedomBox empowers its users to avoid the data mining, censorship, and surveillance by centralized silos that characterize the web of today,” FreedomBox says on its web page. “It makes web servers personal, affordable, and manageable, so that a user can host necessary web services at home on a device they own, powered by free software they can trust.”
Daniel Kahn Gillmor uses a similar private computer network, and the machines on his home network also use a free operating system. “There are things that I do that make sense for me that may not make sense for other people,” he says. “I have a handful of small computers scattered around the house, like everyone does today. But most of my computers that I have scattered around the house are computers that I fully control.”
These experts are outliers, but everyone we spoke with takes significant steps to limit how much data companies can collect and use about them. It’s impossible to stop all data collection, but many of the measures are both easy to implement and useful, especially given the hard-to-assess risks that come from unfettered data collection.