Basic Internet Hygiene: How Not to Leave Traces
The internet is a kitchen after a party. No panic, no paranoia — 13 steps, a 10-minute quick start, and friendly reminders.
The internet is a kitchen after a party: crumbs everywhere. No panic, no paranoia — just a tidy-up with clear steps and friendly habits.
13 steps to a cleaner trail
1) Update on time
What. Keep OS, browser, and apps current.
Why. Most exploits target old, already-patched bugs.
How.
- Phone: Settings → Software Update → Auto-update on.
- Computer: System settings → Automatic updates.
- Browser: Menu → About → Update & restart.
Good sign. No red badges; version shows today.
2) Strong passwords + manager + 2FA
What. Unique long passwords in a manager; logins confirmed with a one-time code.
Why. One breach won’t domino; 2FA blocks most takeovers.
How.
- Pick a manager (built-in / 1Password / Bitwarden).
- Change key accounts first: email, bank, socials.
- Enable 2FA with an authenticator app (prefer over SMS).
Good sign. Sites ask for a 6-digit code after your password.
3) Separate roles (personal vs work)
What. Different browser profiles and inboxes.
Why. Fewer mix-ups and cross-tracking; easier to clock out.
How.
- Browser → Add Profile: Work and Personal.
- Email: use aliases for sign-ups (
name+shop@…
).
Good sign. Bookmarks/logins don’t bleed across.
4) Cookies under control
What. First-party remember you; third-party track you across sites.
Why. Less tracking → fewer creepy ads.
How.
- Privacy settings → Block third-party cookies.
- Clear cookies on exit or per site.
- Optional: containers/sandboxes for big platforms.
Good sign. Fewer “how did they know?” moments.
5) Permissions only when needed
What. Camera, mic, location, notifications.
Why. Less access = fewer leaks.
How.
- Phone: Privacy → Camera/Mic/Location → While using or Off.
- Browser: padlock → Site permissions → deny what you don’t need.
- Notifications: allow only the truly useful.
Good sign. Prompts are rare and make sense.
6) Private search & fewer “smart” suggestions
What. Search that doesn’t profile you; disable cloud history/autocomplete.
Why. Results, not a personality file.
How.
- Use a privacy-friendly engine or log out for sensitive searches.
- Turn off cloud history/autocomplete if you don’t want it stored.
Good sign. Suggestions don’t surface old personal queries.
7) HTTPS-only as default
What. Encrypted connections everywhere.
Why. Café Wi-Fi can’t peek easily.
How.
- Browser → Security → Always use HTTPS / HTTPS-Only Mode.
- On public Wi-Fi, avoid passwords on non-🔒 pages; use a reputable VPN if needed.
Good sign. Padlock on; HTTP triggers warnings.
8) Encrypt DNS lookups
What. DoH/DoT hides “which site are you asking for?” from casual observers.
Why. Your ISP/venue learns less.
How.
- Browser → Privacy → Secure DNS / DNS-over-HTTPS → On.
- System-level DoH/DoT if available.
Good sign. A test reports Secure DNS: On.
9) Extensions: fewer, but trusted
What. Add-ons can read your pages.
Why. Too many = slower, riskier.
How.
- Monthly cleanup: remove what you don’t use.
- Keep a solid tracker/ad blocker and (if needed) your password manager.
- Review permissions — “read all sites” should be rare.
Good sign. Faster pages and a shorter list.
10) Strip metadata from photos/files
What. EXIF (location/device) in photos; author/path in docs.
Why. Hidden details can reveal who/where/when.
How.
- Camera: turn off geotags or ask each time.
- Before sharing: export without metadata.
- Docs/PDF: Properties → remove personal info on export.
Good sign. No GPS or personal fields in properties.
11) Socials: visibility + seasonal cleanup
What. Tune who sees what; tidy your history.
Why. You decide what people (and algorithms) learn.
How.
- Hide likes/follows/tags where possible.
- Turn off face recognition and broad-audience defaults.
- Each season: download archive; delete junk, esp. with location.
Good sign. Old posts aren’t wide-open; the feed feels calmer.
12) Email aliases and filters
What. Special addresses and rules that auto-sort.
Why. Promos stop drowning signal.
How.
name+shop@…
for stores;name+news@…
for newsletters.- Filter: “if sent to +shop → move to Purchases.”
- For junk: report spam + rule; don’t click shady “unsubscribe.”
Good sign. Clean inbox; categories sort themselves.
13) Tame the phone (the most talkative device)
What. Ad IDs, cross-app tracking, always-on location, chatty background apps.
Why. Your phone knows a lot — set boundaries.
How.
- Limit ad personalization; reset ad ID.
- When asked to track across apps, don’t allow.
- Location: While using for maps/delivery; Never for the rest.
- Background refresh: only where it truly helps.
Good sign. Fewer spooky ads; better battery.
Quick start (10 minutes)
- Turn on auto-updates and update your browser.
- Create unique passwords for email/bank; enable 2FA.
- Switch your browser to HTTPS-only and Secure DNS.
- Review camera/mic/location permissions on your phone.
- Remove metadata from the last photo before posting.
Friendly reminders
- Incognito hides tabs from the next user on your device — not from sites or your ISP.
- A VPN is a different hallway, not an invisibility cloak. Pick a trustworthy provider.
- You don’t have to quit social media. Start with privacy settings, fewer permissions, and mindful follows.