{"id":22057,"date":"2014-09-15T21:01:30","date_gmt":"2014-09-15T13:01:30","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=22057"},"modified":"2021-08-18T16:14:37","modified_gmt":"2021-08-18T08:14:37","slug":"ways-maintain-privacy","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/","title":{"rendered":"4 Extreme Ways People Protect Their Privacy"},"content":{"rendered":"<p>Edward Snowden may be old news as his leaks on the US National Security Agency (NSA) have just passed their one year mark. However, international relations have soured since then and <strong>changing the public\u2019s damaged perception<\/strong> would be <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/mashable.com\/2014\/07\/30\/nsa-hiring-spokesperson\/\">an uphill challenge<\/a>.<\/p>\n<p>The impact of the NSA leaks also affects us, the average citizen of today. We are more sensitive about our social media accounts\u2019 privacy settings, as evident from our reactions when Facebook experimented on <a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/facebook-studies-reveal\/\" rel=\"noopener\">manipulating our timeline feeds<\/a>.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-1\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/safeguard-online-privacy\/\" class=\"ref-block__link\" title=\"Read More: 9 Simple Tips to Safeguard Your Online Privacy\" rel=\"bookmark\"><span class=\"screen-reader-text\">9 Simple Tips to Safeguard Your Online Privacy<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/safeguard-online-privacy.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-18531 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/safeguard-online-privacy.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">9 Simple Tips to Safeguard Your Online Privacy<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tFrom social networking sites to online banking services, the Internet is indeed permeating into our lives like never...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<p>With <strong>this heightened sense that someone is always watching us<\/strong>, tech trends and our Internet habits have changed as well.<\/p>\n<ol>\n<li><strong>The rise of the anonymous and ephemeral apps<\/strong>. More people have started using Whisper, Secret, and Snapchat especially teenagers. Younger people in general have a greater awareness in online privacy which lead them to <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.buzzfeednews.com\/article\/sapna\/teens-care-more-about-online-privacy-than-20-somethings-in-p#2fgf2yj\">change their Internet usage habits<\/a>. Of course, there\u2019s a slew of other reasons as to why they change their online behavior and this is just one of them.<\/li>\n<li><strong>Major tech companies have beefed up their security<\/strong>. This came about when the Snowden revealed that Microsoft, Facebook, Google, Yahoo and Apple provided their users data to the NSA through the agency\u2019s PRISM program. Tech companies initially denied this until the evidence showed that they did unwillingly in accordance to the law, to their horror. To date, Google and Yahoo have enabled encryption for email. Facebook <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.wired.com\/2014\/03\/facebook-security\/\">encode the site<\/a> and all its data in SSL whereas Microsoft took the legalistic route by demanding for a reform in the law.<\/li>\n<li><strong>People are more aware of different ways to anonymously browse such as via DuckDuckGo and TOR<\/strong>. After the NSA and its PRISM program broke on Jun 6, 2013, DuckDuckGo saw an increase of traffic and <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.gizmodo.com.au\/2013\/07\/the-best-search-engine-youre-probably-not-using\/\">search queries of 3 million a day<\/a>. TOR\u2019s usage undoubtedly increased too but the NSA <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/gizmodo.com\/tor-the-anonymous-internet-and-if-its-right-for-you-1222400823\">knows when you are browsing<\/a>.<\/li>\n<li><strong>The emergence of a new tech privacy market<\/strong>. This saw the creation of the Blackphone which was much touted as an <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/mashable.com\/2014\/01\/15\/blackphone\/\">NSA-proof phone<\/a>. Besides the Blackphone, Boeing came up with a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/boeing-announce-self-destructing-black-phone-government-agencies-9156896.html\">self-destruct phone<\/a> and free Internet provider FreedomPop invented what it dubs as the <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.fastcompany.com\/3027143\/freedompops-snowden-phone-is-similar-to-the-blackphone-but-way-cheaper\">Snowden Phone<\/a> that has a feature to wipe out the phone\u2019s contents.<\/li>\n<\/ol>\n<p>The above are however relatively tamer measures compared to the extreme ones below:<\/p>\n<h2>1. Hiring a Digital bodyguard<\/h2>\n<p>Glenn Greenwald is among the first few journalist that Snowden leaked the documents to. His reports on the NSA leaks that were published in The Guardian have put him almost on the same pedestal as Snowden. It has also unwittingly, <strong>put Greenwald at high risk<\/strong> of the NSA (or other foreign spies) intercepting the top secret information that he still receives from Snowden.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/glenngreenwald.jpg\" alt=\"glenngreenwald\" height=\"281\" width=\"500\"><\/figure>\n<p>Enter Micah Lee, digital bodyguard and tech security extrodinaire. Lee <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/mashable.com\/2014\/05\/27\/micah-lee-greenwald-snowden\/\">was hired<\/a> to join The Intercept, the media outlet Greenwald set up with fellow journalists, Jeremy Scahill and Laura Poitras, to <strong>help secure the journalists\u2019 computers<\/strong>. To do that, Lee had to replace the operating system to Linux, install firewall, disk encryption and other various software.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/micahlee.jpg\" alt=\"micahlee\" height=\"281\" width=\"500\"><\/figure>\n<p>So good was Lee at his job that he ended up <strong>helping other journalists from other media outlets<\/strong> to secure their computers and brief them on computer security. No journalist is safe as there have been reports of the US Department of Justice <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/publiceditor.blogs.nytimes.com\/2014\/01\/13\/protecting-a-source-james-risen-takes-his-case-to-the-supreme-court\/?_php=true&_type=blogs&_r=0\">demanding some to reveal their sources<\/a> in the past as well as obtaining phone records from news wire Associated Press.<\/p>\n<p>Although <strong>hiring a digital bodyguard<\/strong> for reporters is not widely practiced at other news outlets, it may soon be, as long as the NSA continues to poke around. So far, the only other media company that adopted The Intercept\u2019s security modal is The Washington Post, which hired privacy and security researcher <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Ashkan_Soltani\">Ashkan Soltani<\/a> to work alongside the other reporter working on the NSA leaks, Barton Gellman.<\/p>\n<h2>2. Going low tech<\/h2>\n<p>Among the countries that were spied on by the NSA, <strong>Germany felt the most insulted<\/strong>. Not only were their leaders spied on like chancellor Angela Merkel whose mobile phone was tapped for years, <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2014\/07\/05\/world\/europe\/german-arrested-on-suspicion-of-passing-secrets.html\">an agent in their intelligence services<\/a> was found selling confidential documents to the US. The agent has since been arrested. This also led to the expulsion of another <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2014\/07\/11\/world\/europe\/germany-expels-top-us-intelligence-officer.html\">top CIA officer residing in Germany<\/a>.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/typewriter.jpg\" alt=\"typewriter\" height=\"281\" width=\"500\"><\/figure>\n<p>International relations with the US, needless to say, worsened at this point. It got so bad that it brought about an increase in encryption services as well as a decline in technology use. Politicians eventually came up with the idea to invest in and <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/mashable.com\/2014\/07\/15\/germany-typewriters-nsa\/?utm_cid=mash-com-Tw-main-link\">communicate internally with typewriters<\/a>. There are also talks to <strong>play classical music during parliament sessions<\/strong> to deter anyone from listening in.<\/p>\n<p>Despite this extreme switch to low tech, Germany isn\u2019t the first country to do so. Soviet state Russia quickly invested in some <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.themoscowtimes.com\/archive\/federal-guards-to-buy-typewriters-to-avoid-eavesdropping\">20 units of typewriters<\/a> following Snowden\u2019s expose last year in a bid to avoid internal communications from being leaked. Each typewriter is said to have a unique signature in order for documents typed on it to be easily traced back to.<\/p>\n<h2>3. Using make-up<\/h2>\n<p>One of the revelations that was released over time was that the <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2014\/06\/01\/us\/nsa-collecting-millions-of-faces-from-web-images.html\">NSA collects images for facial recognition<\/a>. The Atlantic associate editor Robinson Meyer was concerned about this fact and wondered if there\u2019s a way to thwart the cameras that are probably tracking him down. Meyer eventually decided to apply an interesting make-up called CV Dazzle and <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2014\/07\/makeup\/374929\/\">wrote about his experience<\/a>.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/cvdazzle.jpg\" alt=\"cvdazzle\" height=\"499\" width=\"500\"><\/figure>\n<p><a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/cvdazzle.com\/\">CV Dazzle<\/a> was invented by then New York University student Adam Harvey for his Interactive Telecommunications Program in 2010. Inspired by WWI naval camouflage called <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Dazzle_camouflage\">Dazzle<\/a>, the make-up includes <strong>obscuring tonal areas of the face<\/strong> such as the cheeks with paint and draping hair across the nose bridge. At the time of creation, Harvey merely wanted to get around Facebook\u2019s newest feature which uses facial recognition algorithm for <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/login\/?next=https%3A%2F%2Fwww.facebook.com%2Fnotes%2F10160198612616729%2F\">auto-tagging photos<\/a>.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/styling.jpg\" alt=\"styling\" height=\"269\" width=\"500\"><\/figure>\n<p>Wearing CV Dazzle while going about his everyday life, undoubtedly made Meyer stand out. He did however note that when he tested the make-up with his iPhone\u2019s camera algorithm, <strong>it couldn\u2019t register his face<\/strong>. How effective CV Dazzle has against facial recognition technology in the long run however remains to be seen.<\/p>\n<h2>4. Modifying clothes<\/h2>\n<p>Building on the work he has done with CV Dazzle, Adam Harvey went on to develop a range of clothing dubbed as <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/ahprojects.com\/stealth-wear\/\">Stealth Wear<\/a>. The artist and privacy advocate collaborated with fashion designer Johanna Bloomfield to create the clothing whilst he was <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.wired.com\/2013\/01\/anti-drone-camouflage-apparel\/\">experimenting on metalized fabric<\/a>. Stealth Wear is meant to <strong>hide the wearer from thermal imaging cameras and drones<\/strong>.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/stealthwear.jpg\" alt=\"stealthwear\" height=\"250\" width=\"500\"><\/figure>\n<p>Harvey is not the only one to get into anti-surveillance clothes judging by the emerging popularity of wearable tech. Montreal fashion designer Ying Gao had <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.wired.com\/2013\/09\/wearable-technology\/\">came up with dresses<\/a> in 2013 that will <strong>deconstruct when exposed to a camera\u2019s flash<\/strong>. This year, Austrian architecture firm <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/coop-himmelblau.at\/index.php?it=architecture\/projects\/chbl-jammer-coat\">Coop-Himmelblau<\/a> came up with the <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/mashable.com\/2014\/06\/20\/jammer-coat\/\">Jammer Coat<\/a> which <strong>shields wireless signals from the wearer\u2019s phone<\/strong>, rendering the person invisible to tracking software or search engines.<\/p>","protected":false},"excerpt":{"rendered":"<p>Edward Snowden may be old news as his leaks on the US National Security Agency (NSA) have just passed their one year mark. However, international relations have soured since then and changing the public\u2019s damaged perception would be an uphill challenge. The impact of the NSA leaks also affects us, the average citizen of today.&hellip;<\/p>\n","protected":false},"author":133,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3401],"tags":[4605,1962,4601],"topic":[4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>4 Extreme Ways People Protect Their Privacy - Hongkiat<\/title>\n<meta name=\"description\" content=\"Edward Snowden may be old news as his leaks on the US National Security Agency (NSA) have just passed their one year mark. However, international\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Extreme Ways People Protect Their Privacy\" \/>\n<meta property=\"og:description\" content=\"Edward Snowden may be old news as his leaks on the US National Security Agency (NSA) have just passed their one year mark. However, international\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-15T13:01:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-18T08:14:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/glenngreenwald.jpg\" \/>\n<meta name=\"author\" content=\"Leanne Tan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leanne Tan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/\"},\"author\":{\"name\":\"Leanne Tan\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/6ad80e3854b7d72f9f0193be09fd553d\"},\"headline\":\"4 Extreme Ways People Protect Their Privacy\",\"datePublished\":\"2014-09-15T13:01:30+00:00\",\"dateModified\":\"2021-08-18T08:14:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/\"},\"wordCount\":1160,\"commentCount\":11,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/ways-maintain-privacy\\\/glenngreenwald.jpg\",\"keywords\":[\"Internet Security and Privacy\",\"rr\",\"Security and Privacy\"],\"articleSection\":[\"Culture\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/\",\"name\":\"4 Extreme Ways People Protect Their Privacy - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/ways-maintain-privacy\\\/glenngreenwald.jpg\",\"datePublished\":\"2014-09-15T13:01:30+00:00\",\"dateModified\":\"2021-08-18T08:14:37+00:00\",\"description\":\"Edward Snowden may be old news as his leaks on the US National Security Agency (NSA) have just passed their one year mark. However, international\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/ways-maintain-privacy\\\/glenngreenwald.jpg\",\"contentUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/ways-maintain-privacy\\\/glenngreenwald.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/ways-maintain-privacy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Extreme Ways People Protect Their Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/6ad80e3854b7d72f9f0193be09fd553d\",\"name\":\"Leanne Tan\",\"description\":\"Leanne is still mastering the art of being an Internet ninja. She spends too much time reading comics and scrolling Tumblr.\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/leanne\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"4 Extreme Ways People Protect Their Privacy - Hongkiat","description":"Edward Snowden may be old news as his leaks on the US National Security Agency (NSA) have just passed their one year mark. However, international","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/","og_locale":"en_US","og_type":"article","og_title":"4 Extreme Ways People Protect Their Privacy","og_description":"Edward Snowden may be old news as his leaks on the US National Security Agency (NSA) have just passed their one year mark. However, international","og_url":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2014-09-15T13:01:30+00:00","article_modified_time":"2021-08-18T08:14:37+00:00","og_image":[{"url":"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/glenngreenwald.jpg","type":"","width":"","height":""}],"author":"Leanne Tan","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Leanne Tan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/"},"author":{"name":"Leanne Tan","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/6ad80e3854b7d72f9f0193be09fd553d"},"headline":"4 Extreme Ways People Protect Their Privacy","datePublished":"2014-09-15T13:01:30+00:00","dateModified":"2021-08-18T08:14:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/"},"wordCount":1160,"commentCount":11,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/glenngreenwald.jpg","keywords":["Internet Security and Privacy","rr","Security and Privacy"],"articleSection":["Culture"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/","url":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/","name":"4 Extreme Ways People Protect Their Privacy - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/#primaryimage"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/glenngreenwald.jpg","datePublished":"2014-09-15T13:01:30+00:00","dateModified":"2021-08-18T08:14:37+00:00","description":"Edward Snowden may be old news as his leaks on the US National Security Agency (NSA) have just passed their one year mark. However, international","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/#primaryimage","url":"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/glenngreenwald.jpg","contentUrl":"https:\/\/assets.hongkiat.com\/uploads\/ways-maintain-privacy\/glenngreenwald.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/ways-maintain-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"4 Extreme Ways People Protect Their Privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/6ad80e3854b7d72f9f0193be09fd553d","name":"Leanne Tan","description":"Leanne is still mastering the art of being an Internet ninja. She spends too much time reading comics and scrolling Tumblr.","url":"https:\/\/www.hongkiat.com\/blog\/author\/leanne\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-5JL","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=22057"}],"version-history":[{"count":4,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22057\/revisions"}],"predecessor-version":[{"id":55188,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22057\/revisions\/55188"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=22057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=22057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=22057"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=22057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}