{"id":4632,"date":"2021-04-19T21:17:04","date_gmt":"2021-04-19T21:17:04","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/?post_type=chapter&#038;p=4632"},"modified":"2022-07-25T20:56:27","modified_gmt":"2022-07-25T20:56:27","slug":"safety-and-personal-information-on-the-internet","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/chapter\/safety-and-personal-information-on-the-internet\/","title":{"raw":"Safety and Personal Information on the Internet","rendered":"Safety and Personal Information on the Internet"},"content":{"raw":"<div class=\"textbox learning-objectives\">\r\n<h3>Learning Outcomes<\/h3>\r\n<ul>\r\n \t<li>Describe techniques for keeping your personal information safe in an online context<\/li>\r\n<\/ul>\r\n<\/div>\r\nMore than ever before, it\u2019s critical to keep your personal information safe on the Internet. It seems like every day there is another news story about a new database breach or identity theft scam. But in a world where we\u2019re all connected almost constantly, how do you even know where to begin to protect your data and online identity?\r\n\r\n<a href=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/5571\/2021\/04\/09010434\/eliana.jpg\"><img class=\"size-medium wp-image-5254 alignright\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/5571\/2021\/04\/09010434\/eliana-245x300.jpg\" alt=\"College student standing outside a building holding a backpack and several books\" width=\"245\" height=\"300\" \/><\/a>It\u2019s important to consider both security and privacy. Ideally, you would like to have a great deal of both. Many people don\u2019t understand the difference between security and privacy. And indeed, there is some overlap between them. Generally speaking, <strong>security<\/strong> has to do with protecting your data and online identity, and <strong>privacy<\/strong> has to do with how much control you have over who sees your data and online identity.\r\n\r\nAs an example, let\u2019s look at Eliana, a freshman at Mountain Brush Community College. Eliana has a Chromebook that she uses both for her schoolwork as well as her personal Internet use. She also has a Google-branded smartphone, and on both of these devices she uses the apps that came with them, like Gmail, Google Docs, and Google Maps. Google keeps Eliana\u2019s information very secure. However, she doesn\u2019t have much privacy, at least when it comes to Google\u2014they keep an astounding amount of information about Eliana. She has to decide whether she trusts Google to know so much about her or not.\r\n\r\nUnfortunately, both security and privacy often come at the cost of some amount of convenience. It\u2019s up to you to decide where the right balance is for you, but in order to make that decision, you need to understand the tradeoffs.\r\n<div class=\"textbox tryit\">\r\n<h3>Try It<\/h3>\r\nhttps:\/\/assess.lumenlearning.com\/practice\/ed05ef9b-9d95-4fda-9e48-e760a5a8c60c\r\n\r\n<\/div>\r\n<h2>Security<\/h2>\r\nInterestingly, in today\u2019s world, security is often easier to achieve than privacy. For one thing, we\u2019re all used to some of the steps we have to take to keep our information secure, and it\u2019s actually in the best interests of the big tech companies like Google, Apple, Microsoft, Amazon, and Facebook to help us keep our information secure. The same is not true for privacy, as we\u2019ll discuss later.\r\n<h3>Passwords and Password Managers<\/h3>\r\nThe first step to achieving better online security is the one that we\u2019re all familiar with\u2014maintaining good, separate passwords for all of our online accounts. While it\u2019s much easier to use a few simple, easy-to-type passwords for most of your accounts (and many people still do!), this is a great example of sacrificing security for convenience. The risk is that if someone obtains your email address and password for one account (for example, through a data breach at a company you do business with), they have your login credentials for many of your accounts and can start doing real damage.\r\n\r\nFortunately, password managers are a great tool for maintaining quite a bit of convenience in this scenario while achieving high levels of security. A password manager is an app that runs on all of your devices (computer, phone, tablet, etc.) and stores your passwords for all your online accounts. You only have to remember a single password: the one that unlocks your password manager. This app makes it easy to create super-secure unique passwords for your online accounts because you never have to remember them! Some popular password managers are <a href=\"https:\/\/1password.com\/\" target=\"_blank\" rel=\"noopener\">1Password<\/a>, <a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" rel=\"noopener\">LastPass<\/a>, and <a href=\"https:\/\/bitwarden.com\/\" target=\"_blank\" rel=\"noopener\">Bitwarden<\/a>.\r\n<h3>Two-Factor Authentication (2FA)<\/h3>\r\nTwo-factor authentication (2FA) is an extra layer of security on top of your existing password. To gain access to a site, you must enter your password and then provide a second piece of information\u2014often a code that is texted to your phone number. This increases the likelihood that you are who you say you are, and helps to prevent unauthorized access to your account. Unfortunately, this comes at the cost of convenience\u2014it can be annoying to have to enter two pieces of information every time you log on to a site! A good compromise is to use 2FA on your most important accounts, where the most damage could be done if someone gains access to them\u2014for example, bank accounts, your school account, and your email account.\r\n\r\nThat last one, your email account, is more important than you might think at first. If someone gains access to your email account, they can immediately change your password to lock you out, and then begin to go through all your online accounts, resetting your passwords to gain access to all those accounts. So protecting your email account should benext to protecting your bank accounts in terms of priority.\r\n<h3>Security Updates<\/h3>\r\nAs hackers find exploits in software and operating systems that run on our phones and computers, security updates on our devices try to block these exploits. However, it\u2019s up to you to make sure that you keep the software on your phone and computer up to date so that you get the latest security patches. The easiest way to do this is to set your devices to download and install security updates automatically.\r\n<h3>Antivirus\/Anti-malware<\/h3>\r\nAnother effective way to block unauthorized access of your personal data is to run antivirus\/anti-malware software on your computer. <a href=\"https:\/\/www.bitdefender.com\/\" target=\"_blank\" rel=\"noopener\">Bitdefender<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a>, and <a href=\"https:\/\/www.mcafee.com\/en-us\/index.html\" target=\"_blank\" rel=\"noopener\">McAfee Total Protection<\/a> are some common software programs you can check out.\r\n<h3>Ad Blockers<\/h3>\r\nAn ad blocker is an extension you run in your web browser that not only keeps you from being inundated with ads, but can help prevent your computer from becoming infected by malware. Some browsers now block ads without you having to install anything (e.g., Brave). For other browsers, common ad blocker extensions are <a href=\"https:\/\/adblockplus.org\/\" target=\"_blank\" rel=\"noopener\">AdBlock Plus<\/a> and <a href=\"https:\/\/ublockorigin.com\/\" target=\"_blank\" rel=\"noopener\">uBlock Origin<\/a>.\r\n<h3>Backup<\/h3>\r\nFinally, you should take steps to protect your data from yourself! We don\u2019t mean, of course, that you are likely to steal your own data. Rather, data loss is a common occurrence that, while not nefarious in nature, can still be very problematic. We tend to rely on cloud backups for more and more of our data these days, but it\u2019s worth giving some thought to what happens to your data if your account is closed, or the company goes away, or even if you just exceed your storage limits and don\u2019t realize it before your data starts being deleted. For pictures and documents that we store in the cloud and on our computers and phones, it\u2019s good to have a backup stored somewhere safe\u2014for example, on an external hard drive.\r\n<h2>Privacy<\/h2>\r\nRemember Eliana from our discussion above? She was the freshman who uses a Chromebook and a Google-branded smartphone, and on both of these devices she uses the apps that came with them, like Gmail, Google Docs, and Google Maps. While Google keeps Eliana\u2019s information very secure, we noted that she doesn\u2019t have much privacy, at least when it comes to Google. Google knows her name, email address, home address, birthday, gender, and phone number. They know what she looks like, what she sounds like, who her friends are, how much she talks to them, and what she talks about with them. They know what her interests are, what she searches for online, what she buys online, where she goes, what stores and restaurants she likes to visit, how much time she spends there, and how fast she drives. If Eliana wears a Fitbit to track her steps, Google also knows her weight, height, age, fitness goals, and how many calories she burns in a day.\r\n\r\nTo look through some of the data Google has stored about you specifically, you can visit <a href=\"https:\/\/takeout.google.com\" target=\"_blank\" rel=\"noopener\">https:\/\/takeout.google.com<\/a>. Check all of the boxes that you\u2019re interested in, and then click the button to export your data. It can take hours or days for Google to assemble the download for you, but they will email you when it\u2019s ready, and you can poke through all your personal information that Google has stored. To limit the amount of data that Google collects on you, and to delete saved data, you can visit <a href=\"https:\/\/myaccount.google.com\/activitycontrols\" target=\"_blank\" rel=\"noopener\">https:\/\/myaccount.google.com\/activitycontrols<\/a>.\r\n\r\nThe following image is from Google Takeout, and shows all the different categories of data that Google collects about you:\r\n\r\n[caption id=\"attachment_5257\" align=\"aligncenter\" width=\"600\"]<a href=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/5571\/2021\/04\/09013355\/takeout1.png\"><img class=\"wp-image-5257\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/5571\/2021\/04\/09013355\/takeout1.png\" alt=\"Google Takeout menu listing all of the categories of data Google collects: Android Device Configuration Service, Arts &amp; Culture, Assistant Notes and Lists, Calendar, Chrome, Classic Sites, Classroom, Cloud Print, Contacts, Crisis User Reports, Data Shared for Research, Drive, Fit, Google Account, Google Cloud Search, Google Fi, Google Help Communities, Google My Business, Google Pay, Google Photos, Google Play Books, Google Play Games Services, Google Play Movies &amp; TV, Google Play Store, Google Shopping, Google Store, Google Translator Toolkit, Google Workspace Marketplace, Groups, Hangouts, Home App, Keep, Location History, Mail, Maps, Maps (your places), My Activity, My Maps, News, Pinpoint, Posts on Google, Profile, Purchases &amp; Reservations, Question Hub, Reminders, Saved, Search Contributions, Shopping Lists, Stadia, Street View, Tasks, Voice, and YouTube and YouTube Music.\" width=\"600\" height=\"5878\" \/><\/a> Google Takeout menu[\/caption]\r\n\r\nWhat if Eliana was in the Apple ecosystem as opposed to Google\u2019s\u2014would she be better off in terms of privacy? The answer depends in part on whether or not she's using all of the same Google apps\u2014Gmail, Google Maps, Google Search, etc.\u2014on her Apple devices that she was on her Google devices. If she is using Google apps, then her situation is very similar. If she has opted to avoid all Google apps, then her level of privacy has improved as Apple is not sharing her data with advertisers. Remember that a key part of Google\u2019s business model is creating a profile of you\u2014all your interests, online purchases, web searches, etc., and using that data to deliver targeted ads to you. Apple\u2019s business model is different. Apple charges you higher prices for their products and services rather than delivering ads to you. Because of this difference in business models, a study in 2021 found that Google collects around twenty times more handset data than Apple[footnote]Leith, <em>Douglas<\/em> J. \"Mobile Handset Privacy: Measuring The Data iOS\r\nand Android Send to Apple And Google.\"\u00a0<em>Trinity College Dublin, Ireland<\/em>, 25 March 2021, https:\/\/www.scss.tcd.ie\/doug.leith\/apple_google.pdf[\/footnote].\r\n\r\nHowever, it's worth noting that Apple is still tracking Eliana in many of the same ways that Google does and storing her information on their servers for their own uses. So in the end, she would still need to decide to what extent she is willing to trust a large tech company with all of her personal information.\r\n\r\nWhat can you do to improve your privacy? After all, almost all of us use computers and smartphones on a daily basis, and some amount of data capturing and tracking is all but unavoidable in order to use the services that we need in everyday life. However, there are some steps you can take to begin to improve your privacy without losing too much in terms of convenience.\r\n<h3>Text Messaging<\/h3>\r\n<a href=\"https:\/\/www.signal.org\/\" target=\"_blank\" rel=\"noopener\">Signal<\/a> and <a href=\"https:\/\/telegram.org\/\" target=\"_blank\" rel=\"noopener\">Telegram<\/a> are two good privacy-focused messaging services you can use instead of the apps that come with your smartphone, and both of them are free. On an Android phone, you can even set Signal to be your default text messaging app, and it will let you communicate with your non-Signal-using friends in addition to other Signal users (unfortunately, this isn\u2019t possible on Apple devices due to limitations in the iOS).\r\n<h3>Web Searching<\/h3>\r\nGoogle is the undisputed king of web searching. However, privacy-focused alternatives are starting to appear. One of the best is <a href=\"https:\/\/duckduckgo.com\/\" target=\"_blank\" rel=\"noopener\">DuckDuckGo<\/a>. Unlike Google, it doesn\u2019t collect or share any kind of identifiable personal information. DuckDuckGo can be used in a web browser on your computer, and is also available as an app for your smartphone.\r\n<h3>Internet Browsing<\/h3>\r\nWhile Google Chrome has the highest market share of all browsers, other privacy-focused alternatives exist that are arguably just as good. Two popular ones are <a href=\"https:\/\/brave.com\/\" target=\"_blank\" rel=\"noopener\">Brave<\/a> and <a href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/new\/\" target=\"_blank\" rel=\"noopener\">Firefox<\/a>. Brave is actually built on the underlying, open-source code that Chrome is built from, which means that the browser plug-ins you use with Chrome will also work with Brave. Firefox is not built on the same technology, but has a wide range of plug-ins available as well.\r\n<h3>Email<\/h3>\r\nAside from privacy concerns, Gmail is a great email service\u2014it\u2019s easy to use, it works on almost any device, and it\u2019s free. But again, it\u2019s only free because Google\u2019s business model is to sell ads rather than charging their customers. If you\u2019re interested in improving your privacy, there are a number of email providers that you can choose from that offer private email, but the tradeoff is that they cost a few dollars per month. Popular ones include <a href=\"https:\/\/protonmail.com\/\" target=\"_blank\" rel=\"noopener\">ProtonMail<\/a>, <a href=\"https:\/\/www.fastmail.com\/\" target=\"_blank\" rel=\"noopener\">FastMail<\/a>, and <a href=\"https:\/\/tutanota.com\/\" target=\"_blank\" rel=\"noopener\">Tutanota<\/a>.\r\n<div class=\"textbox learning-objectives\">\r\n<h3>glossary<\/h3>\r\n<strong>privacy:<\/strong> the degree of control we have over who sees our online data and identity\r\n\r\n<strong>security:<\/strong> the degree to which we protect our online data and identity\r\n\r\n<\/div>","rendered":"<div class=\"textbox learning-objectives\">\n<h3>Learning Outcomes<\/h3>\n<ul>\n<li>Describe techniques for keeping your personal information safe in an online context<\/li>\n<\/ul>\n<\/div>\n<p>More than ever before, it\u2019s critical to keep your personal information safe on the Internet. It seems like every day there is another news story about a new database breach or identity theft scam. But in a world where we\u2019re all connected almost constantly, how do you even know where to begin to protect your data and online identity?<\/p>\n<p><a href=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/5571\/2021\/04\/09010434\/eliana.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5254 alignright\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/5571\/2021\/04\/09010434\/eliana-245x300.jpg\" alt=\"College student standing outside a building holding a backpack and several books\" width=\"245\" height=\"300\" \/><\/a>It\u2019s important to consider both security and privacy. Ideally, you would like to have a great deal of both. Many people don\u2019t understand the difference between security and privacy. And indeed, there is some overlap between them. Generally speaking, <strong>security<\/strong> has to do with protecting your data and online identity, and <strong>privacy<\/strong> has to do with how much control you have over who sees your data and online identity.<\/p>\n<p>As an example, let\u2019s look at Eliana, a freshman at Mountain Brush Community College. Eliana has a Chromebook that she uses both for her schoolwork as well as her personal Internet use. She also has a Google-branded smartphone, and on both of these devices she uses the apps that came with them, like Gmail, Google Docs, and Google Maps. Google keeps Eliana\u2019s information very secure. However, she doesn\u2019t have much privacy, at least when it comes to Google\u2014they keep an astounding amount of information about Eliana. She has to decide whether she trusts Google to know so much about her or not.<\/p>\n<p>Unfortunately, both security and privacy often come at the cost of some amount of convenience. It\u2019s up to you to decide where the right balance is for you, but in order to make that decision, you need to understand the tradeoffs.<\/p>\n<div class=\"textbox tryit\">\n<h3>Try It<\/h3>\n<p>\t<iframe id=\"assessment_practice_ed05ef9b-9d95-4fda-9e48-e760a5a8c60c\" class=\"resizable\" src=\"https:\/\/assess.lumenlearning.com\/practice\/ed05ef9b-9d95-4fda-9e48-e760a5a8c60c?iframe_resize_id=assessment_practice_id_ed05ef9b-9d95-4fda-9e48-e760a5a8c60c\" frameborder=\"0\" style=\"border:none;width:100%;height:100%;min-height:300px;\"><br \/>\n\t<\/iframe><\/p>\n<\/div>\n<h2>Security<\/h2>\n<p>Interestingly, in today\u2019s world, security is often easier to achieve than privacy. For one thing, we\u2019re all used to some of the steps we have to take to keep our information secure, and it\u2019s actually in the best interests of the big tech companies like Google, Apple, Microsoft, Amazon, and Facebook to help us keep our information secure. The same is not true for privacy, as we\u2019ll discuss later.<\/p>\n<h3>Passwords and Password Managers<\/h3>\n<p>The first step to achieving better online security is the one that we\u2019re all familiar with\u2014maintaining good, separate passwords for all of our online accounts. While it\u2019s much easier to use a few simple, easy-to-type passwords for most of your accounts (and many people still do!), this is a great example of sacrificing security for convenience. The risk is that if someone obtains your email address and password for one account (for example, through a data breach at a company you do business with), they have your login credentials for many of your accounts and can start doing real damage.<\/p>\n<p>Fortunately, password managers are a great tool for maintaining quite a bit of convenience in this scenario while achieving high levels of security. A password manager is an app that runs on all of your devices (computer, phone, tablet, etc.) and stores your passwords for all your online accounts. You only have to remember a single password: the one that unlocks your password manager. This app makes it easy to create super-secure unique passwords for your online accounts because you never have to remember them! Some popular password managers are <a href=\"https:\/\/1password.com\/\" target=\"_blank\" rel=\"noopener\">1Password<\/a>, <a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" rel=\"noopener\">LastPass<\/a>, and <a href=\"https:\/\/bitwarden.com\/\" target=\"_blank\" rel=\"noopener\">Bitwarden<\/a>.<\/p>\n<h3>Two-Factor Authentication (2FA)<\/h3>\n<p>Two-factor authentication (2FA) is an extra layer of security on top of your existing password. To gain access to a site, you must enter your password and then provide a second piece of information\u2014often a code that is texted to your phone number. This increases the likelihood that you are who you say you are, and helps to prevent unauthorized access to your account. Unfortunately, this comes at the cost of convenience\u2014it can be annoying to have to enter two pieces of information every time you log on to a site! A good compromise is to use 2FA on your most important accounts, where the most damage could be done if someone gains access to them\u2014for example, bank accounts, your school account, and your email account.<\/p>\n<p>That last one, your email account, is more important than you might think at first. If someone gains access to your email account, they can immediately change your password to lock you out, and then begin to go through all your online accounts, resetting your passwords to gain access to all those accounts. So protecting your email account should benext to protecting your bank accounts in terms of priority.<\/p>\n<h3>Security Updates<\/h3>\n<p>As hackers find exploits in software and operating systems that run on our phones and computers, security updates on our devices try to block these exploits. However, it\u2019s up to you to make sure that you keep the software on your phone and computer up to date so that you get the latest security patches. The easiest way to do this is to set your devices to download and install security updates automatically.<\/p>\n<h3>Antivirus\/Anti-malware<\/h3>\n<p>Another effective way to block unauthorized access of your personal data is to run antivirus\/anti-malware software on your computer. <a href=\"https:\/\/www.bitdefender.com\/\" target=\"_blank\" rel=\"noopener\">Bitdefender<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a>, and <a href=\"https:\/\/www.mcafee.com\/en-us\/index.html\" target=\"_blank\" rel=\"noopener\">McAfee Total Protection<\/a> are some common software programs you can check out.<\/p>\n<h3>Ad Blockers<\/h3>\n<p>An ad blocker is an extension you run in your web browser that not only keeps you from being inundated with ads, but can help prevent your computer from becoming infected by malware. Some browsers now block ads without you having to install anything (e.g., Brave). For other browsers, common ad blocker extensions are <a href=\"https:\/\/adblockplus.org\/\" target=\"_blank\" rel=\"noopener\">AdBlock Plus<\/a> and <a href=\"https:\/\/ublockorigin.com\/\" target=\"_blank\" rel=\"noopener\">uBlock Origin<\/a>.<\/p>\n<h3>Backup<\/h3>\n<p>Finally, you should take steps to protect your data from yourself! We don\u2019t mean, of course, that you are likely to steal your own data. Rather, data loss is a common occurrence that, while not nefarious in nature, can still be very problematic. We tend to rely on cloud backups for more and more of our data these days, but it\u2019s worth giving some thought to what happens to your data if your account is closed, or the company goes away, or even if you just exceed your storage limits and don\u2019t realize it before your data starts being deleted. For pictures and documents that we store in the cloud and on our computers and phones, it\u2019s good to have a backup stored somewhere safe\u2014for example, on an external hard drive.<\/p>\n<h2>Privacy<\/h2>\n<p>Remember Eliana from our discussion above? She was the freshman who uses a Chromebook and a Google-branded smartphone, and on both of these devices she uses the apps that came with them, like Gmail, Google Docs, and Google Maps. While Google keeps Eliana\u2019s information very secure, we noted that she doesn\u2019t have much privacy, at least when it comes to Google. Google knows her name, email address, home address, birthday, gender, and phone number. They know what she looks like, what she sounds like, who her friends are, how much she talks to them, and what she talks about with them. They know what her interests are, what she searches for online, what she buys online, where she goes, what stores and restaurants she likes to visit, how much time she spends there, and how fast she drives. If Eliana wears a Fitbit to track her steps, Google also knows her weight, height, age, fitness goals, and how many calories she burns in a day.<\/p>\n<p>To look through some of the data Google has stored about you specifically, you can visit <a href=\"https:\/\/takeout.google.com\" target=\"_blank\" rel=\"noopener\">https:\/\/takeout.google.com<\/a>. Check all of the boxes that you\u2019re interested in, and then click the button to export your data. It can take hours or days for Google to assemble the download for you, but they will email you when it\u2019s ready, and you can poke through all your personal information that Google has stored. To limit the amount of data that Google collects on you, and to delete saved data, you can visit <a href=\"https:\/\/myaccount.google.com\/activitycontrols\" target=\"_blank\" rel=\"noopener\">https:\/\/myaccount.google.com\/activitycontrols<\/a>.<\/p>\n<p>The following image is from Google Takeout, and shows all the different categories of data that Google collects about you:<\/p>\n<div id=\"attachment_5257\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/5571\/2021\/04\/09013355\/takeout1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5257\" class=\"wp-image-5257\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/5571\/2021\/04\/09013355\/takeout1.png\" alt=\"Google Takeout menu listing all of the categories of data Google collects: Android Device Configuration Service, Arts &amp; Culture, Assistant Notes and Lists, Calendar, Chrome, Classic Sites, Classroom, Cloud Print, Contacts, Crisis User Reports, Data Shared for Research, Drive, Fit, Google Account, Google Cloud Search, Google Fi, Google Help Communities, Google My Business, Google Pay, Google Photos, Google Play Books, Google Play Games Services, Google Play Movies &amp; TV, Google Play Store, Google Shopping, Google Store, Google Translator Toolkit, Google Workspace Marketplace, Groups, Hangouts, Home App, Keep, Location History, Mail, Maps, Maps (your places), My Activity, My Maps, News, Pinpoint, Posts on Google, Profile, Purchases &amp; Reservations, Question Hub, Reminders, Saved, Search Contributions, Shopping Lists, Stadia, Street View, Tasks, Voice, and YouTube and YouTube Music.\" width=\"600\" height=\"5878\" \/><\/a><\/p>\n<p id=\"caption-attachment-5257\" class=\"wp-caption-text\">Google Takeout menu<\/p>\n<\/div>\n<p>What if Eliana was in the Apple ecosystem as opposed to Google\u2019s\u2014would she be better off in terms of privacy? The answer depends in part on whether or not she&#8217;s using all of the same Google apps\u2014Gmail, Google Maps, Google Search, etc.\u2014on her Apple devices that she was on her Google devices. If she is using Google apps, then her situation is very similar. If she has opted to avoid all Google apps, then her level of privacy has improved as Apple is not sharing her data with advertisers. Remember that a key part of Google\u2019s business model is creating a profile of you\u2014all your interests, online purchases, web searches, etc., and using that data to deliver targeted ads to you. Apple\u2019s business model is different. Apple charges you higher prices for their products and services rather than delivering ads to you. Because of this difference in business models, a study in 2021 found that Google collects around twenty times more handset data than Apple<a class=\"footnote\" title=\"Leith, Douglas J. &quot;Mobile Handset Privacy: Measuring The Data iOS\nand Android Send to Apple And Google.&quot;\u00a0Trinity College Dublin, Ireland, 25 March 2021, https:\/\/www.scss.tcd.ie\/doug.leith\/apple_google.pdf\" id=\"return-footnote-4632-1\" href=\"#footnote-4632-1\" aria-label=\"Footnote 1\"><sup class=\"footnote\">[1]<\/sup><\/a>.<\/p>\n<p>However, it&#8217;s worth noting that Apple is still tracking Eliana in many of the same ways that Google does and storing her information on their servers for their own uses. So in the end, she would still need to decide to what extent she is willing to trust a large tech company with all of her personal information.<\/p>\n<p>What can you do to improve your privacy? After all, almost all of us use computers and smartphones on a daily basis, and some amount of data capturing and tracking is all but unavoidable in order to use the services that we need in everyday life. However, there are some steps you can take to begin to improve your privacy without losing too much in terms of convenience.<\/p>\n<h3>Text Messaging<\/h3>\n<p><a href=\"https:\/\/www.signal.org\/\" target=\"_blank\" rel=\"noopener\">Signal<\/a> and <a href=\"https:\/\/telegram.org\/\" target=\"_blank\" rel=\"noopener\">Telegram<\/a> are two good privacy-focused messaging services you can use instead of the apps that come with your smartphone, and both of them are free. On an Android phone, you can even set Signal to be your default text messaging app, and it will let you communicate with your non-Signal-using friends in addition to other Signal users (unfortunately, this isn\u2019t possible on Apple devices due to limitations in the iOS).<\/p>\n<h3>Web Searching<\/h3>\n<p>Google is the undisputed king of web searching. However, privacy-focused alternatives are starting to appear. One of the best is <a href=\"https:\/\/duckduckgo.com\/\" target=\"_blank\" rel=\"noopener\">DuckDuckGo<\/a>. Unlike Google, it doesn\u2019t collect or share any kind of identifiable personal information. DuckDuckGo can be used in a web browser on your computer, and is also available as an app for your smartphone.<\/p>\n<h3>Internet Browsing<\/h3>\n<p>While Google Chrome has the highest market share of all browsers, other privacy-focused alternatives exist that are arguably just as good. Two popular ones are <a href=\"https:\/\/brave.com\/\" target=\"_blank\" rel=\"noopener\">Brave<\/a> and <a href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/new\/\" target=\"_blank\" rel=\"noopener\">Firefox<\/a>. Brave is actually built on the underlying, open-source code that Chrome is built from, which means that the browser plug-ins you use with Chrome will also work with Brave. Firefox is not built on the same technology, but has a wide range of plug-ins available as well.<\/p>\n<h3>Email<\/h3>\n<p>Aside from privacy concerns, Gmail is a great email service\u2014it\u2019s easy to use, it works on almost any device, and it\u2019s free. But again, it\u2019s only free because Google\u2019s business model is to sell ads rather than charging their customers. If you\u2019re interested in improving your privacy, there are a number of email providers that you can choose from that offer private email, but the tradeoff is that they cost a few dollars per month. Popular ones include <a href=\"https:\/\/protonmail.com\/\" target=\"_blank\" rel=\"noopener\">ProtonMail<\/a>, <a href=\"https:\/\/www.fastmail.com\/\" target=\"_blank\" rel=\"noopener\">FastMail<\/a>, and <a href=\"https:\/\/tutanota.com\/\" target=\"_blank\" rel=\"noopener\">Tutanota<\/a>.<\/p>\n<div class=\"textbox learning-objectives\">\n<h3>glossary<\/h3>\n<p><strong>privacy:<\/strong> the degree of control we have over who sees our online data and identity<\/p>\n<p><strong>security:<\/strong> the degree to which we protect our online data and identity<\/p>\n<\/div>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-4632\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">Public domain content<\/div><ul class=\"citation-list\"><li>College student. <strong>Authored by<\/strong>: Q000024. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/pxhere.com\/en\/photo\/1630674\">https:\/\/pxhere.com\/en\/photo\/1630674<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/about\/cc0\">CC0: No Rights Reserved<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section><hr class=\"before-footnotes clear\" \/><div class=\"footnotes\"><ol><li id=\"footnote-4632-1\">Leith, <em>Douglas<\/em> J. \"Mobile Handset Privacy: Measuring The Data iOS\r\nand Android Send to Apple And Google.\"\u00a0<em>Trinity College Dublin, Ireland<\/em>, 25 March 2021, https:\/\/www.scss.tcd.ie\/doug.leith\/apple_google.pdf <a href=\"#return-footnote-4632-1\" class=\"return-footnote\" aria-label=\"Return to footnote 1\">&crarr;<\/a><\/li><\/ol><\/div>","protected":false},"author":169554,"menu_order":11,"template":"","meta":{"_candela_citation":"[{\"type\":\"pd\",\"description\":\"College student\",\"author\":\"Q000024\",\"organization\":\"\",\"url\":\"https:\/\/pxhere.com\/en\/photo\/1630674\",\"project\":\"\",\"license\":\"cc0\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"9395b1f2-f6c6-4329-a183-367463b5c38d, 18118453-df42-40f5-90c9-9f9e9ce7e345","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-4632","chapter","type-chapter","status-publish","hentry"],"part":4236,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/pressbooks\/v2\/chapters\/4632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/wp\/v2\/users\/169554"}],"version-history":[{"count":25,"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/pressbooks\/v2\/chapters\/4632\/revisions"}],"predecessor-version":[{"id":7404,"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/pressbooks\/v2\/chapters\/4632\/revisions\/7404"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/pressbooks\/v2\/parts\/4236"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/pressbooks\/v2\/chapters\/4632\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/wp\/v2\/media?parent=4632"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/pressbooks\/v2\/chapter-type?post=4632"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/wp\/v2\/contributor?post=4632"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-collegesuccess-2\/wp-json\/wp\/v2\/license?post=4632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}