Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Here’s everything you need to know about preordering the new Google Pixel phones

    August 20, 2025

    Google says the quiet part out loud: IP68 protection doesn’t last

    August 20, 2025

    The Made by Google event felt like being sucked into an episode of Wandavision

    August 20, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » A Starter Guide to Protecting Your Data From Hackers and Corporations
    Security

    A Starter Guide to Protecting Your Data From Hackers and Corporations

    News RoomBy News RoomJune 13, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    How do I deal with having to have a new account for every service and website? Should I be using new email addresses?

    A new email address for every account is a big undertaking! I’d recommend having an email address for the accounts that are most important to you and then having one that you use to sign up for things that are less important. There are also services that will let you create “burner” emails that you can use to sign-up with services, and if you use an Apple device there’s a “Hide My Email” setting.

    What tips would you offer to those looking to keep their digital privacy while crossing the US border (or otherwise entering or exiting the States)?

    It really depends on what levels of risk you as an individual could face. Some people traveling across the border are likely to face higher scrutiny than others—for instance nationality, citizenship, and profession could all make a difference. Even what you’ve said on social media or in messaging apps could potentially be used against you.

    Personally, the first thing I would do is think about what is on my phone: the kind of messages I have sent (and received), what I have posted publicly, and log out (or remove) what I consider to be the most sensitive apps from my phone (such as email). A burner phone might seem like a good idea, although this isn’t the right idea for everyone and it could bring more suspicion on you. It’s better to have a travel phone—one that you only use for travel that has nothing sensitive on it or connected to it.

    My colleague Andy Greenberg and I have put together a guide that covers a lot more than this: such as pre-travel steps you can take, locking down your devices, how to think about passwords, and minimizing the data you are carrying. It’s here. Also, senior writer Lily Hay Newman and I have produced a (long) guide specifically about phone searches at the US border.

    Would you recommend against having a device like Alexa in your home? Or are there particular products or steps you can take to make a smart device more secure?

    Something that’s always listening in your home—what could go wrong? It’s definitely not great for overall surveillance culture.

    Recently Amazon also reduced some of the privacy options for Alexa devices. So if you’re going to use a smart speaker, then I’d look into what each device’s privacy settings are and then go from there.

    How do you see people’s willingness to hand over information about their lives to AI playing into surveillance?

    The amount of data that AI companies have—and continue to—hoover up really bothers me. There’s no doubt that AI tools can be useful in some settings and to some people (personally, I seldom use generative AI). But I would generally say people don’t have enough awareness about how much they’re sharing with chatbots and the companies that own them. Tech companies have scraped vast swathes of the web to gather the data they claim is needed to create generative AI—often with little regard for content creators, copyright laws, or privacy. On top of this, increasingly, firms with reams of people’s posts are looking to get in on the AI gold rush by selling or licensing that information.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleAnbernic’s RG Slide might be too chunky and heavy for your pockets
    Next Article Anne Wojcicki is taking back control of 23andMe

    Related Posts

    493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds

    August 20, 2025

    Russia Is Cracking Down on End-to-End Encrypted Calls

    August 19, 2025

    The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived

    August 19, 2025

    Data Brokers Are Hiding Their Opt-Out Pages From Google Search

    August 19, 2025

    Inside the Multimillion-Dollar Gray Market for Video Game Cheats

    August 13, 2025

    How to Protect Yourself From Portable Point-of-Sale Scams

    August 12, 2025
    Our Picks

    Google says the quiet part out loud: IP68 protection doesn’t last

    August 20, 2025

    The Made by Google event felt like being sucked into an episode of Wandavision

    August 20, 2025

    Google’s Gemini Live AI assistant will show you what it’s talking about

    August 20, 2025

    Today is your last chance to grab a PS5 before Sony’s price hikes go into effect

    August 20, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Gear

    We’ve Rounded Up the Best Early Labor Day Deals on Gear We’ve Tested

    By News RoomAugust 20, 2025

    Labor Day is not until September 1, but retailers are already offering oodles of Labor…

    Google’s Pixel Buds 2A add Gemini, noise cancellation, and a replaceable battery

    August 20, 2025

    The best new features of the Pixel 10 lineup

    August 20, 2025

    The Google Pixel 10 and 10 Pro come with magnets, a new chip, and AI everywhere

    August 20, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.