[{"data":1,"prerenderedAt":2310},["ShallowReactive",2],{"guide-\u002Fguides\u002Fbest-privacy-settings-iphone":3,"sidebar-guides-\u002Fguides\u002Fbest-privacy-settings-iphone":457},{"id":4,"title":5,"author":6,"body":7,"category":445,"date":446,"description":447,"extension":448,"image":449,"meta":450,"navigation":451,"path":452,"readTime":453,"seo":454,"stem":455,"__hash__":456},"guides\u002Fguides\u002Fbest-privacy-settings-iphone.md","Best Privacy Settings for iPhone","The Privacy Authority",{"type":8,"value":9,"toc":427},"minimark",[10,15,19,22,26,32,39,44,49,53,58,61,101,107,111,116,119,157,161,164,169,183,188,196,200,205,213,218,223,226,230,235,275,280,285,289,299,310,316,320,325,330,334,339,344,348,353,361,365,370,387,390,394,397,401,404,424],[11,12,14],"h2",{"id":13},"why-this-matters","Why This Matters",[16,17,18],"p",{},"Apple markets the iPhone as the privacy phone, and to their credit, it's better than Android out of the box. But \"better than Android\" is a low bar. Your iPhone still shares more than you'd expect unless you go through the settings manually.",[16,20,21],{},"This guide covers every privacy setting worth changing. It takes about 10 minutes.",[11,23,25],{"id":24},"tracking-and-advertising","Tracking and Advertising",[16,27,28],{},[29,30,31],"strong",{},"Settings > Privacy & Security > Tracking",[33,34,35],"ul",{},[36,37,38],"li",{},"Turn off \"Allow Apps to Request to Track.\" This is the big one. It tells every app that you don't want to be tracked across other apps and websites. With this off, apps can't access your IDFA (Identifier for Advertisers).",[16,40,41],{},[29,42,43],{},"Settings > Privacy & Security > Apple Advertising",[33,45,46],{},[36,47,48],{},"Turn off \"Personalized Ads.\" Apple runs its own ad network in the App Store and Apple News. This opts you out.",[11,50,52],{"id":51},"location-services","Location Services",[16,54,55],{},[29,56,57],{},"Settings > Privacy & Security > Location Services",[16,59,60],{},"Don't turn location off entirely (Maps and Find My need it). Instead, go through each app individually:",[33,62,63,66,69,98],{},[36,64,65],{},"Set most apps to \"While Using\" instead of \"Always.\" Almost nothing genuinely needs your location 24\u002F7.",[36,67,68],{},"For apps that don't need location at all (games, calculators, social media you don't geopost on), set to \"Never.\"",[36,70,71,72],{},"Scroll to the bottom and tap \"System Services.\" Turn off:\n",[33,73,74,80,86,92],{},[36,75,76,79],{},[29,77,78],{},"Significant Locations",": Apple tracks places you visit frequently. Turn it off and clear the history.",[36,81,82,85],{},[29,83,84],{},"iPhone Analytics",": Sends location data to Apple for \"improving\" products.",[36,87,88,91],{},[29,89,90],{},"Routing & Traffic",": Sends your driving data to Apple.",[36,93,94,97],{},[29,95,96],{},"Improve Maps",": Sends places you visit to Apple.",[36,99,100],{},"Keep \"Find My iPhone\" and \"Emergency SOS\" on. Those are actually useful.",[16,102,103,106],{},[29,104,105],{},"Tip",": Turn on the status bar icon for location (at the bottom of System Services). This shows an arrow in your status bar whenever any app accesses your location. You'll be surprised how often it blinks.",[11,108,110],{"id":109},"app-permissions-audit","App Permissions Audit",[16,112,113],{},[29,114,115],{},"Settings > Privacy & Security",[16,117,118],{},"Go through each category and revoke access for apps that don't need it:",[33,120,121,127,133,139,145,151],{},[36,122,123,126],{},[29,124,125],{},"Camera",": Only apps that genuinely take photos\u002Fvideos",[36,128,129,132],{},[29,130,131],{},"Microphone",": Only calling apps and voice recorders",[36,134,135,138],{},[29,136,137],{},"Contacts",": Almost nothing needs this. Messaging apps, sure. That random game? No.",[36,140,141,144],{},[29,142,143],{},"Photos",": Set to \"Limited Access\" instead of \"Full Access\" where possible. This lets you choose specific photos to share instead of giving the app your entire library.",[36,146,147,150],{},[29,148,149],{},"Bluetooth",": Many apps request Bluetooth to track your location via beacons, not because they need to connect to devices. If the app doesn't pair with hardware, deny it.",[36,152,153,156],{},[29,154,155],{},"Local Network",": Apps use this to discover devices on your Wi-Fi. Most don't need it. Deny unless it's a casting or smart home app.",[11,158,160],{"id":159},"safari-privacy","Safari Privacy",[16,162,163],{},"If you use Safari (and on iPhone, you should since all browsers use Safari's engine anyway):",[16,165,166],{},[29,167,168],{},"Settings > Apps > Safari",[33,170,171,174,177,180],{},[36,172,173],{},"Turn on \"Prevent Cross-Site Tracking\"",[36,175,176],{},"Turn on \"Hide IP Address\" (set to \"Trackers and Websites\" for maximum privacy, or \"Trackers Only\" if some sites break)",[36,178,179],{},"Turn off \"Privacy Preserving Ad Measurement\" (Apple's alternative to tracking, but it still sends data)",[36,181,182],{},"Set \"Clear History and Website Data\" periodically",[16,184,185],{},[29,186,187],{},"Settings > Apps > Safari > Advanced",[33,189,190,193],{},[36,191,192],{},"Turn on \"Block All Cookies\" if you're willing to log in more often. This breaks some sites but massively reduces tracking.",[36,194,195],{},"Check \"Advanced Tracking and Fingerprinting Protection\" is set to \"All Browsing\"",[11,197,199],{"id":198},"siri-and-dictation","Siri and Dictation",[16,201,202],{},[29,203,204],{},"Settings > Apple Intelligence & Siri",[33,206,207,210],{},[36,208,209],{},"Turn off \"Improve Siri & Dictation.\" This stops Apple from reviewing your Siri audio recordings.",[36,211,212],{},"Delete your Siri & Dictation History",[16,214,215],{},[29,216,217],{},"Settings > Privacy & Security > Analytics & Improvements",[33,219,220],{},[36,221,222],{},"Turn off \"Improve Siri & Dictation\" here too (yes, it's in two places)",[16,224,225],{},"If you don't use Siri, consider disabling it entirely. It's one less thing listening.",[11,227,229],{"id":228},"lock-screen-security","Lock Screen Security",[16,231,232],{},[29,233,234],{},"Settings > Face ID & Passcode",[33,236,237,240],{},[36,238,239],{},"Use a 6-digit or alphanumeric passcode, not 4 digits",[36,241,242,243],{},"Scroll down to \"Allow Access When Locked\" and turn off:\n",[33,244,245,251,257,263,269],{},[36,246,247,250],{},[29,248,249],{},"Notification Center",": Prevents strangers from reading your notifications",[36,252,253,256],{},[29,254,255],{},"Control Center",": Prevents someone from turning on Airplane Mode (which disables Find My)",[36,258,259,262],{},[29,260,261],{},"Wallet",": Prevents unauthorized payments",[36,264,265,268],{},[29,266,267],{},"Reply with Message",": Prevents reading and replying to messages",[36,270,271,274],{},[29,272,273],{},"USB Accessories",": Prevents data extraction tools from connecting when locked",[16,276,277],{},[29,278,279],{},"Settings > Face ID & Passcode > Stolen Device Protection",[33,281,282],{},[36,283,284],{},"Turn this on. It requires biometric authentication for sensitive actions when you're away from familiar locations.",[11,286,288],{"id":287},"icloud-and-data","iCloud and Data",[16,290,291],{},[29,292,293,294,298],{},"Settings > ",[295,296,297],"span",{},"Your Name"," > iCloud",[33,300,301,304],{},[36,302,303],{},"Review what's syncing. Do you need Safari bookmarks, Siri data, and Game Center in the cloud?",[36,305,306,309],{},[29,307,308],{},"Advanced Data Protection",": Turn this ON. This enables end-to-end encryption for iCloud backups, Photos, Notes, and more. Without this, Apple can access your iCloud data if compelled by law enforcement. With it on, not even Apple can access it with keys they control.",[16,311,312,315],{},[29,313,314],{},"Important",": Advanced Data Protection means if you lose your password and recovery key, Apple can't help you recover your data. Set up a recovery contact or save your recovery key somewhere safe.",[11,317,319],{"id":318},"mail-privacy","Mail Privacy",[16,321,322],{},[29,323,324],{},"Settings > Apps > Mail > Privacy Protection",[33,326,327],{},[36,328,329],{},"Turn on \"Protect Mail Activity.\" This prevents email senders from knowing when you opened their email, your IP address, and your location. It works by routing remote content through Apple's servers.",[11,331,333],{"id":332},"notifications","Notifications",[16,335,336],{},[29,337,338],{},"Settings > Notifications",[33,340,341],{},[36,342,343],{},"For sensitive apps (banking, messaging, health), set previews to \"When Unlocked\" instead of \"Always.\" This prevents your notifications from being readable on a locked screen.",[11,345,347],{"id":346},"network-privacy","Network Privacy",[16,349,350],{},[29,351,352],{},"Settings > Wi-Fi",[33,354,355,358],{},[36,356,357],{},"Tap the info button on your current network and make sure \"Private Wi-Fi Address\" is on. This rotates your MAC address so networks can't track your device across visits.",[36,359,360],{},"Also turn on \"Limit IP Address Tracking\" which routes some traffic through Apple's relay servers.",[11,362,364],{"id":363},"analytics","Analytics",[16,366,367,369],{},[29,368,217],{},"\nTurn everything off:",[33,371,372,375,378,381,384],{},[36,373,374],{},"Share iPhone Analytics",[36,376,377],{},"Share iCloud Analytics",[36,379,380],{},"Improve Safety",[36,382,383],{},"Improve Siri & Dictation",[36,385,386],{},"Share with App Developers",[16,388,389],{},"This stuff sends usage data to Apple and third-party developers. There's no benefit to you.",[11,391,393],{"id":392},"app-store-privacy","App Store Privacy",[16,395,396],{},"Before installing apps, scroll down on the App Store listing to \"App Privacy.\" Apple requires developers to disclose what data they collect. Look for \"Data Not Linked to You\" or \"Data Not Collected.\" If an app collects a suspiciously large amount of data for what it does, find an alternative.",[11,398,400],{"id":399},"what-you-cant-control","What You Can't Control",[16,402,403],{},"Even with every setting optimized:",[33,405,406,409,418,421],{},[36,407,408],{},"Your carrier knows your location (any cell tower your phone connects to records it)",[36,410,411,412,417],{},"Apps can still fingerprint your device using screen size, installed fonts, and other signals. Check our ",[413,414,416],"a",{"href":415},"\u002Ftools\u002Fbrowser-fingerprint","browser fingerprint tool"," to see how this works.",[36,419,420],{},"Apple still collects some telemetry even with analytics off (though far less than Google)",[36,422,423],{},"Your ISP sees your DNS queries and traffic volume unless you use a VPN",[16,425,426],{},"No phone is perfectly private. But an iPhone with these settings changed is dramatically better than one running defaults.",{"title":428,"searchDepth":429,"depth":429,"links":430},"",2,[431,432,433,434,435,436,437,438,439,440,441,442,443,444],{"id":13,"depth":429,"text":14},{"id":24,"depth":429,"text":25},{"id":51,"depth":429,"text":52},{"id":109,"depth":429,"text":110},{"id":159,"depth":429,"text":160},{"id":198,"depth":429,"text":199},{"id":228,"depth":429,"text":229},{"id":287,"depth":429,"text":288},{"id":318,"depth":429,"text":319},{"id":332,"depth":429,"text":333},{"id":346,"depth":429,"text":347},{"id":363,"depth":429,"text":364},{"id":392,"depth":429,"text":393},{"id":399,"depth":429,"text":400},"Guide","2026-04-18","Your iPhone has dozens of privacy settings buried in menus you've never opened. Here's every one worth changing.","md","\u002Fimages\u002Fguides\u002Fiphone-privacy.jpg",{},true,"\u002Fguides\u002Fbest-privacy-settings-iphone",12,{"title":5,"description":447},"guides\u002Fbest-privacy-settings-iphone","vKR06HEosI0ovvfKoGSSsrqYdV2hcj4nTkOe2Zlgcmw",[458,781,1086,1557,2006],{"id":459,"title":460,"author":6,"body":461,"category":445,"date":772,"description":773,"extension":448,"image":774,"meta":775,"navigation":451,"path":776,"readTime":777,"seo":778,"stem":779,"__hash__":780},"guides\u002Fguides\u002Fstop-google-tracking-you.md","How to Stop Google Tracking You",{"type":8,"value":462,"toc":760},[463,467,470,473,477,487,496,500,508,534,537,541,544,565,576,580,583,615,619,622,633,637,640,645,670,673,677,680,700,704,707,731,734,738,741,757],[11,464,466],{"id":465},"the-problem","The Problem",[16,468,469],{},"Google tracks your searches, location history, YouTube watches, voice recordings, app usage, and browsing activity. All of this feeds into an advertising profile that follows you everywhere.",[16,471,472],{},"The good news: you can turn most of it off. The bad news: Google makes it deliberately confusing. This guide walks through every setting that matters.",[11,474,476],{"id":475},"step-1-check-what-google-already-has-on-you","Step 1: Check What Google Already Has on You",[16,478,479,480,486],{},"Go to ",[413,481,485],{"href":482,"rel":483},"https:\u002F\u002Fmyactivity.google.com",[484],"nofollow","myactivity.google.com",". This is everything Google has recorded. Searches, voice commands, places you've been, videos you've watched. Scroll through it. Take a moment to review what's there.",[16,488,489,490,495],{},"Now go to ",[413,491,494],{"href":492,"rel":493},"https:\u002F\u002Fadssettings.google.com",[484],"adssettings.google.com",". This is the advertising profile Google built from all that data. Your age, interests, income bracket, relationship status. Some of it is surprisingly detailed. Some of it is hilariously wrong. All of it is monetized through targeted advertising.",[11,497,499],{"id":498},"step-2-nuke-your-activity-controls","Step 2: Nuke Your Activity Controls",[16,501,479,502,507],{},[413,503,506],{"href":504,"rel":505},"https:\u002F\u002Fmyaccount.google.com\u002Factivitycontrols",[484],"myaccount.google.com\u002Factivitycontrols"," and turn off:",[33,509,510,516,522,528],{},[36,511,512,515],{},[29,513,514],{},"Web & App Activity",": This is the big one. It tracks everything you do across Google services and any site using Google ads or analytics (which is most of the internet). Turn it off. Also uncheck \"Include Chrome history and activity from sites, apps, and devices that use Google services.\"",[36,517,518,521],{},[29,519,520],{},"Location History",": Tracks everywhere your phone goes. Turn it off. Note: Google still collects \"approximate location\" from your IP even with this off, but it stops the detailed GPS timeline.",[36,523,524,527],{},[29,525,526],{},"YouTube History",": Every video you watch and search for. Turn it off if you want. This will make your recommendations worse, which is arguably a feature.",[36,529,530,533],{},[29,531,532],{},"Ad Personalization",": Turn it off. Your ads will become generic instead of eerily specific. This is a win.",[16,535,536],{},"After turning these off, click \"Delete activity\" on each one and choose \"All time.\"",[11,538,540],{"id":539},"step-3-fix-chrome-or-better-yet-ditch-it","Step 3: Fix Chrome (or Better Yet, Ditch It)",[16,542,543],{},"Chrome is a Google product. It's fast, but it's also a tracking machine. If you insist on using it:",[545,546,547,550,553,556,559,562],"ol",{},[36,548,549],{},"Go to Settings > Privacy and Security",[36,551,552],{},"Turn off \"Help improve Chrome's features and performance\" (sends usage data to Google)",[36,554,555],{},"Turn off \"Make searches and browsing better\" (sends URLs to Google)",[36,557,558],{},"Set third-party cookies to \"Block third-party cookies\"",[36,560,561],{},"Turn on \"Send a 'Do Not Track' request\" (mostly ignored, but costs you nothing)",[36,563,564],{},"Turn off \"Improve search suggestions\" (sends everything you type in the address bar to Google in real time)",[16,566,567,570,571,575],{},[29,568,569],{},"Better option",": Switch to Firefox or Brave. Both are Chromium-compatible (your extensions still work on Brave) and don't phone home to Google. Check our ",[413,572,574],{"href":573},"\u002Fcompare\u002Fbrowsers","browser comparison"," for a detailed breakdown.",[11,577,579],{"id":578},"step-4-lock-down-android","Step 4: Lock Down Android",[16,581,582],{},"If you're on Android, Google is baked into the OS. You can't fully escape it without switching to a custom ROM (which most people won't do), but you can limit the damage:",[545,584,585,591,597,603,609],{},[36,586,587,590],{},[29,588,589],{},"Settings > Privacy > Permission Manager",": Review which apps have access to your location, camera, mic, contacts. Revoke anything that doesn't need it. That flashlight app does not need your contacts.",[36,592,593,596],{},[29,594,595],{},"Settings > Privacy > Ads",": Delete your advertising ID and opt out of ad personalization.",[36,598,599,602],{},[29,600,601],{},"Settings > Location",": Turn off location for any app that doesn't genuinely need it. Set the rest to \"Only while using the app\" instead of \"Always.\"",[36,604,605,608],{},[29,606,607],{},"Settings > Google > Manage your Google Account",": This takes you to the same activity controls from Step 2. Make sure they're off here too.",[36,610,611,614],{},[29,612,613],{},"Google Play Store > Settings > General",": Turn off \"User controls\" and opt out of data sharing.",[11,616,618],{"id":617},"step-5-handle-google-maps","Step 5: Handle Google Maps",[16,620,621],{},"Google Maps is hard to replace because it's genuinely the best mapping app. But you can use it without feeding Google your entire travel history.",[545,623,624,627,630],{},[36,625,626],{},"Open Maps > tap your profile picture > Settings > Maps history > turn off",[36,628,629],{},"Use Maps without signing in (you can still search and navigate)",[36,631,632],{},"For walking directions and simple lookups, try OpenStreetMap-based alternatives like OsmAnd or Organic Maps",[11,634,636],{"id":635},"step-6-search-without-google","Step 6: Search Without Google",[16,638,639],{},"This is the easiest switch with the biggest impact. Your search history is one of the most revealing datasets about you.",[16,641,642],{},[29,643,644],{},"Alternatives that actually work:",[33,646,647,658,664],{},[36,648,649,652,653,657],{},[29,650,651],{},"DuckDuckGo",": Doesn't track searches, good enough for 90% of queries. Add ",[654,655,656],"code",{},"!g"," to any search to fall back to Google when you need it.",[36,659,660,663],{},[29,661,662],{},"Startpage",": Uses Google's results but strips out the tracking. Best of both worlds.",[36,665,666,669],{},[29,667,668],{},"Brave Search",": Fully independent index, no Google dependency.",[16,671,672],{},"Set your default search engine in your browser settings. You'll forget you switched within a week.",[11,674,676],{"id":675},"step-7-limit-youtube-tracking","Step 7: Limit YouTube Tracking",[16,678,679],{},"If you still use YouTube (and let's be honest, you do):",[545,681,682,685,694,697],{},[36,683,684],{},"Watch in a private\u002Fincognito window when you don't want something in your history",[36,686,687,688,693],{},"Use ",[413,689,692],{"href":690,"rel":691},"https:\u002F\u002Ffreetubeapp.io\u002F",[484],"FreeTube"," on desktop for a privacy-respecting YouTube client",[36,695,696],{},"On mobile, NewPipe (Android) lets you watch without a Google account",[36,698,699],{},"If you must use the official app: Settings > History & privacy > Pause watch history and Pause search history",[11,701,703],{"id":702},"the-nuclear-option","The Nuclear Option",[16,705,706],{},"If you want to go all the way:",[545,708,709,717,725,728],{},[36,710,711,712],{},"Download all your data from ",[413,713,716],{"href":714,"rel":715},"https:\u002F\u002Ftakeout.google.com",[484],"takeout.google.com",[36,718,719,720,724],{},"Switch to a privacy-respecting email provider (see our ",[413,721,723],{"href":722},"\u002Fcompare\u002Femail-providers","email comparison",")",[36,726,727],{},"Move your files from Google Drive to a local or encrypted cloud solution",[36,729,730],{},"Delete your Google account entirely",[16,732,733],{},"This is extreme and most people won't do it. But everything from Step 1 through Step 6 takes about 15 minutes and dramatically reduces what Google knows about you going forward.",[11,735,737],{"id":736},"what-this-wont-fix","What This Won't Fix",[16,739,740],{},"Be honest about the limitations:",[33,742,743,746,749],{},[36,744,745],{},"If you use Gmail, Google can still read your emails (they scan for spam and smart replies)",[36,747,748],{},"Websites using Google Analytics and Google Ads still report your visits back to Google, even if you opted out of personalization. Use an ad blocker like uBlock Origin to stop this.",[36,750,751,752,756],{},"Google can still link your activity through your IP address even without cookies. A VPN helps here. Check our ",[413,753,755],{"href":754},"\u002Fcompare\u002Fvpns","VPN comparison"," if you're shopping for one.",[16,758,759],{},"Privacy isn't all-or-nothing. Every setting you change is one less data point in their profile.",{"title":428,"searchDepth":429,"depth":429,"links":761},[762,763,764,765,766,767,768,769,770,771],{"id":465,"depth":429,"text":466},{"id":475,"depth":429,"text":476},{"id":498,"depth":429,"text":499},{"id":539,"depth":429,"text":540},{"id":578,"depth":429,"text":579},{"id":617,"depth":429,"text":618},{"id":635,"depth":429,"text":636},{"id":675,"depth":429,"text":676},{"id":702,"depth":429,"text":703},{"id":736,"depth":429,"text":737},"2026-04-19","Google knows more about you than your closest friends. Here's how to shut it down across Search, Chrome, Android, YouTube, and Maps.","\u002Fimages\u002Fguides\u002Fgoogle-tracking.jpg",{},"\u002Fguides\u002Fstop-google-tracking-you",10,{"title":460,"description":773},"guides\u002Fstop-google-tracking-you","5Y6lgIr7gr77DeCXVkZ_84rH3BcImg5d4aZDLwRWpCg",{"id":4,"title":5,"author":6,"body":782,"category":445,"date":446,"description":447,"extension":448,"image":449,"meta":1084,"navigation":451,"path":452,"readTime":453,"seo":1085,"stem":455,"__hash__":456},{"type":8,"value":783,"toc":1068},[784,786,788,790,792,796,800,804,808,810,814,816,844,848,850,854,856,882,884,886,890,900,904,910,912,916,922,926,930,932,934,938,966,970,974,976,982,990,994,996,1000,1004,1006,1010,1014,1016,1020,1026,1028,1032,1044,1046,1048,1050,1052,1054,1066],[11,785,14],{"id":13},[16,787,18],{},[16,789,21],{},[11,791,25],{"id":24},[16,793,794],{},[29,795,31],{},[33,797,798],{},[36,799,38],{},[16,801,802],{},[29,803,43],{},[33,805,806],{},[36,807,48],{},[11,809,52],{"id":51},[16,811,812],{},[29,813,57],{},[16,815,60],{},[33,817,818,820,822,842],{},[36,819,65],{},[36,821,68],{},[36,823,71,824],{},[33,825,826,830,834,838],{},[36,827,828,79],{},[29,829,78],{},[36,831,832,85],{},[29,833,84],{},[36,835,836,91],{},[29,837,90],{},[36,839,840,97],{},[29,841,96],{},[36,843,100],{},[16,845,846,106],{},[29,847,105],{},[11,849,110],{"id":109},[16,851,852],{},[29,853,115],{},[16,855,118],{},[33,857,858,862,866,870,874,878],{},[36,859,860,126],{},[29,861,125],{},[36,863,864,132],{},[29,865,131],{},[36,867,868,138],{},[29,869,137],{},[36,871,872,144],{},[29,873,143],{},[36,875,876,150],{},[29,877,149],{},[36,879,880,156],{},[29,881,155],{},[11,883,160],{"id":159},[16,885,163],{},[16,887,888],{},[29,889,168],{},[33,891,892,894,896,898],{},[36,893,173],{},[36,895,176],{},[36,897,179],{},[36,899,182],{},[16,901,902],{},[29,903,187],{},[33,905,906,908],{},[36,907,192],{},[36,909,195],{},[11,911,199],{"id":198},[16,913,914],{},[29,915,204],{},[33,917,918,920],{},[36,919,209],{},[36,921,212],{},[16,923,924],{},[29,925,217],{},[33,927,928],{},[36,929,222],{},[16,931,225],{},[11,933,229],{"id":228},[16,935,936],{},[29,937,234],{},[33,939,940,942],{},[36,941,239],{},[36,943,242,944],{},[33,945,946,950,954,958,962],{},[36,947,948,250],{},[29,949,249],{},[36,951,952,256],{},[29,953,255],{},[36,955,956,262],{},[29,957,261],{},[36,959,960,268],{},[29,961,267],{},[36,963,964,274],{},[29,965,273],{},[16,967,968],{},[29,969,279],{},[33,971,972],{},[36,973,284],{},[11,975,288],{"id":287},[16,977,978],{},[29,979,293,980,298],{},[295,981,297],{},[33,983,984,986],{},[36,985,303],{},[36,987,988,309],{},[29,989,308],{},[16,991,992,315],{},[29,993,314],{},[11,995,319],{"id":318},[16,997,998],{},[29,999,324],{},[33,1001,1002],{},[36,1003,329],{},[11,1005,333],{"id":332},[16,1007,1008],{},[29,1009,338],{},[33,1011,1012],{},[36,1013,343],{},[11,1015,347],{"id":346},[16,1017,1018],{},[29,1019,352],{},[33,1021,1022,1024],{},[36,1023,357],{},[36,1025,360],{},[11,1027,364],{"id":363},[16,1029,1030,369],{},[29,1031,217],{},[33,1033,1034,1036,1038,1040,1042],{},[36,1035,374],{},[36,1037,377],{},[36,1039,380],{},[36,1041,383],{},[36,1043,386],{},[16,1045,389],{},[11,1047,393],{"id":392},[16,1049,396],{},[11,1051,400],{"id":399},[16,1053,403],{},[33,1055,1056,1058,1062,1064],{},[36,1057,408],{},[36,1059,411,1060,417],{},[413,1061,416],{"href":415},[36,1063,420],{},[36,1065,423],{},[16,1067,426],{},{"title":428,"searchDepth":429,"depth":429,"links":1069},[1070,1071,1072,1073,1074,1075,1076,1077,1078,1079,1080,1081,1082,1083],{"id":13,"depth":429,"text":14},{"id":24,"depth":429,"text":25},{"id":51,"depth":429,"text":52},{"id":109,"depth":429,"text":110},{"id":159,"depth":429,"text":160},{"id":198,"depth":429,"text":199},{"id":228,"depth":429,"text":229},{"id":287,"depth":429,"text":288},{"id":318,"depth":429,"text":319},{"id":332,"depth":429,"text":333},{"id":346,"depth":429,"text":347},{"id":363,"depth":429,"text":364},{"id":392,"depth":429,"text":393},{"id":399,"depth":429,"text":400},{},{"title":5,"description":447},{"id":1087,"title":1088,"author":6,"body":1089,"category":445,"date":1549,"description":1550,"extension":448,"image":1551,"meta":1552,"navigation":451,"path":1553,"readTime":453,"seo":1554,"stem":1555,"__hash__":1556},"guides\u002Fguides\u002Fbest-privacy-settings-android.md","Best Privacy Settings for Android",{"type":8,"value":1090,"toc":1533},[1091,1095,1098,1101,1105,1108,1114,1137,1144,1148,1152,1155,1198,1208,1212,1216,1224,1228,1232,1258,1262,1267,1292,1297,1305,1309,1312,1317,1337,1345,1349,1352,1372,1376,1381,1392,1397,1405,1409,1414,1419,1424,1438,1440,1452,1456,1461,1466,1471,1476,1480,1483,1509,1513,1516,1530],[11,1092,1094],{"id":1093},"the-reality","The Reality",[16,1096,1097],{},"Android is made by Google. It's an operating system built by an advertising company. That doesn't mean you can't use it privately, but it does mean the defaults are configured to enable broad data collection. Every toggle that's on by default is on for Google's benefit, not yours.",[16,1099,1100],{},"This guide goes through every setting worth changing. Most of these work on stock Android, Samsung, and Pixel devices. Menu names might be slightly different on your phone, but the options are the same.",[11,1102,1104],{"id":1103},"google-account-settings","Google Account Settings",[16,1106,1107],{},"Before touching your phone settings, lock down your Google account. This is where the most invasive tracking lives.",[16,1109,1110,1111,507],{},"Open ",[29,1112,1113],{},"Settings > Google > Manage your Google Account > Data & Privacy",[33,1115,1116,1121,1127,1132],{},[36,1117,1118,1120],{},[29,1119,514],{},": Tracks every Google search, Maps lookup, Assistant command, and website you visit through Chrome. Turn it off. Tap \"Delete activity\" and select \"All time.\"",[36,1122,1123,1126],{},[29,1124,1125],{},"Location History (Timeline)",": Records everywhere your phone goes with GPS precision. Turn it off and delete all history.",[36,1128,1129,1131],{},[29,1130,526],{},": Logs every video you watch and search for. Turn it off.",[36,1133,1134,1136],{},[29,1135,532],{},": Builds an advertising profile from everything above. Turn it off.",[16,1138,1139,1140,1143],{},"This is the same stuff from our ",[413,1141,1142],{"href":776},"Google tracking guide",", but it's worth repeating because it's the single highest-impact change.",[11,1145,1147],{"id":1146},"permissions-audit","Permissions Audit",[16,1149,1150],{},[29,1151,589],{},[16,1153,1154],{},"Go through each permission category:",[33,1156,1157,1163,1169,1174,1180,1186,1192],{},[36,1158,1159,1162],{},[29,1160,1161],{},"Location",": Set everything to \"Allow only while using the app\" or \"Deny.\" The only apps that legitimately need \"Allow all the time\" are navigation apps running in the background. That weather widget? \"While using\" is fine.",[36,1164,1165,1168],{},[29,1166,1167],{},"Camera & Microphone",": Only messaging, video calling, and camera apps. Revoke everything else.",[36,1170,1171,1173],{},[29,1172,137],{},": Messaging apps and your phone dialer. That's it.",[36,1175,1176,1179],{},[29,1177,1178],{},"Phone",": Some apps request this to read your phone number or call state. Most don't need it.",[36,1181,1182,1185],{},[29,1183,1184],{},"Files and Media",": Only file managers, photo editors, and media players. If a game wants access to your files, that's a red flag.",[36,1187,1188,1191],{},[29,1189,1190],{},"Nearby Devices",": Used for Bluetooth and local connections. Deny for anything that doesn't connect to hardware.",[36,1193,1194,1197],{},[29,1195,1196],{},"Body Sensors",": Only fitness apps.",[16,1199,1200,1203,1204,1207],{},[29,1201,1202],{},"Pro tip",": On Android 12+, go to ",[29,1205,1206],{},"Settings > Privacy > Privacy Dashboard",". This shows a timeline of which apps accessed your camera, microphone, and location in the last 24 hours. Check it occasionally. You'll catch apps misbehaving.",[11,1209,1211],{"id":1210},"advertising-id","Advertising ID",[16,1213,1214],{},[29,1215,595],{},[33,1217,1218,1221],{},[36,1219,1220],{},"Tap \"Delete advertising ID.\" This removes the unique identifier that apps use to track you across different services and build advertising profiles.",[36,1222,1223],{},"On older Android versions, this might say \"Opt out of Ads Personalization\" and \"Reset advertising ID.\" Do both.",[11,1225,1227],{"id":1226},"location-settings","Location Settings",[16,1229,1230],{},[29,1231,601],{},[33,1233,1234,1245,1251],{},[36,1235,1236,1237,1240,1241,1244],{},"Turn off ",[29,1238,1239],{},"Wi-Fi scanning"," and ",[29,1242,1243],{},"Bluetooth scanning"," (under \"Location services\" or \"Improve accuracy\"). These let Google and apps scan for nearby Wi-Fi networks and Bluetooth beacons to determine your location even when Wi-Fi and Bluetooth are \"off.\" Most people don't know this exists.",[36,1246,1236,1247,1250],{},[29,1248,1249],{},"Google Location Accuracy"," (also called \"Improve location accuracy\"). This sends Wi-Fi, cell tower, and sensor data to Google. Your GPS still works without it.",[36,1252,1253,1254,1257],{},"Review ",[29,1255,1256],{},"Recent location requests"," to see which apps are actively using your location.",[11,1259,1261],{"id":1260},"network-and-connectivity","Network and Connectivity",[16,1263,1264],{},[29,1265,1266],{},"Settings > Network & Internet",[33,1268,1269,1283],{},[36,1270,1271,1274,1275,1278,1279,1282],{},[29,1272,1273],{},"Private DNS",": Set to a privacy-respecting DNS provider. Tap \"Private DNS provider hostname\" and enter ",[654,1276,1277],{},"dns.quad9.net"," or ",[654,1280,1281],{},"one.one.one.one",". This encrypts your DNS queries so your ISP can't see which websites you visit.",[36,1284,1285,1288,1289,1291],{},[29,1286,1287],{},"VPN",": If you use a VPN, turn on \"Always-on VPN\" and \"Block connections without VPN\" (kill switch). Check our ",[413,1290,755],{"href":754}," for recommendations.",[16,1293,1294],{},[29,1295,1296],{},"Wi-Fi settings:",[33,1298,1299,1302],{},[36,1300,1301],{},"Make sure \"Randomized MAC\" is enabled for each network you connect to. This prevents Wi-Fi networks from tracking your device's hardware address across visits.",[36,1303,1304],{},"Turn off \"Wi-Fi auto-connect\" for open networks. Your phone shouldn't auto-join random coffee shop Wi-Fi.",[11,1306,1308],{"id":1307},"google-chrome-or-why-you-should-switch","Google Chrome (or Why You Should Switch)",[16,1310,1311],{},"Chrome on Android sends a lot of data back to Google. If you must use it:",[16,1313,1314],{},[29,1315,1316],{},"Chrome > Settings > Privacy and Security:",[33,1318,1319,1322,1325,1328,1331,1334],{},[36,1320,1321],{},"Turn off \"Help improve Chrome\" (sends usage data)",[36,1323,1324],{},"Turn off \"Make searches and browsing better\" (sends URLs in real-time)",[36,1326,1327],{},"Turn off \"Access payment methods\" (shares with websites)",[36,1329,1330],{},"Block third-party cookies",[36,1332,1333],{},"Turn on \"Send a 'Do Not Track' request\"",[36,1335,1336],{},"Turn on \"Always use secure connections\" (forces HTTPS)",[16,1338,1339,1341,1342,1344],{},[29,1340,569],{},": Switch to Firefox or Brave. Unlike iOS, Android lets you use actual different browser engines. Firefox with uBlock Origin is the one of the strongest privacy setups on mobile. Check our ",[413,1343,574],{"href":573},".",[11,1346,1348],{"id":1347},"samsung-specific-settings","Samsung-Specific Settings",[16,1350,1351],{},"If you're on a Samsung phone, there's extra tracking to disable:",[33,1353,1354,1360,1366],{},[36,1355,1356,1359],{},[29,1357,1358],{},"Settings > Privacy > Customization Service",": Turn this off. Samsung tracks your app usage, contacts, and Calendar to \"personalize\" their apps. It's Samsung's version of what Google does.",[36,1361,1362,1365],{},[29,1363,1364],{},"Settings > Privacy > Samsung Analytics",": Turn off sending diagnostic data.",[36,1367,1368,1371],{},[29,1369,1370],{},"Galaxy Store > Menu > Settings",": Turn off \"Personalized recommendations.\"",[11,1373,1375],{"id":1374},"lock-screen-and-security","Lock Screen and Security",[16,1377,1378],{},[29,1379,1380],{},"Settings > Security",[33,1382,1383,1386,1389],{},[36,1384,1385],{},"Use a PIN of at least 6 digits or an alphanumeric password. Avoid pattern locks (they're easy to shoulder-surf and leave smudge traces).",[36,1387,1388],{},"Turn on biometric unlock (fingerprint or face) for convenience, but know that a PIN\u002Fpassword is legally stronger. In many jurisdictions, you can be compelled to provide biometrics but not passwords.",[36,1390,1391],{},"Set auto-lock to 30 seconds or 1 minute.",[16,1393,1394],{},[29,1395,1396],{},"Settings > Lock Screen",[33,1398,1399,1402],{},[36,1400,1401],{},"Set notifications to \"Hide content\" or \"Show alerting notifications only.\" This prevents your messages from being readable when your phone is on a table.",[36,1403,1404],{},"Turn off lock screen widgets and shortcuts that show personal info.",[11,1406,1408],{"id":1407},"app-installation","App Installation",[16,1410,1411],{},[29,1412,1413],{},"Settings > Apps > Special Access > Install Unknown Apps",[33,1415,1416],{},[36,1417,1418],{},"Make sure no app has permission to install from unknown sources (unless you specifically need it for F-Droid or similar). This prevents apps from silently installing other apps.",[16,1420,1421],{},[29,1422,1423],{},"Google Play Store",[33,1425,1426,1432],{},[36,1427,1428,1431],{},[29,1429,1430],{},"Settings > General > App install optimization",": Turn this off. It shares data with Google about your app installations.",[36,1433,1434,1437],{},[29,1435,1436],{},"Play Protect",": Keep this on. It scans for malware. This is one Google feature that's genuinely worth having.",[11,1439,333],{"id":332},[33,1441,1442],{},[36,1443,1444,1445,1451],{},"For sensitive apps (banking, messaging, health), go to ",[29,1446,1447,1448],{},"Settings > Notifications > ",[295,1449,1450],{},"App"," and turn off lock screen previews. Set to \"Show silently\" or \"Alerting\" without content.",[11,1453,1455],{"id":1454},"analytics-and-diagnostics","Analytics and Diagnostics",[16,1457,1458],{},[29,1459,1460],{},"Settings > Privacy > Usage & Diagnostics",[33,1462,1463],{},[36,1464,1465],{},"Turn this off. It sends detailed device usage data to Google.",[16,1467,1468],{},[29,1469,1470],{},"Settings > Google > Ads",[33,1472,1473],{},[36,1474,1475],{},"We covered this above, but double-check it's done.",[11,1477,1479],{"id":1478},"the-nuclear-options","The Nuclear Options",[16,1481,1482],{},"If you want to go further:",[33,1484,1485,1491,1497,1503],{},[36,1486,1487,1490],{},[29,1488,1489],{},"Use F-Droid"," instead of the Play Store for open-source apps. No tracking, no Google account needed.",[36,1492,1493,1496],{},[29,1494,1495],{},"Install a custom ROM"," like GrapheneOS (Pixel phones only) or LineageOS. These strip out Google entirely. GrapheneOS in particular is considered widely regarded as one of the most secure Android distributions.",[36,1498,1499,1502],{},[29,1500,1501],{},"Use Shelter or Island"," to create a work profile that isolates apps from your personal data. Run social media apps in the work profile so they can't access your contacts, photos, or main account.",[36,1504,1505,1508],{},[29,1506,1507],{},"Disable Google Play Services entirely"," if you're comfortable troubleshooting. This breaks some apps (notifications, Google Pay, some login systems) but eliminates Google's deepest integration point.",[11,1510,1512],{"id":1511},"what-you-cant-fully-escape","What You Can't Fully Escape",[16,1514,1515],{},"Even with perfect settings:",[33,1517,1518,1521,1524,1527],{},[36,1519,1520],{},"Your mobile carrier tracks your location through cell towers. There's no way around this while your phone has service.",[36,1522,1523],{},"Google Play Services runs in the background and communicates with Google periodically even with most settings off.",[36,1525,1526],{},"Many apps include Google's Firebase SDK, which sends analytics regardless of your phone settings. An ad blocker or Pi-hole can help here.",[36,1528,1529],{},"Your phone's IMEI is a permanent hardware identifier that carriers log.",[16,1531,1532],{},"Stock Android is unlikely to match the privacy of a de-Googled phone running GrapheneOS. But an Android phone with these settings changed is dramatically better than one running defaults.",{"title":428,"searchDepth":429,"depth":429,"links":1534},[1535,1536,1537,1538,1539,1540,1541,1542,1543,1544,1545,1546,1547,1548],{"id":1093,"depth":429,"text":1094},{"id":1103,"depth":429,"text":1104},{"id":1146,"depth":429,"text":1147},{"id":1210,"depth":429,"text":1211},{"id":1226,"depth":429,"text":1227},{"id":1260,"depth":429,"text":1261},{"id":1307,"depth":429,"text":1308},{"id":1347,"depth":429,"text":1348},{"id":1374,"depth":429,"text":1375},{"id":1407,"depth":429,"text":1408},{"id":332,"depth":429,"text":333},{"id":1454,"depth":429,"text":1455},{"id":1478,"depth":429,"text":1479},{"id":1511,"depth":429,"text":1512},"2026-04-17","Android phones are Google's biggest data pipeline. Here's how to tighten every setting without breaking anything.","\u002Fimages\u002Fguides\u002Fandroid-privacy.jpg",{},"\u002Fguides\u002Fbest-privacy-settings-android",{"title":1088,"description":1550},"guides\u002Fbest-privacy-settings-android","k3tuKcZHQ71Cz-YO_BAOFCQIV5JmVKCcYn8UWV1VZK0",{"id":1558,"title":1559,"author":6,"body":1560,"category":445,"date":1997,"description":1998,"extension":448,"image":1999,"meta":2000,"navigation":451,"path":2001,"readTime":2002,"seo":2003,"stem":2004,"__hash__":2005},"guides\u002Fguides\u002Fhow-to-know-if-youve-been-hacked.md","How to Know If You've Been Hacked",{"type":8,"value":1561,"toc":1975},[1562,1566,1569,1572,1576,1581,1613,1617,1649,1653,1667,1671,1675,1683,1695,1699,1702,1707,1742,1746,1749,1766,1770,1789,1793,1797,1827,1831,1857,1861,1887,1891,1933,1937,1940,1972],[11,1563,1565],{"id":1564},"dont-panic-but-do-pay-attention","Don't Panic (But Do Pay Attention)",[16,1567,1568],{},"\"Have I been hacked?\" is one of the most common questions in internet security. The answer is usually no. A slow computer is usually just a slow computer. But sometimes the signs are real, and catching a breach early is the difference between a minor inconvenience and identity theft.",[16,1570,1571],{},"Here's how to actually tell, and what to do if the answer is yes.",[11,1573,1575],{"id":1574},"signs-you-might-be-hacked","Signs You Might Be Hacked",[1577,1578,1580],"h3",{"id":1579},"your-accounts","Your Accounts",[33,1582,1583,1589,1595,1601,1607],{},[36,1584,1585,1588],{},[29,1586,1587],{},"Password reset emails you didn't request",": Someone is trying to get into your accounts. This is the most common early warning sign.",[36,1590,1591,1594],{},[29,1592,1593],{},"\"New login from unknown device\" alerts",": Check the location and device. If it's not yours, someone else is in.",[36,1596,1597,1600],{},[29,1598,1599],{},"You're locked out of an account",": If your password suddenly stops working and the recovery email has been changed, someone took over.",[36,1602,1603,1606],{},[29,1604,1605],{},"Sent messages or emails you didn't write",": Check your email's \"Sent\" folder and your social media outbox. Hackers often use compromised accounts to spam your contacts.",[36,1608,1609,1612],{},[29,1610,1611],{},"Friends say they got a weird message from you",": Classic sign of account compromise.",[1577,1614,1616],{"id":1615},"your-devices","Your Devices",[33,1618,1619,1625,1631,1637,1643],{},[36,1620,1621,1624],{},[29,1622,1623],{},"Unfamiliar apps you didn't install",": On your phone, check your app list. On your computer, check installed programs.",[36,1626,1627,1630],{},[29,1628,1629],{},"Battery draining unusually fast",": Malware running in the background burns power. This alone isn't proof (batteries degrade), but combined with other signs, it's a red flag.",[36,1632,1633,1636],{},[29,1634,1635],{},"Data usage spikes",": If your mobile data usage suddenly jumped without you changing habits, something might be phoning home.",[36,1638,1639,1642],{},[29,1640,1641],{},"Your camera or microphone indicator turns on randomly",": Modern phones and laptops show when the camera or mic is active. If it activates when you're not using it, that's bad.",[36,1644,1645,1648],{},[29,1646,1647],{},"Unfamiliar browser extensions",": Check your browser's extension list. Malicious extensions can redirect searches, inject ads, and steal passwords.",[1577,1650,1652],{"id":1651},"your-finances","Your Finances",[33,1654,1655,1661],{},[36,1656,1657,1660],{},[29,1658,1659],{},"Charges you don't recognize",": Even small ones. Fraudsters often test stolen cards with tiny purchases before going big.",[36,1662,1663,1666],{},[29,1664,1665],{},"New accounts you didn't open",": Check your credit report. New credit cards or loans in your name are a sign of identity theft, not just hacking.",[11,1668,1670],{"id":1669},"how-to-check-for-real","How to Check for Real",[1577,1672,1674],{"id":1673},"step-1-check-your-email-in-breach-databases","Step 1: Check Your Email in Breach Databases",[16,1676,479,1677,1682],{},[413,1678,1681],{"href":1679,"rel":1680},"https:\u002F\u002Fhaveibeenpwned.com",[484],"haveibeenpwned.com"," and enter your email address. This tells you which data breaches included your email and password. If your email shows up (and it almost certainly will), check which breaches exposed passwords and change those passwords immediately.",[16,1684,1685,1686,1690,1691,1694],{},"You can also use our ",[413,1687,1689],{"href":1688},"\u002Ftools\u002Fip-check","IP Address Check"," to see what's currently visible about your connection, and our ",[413,1692,1693],{"href":415},"Browser Fingerprint"," tool to understand how trackable your browser is.",[1577,1696,1698],{"id":1697},"step-2-review-active-sessions","Step 2: Review Active Sessions",[16,1700,1701],{},"For every important account (email, social media, banking), go into settings and find \"Active sessions,\" \"Security,\" or \"Where you're logged in.\" Sign out of everything you don't recognize.",[16,1703,1704],{},[29,1705,1706],{},"Where to find this:",[33,1708,1709,1715,1724,1730,1736],{},[36,1710,1711,1714],{},[29,1712,1713],{},"Google",": myaccount.google.com > Security > Your devices",[36,1716,1717,1720,1721,1723],{},[29,1718,1719],{},"Apple",": Settings > ",[295,1722,297],{}," > scroll down to see all signed-in devices",[36,1725,1726,1729],{},[29,1727,1728],{},"Facebook",": Settings > Security and login > Where you're logged in",[36,1731,1732,1735],{},[29,1733,1734],{},"Instagram",": Settings > Security > Login activity",[36,1737,1738,1741],{},[29,1739,1740],{},"X\u002FTwitter",": Settings > Security and account access > Apps and sessions",[1577,1743,1745],{"id":1744},"step-3-check-email-forwarding-rules","Step 3: Check Email Forwarding Rules",[16,1747,1748],{},"This is sneaky and often missed. Hackers sometimes add a forwarding rule to your email so they get a copy of everything, even after you change your password.",[33,1750,1751,1757,1763],{},[36,1752,1753,1756],{},[29,1754,1755],{},"Gmail",": Settings > Forwarding and POP\u002FIMAP > Check that no forwarding address is set",[36,1758,1759,1762],{},[29,1760,1761],{},"Outlook",": Settings > Mail > Forwarding > Make sure it's off",[36,1764,1765],{},"Also check email filters\u002Frules for anything that auto-deletes or redirects messages",[1577,1767,1769],{"id":1768},"step-4-scan-your-devices","Step 4: Scan Your Devices",[33,1771,1772,1778,1784],{},[36,1773,1774,1777],{},[29,1775,1776],{},"Windows",": Run a full scan with Windows Defender (it's genuinely good now) or Malwarebytes",[36,1779,1780,1783],{},[29,1781,1782],{},"Mac",": Malwarebytes for Mac catches most things. Also check System Settings > General > Login Items for anything you don't recognize",[36,1785,1786,1788],{},[29,1787,1178],{},": On Android, make sure Google Play Protect is running (Play Store > Play Protect). On iPhone, malware is rare but check for unknown configuration profiles (Settings > General > VPN & Device Management)",[11,1790,1792],{"id":1791},"what-to-do-if-youve-been-hacked","What to Do If You've Been Hacked",[1577,1794,1796],{"id":1795},"immediate-steps-do-these-first","Immediate Steps (Do These First)",[545,1798,1799,1809,1815,1821],{},[36,1800,1801,1804,1805,1344],{},[29,1802,1803],{},"Change your passwords",": Start with your email (that's the master key to everything else), then banking, then social media. Use unique, strong passwords. Now is the time to get a password manager if you don't have one. Check our ",[413,1806,1808],{"href":1807},"\u002Fcompare\u002Fpassword-managers","password manager comparison",[36,1810,1811,1814],{},[29,1812,1813],{},"Enable two-factor authentication",": On every account that supports it. Use an authenticator app (not SMS, SIM swapping is real). TOTP apps like Aegis (Android) or Raivo (iOS) work great.",[36,1816,1817,1820],{},[29,1818,1819],{},"Revoke connected apps",": Go into each account's settings and remove any third-party apps or OAuth connections you don't recognize or use. That random quiz app you authorized on Facebook three years ago? Kill it.",[36,1822,1823,1826],{},[29,1824,1825],{},"Check recovery settings",": Make sure your recovery email and phone number are still yours. Hackers often change these so they can get back in even after you change your password.",[1577,1828,1830],{"id":1829},"if-your-device-is-compromised","If Your Device Is Compromised",[545,1832,1833,1839,1845,1851],{},[36,1834,1835,1838],{},[29,1836,1837],{},"Disconnect from the internet",": If you suspect active malware, go offline first to stop data from being sent out.",[36,1840,1841,1844],{},[29,1842,1843],{},"Back up your important files"," to a clean USB drive (documents, photos, not applications)",[36,1846,1847,1850],{},[29,1848,1849],{},"Factory reset the device",": This is the most reliable way to remove malware. Yes, it's annoying. No, there's no shortcut.",[36,1852,1853,1856],{},[29,1854,1855],{},"Reinstall from scratch",": Don't restore from a backup that might include the malware. Reinstall apps fresh and copy back only data files.",[1577,1858,1860],{"id":1859},"if-your-identity-is-compromised","If Your Identity Is Compromised",[545,1862,1863,1869,1875,1881],{},[36,1864,1865,1868],{},[29,1866,1867],{},"Freeze your credit"," with the major credit bureaus. In the US, you can freeze your credit with Equifax, Experian, and TransUnion; other countries have their own bureaus (e.g., Experian, Equifax, and TransUnion in the UK; Schufa in Germany). This prevents new accounts from being opened in your name. In the US, credit freezes are free and take about 10 minutes.",[36,1870,1871,1874],{},[29,1872,1873],{},"Report to your bank",": If you see fraudulent charges, call your bank immediately. Most banks have a fraud department that can reverse unauthorized charges.",[36,1876,1877,1880],{},[29,1878,1879],{},"File an identity theft report"," at identitytheft.gov (US) or your country's equivalent.",[36,1882,1883,1886],{},[29,1884,1885],{},"Monitor your credit"," for the next 6-12 months. Look for accounts you didn't open.",[11,1888,1890],{"id":1889},"how-to-not-get-hacked-again","How to Not Get Hacked Again",[33,1892,1893,1899,1905,1911,1917,1923],{},[36,1894,1895,1898],{},[29,1896,1897],{},"Use a password manager",": One unique password per account. The single biggest security upgrade you can make.",[36,1900,1901,1904],{},[29,1902,1903],{},"Enable 2FA everywhere",": Especially email, banking, and social media.",[36,1906,1907,1910],{},[29,1908,1909],{},"Don't reuse passwords",": If you use the same password on two sites and one gets breached, both are potentially compromised. This is how most \"hacks\" actually happen.",[36,1912,1913,1916],{},[29,1914,1915],{},"Be skeptical of links",": Phishing is the number one attack vector. If an email asks you to \"verify your account\" or \"confirm unusual activity,\" don't click the link. Go directly to the website instead.",[36,1918,1919,1922],{},[29,1920,1921],{},"Keep your software updated",": Most malware exploits known vulnerabilities that have already been patched. Updates are annoying. Getting hacked is worse.",[36,1924,1925,1932],{},[29,1926,1927,1928],{},"Run our ",[413,1929,1931],{"href":1930},"\u002Ftools\u002Fprivacy-checkup","Privacy Checkup",": It takes 2 minutes and identifies the biggest gaps in your setup.",[11,1934,1936],{"id":1935},"when-its-not-actually-a-hack","When It's Not Actually a Hack",[16,1938,1939],{},"Some things look scary but aren't:",[33,1941,1942,1948,1954,1960,1966],{},[36,1943,1944,1947],{},[29,1945,1946],{},"\"Your account was accessed from a new location\"",": If you're traveling or using a VPN, this is just you from a different IP.",[36,1949,1950,1953],{},[29,1951,1952],{},"Random password reset emails",": Could be someone mistyping their email address. Only worry if it happens repeatedly for the same account.",[36,1955,1956,1959],{},[29,1957,1958],{},"Slow computer",": Usually means too many browser tabs, aging hardware, or a drive that needs cleaning. Not malware.",[36,1961,1962,1965],{},[29,1963,1964],{},"Spam increase",": Your email leaked in a breach, but that doesn't mean your account is compromised. Just means you're on a spam list now.",[36,1967,1968,1971],{},[29,1969,1970],{},"Targeted ads that seem creepy",": That's ad tracking, not hacking. Creepy, but different.",[16,1973,1974],{},"If you're not sure, check the actual signs above. And when in doubt, changing your passwords and enabling 2FA costs you nothing.",{"title":428,"searchDepth":429,"depth":429,"links":1976},[1977,1978,1984,1990,1995,1996],{"id":1564,"depth":429,"text":1565},{"id":1574,"depth":429,"text":1575,"children":1979},[1980,1982,1983],{"id":1579,"depth":1981,"text":1580},3,{"id":1615,"depth":1981,"text":1616},{"id":1651,"depth":1981,"text":1652},{"id":1669,"depth":429,"text":1670,"children":1985},[1986,1987,1988,1989],{"id":1673,"depth":1981,"text":1674},{"id":1697,"depth":1981,"text":1698},{"id":1744,"depth":1981,"text":1745},{"id":1768,"depth":1981,"text":1769},{"id":1791,"depth":429,"text":1792,"children":1991},[1992,1993,1994],{"id":1795,"depth":1981,"text":1796},{"id":1829,"depth":1981,"text":1830},{"id":1859,"depth":1981,"text":1860},{"id":1889,"depth":429,"text":1890},{"id":1935,"depth":429,"text":1936},"2026-04-16","Weird charges, slow phone, locked out of accounts? Here's how to tell if you've actually been hacked and what to do about it.","\u002Fimages\u002Fguides\u002Fhacked.jpg",{},"\u002Fguides\u002Fhow-to-know-if-youve-been-hacked",9,{"title":1559,"description":1998},"guides\u002Fhow-to-know-if-youve-been-hacked","SorI45kte7ap4gA0yZoW30XruAo4qq8tlkURZ66mYAc",{"id":2007,"title":2008,"author":6,"body":2009,"category":2300,"date":2301,"description":2302,"extension":448,"image":2303,"meta":2304,"navigation":451,"path":2305,"readTime":2306,"seo":2307,"stem":2308,"__hash__":2309},"guides\u002Fguides\u002Fwhat-does-a-vpn-actually-do.md","What Does a VPN Actually Do?",{"type":8,"value":2010,"toc":2278},[2011,2015,2018,2021,2025,2029,2032,2035,2039,2045,2048,2052,2055,2058,2062,2065,2068,2072,2076,2082,2085,2089,2092,2096,2099,2103,2106,2109,2113,2117,2149,2153,2173,2177,2180,2184,2187,2225,2228,2242,2249,2253,2256,2275],[11,2012,2014],{"id":2013},"the-marketing-vs-reality","The Marketing vs. Reality",[16,2016,2017],{},"VPN ads are everywhere. They'll tell you that without a VPN, hackers will steal your identity, your ISP will sell your browsing history, and the government is watching everything you do. Some of this is true. A lot of it is exaggerated to scare you into subscribing.",[16,2019,2020],{},"Here's what a VPN actually does and doesn't do.",[11,2022,2024],{"id":2023},"what-a-vpn-does","What a VPN Does",[1577,2026,2028],{"id":2027},"hides-your-traffic-from-your-isp","Hides Your Traffic from Your ISP",[16,2030,2031],{},"Without a VPN, your Internet Service Provider (ISP) can see every website you visit (by domain, not the full URL if it's HTTPS), when you visit it, and how much data you transfer. In many countries, ISPs are legally allowed to sell this data to advertisers.",[16,2033,2034],{},"A VPN encrypts your traffic before it leaves your device. Your ISP sees that you're connected to a VPN server, but not what you're doing through it. This is the primary practical benefit for most people.",[1577,2036,2038],{"id":2037},"hides-your-ip-address-from-websites","Hides Your IP Address from Websites",[16,2040,2041,2042,2044],{},"Every website you visit sees your IP address, which reveals your approximate location (usually city-level) and your ISP. Try our ",[413,2043,1689],{"href":1688}," to see what yours reveals right now.",[16,2046,2047],{},"A VPN replaces your IP with the VPN server's IP. The website sees the VPN's address instead of yours. This makes it harder (not impossible) for websites to track you by IP.",[1577,2049,2051],{"id":2050},"encrypts-your-traffic-on-public-wi-fi","Encrypts Your Traffic on Public Wi-Fi",[16,2053,2054],{},"Coffee shop Wi-Fi, hotel networks, airport hotspots. These networks are often unencrypted, which means anyone on the same network could potentially snoop on your traffic. A VPN encrypts everything, making public Wi-Fi significantly safer to use.",[16,2056,2057],{},"That said: most websites use HTTPS now, which already encrypts your connection to that specific site. A VPN adds a layer on top, protecting traffic that isn't HTTPS and hiding which sites you're visiting.",[1577,2059,2061],{"id":2060},"lets-you-access-content-from-other-countries","Lets You Access Content from Other Countries",[16,2063,2064],{},"This is actually why most people buy VPNs. Connect to a server in another country and websites think you're there. Useful for streaming libraries, accessing services while traveling, or getting around regional restrictions.",[16,2066,2067],{},"Not a privacy feature, but a practical one.",[11,2069,2071],{"id":2070},"what-a-vpn-does-not-do","What a VPN Does NOT Do",[1577,2073,2075],{"id":2074},"make-you-anonymous","Make You Anonymous",[16,2077,2078,2079,2081],{},"This is the biggest misconception. A VPN hides your IP, but websites track you in dozens of other ways: cookies, browser fingerprinting, login sessions, device IDs. If you're logged into Google with a VPN on, Google still knows it's you. Check our ",[413,2080,1693],{"href":415}," tool to see how many signals your browser leaks beyond your IP.",[16,2083,2084],{},"A VPN is one layer of privacy, not a cloak of invisibility.",[1577,2086,2088],{"id":2087},"protect-you-from-malware-or-phishing","Protect You from Malware or Phishing",[16,2090,2091],{},"Some VPN companies claim to \"protect\" you from hackers. A VPN encrypts your connection, but if you click a phishing link or download malware, the VPN won't stop it. It doesn't inspect or filter your traffic (unless it has a built-in ad blocker feature, which some do).",[1577,2093,2095],{"id":2094},"prevent-all-tracking","Prevent All Tracking",[16,2097,2098],{},"Ad networks use cookies, fingerprinting, and login data to track you. A VPN doesn't touch any of that. You still need an ad blocker (uBlock Origin), anti-fingerprinting browser settings, and good cookie hygiene.",[1577,2100,2102],{"id":2101},"guarantee-privacy","Guarantee Privacy",[16,2104,2105],{},"Here's the uncomfortable truth: when you use a VPN, you're shifting trust from your ISP to the VPN provider. Your ISP can't see your traffic anymore, but the VPN company can. If the VPN keeps logs, your data isn't private. It's just stored somewhere else.",[16,2107,2108],{},"This is why \"no-log policies\" matter. And why VPNs that have been independently audited are worth more than ones that just say \"trust us.\"",[11,2110,2112],{"id":2111},"do-you-actually-need-one","Do You Actually Need One?",[1577,2114,2116],{"id":2115},"you-probably-should-if","You Probably Should If:",[33,2118,2119,2125,2131,2137,2143],{},[36,2120,2121,2124],{},[29,2122,2123],{},"You use public Wi-Fi regularly",": Airports, cafes, hotels. VPN is a no-brainer here.",[36,2126,2127,2130],{},[29,2128,2129],{},"Your country censors the internet",": VPNs are essential for accessing blocked content in restrictive countries.",[36,2132,2133,2136],{},[29,2134,2135],{},"Your ISP throttles or monitors traffic",": Some ISPs slow down streaming, gaming, or torrenting. A VPN prevents them from seeing what you're doing.",[36,2138,2139,2142],{},[29,2140,2141],{},"You want to keep your browsing from your ISP",": In the US, ISPs can legally sell browsing data. A VPN stops this.",[36,2144,2145,2148],{},[29,2146,2147],{},"You travel and want to access home country services",": Banking apps, streaming, news sites that geo-block.",[1577,2150,2152],{"id":2151},"you-probably-dont-need-one-if","You Probably Don't Need One If:",[33,2154,2155,2161,2167],{},[36,2156,2157,2160],{},[29,2158,2159],{},"You only browse on your home network"," with a trusted ISP and don't care about ISP-level tracking",[36,2162,2163,2166],{},[29,2164,2165],{},"You think a VPN makes you \"unhackable\"",": It doesn't. Don't buy one for this reason.",[36,2168,2169,2172],{},[29,2170,2171],{},"You want to be truly anonymous",": Tools like Tor are better suited for that than a VPN alone. And Tor has its own trade-offs (very slow, many sites block it).",[1577,2174,2176],{"id":2175},"the-honest-answer-for-most-people","The Honest Answer for Most People",[16,2178,2179],{},"A VPN is a useful tool that does a few specific things well. It's not a magic privacy button. Combine it with a good browser, an ad blocker, strong passwords, and 2FA for actual security. No single tool is enough on its own.",[11,2181,2183],{"id":2182},"how-to-choose-a-good-one","How to Choose a Good One",[16,2185,2186],{},"If you decide you want a VPN, here's what actually matters:",[33,2188,2189,2195,2201,2207,2213,2219],{},[36,2190,2191,2194],{},[29,2192,2193],{},"No-log policy with an independent audit",": Words are cheap. Look for VPNs that have had their no-log claims verified by a third-party auditor.",[36,2196,2197,2200],{},[29,2198,2199],{},"Jurisdiction",": VPNs based in Five Eyes countries (US, UK, Canada, Australia, New Zealand) can be compelled to hand over data. VPNs in Switzerland, Panama, or the British Virgin Islands have stronger legal protections.",[36,2202,2203,2206],{},[29,2204,2205],{},"Open source apps",": If the VPN client code is open source, security researchers can verify it's not doing anything shady.",[36,2208,2209,2212],{},[29,2210,2211],{},"Kill switch",": Automatically blocks internet traffic if the VPN connection drops, preventing accidental exposure.",[36,2214,2215,2218],{},[29,2216,2217],{},"DNS leak protection",": Ensures your DNS queries go through the VPN, not your ISP.",[36,2220,2221,2224],{},[29,2222,2223],{},"Speed",": A VPN that slows your internet to a crawl isn't one you'll actually use.",[16,2226,2227],{},"Skip VPNs that:",[33,2229,2230,2233,2236,2239],{},[36,2231,2232],{},"Offer \"lifetime\" subscriptions (they'll go bankrupt)",[36,2234,2235],{},"Are free with no clear business model (if you're not paying, your data is the product)",[36,2237,2238],{},"Make outrageous security claims",[36,2240,2241],{},"Won't tell you who owns the company",[16,2243,2244,2245,2248],{},"We compare 30+ VPNs on all of these criteria in our ",[413,2246,2247],{"href":754},"VPN Comparison",". No sponsored rankings, no affiliate-influenced scores.",[11,2250,2252],{"id":2251},"quick-setup","Quick Setup",[16,2254,2255],{},"Once you've picked a VPN:",[545,2257,2258,2261,2264,2267,2270],{},[36,2259,2260],{},"Install the app on your phone and computer",[36,2262,2263],{},"Turn on the kill switch in settings",[36,2265,2266],{},"Enable \"auto-connect\" so it activates on untrusted networks",[36,2268,2269],{},"Connect to the nearest server for best speed (unless you specifically need a different location)",[36,2271,1927,2272,2274],{},[413,2273,1689],{"href":1688}," to verify it's working. Your IP should show the VPN server's location, not yours.",[16,2276,2277],{},"That's it. No PhD required.",{"title":428,"searchDepth":429,"depth":429,"links":2279},[2280,2281,2287,2293,2298,2299],{"id":2013,"depth":429,"text":2014},{"id":2023,"depth":429,"text":2024,"children":2282},[2283,2284,2285,2286],{"id":2027,"depth":1981,"text":2028},{"id":2037,"depth":1981,"text":2038},{"id":2050,"depth":1981,"text":2051},{"id":2060,"depth":1981,"text":2061},{"id":2070,"depth":429,"text":2071,"children":2288},[2289,2290,2291,2292],{"id":2074,"depth":1981,"text":2075},{"id":2087,"depth":1981,"text":2088},{"id":2094,"depth":1981,"text":2095},{"id":2101,"depth":1981,"text":2102},{"id":2111,"depth":429,"text":2112,"children":2294},[2295,2296,2297],{"id":2115,"depth":1981,"text":2116},{"id":2151,"depth":1981,"text":2152},{"id":2175,"depth":1981,"text":2176},{"id":2182,"depth":429,"text":2183},{"id":2251,"depth":429,"text":2252},"Explainer","2026-04-15","VPN companies love to oversell. Here's what a VPN actually does, what it doesn't do, and whether you actually need one.","\u002Fimages\u002Fguides\u002Fvpn-explained.jpg",{},"\u002Fguides\u002Fwhat-does-a-vpn-actually-do",8,{"title":2008,"description":2302},"guides\u002Fwhat-does-a-vpn-actually-do","vidZQW1cVcVY3kfyMqMCBosSAJMg3tD-SVx8rZTaqcI",1776729670620]