Privacy for the Everyday Person (11): Smart Assistants and Privacy (Why You Might Want to Skip Saying “Hey Alexa”)

Smart assistants like Amazon Alexa, Google Assistant, and Apple Siri can be handy. You can ask them to play music, set a timer, or check the weather, all by just talking. But the way they work comes with real privacy risks.

These devices are always listening for their “wake word” (like “Hey Siri” or “Alexa”). That means they’re constantly monitoring sound in your home, waiting to be activated. Sometimes, they start recording by accident, like when you say something that sounds like their name.

Companies say these recordings are safe, but in many cases:

  • The recordings are stored and can be reviewed by employees
  • Some voice clips are kept unless you delete them manually
  • The data may be shared with other companies or law enforcement

Our Advice: Don’t Use Speech-Activated Smart Assistants

Devices that are always listening are not great for privacy. You don’t need to give up smart tools altogether, but we recommend skipping voice-activated assistants and using apps or devices that put you in control!

< Back | Home | Next >

—- Published January 2026 —-

Privacy for the Everyday Person (10): Health Trackers

Health apps can help you track your steps, workouts, heart rate, sleep, or even your menstrual cycle. They’re built into many phones (like Apple Health, Samsung Health, and Google Fit) or downloaded separately (like Strava and Flo). These apps are super convenient, but they also collect some of the most private and sensitive information about you!

And here’s the thing: not all health data is protected, especially if you’re using a regular app instead of visiting a doctor. That means your information (like how often you run, when you ovulate, or how much you sleep) can be stored, shared, or even sold by the company who owns the app.

HERE is a review of the privacy of common reproductive health apps (for periods, pregnancy, fertility, etc.)

What You Can Do to Protect Your Health Data

  • Turn off cloud backups for health and fitness apps if you don’t want your data stored online.
  • Use a strong phone passcode and/or password for the app if the option is offered.
  • Review app permissions (Does your step counter really need access to your microphone or contacts? Probably not. Click HERE for how to change iPhone settings. HERE for Android.)
  • Avoid logging very sensitive health data in the apps.

< Back | Home | Next >

—- Published January 2026 —-

Privacy for the Everyday Person (9): Online Video Players

When you sit down to watch a video, the last thing you want is to be watched back! But that’s exactly what happens when you use YouTube, streaming services, and smart TVs.

These tools are designed for convenience, but they also collect a lot of personal data. What you watch, how long you watch it, what you click on, what you pause on—they track it all. That information can be used to build a profile on you, show you targeted ads, or even shape your online experience.

Let’s go a bit more into YouTube, which is free to use, but it’s not free from tracking. Google (which owns YouTube) uses your video history, searches, and likes to:

  • Target you with ads
  • Share data with advertisers and other partners
  • Link your activity to your Google account

If you’re signed into your Gmail account, the tracking gets even more personal information from you. Your YouTube behavior is connected to your Gmail, location, and search history.

Private Alternatives to YouTube

If you like watching YouTube videos but don’t want to be tracked, try these two tools:

Newpipe.net: a free, open-source Android app that provides a lightweight, privacy-focused way to watch and listen to videos from YouTube and some other platforms without using Google’s official YouTube app or services
FreeTube.com: an open-source, desktop third-party app focused on privacy and ad-free viewing. It lets you browse and watch YouTube content with more privacy.  

You can also watch Youtube videos in Incognito mode on your browser or using a VPN. (We talked about VPNs and how they can be used to hide what you do on the Internet previously HERE.) [[LINK PAGE HERE]].

< Back | Home | Next >

—- Published January 2026 —-

Privacy for the Everyday Person (8): The Cloud

You’ve probably heard the phrase “the Cloud.” But what does that really mean?

The Cloud is a way to store your files (like photos, documents, or backups) on someone else’s computer that has much more memory than yours, most often some big company’s computer (e.g. Amazon, Microsoft). You can then access your files on that other computer via the internet.

When something is in the Cloud, you can open it from anywhere. You don’t need to carry a flash drive or worry about your computer crashing.  All you need is an Internet connection. The Cloud is fast, easy, and used by billions of people every day.

But like anything online, the Cloud comes with privacy risks.

Common Cloud Providers You May Already Be Using

iCloud (Apple): If you have an iPhone, you’re probably using iCloud. It automatically backs up your photos, texts, notes, and more. Apple says it encrypts* (see definition below) your data, but Apple holds the keys to your Cloud, which means they can still access your data in the Cloud if required by the police or the law. To prevent this, you have to turn on Advanced Data Protection.

Dropbox: Dropbox is a popular cloud storage service for sharing files and backing up work or personal documents. It’s easy to use and works on any device. But Dropbox does not offer full end-to-end encryption* by default.

OneDrive: OneDrive is Microsoft’s cloud storage system, built into most Windows computers. It backs up your documents, photos, and desktop folders online so you can reach them from anywhere. Microsoft holds the keys to your data, so they can read your files if needed. Files may be scanned for “policy violations,” and your information could be shared with law enforcement or other third parties.

GoogleDrive: Your files are not end-to-end encrypted*, which means Google can access the contents if it wants to. Google can scan your files, link your activity to your personal profile, and hand over your data to authorities if asked.

What can I use?

If you want more control over your data, there are cloud tools built specifically for privacy:

I need to delete a file on my computer. How can I make sure that it’s really gone?

Most people don’t realize that when you “delete” a file, it often isn’t really gone from your computer. It just gets marked as “okay to overwrite.” That means, until that memory space in your computer gets reused to save something else, someone could still recover the deleted file.

If you’re using Windows, a free program called Eraser can actually shred files, making sure they’re completely electronically erased and can’t be recovered. Think of it like a digital paper shredder.

If you’re using MacOs, you should enable FireVault or you can use the free program called Permanent Eraser.

So What’s the Bottom Line When It Comes to Using the Cloud?

(1) Be careful about what you upload to the “Cloud.”

(2) Use a more secure “Cloud” whenever possible. 

*encryption explained in the “Introduction” article HERE

< Back | Home | Next >

—- Published January 2026 —-

Privacy for the Everyday Person (7): Video Calls

Remember when video calls felt like something from the future? Now they’re everywhere—school meetings, doctor visits, job interviews, check-ins with family, and even game nights. Whether you’re using FaceTime, Zoom, Meetings, or WhatsApp, video conferencing is how a lot of us stay connected.

But just like with texting, not all video calls are private. Some video call companies watch what you do, store recordings, or track “metadata.”

What is “metadata”?

We described this is the context of (5): Private Texting [[LINK HERE]] previously.)This is information that describes or gives context to other data.

Think of it like a label on a package. The label tells you information about the package, just like metadata tells you information about the data. For example, for a photograph (the data), the metadata includes: the date and time the photo was taken, the camera model, the location (GPS coordinates), and perhaps the photographer’s name.

Metadata for a video call can tell a company what kind of device you used (phone or computer, mac or windows), IP address (which shows your location), about when you called, who joined the call, and how long you stayed in the meeting.

Now let’s go over your options for video calls:

FaceTime (Apple only): If you and the other person both use Apple devices (iPhones, iPads, or Macs), FaceTime is a pretty good option. Apple uses end-to-end encryption, which means your video call is locked down, and no one can watch or listen in (not even Apple).

But FaceTime only works with other Apple users. If one person’s on Android, you’re out of luck.
WhatsApp Video offers end-to-end encrypted video calls, so the video and audio are private. But WhatsApp is owned by Meta (the company behind Facebook), which collects lots of “metadata.”
Zoom is used by schools, businesses, and families for everything from work meetings to birthday parties.

But here’s what to know: Zoom does not use full end-to-end encryption by default. They do offer a feature called “end-to-end encryption”, but you have to turn it on manually, and it has some limits (like you can’t use all features when it’s on). Also, all participants need to use the Zoom app—so yes, you’ll need to download it. Zoom also collects some “metadata.”
Google Meet is built into Gmail and Google Calendar.  Google encrypts calls while they’re are happening, but not with end-to-end encryption. That means Google could access the content of your video call if required. Google Meet also collects “metadata.”
Jitsi Meet is a lesser-known but useful video service that focuses on privacy. Jitsi offers encrypted video conferencing through your browser. It doesn’t collect “metadata,” doesn’t require registration, and you can use it on any device with a browser. You just go to the website, start a room, and send your friend or group the link.
Slack Huddle: Slack is a workplace messaging tool, and its Huddles feature lets people start quick voice or video chats. Huddles are encrypted while they happen between devices, but not with end-to-end encryption. Slack could technically access what was said or shown in the video. Slack also collects “metadata.”
Microsoft Teams video calls are encrypted as they happen, but not with end-to-end encryption. The meeting organizer has to turn on end-to-end encryption before the meeting starts. Microsoft also collects “metadata.”

AI (Artificial Intelligence) & Video Conferencing

More video conferencing apps (like Zoom, Microsoft Teams, and Google Meet) are now using AI to make calls smoother. AI can do things like:

  • Turn speech into text (live captions or transcripts)
  • Automatically summarize meetings
  • Identify who’s talking
  • Filter out background noise

Just keep in mind: AI features often require recording or analyzing your voice, video, and what’s said in meetings. That data might be stored, seen by people you didn’t approve, or even used to train other AI models.

What can you do?

  • Use privacy-respecting services when possible (like Jitsi Meet).
  • Ask if meetings are being recorded and speak up if you’re not comfortable.
  • Turn off features you don’t need, like auto-transcription or facial analysis.

So What’s the Bottom Line When It Comes to Video Conferencing Services?

Video calls are convenient, but they’re not always private! If you wouldn’t say it in a room full of strangers, think twice before saying it on a video call.

< Back | Home | Next >

—- Published January 2026 —-

Privacy for the Everyday Person (6): Browsers, Search Engines, and the Tools That Help You Stay Private Online

Every time you open your internet browser (whether it’s Chrome, Safari, Firefox, or Edge) you’re leaving little digital breadcrumbs behind. Those breadcrumbs tell companies what you search for, what websites you visit, how long you stay there, and sometimes even your location.

If that sounds creepy, you are not wrong!

There are tools that make it easier to browse online privately without needing to become a tech expert. Here we’ll discuss some of them: privacy-enhancing browsers, ad-blocking software and Virtual Private Networks (VPNs).

Browsers and Search Engines: Pick the Right Door to the Internet

Most people use browsers like Chrome or Safari because they come pre-installed on devices. But these browsers often track what you do online. If you want a browser that gives you more control over your privacy, try Mozilla Firefox or Brave. They’re free, work just like the other browsers, and don’t spy on you as much. 

For search engines, try switching from Google to Brave, Firefox, Startpage, or DuckDuckGo. These search engines don’t keep a history of what you search for.

Stop the Trackers: Anti-Tracking Software

Every time you visit a website, “trackers” can start following you around the internet. These trackers watch what you click, what you search, and even how long you stay on a page.

And like a private detective, these trackers build a profile on you. This profile is used to target ads towards you or the profile is sold to other companies.

Anti-tracking tools block those trackers from spying on you. Here are a few good ones:

Ghostery blocks more than 1,800 tracking tools and shows you which sites are watching.  
AdBlock Plus blocks pop-ups and ads.  
uBlock is a free, open-source ad content blocker. Here is a blog post and video explaining how to install uBlock.

What’s a VPN, and Do You Need One?

A VPN, or “Virtual Private Network”, is a tool that hides what you do online from your internet provider, your school, your job, or anyone trying to spy on you—especially when you’re using public Wi-Fi!

But not all VPNs are safe. Some track your activity and sell your data to advertisers, which completely defeats the purpose of using a VPN for privacy. That’s why it’s important to choose a VPN you can trust.

Safer choices include:

Mullvad is often called the best VPN for privacy. Mullvad doesn’t record what websites you visit, when you connect, or how long you stay online.

You don’t need to give your name, email, or any personal info. When you sign up, Mullvad gives you a random account number. You can even pay in cash by mailing Mullvad money in an envelope. That’s how serious Mullvad is about privacy.
ProtonVPN
NordVPN
ExpressVPN
IPVanish

Want Even More Privacy? Try the Tor Browser

The Tor Browser is for people who want serious privacy. Tor hides your location, blocks trackers, and keeps your internet activity private. But there are trade-offs:

  • Tor is slower than normal browsers.
  • It can draw attention from government agencies, since they watch Tor traffic more closely.
  • Some websites won’t work properly on Tor.

Just a heads up, if you live in a small town and are the only one using Tor, your online activity might stand out.

What’s the difference between VPN and Tor?

This gets a bit more technical, and it is not very necessary to understand if you plan on using a VPN and/or Tor. But if you’re curious, read on!

A VPN creates a secure tunnel between your device and the internet. It hides your IP address (this is a number which identifies where you are, similar to a mailing address) and hides what you do online from your internet provider, workplace, school, etc. However, your VPN provider may keep a log of everything you do online, which is why it is so important to choose a trustworthy and privacy protecting VPN. For example, the ones identified above: Mullvad, ProtonVPN, NordVPN, etc. A VPN is good for everyday privacy, including using public Wi-Fi or online streaming.

Tor Browser sends your internet traffic through multiple random computers (called “nodes”) before it reaches its final destination. This makes it very hard to trace anything back to you, even for governments or tech companies. This makes Tor Browser very good for maximum anonymity and high-risk situations (activism, journalism, sensitive research).

So What’s the Bottom Line When It Comes to Browsers, Trackers, VPN, and Tor?

(1) There are browsers/search engines that do a better job protecting your digital privacy than Google.

(2) Use anti-tracking add-ons for extra protection online.

(3) A VPN and Tor are your best bets to hide your online activities.

HERE is a video about the privacy of browsers.

< Back | Home | Next >

—- Published January 2026 —-