Physical Security

Public records often include sensitive personal data (full name, date of birth, phone number, email, address, ethnicity etc), and are gathered from a range of sources (census records, birth/ death/ marriage certificates, voter registrants, marketing information, customer databases, motor vehicle records, professional/ business licenses and all court files in full detail). This sensitive personal information is easy and legal to access, which raises some serious privacy concerns (identity theft, personal safety risks/ stalkers, destruction of reputations, dossier society)

CCTV is one of the major ways that the corporations, individuals and the government tracks your movements. In London, UK the average person is caught on camera about 500 times per day. This network is continuing to grow, and in many cities around the world, facial recognition is being rolled out, meaning the state can know the identity of residents on the footage in real-time. Strong authentication, encrypted devices, patched software and anonymous web browsing may be of little use if someone is able to physically compromise you, your devices and your data. This section outlines some basic methods for physical security

0 out of 16 (0%) complete, 0 ignored

Done?AdviceLevelDetails
Essential

Shred or redact sensitive documents before disposal to protect against identity theft and maintain confidentiality.

Essential

Contact people search websites to opt-out from listings that show persona information, using guides like Michael Bazzell's Personal Data Removal Workbook.

Essential

Add a watermark with the recipient's name and date to digital copies of personal documents to trace the source of a breach.

Essential

Only share personal data on calls you initiate and verify the recipient's phone number.

Essential

Be aware of your surroundings and assess potential risks in new environments.

Essential

Ensure physical security of locations storing personal info devices, minimizing external access and using intrusion detection systems.

Essential

Use physical security measures like Kensington locks, webcam covers, and privacy screens for devices.

Essential

Prevent devices from being visible from outside to mitigate risks from lasers and theft.

Essential

Shield your PIN entry from onlookers and cameras, and clean touchscreens after use.

Essential

Inspect ATMs and public devices for skimming devices and tampering signs before use.

Optional

Use alternative locations, forwarding addresses, and anonymous payment methods to protect your home address.

Advanced

Prefer PINs over biometrics for device security in situations where legal coercion to unlock devices may occur.

Advanced

Wear disguises and choose routes with fewer cameras to avoid surveillance.

Advanced

Wear clothing with patterns that trick facial-recognition technology.

Advanced

Use IR light sources or reflective glasses to obstruct night vision cameras.

Advanced

Avoid sharing DNA with heritage websites and be cautious about leaving DNA traces.