Physical Security
Public records often include sensitive personal data (full name, date of birth, phone number, email, address, ethnicity etc), and are gathered from a range of sources (census records, birth/ death/ marriage certificates, voter registrants, marketing information, customer databases, motor vehicle records, professional/ business licenses and all court files in full detail). This sensitive personal information is easy and legal to access, which raises some serious privacy concerns (identity theft, personal safety risks/ stalkers, destruction of reputations, dossier society)
CCTV is one of the major ways that the corporations, individuals and the government tracks your movements. In London, UK the average person is caught on camera about 500 times per day. This network is continuing to grow, and in many cities around the world, facial recognition is being rolled out, meaning the state can know the identity of residents on the footage in real-time. Strong authentication, encrypted devices, patched software and anonymous web browsing may be of little use if someone is able to physically compromise you, your devices and your data. This section outlines some basic methods for physical security
0 out of 16 (0%) complete, 0 ignored
Done? | Advice | Level | Details |
---|---|---|---|
Essential | Shred or redact sensitive documents before disposal to protect against identity theft and maintain confidentiality. | ||
Essential | Contact people search websites to opt-out from listings that show persona information, using guides like Michael Bazzell's Personal Data Removal Workbook. | ||
Essential | Add a watermark with the recipient's name and date to digital copies of personal documents to trace the source of a breach. | ||
Essential | Only share personal data on calls you initiate and verify the recipient's phone number. | ||
Essential | Be aware of your surroundings and assess potential risks in new environments. | ||
Essential | Ensure physical security of locations storing personal info devices, minimizing external access and using intrusion detection systems. | ||
Essential | Use physical security measures like Kensington locks, webcam covers, and privacy screens for devices. | ||
Essential | Prevent devices from being visible from outside to mitigate risks from lasers and theft. | ||
Essential | Shield your PIN entry from onlookers and cameras, and clean touchscreens after use. | ||
Essential | Inspect ATMs and public devices for skimming devices and tampering signs before use. | ||
Optional | Use alternative locations, forwarding addresses, and anonymous payment methods to protect your home address. | ||
Advanced | Prefer PINs over biometrics for device security in situations where legal coercion to unlock devices may occur. | ||
Advanced | Wear disguises and choose routes with fewer cameras to avoid surveillance. | ||
Advanced | Wear clothing with patterns that trick facial-recognition technology. | ||
Advanced | Use IR light sources or reflective glasses to obstruct night vision cameras. | ||
Advanced | Avoid sharing DNA with heritage websites and be cautious about leaving DNA traces. |