I’ve collected a lot of privacy tips over the years, ranging from somewhat common to very niche. After seeing this post, I wanted to share them, along with ways to mitigate each of them. I’ve tried to find sources for each of them, but some of them simply don’t have good sources. You can help by finding good sources (Wikipedia, research papers) covering the specific topic. As with all my posts, this is not AI-generated, just well-structured.
Problem: Thin gloves like surgical gloves can still leave fingerprints on surfaces.
Source: https://en.wikipedia.org/wiki/Glove_prints
Mitigation: Wear thick, textured gloves
Problem: The hum of the electrical grid can be used to determine when, and sometimes where, an audio recording took place.
Source: https://en.wikipedia.org/wiki/Electrical_network_frequency_analysis
Mitigation: Only record audio in places far away from electrical appliances.
Problem: Your writing style can uniquely identify you.
Source: https://en.wikipedia.org/wiki/Stylometry
Mitigation: Use AI rewriting tools to obfuscate your writing style.
Problem: Sunglasses don’t block infrared cameras.
Source: https://www.reflectacles.com/irlenses
Solution: Buy infrared blocking/reflecting sunglasses such as Reflectacles.
Problem: Printers add tracking dots that identify which printer was used to print a document and when it was printed.
Source: https://en.wikipedia.org/wiki/Printer_tracking_dots
Mitigation: Use a printer that may not come with this feature (such as the upcoming Open Printer or use public printers like those found in libraries.
Problem: Wi-Fi routers are able to track motion under specific conditions.
Source: https://www.cognitivesystems.com/wifi-motion/ (and others)
Mitigation: Radio jammers may provide some protection against this, since the technology is still fragile.
Problem: Your fingerprint can be uncovered using the sound of your finger gliding across your screen.
Source: https://www.ndss-symposium.org/wp-content/uploads/2024-618-paper.pdf
Mitigation: Use a ballpoint pen with a stylus tip, which are somewhat common to find at most events.
Problem: You can record audio using the vibration of nearby objects, like windows.
Source: https://en.wikipedia.org/wiki/Laser_microphone
Mitigation: Have sensitive conversations in closed-off or soundproof rooms or outside in remote areas.
Problem: Your keystrokes can be uncovered using audio recordings of typing.
Source: https://arxiv.org/pdf/2403.08740
Mitigation: Use virtual keyboards.
Problem: You can be identified based on your typing patterns.
Source: https://expertbeacon.com/your-typing-style-is-as-unique-as-your-fingerprint-heres-what-that-means/ (and others)
Mitigation: Type into a text editor and copy-paste into the form you want to submit.
Problem: Shredded documents can be reconstructed.
Source: https://www.unshredder.com/ (and others)
Mitigation: Burn sensitive documents or use piranha solution.
Problem: You can be identified using your unique microbial cloud.
Source: https://peerj.com/articles/1258/
Mitigation: Shower obsessively, I’m not sure.
Problem: The way you walk can identify you.
Source: https://en.wikipedia.org/wiki/Gait_analysis
Mitigation: Place gravel in your shoes or intentionally walk funny.
Problem: Stores track your location using Wi-Fi and Bluetooth signals from your device.
Source: https://en.wikipedia.org/wiki/Indoor_positioning_system (and others)
Mitigation: Disable Wi-Fi and Bluetooth when not in use.
Problem: Gyroscopes can record audio
Source: https://crypto.stanford.edu/gyrophone/files/gyromic.pdf
Mitigation: Disable sensor permissions for apps that don’t need it on GrapheneOS.
Problem: Cameras can be identified using picture styles.
Source: https://www.scientificamerican.com/article/tracing-photos-back-to-the-camera-that-snapped-them/
Mitigation: Use Polaroid cameras or obfuscate pictures before sharing them.
Problem: Offline Amazon devices can access the internet by communicating with nearby online Amazon devices.
Source: https://en.wikipedia.org/wiki/Amazon_Sidewalk
Mitigation: Don’t use Amazon devices.
Problem: Data sent over a wired connection (like HDMI) can be received wirelessly.
Source: https://arxiv.org/pdf/2407.09717
Mitigation: Use shielded cables or encrypt wired connections in transit.
Problem: Offline printers exfiltrate data through ink cartridges.
Source: https://support.hp.com/us-en/document/ish_6681254-6681301-16
Mitigation: Use a printer that does not come with this feature (such as the upcoming Open Printer.
Problem: You can be identified based on how your body blocks Wi-Fi signals.
Source: https://www.theregister.com/2025/07/22/whofi_wifi_identifier/
Mitigation: Use a Radio jammer.
Problem: Most phones are vulnerable to Stingray attacks.
Source: https://en.wikipedia.org/wiki/Stingray_phone_tracker
Mitigation: Use Rayhunter to detect Stingray attacks.
Problem: Surveillance cameras can scan QR codes.
Source: https://www.linkedin.com/pulse/qr-code-car-hack-fun-impractical-w-garrett-myler
Mitigation: Some surveillance cameras will crash if they scan a QR code with an EICAR Anti-Virus Test File.
Problem: Wi-Fi can measure your heartrate
Source: https://ieeexplore.ieee.org/abstract/document/11096342
Mitigation: Cover your skin to reduce effectiveness.
Problem: The contents of envelopes can be read without being opened by seeing through the paper.
Source: General knowledge.
Mitigation: Use security envelopes or thick packaging.
Problem: Even when fully covered, the clothing you wear can identify you.
Source: General knowledge.
Mitigation: Use plain unbranded clothing bought secondhand from yard sales or Goodwill.
Problem: Even when fully covered, your body shape can identify you.
Source: General knowledge.
Mitigation: Wear baggy black clothing like down jackets.
Problem: State ID cards have your address listed on them.
Source: General knowledge.
Mitigation: Passports are valid photo IDs that do not have your address listed.
Problem: Any Bluetooth device you pair your phone to can access your contacts.
Source: Various online discussions.
Mitigation: Use a phone that allows you to deny that permission when pairing Bluetooth devices.
Problem: Voice changers can be reversed.
Source: Various online discussions.
Mitigation: Use voice changers that highly obfuscate your voice (beyond something like a pitch shift) or use a program that converts live speech-to-text into live text-to-speech.
Problem: Speakers can be used as microphones.
Source: Various online discussions. You can try this yourself by plugging a speaker into your microphone jack.
Mitigation: Use built-in speakers or remove all speakers entirely.
Problem: Spray paint can’t blackout surveillance camera lenses.
Source: Various online videos of failed criminals.
Mitigation: Use duct tape or other adhesives that are not only cheaper but provide better protection.
Problem: Pixelated or blurred images can be reversed.
Source: Various reversal tools.
Mitigation: Censor information using solid boxes.
Problem: Receiving antennas can be geolocated using signal interference.
Source: I couldn’t find a suitable source covering this specifically. This is a general source.
Mitigation: Receive media via offline methods.
Problem: Cars will collect telemetry locally to be shared when you visit auto repair shops.
Source: I couldn’t find a suitable source.
Mitigation: Use dumb cars or commute using bicycles, buses, etc.
Problem: Police can detain you without a valid reason if you carry an ID.
Source: I couldn’t find a suitable source.
Mitigation: Don’t carry your ID unless you need to.
Problem: Buildings can be wiretapped using microphones as thin as paint.
Source: I couldn’t find a suitable source.
Mitigation: Have sensitive conversations in areas unlikely to be wiretapped, or buildings with plain concrete walls.
Problem: Police don’t require a warrant to unlock your phone using biometrics.
Source: Various sources have conflicting information.
Mitigation: Lock your phone without biometrics or use two-factor fingerprint unlock on GrapheneOS.
Problem: Pedometers can reveal information such as your religion.
Source: A website I still can’t find.
Mitigation: Use dumb pedometers that don’t include timestamps.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
much thanks to @gary_host_laptop for the logo design :)
Some of these might be a bit extreme in my application, but they are certainly well worth keeping in mind.
Reminds me of this:
It’s worth noting that the process took several years to accomplish.
I’m no expert, but if pictures can be ‘unswireled’ a la Christopher Paul Neil the Mr. Swirl Face, could the black box be lifted revealing the contents of what it covered.?
If we’re talking raster images, then no, you’re not using some mathematical model to morph an image, you’re just overwriting pixels arbitrarily, so there would be no way to recover what’s “under” the box because there’s no second layer.
If instead it’s something like a PDF (vector), then placing an object over another without flattening the result would allow you to move it out of the way to reveal what’s under.
I would add, of course, make sure that the black box covers enough to prevent the possibility of inferring what’s under, so if it’s text or other organic things that can be “statistically” regenerated with some model, don’t leave any borders that can identify the item, reconstructed data may be synthetic, but can provide informed guesses