Things Schools Should Actually Teach | The Basics of Online Privacy | Who Sees What You Post?
Most people think they control what they share online. But the reality? You’re sharing far more than you realize. Every post, like, click, eye movement, input velocity and timing, and much more can be tracked, stored, and analyzed. This article will give you the basics of online privacy. It breaks down who sees your data, how tracking works, and what you can do to protect your privacy.
Why Does It Matter Who Is Watching Your Online Activity?
The Myth: “I have nothing to hide, so why does privacy matter?”
The Truth: Even harmless data can be used to manipulate, target, or exploit you.
Some of the risks associated with online monitoring include:
- targeting by malicious actors and criminals for fraud, theft, or even physical harm
- employers may receive reports on this activity, and you could lose an opportunity because something showed up in your social media feed that you didn’t ask for, but it might still cause you to be viewed in an unintended way by these aggregated reports
- misinterpretation of information by entities who do not have content to understand the reasons or motivations behind a click or a view. Was it deliberate or on purpose? Was it interest, curiosity, legitimate research, or disbelief that something like that would be in your feed or that a friend would send such a post to you? Without context, information can be problematic.
- Example: ads scroll by that are supposedly based on your preferences, but the algorithms are not always right. In my case, I’ve seen things in my feed that had nothing to do with my interests or beliefs, but monitoring would have counted my scrolling past as a view anyway.
Who Is Watching Your Online Activity?
When you use the internet, multiple entities are tracking you, including:
- Advertisers & Data Brokers: They build detailed profiles on you based on your behavior.
- Governments, Nation-States, & Law Enforcement: They may track data for security, surveillance, or investigations.
- Hackers & Cybercriminals: If you’re not careful, personal data and identity can be stolen and exploited.
- Social Media Platforms: They collect everything you do (likes, posts, time spent looking at content, etc.)
Some of you have strong opinions on these topics, but this article is not to discuss the issues around who is tracking you or why. Instead, this article was created to help you understand how to stay safe online from the malicious actors we talked about, the ones who might target you for criminal activity. So, these discussions and information are necessary. They are the heart of building the balance between protecting the innocent, security, privacy, legitimate surveillance, and differentiating between business needs and mere opportunism or voyeurism. This is a balance I’ve spent decades working to perfect in my career in cybersecurity. You can learn more on my Profile and Career Highlights page.
Delve into more in our article, Unveiling Tech Secrets | Privacy, Security, and Convenience in Your Home, Car, and Gadgets.
What Information Are You Giving Away?
Most people don’t realize how much personal data they expose every day. Discover more in our article, What Happens When You Click “Agree?”
Directly Shared and tracked:
- Social media posts, comments, and messages
- Personal details in online profiles (birthdays, locations, phone numbers)
- Photos (including location metadata)
Indirectly Tracked:
- Your search history (Google, Bing, social media platforms)
- Browsing habits (which sites you visit, how long you stay)
- Location data (even when apps are closed)
- Biometric data (face recognition, voice recordings)
Pro Tip: Even if you delete a post, many platforms keep backups for years. Many retain them forever, regardless of internal data retention policies.
How Companies Track You, Even Off Their Platforms
Ever searched for something on Google and then saw ads for it on Facebook? That’s not a coincidence. Cross-device tracking and cross-platform tracking are real.
- Cookies & Trackers: Websites install tiny files that track what you do.
- Pixel Tracking: Facebook, Google, and others track which websites you visit, even outside their platforms.
- Data Sharing Agreements: Companies legally buy and sell your browsing history.
The problem? Even when you’re careful, your data is still collected behind the scenes.
How to Protect Your Online Privacy
Want to take back control? Follow these steps
Strengthen Social Media Privacy Settings
- Set accounts to private when possible.
- Limit who can see your posts (friends only, no public access).
- Disable location tracking on posts.
Use Privacy-Focused Browsing Tools
- Use a privacy-focused search engine (DuckDuckGo, Brave, Startpage).
- Browse in Incognito Mode (but remember, it’s not foolproof).
- Use a VPN to mask your IP address.
Limit Data Sharing & Tracking
- Disable ad tracking in your phone settings.
- Regularly clear cookies from your browser.
- Use privacy extensions like uBlock Origin or Privacy Badger.
Secure Your Messages & Emails
- Use encrypted messaging apps like Signal or Telegram.
- Avoid sending personal data over email unless necessary.
- Turn on two-factor authentication (2FA) on all accounts.
Take Control of Your Privacy
The internet is designed to collect and monetize your data, but you don’t have to make it easy for them. Start by adjusting your settings, using better tools, and staying aware of what you share.
Your data belongs to you, not to anyone else. Learn the basics of online privacy and protect it.
Glossary
- 2FA (Two-Factor Authentication): A security method that requires an extra verification step beyond just a password.
- Cookies: Small files stored on your device that track your online activity.
- Data Brokers: Companies that collect and sell user data.
- End-to-End Encryption: A method that ensures only the sender and recipient can read messages.
- Incognito Mode: A browser setting that doesn’t save history or cookies.
- Pixel Tracking: Hidden tracking code used by advertisers to monitor user behavior across different sites.
- VPN (Virtual Private Network): A tool that hides your internet activity and encrypts your connection.
Unlock the Secrets of the Digital World with Our Engaging Blog Posts and Articles
Dive into our lively collection of articles designed to boost your digital savvy and cybersecurity know-how. From demystifying the differences between websites and platforms to mastering the basics of online privacy, our series offers practical insights to help you navigate the internet like a pro.
- Bug the Bathroom | Microdrone Security and Risk Implications
- How to Spot a Scam Online
- My Experience with Road Guardians Motorcycle Safety Training
- Things Schools Should Actually Teach | The Ultimate Internet Survival Guide