<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Simon’s Substack: Info dumps]]></title><description><![CDATA[My collected experience and dumping that information here]]></description><link>https://simoncheng.dev/s/info-dumps</link><image><url>https://substackcdn.com/image/fetch/$s_!H6kw!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8be94275-58ea-4156-a327-7743e77ae8e5_144x144.png</url><title>Simon’s Substack: Info dumps</title><link>https://simoncheng.dev/s/info-dumps</link></image><generator>Substack</generator><lastBuildDate>Tue, 14 Apr 2026 08:11:19 GMT</lastBuildDate><atom:link href="https://simoncheng.dev/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Simon Cheng]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[simonchengdev@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[simonchengdev@substack.com]]></itunes:email><itunes:name><![CDATA[Simon Cheng]]></itunes:name></itunes:owner><itunes:author><![CDATA[Simon Cheng]]></itunes:author><googleplay:owner><![CDATA[simonchengdev@substack.com]]></googleplay:owner><googleplay:email><![CDATA[simonchengdev@substack.com]]></googleplay:email><googleplay:author><![CDATA[Simon Cheng]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Practically protecting your privacy against the government, hackers, and advertisers]]></title><description><![CDATA[(note: if there is anything I missed, please comment down below)]]></description><link>https://simoncheng.dev/p/protecting-your-privacy-against-the</link><guid isPermaLink="false">https://simoncheng.dev/p/protecting-your-privacy-against-the</guid><dc:creator><![CDATA[Simon Cheng]]></dc:creator><pubDate>Sun, 25 Jan 2026 03:20:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!H6kw!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8be94275-58ea-4156-a327-7743e77ae8e5_144x144.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>(note: if there is anything I missed, <em>please</em> comment down below)</p><p>This article applies to you if:</p><ul><li><p>You are concerned about mass surveillance</p></li><li><p>You are concerned about your phone getting tracked by ICE during protests and in general</p></li><li><p>You use an iPhone</p></li><li><p>You use an Android, in which case, do the following below</p><ul><li><p>disable 2G/3G connectivity on your Android</p></li><li><p>check app permissions for location, contacts, bluetooth, local network, photos</p></li><li><p>Before skipping past &#8220;Must dos (quick and easy for your iPhone)&#8221;, read the bullet point &#8220;iOS green text bubbles and phone calls over cellular network&#8221;</p></li></ul></li><li><p>You have a publicly viewable social media</p></li><li><p>You either have a weak password, reuse passwords, or store them in plaintext</p></li><li><p>You use Chrome, or a browser without adblock (such as Safari)</p></li><li><p>You receive unknown calls and are unsure what to do</p></li><li><p>You occasionally publicly post pictures of yourself online</p></li><li><p>You haven&#8217;t frozen your credit with the three credit agencies</p></li><li><p>You want to boost your technology security in general</p></li></ul><p>I live with the settings shown in this article, and aim to balance practical use with privacy. In a nutshell, it tries to follow these principles:</p><ul><li><p>It must be invisible (you don&#8217;t notice it)</p></li><li><p>It must be practical (you don&#8217;t need to babysit a setting more than once)</p></li><li><p>If it&#8217;s painful, it&#8217;s only painful once (setup once, cry once, enjoy the benefits for the rest of your technology life)</p></li><li><p>If it&#8217;s annoying, it&#8217;s annoying because there is no other way</p></li></ul><h2>Must dos (quick and easy for your iPhone)</h2><ul><li><p>Privacy &amp; Security -&gt; Safety Check</p><ul><li><p>Contacts - disable entirely. Typically, apps (usually messaging/platforms) have a &#8220;well-intentioned&#8221; way to &#8220;discover&#8221; others but almost always they upload your entire contact list to their servers. Only Signal makes a good intentioned effort to keep it secure but I personally don&#8217;t need nor allow</p></li><li><p>Location - only turn on for apps that are essential like navigation maps. Never turn on for one-off uses like Instagram posts. If it&#8217;s really necessary, always opt to use non-precise location and never allow location access in the background unless you absolutely trust the app</p></li><li><p>Bluetooth - avoid turning on as this can be used to fingerprint your location</p></li><li><p>Local Network - avoid turning on unless the app needs to connect to something on your wifi, or a gadget that has its own wifi</p></li><li><p>Photos - Never allow full access unless you trust the app completely. You can always enable partial access, and allow apps like Instagram to still add photos</p></li></ul></li><li><p>Privacy &amp; Security -&gt; Lockdown Mode -&gt; Turn on</p><ul><li><p>Android users: find a way to disable 2g/3g completely</p></li></ul></li><li><p>Privacy &amp; Security -&gt; Tracking -&gt; turn all off</p></li><li><p>Privacy &amp; Security -&gt; Analytics &amp; Improvements -&gt; turn everything off</p><ul><li><p><strong>especially do this</strong> if you use Siri or Dictation. Otherwise, your audio data gets sent and stored to Apple servers</p></li></ul></li><li><p>Screen Time -&gt; Content &amp; Privacy Restrictions -&gt; Apple Advertising -&gt; Don&#8217;t Allow</p></li><li><p>Settings -&gt; Face ID/Touch ID &amp; Passcode</p><ul><li><p>Stolen Device Protection, turn on to at least &#8220;Away from Familiar Locations&#8221; (to prevent anyone knowing your passcode from changing your Apple ID password immediately)</p></li><li><p>Under &#8220;Allow access when locked&#8221;, turn off everything but Notification Center and Lock Screen Widgets</p></li><li><p>If you have &#8220;Unlock with Apple Watch&#8221;, turn that off</p></li><li><p>If your phone has Face ID, turn on &#8220;Require Attention for Face ID&#8221;</p></li><li><p><strong>Important note</strong>: gaining access to your phone passcode needs a warrant, but your Face ID and Touch ID do not. To quickly disable Face ID/Touch ID to unlock, hold side and power button to bring up power off menu. Afterwards, you&#8217;d need a passcode to sign-in. You can also do this by clicking power button 5 times, but make sure you have Emergency SOS turned off for &#8220;Call with 5 Button Presses&#8221; to prevent calling by accident.</p></li></ul></li><li><p>General -&gt; Background App Refresh, and turn everything off</p><ul><li><p>Almost always you won&#8217;t need it and almost all the time it&#8217;s a liability to your privacy and battery life</p></li><li><p>Notifications don&#8217;t use background app refresh so don&#8217;t worry about that</p></li><li><p>If you choose to selectively turn on, <strong>only do it to fix something broken, not because an app wants you to</strong>, and remember to turn it off for new apps you install</p></li></ul></li><li><p>(if you use iOS&#8217;s Mail app) Apps -&gt; Mail -&gt; Privacy Protection, then:</p><ul><li><p>turn off &#8220;Protect Mail Activity&#8221;</p></li><li><p>turn on &#8220;Hide IP Address&#8221; and &#8220;Block All Remote Content&#8221;</p></li><li><p>This is to protect you from unknowingly sending read receipts to sender that you&#8217;ve received the email and opened it. When reading emails, there will be a prompt allowing you to choose to load images, but just remember you&#8217;re also letting the sender know you&#8217;ve opened it</p></li></ul></li><li><p>Turn off notifications for any app that is not needed</p></li><li><p>iOS green text bubbles and phone calls over cellular network&#8212;all are wiretapped, saved, and analyzed by somebody (such as the government). Therefore, <em>please</em> do it over Signal, and do it as a habit, because:</p><ul><li><p>SMS (green bubble) is incredibly insecure, and can be read by your cellular provider (or anyone that hacked into the cellular provider, such as China)</p></li><li><p>Government doesn&#8217;t even need a warrant&#8212;most likely the government has a secret NDA data-sharing agreement that the government pays the cellular network to simply hand over all your messages</p></li><li><p>Or somebody can simply hack their way in</p><ul><li><p><a href="https://www.youtube.com/watch?v=H6U4AtPfY7s">Chinese Hackers Infiltrated US Telecom Networks</a>, Dec 6, 2024</p><ul><li><p>&#8220;Salt Typhoon hacking campaign [affects] more than 8 US telecom networks and is allowing Chinese hackers to spy on Americans text messages and phone calls&#8221;</p></li></ul></li><li><p>For this reason also, avoid setting up 2FA using your phone number SMS, and use an Authenticator app instead (or your password manager&#8217;s OTP)</p></li></ul></li></ul></li><li><p>iOS blue text bubbles&#8212;guarantee iMessage messages are encrypted only for you and the recipient</p><ul><li><p>Settings-&gt;Apple Account-&gt;Contact Key Verification-&gt;Turn on (both of you have to do this)</p></li><li><p>Go verify each other by going to Message-&gt;a DM with your friend-&gt;Clicking on their profile on top bar, and go through process under &#8220;Advanced Message Security&#8221;</p></li></ul></li></ul><p><strong>Notes about lockdown mode</strong></p><ul><li><p><strong>The what</strong></p><ul><li><p>disables 2G/3G connectivity which makes it more difficult for police to use &#8220;Stingray&#8221; to ID your phone from their car without approaching you</p></li><li><p>reduce ways which hackers can hack into your phone</p></li></ul></li><li><p><strong>The why</strong>:</p><ul><li><p>this might seem overkill but remember the US federal government approved a contract with Israel to develop sophisticated spyware for the US.</p></li><li><p>All it would take is a single zero-day zero-click exploit and you won&#8217;t even know they hacked into your phone</p></li><li><p>Turning on lockdown mode reduces <em>what</em> parts of iOS they are able to exploit</p></li><li><p>In the event something feels sus and you think malware is in the phone, rebooting your phone should clear it</p></li><li><p>With this in mind, always update your phone so discovered exploits can be blocked</p></li><li><p>For more info, search &#8220;ice israel spyware&#8221;</p></li></ul></li><li><p><strong>side effect 1</strong>: some websites/apps will be broken (like special fonts not loading) because there are real instances of attackers using seemingly innocuous things like font files or calendar invite files to hack into computers and phones</p><ul><li><p>For sites that are broken under lockdown mode, assuming you&#8217;re on Safari, click left of url bar, then three dots, then scroll down until you see &#8220;Lockdown Mode&#8221; and turn it off</p></li><li><p>For apps: Privacy &amp; Security -&gt; Lockdown Mode -&gt; Configure Web Browsing</p></li><li><p>For Brave browser (which I use), try clicking on the shield icon, and turning on &#8220;Block Scripts&#8221; or use Safari.</p></li></ul></li><li><p><strong>side effect 2</strong>: so far, on iOS 18, I&#8217;ve found I can&#8217;t search for Messages, view attachments other than images, and add favorites in the Phone app</p><ul><li><p>To remediate: temporarily turn lockdown mode off to do those tasks. Should take 2-3 mins in total</p></li></ul></li><li><p><strong>side effect 3</strong>: so far, on iOS 18, Airdrop between my Mac (Sequoia 15.5) and iPhone (iOS 18.7.2) doesn&#8217;t work</p><ul><li><p>To remediate: use iCloud Drive to copy files, Notes app to copy text. If needed, you can always temporarily turn lockdown mode off.</p></li></ul></li></ul><h2>Must dos (general)</h2><ul><li><p>If you read emails on your browser or in an app like Gmail, find the setting for disabling loading remote images. The instructions below are gmail specific:</p><ul><li><p>Gmail iOS app: click on top left hamburger button, then Settings-&gt;Email preferences-&gt;Images-&gt;choose &#8220;Ask before displaying external images&#8221;</p></li><li><p>Gmail web: Top right, click on gear icon, then &#8220;See all settings&#8221; and under General, Images-&gt;Ask before displaying external images</p></li></ul></li><li><p>If you have Signal and only use it for friends/family:</p><ul><li><p>Signal-&gt;Settings-&gt;Privacy-&gt;Phone Number-&gt;Click on &#8220;Nobody&#8221; for both</p></li><li><p>Enable it briefly when someone adds you</p></li></ul></li><li><p>Personal social media accounts - set to private</p><ul><li><p>Your personal Instagram: set to private</p></li><li><p>Your personal Reddit: <a href="https://www.reddit.com/settings/profile">https://www.reddit.com/settings/profile</a> -&gt; Curate your profile -&gt; Content and activity -&gt; Hide all</p></li><li><p>Repeat for Snapchat, Facebook, etc&#8230;</p></li><li><p><strong>Why</strong>: search for &#8220;usa border social media screening&#8221;</p></li><li><p><strong>How</strong>: specialized companies can scrape public information on your profile, tie it to your identity, then sell it to the government. All it would take then is an AI search like &#8220;search for social media accounts that criticize ICE&#8221;</p></li></ul></li><li><p>For Ring users, (please also share with anyone you know who has a Ring camera):</p><ul><li><p>If you can afford to, unplug your Ring camera, and replace it with a closed-circuit surveillance instead. I personally use Ubiquiti Protect with Remote Access turned off, and use Tailscale to access it</p></li><li><p><strong>Why</strong>: Flock and Ring signed an agreement on Oct 2025 to share data</p><ul><li><p>Flock&#8217;s CEO pushes for a techno-surveillance state</p></li><li><p>Despite local/state police mandating that Flock data not be shared outside of the police&#8217;s jurisdiction, Flock has shown that they are more than willing to violate that to share data with federal law enforcement, such as ICE.</p></li></ul></li></ul></li><li><p>Avoid regularly sending text messages/images over Facebook Messenger, Instagram, Snapchat. Since there is no end-to-end encryption, every text message, every picture/video you send, is analyzed by their servers. If you have to use it to communicate, use it with the assumption that the company and government can see it. Otherwise, use Signal instead</p></li><li><p>If you can, switch away from WhatsApp to Signal. Below is why:</p><ul><li><p>Signal only has two pieces of information: when you registered, and when you last connected. This has been <a href="https://linustechtips.com/topic/1385086-the-fbi-asked-signal-to-hand-over-user-data-signal-complied-by-giving-them-nothing/">proven with subpoenas from the FBI</a></p></li><li><p>WhatsApp messages have unencrypted metadata, and usually, that is enough to <a href="https://www.nybooks.com/online/2014/05/10/we-kill-people-based-metadata/">kill people, according to General Michael Hayden, former director of the NSA and the CIA in 2014</a></p><ul><li><p><a href="https://ssd.eff.org/module/why-metadata-matters">This article</a> by EFF goes into great detail why unencrypted metadata (not just WhatsApp) is dangerous to your privacy. Below is the most relevant portion taken from the article:</p><ul><li><p><em>Even a tiny sample of metadata can provide an intimate lens into a person&#8217;s life. Let&#8217;s take a look at how revealing metadata can actually be to the governments and companies that collect it. A telecommunications company may know:</em></p><ul><li><p><em>You called the suicide prevention hotline from the Golden Gate Bridge.</em></p></li><li><p><em>You got an email from an HIV testing service, then called your doctor, then visited an HIV support group website in the same hour.</em></p></li><li><p><em>You received an email from a digital rights activist group with the subject line &#8220;Tell Congress: KOSA Will Censor the Internet But Won&#8217;t Help Kids&#8221; and then called your elected representative immediately after.</em></p></li><li><p><em>You called a gynecologist, spoke for a half hour, and then called the local abortion clinic&#8217;s number later that day</em></p></li></ul></li></ul></li></ul></li><li><p><a href="https://imageio.forbes.com/specials-images/imageserve/5ff07f779f9392c3af404599/Apple--App-Privacy--Labels/1500x0.png">Here is also a simple diagram</a> comparing data collected between Signal, iMessage, WhatsApp, Messenger</p></li></ul></li><li><p>If you still have TikTok, delete your account. That platform was already egregious in data collection, and now under US oligarch leadership, is even more insane.</p><ul><li><p>Below are the new privacy policy changes (taken from <a href="https://www.reddit.com/r/privacy/comments/1qnnzrs/if_youre_still_using_tiktok/">this reddit post Jan 26th, 2026</a>):</p><ul><li><p>Racial or ethnic origin.</p></li><li><p>Religious or philosophical beliefs.</p></li><li><p>Mental and physical health data.</p></li><li><p>Sexual orientation.</p></li><li><p>Transgender or nonbinary status.</p></li><li><p>Citizenship or immigration status.</p></li><li><p>Precise location data.</p></li><li><p>&#8220;Under the updated policy, it gathers what you provide, what it observes automatically, and what it receives from third parties. That includes account details and identity verification documents, private messages, drafts and unpublished content, AI prompts and interactions, clipboard content, purchase and payment data, contact lists and social graphs, and an extensive set of technical signals such as device identifiers, keystroke patterns, battery state, audio configurations, and activity tracked across devices.&#8221;</p></li><li><p>&#8220;TikTok states that it &#8216;identifies objects and scenery, detects faces and other body parts, extracts spoken words, and collects metadata describing how, when, where, and by whom content was created.&#8217; Post a photo near the Golden Gate Bridge and you are not just sharing a moment. You are generating structured data about place, time, environment, and your body, or body parts.&#8221;</p></li><li><p>&#8220;Tik Tok will use all of the collected data, and maintains the right to sell all of it to interested third parties, from vendors to the federal government.&#8221;</p></li></ul></li><li><p>They have also started censoring &#8220;anti-US&#8221; sentiment so the content on there will likely be biased and influenced towards &#8220;US-friendly&#8221; policies</p></li></ul></li><li><p>Make habit to remove tracking IDs in links. They can use this ID to know who shared it with who, even if you use Signal/encrypted messaging apps. Examples:</p><ul><li><p><code>https://youtu.be/CI1GnF5H568?si=ACdF3B4O3aZdalc2</code></p><ul><li><p>delete "?si=ACdF3B4O3aZdalc2"</p></li></ul></li><li><p><code>https://www.youtube.com/watch?v=CI1GnF5H568&amp;si=ACdF3B4O3aZdalc2</code></p><ul><li><p>delete "&amp;si=ACdF3B4O3aZdalc2"</p></li></ul></li><li><p><code>https://www.instagram.com/reel/DUgSkSRCedC/?igsh=aXNweXV3aXRobXlpZA==</code></p><ul><li><p>delete "?igsh=aXNweXV3aXRobXlpZA=="</p></li></ul></li></ul></li></ul><p></p><p><strong>at this point, that&#8217;s all the easy ways to quickly clamp down on your exposure. But if you want to greatly enhance your security not just against the federal government, read on</strong></p><h2>must do (pain once) - freeze your credit</h2><p>In case you weren&#8217;t aware, a bunch of Americans&#8217; SSNs got hacked already. (Search for &#8220;ssn hack&#8221;). If yours haven&#8217;t yet, it is only a matter of when, not if.</p><p>For each 3 credit agencies, make account first in the right place, and don&#8217;t subscribe to any free trials. The free trials look like &#8220;Get your free credit report&#8221; or &#8220;Subscribe for monitoring&#8221;.</p><p>I&#8217;ve put the links here so you don&#8217;t have to hunt for the right places yourself:</p><ul><li><p>TransUnion: <a href="https://members.transunion.com/unifiedlogin">https://members.transunion.com/unifiedlogin</a></p><ul><li><p>Credit freeze: <a href="https://service.transunion.com/dss/freezeStatus.page">https://service.transunion.com/dss/freezeStatus.page</a></p></li></ul></li><li><p>Equifax: <a href="https://my.equifax.com/membercenter/#/login">https://my.equifax.com/membercenter/#/login</a></p><ul><li><p>Credit freeze: <a href="https://my.equifax.com/membercenter/#/freeze">https://my.equifax.com/membercenter/#/freeze</a></p></li></ul></li><li><p>Experian: <a href="https://www.experian.com/help/login.html">https://www.experian.com/help/login.html</a></p><ul><li><p>Credit freeze: <a href="https://usa.experian.com/mfe/regulatory/security-freeze">https://usa.experian.com/mfe/regulatory/security-freeze</a></p></li></ul></li></ul><h2>good to do - reduce malware risk from browser extensions</h2><ul><li><p>Check your browser extensions (for chrome, it&#8217;s &#8220;chrome://extensions&#8221;)</p><ul><li><p>For extensions needing full site access to everything other than ones you absolutely trust (for me I only trust uBlock Origin, 1Password, Tampermonkey), set &#8220;Site access&#8221; to &#8220;On click&#8221;</p></li><li><p>If that seemingly innocent extension &#8220;QR scanner&#8221; or &#8220;Page ruler&#8221; or &#8220;ChatGPT Saver&#8221; or &#8220;<em>xyz</em> VPN&#8221; is requesting permissions to access something invasive like your entire browsing history, delete it. If you have to install it, do it on another browser profile.</p></li><li><p>On this note, I personally find great alternatives by installing &#8220;Tampermonkey&#8221; and looking up &#8220;&#8217;<em>thing i need</em>&#8216; github tampermonkey&#8221;</p></li></ul></li><li><p><strong>Why</strong>: There was a case where a VPN extension was selling your ChatGPT conversations, claiming to be all part of &#8220;analytics&#8221;</p><ul><li><p>Extension had 4.7 stars, 58.5k ratings, and 6 million users</p></li><li><p>Extension might not be malicious today, but it might become malicious in the future, just like what happened to this VPN extension</p></li><li><p><a href="https://www.youtube.com/watch?v=yPkRPVPMtWE&amp;t=399">6:39, Seytonic - SUED For Screenshotting Your TV (Every Second)</a></p></li></ul></li><li><p>If you (or know anyone else) have installed Honey, or any other coupon extension, uninstall it, because these coupon extensions:</p><ul><li><p>are incredibly invasive on your privacy. They track how you shop across different websites (and who knows what else)</p></li><li><p>known to steal commissions from real YouTubers</p></li><li><p>nobody wins, not you the consumer, not the promoters, not business, except the coupon extension company</p></li><li><p>search &#8220;megalag honey&#8221; for more info</p></li></ul></li></ul><h2>good to do - avoid google storing your online activity</h2><ul><li><p><a href="https://myactivity.google.com/activitycontrols">https://myactivity.google.com/activitycontrols</a></p><ul><li><p>Web &amp; App Activity -&gt; off</p></li><li><p>Web &amp; App Activity -&gt; Manage all Web &amp; App Activity -&gt; Delete (if you don&#8217;t care about your data preservation)</p></li><li><p>Timeline -&gt; off</p></li><li><p>Personalized ads -&gt; off</p></li><li><p>For YouTube, I haven&#8217;t found a good alternative for YT algorithm recomendations, so I&#8217;m keeping this on for now. If you don&#8217;t care, turn this off</p></li><li><p>if you want to archive your data before deleting, do this first: https://takeout.google.com/</p></li></ul></li></ul><h2>good to haves - iOS&#8217;s Advanced Data Protection</h2><p>Although iMessages is encrypted, your iMessage data backup isn&#8217;t.</p><p>The good news is in the US, police (usually) need a warrant to get this data. The bad news is eventually, sooner or later, some authoritarian government will find a way to force Apple to hand it to them.</p><p>You can be rest assured turning this on is effective. Just search for &#8220;UK apple advanced data protection&#8221; and you will be assured of its effectiveness.</p><p>However, you and the ones you message <strong>both</strong> need to turn this on.</p><ul><li><p>Settings-&gt;Apple Account-&gt;iCloud-&gt;Turn off Access iCloud Data on the Web</p></li><li><p>Settings-&gt;Apple Account-&gt;iCloud-&gt;Advanced Data Protection-&gt;Turn On</p><ul><li><p>I recommend using a password manager for this</p></li><li><p>if you don&#8217;t have a password manager, print a hard copy of this and put it somewhere safe</p></li></ul></li></ul><h2>good to haves - password manager (setup pain once, peace of mind for as long as you live)</h2><p>If you don&#8217;t use a password manager, you likely either:</p><ul><li><p>reuse passwords</p></li><li><p>use a weak predictable &#8220;way&#8221; to make passwords for each site</p></li><li><p>forget your passwords</p></li><li><p>store your passwords in a plain text file</p></li><li><p>have hyperthymesia</p></li></ul><p>Why not plain text: first thing after hacker gets into your computer is search for your &#8220;passwords.txt&#8221; or similar. One hack into your laptop, and all your accounts/important details are cooked.</p><p>Why not reuse passwords: if you reuse password across 20 accounts, all it takes is 1 account getting breached to breach your other 19 accounts. It&#8217;s a matter of when, not if. (you can check if you got hacked here: https://haveibeenpwned.com)</p><p>Why password manager: you only need to remember one complicated password. Also, it can auto detect if one of your saved passwords was in a data breach</p><p>Why not use iCloud Keychain, or similar:</p><ul><li><p>not cross platform. If you have iOS phone, and Windows, it won&#8217;t work</p></li><li><p>doesn&#8217;t store notes or files, only passwords</p></li><li><p>having a dedicated password manager makes you form the habit of putting all incredibly important sensitive information in one secure place instead of creating another insecure note</p></li></ul><p>What to do:</p><ul><li><p>Use password manager. I recommend and personally use 1Password. Don&#8217;t use LastPass. For the nerds, BitWarden if you want to self-host.</p></li><li><p>Print your emergency kit PDF as a <strong>hard copy</strong> and put it somwhere safe</p></li><li><p>Download Google Authenticator on your phone, turn on 2FA OTP, add it to Google Authenticator, export the QR code backup, and print it out as a <strong>hard copy</strong></p></li><li><p>Destroy those files that you just printed out as a <strong>hard copy</strong></p></li><li><p>Don&#8217;t save your 1Password master password inside of your 1Password. Make sure accessing 1Password, in case of recovery, is accessible only through <strong>hard copy</strong></p></li><li><p>Change all your passwords. Dive into your iCloud Keychain, Google Password Manager, Samsung Pass, etc...</p><ul><li><p>In case you didn&#8217;t know, <a href="https://passwords.google.com/">Google Password Manager</a> stores all your passwords in such a way Google (and law enforcement with a warrant) can access it</p></li></ul></li><li><p>Move all your notes with sensitive information to 1Password</p></li></ul><h2>good to haves - reduce ad tracking and personalization</h2><p>Ad tracking and personalization seems useful on paper... until it&#8217;s used against you. There are companies buying ad tracking data in bulk, finding a way to link the advertising IDs to you, packaging it nicely, and selling it to someone unsavorable like Palantir and the government (by extension).</p><p>&#8230;Or companies don&#8217;t even need to buy ad tracking data in bulk. A <a href="https://www.youtube.com/watch?v=dEv0L6vhCHo">hack</a> exposed a company exploited the ad bidding process to listen in, collecting data. This included location data, so the tool provided historical location data, and enables law enforcement to draw a rectangle at a given area, specify a time/date range, and get all the people that were pinged at that location.</p><ul><li><p>ditch Chrome,Safari,etc... Use Brave on your phone/laptop/tablet. As a bonus, you get:</p><ul><li><p>ad-free youtube</p></li><li><p>ad-free browsing, decreasing chance you accidentally download malware</p></li><li><p>tested protection: https://coveryourtracks.eff.org</p></li></ul></li><li><p>for search engine, there are multiple options each with tradeoffs:</p><ul><li><p>Kagi with Kagi Privacy Pass</p><ul><li><p>I personally use this, but you need to pay $10/month. I primarily use this because I want a search engine that prioritizes quality results over quantity. They actively find ways to decrease AI slop and ad spam (e.g. listicles) in results and looks to be one of the only search engines that tries to be a good search engine</p></li><li><p>Pros: great search and privacy. better than Google most of the time</p></li><li><p>Cons: cost $10/month</p></li></ul></li><li><p>DuckDuckGo</p><ul><li><p>Pros: Good privacy and free</p></li><li><p>Cons: not so great search</p></li></ul></li><li><p>Google without AI slop (still has ad tracking, but I&#8217;m putting it here for those that don&#8217;t mind the tracking for now, but can use an improvement to search)</p><ul><li><p>to setup (for chrome): go to your browser settings, under search, disable Google, then add</p><ul><li><p>Name: Google (better)</p></li><li><p>Shortcut: google</p></li><li><p>URL: <code>https://www.google.com/search?udm=14&amp;peek_pws=0&amp;q=%s</code></p></li></ul></li><li><p>Make sure to go to myactivity.google.com and turn off Web &amp; App Activity</p></li><li><p>Pros: free. Disables search personalization and gets rid of AI and shopping widgets</p></li><li><p>Cons: still tracks you, and still has ads</p></li></ul></li></ul></li></ul><h2>General tips - receiving calls from unknown numbers</h2><ul><li><p>Turn on Silence Unknown Callers (so they don&#8217;t get to interrupt your attention)</p></li><li><p>If you&#8217;re really curious who calls you, I use https://should-i-call-back.org (I made the site)</p></li><li><p>People can spoof numbers, (e.g. phone will say &#8220;Dad&#8221; but it&#8217;s not actually from your dad), so always call back the number if you get suspicious and &#8220;Dad&#8221; doesn&#8217;t sound like your dad. (If you use Signal, you won&#8217;t ever have this problem)</p></li><li><p>Otherwise, normalize using Signal to text/call among your friends and family. Remember that every phone call you make over cellular network is a phone call wiretapped, recorded, and saved by the federal government (and hackers from China)</p></li></ul><h2>General tips - never post your pictures publicly online</h2><ul><li><p>At end of December 2025, creeps online are using Twitter bot Grok&#8217;s Imagine tool to undress photos of women publicly. It is still happening as of today Jan 24th, 2026, just that they locked it behind a paywall</p></li><li><p>AI deepfake tools are incredibly accessible to the general public. This means they can take a couple of photos of you, and create a video of you saying/doing something you didn&#8217;t.</p></li><li><p>There are also dedicated AI tools just to undress people in photos</p></li><li><p>Also to let you know, voice cloning is a real thing (search ElevenLabs), so make sure to avoid using voice ID on banks to avoid getting hacked, and let your friends and family know about this, so if they hear a person that sounds like you, have other ways to verify it&#8217;s you</p></li></ul><h2>keeping yourself informed on hacks, current technology scene, how companies are screwing the uninformed</h2><p>Why you should be informed: develop your technological &#8220;sense&#8221; so you can develop your &#8220;gut&#8221; feeling for sus behavior from companies, products, etc...</p><p>My criteria for picking out who to follow/listen always boils down to the following. They always:</p><ul><li><p>Report sources</p></li><li><p>Report possible assumptions, biases, and possibilities</p></li><li><p>Have a clear vibe that they are always looking to learn</p></li><li><p>If there&#8217;s clickbait, it&#8217;s ONLY in the title and/or thumbnail</p></li></ul><p>Now for my list:</p><ul><li><p><strong>YouTube: Seytonic</strong> - hacking news on major data breaches, exploits, discovered zero-days, etc... I like it mainly for its deep dive into technical details rather than a &#8220;data breach XYZ, end of story&#8221;, so I can understand how to protect myself.</p><ul><li><p>Effects on me: understand the reality of how dangerous and easily technology can be exploited</p></li></ul></li><li><p><strong>YouTube: Louis Rossmann</strong> - news on how companies are screwing people with subscriptions, bait-and-switch terms of service</p><ul><li><p>Effects on me: understand common consumer traps of companies, importance of offline devices, how low companies can go if you let them, and how to protect myself</p></li></ul></li><li><p><strong>YouTube: Daniel Boctor</strong> - my recent subscription. Relevant news on papers, hacking, technology, etc... Does deep dives on important topics</p></li></ul><h2>relevant sources</h2><p><strong>3rd party tracking location leaking</strong></p><ul><li><p><a href="https://www.youtube.com/watch?v=dEv0L6vhCHo">Seytonic - Hack Exposes Which Apps Leak Your Location</a></p></li></ul><p><strong>IDing your phone from a distance by downgrading your cellular network to 2g/3g</strong></p><ul><li><p><a href="https://www.youtube.com/watch?v=W_F4rEaRduk&amp;t=1623s">Benn Jordan - Gadgets For People Who Don&#8217;t Trust The Government</a></p></li><li><p><a href="https://www.youtube.com/watch?v=VonHAsY4-VA">Seytonic - Phone Surveillance Exposed</a></p></li></ul><p><strong>Vulnerability that allows you to track when you use Signal/WhatsApp and when you pick up your phone</strong></p><ul><li><p><a href="https://www.youtube.com/watch?v=HHEQVXNCrW8">Seytonic - Hacking &#8216;heart emoji&#8217; to Track ANY WhatsApp or Signal User</a></p></li></ul><p><strong>UK does not like Apple&#8217;s Advanced Data Protection</strong></p><ul><li><p><a href="https://www.youtube.com/watch?v=5_XhZC7Gmw0">Seytonic - UK Wants Apple to Ruin Everyone&#8217;s Privacy</a></p></li></ul><p><strong>Flock and Ring affiliation with law enforcement</strong></p><ul><li><p><a href="https://www.youtube.com/watch?v=aeXIgKuX_zY">Daniel Boctor - Flock &amp; Ring</a></p></li></ul><p><strong>US government tracking US citizens that protest</strong></p><ul><li><p><a href="https://www.kenklippenstein.com/p/ices-secret-watchlists-of-americans">Exclusive: ICE&#8217;s Secret Watchlists of Americans</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://simoncheng.dev/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Simon&#8217;s Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>