Your Digital Footprint Is a Physical Safety Issue
Digital hygiene is not just a privacy issue. It is a preparedness issue. Here is why your online footprint is a physical safety risk and what to do about it.
Most people think about digital privacy as a technology problem. Something abstract. Something that matters in theory but does not have real-world consequences in their daily lives. That framing is wrong, and right now, in this political moment, it is dangerously wrong.
Your online footprint is not just a privacy issue. It is a preparedness issue. And for a growing number of people, it is a physical safety issue.
The Moment We Are In
The political and social environment in the United States right now is not normal. Activists and organizers are being targeted in ways that would have seemed extreme a few years ago. People are losing jobs, facing immigration consequences, and drawing law enforcement attention based on their associations, their public statements, and their attendance at lawful public events. Data that was collected for advertising purposes is being used in ways the people it was collected from never anticipated and never consented to.
This is not a hypothetical. It is happening now, and the infrastructure that makes it possible has been quietly building for years.
At the same time, the broader preparedness conversation has largely ignored the digital dimension. A person who has thought carefully about food storage, water supply, communications, and community resilience, but who has left their digital life completely exposed, has a significant gap in their preparedness plan. Because a disruption does not have to be a natural disaster or a grid failure to threaten your safety and your freedom. Sometimes the threat is targeted, deliberate, and enabled by information you have been giving away for free.
What Your Digital Footprint Actually Contains
Most people significantly underestimate what their digital footprint looks like to someone with motivation and basic tools to look.
Your name, current and previous addresses, phone numbers, family members’ names, and estimated income are available on dozens of data broker sites right now, aggregated from public records and purchased data, accessible to anyone willing to pay a few dollars or even just willing to look. This is not a breach. It is the normal operation of an industry built on selling you.
Your location history, if you carry a smartphone and have not taken specific steps to limit it, is remarkably detailed. The apps on your phone that you gave location access to, sometimes years ago and probably without thinking about it, have been logging where you go, when you go there, and how long you stay. That data has been sold, aggregated, and in some cases provided to law enforcement without a warrant.
Your social media activity creates a map of your associations, your beliefs, your schedule, and your physical movements over time. Public posts, check-ins, tagged photos, and event RSVPs paint a detailed picture that you assembled yourself, one post at a time, often without thinking about who might be looking.
Your communications, if they are passing through standard email or unencrypted messaging apps, are not private in any meaningful sense. They can be accessed by the platforms that carry them, by data breaches, by legal process, and in some cases by more direct means.
None of this requires sophisticated surveillance technology. It requires patience and a Google search.
Why This Is a Preparedness Issue
The preparedness framework this series has been building is about reducing your vulnerability to disruption, maintaining your ability to function when systems fail, and building the community relationships that make resilience possible.
Digital hygiene fits directly into that framework.
A person whose home address is easily findable online is more vulnerable to targeted harassment, stalking, or worse. An activist whose associations and attendance at public events are documented across social media has handed investigators a roadmap. Someone whose communications are unencrypted has no meaningful expectation that those communications are private. These are not abstract risks. They are practical vulnerabilities with practical consequences.
The intelligence and security background that informs this series makes one thing very clear: most people are not targeted because someone is specifically after them. They are targeted because they are findable, and being findable made them convenient. Reducing your digital footprint does not make you invisible. It makes you inconvenient, and inconvenient targets get passed over in favor of easier ones.
That is the whole game.
The Specific Habits That Matter Most
This is not a comprehensive technical guide. That is what the Digital Self Defense course is for. But here are the highest-leverage habits worth building immediately.
Get your data off data broker sites. Search your name on sites like Spokeo, WhitePages, BeenVerified, and Intelius and look at what comes up. Then opt out. Every site has an opt-out process, most of them are tedious, and all of them require periodic repetition because the data comes back. There are also services that automate this process on an ongoing basis. This single step removes the most accessible layer of your personal information from the most accessible sources.
Stop using SMS for sensitive communications. Text messages are not encrypted. They pass through your carrier, they are stored, and they are accessible through legal process with minimal friction. Signal is free, it is easy to use, and it provides genuine end to end encryption for both messages and calls. If you are having conversations you would not want read back to you in a deposition or a courtroom, have them on Signal.
Audit your social media for location information. Go back through your posts and look at how much location data you have shared over time. Check-ins, tagged locations, photos with identifiable backgrounds, posts about your routine. Think about what that record looks like to someone building a picture of your life. You do not have to delete everything, but you should understand what you have published.
Use a password manager and stop reusing passwords. When a service you use gets breached, which happens constantly, your credentials get tested against every other major service automatically. Reusing passwords means one breach compromises everything. A password manager generates and stores unique passwords for every account and removes that vulnerability entirely.
Lock down your browser. Default browser settings are configured for convenience, not privacy. Switching to Firefox or Brave, installing a tracker blocker like uBlock Origin, and changing your default search engine from Google to something that does not build a profile of your queries are all low-effort steps with meaningful privacy benefits.
The Overlap With Physical Preparedness
Everything discussed in this post connects to the broader preparedness work this series has been doing.
The communications post covered radio and mesh networks as alternatives to cell infrastructure. Digital hygiene is the other side of the same coin: not just having alternative communications, but making sure your existing communications are not a liability. There is no point building a resilient off-grid communication network if the conversations you are having on your regular phone are creating a documented record of your plans, your associations, and your intentions.
The community preparedness post argued that your relationships are your most important resource. Protecting the privacy of those relationships, keeping your network off databases that can be queried by hostile actors, is part of taking those relationships seriously. An organizer whose entire contact list is accessible through a compromised account is not just a personal liability. They are a liability to everyone in their network.
The food, water, and communications posts all operate on the same basic assumption: do not wait until the system fails to figure out that you needed to prepare. Digital hygiene operates on exactly the same logic. The time to remove your data from broker sites is before someone uses it. The time to move your sensitive communications to an encrypted platform is before those communications become evidence of something. The time to understand your threat model is before the threat materializes.
The threat modeling framework from the Digital Self Defense course applies directly here. What are you actually protecting? From whom? How much friction do you need to create to make yourself an inconvenient target rather than an easy one? Those questions have different answers for different people, and understanding your specific threat model is the starting point for everything else. A suburban parent worried about general data privacy has a different threat model than an activist who attended a protest last month. Both benefit from better digital hygiene, but the urgency and the specific priorities look different.
Where to Go From Here
If this post has made you want to take concrete action, the Digital Self Defense course covers all of it in depth: threat modeling, data broker removal, encrypted communications, password managers, multifactor authentication, VPNs, and browser security. Three hours, live via Zoom, no technical background required. Details and registration are here: https://bit.ly/4sGcfSF
For every 4 paid students, one scholarship seat is available at no cost. If cost is a barrier, reach out before registering.
If the course is not the right fit right now, start with one thing. Get your data off one data broker site. Download Signal and move one conversation there. Install uBlock Origin. The goal is not perfection. The goal is to be meaningfully harder to find and harder to surveil than you were yesterday.
That is preparedness. It just does not look like what most people picture when they hear the word.
