The realistic threat model
Privacy advice often opens with worst-case scenarios — nation-state actors, mass surveillance, sophisticated targeted attacks. These are real for journalists, dissidents, and a small number of public figures. For most adults, the realistic threats are more mundane and more common:
- Credential stuffing (your reused password from a breached site being tried on your bank).
- SIM swap attacks that hijack your phone number to defeat SMS 2FA.
- Phishing emails that target you specifically using publicly available information.
- Social engineering of family members or colleagues to gain access through you.
- Lost or stolen unencrypted devices.
- Account takeover through compromised email.
- Deepfake-enabled fraud (voice cloning a relative to extract money).
The basics protect against most of these for most people. The advanced stuff is for the small number whose threat model genuinely warrants it.
The one-afternoon protocol
The unglamorous core. Use the digital hygiene checklist to tick items as you go.
- Install a password manager. Bitwarden, 1Password, or a built-in browser one. Long unique master password (4+ random words).
- Reset every reused password across your important accounts (email, bank, social, password manager itself).
- Enable 2FA on every important account. Hardware key (YubiKey) for the most critical; authenticator app (Aegis, Raivo, 1Password) elsewhere; SMS only when nothing else is offered.
- Encrypt your devices. Full-disk encryption is on by default in modern macOS and Windows Pro; confirm it's on, set strong device passwords, enable auto-lock under 5 minutes.
- Audit connected apps on Google / Apple / Microsoft / Meta. Remove third-party access you no longer use.
- Audit email forwarding rules. Make sure nothing rogue is forwarding your email elsewhere — a common compromise that goes undetected for years.
- Set up backups. Encrypted cloud backup for phone and laptop. Test that you can restore from them; an untested backup is wishful thinking.
- Close accounts you don't use. Old accounts at long-dead services are common attack surfaces. Use jastly an account-deletion service if you have many.
Beyond the basics
For most adults, the basics are sufficient. If you have specific concerns — public role, harassment risk, journalism, dissent — consider:
- Separate accounts for separate threat models (public-facing vs personal).
- Hardware security keys for everything that supports them.
- Disposable email addresses for low-trust sites.
- Browser-level tracker blocking (uBlock Origin, Brave).
- Selective use of VPNs (specific contexts, not as a panacea).
- Data-broker removal services for highly exposed individuals.
- Public-record audit once a year.
- Pseudonymous accounts for activities you don't want connected to your legal identity.
AI-era specifics
The 2026 update to digital hygiene:
- Voice samples. Be intentional about what voice content you publish. Cloning quality has improved enough that public podcast appearances can become attack material.
- Family verification protocols. Agree a verbal password or fact-check question for any urgent financial request by phone. Deepfake voice cloning of relatives is now common enough to be a realistic threat.
- Verification for unusual requests. Especially work requests for money transfers, password resets, urgent action. Verify through a different channel.
- Be sceptical of perfectly-targeted content. If something is exactly aligned with your views and urgent, that's now a deepfake / disinformation signal worth slowing down for.
Common mistakes
- Reusing passwords because ‘I can't remember unique ones’ (that's what a password manager is for).
- SMS 2FA on financial accounts when better options exist.
- No backups, or untested backups.
- Keeping every old account ‘just in case.’
- Treating privacy as paranoia rather than basic hygiene.
- Buying a VPN before fixing passwords and 2FA.
- Not having a verification protocol with family for urgent financial requests.
Related
- Topic: Deepfakes and disinformation.
- Topic: AI risk literacy.
- Micro-course: Geopolitics, Surveillance, and the Tech Reshaping Power.
- Worksheet: Digital hygiene checklist.
- Path: AI-Era Personal Strategy.