If you were the lead on a project for a company and a vicious competitor happened to find out that you were a recovering alcoholic, what would happen if they waited until the wife and kids were out of town for the weekend and they left a wine sampler on your doorstep?

What if your neighbor secretly hated you for something they never bothered to tell you so they waited until you were on vacation and posted a prank ad in the paper that everything in your house was free for the taking.

You might be amazed at how much trouble you can cause for someone if you know enough about them. Think about the movies where a group of people face impossible odds to rescue hostages, rob a bank, or other fantastic feat. The only way they're able to pull it off is because they already know all the security, the layout of the buildings, the defensive measures etc.

Just like in the movies, the more someone knows about you, the easier it is for them to manipulate or destroy you. Don't let that happen! Learn that your information is important and it should be protected.

The Basics

The Geek Privacy Principle: an argument for why you should choose to keep information to yourself most of the time.
Ever heard someone say they have Nothing to Hide? Learn why that's such a bad thing and what you can say in response when you hear it.

Current Dangers to Privacy

Data Abuse - Companies buy and sell all kinds of data about you from the foods you like to the color of your hair to the names and ages of your kids.
RFID - Radio Frequency IDentification - Companies are beginning to use tiny radio transmitters on products and in clothing to track your movements and add it to their profiles on you for marketing purposes.

Protecting Your Privacy

Build a Privacy Alias/Persona to give to people or organizations you don't trust.
Data Defense - Learn how to keep your information to yourself.
How to Steal Identities - Why It's So Easy
Credit Freeze
Data Defense
Credit Monitoring
Id Theft Insurance
The Identity Theft Victim's Mini-Guide to Recovery
The Geek Privacy Principle
Nothing to Hide
Data Abuse
RFID - Radio Frequency IDentification
Privacy Alias/Persona
Data Defense
Online Addiction
The Consequences of Posting Online
Photo Safety
Tricks and Scams
Account Hijacking
Trusting Companies
Bad Passwords
Password Tips and Tricks
Password Protection
Password Mugging
Computer Security
E-mail Safety
Kids and Computers
Shopping Online
All About Warranties

The Geek Privacy Principle

The most basic principle of privacy is to be able to choose who knows what about you and when. The Geek Principle describes why you should choose by default not to share information.

[Click for full description]

Nothing to Hide

Do you say "I have nothing to hide" or do people you know say it to YOU? Read this tutorial about why no one should ever say they have nothing to hide again.

[Click for full description]

Data Abuse

Learn how your data is taken from you and used against you by large companies for their own benefit.

[Click for full description]

RFID - Radio Frequency IDentification

One of the most risky technology when it comes to your privacy is Radio Frequency Identification Tags (RFID). These radio chips broadcast your identity sometimes hundreds of feet and can be found in passports, farecards, credit cards, and even some clothing.

[Click for full description]

Privacy Alias/Persona

Sometimes you are required to give away information to be able to get service, but you know the company has no real need of your data other than to share and sell it. In these cases, having a personalized alias comes in handy.

This guide will explain in more detail why you should have one and how to create it.

[Click for full description]

Data Defense

One of the most important, but least understood, threats against us today is the creeping data-abuse by companies seeking to compile complete profiles on every American in order to enable "targeted marketing".

Until laws are in place to control their use of your data, learn the tips and tricks to make it harder for them while improving your identity-theft defense at the same time.

[Click for full description]