Wednesday, April 16, 2025

Polaris of Enlightenment

Ad:

What I wish I knew about privacy sooner

The hard truths no one warned me about.

Published 22 March 2025
– By Naomi Brockwell

I’ve been deep in the privacy world for years, but I wasn’t always this way. If I could go back, I’d grab my younger self by the shoulders and say: “Wake up. The internet is a battlefield of people fighting for your attention, and many of them definitely don’t have your best interests at heart”.

I used to think I was making my own decisions—choosing what platforms to try, what videos to watch, what to believe. I didn’t realize I was part of a system designed to shape my behavior. Some just wanted to sell me things I didn’t need—or even things that actively harm me. But more importantly, some were paying to influence my thoughts, my votes, and even who I saw as the enemy.

There is a lot at stake when we lose the ability to make choices free from manipulation. When our digital exhaust—every click, every pause, every hesitation—is mined and fed into psychological experiments designed to drive behavior, our ability to think independently is undermined.

No one warned me about this. But it’s not too late—not for you. Here are the lessons I wish I had learned sooner—and the steps you can take now, before you wish you had.

1. Privacy mistakes compound over time—like a credit score, but worse

Your digital history doesn’t reset—once data is out there, it’s nearly impossible to erase.

The hard truth:

  • Companies connect everything—your new email, phone number, or payment method can be linked back to your old identity through data brokers, loyalty programs, and behavioral analysis.
  • Switching to a new device or platform doesn’t give you a blank slate—it just gives companies another data point to connect.

What to do:

  • Break the chain before it forms. Use burner emails, aliases, and virtual phone numbers.
  • Change multiple things at once. A new email won’t help if you keep the same phone number and credit card.
  • Be proactive, not reactive. Once a profile is built, you can’t undo it—so prevent unnecessary links before they happen.

2. You’re being tracked—even when you’re not using the internet

Most people assume tracking only happens when they’re browsing, posting, or shopping—but some of the most invasive tracking happens when you’re idle. Even when you think you’re being careful, your devices continue leaking data, and websites have ways to track you that go beyond cookies.

The hard truth:

  • Your phone constantly pings cell towers, creating a movement map of your location—even if you’re not using any apps.
  • Smart devices send data home at all hours, quietly updating manufacturers without your consent.
  • Websites fingerprint you the moment you visit, using unique device characteristics to track you, even if you clear cookies or use a VPN.
  • Your laptop and phone make hidden network requests, syncing background data you never approved.
  • Even privacy tools like incognito mode or VPNs don’t fully protect you. Websites use behavioral tracking to identify you based on how you type, scroll, or even the tilt of your phone.
  • Battery percentage, Bluetooth connections, and light sensor data can be used to re-identify you after switching networks.

What to do:

  • Use a privacy-focused browser like Mullvad Browser or Brave Browser.
  • Check how unique your device fingerprint is at coveryourtracks.eff.org.
  • Monitor hidden data leaks with a reverse firewall like Little Snitch (for Mac)—you’ll be shocked at how much data leaves your devices when you’re not using them.
  • Use a VPN like Mullvad to prevent network-level tracking, but don’t rely on it alone.
  • Break behavioral tracking patterns by changing your scrolling, typing, and browsing habits.

3. Your deleted data isn’t deleted—it’s just hidden from you

Deleting a file, message, or account doesn’t mean it’s gone.

The hard truth:

  • Most services just remove your access to data, not the data itself.
  • Even if you delete an email from Gmail, Google has already analyzed its contents and added what it learned to your profile.
  • Companies don’t just store data—they train AI models on it. Even if deletion were possible, what they’ve learned can’t be undone.

What to do:

  • Use services that don’t collect your data in the first place. Try ProtonMail instead of Gmail, or Brave instead of Google Search.
  • Assume that if a company has your data, it may never be deleted—so don’t hand it over in the first place.

4. The biggest privacy mistake: Thinking privacy isn’t important because “I have nothing to hide”

Privacy isn’t about hiding—it’s about control over your own data, your own life, and your own future.

The hard truth:

  • Data collectors don’t care who you are—they collect everything. If laws change, or you become notable, your past is already logged and available to be used against you.
  • “I have nothing to hide” becomes “I wish I had hidden that.” Your past purchases, social media comments, or medical data could one day be used against you.
  • Just because you don’t feel the urgency of privacy now doesn’t mean you shouldn’t be choosing privacy-focused products. Every choice you make funds a future—you’re either supporting companies that protect people or ones that normalize surveillance. Which future are you contributing to?
  • Anonymity only works if there’s a crowd. The more people use privacy tools, the safer we all become. Even if your own safety doesn’t feel like a concern right now, your choices help protect the most vulnerable members of society by strengthening the privacy ecosystem.

What to do:

  • Support privacy-friendly companies.
  • Normalize privacy tools in your circles. The more people use them, the less suspicious they seem.
  • Act now, not when it’s too late. Privacy matters before you need it.

5. You’re never just a customer—you’re a product

Free services don’t serve you—they serve the people who pay for your data.

The hard truth:

  • When I first signed up for Gmail, I thought I was getting a free email account. In reality, I was handing over my private conversations for them to scan, profile, and sell.
  • Even paid services can sell your data. Many “premium” apps still track and monetize your activity.
  • AI assistants and smart devices extract data from you. Be intentional about the data you give them, knowing they are mining your information.

What to do:

  • Ask: “Who profits from my data?”
  • Use privacy-respecting alternatives.
  • Think twice before using free AI assistants that explicitly collect your data, or speaking near smart devices.

Final thoughts: The future isn’t written yet

Knowing what I know now, I’d tell my younger self this: you are not powerless. The tools you use, the services you fund, and the choices you make shape the world we all live in.

Take your first step toward reclaiming your privacy today. Because every action counts, and the future isn’t written yet.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

OpenAI may develop AI weapons for the Pentagon

The future of AI

Published 14 April 2025
– By Editorial Staff
Sam Altman's OpenAI is already working with defense technology company Anduril Industries.

OpenAI CEO Sam Altman, does not rule out that his and his company will help the Pentagon develop new AI-based weapon systems in the future.

– I will never say never, because the world could get really weird, the tech billionaire cryptically states.

The statement came during Thursday’s Vanderbilt Summit on Modern Conflict and Emerging Threat, and Altman added that he does not believe he will be working on developing weapons systems for the US military “in the foreseeable future” – unless it is deemed the best of several bad options.

– I don’t think most of the world wants AI making weapons decisions, he continued.

The fact that companies developing consumer technology are also developing military weapons has long been highly controversial – and in 2018, for example, led to widespread protests within Google’s own workforce, with many also choosing to leave voluntarily or being forced out by company management.

Believes in “exceptionally smart” systems before year-end

However, the AI industry in particular has shown a much greater willingness to enter into such agreements, and OpenAI has revised its policy on work related to “national security” in the past year. Among other things, it has publicly announced a partnership with defense technology company Anduril Industries Inc to develop anti-drone technology.

Altman also stressed the need for the US government to increase its expertise in AI.

– I don’t think AI adoption in the government has been as robust as possible, he said, adding that there will be “exceptionally smart” AI systems in operation ready before the end of the year.

Altman and Nakasone a retired four-star general attended the event ahead of the launch of OpenAI’s upcoming AI model, which is scheduled to be released next week. The audience included hundreds of representatives from intelligence agencies, the military and academia.

Don’t hit “Restore from backup” on your new device

A clean slate is better for privacy—and your peace of mind.

Published 12 April 2025
– By Naomi Brockwell

We all get a new computer or phone at some point. And when we do, there’s a screen that pops up: “Restore from backup?” One tap, and your whole digital life is right back where you left it. Easy, fast, familiar.

But what most people don’t realize is that restoring from backup doesn’t just bring back your apps. It reactivates years of old permissions, forgotten vulnerabilities, and tracking infrastructure that follows you from one device to the next.

It’s not a fresh start. It’s a rerun of your entire surveillance footprint.

Why you shouldn’t migrate everything

When you restore from a backup, you’re not just getting your apps and data—you’re reintroducing all your digital clutter. Here’s what comes with it:

  • App bloat
    Those one-off apps you installed become permanent squatters. Even if you’ve forgotten them, they could still be harvesting all your activities in the background, sending your data out to third parties.
  • Attack surface
    Every piece of software has vulnerabilities, and the more apps you install, the higher your security risk. Rather than transferring everything over, use this moment to think carefully about which apps are truly worth the added exposure.
  • Accounts and tracking
    Your Apple ID, Google account, or other login credentials build up a massive behavioral profile on you. A new device can also help you sever those old data pipelines. By starting fresh with a new account, you make it far harder for data brokers to link your future activity to the massive profile built under your old ID.
  • Ghost data
    Resetting from scratch also clears out “ghost data”: old settings, hidden config files, and leftover profiles you might not even realize you’re lugging around. Restoring from a backup can drag in outdated privacy defaults or security practices that no longer make sense. Plus, even uninstalled apps can leave behind bits of data—like login tokens or lingering preferences. Starting fresh ensures you’re adopting the newest, most secure configurations and leaving all that digital baggage behind.
  • Habit traps
    Sometimes we keep using apps just because they auto-restore, not because they actually serve us. Starting fresh is like a mini “reset”—you can ditch old routines and make room for better, more privacy-focused tools. Maybe there’s an app you’ve been curious to try but never got around to because your usual go-tos were already at your fingertips. A clean slate finally gives you that push to explore new options and live intentionally.
  • Mental bandwidth
    Clutter weighs us down—physically, mentally, and digitally. Fewer icons, fewer updates, fewer random notifications equals more headspace for the apps and tasks that truly matter.

Instead of dragging all that over, why not start with a clean slate?

7 smart moves when starting fresh

Here are seven clear, privacy-focused steps to help you make the most of your fresh start when setting up a new device:

    1. Start with essentials
      Install just the critical apps you truly can’t live without. Leave everything else off until you discover a real need for it.
    2. Use a browser
      Skip invasive native apps where you can. A privacy-friendly browser often demands fewer permissions and leaks less of your data.
    3. Pack light
      Think carefully about what needs to be on your phone 24/7. Not every app has to follow you everywhere—some can stay on a secondary device.
    4. Try privacy-focused alternatives
      While adding new apps, consider switching to more secure, privacy-respecting services. It’s a perfect time to level up your toolkit.
    5. Set up new accounts
      If you’re able, create fresh IDs instead of reusing old ones clogged with data exhaust. This cuts the thread linking your activity to outdated profiles. There might be costs associated with purchasing some new apps again, so decide if this is the right choice for you.
    6. Check permissions
      Pay attention to each permission request—location, contacts, camera—and limit or deny wherever possible. Don’t dish out unnecessary access.
    7. Be selective with backups
      Only migrate the essentials. Export contacts separately, store photos in a secure cloud, and keep old voice memos on a local drive if needed. Bringing less forward keeps your new device clutter-free.

Takeaways

Reclaiming your privacy isn’t about being perfect. It’s about making intentional choices. One of the easiest but most impactful things you can do is say no to restoring from backup.

This single decision sets the tone for your entire digital footprint. It gives you a clean slate. And it lets you rebuild on your terms.

Start with a handful of tools. Skip the bloat. Be picky about what gets installed and who gets your data.

It’s not about inconvenience—it’s about control. The digital world is filled with people trying to make decisions for you. Starting fresh is a way to take that power back.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

How to de-Google your phone

Your phone’s a tracking device. It's time to break free!

Published 5 April 2025
– By Naomi Brockwell

I’ve said it before, and I’ll say it again: our smartphones are incredible tools—but they’re also spyware magnets. Our smartphones constantly track us through apps, built-in radios, sensors, and the operating systems themselves. We carry these devices everywhere, giving them access to our location, cameras, microphones, and personal conversations. If privacy matters to you, it’s essential to plug these leaks.

Here’s the good news: you don’t have to ditch your smartphone to protect yourself. One of the biggest impacts I’ve made to transform my privacy is installing GrapheneOS on my phone.

What is GrapheneOS?

GrapheneOS is a mobile operating system designed specifically to protect your privacy and security. Unlike Android and iOS, it doesn’t share your data with Google or Apple. It’s currently the gold standard for privacy-conscious smartphone users.

7 steps to secure your phone with GrapheneOS

Step 1: Pick the right hardware

GrapheneOS is available exclusively on Pixel phones and tablets because Pixel meets Graphene’s strict security standards—especially the ability to relock the bootloader after installation. This prevents unauthorized OS modifications.

To choose the right Pixel, there are 2 websites I recommend:

Always pick a device that will get security updates for as long as possible.


Step 2: Purchase smart

Be extremely careful not to purchase a “variant device”, a modified Pixel typically tied to carrier contracts. These devices often have their bootloaders permanently locked—meaning you can’t unlock the bootloader to install GrapheneOS. Even if the carrier plan expires or the phone is later listed as “unlocked,” this restriction usually remains permanent.

To avoid issues:

  • Don’t buy Pixels bundled with carrier plans.
  • If buying refurbished or second-hand, explicitly confirm with the seller that the “OEM unlock” feature is enabled. (Note: “Carrier unlocked” and “OEM unlocked” are not the same thing.)

A locked bootloader makes installing GrapheneOS impossible, so verifying this before purchase is critical.

The most private way to buy your Pixel phone is in-store, using cash. Electronics retailers like Best Buy in the U.S. usually carry Pixel phones. Cash helps you maintain anonymity, since credit card purchases link your personal information directly to your device’s unique identifiers.


Step 3: Installing GrapheneOS

The installation may look daunting, but I’ve done it dozens of times—it’s quick, straightforward, and has an amazing web interface that makes it super simple:

grapheneos.org/install/web

We have a step-by-step tutorial you can follow along in our latest video:

How To DE-GOOGLE Your Phone!

The whole process usually takes under 20 minutes.


Step 4: Set up your phone

Here are some things I do when setting up my phone. These are just my preferences, so if you have a different setup, let others know in the comments!

  • In “Exploit Protections,” set your device to auto-reboot after 12 hours if not unlocked. This clears RAM (short-term memory), protecting encryption keys from theft.
  • Leave USB-C settings on “charging only when locked” to prevent unauthorized data access via USB.
  • Enable automatic shutdown of Wi-Fi and Bluetooth after 5 minutes of inactivity. This reduces location tracking.

Step 5: Install app stores

You don’t have to rely on the Google Play Store to get apps on your phone. Here are four alternative app stores I use:

  1. GrapheneOS built-in app store
  • Comes pre-installed on your Graphene device (just search “App Store”).
  • Includes essential default apps and optional sandboxed Google Play Services, if needed.
  1. Accrescent
  • Comes from the GrapheneOS community and offers privacy-focused apps.
  • Install via the built-in GrapheneOS app store.
  1. F-Droid
  • Provides free, open-source apps built directly from publicly available source code.
  • Installing apps through F-Droid simplifies managing updates compared to manually downloading individual APK files (but be aware that updates may be released more slowly through F-Droid due to its review and build process).
  • Install F-Droid directly from f-droid.org.
  1. Aurora Store
  • A privacy-friendly front-end for the Google Play Store, allowing you to download apps without linking them to a Google account.
  • Install Aurora via the F-Droid store.

Privacy Tip: Keep your installed apps to a minimum—the fewer apps, the smaller your digital footprint and the fewer vulnerabilities you’ll face.


Step 6: Use profiles to secure your apps

Apps installed within the same profile can detect each other and potentially communicate without you realizing. To prevent this, GrapheneOS lets you separate your apps into secondary profiles, each isolated from one another.

Why use secondary profiles?

  • Individual Security: Each profile has its own PIN and encryption key, significantly enhancing security.
  • Clearing Sensitive Data: Profiles can automatically reboot when you exit, wiping RAM and protecting sensitive data, like your 2FA or financial apps, from unauthorized access.

However, managing multiple profiles can add complexity, especially if you’re new to Graphene. Starting with a single profile is simpler, and many users prefer this initially.

How I set up my profiles:

  • Owner Profile: Minimal essentials (browser, VPN, app stores).
  • Daily Driver: Everyday apps (Signal, email, maps).
  • Sensitive Apps: Apps I keep offline unless needed (2FA, financial apps).
  • Invasive Apps: Less-private or rarely-used apps (Spotify, social media).
  • Google Play Services: Apps requiring Google’s services.
  • Sandbox Profile: Testing or higher-risk apps.

I recommend beginning with a single profile and gradually adding others as you find new use cases.

Setting up a secondary profile:

  • Go to Settings > System Users, and tap Add user.
  • For sensitive profiles, toggle off “Run in background” to enhance security.

Step 7: What about Google Play services?

You might be wondering: this article is called “DE-GOOGLE your phone”, so why even consider adding Google services back in?

Unfortunately, some popular apps won’t function unless Google Play Services is installed. Usually, Google Play Services is incredibly invasive, collecting large amounts of data with elevated system-level permissions. But here’s where GrapheneOS shines: it offers Sandboxed Google Play Services, which treats Google Play like any other app—restricted and isolated, without special privileges or deep system access.

If you must use apps that rely on Google Play, you can install this sandboxed version without compromising the privacy and security of your entire phone. For even more control, isolate Google Play Services within a secondary profile to prevent it from interacting with or detecting other apps across profiles.

This way, you get the functionality you need without letting Google take over your device.

Taking control of your digital privacy

Hopefully, this gives you a thorough idea of what your new GrapheneOS phone can do. Privacy doesn’t mean losing smartphone convenience; it means regaining control over your digital life.

GrapheneOS feels familiar to Android users, but without bloatware and surveillance. It’s proof that enjoying technology doesn’t require sacrificing privacy—it’s about making informed choices and using tools that protect rather than exploit you.

We have many more privacy resources available. Explore our playlist covering privacy-friendly apps, alternatives, and practical privacy strategies

Your smartphone doesn’t have to be a surveillance tool. With GrapheneOS, you’ve already taken a huge step toward protecting your data.

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

Genetics company files for bankruptcy – customer DNA may be resold

Published 4 April 2025
– By Editorial Staff
Users' DNA and data are at risk of ending up in the hands of notorious actors.

The testing company 23andMe has filed for bankruptcy – and now users are being warned that their DNA data could be resold. The California Attorney General and privacy experts are urging consumers to delete their information immediately to protect themselves.

23andMe is a US company that offers genetic testing to customers. It sends DNA through saliva samples, which are then analyzed to provide information such as heredity and origin.

The company has now announced that it has filed for bankruptcy to sell its assets. With the bankruptcy filing, the California Attorney General urged users to delete their data immediately or risk having it sold.

– I remind Californians to consider invoking their rights and directing 23andMe to delete their data and destroy any samples of genetic material held by the company, he said in a statement.

The 23andMe privacy policy reads: “If we are involved in a bankruptcy, merger, acquisition, reorganization, or sale of assets, your Personal Information may be accessed, sold or transferred as part of that transaction“.

“Delete, delete, delete”

The company has around 15 million people’s DNA in its databases and experts say the situation represents a privacy nightmare that could have cascading effects. A large number of similar services have flourished over the years, such as Ancestry and FamilyTreeDNA, and the uncertainty surrounding 23andMe’s data also highlights the risks of any genetic testing service.

– The DNA data could be used to discern your relatives and ancestry, unearth family secrets, and reveal clues about diseases you have or could be predisposed to. If the data makes its way to certain insurers, they may deny you coverage or charge you more for life, disability, or long-term care insurance because of your genetics, Ginny Fahs, director of product development for Consumer Reports Innovation Lab told The Washington Post, continuing:

– This is some of the most precious data that exists about you; you’re right to be concerned that it may be up for grabs.

Sara Geoghegan, senior advisor at the Electronic Privacy Information Center, also warns about user privacy and urges consumers to delete their data immediately.

– The fact that consumers can’t know all of the ways their data could be used is very harmful, says Geoghegan. Delete, delete, delete. Consumers should delete their accounts while they still can.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.