Kool-Aid with Karan

Making Personal Privacy Accessible

Pillar of Value:

Train of Thought = Online Browsing

Audio accompaniment available here.

Our inner train of thought is the most personal piece of our identity. Our train of thought is not shared with anyone and dictates how we communicate and act. Internet browsing is the online version of your train of thought. The moment you open up your internet browser and type a query into a search engine, you are drawing a path of links and pages mapped across the internet. Over time this map begins to resemble our inner thought processes as we look online for answers to our questions. As with your inner train of thought, it is important to protect your online train of thought from others. The biggest threat to your personal internet browsing comes from entities tracking and collecting your online activity. Three of the biggest culprits are Google, Facebook, and Amazon. Online activity is tracked across websites by companies like Facebook, Google, and Amazon through certain types of cookies. Cookies tend to get a bad name in the privacy space because of the cross-site tracking capabilities of ones deployed by large data collectors like Facebook and Google. However, many cookies deployed on websites are just temporary stores of data and allow websites to function more smoothly and are relatively innocuous.

Read more...

Privacy is Inherently Personal

Every person desires a different level of privacy. What we feel is our desired level of privacy is tied to what we tie to our identity. The structure of our identity is held up by our pillars of value. These pillars do not only apply to the physical world, but the online world as well. Our online identities are as valuable as our physical identities. We communicate with our loved ones online. We pay our bills and taxes online. We apply for jobs online. We share our lives online. Just as we pick-and-choose what we value in the physical world, we pick-and-choose what we value in the digital world.

My hope is that the tools I present can help you protect those pillars most valuable to you. Not every tool needs to be used. But as with everything, being prepared means knowing what tools you have in your toolbox. Your values may change and as such the tools you use to protect them will be needed.

We use Google, Facebook, Amazon, Microsoft, and other companies’ products for a reason. They’ve created synergistic environments with convenience and ease of use as their number one priority. However, the cost of this convenience is our privacy.

Reclaiming your online identity from these companies is a difficult journey. My goal is to make that journey as smooth as possible.

Enter your email to subscribe to updates.