Extreme Personal Privacy 1



Personal Privacy Strategies for Extremely Busy People

What you will learn

Regain control of your physical and online privacy from prying eyes and a wide range of treat actors.

Protect yourself against harassers, stalkers, and trolls and others who may seek to do you harm or otherwise exploit you and your information.

Remove your personally identifying information from the internet and reduce your digital footprint.

Compartmentalize important aspects of your life — family, work, your public persona, and finances — to minimize exposure and risks to what’s important to you.

Learn actionable strategies for extreme medical and healthcare privacy to protect your personal information and health choices from unwanted surveillance.

Description

Extreme Personal Privacy 1 will show you how to take back control of your privacy and safety. Using clear, concise language and providing step-by-step instructions, this course provides actionable tactics, techniques, and procedures for protecting:


  • Your personal and professional lives;
  • Your home and vehicle;
  • Removing your personal information from the internet and from data brokers;
  • Your computer and cellphone, email, and social media;
  • Money matters, Healthcare Privacy, School, Shopping, Travel; and
  • Relationships and life events
  • We’ll also discuss specific strategies for obtaining burner phones and other anonymizing tools and resources.

Extreme Personal Privacy 1 draws upon the book Get Lost: Personal Privacy Strategies for Extremely Busy People, written by privacy experts Daniel Farber Huang and Theresa Menders, who teach this course.

There are invisible threats to our privacy that we need to be aware of, such as the marketing firms and data science consultants that seek to shape our buying habits and voting behaviors. Or government agencies exercising broad authority and surveillance abilities on its citizens. Or criminals (both organized and unorganized) that want our personal information to commit credit card fraud or enact other crimes against us. More directly and immediately, extreme personal privacy may be fundamentally necessary to protect lives from abusive former partners, disgruntled employees, stalkers, internet trolls, or any other number of focused and determined threat actors that may seek to do some of us personal harm.


Since you’ve spent the last 60 seconds reading up to this point, we are going to infer that you have been thinking about privacy issues, likely your own but perhaps also that of people whom you care about. Extreme Personal Privacy 1 provides a comprehensive framework to give you significant control over your privacy, what information you choose to share with the outside world, and what information you choose to keep secure and protected. The goal of this course is to provide concise and actionable tactics, techniques, and procedures that you can employ.

We used to distinguish between the online world and the real world but that’s not accurate anymore. There are online threats that are very real to their victims. There is such an overlap and merging of both worlds that in this book we have changed our terminology to the physical world and the online world. Some actions we discuss will protect you in the physical world while others protect you online. Because the line between our physical and digital worlds continues to narrow, it is imperative to take control of both sides.

Also available on Udemy is the follow-on course, Extreme Personal Privacy 2 – Advanced Tactics, which provides detailed strategies and resources to actively defend against specific types of threat actors who may seek to violate your privacy and do you harm. Important topics include:

  • Defend Against Physical World Threat Actors (such as stalkers, harassers, criminals)
  • Defend Against Online Threat Actors (such as internet trolls and online abusers)
  • Combatting Non-Consensual Pornography (also known as “Revenge Porn”)
  • Extreme Healthcare Privacy Tactics (protecting your identity and privacy when researching or obtaining sensitive healthcare services, including reproductive healthcare services)
  • Protecting Minors from Abuse (including in-depth discussions and recommendations on preventing bullying, sexual abuse, and sextortion of minors)
  • Developing a Working Alias (including developing an alternate identity, establishing an LLC and obtaining credit cards and other resources to mask your identity from prying eyes and the public).
English
language

Content

Introduction

Introduction
Course Overview
Action Plan Overview

The Privacy You Deserve

Overview of this Section
The Privacy You Deserve
Threats to Your Privacy
Why Your Digital Privacy Matters
Privacy Tactics, Techniques, and Procedures
Who are YOU?

Your Physical Privacy

Overview
Your Physical Home
Your Physical Home – Product Guide
Your Digital Home
Personal Privacy in the Outside World
Personal Privacy in the Outside World – Case Studies
Personal Privacy in the Outside World – Product Guide
Your Vehicle
Your Vehicle – Product Guide

Online and Digital Privacy

Overview
Your Computer
Browse and Search More Privately
Your Cellphone – Part 1
Your Cellphone – Part 2
Your Data for Sale
Compartmentalize Your Life
Burner Phone Numbers
Start Fresh with an Unassigned Cellphone – Part 1
Start Fresh with an Unassigned Cellphone – Part 2
Email
Case Studies in Photo Privacy – Overview
Case Studies in Photo Privacy – Case #1
Case Studies in Photo Privacy – Case #2
Case Studies in Photo Privacy Case #3
Case Studies in Photo Privacy – Conclusion
Social Media

Living Your Life

Overview
Money Matters – Part 1
Money Matters – Part 2
Money Matters – Product Guide
Healthcare Privacy – Part 1
Healthcare Privacy – Part 2
Healthcare Privacy – Part 3
School and Academics
Work and Professional Life
Work and Professional Life – Case Studies
Shopping and Services
Travel
Travel – Product Guide
Relationships
Life Events

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO

Check Today's 30+ Free Courses on Telegram!

X