Life Kit Podcast: Easy Practices for Online Privacy
Episode Overview:
In the June 9, 2025 episode of NPR's Life Kit, host Marielle Segarra delves into the pressing issue of online privacy. Titled "Easy Practices for Online Privacy," the episode explores the types of personal data that reside on the internet, identifies who seeks this information and why, and provides actionable steps to safeguard one's digital footprint. Produced by Sam Yellow Horse Kessler, the episode features insights from Rebecca Skeet, COO of Black Girls Hack, and Megan Cox, a staff attorney at the Federal Trade Commission specializing in online privacy and data security.
1. The Ubiquity of Personal Data Online
Marielle Segarra opens the discussion by highlighting the pervasive nature of personal data on the internet. She emphasizes that anyone who uses the internet—essentially everyone listening to the podcast—has a wealth of personal information available online, ranging from full names and dates of birth to browsing habits and locations. Recent high-profile data breaches at companies like AT&T, Ticketmaster, Yahoo, Facebook, and National Public Data have compromised millions of private records, underscoring the vulnerability of personal information.
Quote:
“It seems like every day another company's admitting to a data breach.” (00:16)
Sam Yellow Horse Kessler shares his personal anxiety upon discovering the extent of his data exposure. Initially indifferent to his data's use, Sam’s perspective shifts as he becomes aware of how extensively his information can be exploited.
Quote:
“The more I learned about what people are using my data for and how they can access it, the more just like nervous I became like right in the pit of my stomach.” (01:07)
2. Who Wants Your Data and Why
Rebecca Skeet provides context on the entities interested in personal data, distinguishing between illegal and legal markets. Megan Cox elucidates the concept of "bad actors," primarily identity thieves and fraudsters, who misuse personal information for malicious purposes.
Quote:
“When we're talking about bad actors, we're talking about identity thieves and fraudsters.” (05:57)
Definition of Identity Theft:
Identity theft involves using someone’s personal or financial information without permission. This can include:
- Stealing names, addresses, credit card details, Social Security numbers, and more.
- Purchasing expensive items using stolen credit information.
- Opening new accounts or credit lines in someone else's name.
- Filing fraudulent tax returns to receive refunds.
- Utilizing health insurance for unauthorized medical services.
- Damaging credit scores, making it difficult to secure future credit.
Rebecca underscores the importance of protecting Personally Identifiable Information (PII) such as Social Security numbers by avoiding carrying them unnecessarily, destroying documents that contain them, and placing locks on SSNs through the Social Security Administration.
Quote:
“Identity thieves might buy expensive tech with your credit cards. They can open up new credit cards or new accounts in your name.” (06:24)
3. Takeaway 1: Understand the Risks and Assess Your Personal Risks
Before taking protective actions, it's crucial to understand the specific risks one faces. Megan Cox advises conducting a personal risk assessment to identify valuable assets and potential vulnerabilities.
Quote:
“Risk tolerance for someone who is an influencer, their risk profile is going to be different.” (07:59)
Rebecca emphasizes that anyone, regardless of their online presence, can be susceptible to identity theft. Understanding one’s unique digital footprint is the first step toward effective protection.
4. Takeaway 2: Don't Be an Easy Target – Adopt "Polite Paranoia"
Rebecca introduces the concept of "polite paranoia," a strategy of maintaining a healthy skepticism toward online interactions to protect personal information.
Quote:
“Polite paranoia is asking questions about how your data is going to be used, pausing and thinking twice before you hand anyone your PII.” (08:34)
Actionable Steps:
-
Use Password Managers: Tools like 1Password, LastPass, or NordPass help create and store strong, unique passwords for each account.
Quote:
“Password managers employ strong encryption and other security measures to protect your passwords.” (12:19) -
Enable Multi-Factor Authentication (MFA): Adds an extra layer of security by requiring a second form of verification beyond just a password.
Quote:
“The benefit of having that Two Factor Authentication in place is that even if someone were to get your password, they don't have that second factor.” (13:16) -
Take Nine Seconds: Before sharing any personal information online, take at least nine seconds to evaluate the request.
Quote:
“Take nine seconds at least to think over any requests for your data online.” (11:24)
5. Takeaway 3: Clean Up Your Digital Environment – Digital Spring Cleaning
Regularly decluttering your digital presence is akin to maintaining a clean living space. This involves deleting unused apps, managing browser extensions, reviewing privacy settings, and removing unnecessary accounts.
Actionable Steps:
-
Delete Unused Apps and Extensions: Removes potential vulnerabilities and reduces the amount of data accessible to third parties.
Quote:
“Delete unused apps, remove extensions, go through your accounts and web browsers and review your data and privacy settings.” (14:29) -
Use Antivirus Software and VPNs: Protect your devices from malware and ensure private browsing. Rebecca recommends ProtonVPN or NordVPN for robust privacy protections.
Quote:
“A VPN or a virtual private network is like a tunnel you can use to protect your data from anyone who wants to access it.” (17:08) -
Backup Devices and Dispose of Old Ones Securely: Ensures that personal data isn’t accessible if devices are lost or sold.
Quote:
“Back up your devices on an external hard drive and dispose of old devices securely.” (15:15) -
Use Credit Monitoring Services: Services like Deleteme or Incogni can help remove personal information from databases and monitor for suspicious activity.
Quote:
“If you are able to, consider a credit freeze. It keeps people from being able to access your credit report for creditors to open new accounts.” (15:58)
6. Takeaway 4: Don't Panic if Your Data is Breached – Respond Calmly and Effectively
Data breaches, while alarming, can be managed effectively with the right steps. Megan Cox advises consumers to remain calm and take immediate actions to mitigate potential damage.
Actionable Steps:
-
Monitor for Fraudulent Activity: Use resources like haveibeenpwned.com to check if your email has been involved in known breaches.
Quote:
“Websites like haveibeenpwned.com where you can enter your email address and see what breach has potentially been involved in.” (21:28) -
Freeze Your Credit: Prevents unauthorized access to your credit report, blocking new credit accounts from being opened in your name.
Quote:
“Credit freezes are free. Take only a few minutes and you can thaw them at any time.” (16:26) -
Report Identity Theft: File a report at identitytheft.gov to start a paper trail and receive guidance on mitigating effects.
Quote:
“If someone does attempt to use your personal information to impersonate you, you can file a report@identitytheft.gov and they will walk you through the next steps.” (21:08) -
Change Compromised Passwords: Immediately update passwords for any accounts that may have been breached.
Quote:
“If your information has not been misused yet, you don't necessarily need to make an FTC identity theft report, but you can still go to the website to learn about all those next steps.” (22:18)
7. Recap of Key Takeaways
-
Understand the Risks: Conduct a personal risk assessment to identify valuable digital assets and potential vulnerabilities.
-
Don't Be an Easy Target: Employ strategies like using password managers, enabling multi-factor authentication, and practicing polite paranoia to protect your data.
-
Clean Up Your Digital Environment: Regularly declutter your online presence by deleting unused apps, managing privacy settings, and using protective tools like VPNs and antivirus software.
-
Don't Panic if Breached: Respond calmly by monitoring for fraudulent activity, freezing your credit, reporting identity theft, and updating passwords.
Final Words from Sam Yellow Horse Kessler:
“Think of this like your home security. Not everyone needs round the clock guards and watchdogs. For most people, just taking common sense precautions can make you less of a target.” (22:26)
Conclusion
This episode of Life Kit serves as a comprehensive guide to navigating online privacy in an increasingly digital world. By understanding the risks, taking proactive measures to protect personal data, maintaining a clean digital environment, and responding effectively to breaches, listeners can significantly enhance their online security and peace of mind.
