Head of Information Security Department and Principal Cybersecurity Architect at ScienceSoft
Answered 10 months ago
Hello! Thank you for the opportunity to respond to your request. I'm Dmitry Kurskov, Head of Information Security Department and Principal Cybersecurity Architect at ScienceSoft. Below you'll find my and my colleague's Antonia Horbach, Senior Business Analyst at ScienceSoft, input: Your question: How do you personally minimize the collection of your personal data online? Share one specific strategy or best practice. The best way to minimize the collection of personal data online is to use privacy-focused services, for example: - Search Engines: DuckDuckGo, Startpage, Mojeek. - Email Providers: ProtonMail, Tutanota, Mailbox.org. - Cloud Storage: Tresorit, Sync.com, Internxt. - Messaging Apps: Signal, Session, Threema. My additional recommendations are to avoid social login, steer clear of quizzes, free surveys, and giveaways that request personal information, restrict app permissions (location, microphone, contacts) in mobile settings, and use privacy tools and add-ons like uBlock Origin and Privacy Badger. Here is Antonia's input: The best strategy to minimize the collection of personal data online is to use only reputable apps that were designed with privacy in mind from the start. To gauge an app's reputability, check if the company that developed it provides a transparent and detailed privacy policy, has security management certifications (e.g., ISO 27001) or other proofs of independent audits, and maintains a positive image across its industry's community. Such apps collect only the data that is strictly necessary for the intended purpose, securely delete any information that is no longer needed, and substitute sensitive identifiers with tokens wherever possible. Besides, they use data redaction techniques, such as displaying only the last four digits of a credit card or masking phone numbers, which helps further reduce exposure. In addition, reputable software development companies usually conduct regular data audits and apply role-based access controls within their software systems to ensure that even the minimum necessary data required for an app's function is appropriately managed and protected. Should you need any additional information or have further questions, I'm readily available to assist. Hope to hear back from you soon!
I delete accounts I don't use (so there are fewer platforms where my personal info can be found and breached) and unsubscribe from the newsletters I don't read (so companies don't benefit from my data and don't sell it further). It would take forever to do this manually, so I co-founded Yorba - a startup that makes it easy to spot and get rid of old accounts, mailing lists, etc.
One simple but powerful strategy I use is compartmentalized browsing with multiple profiles and privacy extensions. I've got one Chrome profile strictly for banking and sensitive tasks, another for casual browsing, and one for social media and work logins. Each one has its own set of cookies, permissions, and even extensions—like uBlock Origin, DuckDuckGo Privacy Essentials, and Privacy Badger. This setup keeps trackers from stitching together a full picture of my behavior across the web. If I search for a flight on one profile, I don't suddenly see travel ads on another. It's not just about avoiding creepy targeting it's about creating control over how your digital identity is stitched together. And when I really don't want to leave a trace? I hit Firefox with hardened privacy settings or Tor for good measure. You don't have to disappear from the internet to take back some privacy you just have to stop making it easy.
One simple but powerful strategy I use to minimize personal data collection is creating burner email addresses for non-essential signups. I use a custom domain with catch-all email forwarding, so every service gets a unique address (like amazon@mydomain.com or newsletter@mydomain.com). If I start getting spam or notice data misuse, I instantly know where it leaked and I can shut it down without affecting my primary inbox. This approach has saved me from endless tracking, targeted ads, and even a phishing attempt or two. It's like giving out decoys to protect the real you online. Plus, it makes companies think twice when they know they're not dealing with a throwaway Gmail.
One of the most effective strategies I use to minimize personal data collection online is maintaining two entirely separate browser environments—one for "logged-in life" and one for "anonymous research mode." It's not just incognito; it's fully siloed. In practice, I use a hardened Firefox profile with all tracking protection maxed out and no logins for anything research-related—searches, news browsing, testing client competitors, etc. Then I keep Chrome for accounts where I need personalization (like Google Docs, Slack, or Notion). Each environment runs in its own container, with extensions like uBlock Origin, Privacy Badger, and LocalCDN keeping trackers out. The key insight? Most data collection isn't from the creepy one-offs—it's the slow bleed of being logged into Google, Meta, or Amazon while doing something completely unrelated. This setup dramatically limits cross-site tracking and fingerprinting while still keeping workflow efficient. If you want to cut your data exposure without going full tinfoil, start by separating your research from your logins. It's a small shift that pays off fast in both privacy and mental clarity.
Having led multiple SaaS companies, I've seen both sides of data collection, how valuable it is for businesses, and how quietly invasive it can be for individuals. So I've gotten very intentional about reducing the digital exhaust I leave behind. For me, my strategy has been containerizing my online behavior. I separate my activity across different browsers and devices based on purpose. Work has its own environment. Personal browsing happens somewhere else. And anything that might invite tracking, from shopping to testing out AI tools, gets isolated entirely. This limits the cross-pollination of cookies, trackers, and behavioral profiles, because those systems thrive on blending data streams. If you don't give them the overlap, they lose a lot of their predictive power.
Personal data earns no yield, so I treat it like idle cash and keep it off my books. My chief tactic is single-use virtual payment cards. The bank's API lets me mint a fresh 16-digit number, its own CVV, and a hard limit equal to the invoice plus five percent the moment I check out. The token is locked to that merchant, so a dark-web thief cannot reuse it, and the processor never shares my real account or billing address with downstream aggregators. I pair the card with a masked email alias generated on my domain registrar and a parcel-locker shipping address. The trio severs the link between purchase history, identity, and location. At month-end I bulk-revoke every active token; any site trying to bill again receives an instant decline that alerts me to hidden subscriptions. The discipline mirrors treasury work: isolate risk, cap exposure, reconcile fast.
One practical strategy is using email aliases when signing up for new services. Tools like Apple's "Hide My Email" or services like Firefox Relay let you create unique addresses that forward to your real inbox. That way, if one gets spammed or leaked, it can be disabled without touching your main email. It helps keep personal info from being tied together across platforms—and cuts down on targeted ads and data profiling.
One strategy I personally use to minimize the collection of my personal data online is relying on masked email addresses when signing up for services, especially ones I don't use often or fully trust. I use a service that generates unique email aliases that forward to my real inbox. That way, if a company starts spamming or shares my information, I can disable that specific alias without affecting my main email. As a business owner who uses a CRM for managing customer relationships, I understand the value of data, but I also respect the importance of privacy. Using email masking gives me more control over who has my contact info and helps prevent it from being resold or misused. It's a small habit, but it goes a long way in cutting down on unwanted exposure and keeping my personal inbox secure.
One strategy I personally use to minimize the collection of my data online is running all my browsing through a privacy-focused browser with tracker blocking—like Brave or Firefox with uBlock Origin. It's a simple switch, but it cuts down on third-party trackers and hidden scripts that collect data behind the scenes. I also make it a habit to regularly clear cookies, use private browsing for certain sites, and avoid signing in with Google or Facebook unless absolutely necessary. These small steps help keep more of my data in my hands.
I never input any personal data into any AI tools - AI chatbots, AI search engines, generative AI tools, etc. You cannot be certain of how AI handles the data you give it. It may not be effectively destroyed and discarded, and instead it could be sold, stored in an un-secure manner, or intercepted by bad actors.
My most effective strategy for minimizing personal data collection is using separate, dedicated email addresses for different purposes - especially crucial in healthcare where patient privacy is paramount. I maintain distinct emails for my Direct Primary Care practice, business communications, and personal use, which prevents data brokers from building comprehensive profiles across platforms. For my DPC practice, I use privacy-focused tools like ProtonMail and encrypted messaging systems that don't harvest patient communication data for advertising. I also regularly audit and delete accounts from services I no longer use, particularly health-related apps and platforms that could compromise patient confidentiality. The key is treating your digital footprint like patient medical records - compartmentalized, encrypted, and accessible only on a need-to-know basis. When healthcare providers take data privacy seriously in their own lives, they're better equipped to protect patient information from the surveillance capitalism that's invaded healthcare. That's how care is brought back to patients.
Using separate browsers for different online activities to minimize cross-site data correlation. My primary browser handles only professional activities with strict privacy settings, while a secondary browser manages personal browsing with different privacy configurations. This separation prevents advertisers from building comprehensive profiles connecting my professional research with personal interests. The implementation involves using Firefox with privacy-focused extensions for work activities and Chrome for personal browsing, each configured with distinct cookie policies and tracking protections. Additionally, I regularly clear browsing data and use incognito mode for sensitive searches. This approach significantly reduces the data correlation that makes online tracking so effective - advertisers might track my professional research or personal browsing separately, but they can't easily connect these data streams to create comprehensive behavioral profiles. The key insight is that data separation often provides better privacy protection than attempting to block all tracking completely.
VP of Demand Generation & Marketing at Thrive Internet Marketing Agency
Answered 10 months ago
My most effective data minimization practice involves using email aliases for every online service rather than providing my primary email address. I create unique email addresses for different service categories - shopping, subscriptions, professional networking, and financial services - which allows me to track exactly how my information is being shared and sold between companies. This approach reveals which companies sell contact information to third parties and enables precise control over data flow. When I start receiving emails at an alias I only used for one specific service, I know exactly which company shared my information. The system also allows selective data cleanup - I can delete entire email aliases when services become problematic without affecting other accounts. Beyond privacy benefits, this strategy provides valuable intelligence about data sharing practices that most users never discover. The practical insight is that data minimization requires proactive information architecture rather than reactive privacy measures.
What I believe is that the easiest and most effective way to minimize personal data collection is to cut it off at the source, your browser. I use Firefox with privacy-first extensions like uBlock Origin, Privacy Badger, and containers for sites like Facebook or Google so they cannot track activity across tabs. One specific habit that makes a difference is using different email aliases for different services through tools like SimpleLogin. That way, if a company sells my data or there is a breach, I know exactly where it came from and I can cut off just that alias. I also block third-party cookies by default and regularly audit app permissions on my phone. It is not about paranoia. It is about reducing passive surveillance so my data footprint stays as small and intentional as possible. Most tracking is silent. You have to block it before it starts.
Marketing taught me that data brokers never stop unless you tell them, in writing, to forget you. Each quarter I send formal opt-out and deletion requests to the 40 largest U S consumer-profiling firms. A short script populates template letters with my unique case IDs, attaches proof of identity, and fires them off via certified email. The firms have 30 days under CCPA or state equivalents to erase stored attributes and halt resale. Completed confirmations are archived in a privacy ledger; non-responses trigger a follow-up complaint to the state attorney general. The routine takes an hour per year yet materially thins the dossier advertisers can build, as the same aggregators supply thousands of downstream services. Fewer brokers holding my demographic and behavioral data means fewer ad networks can target me, or my clinic, through look-alike modeling.
My public-health work demands constant literature reviews on sites packed with tracking scripts. I protect myself with a purpose-built privacy browser profile. Inside hardened Firefox I enable Total Cookie Protection, block third-party JavaScript by default, strip referer headers, and force DNS-over-HTTPS. Add-ons such as uBlock Origin and Cookie AutoDelete erase identifiers the moment a tab closes. Because the profile never stores logins or history, each session begins clean, yet I still keep a separate mainstream browser for services that genuinely need personalization, preventing cross-site stitching. The result is seamless access to journals and EHR dashboards while shutting down the silent hand-off of my browsing data to ad networks and analytics firms.
We've found that using email aliases is one of the easiest ways to reduce how much of our personal data gets collected online. For anything that's not mission-critical like signing up for tools, newsletters, or free trials, we create unique aliases like "trial@" or "news@." It helps us spot when a service starts sharing our data, because we can trace where spam is coming from. And if one alias gets noisy or compromised, we just disable it no impact on our main inbox. This habit has not only reduced spam dramatically, but it also makes us more aware of the value of user privacy in our own marketing efforts. When you see how often your own data gets passed around, you start thinking twice before asking others for theirs.
I once had a client panic in my backseat because her ride-sharing app history showed locations she'd never visited. That moment changed how I manage data. As the owner of Mexico-City-Private-Driver.com, I've made it a personal and professional mission to reduce reliance on platforms that track users excessively. My main strategy is this: I never use my personal email to sign up for services or newsletters—only burner aliases linked to a custom domain. Every online service I use gets its own email alias (e.g., uber@mydomain.com, airbnb@mydomain.com), so I know exactly who's leaking or selling my data. This small shift has helped me avoid 95% of spam, track shady platforms, and stay in control. As someone who books hundreds of routes per month for international clients—including embassy staff, CEOs, and families with kids—privacy isn't a bonus; it's essential. And yes, I apply the same rigor to our internal systems: clear pricing, no tracking cookies, and no client data resold or reused. Data privacy is trust—and in my line of business, that's what people pay for.
Outreach work puts me in airports and hotel lobbies, so I travel with a "stateless" Chromebook that never stores user data across sessions. I boot in Guest mode, access files through a zero-knowledge cloud vault, and authenticate critical services with a hardware-based U2F key. Once the lid closes, the OS wipes all cookies, downloads, and browsing history. No local profile exists for malware to lift, and public-Wi-Fi operators see only an ephemeral device ID coupled with a VPN exit node, not my home IP. Back at headquarters I hand the unit to IT for a power-wash and version check, then start fresh on the next trip. The disposable-device model insulates my primary workstation, and our patient records, from any tracking pixels or malicious captive portals encountered on the road.