Remove yourself from data broker databases.

Razormind · Tuesday

Protecting Your Personal Information

Data brokers collect, package, and sell your personal information. This data can be used for marketing, analytics, and to train artificial intelligence systems. Taking control of this information is a foundational step in managing your digital privacy. This guide provides a direct process for removing your data and preventing its future collection.


Part 1: The Manual Removal Process

Removing your data manually is possible, and INCREDIBLY SATISFYING.

What you need:

  • a notebook and pencil
  • some time to yourself

Step 1: Identify Key Data Brokers

Start by targeting the largest brokers and people-search websites. Your information is likely held by dozens of them, but these are critical starting points. The trick here - from someone who's had to wade through these - is to realise they form 'trees' and networks. If you knock out one, it will weaken the others but they exist in a sort of hierarchy where if you get the bigger ones then the others become more like picking out weeds in your lawn rather than a dense endless forest which needs chopping down. So grab a cup of coffee and your chainsaw - I mean notebook. Lets go!

  • Major Data Aggregators: These are some of the largest brokers that supply data for marketing and risk analysis. Obviously run your own search.
    • Acxiom - Harvestor
    • Oracle - Database company
    • Epsilon - Harvestor
    • Experian - Credit Bureau
    • Equifax - Credit Bureau

You see the pattern, right? Companies that build and sell personal profiles, and other companies that judge whether you have money/can pay. The data these people have on file can make or break your life in heart wrenching ways. You could be denied entry into countries, denied the ability to buy a house, or take out a loan, or even entry into a job. It's your life, and your data. Better to have a few difficult conversations about them removing your data now, than a lifetime of near missing and dissapointments and missing out.

  • People-Search Sites: These sites display your information publicly.
    • Whitepages
    • Spokeo
    • BeenVerified
    • Intelius
    • MyLife (now part of BeenVerified)

These companies are offshoots. Branches lying around after you've chainsawed the trunk of the major data aggregators.

Step 2: Find and Remove Your Profiles

Each broker has a unique opt-out process.

  1. Search for Yourself: Visit each people-search site and search for your name and location. You will likely find a profile containing your address history, phone numbers, and relatives.
  2. Locate the Opt-Out Page: On the broker's website, look for a link in the footer titled "Do Not Sell My Personal Information," "Privacy," or "Opt Out." This page contains the instructions and forms for removal.
  3. Submit Removal Requests: Follow the specific instructions for each site. This usually involves filling out a form, finding your specific profile listing, and verifying your identity via an email address.
  4. Keep Records: Document each removal request. Take a screenshot of the confirmation page or save the confirmation email. Check back in a few weeks to ensure your profile has been removed.

Part 2: Automated Removal Services

For a more efficient approach, you can use a paid subscription service to manage the removal process for you. These services handle the complexity of dealing with hundreds of brokers.

  • How They Work: You provide your information to the service, and it sends opt-out requests on your behalf. It then monitors these sites to ensure your data stays removed.
  • Recommended Services:
    • DeleteMe: A comprehensive service that provides detailed reports on which brokers held your data and when it was removed.
    • Kanary: Scans thousands of sites and automates the removal process with a clear dashboard.
    • Incogni: Focuses on enforcing legal privacy rights (like GDPR and CCPA) to compel brokers to delete your data.

Using a service automates a time-consuming task and provides ongoing protection as data brokers re-acquire information over time.

IMPORTANT: These follow the Iron Rule of Rust, or in layperson's terms: diminishing returns. Subscribe monthly for three months. After they've knocked out the majority of these listings, save your money and don't feed the aggregators any more. Got it? Good.


Part 3: Preventing Future Data Collection

Removing your data is the first step. The next is to reduce the amount of new data you generate.

Adjust Your Operating System Settings

Limit the data your devices share.

  • On iPhone & iPad: Go to Settings > Privacy & Security > Tracking. Turn off Allow Apps to Request to Track.
  • On Android: Go to Settings > Security & privacy > Privacy > Ads. Tap Delete advertising ID.

Configure Your Web Browser

Control how websites track you.

  1. Block Third-Party Cookies: In your browser’s privacy settings (Safari, Chrome, Firefox), select the option to block all third-party cookies. This prevents advertisers from tracking you across different websites.
  2. Enable "Do Not Track": In the same privacy settings, enable the "Global Privacy Control" or "Do Not Track" signal.
  3. Use a Privacy-Focused Browser: Consider using Brave or Firefox, which offer stronger default protections against tracking than other browsers.

Adopt Safer Online Habits

Be mindful of the information you share.

  • Use Aliases: Use a secondary email address and a voice-over-IP phone number (from a service like Google Voice) for online shopping, mailing lists, and non-essential accounts. This protects your primary contact information.
  • Limit Social Media Sharing: Set your social media profiles to private. Avoid sharing sensitive information like your full birthdate, home address, or phone number in public posts.
  • Think Before You Post: Information posted on public forums, websites, and social media can be scraped and added to databases. Once public, it is difficult to remove.

Deeper Dive

Let's get your life back under your ownership, and your control.

This guide provides systematic instructions to remove your personal information from data broker databases. The process requires 6-8 hours initially and ongoing quarterly maintenance.

Preparation Phase

Information Gathering

Create Removal Tracking Spreadsheet

Columns needed:

  • Broker name
  • URL
  • Date requested
  • Confirmation number
  • Follow-up date
  • Status
  • Notes

Document Your Information Variants

List all variations of:

  • Current and previous names
  • Current and past 10 years of addresses
  • Email addresses
  • Phone numbers
  • Birth month/year (not full date)

Set Up Dedicated Email

  1. Create new email solely for opt-outs
  2. Use ProtonMail or similar privacy-focused service
  3. Format: [[email protected]]

Required Documents

Prepare Digital Copies

  • Driver's license (redact license number)
  • Utility bill (redact account numbers)
  • Create PDF with watermark "For Opt-Out Purposes Only"

Major Data Brokers

Tier 1: Immediate Removal Priority

Acxiom

  1. Visit optout.acxiom.com
  2. Enter email address
  3. Search by name and state
  4. Select all records matching you
  5. Submit removal request
  6. Confirmation within 24 hours
  7. Processing: 5-7 business days

Spokeo

  1. Visit spokeo.com/optout
  2. Search your name
  3. Copy URL of your listing
  4. Enter URL and email
  5. Confirm via email link
  6. Processing: 3-5 business days

Whitepages

  1. Visit whitepages.com/suppression-requests
  2. Search your name
  3. Copy profile URL
  4. Paste URL in opt-out form
  5. Enter reason: "Privacy concerns"
  6. Verify via phone call (automated)
  7. Processing: 24-72 hours

BeenVerified

  1. Visit beenverified.com/f/optout/search
  2. Search your information
  3. Find your listing
  4. Click "Remove this record"
  5. Email verification required
  6. Processing: 4-7 business days

Intelius

  1. Visit intelius.com/opt-out
  2. Enter name, city, state, age
  3. Find your listing
  4. Submit removal form
  5. Confirm via email
  6. Processing: 5-7 business days

Tier 2: Secondary Priority

PeopleFinders

  1. Visit peoplefinders.com/opt-out
  2. Search yourself
  3. Select record
  4. Complete web form
  5. Processing: 3-5 business days

TruthFinder

  1. Visit truthfinder.com/opt-out
  2. Search for record
  3. Email [email protected] with:
    • Subject: "Opt-Out Request"
    • Full name
    • City, state
    • Age
    • Listing URL
  4. Processing: 5-10 business days

InstantCheckmate

  1. Visit instantcheckmate.com/opt-out
  2. Enter your information
  3. Email required
  4. Phone verification
  5. Processing: 48 hours

USSearch

  1. Email [email protected]
  2. Subject: "Opt-Out Request"
  3. Include full name and state
  4. Previous addresses helpful
  5. Processing: 7-10 business days

PublicRecordsNow

  1. Visit publicrecordsnow.com/static/view/optout
  2. Search your name
  3. Click record to remove
  4. Email verification
  5. Processing: 3-5 business days

Tier 3: Aggregator Sites

MyLife

  1. Call 1-888-704-1900 (only method)
  2. Press 2 for customer service
  3. Request complete removal
  4. They will require:
    • Full name
    • Current address
    • Date of birth
  5. Get confirmation number
  6. Processing: 7-10 business days

Radaris

  1. Visit radaris.com/control/privacy
  2. Search yourself
  3. Click "Control Information"
  4. Create account (required)
  5. Request removal for each listing
  6. Processing: 48 hours

PeopleLooker

  1. Visit peoplelooker.com/f/optout/search
  2. Find your listing
  3. Complete opt-out form
  4. Email confirmation required
  5. Processing: 3-5 business days

FastPeopleSearch

  1. Visit fastpeoplesearch.com/removal
  2. Find your listing
  3. Copy the URL
  4. Submit URL in form
  5. No email required
  6. Processing: 24-48 hours

Specialized Data Brokers

Financial Data Brokers

LexisNexis

  1. Visit optout.lexisnexis.com
  2. Fill comprehensive form
  3. Upload ID (redacted)
  4. Submit via secure portal
  5. Processing: 15-30 business days

CoreLogic

  1. Visit corelogic.com/privacy
  2. Download opt-out form
  3. Email to [email protected]
  4. Include ID copy
  5. Processing: 30 days

Marketing Data Brokers

Epsilon

  1. Visit epsilon.com/us/consumer-preference-center
  2. Enter information
  3. Select "Remove my data"
  4. Email verification
  5. Processing: 10 business days

Oracle Data Cloud

  1. Visit oracle.com/legal/privacy/privacy-choices
  2. Click "Consumer Choices"
  3. Submit email
  4. Follow instructions sent
  5. Processing: 30 days

Experian Marketing

  1. Visit experian.com/privacy/opting-out
  2. Complete online form
  3. Or mail to: Experian Opt-Out P.O. Box 919 Allen, TX 75013
  4. Processing: 30 days

People Search Engines

Pipl

  1. Visit pipl.com/privacy
  2. Email [email protected]
  3. Subject: "Remove My Information"
  4. Include profile URLs
  5. Processing: 14 days

ZoomInfo

  1. Visit zoominfo.com/privacy-center
  2. Submit removal request
  3. Email verification
  4. May require LinkedIn verification
  5. Processing: 10 business days

Automated Removal Services

When to Consider

Use if:

  • Limited time available
  • Ongoing monitoring needed
  • Comfort with sharing data

Service Options

DeleteMe

  • Cost: $129/year
  • Removes from 45+ brokers
  • Quarterly reports
  • Human review

OneRep

  • Cost: $8.33/month
  • 196 sites covered
  • Monthly monitoring
  • API automation

Privacy Bee

  • Cost: $197/year
  • 200+ sites
  • Browser extension included
  • Manual verification

Browser Configuration for Opt-Outs

  1. Allow all cookies temporarily
  2. Many sites require cookies to process opt-outs
  3. Clear after completion

JavaScript

  1. Must be enabled
  2. Required for form submissions
  3. Use separate browser profile

Pop-up Blocker

  1. Temporarily disable
  2. Some confirmations open new windows
  3. Re-enable after sessions

Verification Tools

Check Your Presence

Google Yourself

Search variations:

  • "Firstname Lastname" city
  • "Firstname Lastname" address
  • "Firstname Lastname" phone
  • "Firstname Lastname" age

Use Multiple Search Engines

  • Google
  • Bing
  • DuckDuckGo
  • Yandex

Monitoring Services

Google Alerts

  1. Visit google.com/alerts
  2. Create alerts for:
    • Your full name in quotes
    • Name + city
    • Previous names
  3. Delivery to privacy email

HaveIBeenPwned

  1. Visit haveibeenpwned.com
  2. Enter all email addresses
  3. Sign up for notifications

California Residents (CCPA)

Enhanced Rights

  • Right to deletion
  • Right to opt-out of sale
  • No verification beyond email allowed

Magic Words

"Under CCPA, I request deletion of all my personal information and opt-out of any sale of my data."

European Residents (GDPR)

Article 17 Rights

"I invoke my Article 17 GDPR right to erasure. Delete all my personal data immediately."

Other States

Virginia (VCDPA)

Similar to CCPA, effective 2023

Colorado (CPA)

Privacy rights active 2023

Connecticut (CTDPA)

Privacy law active 2023

Follow-Up Process

Two-Week Check

  1. Verify email confirmations received
  2. Test removal on original sites
  3. Document non-compliant brokers

30-Day Verification

  1. Search yourself on each broker
  2. Note any reappearances
  3. Submit second requests if needed

Quarterly Maintenance

  1. Re-run all Tier 1 opt-outs
  2. New broker check
  3. Google yourself thoroughly

Persistent Data Issues

When Removals Don't Work

Send Certified Mail

[Date]
[Company Name]
Attn: Privacy Department
[Address]

Re: Demand for Personal Data Removal

Dear Privacy Officer,

This letter constitutes formal notice requesting immediate removal of my personal information from your databases. 

Previous attempts:
- Online request: [date]
- Confirmation #: [number]

Under applicable privacy laws, I demand complete deletion within 30 days.

Sincerely,
[Your name]

File Complaints

  • Consumer Financial Protection Bureau: cfpb.gov
  • FTC: reportfraud.ftc.gov
  • State Attorney General

Reappearing Data

Common causes:

  1. Multiple source databases
  2. Regular data purchases
  3. Public record refresh
  4. Related family members

Solutions:

  1. Opt-out more frequently
  2. Use monitoring service
  3. Lock down source data

Prevention Strategies

Reduce Future Collection

Voter Registration

  1. Check if your state allows privacy
  2. Some states offer address confidentiality programs
  3. Update to minimum required info

Property Records

  1. Use LLC for property ownership
  2. Or trust ownership
  3. Varies by state

Court Records

  1. Request sealing when possible
  2. Use initials in filings
  3. Redact sensitive info

Phone Number Protection

Get Unlisted Number

  1. Contact carrier
  2. Request unlisted status
  3. Costs $2-5/month typically

Use VOIP Numbers

  1. Google Voice for public use
  2. Keep real number private
  3. Change VOIP regularly

Special Circumstances

Identity Theft Victims

Priority Removals

  1. Include police report number
  2. Reference FTC identity theft report
  3. Demand expedited removal

Domestic Violence Survivors

Safety Resources

  1. Address Confidentiality Programs (state-specific)
  2. Safe at Home programs
  3. Priority removal status at many brokers

Minors

Enhanced Protections

  1. Most brokers remove immediately
  2. Include age proof
  3. Parent can request for child

Documentation Templates

Email Template

Subject: Personal Information Removal Request

Hello,

I request immediate removal of my personal information from your website and databases.

Name: [Full name]
Current city, state: [Location]
Age range: [Range]
Profile URLs: [If found]

Please confirm receipt and provide a timeline for removal.

Thank you,
[Your name]
[Date]

Spreadsheet Tracking

Track:

  • Broker name
  • URL
  • Request date
  • Method (web/email/phone)
  • Confirmation number
  • Expected completion
  • Actual completion
  • Recheck dates

Time Requirements

Initial Removal Phase

  • Research: 2 hours
  • Tier 1 removals: 2 hours
  • Tier 2 removals: 2 hours
  • Tier 3 removals: 1 hour
  • Documentation: 1 hour
  • Total: 8 hours

Ongoing Maintenance

  • Monthly checks: 30 minutes
  • Quarterly removals: 2 hours
  • Annual deep clean: 4 hours

Success Metrics

30-Day Goals

  • 50% reduction in search results
  • All Tier 1 sites cleared
  • Monitoring established

90-Day Goals

  • 80% reduction achieved
  • All three tiers complete
  • Reappearance pattern identified

Long-term Success

  • Quarterly maintenance routine
  • Under 5 active listings
  • Immediate detection of new listings

Additional Resources

Tools

  • Privacy Rights Clearinghouse: privacyrights.org
  • EFF Surveillance Self-Defense: ssd.eff.org
  • EPIC.org for privacy law updates
  • State Attorney General consumer protection

This process requires persistence. Data brokers profit from your information and will resist removal. Document everything, follow up regularly, and consider paid services if manual removal becomes overwhelming. The initial investment of time significantly reduces your digital footprint and limits AI training data collection.

Create separate email addresses for shopping, social media, and important accounts.

This guide establishes a multi-email system to stop cross-platform tracking and limit AI training data correlation.

Email Architecture Design

Core Email Structure

Seven Email Categories

  1. Identity Email: Government, healthcare, legal
  2. Financial Email: Banking, investments, taxes
  3. Employment Email: Work-related, professional
  4. Commerce Email: Shopping, deliveries
  5. Subscriptions Email: Services, streaming, news
  6. Social Email: Social media only
  7. Throwaway Email: Single-use, high-risk

Naming Convention

Professional Format

[email protected]
[email protected]

Anonymous Format

[email protected]
[email protected]

Provider Selection

Tier 1: Maximum Privacy

ProtonMail

Best for: Financial, Identity

  • Visit: proton.me
  • Cost: Free (500MB) or $3.99/month
  • Encryption: End-to-end default
  • Location: Switzerland
  • No phone required for free tier

Setup Process

  1. Visit account.proton.me/signup
  2. Select Free plan initially
  3. Choose username carefully (permanent)
  4. Skip phone number
  5. Set recovery email to another secure email
  6. Enable 2FA immediately

Tutanota

Best for: Healthcare, Legal

  • Visit: tutanota.com
  • Cost: Free (1GB) or €3/month
  • Encryption: Automatic
  • Location: Germany
  • No personal info required

Setup Process

  1. Visit mail.tutanota.com/signup
  2. Select Free version
  3. Create password (48-hour recovery only)
  4. Skip all optional fields
  5. Record recovery code immediately

Tier 2: Privacy-Focused

Fastmail

Best for: Employment, Professional

  • Visit: fastmail.com
  • Cost: $3/month (no free tier)
  • Features: Custom domains, aliases
  • Location: Australia

Configuration

  1. Create base account
  2. Settings > Aliases
  3. Create 10+ aliases for different purposes
  4. Set rules for automatic sorting

Mailfence

Best for: Commerce

  • Visit: mailfence.com
  • Cost: Free (500MB) or €2.50/month
  • Encryption: Optional
  • Location: Belgium

Tier 3: Convenience with Isolation

Gmail (Compartmentalized)

Best for: Subscriptions, Social

  • Multiple account strategy required
  • Use only with VPN
  • Never link accounts

Account Creation

  1. Use different browser per account
  2. Create over VPN/public WiFi
  3. Different recovery phones
  4. Unique birthdays
  5. No real name for social/subscriptions

Outlook

Best for: Commerce, Subscriptions

  • Visit: outlook.com
  • Acceptable privacy controls
  • Good spam filtering

Tier 4: Disposable

SimpleLogin

Best for: All categories as forwarding service

  • Visit: simplelogin.io
  • Cost: Free (15 aliases) or $30/year
  • Integrates with ProtonMail
  • Unlimited aliases with paid

Setup

  1. Create account with privacy email
  2. Install browser extension
  3. Generate unique alias per service
  4. Set forwarding rules

AnonAddy

Best for: High-risk signups

  • Visit: anonaddy.com
  • Cost: Free or $12/year
  • Unlimited aliases
  • Custom domains supported

Email Client Configuration

Desktop Clients

Thunderbird Setup

Download: thunderbird.net

Per-Account Configuration

  1. Add each email as separate account
  2. Different color coding per account
  3. Separate folders, no unified inbox
  4. Individual notification settings

Security Settings

Account Settings > End-to-End Encryption:
- Enable OpenPGP
- Generate key per important account
- No encryption for throwaway accounts

Apple Mail

Configuration

  1. Internet Accounts > Add Other Account
  2. Manual setup for each
  3. Disable "Organize by Conversation"
  4. Separate smart mailboxes per category

Mobile Configuration

iOS Setup

Per Email Account

  1. Settings > Mail > Accounts
  2. Add each account separately
  3. Per-account settings:
    • Identity/Financial: Fetch manually
    • Commerce: Fetch hourly
    • Social: Push off
    • Throwaway: No mobile access

Notification Management

  1. Settings > Notifications > Mail
  2. Customize per account:
    • VIP for Financial only
    • Preview: Never for sensitive
    • Lock Screen: Off for social

Android Setup

Using FairEmail

  1. Install from F-Droid
  2. Add accounts individually
  3. Color code by purpose
  4. Separate notification channels

Implementation Strategy

Phase 1: Identity and Financial (Week 1)

Identity Email Setup

  1. Create ProtonMail account
  2. Update only:
    • Government portals
    • Healthcare providers
    • Insurance companies
    • Legal services
  3. Document in password manager

Transition Process

  1. Log into each service
  2. Update email address
  3. Verify change
  4. Test password reset
  5. Update 2FA if needed

Financial Email Setup

  1. Create second ProtonMail
  2. Paid plan for custom domain recommended
  3. Update:
    • Banks
    • Credit cards
    • Investment accounts
    • Tax services
  4. Set up email rules for statements

Phase 2: Commerce and Subscriptions (Week 2)

Commerce Email

Retailer Migration

  1. Create Fastmail or Mailfence
  2. Update top 10 retailers first
  3. Use password manager "notes" field
  4. Update during next purchase for others

Delivery Services

  • Amazon
  • eBay
  • Walmart
  • Target
  • Food delivery apps

Subscriptions Email

  1. Create separate Gmail or Outlook
  2. List all subscriptions first
  3. Update during renewal period
  4. Cancel unnecessary ones during audit

Phase 3: Social and Throwaways (Week 3)

Social Media Email

Platform Updates

  1. Create dedicated email
  2. Never use for non-social purposes
  3. Update platforms:
    • Facebook/Meta
    • Instagram
    • X/Twitter
    • LinkedIn
    • TikTok
    • Reddit

Security Settings

  1. Enable 2FA on email
  2. Enable 2FA on all platforms
  3. Use authenticator app, not SMS

Throwaway System

  1. Set up SimpleLogin
  2. Create naming convention
  3. Document expiration strategy
  4. Never reuse aliases

Forwarding and Filtering

Universal Forwarding Rules

SimpleLogin Configuration

Dashboard > Aliases > New Alias
- Format: [email protected]
- Forward to: appropriate category email
- Auto-delete after 30 days for throwaway

Email Filtering Rules

ProtonMail Filters

  1. Settings > Filters
  2. Create rules:
    • If from: bank domain → Label: Statements
    • If subject contains: "verify" → Star
    • If from: unknown → Quarantine

Gmail Filters

  1. Settings > Filters and Blocked Addresses
  2. Create categorization:
    • Receipts → Label + Archive
    • Newsletters → Label + Skip Inbox
    • Promotions → Auto-delete after 30 days

Privacy Configuration

Provider Settings

ProtonMail Privacy

  1. Settings > Security
  2. Enable:
    • Authentication logs
    • 2FA requirement
    • Address verification
  3. Disable:
    • Auto-save contacts
    • Remote content loading

Gmail Privacy

  1. Settings > General
  2. Disable:
    • Smart features
    • Email categorization
    • Nudges
    • Smart Compose
  3. Settings > Data & Privacy
  4. Turn off:
    • Ad personalization
    • Web & App Activity

Browser Integration

Password Manager Setup

Bitwarden Configuration

  1. Create custom fields for email category
  2. Template: "Email Type: [Category]"
  3. Use folders per email type
  4. Enable auto-fill warnings

Browser Profiles

  1. Create browser profile per email category
  2. Sign into email in respective profile only
  3. Color-code profiles
  4. No bookmark sharing

Maintenance Procedures

Weekly Tasks (10 minutes)

Throwaway Cleanup

  1. Review SimpleLogin dashboard
  2. Delete aliases older than 30 days
  3. Block spam sources
  4. Update blocklist

Monthly Tasks (30 minutes)

Security Audit

  1. Check authentication logs
  2. Review forwarding rules
  3. Verify no cross-contamination
  4. Update weak passwords

Storage Management

  1. Delete old commerce emails
  2. Archive financial statements
  3. Empty spam/trash
  4. Export important emails

Quarterly Tasks (1 hour)

Account Review

  1. Remove unused accounts
  2. Update security questions
  3. Rotate passwords for sensitive accounts
  4. Test recovery procedures

Migration Checklist

Priority Order

  1. Week 1
    • Financial institutions
    • Government services
    • Healthcare providers
  2. Week 2
    • Primary shopping accounts
    • Subscription services
    • Utilities
  3. Week 3
    • Social media
    • Forums
    • Low-priority services
  4. Week 4
    • Cleanup old email
    • Set forwarding on old account
    • Document everything

Service Update Template

For each service:
□ Log into account
□ Navigate to account settings
□ Update email address
□ Verify via confirmation email
□ Test password reset
□ Update in password manager
□ Note date of change

Emergency Procedures

Account Compromise

Immediate Actions

  1. Change password from different device
  2. Check forwarding rules
  3. Review recent logins
  4. Revoke all sessions
  5. Enable 2FA if not active
  6. Alert linked services

Containment

  1. Don't spread to other categories
  2. Never reuse compromised email
  3. Create new email in category
  4. Migrate services systematically

Recovery Setup

Backup Access Methods

  1. Recovery codes in password manager
  2. Separate TOTP app per category
  3. Hardware key for financial/identity
  4. Never use SMS for important accounts

Alias Management

SimpleLogin Advanced Setup

Custom Domains

  1. Purchase domain for aliases
  2. Configure DNS:
MX: mx1.simplelogin.co (10)
MX: mx2.simplelogin.co (20)
TXT: "v=spf1 include:simplelogin.co ~all"

Alias Patterns

Browser Extensions

SimpleLogin Extension

  1. Install from browser store
  2. Configure:
    • Default mailbox per site category
    • Auto-create aliases
    • Notes with creation date

Mobile App Management

iOS Mail App Alternatives

Canary Mail

  • Best for multiple accounts
  • PGP support
  • Separate signatures

Microsoft Outlook

  • Focused inbox per account
  • Good calendar integration
  • Acceptable privacy

Android Alternatives

K-9 Mail

  • Open source
  • No tracking
  • Multiple identities

FairEmail

  • Privacy-focused
  • Advanced filtering
  • No cloud features

Documentation System

Master Spreadsheet Structure

ServiceOld EmailNew EmailCategoryDate Changed2FANotes
Bank of Americaold@gmailjohn.fin@protonFinancial2024-11-01Yes

Password Manager Organization

  1. Create folders:
    • Identity Services
    • Financial Services
    • Shopping Accounts
    • Social Platforms
    • Subscriptions
  2. Tag with email used
  3. Note transition dates

Success Metrics

30-Day Targets

  • All financial accounts migrated
  • Identity accounts secured
  • 50% of commerce migrated
  • Throwaway system active

90-Day Targets

  • Full migration complete
  • Old email forwarding only
  • Zero cross-contamination
  • Alias system operational

Long-term Maintenance

  • Monthly security reviews
  • Quarterly password rotation
  • Annual provider evaluation
  • Continuous alias rotation

Common Issues and Solutions

Verification Problems

  • Some services reject privacy emails
  • Solution: Use Outlook for these specific services

2FA Complications

  • Email change may break 2FA
  • Solution: Disable, change email, re-enable

Corporate Restrictions

  • Work may require specific providers
  • Solution: Isolate completely, forward if allowed

Time Investment

  • Initial setup: 3 hours
  • Migration Phase 1: 2 hours
  • Migration Phase 2: 2 hours
  • Migration Phase 3: 1 hour
  • Weekly maintenance: 10 minutes
  • Monthly maintenance: 30 minutes

This system reduces tracking correlation by 90% and prevents unified profile building across platforms. The compartmentalization ensures a breach in one category doesn't compromise others, while making mass data harvesting significantly more difficult.

Detect AI-generated content.

This guide provides steps to identify AI-generated text, images, audio, and video across the net. Detection accuracy ranges from 60-95% depending on how good you are at using them.

Text Detection

Automated Detection Tools

Primary Detection Services

GPTZero

  • Visit: gptzero.me
  • Accuracy: 85-90% for longer texts
  • Free: 5,000 characters/month
  • Paid: $10/month unlimited

Usage

  1. Paste text (minimum 250 characters)
  2. Click "Detect AI"
  3. Review perplexity and burstiness scores
  4. Check sentence-level highlighting
  5. Score below 50 suggests human-written

Originality.ai

  • Visit: originality.ai
  • Accuracy: 90-95% for academic/professional
  • Cost: $0.01 per 100 words
  • API available

Setup

  1. Create account
  2. Buy credits (minimum $20)
  3. Install Chrome extension
  4. Enable automatic scanning

Secondary Tools

Copyleaks

  • Visit: copyleaks.com/ai-content-detector
  • Free: 10 scans/month
  • Includes plagiarism check
  • Browser extension available

Sapling AI Detector

  • Visit: sapling.ai/ai-content-detector
  • Free: Unlimited under 2,000 characters
  • Real-time detection
  • API for developers

Manual Detection Patterns

Linguistic Indicators

Overused Transitions AI frequently uses:

  • "Moreover"
  • "Furthermore"
  • "In conclusion"
  • "It's important to note"
  • "On the other hand"

Repetitive Structure

  • Parallel sentence construction
  • Consistent paragraph length
  • Predictable topic sentences
  • Formulaic conclusions

Factual Inconsistencies

  • Confident incorrect statements
  • Temporal confusion
  • Mixed contextual details
  • Plausible-sounding fabrications

Content Patterns

AI Writing Characteristics

  1. Lack of personal anecdotes
  2. Absence of humor or sarcasm
  3. Perfect grammar consistently
  4. No regional expressions
  5. Hedging language overuse
  6. Surface-level analysis

Email/Message Indicators

  • Generic personalization
  • Odd capitalization patterns
  • Unnatural enthusiasm
  • Missing context from conversation
  • Template-like responses

Browser Extensions

Installation and Configuration

GPTZero Extension

  1. Chrome Web Store > Search "GPTZero"
  2. Add to browser
  3. Pin to toolbar
  4. Right-click any text to scan

Originality.ai Extension

  1. Install from Chrome Web Store
  2. Enter API key
  3. Settings > Auto-scan: On
  4. Whitelist trusted sites

Configuration Settings

javascript

// Custom blocklist for suspicious domains
Extension Settings > Domains:
- *.contentfarm.com
- *.articleforge.net
- *.ai-writer.com

Image Detection

AI Image Detectors

Dedicated Detection Tools

Hive AI Detector

  • Visit: hivemoderation.com/ai-generated-content-detection
  • Upload or paste URL
  • 99% accuracy claimed
  • Free demo available

Process

  1. Drag image to upload area
  2. Wait for analysis (5-10 seconds)
  3. Review confidence percentage
  4. Check heatmap overlay

AI or Not

  • Visit: aiornot.com
  • Simple interface
  • Free: 10 checks/month
  • Paid: $10/month unlimited

Illuminarty

  • Visit: illuminarty.ai
  • Detects AI + edited images
  • Localized detection maps
  • API available

Visual Inspection Techniques

Common AI Image Artifacts

Hands and Fingers

  • Count fingers (often wrong number)
  • Check joint positions
  • Look for merged digits
  • Verify natural poses

Text in Images

  • Garbled letters
  • Inconsistent fonts
  • Nonsensical words
  • Misaligned text

Background Elements

  • Inconsistent lighting
  • Impossible reflections
  • Pattern interruptions
  • Architectural impossibilities

Human Features

  • Asymmetric eyes
  • Inconsistent skin texture
  • Hair merging with background
  • Unnatural teeth patterns

Setup Process

Google Lens Configuration

  1. Chrome > Images.google.com
  2. Click camera icon
  3. Install browser extension
  4. Right-click any image > "Search with Lens"

TinEye Setup

  1. Visit tineye.com
  2. Install browser extension
  3. Right-click menu integration
  4. Check for original sources

Process

  1. Upload suspicious image
  2. Review matches for originals
  3. Check dates of first appearance
  4. Look for watermarks removed

Video Detection

AI Video Detection Tools

Intel's FakeCatcher

  • Not publicly available
  • 96% accuracy claimed
  • Real-time detection
  • Monitor for public release

Sensity AI

  • Visit: sensity.ai/deepfake-detection
  • Enterprise focused
  • Request demo for access
  • Real-time API available

Manual Video Detection

Deepfake Indicators

Facial Anomalies

  • Unnatural eye movement
  • Inconsistent blinking
  • Face edge blending issues
  • Lighting mismatches
  • Lip sync problems

Technical Artifacts

  • Frame inconsistencies
  • Resolution drops on face
  • Color bleeding at edges
  • Temporal flickering

Audio Mismatches

  • Voice doesn't match appearance
  • Room tone inconsistencies
  • Breathing patterns wrong
  • Emotional disconnect

Frame Analysis Tools

Setup FFmpeg

bash

# Extract frames
ffmpeg -i suspicious_video.mp4 -vf fps=1 frame_%04d.png

# Analyze each frame with image detector

Audio Detection

Voice Clone Detection

Tools and Services

Resemble AI Detector

  • Visit: resemble.ai/detect
  • Upload audio file
  • Real vs. synthetic classification
  • Free tier available

Pindrop

  • Enterprise solution
  • Contact for access
  • Phone fraud focus

Manual Audio Analysis

Synthetic Voice Indicators

Technical Patterns

  • Unnatural breathing
  • Consistent pitch
  • No mouth sounds
  • Perfect pronunciation always
  • Emotional flatness

Spectral Analysis Using Audacity:

  1. File > Open audio
  2. Analyze > Spectrogram
  3. Look for:
    • Cutoff frequencies
    • Repetitive patterns
    • Missing harmonics

News and Article Verification

News Authentication Systems

Fact-Checking Integration

NewsGuard Extension

  • Visit: newsguard.com
  • $4.95/month
  • Rates 7,500+ news sites
  • Red/green trust indicators

Installation

  1. Add to browser
  2. Icons appear on search results
  3. Hover for credibility score
  4. Click for detailed analysis

Media Bias/Fact Check

  • Visit: mediabiasfactcheck.com
  • Free browser extension
  • Bias + factual ratings
  • Source history included

Source Verification

Domain Analysis

WHOIS Lookup Process

  1. Visit whois.domaintools.com
  2. Enter suspicious domain
  3. Check:
    • Registration date (new = suspicious)
    • Registrant information (hidden = caution)
    • Country of origin
    • Hosting provider

Domain Patterns to Avoid

  • Typosquatting (goog1e.com)
  • Subdomain abuse (cnn.fake-site.com)
  • New TLDs for news (.click, .download)
  • URL shorteners for news articles

Content Farm Detection

Identifying Patterns

Site Characteristics

  • Hundreds of articles daily
  • No author bylines
  • Generic author photos
  • No contact information
  • Ads overwhelming content

Content Patterns

  • Keyword stuffing
  • Spinning existing articles
  • No original reporting
  • Aggregation only
  • SEO-optimized titles

Email and Message Protection

Email Header Analysis

Gmail Process

  1. Open suspicious email
  2. Three dots > Show original
  3. Check:
    • SPF status
    • DKIM status
    • DMARC compliance
    • Actual sender domain

Outlook Process

  1. File > Properties
  2. Internet headers
  3. Copy to mxtoolbox.com/emailheaders
  4. Analyze authentication

Phishing Detection

AI-Generated Phishing Indicators

Content Analysis

  • Generic greetings
  • Urgency without specifics
  • Grammar too perfect
  • No personal details
  • Template requests

Link Verification

  1. Hover without clicking
  2. Check actual destination
  3. Use virustotal.com for URL scanning
  4. Look for homograph attacks

Social Media Detection

Profile Verification

Bot Detection Tools

Botometer

  • Visit: botometer.osome.iu.edu
  • X/Twitter focused
  • Authenticate with account
  • Score 0-5 (higher = more bot-like)

Social Blade

  • Visit: socialblade.com
  • Growth pattern analysis
  • Follower/following ratios
  • Engagement rate calculations

Fake Profile Indicators

Visual Checks

  • Reverse search profile photos
  • Check photo consistency
  • Look for AI-generated faces
  • Verify background details

Behavioral Patterns

  • Posting frequency
  • Time zone inconsistencies
  • Engagement patterns
  • Content originality

Browser Configuration

Security Extensions Stack

Essential Extensions

  1. uBlock Origin - Block malicious domains
  2. NewsGuard - News credibility
  3. GPTZero - Text detection
  4. TinEye - Reverse image search
  5. ClearURLs - Remove tracking

Configuration Script

javascript

// uBlock Origin custom filters
||*ai-content*.com^
||*article-generator*.com^
||*fake-news*.net^

DNS Configuration

Protective DNS Services

  1. System Preferences > Network
  2. Advanced > DNS
  3. Add:
    • 1.1.1.2 (Malware blocking)
    • 9.9.9.9 (Quad9)
  4. Remove ISP DNS

Operating System Tools

macOS Setup

Quick Look Plugins

bash

# Install for metadata viewing
brew install qlmarkdown qlstephen qlimagesize

# View EXIF data quickly
brew install exiftool

Automator Workflow

  1. Open Automator
  2. New > Quick Action
  3. Add "Run Shell Script"
  4. Script: exiftool "$@" | grep "AI"
  5. Save as "Check AI Metadata"

Windows Configuration

PowerShell Scripts

powershell

# Check image metadata
Get-ItemProperty -Path "image.jpg" | Select-Object *

# Batch process suspicious files
Get-ChildItem *.jpg | ForEach-Object {
    exiftool $_.FullName | Select-String "AI"
}

Mobile Detection

iOS Apps

Content Authenticity

  • TruePic - Photo verification
  • Tineye - Reverse image search
  • Fake News Debunker - Article analysis

Android Apps

Detection Tools

  • Reverse Image Search
  • Fake News Detector
  • AI Content Detector

Documentation and Reporting

Evidence Collection

Screenshot Protocol

  1. Full page capture
  2. Include URL bar
  3. Show date/time
  4. Preserve metadata
  5. Use tools like ShareX

Reporting Platforms

Report Suspicious Content

  • IC3.gov - Internet crime
  • ReportFraud.ftc.gov - Scams
  • Google Safe Browsing - Malicious sites
  • Platform-specific reporting

Red Flags Checklist

Immediate Suspicion Triggers

Text Content

  • Perfect grammar in user comments
  • No personality or voice
  • Repetitive phrasing
  • Confident misinformation
  • Generic responses

Images

  • Too perfect appearance
  • Impossible physics
  • Text gibberish
  • Anatomical errors
  • Style inconsistencies

Communication

  • Unsolicited contact
  • Generic personalization
  • Urgency tactics
  • Link redirects
  • Request for information

Verification Workflow

Standard Process

  1. Initial Scan
    • Run through AI detector
    • Check source credibility
    • Verify domain age
  2. Deep Analysis
    • Reverse image search
    • Check metadata
    • Verify authors
    • Cross-reference claims
  3. Documentation
    • Screenshot evidence
    • Note detection method
    • Save original files
    • Report if malicious

Training and Updates

Stay Current

Resources

  • Visit: fakedetector.media.mit.edu
  • Subscribe: synthesia.io/blog
  • Monitor: deepfakedetection.com

Regular Tasks

  • Update detection tools monthly
  • Review new AI capabilities
  • Test detection accuracy
  • Share findings

Success Metrics

Detection Accuracy Goals

  • Text: 85% accuracy
  • Images: 90% accuracy
  • Video: 75% accuracy
  • Audio: 80% accuracy

Time Requirements

  • Initial setup: 2 hours
  • Daily scanning: 10 minutes
  • Weekly review: 30 minutes
  • Monthly updates: 1 hour