
Remove yourself from data broker databases.
Protecting Your Personal Information
Data brokers collect, package, and sell your personal information. This data can be used for marketing, analytics, and to train artificial intelligence systems. Taking control of this information is a foundational step in managing your digital privacy. This guide provides a direct process for removing your data and preventing its future collection.
Part 1: The Manual Removal Process
Removing your data manually is possible, and INCREDIBLY SATISFYING.
What you need:
- a notebook and pencil
- some time to yourself
Step 1: Identify Key Data Brokers
Start by targeting the largest brokers and people-search websites. Your information is likely held by dozens of them, but these are critical starting points. The trick here - from someone who's had to wade through these - is to realise they form 'trees' and networks. If you knock out one, it will weaken the others but they exist in a sort of hierarchy where if you get the bigger ones then the others become more like picking out weeds in your lawn rather than a dense endless forest which needs chopping down. So grab a cup of coffee and your chainsaw - I mean notebook. Lets go!
- Major Data Aggregators: These are some of the largest brokers that supply data for marketing and risk analysis. Obviously run your own search.
- Acxiom - Harvestor
- Oracle - Database company
- Epsilon - Harvestor
- Experian - Credit Bureau
- Equifax - Credit Bureau
You see the pattern, right? Companies that build and sell personal profiles, and other companies that judge whether you have money/can pay. The data these people have on file can make or break your life in heart wrenching ways. You could be denied entry into countries, denied the ability to buy a house, or take out a loan, or even entry into a job. It's your life, and your data. Better to have a few difficult conversations about them removing your data now, than a lifetime of near missing and dissapointments and missing out.
- People-Search Sites: These sites display your information publicly.
- Whitepages
- Spokeo
- BeenVerified
- Intelius
- MyLife (now part of BeenVerified)
These companies are offshoots. Branches lying around after you've chainsawed the trunk of the major data aggregators.
Step 2: Find and Remove Your Profiles
Each broker has a unique opt-out process.
- Search for Yourself: Visit each people-search site and search for your name and location. You will likely find a profile containing your address history, phone numbers, and relatives.
- Locate the Opt-Out Page: On the broker's website, look for a link in the footer titled "Do Not Sell My Personal Information," "Privacy," or "Opt Out." This page contains the instructions and forms for removal.
- Submit Removal Requests: Follow the specific instructions for each site. This usually involves filling out a form, finding your specific profile listing, and verifying your identity via an email address.
- Keep Records: Document each removal request. Take a screenshot of the confirmation page or save the confirmation email. Check back in a few weeks to ensure your profile has been removed.
Part 2: Automated Removal Services
For a more efficient approach, you can use a paid subscription service to manage the removal process for you. These services handle the complexity of dealing with hundreds of brokers.
- How They Work: You provide your information to the service, and it sends opt-out requests on your behalf. It then monitors these sites to ensure your data stays removed.
- Recommended Services:
- DeleteMe: A comprehensive service that provides detailed reports on which brokers held your data and when it was removed.
- Kanary: Scans thousands of sites and automates the removal process with a clear dashboard.
- Incogni: Focuses on enforcing legal privacy rights (like GDPR and CCPA) to compel brokers to delete your data.
Using a service automates a time-consuming task and provides ongoing protection as data brokers re-acquire information over time.
IMPORTANT: These follow the Iron Rule of Rust, or in layperson's terms: diminishing returns. Subscribe monthly for three months. After they've knocked out the majority of these listings, save your money and don't feed the aggregators any more. Got it? Good.
Part 3: Preventing Future Data Collection
Removing your data is the first step. The next is to reduce the amount of new data you generate.
Adjust Your Operating System Settings
Limit the data your devices share.
- On iPhone & iPad: Go to Settings > Privacy & Security > Tracking. Turn off Allow Apps to Request to Track.
- On Android: Go to Settings > Security & privacy > Privacy > Ads. Tap Delete advertising ID.
Configure Your Web Browser
Control how websites track you.
- Block Third-Party Cookies: In your browser’s privacy settings (Safari, Chrome, Firefox), select the option to block all third-party cookies. This prevents advertisers from tracking you across different websites.
- Enable "Do Not Track": In the same privacy settings, enable the "Global Privacy Control" or "Do Not Track" signal.
- Use a Privacy-Focused Browser: Consider using Brave or Firefox, which offer stronger default protections against tracking than other browsers.
Adopt Safer Online Habits
Be mindful of the information you share.
- Use Aliases: Use a secondary email address and a voice-over-IP phone number (from a service like Google Voice) for online shopping, mailing lists, and non-essential accounts. This protects your primary contact information.
- Limit Social Media Sharing: Set your social media profiles to private. Avoid sharing sensitive information like your full birthdate, home address, or phone number in public posts.
- Think Before You Post: Information posted on public forums, websites, and social media can be scraped and added to databases. Once public, it is difficult to remove.

Deeper Dive
Let's get your life back under your ownership, and your control.
This guide provides systematic instructions to remove your personal information from data broker databases. The process requires 6-8 hours initially and ongoing quarterly maintenance.
Preparation Phase
Information Gathering
Create Removal Tracking Spreadsheet
Columns needed:
- Broker name
- URL
- Date requested
- Confirmation number
- Follow-up date
- Status
- Notes
Document Your Information Variants
List all variations of:
- Current and previous names
- Current and past 10 years of addresses
- Email addresses
- Phone numbers
- Birth month/year (not full date)
Set Up Dedicated Email
- Create new email solely for opt-outs
- Use ProtonMail or similar privacy-focused service
- Format: [[email protected]]
Required Documents
Prepare Digital Copies
- Driver's license (redact license number)
- Utility bill (redact account numbers)
- Create PDF with watermark "For Opt-Out Purposes Only"
Major Data Brokers
Tier 1: Immediate Removal Priority
Acxiom
- Visit optout.acxiom.com
- Enter email address
- Search by name and state
- Select all records matching you
- Submit removal request
- Confirmation within 24 hours
- Processing: 5-7 business days
Spokeo
- Visit spokeo.com/optout
- Search your name
- Copy URL of your listing
- Enter URL and email
- Confirm via email link
- Processing: 3-5 business days
Whitepages
- Visit whitepages.com/suppression-requests
- Search your name
- Copy profile URL
- Paste URL in opt-out form
- Enter reason: "Privacy concerns"
- Verify via phone call (automated)
- Processing: 24-72 hours
BeenVerified
- Visit beenverified.com/f/optout/search
- Search your information
- Find your listing
- Click "Remove this record"
- Email verification required
- Processing: 4-7 business days
Intelius
- Visit intelius.com/opt-out
- Enter name, city, state, age
- Find your listing
- Submit removal form
- Confirm via email
- Processing: 5-7 business days
Tier 2: Secondary Priority
PeopleFinders
- Visit peoplefinders.com/opt-out
- Search yourself
- Select record
- Complete web form
- Processing: 3-5 business days
TruthFinder
- Visit truthfinder.com/opt-out
- Search for record
- Email [email protected] with:
- Subject: "Opt-Out Request"
- Full name
- City, state
- Age
- Listing URL
- Processing: 5-10 business days
InstantCheckmate
- Visit instantcheckmate.com/opt-out
- Enter your information
- Email required
- Phone verification
- Processing: 48 hours
USSearch
- Email [email protected]
- Subject: "Opt-Out Request"
- Include full name and state
- Previous addresses helpful
- Processing: 7-10 business days
PublicRecordsNow
- Visit publicrecordsnow.com/static/view/optout
- Search your name
- Click record to remove
- Email verification
- Processing: 3-5 business days
Tier 3: Aggregator Sites
MyLife
- Call 1-888-704-1900 (only method)
- Press 2 for customer service
- Request complete removal
- They will require:
- Full name
- Current address
- Date of birth
- Get confirmation number
- Processing: 7-10 business days
Radaris
- Visit radaris.com/control/privacy
- Search yourself
- Click "Control Information"
- Create account (required)
- Request removal for each listing
- Processing: 48 hours
PeopleLooker
- Visit peoplelooker.com/f/optout/search
- Find your listing
- Complete opt-out form
- Email confirmation required
- Processing: 3-5 business days
FastPeopleSearch
- Visit fastpeoplesearch.com/removal
- Find your listing
- Copy the URL
- Submit URL in form
- No email required
- Processing: 24-48 hours
Specialized Data Brokers
Financial Data Brokers
LexisNexis
- Visit optout.lexisnexis.com
- Fill comprehensive form
- Upload ID (redacted)
- Submit via secure portal
- Processing: 15-30 business days
CoreLogic
- Visit corelogic.com/privacy
- Download opt-out form
- Email to [email protected]
- Include ID copy
- Processing: 30 days
Marketing Data Brokers
Epsilon
- Visit epsilon.com/us/consumer-preference-center
- Enter information
- Select "Remove my data"
- Email verification
- Processing: 10 business days
Oracle Data Cloud
- Visit oracle.com/legal/privacy/privacy-choices
- Click "Consumer Choices"
- Submit email
- Follow instructions sent
- Processing: 30 days
Experian Marketing
- Visit experian.com/privacy/opting-out
- Complete online form
- Or mail to: Experian Opt-Out P.O. Box 919 Allen, TX 75013
- Processing: 30 days
People Search Engines
Pipl
- Visit pipl.com/privacy
- Email [email protected]
- Subject: "Remove My Information"
- Include profile URLs
- Processing: 14 days
ZoomInfo
- Visit zoominfo.com/privacy-center
- Submit removal request
- Email verification
- May require LinkedIn verification
- Processing: 10 business days
Automated Removal Services
When to Consider
Use if:
- Limited time available
- Ongoing monitoring needed
- Comfort with sharing data
Service Options
DeleteMe
- Cost: $129/year
- Removes from 45+ brokers
- Quarterly reports
- Human review
OneRep
- Cost: $8.33/month
- 196 sites covered
- Monthly monitoring
- API automation
Privacy Bee
- Cost: $197/year
- 200+ sites
- Browser extension included
- Manual verification
Browser Configuration for Opt-Outs
Cookie Settings
- Allow all cookies temporarily
- Many sites require cookies to process opt-outs
- Clear after completion
JavaScript
- Must be enabled
- Required for form submissions
- Use separate browser profile
Pop-up Blocker
- Temporarily disable
- Some confirmations open new windows
- Re-enable after sessions
Verification Tools
Check Your Presence
Google Yourself
Search variations:
- "Firstname Lastname" city
- "Firstname Lastname" address
- "Firstname Lastname" phone
- "Firstname Lastname" age
Use Multiple Search Engines
- Bing
- DuckDuckGo
- Yandex
Monitoring Services
Google Alerts
- Visit google.com/alerts
- Create alerts for:
- Your full name in quotes
- Name + city
- Previous names
- Delivery to privacy email
HaveIBeenPwned
- Visit haveibeenpwned.com
- Enter all email addresses
- Sign up for notifications
Legal Frameworks
California Residents (CCPA)
Enhanced Rights
- Right to deletion
- Right to opt-out of sale
- No verification beyond email allowed
Magic Words
"Under CCPA, I request deletion of all my personal information and opt-out of any sale of my data."
European Residents (GDPR)
Article 17 Rights
"I invoke my Article 17 GDPR right to erasure. Delete all my personal data immediately."
Other States
Virginia (VCDPA)
Similar to CCPA, effective 2023
Colorado (CPA)
Privacy rights active 2023
Connecticut (CTDPA)
Privacy law active 2023
Follow-Up Process
Two-Week Check
- Verify email confirmations received
- Test removal on original sites
- Document non-compliant brokers
30-Day Verification
- Search yourself on each broker
- Note any reappearances
- Submit second requests if needed
Quarterly Maintenance
- Re-run all Tier 1 opt-outs
- New broker check
- Google yourself thoroughly
Persistent Data Issues
When Removals Don't Work
Send Certified Mail
[Date]
[Company Name]
Attn: Privacy Department
[Address]
Re: Demand for Personal Data Removal
Dear Privacy Officer,
This letter constitutes formal notice requesting immediate removal of my personal information from your databases.
Previous attempts:
- Online request: [date]
- Confirmation #: [number]
Under applicable privacy laws, I demand complete deletion within 30 days.
Sincerely,
[Your name]
File Complaints
- Consumer Financial Protection Bureau: cfpb.gov
- FTC: reportfraud.ftc.gov
- State Attorney General
Reappearing Data
Common causes:
- Multiple source databases
- Regular data purchases
- Public record refresh
- Related family members
Solutions:
- Opt-out more frequently
- Use monitoring service
- Lock down source data
Prevention Strategies
Reduce Future Collection
Voter Registration
- Check if your state allows privacy
- Some states offer address confidentiality programs
- Update to minimum required info
Property Records
- Use LLC for property ownership
- Or trust ownership
- Varies by state
Court Records
- Request sealing when possible
- Use initials in filings
- Redact sensitive info
Phone Number Protection
Get Unlisted Number
- Contact carrier
- Request unlisted status
- Costs $2-5/month typically
Use VOIP Numbers
- Google Voice for public use
- Keep real number private
- Change VOIP regularly
Special Circumstances
Identity Theft Victims
Priority Removals
- Include police report number
- Reference FTC identity theft report
- Demand expedited removal
Domestic Violence Survivors
Safety Resources
- Address Confidentiality Programs (state-specific)
- Safe at Home programs
- Priority removal status at many brokers
Minors
Enhanced Protections
- Most brokers remove immediately
- Include age proof
- Parent can request for child
Documentation Templates
Email Template
Subject: Personal Information Removal Request
Hello,
I request immediate removal of my personal information from your website and databases.
Name: [Full name]
Current city, state: [Location]
Age range: [Range]
Profile URLs: [If found]
Please confirm receipt and provide a timeline for removal.
Thank you,
[Your name]
[Date]
Spreadsheet Tracking
Track:
- Broker name
- URL
- Request date
- Method (web/email/phone)
- Confirmation number
- Expected completion
- Actual completion
- Recheck dates
Time Requirements
Initial Removal Phase
- Research: 2 hours
- Tier 1 removals: 2 hours
- Tier 2 removals: 2 hours
- Tier 3 removals: 1 hour
- Documentation: 1 hour
- Total: 8 hours
Ongoing Maintenance
- Monthly checks: 30 minutes
- Quarterly removals: 2 hours
- Annual deep clean: 4 hours
Success Metrics
30-Day Goals
- 50% reduction in search results
- All Tier 1 sites cleared
- Monitoring established
90-Day Goals
- 80% reduction achieved
- All three tiers complete
- Reappearance pattern identified
Long-term Success
- Quarterly maintenance routine
- Under 5 active listings
- Immediate detection of new listings
Additional Resources
Tools
- Privacy Rights Clearinghouse: privacyrights.org
- EFF Surveillance Self-Defense: ssd.eff.org
Legal Help
- EPIC.org for privacy law updates
- State Attorney General consumer protection
This process requires persistence. Data brokers profit from your information and will resist removal. Document everything, follow up regularly, and consider paid services if manual removal becomes overwhelming. The initial investment of time significantly reduces your digital footprint and limits AI training data collection.

Create separate email addresses for shopping, social media, and important accounts.
This guide establishes a multi-email system to stop cross-platform tracking and limit AI training data correlation.
Email Architecture Design
Core Email Structure
Seven Email Categories
- Identity Email: Government, healthcare, legal
- Financial Email: Banking, investments, taxes
- Employment Email: Work-related, professional
- Commerce Email: Shopping, deliveries
- Subscriptions Email: Services, streaming, news
- Social Email: Social media only
- Throwaway Email: Single-use, high-risk
Naming Convention
Professional Format
[email protected]
[email protected]
Anonymous Format
[email protected]
[email protected]
Provider Selection
Tier 1: Maximum Privacy
ProtonMail
Best for: Financial, Identity
- Visit: proton.me
- Cost: Free (500MB) or $3.99/month
- Encryption: End-to-end default
- Location: Switzerland
- No phone required for free tier
Setup Process
- Visit account.proton.me/signup
- Select Free plan initially
- Choose username carefully (permanent)
- Skip phone number
- Set recovery email to another secure email
- Enable 2FA immediately
Tutanota
Best for: Healthcare, Legal
- Visit: tutanota.com
- Cost: Free (1GB) or €3/month
- Encryption: Automatic
- Location: Germany
- No personal info required
Setup Process
- Visit mail.tutanota.com/signup
- Select Free version
- Create password (48-hour recovery only)
- Skip all optional fields
- Record recovery code immediately
Tier 2: Privacy-Focused
Fastmail
Best for: Employment, Professional
- Visit: fastmail.com
- Cost: $3/month (no free tier)
- Features: Custom domains, aliases
- Location: Australia
Configuration
- Create base account
- Settings > Aliases
- Create 10+ aliases for different purposes
- Set rules for automatic sorting
Mailfence
Best for: Commerce
- Visit: mailfence.com
- Cost: Free (500MB) or €2.50/month
- Encryption: Optional
- Location: Belgium
Tier 3: Convenience with Isolation
Gmail (Compartmentalized)
Best for: Subscriptions, Social
- Multiple account strategy required
- Use only with VPN
- Never link accounts
Account Creation
- Use different browser per account
- Create over VPN/public WiFi
- Different recovery phones
- Unique birthdays
- No real name for social/subscriptions
Outlook
Best for: Commerce, Subscriptions
- Visit: outlook.com
- Acceptable privacy controls
- Good spam filtering
Tier 4: Disposable
SimpleLogin
Best for: All categories as forwarding service
- Visit: simplelogin.io
- Cost: Free (15 aliases) or $30/year
- Integrates with ProtonMail
- Unlimited aliases with paid
Setup
- Create account with privacy email
- Install browser extension
- Generate unique alias per service
- Set forwarding rules
AnonAddy
Best for: High-risk signups
- Visit: anonaddy.com
- Cost: Free or $12/year
- Unlimited aliases
- Custom domains supported
Email Client Configuration
Desktop Clients
Thunderbird Setup
Download: thunderbird.net
Per-Account Configuration
- Add each email as separate account
- Different color coding per account
- Separate folders, no unified inbox
- Individual notification settings
Security Settings
Account Settings > End-to-End Encryption:
- Enable OpenPGP
- Generate key per important account
- No encryption for throwaway accounts
Apple Mail
Configuration
- Internet Accounts > Add Other Account
- Manual setup for each
- Disable "Organize by Conversation"
- Separate smart mailboxes per category
Mobile Configuration
iOS Setup
Per Email Account
- Settings > Mail > Accounts
- Add each account separately
- Per-account settings:
- Identity/Financial: Fetch manually
- Commerce: Fetch hourly
- Social: Push off
- Throwaway: No mobile access
Notification Management
- Settings > Notifications > Mail
- Customize per account:
- VIP for Financial only
- Preview: Never for sensitive
- Lock Screen: Off for social
Android Setup
Using FairEmail
- Install from F-Droid
- Add accounts individually
- Color code by purpose
- Separate notification channels
Implementation Strategy
Phase 1: Identity and Financial (Week 1)
Identity Email Setup
- Create ProtonMail account
- Update only:
- Government portals
- Healthcare providers
- Insurance companies
- Legal services
- Document in password manager
Transition Process
- Log into each service
- Update email address
- Verify change
- Test password reset
- Update 2FA if needed
Financial Email Setup
- Create second ProtonMail
- Paid plan for custom domain recommended
- Update:
- Banks
- Credit cards
- Investment accounts
- Tax services
- Set up email rules for statements
Phase 2: Commerce and Subscriptions (Week 2)
Commerce Email
Retailer Migration
- Create Fastmail or Mailfence
- Update top 10 retailers first
- Use password manager "notes" field
- Update during next purchase for others
Delivery Services
- Amazon
- eBay
- Walmart
- Target
- Food delivery apps
Subscriptions Email
- Create separate Gmail or Outlook
- List all subscriptions first
- Update during renewal period
- Cancel unnecessary ones during audit
Phase 3: Social and Throwaways (Week 3)
Social Media Email
Platform Updates
- Create dedicated email
- Never use for non-social purposes
- Update platforms:
- Facebook/Meta
- X/Twitter
- TikTok
Security Settings
- Enable 2FA on email
- Enable 2FA on all platforms
- Use authenticator app, not SMS
Throwaway System
- Set up SimpleLogin
- Create naming convention
- Document expiration strategy
- Never reuse aliases
Forwarding and Filtering
Universal Forwarding Rules
SimpleLogin Configuration
Dashboard > Aliases > New Alias
- Format: [email protected]
- Forward to: appropriate category email
- Auto-delete after 30 days for throwaway
Email Filtering Rules
ProtonMail Filters
- Settings > Filters
- Create rules:
- If from: bank domain → Label: Statements
- If subject contains: "verify" → Star
- If from: unknown → Quarantine
Gmail Filters
- Settings > Filters and Blocked Addresses
- Create categorization:
- Receipts → Label + Archive
- Newsletters → Label + Skip Inbox
- Promotions → Auto-delete after 30 days
Privacy Configuration
Provider Settings
ProtonMail Privacy
- Settings > Security
- Enable:
- Authentication logs
- 2FA requirement
- Address verification
- Disable:
- Auto-save contacts
- Remote content loading
Gmail Privacy
- Settings > General
- Disable:
- Smart features
- Email categorization
- Nudges
- Smart Compose
- Settings > Data & Privacy
- Turn off:
- Ad personalization
- Web & App Activity
Browser Integration
Password Manager Setup
Bitwarden Configuration
- Create custom fields for email category
- Template: "Email Type: [Category]"
- Use folders per email type
- Enable auto-fill warnings
Browser Profiles
- Create browser profile per email category
- Sign into email in respective profile only
- Color-code profiles
- No bookmark sharing
Maintenance Procedures
Weekly Tasks (10 minutes)
Throwaway Cleanup
- Review SimpleLogin dashboard
- Delete aliases older than 30 days
- Block spam sources
- Update blocklist
Monthly Tasks (30 minutes)
Security Audit
- Check authentication logs
- Review forwarding rules
- Verify no cross-contamination
- Update weak passwords
Storage Management
- Delete old commerce emails
- Archive financial statements
- Empty spam/trash
- Export important emails
Quarterly Tasks (1 hour)
Account Review
- Remove unused accounts
- Update security questions
- Rotate passwords for sensitive accounts
- Test recovery procedures
Migration Checklist
Priority Order
- Week 1
- Financial institutions
- Government services
- Healthcare providers
- Week 2
- Primary shopping accounts
- Subscription services
- Utilities
- Week 3
- Social media
- Forums
- Low-priority services
- Week 4
- Cleanup old email
- Set forwarding on old account
- Document everything
Service Update Template
For each service:
□ Log into account
□ Navigate to account settings
□ Update email address
□ Verify via confirmation email
□ Test password reset
□ Update in password manager
□ Note date of change
Emergency Procedures
Account Compromise
Immediate Actions
- Change password from different device
- Check forwarding rules
- Review recent logins
- Revoke all sessions
- Enable 2FA if not active
- Alert linked services
Containment
- Don't spread to other categories
- Never reuse compromised email
- Create new email in category
- Migrate services systematically
Recovery Setup
Backup Access Methods
- Recovery codes in password manager
- Separate TOTP app per category
- Hardware key for financial/identity
- Never use SMS for important accounts
Alias Management
SimpleLogin Advanced Setup
Custom Domains
- Purchase domain for aliases
- Configure DNS:
MX: mx1.simplelogin.co (10)
MX: mx2.simplelogin.co (20)
TXT: "v=spf1 include:simplelogin.co ~all"
Alias Patterns
- Shopping: [email protected]
- Newsletters: [email protected]
- Trials: [email protected]
Browser Extensions
SimpleLogin Extension
- Install from browser store
- Configure:
- Default mailbox per site category
- Auto-create aliases
- Notes with creation date
Mobile App Management
iOS Mail App Alternatives
Canary Mail
- Best for multiple accounts
- PGP support
- Separate signatures
Microsoft Outlook
- Focused inbox per account
- Good calendar integration
- Acceptable privacy
Android Alternatives
K-9 Mail
- Open source
- No tracking
- Multiple identities
FairEmail
- Privacy-focused
- Advanced filtering
- No cloud features
Documentation System
Master Spreadsheet Structure
Service | Old Email | New Email | Category | Date Changed | 2FA | Notes |
---|---|---|---|---|---|---|
Bank of America | old@gmail | john.fin@proton | Financial | 2024-11-01 | Yes |
Password Manager Organization
- Create folders:
- Identity Services
- Financial Services
- Shopping Accounts
- Social Platforms
- Subscriptions
- Tag with email used
- Note transition dates
Success Metrics
30-Day Targets
- All financial accounts migrated
- Identity accounts secured
- 50% of commerce migrated
- Throwaway system active
90-Day Targets
- Full migration complete
- Old email forwarding only
- Zero cross-contamination
- Alias system operational
Long-term Maintenance
- Monthly security reviews
- Quarterly password rotation
- Annual provider evaluation
- Continuous alias rotation
Common Issues and Solutions
Verification Problems
- Some services reject privacy emails
- Solution: Use Outlook for these specific services
2FA Complications
- Email change may break 2FA
- Solution: Disable, change email, re-enable
Corporate Restrictions
- Work may require specific providers
- Solution: Isolate completely, forward if allowed
Time Investment
- Initial setup: 3 hours
- Migration Phase 1: 2 hours
- Migration Phase 2: 2 hours
- Migration Phase 3: 1 hour
- Weekly maintenance: 10 minutes
- Monthly maintenance: 30 minutes
This system reduces tracking correlation by 90% and prevents unified profile building across platforms. The compartmentalization ensures a breach in one category doesn't compromise others, while making mass data harvesting significantly more difficult.

Detect AI-generated content.
This guide provides steps to identify AI-generated text, images, audio, and video across the net. Detection accuracy ranges from 60-95% depending on how good you are at using them.
Text Detection
Automated Detection Tools
Primary Detection Services
GPTZero
- Visit: gptzero.me
- Accuracy: 85-90% for longer texts
- Free: 5,000 characters/month
- Paid: $10/month unlimited
Usage
- Paste text (minimum 250 characters)
- Click "Detect AI"
- Review perplexity and burstiness scores
- Check sentence-level highlighting
- Score below 50 suggests human-written
Originality.ai
- Visit: originality.ai
- Accuracy: 90-95% for academic/professional
- Cost: $0.01 per 100 words
- API available
Setup
- Create account
- Buy credits (minimum $20)
- Install Chrome extension
- Enable automatic scanning
Secondary Tools
Copyleaks
- Visit: copyleaks.com/ai-content-detector
- Free: 10 scans/month
- Includes plagiarism check
- Browser extension available
Sapling AI Detector
- Visit: sapling.ai/ai-content-detector
- Free: Unlimited under 2,000 characters
- Real-time detection
- API for developers
Manual Detection Patterns
Linguistic Indicators
Overused Transitions AI frequently uses:
- "Moreover"
- "Furthermore"
- "In conclusion"
- "It's important to note"
- "On the other hand"
Repetitive Structure
- Parallel sentence construction
- Consistent paragraph length
- Predictable topic sentences
- Formulaic conclusions
Factual Inconsistencies
- Confident incorrect statements
- Temporal confusion
- Mixed contextual details
- Plausible-sounding fabrications
Content Patterns
AI Writing Characteristics
- Lack of personal anecdotes
- Absence of humor or sarcasm
- Perfect grammar consistently
- No regional expressions
- Hedging language overuse
- Surface-level analysis
Email/Message Indicators
- Generic personalization
- Odd capitalization patterns
- Unnatural enthusiasm
- Missing context from conversation
- Template-like responses
Browser Extensions
Installation and Configuration
GPTZero Extension
- Chrome Web Store > Search "GPTZero"
- Add to browser
- Pin to toolbar
- Right-click any text to scan
Originality.ai Extension
- Install from Chrome Web Store
- Enter API key
- Settings > Auto-scan: On
- Whitelist trusted sites
Configuration Settings
javascript
// Custom blocklist for suspicious domains
Extension Settings > Domains:
- *.contentfarm.com
- *.articleforge.net
- *.ai-writer.com
Image Detection
AI Image Detectors
Dedicated Detection Tools
Hive AI Detector
- Visit: hivemoderation.com/ai-generated-content-detection
- Upload or paste URL
- 99% accuracy claimed
- Free demo available
Process
- Drag image to upload area
- Wait for analysis (5-10 seconds)
- Review confidence percentage
- Check heatmap overlay
AI or Not
- Visit: aiornot.com
- Simple interface
- Free: 10 checks/month
- Paid: $10/month unlimited
Illuminarty
- Visit: illuminarty.ai
- Detects AI + edited images
- Localized detection maps
- API available
Visual Inspection Techniques
Common AI Image Artifacts
Hands and Fingers
- Count fingers (often wrong number)
- Check joint positions
- Look for merged digits
- Verify natural poses
Text in Images
- Garbled letters
- Inconsistent fonts
- Nonsensical words
- Misaligned text
Background Elements
- Inconsistent lighting
- Impossible reflections
- Pattern interruptions
- Architectural impossibilities
Human Features
- Asymmetric eyes
- Inconsistent skin texture
- Hair merging with background
- Unnatural teeth patterns
Reverse Image Search
Setup Process
Google Lens Configuration
- Chrome > Images.google.com
- Click camera icon
- Install browser extension
- Right-click any image > "Search with Lens"
TinEye Setup
- Visit tineye.com
- Install browser extension
- Right-click menu integration
- Check for original sources
Process
- Upload suspicious image
- Review matches for originals
- Check dates of first appearance
- Look for watermarks removed
Video Detection
AI Video Detection Tools
Intel's FakeCatcher
- Not publicly available
- 96% accuracy claimed
- Real-time detection
- Monitor for public release
Sensity AI
- Visit: sensity.ai/deepfake-detection
- Enterprise focused
- Request demo for access
- Real-time API available
Manual Video Detection
Deepfake Indicators
Facial Anomalies
- Unnatural eye movement
- Inconsistent blinking
- Face edge blending issues
- Lighting mismatches
- Lip sync problems
Technical Artifacts
- Frame inconsistencies
- Resolution drops on face
- Color bleeding at edges
- Temporal flickering
Audio Mismatches
- Voice doesn't match appearance
- Room tone inconsistencies
- Breathing patterns wrong
- Emotional disconnect
Frame Analysis Tools
Setup FFmpeg
bash
# Extract frames
ffmpeg -i suspicious_video.mp4 -vf fps=1 frame_%04d.png
# Analyze each frame with image detector
Audio Detection
Voice Clone Detection
Tools and Services
Resemble AI Detector
- Visit: resemble.ai/detect
- Upload audio file
- Real vs. synthetic classification
- Free tier available
Pindrop
- Enterprise solution
- Contact for access
- Phone fraud focus
Manual Audio Analysis
Synthetic Voice Indicators
Technical Patterns
- Unnatural breathing
- Consistent pitch
- No mouth sounds
- Perfect pronunciation always
- Emotional flatness
Spectral Analysis Using Audacity:
- File > Open audio
- Analyze > Spectrogram
- Look for:
- Cutoff frequencies
- Repetitive patterns
- Missing harmonics
News and Article Verification
News Authentication Systems
Fact-Checking Integration
NewsGuard Extension
- Visit: newsguard.com
- $4.95/month
- Rates 7,500+ news sites
- Red/green trust indicators
Installation
- Add to browser
- Icons appear on search results
- Hover for credibility score
- Click for detailed analysis
Media Bias/Fact Check
- Visit: mediabiasfactcheck.com
- Free browser extension
- Bias + factual ratings
- Source history included
Source Verification
Domain Analysis
WHOIS Lookup Process
- Visit whois.domaintools.com
- Enter suspicious domain
- Check:
- Registration date (new = suspicious)
- Registrant information (hidden = caution)
- Country of origin
- Hosting provider
Domain Patterns to Avoid
- Typosquatting (goog1e.com)
- Subdomain abuse (cnn.fake-site.com)
- New TLDs for news (.click, .download)
- URL shorteners for news articles
Content Farm Detection
Identifying Patterns
Site Characteristics
- Hundreds of articles daily
- No author bylines
- Generic author photos
- No contact information
- Ads overwhelming content
Content Patterns
- Keyword stuffing
- Spinning existing articles
- No original reporting
- Aggregation only
- SEO-optimized titles
Email and Message Protection
Email Header Analysis
Gmail Process
- Open suspicious email
- Three dots > Show original
- Check:
- SPF status
- DKIM status
- DMARC compliance
- Actual sender domain
Outlook Process
- File > Properties
- Internet headers
- Copy to mxtoolbox.com/emailheaders
- Analyze authentication
Phishing Detection
AI-Generated Phishing Indicators
Content Analysis
- Generic greetings
- Urgency without specifics
- Grammar too perfect
- No personal details
- Template requests
Link Verification
- Hover without clicking
- Check actual destination
- Use virustotal.com for URL scanning
- Look for homograph attacks
Social Media Detection
Profile Verification
Bot Detection Tools
Botometer
- Visit: botometer.osome.iu.edu
- X/Twitter focused
- Authenticate with account
- Score 0-5 (higher = more bot-like)
Social Blade
- Visit: socialblade.com
- Growth pattern analysis
- Follower/following ratios
- Engagement rate calculations
Fake Profile Indicators
Visual Checks
- Reverse search profile photos
- Check photo consistency
- Look for AI-generated faces
- Verify background details
Behavioral Patterns
- Posting frequency
- Time zone inconsistencies
- Engagement patterns
- Content originality
Browser Configuration
Security Extensions Stack
Essential Extensions
- uBlock Origin - Block malicious domains
- NewsGuard - News credibility
- GPTZero - Text detection
- TinEye - Reverse image search
- ClearURLs - Remove tracking
Configuration Script
javascript
// uBlock Origin custom filters
||*ai-content*.com^
||*article-generator*.com^
||*fake-news*.net^
DNS Configuration
Protective DNS Services
- System Preferences > Network
- Advanced > DNS
- Add:
- 1.1.1.2 (Malware blocking)
- 9.9.9.9 (Quad9)
- Remove ISP DNS
Operating System Tools
macOS Setup
Quick Look Plugins
bash
# Install for metadata viewing
brew install qlmarkdown qlstephen qlimagesize
# View EXIF data quickly
brew install exiftool
Automator Workflow
- Open Automator
- New > Quick Action
- Add "Run Shell Script"
- Script:
exiftool "$@" | grep "AI"
- Save as "Check AI Metadata"
Windows Configuration
PowerShell Scripts
powershell
# Check image metadata
Get-ItemProperty -Path "image.jpg" | Select-Object *
# Batch process suspicious files
Get-ChildItem *.jpg | ForEach-Object {
exiftool $_.FullName | Select-String "AI"
}
Mobile Detection
iOS Apps
Content Authenticity
- TruePic - Photo verification
- Tineye - Reverse image search
- Fake News Debunker - Article analysis
Android Apps
Detection Tools
- Reverse Image Search
- Fake News Detector
- AI Content Detector
Documentation and Reporting
Evidence Collection
Screenshot Protocol
- Full page capture
- Include URL bar
- Show date/time
- Preserve metadata
- Use tools like ShareX
Reporting Platforms
Report Suspicious Content
- IC3.gov - Internet crime
- ReportFraud.ftc.gov - Scams
- Google Safe Browsing - Malicious sites
- Platform-specific reporting
Red Flags Checklist
Immediate Suspicion Triggers
Text Content
- Perfect grammar in user comments
- No personality or voice
- Repetitive phrasing
- Confident misinformation
- Generic responses
Images
- Too perfect appearance
- Impossible physics
- Text gibberish
- Anatomical errors
- Style inconsistencies
Communication
- Unsolicited contact
- Generic personalization
- Urgency tactics
- Link redirects
- Request for information
Verification Workflow
Standard Process
- Initial Scan
- Run through AI detector
- Check source credibility
- Verify domain age
- Deep Analysis
- Reverse image search
- Check metadata
- Verify authors
- Cross-reference claims
- Documentation
- Screenshot evidence
- Note detection method
- Save original files
- Report if malicious
Training and Updates
Stay Current
Resources
- Visit: fakedetector.media.mit.edu
- Subscribe: synthesia.io/blog
- Monitor: deepfakedetection.com
Regular Tasks
- Update detection tools monthly
- Review new AI capabilities
- Test detection accuracy
- Share findings
Success Metrics
Detection Accuracy Goals
- Text: 85% accuracy
- Images: 90% accuracy
- Video: 75% accuracy
- Audio: 80% accuracy
Time Requirements
- Initial setup: 2 hours
- Daily scanning: 10 minutes
- Weekly review: 30 minutes
- Monthly updates: 1 hour