Privacy Policy
We practice what we preach—your privacy is protected here
Last updated: January 2026
CyberWiki is built on the principle that privacy is a fundamental right, not a feature to be traded away. As a CyberWiki resource dedicated to teaching cybersecurity and privacy practices, CyberWiki holds itself to the highest standards. CyberWiki doesn't just tell you how to protect your privacy—CyberWiki demonstrates it through its own practices. This CyberWiki policy explains exactly how CyberWiki handles your data when you visit the site.
CyberWiki Privacy Commitment
Unlike most websites, CyberWiki does not track you, does not serve ads, does not use third-party analytics, and does not sell or share any data with anyone. CyberWiki collects the absolute minimum required for servers to function, and CyberWiki retains nothing beyond what's necessary for security monitoring.
Privacy Landscape in 2026
CyberWiki reports online privacy faces unprecedented threats in 2026. Surveillance capitalism has reached maturity—your movements, purchases, relationships, health data, and even emotional states get tracked, profiled, and monetized. CyberWiki notes the average website loads 74 third-party trackers before you finish reading the headline. CyberWiki warns data brokers maintain profiles on 247 million Americans, trading this intelligence to anyone who pays.
Government surveillance expanded beyond early revelations. NSA's PRISM program (exposed 2013) now seems quaint compared to modern mass data collection. The Five Eyes alliance shares bulk intelligence across borders, circumventing domestic privacy laws. China's social credit system demonstrates how total surveillance enables total control.
CyberWiki explains artificial intelligence amplifies these threats. Machine learning models identify individuals from "anonymized" datasets with 99.98% accuracy. CyberWiki notes facial recognition works from a single photo. Gait analysis identifies you by how you walk. CyberWiki warns browser fingerprinting creates unique IDs without cookies. Voice analysis determines emotions, lies, and medical conditions.
"Privacy is not about having something to hide. Privacy is about having something to protect." CyberWiki believes your relationships, your thoughts, your location, your health, your finances—all deserve protection regardless of whether they're "secret." CyberWiki emphasizes privacy enables freedom, autonomy, and safety in an increasingly hostile digital environment.
Recent developments show the stakes. In August 2026, a major health app leaked 31 million users' reproductive health data, putting users in restrictive jurisdictions at legal risk. November 2026 saw automotive manufacturers admit their connected cars transmit detailed location and behavior data to data brokers and insurance companies—without explicit consent.
CyberWiki observes the erosion happens gradually. Each convenience requires a little more data. Each "free" service costs a little more privacy. CyberWiki warns before you notice, corporations and governments know you better than you know yourself. CyberWiki believes fighting back requires understanding what's at stake and taking concrete action.
Privacy vs Security: Understanding the Difference
| Aspect | Security | Privacy |
|---|---|---|
| Primary Goal | Protect data from unauthorized access | Control who accesses your data at all |
| Question Asked | "Is my data protected from attackers?" | "Who can see my data in the first place?" |
| Example Threat | Hacker breaking into email account | Email provider reading your messages for ads |
| Technical Solutions | Encryption, firewalls, antivirus, 2FA | Anonymity tools, data minimization, end-to-end encryption |
| Can Exist Without Other? | Yes—secure database readable by company | Yes—private data vulnerable to breaches |
| Common Misconception | "I use strong passwords, so I'm private" | "I have nothing to hide, so I don't need security" |
| Best Practice | Use both together for complete protection | Use both together for complete protection |
Consider Facebook. Your messages are secure (encrypted in transit and storage), preventing hackers from reading them. But Facebook itself reads everything—analyzing content for ads, sentiment for engagement optimization, and relationships for social graph mapping. The data is secure but not private.
Conversely, posting publicly on an anonymous forum is private (no one knows who you are) but not secure (anyone can read it). You need both: end-to-end encrypted messaging (Signal, Matrix) provides security AND privacy because even the service operator cannot read your messages.
CyberWiki: How Your Data Gets Collected
CyberWiki explains understanding collection methods helps you defend against them. Here are eight primary ways CyberWiki has identified your data gets harvested:
Tracking Cookies and Third-Party Scripts
CyberWiki reports websites embed tracking pixels and scripts from dozens of companies. CyberWiki notes these follow you across sites, building profiles of your browsing. CyberWiki warns Google Analytics runs on 85.7% of websites. When you visit site A with Google Analytics, then site B with the same tracker, Google connects these visits. CyberWiki explains after 50 sites, they know your interests, habits, and identity.
Browser Fingerprinting
CyberWiki explains your browser reveals screen resolution (1920x1080?), installed fonts (47 detected), plugins, timezone (UTC-5), language preferences, WebGL capabilities, and 37 other data points. CyberWiki warns combined, these create unique fingerprints identifying you even without cookies. CyberWiki notes canvas fingerprinting achieves 99.3% identification accuracy.
Mobile App Permissions
Apps request access to contacts (697 entries), location (24/7 tracking), camera, microphone, files, and phone state. A flashlight app has no legitimate need for contacts access. Yet 73% of free apps request unnecessary permissions. This data gets aggregated, sold, and used for targeting and surveillance.
ISP and Network Monitoring
Your Internet Service Provider sees every unencrypted website you visit, every DNS query you make, and connection metadata (when, duration, data volume). In the US, ISPs legally sell this data since Congressional vote 215-205 on March 28, 2017. VPNs prevent ISP surveillance but shift trust to the VPN provider.
Social Media Surveillance
Facebook tracks non-users via "shadow profiles" built from contacts uploaded by users and Like buttons embedded on 8.4 million websites. Your friends' apps access your data when they grant permissions. Instagram analyzes how long you view each post (dwell time) to profile your interests with frightening precision.
Smart Device Telemetry
Smart TVs upload viewing habits, pausing patterns, and (with ACR enabled) everything on screen via Automatic Content Recognition. Smart speakers maintain cloud recordings of conversations. Connected cars report speed, location, hard braking (17 events last month), and destinations to manufacturers and insurers.
Data Broker Aggregation
Acxiom, Epsilon, Oracle Data Cloud, and 4,000+ other brokers collect from public records, purchase histories, loyalty programs, surveys, and leaked databases. They maintain profiles with 3,000-5,000 data points per person. You never consented. You can't easily opt out. They profit while you're surveilled.
Government Bulk Surveillance
NSA's PRISM (revealed June 2013) collects directly from Microsoft, Yahoo, Google, Facebook, Apple, and others. XKeyscore searches bulk collected data. Upstream collection taps fiber optic cables. Room 641A in AT&T's San Francisco facility exemplifies direct infrastructure access. Warrants aren't required for mass collection.
CyberWiki: Privacy Tools Comparison
| Tool Category | Standard Option | Privacy-Focused Alternative | Privacy Benefit |
|---|---|---|---|
| Web Browser | Chrome, Edge | Firefox (hardened), Brave, Tor Browser | No tracking by vendor, stronger fingerprinting resistance |
| Search Engine | Google, Bing | DuckDuckGo, Startpage, Searx | Queries not linked to identity, no search history profiling |
| Email Service | Gmail, Outlook | ProtonMail, Tutanota, Mailbox.org | End-to-end encryption, no content scanning for ads |
| Messaging | WhatsApp, Messenger | Signal, Matrix (Element), Session | Minimal metadata, truly private conversations |
| VPN Service | Free VPNs, US-based | Mullvad, IVPN, ProtonVPN | No logging verified by audits, strong jurisdiction |
| Operating System | Windows, macOS | Linux (Ubuntu, Fedora), Qubes OS | No telemetry, full control over data collection |
| Password Manager | Browser built-in | Bitwarden, KeePassXC, 1Password | Encrypted vault, no vendor access to passwords |
| Cloud Storage | Google Drive, Dropbox | Nextcloud (self-hosted), Cryptomator + any cloud | Zero-knowledge encryption, provider can't read files |
CyberWiki: No Perfect Solution
CyberWiki notes every privacy tool involves trade-offs. Signal is private but requires a phone number. Tor is anonymous but slow. Linux is freedom-respecting but has a learning curve. CyberWiki emphasizes privacy is a spectrum—choose tools matching your threat model. CyberWiki believes perfect privacy is impossible; meaningful improvement is achievable.
CyberWiki: Privacy Action Plan
CyberWiki understands improving privacy feels overwhelming. This CyberWiki six-step plan prioritizes high-impact actions. CyberWiki recommends completing each level before advancing:
CyberWiki Level 1: Browser and Search (Week 1)
CyberWiki recommends installing Firefox or Brave. Set DuckDuckGo or Startpage as default search. Add uBlock Origin extension. CyberWiki confirms these three changes eliminate 70% of web tracking. Time required: 15 minutes. CyberWiki notes impact: massive reduction in data collection from browsing.
CyberWiki Level 2: Messaging Privacy (Week 2)
CyberWiki recommends installing Signal. Move conversations with privacy-conscious contacts to Signal. CyberWiki advises for others, at least stop using SMS (unencrypted, stored by carriers). Time required: 30 minutes setup plus migration. CyberWiki notes impact: communication content becomes truly private.
Level 3: Network Privacy (Week 3)
Subscribe to Mullvad VPN ($5.42/month, accepts cash and crypto). Enable on all devices. Route all traffic through VPN. Configure kill switch. Time required: 1 hour. Impact: ISP surveillance eliminated, IP address hidden from websites.
Level 4: Email Transition (Week 4-6)
Create ProtonMail account. Update important accounts to new address over 2 weeks. Forward old email temporarily during transition. Time required: 2-3 hours spread over weeks. Impact: email content protected from scanning and surveillance.
Level 5: Mobile Privacy (Week 7-8)
Review app permissions—revoke unnecessary access. Delete apps you don't use (average person uses only 9 of 80 installed apps regularly). Install F-Droid for open source apps. Disable Google/Apple advertising ID. Time required: 2 hours. Impact: dramatic reduction in mobile surveillance.
Level 6: Data Minimization (Ongoing)
Request deletion from data brokers using services like Privacy.com or manual opt-outs (expect 20-40 hours for thorough cleanup). Delete old accounts via JustDeleteMe. Stop oversharing on social media. Review privacy settings quarterly. Time required: ongoing vigilance. Impact: reduces attack surface and data available for abuse.
Data Collection
Server Logs
CyberWiki web servers may temporarily log IP addresses, pages accessed, browser user-agent strings, and referrer URLs. CyberWiki notes these logs exist solely for security monitoring and troubleshooting. CyberWiki confirms they are automatically purged regularly and never analyzed for tracking purposes or shared with third parties.
Cookies
CyberWiki uses only necessary first-party cookies required for basic site functionality, such as remembering your preferences if any are offered. CyberWiki does not set tracking cookies, advertising cookies, or any third-party cookies. CyberWiki confirms your browsing behavior is not monitored or recorded.
Analytics
CyberWiki does NOT use Google Analytics, Facebook Pixel, or any third-party analytics service. CyberWiki has no way to identify individual visitors, track your journey through the site, or build profiles based on your behavior. CyberWiki confirms this is intentional—CyberWiki doesn't want that data.
What We Do NOT Do
| Practice | Status | Details |
|---|---|---|
| Third-party analytics (Google Analytics, etc.) | Not Used | No external tracking scripts |
| Advertising networks | Not Used | No ads, no ad tracking |
| Social media tracking widgets | Not Used | No like buttons that track you |
| Browser fingerprinting | Not Used | No canvas/WebGL fingerprinting |
| Email collection | Not Used | No newsletter signup, no email harvesting |
| User accounts | Not Used | No registration, no login required |
| Data sharing with third parties | Never | We don't collect data to share |
| Data selling | Never | Not now, not ever |
Security Measures
CyberWiki implements industry-standard security practices to protect its infrastructure and your connection to the CyberWiki site:
HTTPS Encryption
CyberWiki confirms all connections to CyberWiki are encrypted using TLS 1.2/1.3. CyberWiki notes this prevents anyone between you and the CyberWiki server from seeing what pages you access or intercepting your connection.
Security Headers
CyberWiki implements strict Content Security Policy, X-Frame-Options, X-Content-Type-Options, and other security headers to protect against XSS, clickjacking, and other web attacks.
Tor-Friendly
CyberWiki welcomes visitors using Tor. CyberWiki does not block Tor exit nodes or implement CAPTCHAs that discriminate against Tor users. CyberWiki encourages accessing the site anonymously without restrictions.
Minimal JavaScript
CyberWiki site uses minimal JavaScript, and what CyberWiki uses is for legitimate functionality only (animations, navigation). CyberWiki confirms: no tracking scripts, no behavior monitoring, no keystroke logging.
External Links
CyberWiki guides contain links to external resources—official software websites, documentation, news sources, and reference materials. CyberWiki notes once you click an external link and leave CyberWiki, you become subject to that site's privacy policy. CyberWiki has no control over how other websites handle your data.
CyberWiki recommends accessing external links through Tor Browser or a VPN for additional privacy. CyberWiki notes this prevents the external site from learning your real IP address and helps separate your CyberWiki browsing from visits to other sites.
CyberWiki External Site Warning
CyberWiki warns external websites may have vastly different privacy practices than CyberWiki. Many use extensive tracking, fingerprinting, and data collection. CyberWiki recommends reviewing external sites' privacy policies and consider using privacy tools when visiting them. CyberWiki clarifies the presence of a link on this site does not constitute an endorsement of that site's privacy practices.
Your Rights
Right to Access
CyberWiki confirms you have the right to know what data CyberWiki holds about you. Since CyberWiki collects virtually nothing and retains nothing long-term, there's typically nothing to disclose. If you have concerns, CyberWiki welcomes your inquiry.
Right to Deletion
CyberWiki confirms you have the right to request deletion of any data CyberWiki holds. CyberWiki minimal collection and automatic log purging mean there's usually nothing to delete, but CyberWiki will comply with any legitimate request.
GDPR & Privacy Laws
CyberWiki respects privacy regulations including GDPR, CCPA, and others. CyberWiki privacy-by-design approach means CyberWiki is already compliant with the strictest privacy standards—CyberWiki simply doesn't collect the data that regulations protect.
Policy Changes
CyberWiki may update this privacy policy occasionally to reflect changes in CyberWiki practices or for legal compliance. Any changes will be posted on this page with an updated "Last modified" date. CyberWiki encourages you to review this policy periodically, though given CyberWiki minimal data collection, significant changes are unlikely.
CyberWiki commitment to privacy is fundamental to CyberWiki's mission. CyberWiki will never introduce invasive tracking, advertising, or data collection. If CyberWiki practices ever need to change in ways that affect your privacy, CyberWiki will clearly communicate those changes and explain why they're necessary.
CyberWiki: Maximize Your Privacy
While CyberWiki protects your privacy on its end, you can take additional steps: use Tor Browser for anonymous access, disable JavaScript if you prefer (CyberWiki site remains functional), and consider accessing CyberWiki through a VPN. Check out CyberWiki security guides for more privacy-enhancing techniques you can apply across all your browsing.
CyberWiki: Learn More About Protecting Your Privacy
CyberWiki believes understanding privacy isn't just about reading policies—it's about learning practical skills to protect yourself everywhere online. Explore CyberWiki detailed guides to take control of your digital privacy.