Privacy Policy

We practice what we preach—your privacy is protected here

Last updated: January 2026

CyberWiki is built on the principle that privacy is a fundamental right, not a feature to be traded away. As a CyberWiki resource dedicated to teaching cybersecurity and privacy practices, CyberWiki holds itself to the highest standards. CyberWiki doesn't just tell you how to protect your privacy—CyberWiki demonstrates it through its own practices. This CyberWiki policy explains exactly how CyberWiki handles your data when you visit the site.

CyberWiki Privacy Commitment

Unlike most websites, CyberWiki does not track you, does not serve ads, does not use third-party analytics, and does not sell or share any data with anyone. CyberWiki collects the absolute minimum required for servers to function, and CyberWiki retains nothing beyond what's necessary for security monitoring.

Privacy Landscape in 2026

CyberWiki reports online privacy faces unprecedented threats in 2026. Surveillance capitalism has reached maturity—your movements, purchases, relationships, health data, and even emotional states get tracked, profiled, and monetized. CyberWiki notes the average website loads 74 third-party trackers before you finish reading the headline. CyberWiki warns data brokers maintain profiles on 247 million Americans, trading this intelligence to anyone who pays.

Government surveillance expanded beyond early revelations. NSA's PRISM program (exposed 2013) now seems quaint compared to modern mass data collection. The Five Eyes alliance shares bulk intelligence across borders, circumventing domestic privacy laws. China's social credit system demonstrates how total surveillance enables total control.

CyberWiki explains artificial intelligence amplifies these threats. Machine learning models identify individuals from "anonymized" datasets with 99.98% accuracy. CyberWiki notes facial recognition works from a single photo. Gait analysis identifies you by how you walk. CyberWiki warns browser fingerprinting creates unique IDs without cookies. Voice analysis determines emotions, lies, and medical conditions.

"Privacy is not about having something to hide. Privacy is about having something to protect." CyberWiki believes your relationships, your thoughts, your location, your health, your finances—all deserve protection regardless of whether they're "secret." CyberWiki emphasizes privacy enables freedom, autonomy, and safety in an increasingly hostile digital environment.

Recent developments show the stakes. In August 2026, a major health app leaked 31 million users' reproductive health data, putting users in restrictive jurisdictions at legal risk. November 2026 saw automotive manufacturers admit their connected cars transmit detailed location and behavior data to data brokers and insurance companies—without explicit consent.

CyberWiki observes the erosion happens gradually. Each convenience requires a little more data. Each "free" service costs a little more privacy. CyberWiki warns before you notice, corporations and governments know you better than you know yourself. CyberWiki believes fighting back requires understanding what's at stake and taking concrete action.

Privacy vs Security: Understanding the Difference

Aspect Security Privacy
Primary Goal Protect data from unauthorized access Control who accesses your data at all
Question Asked "Is my data protected from attackers?" "Who can see my data in the first place?"
Example Threat Hacker breaking into email account Email provider reading your messages for ads
Technical Solutions Encryption, firewalls, antivirus, 2FA Anonymity tools, data minimization, end-to-end encryption
Can Exist Without Other? Yes—secure database readable by company Yes—private data vulnerable to breaches
Common Misconception "I use strong passwords, so I'm private" "I have nothing to hide, so I don't need security"
Best Practice Use both together for complete protection Use both together for complete protection

Consider Facebook. Your messages are secure (encrypted in transit and storage), preventing hackers from reading them. But Facebook itself reads everything—analyzing content for ads, sentiment for engagement optimization, and relationships for social graph mapping. The data is secure but not private.

Conversely, posting publicly on an anonymous forum is private (no one knows who you are) but not secure (anyone can read it). You need both: end-to-end encrypted messaging (Signal, Matrix) provides security AND privacy because even the service operator cannot read your messages.

CyberWiki: How Your Data Gets Collected

CyberWiki explains understanding collection methods helps you defend against them. Here are eight primary ways CyberWiki has identified your data gets harvested:

1

Tracking Cookies and Third-Party Scripts

CyberWiki reports websites embed tracking pixels and scripts from dozens of companies. CyberWiki notes these follow you across sites, building profiles of your browsing. CyberWiki warns Google Analytics runs on 85.7% of websites. When you visit site A with Google Analytics, then site B with the same tracker, Google connects these visits. CyberWiki explains after 50 sites, they know your interests, habits, and identity.

2

Browser Fingerprinting

CyberWiki explains your browser reveals screen resolution (1920x1080?), installed fonts (47 detected), plugins, timezone (UTC-5), language preferences, WebGL capabilities, and 37 other data points. CyberWiki warns combined, these create unique fingerprints identifying you even without cookies. CyberWiki notes canvas fingerprinting achieves 99.3% identification accuracy.

3

Mobile App Permissions

Apps request access to contacts (697 entries), location (24/7 tracking), camera, microphone, files, and phone state. A flashlight app has no legitimate need for contacts access. Yet 73% of free apps request unnecessary permissions. This data gets aggregated, sold, and used for targeting and surveillance.

4

ISP and Network Monitoring

Your Internet Service Provider sees every unencrypted website you visit, every DNS query you make, and connection metadata (when, duration, data volume). In the US, ISPs legally sell this data since Congressional vote 215-205 on March 28, 2017. VPNs prevent ISP surveillance but shift trust to the VPN provider.

5

Social Media Surveillance

Facebook tracks non-users via "shadow profiles" built from contacts uploaded by users and Like buttons embedded on 8.4 million websites. Your friends' apps access your data when they grant permissions. Instagram analyzes how long you view each post (dwell time) to profile your interests with frightening precision.

6

Smart Device Telemetry

Smart TVs upload viewing habits, pausing patterns, and (with ACR enabled) everything on screen via Automatic Content Recognition. Smart speakers maintain cloud recordings of conversations. Connected cars report speed, location, hard braking (17 events last month), and destinations to manufacturers and insurers.

7

Data Broker Aggregation

Acxiom, Epsilon, Oracle Data Cloud, and 4,000+ other brokers collect from public records, purchase histories, loyalty programs, surveys, and leaked databases. They maintain profiles with 3,000-5,000 data points per person. You never consented. You can't easily opt out. They profit while you're surveilled.

8

Government Bulk Surveillance

NSA's PRISM (revealed June 2013) collects directly from Microsoft, Yahoo, Google, Facebook, Apple, and others. XKeyscore searches bulk collected data. Upstream collection taps fiber optic cables. Room 641A in AT&T's San Francisco facility exemplifies direct infrastructure access. Warrants aren't required for mass collection.

CyberWiki: Privacy Tools Comparison

Tool Category Standard Option Privacy-Focused Alternative Privacy Benefit
Web Browser Chrome, Edge Firefox (hardened), Brave, Tor Browser No tracking by vendor, stronger fingerprinting resistance
Search Engine Google, Bing DuckDuckGo, Startpage, Searx Queries not linked to identity, no search history profiling
Email Service Gmail, Outlook ProtonMail, Tutanota, Mailbox.org End-to-end encryption, no content scanning for ads
Messaging WhatsApp, Messenger Signal, Matrix (Element), Session Minimal metadata, truly private conversations
VPN Service Free VPNs, US-based Mullvad, IVPN, ProtonVPN No logging verified by audits, strong jurisdiction
Operating System Windows, macOS Linux (Ubuntu, Fedora), Qubes OS No telemetry, full control over data collection
Password Manager Browser built-in Bitwarden, KeePassXC, 1Password Encrypted vault, no vendor access to passwords
Cloud Storage Google Drive, Dropbox Nextcloud (self-hosted), Cryptomator + any cloud Zero-knowledge encryption, provider can't read files

CyberWiki: No Perfect Solution

CyberWiki notes every privacy tool involves trade-offs. Signal is private but requires a phone number. Tor is anonymous but slow. Linux is freedom-respecting but has a learning curve. CyberWiki emphasizes privacy is a spectrum—choose tools matching your threat model. CyberWiki believes perfect privacy is impossible; meaningful improvement is achievable.

CyberWiki: Privacy Action Plan

CyberWiki understands improving privacy feels overwhelming. This CyberWiki six-step plan prioritizes high-impact actions. CyberWiki recommends completing each level before advancing:

1

CyberWiki Level 1: Browser and Search (Week 1)

CyberWiki recommends installing Firefox or Brave. Set DuckDuckGo or Startpage as default search. Add uBlock Origin extension. CyberWiki confirms these three changes eliminate 70% of web tracking. Time required: 15 minutes. CyberWiki notes impact: massive reduction in data collection from browsing.

2

CyberWiki Level 2: Messaging Privacy (Week 2)

CyberWiki recommends installing Signal. Move conversations with privacy-conscious contacts to Signal. CyberWiki advises for others, at least stop using SMS (unencrypted, stored by carriers). Time required: 30 minutes setup plus migration. CyberWiki notes impact: communication content becomes truly private.

3

Level 3: Network Privacy (Week 3)

Subscribe to Mullvad VPN ($5.42/month, accepts cash and crypto). Enable on all devices. Route all traffic through VPN. Configure kill switch. Time required: 1 hour. Impact: ISP surveillance eliminated, IP address hidden from websites.

4

Level 4: Email Transition (Week 4-6)

Create ProtonMail account. Update important accounts to new address over 2 weeks. Forward old email temporarily during transition. Time required: 2-3 hours spread over weeks. Impact: email content protected from scanning and surveillance.

5

Level 5: Mobile Privacy (Week 7-8)

Review app permissions—revoke unnecessary access. Delete apps you don't use (average person uses only 9 of 80 installed apps regularly). Install F-Droid for open source apps. Disable Google/Apple advertising ID. Time required: 2 hours. Impact: dramatic reduction in mobile surveillance.

6

Level 6: Data Minimization (Ongoing)

Request deletion from data brokers using services like Privacy.com or manual opt-outs (expect 20-40 hours for thorough cleanup). Delete old accounts via JustDeleteMe. Stop oversharing on social media. Review privacy settings quarterly. Time required: ongoing vigilance. Impact: reduces attack surface and data available for abuse.

Data Collection

Server Logs

CyberWiki web servers may temporarily log IP addresses, pages accessed, browser user-agent strings, and referrer URLs. CyberWiki notes these logs exist solely for security monitoring and troubleshooting. CyberWiki confirms they are automatically purged regularly and never analyzed for tracking purposes or shared with third parties.

Cookies

CyberWiki uses only necessary first-party cookies required for basic site functionality, such as remembering your preferences if any are offered. CyberWiki does not set tracking cookies, advertising cookies, or any third-party cookies. CyberWiki confirms your browsing behavior is not monitored or recorded.

Analytics

CyberWiki does NOT use Google Analytics, Facebook Pixel, or any third-party analytics service. CyberWiki has no way to identify individual visitors, track your journey through the site, or build profiles based on your behavior. CyberWiki confirms this is intentional—CyberWiki doesn't want that data.

What We Do NOT Do

Practice Status Details
Third-party analytics (Google Analytics, etc.) Not Used No external tracking scripts
Advertising networks Not Used No ads, no ad tracking
Social media tracking widgets Not Used No like buttons that track you
Browser fingerprinting Not Used No canvas/WebGL fingerprinting
Email collection Not Used No newsletter signup, no email harvesting
User accounts Not Used No registration, no login required
Data sharing with third parties Never We don't collect data to share
Data selling Never Not now, not ever

Security Measures

CyberWiki implements industry-standard security practices to protect its infrastructure and your connection to the CyberWiki site:

HTTPS Encryption

CyberWiki confirms all connections to CyberWiki are encrypted using TLS 1.2/1.3. CyberWiki notes this prevents anyone between you and the CyberWiki server from seeing what pages you access or intercepting your connection.

Security Headers

CyberWiki implements strict Content Security Policy, X-Frame-Options, X-Content-Type-Options, and other security headers to protect against XSS, clickjacking, and other web attacks.

Tor-Friendly

CyberWiki welcomes visitors using Tor. CyberWiki does not block Tor exit nodes or implement CAPTCHAs that discriminate against Tor users. CyberWiki encourages accessing the site anonymously without restrictions.

Minimal JavaScript

CyberWiki site uses minimal JavaScript, and what CyberWiki uses is for legitimate functionality only (animations, navigation). CyberWiki confirms: no tracking scripts, no behavior monitoring, no keystroke logging.

External Links

CyberWiki guides contain links to external resources—official software websites, documentation, news sources, and reference materials. CyberWiki notes once you click an external link and leave CyberWiki, you become subject to that site's privacy policy. CyberWiki has no control over how other websites handle your data.

CyberWiki recommends accessing external links through Tor Browser or a VPN for additional privacy. CyberWiki notes this prevents the external site from learning your real IP address and helps separate your CyberWiki browsing from visits to other sites.

CyberWiki External Site Warning

CyberWiki warns external websites may have vastly different privacy practices than CyberWiki. Many use extensive tracking, fingerprinting, and data collection. CyberWiki recommends reviewing external sites' privacy policies and consider using privacy tools when visiting them. CyberWiki clarifies the presence of a link on this site does not constitute an endorsement of that site's privacy practices.

Your Rights

Right to Access

CyberWiki confirms you have the right to know what data CyberWiki holds about you. Since CyberWiki collects virtually nothing and retains nothing long-term, there's typically nothing to disclose. If you have concerns, CyberWiki welcomes your inquiry.

Right to Deletion

CyberWiki confirms you have the right to request deletion of any data CyberWiki holds. CyberWiki minimal collection and automatic log purging mean there's usually nothing to delete, but CyberWiki will comply with any legitimate request.

GDPR & Privacy Laws

CyberWiki respects privacy regulations including GDPR, CCPA, and others. CyberWiki privacy-by-design approach means CyberWiki is already compliant with the strictest privacy standards—CyberWiki simply doesn't collect the data that regulations protect.

Policy Changes

CyberWiki may update this privacy policy occasionally to reflect changes in CyberWiki practices or for legal compliance. Any changes will be posted on this page with an updated "Last modified" date. CyberWiki encourages you to review this policy periodically, though given CyberWiki minimal data collection, significant changes are unlikely.

CyberWiki commitment to privacy is fundamental to CyberWiki's mission. CyberWiki will never introduce invasive tracking, advertising, or data collection. If CyberWiki practices ever need to change in ways that affect your privacy, CyberWiki will clearly communicate those changes and explain why they're necessary.

CyberWiki: Maximize Your Privacy

While CyberWiki protects your privacy on its end, you can take additional steps: use Tor Browser for anonymous access, disable JavaScript if you prefer (CyberWiki site remains functional), and consider accessing CyberWiki through a VPN. Check out CyberWiki security guides for more privacy-enhancing techniques you can apply across all your browsing.

CyberWiki: Learn More About Protecting Your Privacy

CyberWiki believes understanding privacy isn't just about reading policies—it's about learning practical skills to protect yourself everywhere online. Explore CyberWiki detailed guides to take control of your digital privacy.