<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Privacy on Ryan P. Meyer</title><link>https://ryanpmeyer.eu/tags/privacy/</link><description>Something my own.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@ryanpmeyer.eu (Ryan P. Meyer)</managingEditor><webMaster>hello@ryanpmeyer.eu (Ryan P. Meyer)</webMaster><copyright>© 2026 Ryan P. Meyer</copyright><lastBuildDate>Fri, 10 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://ryanpmeyer.eu/tags/privacy/index.xml" rel="self" type="application/rss+xml"/><item><title>Privacy</title><link>https://ryanpmeyer.eu/topics/privacy/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/privacy/</guid><category>topics</category><category>privacy</category><category>security</category><description>The right to control who has access to your personal information and how it gets used. In practice, this means choosing tools and behaviors that minimize unnecessary data exposure; from email aliases to encrypted messaging to understanding what the apps your use actually collect.&amp;#xA;Privacy isn’t about having something to hide. It’s about maintaining agency over your own information in a world where the default is to collect everything, store it forever, and monetize it later. Every data point you hand over is a bet that the company holding it will never be breached, acquired, or compelled to share.&amp;#xA;The practical toolkit: [[Email Masking|email masking services]], [[Encryption]], strong [[Password Management]], and a healthy skepticism about “free” services that fund themselves through surveillance.&amp;#xA;</description><content:encoded><![CDATA[<p>The right to control who has access to your personal information and how it gets used. In practice, this means choosing tools and behaviors that minimize unnecessary data exposure; from email aliases to encrypted messaging to understanding what the apps your use actually collect.</p>
<p>Privacy isn&rsquo;t about having something to hide. It&rsquo;s about maintaining agency over your own information in a world where the default is to collect everything, store it forever, and monetize it later. Every data point you hand over is a bet that the company holding it will never be breached, acquired, or compelled to share.</p>
<p>The practical toolkit: [[Email Masking|email masking services]], [[Encryption]], strong [[Password Management]], and a healthy skepticism about &ldquo;free&rdquo; services that fund themselves through surveillance.</p>
]]></content:encoded></item><item><title>Password Management</title><link>https://ryanpmeyer.eu/topics/password-management/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/password-management/</guid><category>topics</category><category>security</category><category>privacy</category><description>You should use a dedicated tool to generate, store, and autofill strong unique passwords for every account. It’s possibly one of the single most impactful thing most people can do to improve their [[Security]] posture! It helps eliminates password reuse, the root cause of most credential-based breaches.&amp;#xA;I support either Bitwarden or 1Password as great options for most people. Apple Passwords is okay, but vendor and ecosystem locked, and doesn’t have all the standard features; but it is better than nothing.&amp;#xA;I would avoid using Google Chrome’s password manager (or any browsers).&amp;#xA;I do not recommend LastPass at all.&amp;#xA;</description><content:encoded><![CDATA[<p>You should use a dedicated tool to generate, store, and autofill strong unique passwords for every account. It&rsquo;s possibly one of the single most impactful thing most people can do to improve their [[Security]] posture! It helps eliminates password reuse, the root cause of most credential-based breaches.</p>
<p>I support either Bitwarden or 1Password as great options for most people. Apple Passwords is okay, but vendor and ecosystem locked, and doesn&rsquo;t have all the standard features; but it is better than nothing.</p>
<p>I would avoid using Google Chrome&rsquo;s password manager (or any browsers).</p>
<p>I do not recommend LastPass at all.</p>
]]></content:encoded></item><item><title>Encryption</title><link>https://ryanpmeyer.eu/topics/encryption/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/encryption/</guid><category>topics</category><category>encryption</category><category>security</category><category>privacy</category><description>Cryptographic techniques for making data unreadable to anyone who doesn’t hold the key.&amp;#xA;End-to-end encryption means only the sender and recipient can read the message; not the service provider, not the government, not an attacker who compromises the server.&amp;#xA;</description><content:encoded><![CDATA[<p>Cryptographic techniques for making data unreadable to anyone who doesn&rsquo;t hold the key.</p>
<p>End-to-end encryption means only the sender and recipient can read the message; not the service provider, not the government, not an attacker who compromises the server.</p>
]]></content:encoded></item><item><title>Email Masking</title><link>https://ryanpmeyer.eu/topics/email-masking/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/email-masking/</guid><category>topics</category><category>privacy</category><category>security</category><description>Techniques for protecting your real email address from exposure. Primarily done through alias/masking services that generate unique forwarding addresses per service. When a breach happens, or an email is sold, you know where it happened from since every site should have a unique email.&amp;#xA;</description><content:encoded>&lt;p>Techniques for protecting your real email address from exposure. Primarily done through alias/masking services that generate unique forwarding addresses per service. When a breach happens, or an email is sold, you know where it happened from since every site should have a unique email.&lt;/p>
</content:encoded></item><item><title>Data Breaches</title><link>https://ryanpmeyer.eu/topics/data-breaches/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><atom:updated>2026-04-10T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/topics/data-breaches/</guid><category>topics</category><category>security</category><category>privacy</category><description>Unauthorized access to and exposure of sensitive information. As the saying goes: “The question isn’t whether a service you use will be breached; it’s when”.&amp;#xA;</description><content:encoded><![CDATA[<p>Unauthorized access to and exposure of sensitive information. As the saying goes: &ldquo;The question isn&rsquo;t whether a service you use will be breached; it&rsquo;s when&rdquo;.</p>
]]></content:encoded></item><item><title>The Tea App and Verifying Identities</title><link>https://ryanpmeyer.eu/posts/the-tea-app-and-verifying-identities/</link><pubDate>Wed, 30 Jul 2025 00:00:00 +0000</pubDate><atom:updated>2025-07-30T00:00:00Z</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/posts/the-tea-app-and-verifying-identities/</guid><category>posts</category><category>privacy</category><category>data exposure</category><category>trust</category><description>With the recent Tea App data exposure, I wanted to take a moment to think about the choices on how to verify user identities.</description><content:encoded><![CDATA[<h2 id="the-tea-app">The Tea App</h2>
<p>Right now there is an ongoing development of the Tea App having multiple data exposures. I don’t think I can give the details justice, so please look to <a href="https://www.404media.co?ref=ryanpmeyer.eu">404media.co</a> as they have been covering it quite well!</p>
<div class="center">
<p><a href="https://www.404media.co/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan/?ref=ryapmeyer.eu">Initial Exposure by 404media</a></p>
<p><a href="https://www.404media.co/a-second-tea-breach-reveals-users-dms-about-abortions-and-cheating/?ref=ryanpmeyer.eu">Second Exposure by 404media</a></p>
</div>
<p>The long and short, this app was purported to be a safe and private space for women to discuss dating. However, because they wanted to ensure it was only women they had a problem, verifying that fact.</p>
<p>They decided to use a selfie-with-id method, and ended up failing to secure that data both in storage and in deletion. Now, there are other issues with this app, but I want to focus on this particular problem they were trying to solve. How do you verify someone is who they say they are, with minimal compromise to their privacy?</p>
<p>Let’s look at what they ended up doing and where that failed.</p>
<aside class="alert alert--info" role="note">
  I am going to make some educated guesses on how they may have handled some processes, but the point I want to focus on will be that the method they chose is a difficult one with a lot of nuances.
</aside>

<p>To verify if someone was a woman, Tea would request the user to send them an iID document (License, Passport, etc) with a selfie of user in the photo. This is an effective way to verify someone, I will grant them that. However, it completely breaks any privacy expectations.</p>
<p>Because they chose to accept Personal Identifiable Information (PII) data the Tea app then needed to consider how they handle the data. How should it be transferred to the verification system? Who or what is verifying the data; is it automated or human based? Are you encrypting the data throughout this process? If so, you will need to decrypt it to verify, will that have any caching, logging or other artifact concerns? If there is a human involved, will they be able to exfiltrate the data by saving it, taking a photo with their phone, or otherwise? Once the data is reviewed how do you ensure it is deleted from the system properly?</p>
<p>As you can see, there are already a lot of questions, which will lead to more questions. In the end there was at least one point where the data was not encrypted and stored on a firebase storage bucket and that bucket was not protected.</p>
<p>So, in all honesty, it was a bad idea.</p>
<p>Looking back at the original problem, what is another way we could solve this problem that could have avoided these potential problems and resulting outcome?</p>
<h2 id="a-trust-ring">A Trust Ring</h2>
<p>Rather than having the App take the responsibility of verifying the user’s identity, they could let the users do it amongst themselves.</p>
<p>Setting up a system where the trust is created and developed between the users could allow for a more private and secure system. A hypothetical way this could work is:</p>
<ol>
<li>Make the sign-up invite only from other members</li>
<li>Accepting an invite creates a trust between the two users</li>
<li>Users can also sign-off on others to create additional trusted links and networks of trust</li>
</ol>
<p>This is a basic idea, you could add more layers like having to only send the invite over bluetooth (forcing a more localized requirement). Or adding in different levels of trust (invited, in real life confirmation, etc).</p>
<p>The trust ring would be able to rely on its core principles of:</p>
<ol>
<li>Direct trust established between users</li>
<li>Transitive Trust: If User A and B trust each other, and B trust’s C, then A is one degree away from trusting that user.</li>
<li>Leveraging the Degrees you can weigh how much someone could be trusted to discuss sensitive issues with.</li>
<li>Someone that has many direct and reciprocated trusts could help establish them as trusted even at a distance.</li>
</ol>
<h3 id="how-could-this-look-for-the-user">How could this look for the user?</h3>
<p>Suppose you hear about the app from a friend, they would give you their invite code and you can sign up. That creates an initial trust between you and that person. From there you might be able to see their first level trusted friends on the app, you could then ask your friend that invited you to verify if they know those users and also trust them, maybe at a lower level of trust, but you trust your friend and they trust these users. Over time this could create a network effect, where you have a strong set of trusted people to talk to. Since this app was designed around dating, and most of that is fairly localized, that can also help determine who is actually in your area or who might not be. Additionally, suppose a new user reaches out, you can see how you might know them through the trusted network you have, or maybe see that they don’t have much of a network at a time and work to confirm things first.</p>
<p>Now this wouldn’t be the final solution, but it would be a good start to keeping the users a lot more safe and private; rather than handing over their ID and everyone needing to trust the Application’s Owners and Moderators.</p>
<p>Additionally, this isn’t a perfect system, this can still be abused through manipulation of the trust network and it doesn’t directly prevent non-welcomed users (men in this case) from signing up and trying to pose as a legitimate user. But fake IDs and AI exist well enough to make a convincing selfie-with-ID - so I’d call it even there.</p>
<p>You could also extend this using other attribute based methods. As mentioned with using local proximity to verify or send invites, you could also use user general locations to help verify the legitimacy of trusts being created. I am sure there is some math to help determine what the average expected trusts would be between people and if it exceeds that or looks abnormal it could flag a user. I remember during COVID there were apps that would be able to share exposure proximity via BLE, that could potentially be adapted too. Anyway I am digressing a bit here.</p>
<h2 id="final-thoughts">Final Thoughts</h2>
<p>The long and short here is, if an App or service states it is privacy focused and asks for very sensitive information to be able to access it, maybe think twice before handing that over. And from the design perspective, sometimes the simplest choice initially, will be the more complicated and riskier process.</p>
]]></content:encoded></item><item><title>Hide Your Email Services</title><link>https://ryanpmeyer.eu/posts/hide-your-email-services/</link><pubDate>Tue, 29 Oct 2024 21:00:00 +0100</pubDate><atom:updated>2024-10-29T21:00:00+01:00</atom:updated><author>hello@ryanpmeyer.eu (Ryan P. Meyer)</author><guid isPermaLink="true">https://ryanpmeyer.eu/posts/hide-your-email-services/</guid><category>posts</category><category>blog</category><category>privacy</category><category>security</category><description>Data breaches are a constant, what can you do?</description><content:encoded><![CDATA[<h2 id="introduction">Introduction</h2>
<p>Unfortunately, it&rsquo;s highly likely that your information will be exposed at some point. This has become a common enough occurrence that instead of asking, &ldquo;If it happens, what do I do?&rdquo; it&rsquo;s more prudent to ask, &ldquo;When it happens, have I prepared enough to minimize the impact?&rdquo;</p>
<p>I’ve considered this from various angles, but one method of protection worth discussing is &ldquo;Hide My Email Services&rdquo; like Apple&rsquo;s <a href="https://support.apple.com/en-us/105078">service</a> with iCloud, or Proton&rsquo;s <a href="https://proton.me/support/aliases-mail">service</a> and how these services can be used to protect your privacy.</p>
<p>Keep in mind though, that whenever you plan to increase your security or privacy you will, in most cases, lose some convenience or ease of use.</p>
<h3 id="what-are-hide-my-email-services">What Are Hide My Email Services?</h3>
<p>To start, these services create an alias that will relay any emails sent to it directly to your main email address. These aliases are often a randomly generated name with one or several domains. So, if your email is <code>jdoe@gmail.com</code> and you use Apple&rsquo;s Service, it will generate an email like <code>Jade.0a.Kiwi@icloud.com</code>. You can then use this email for a website, and even generate multiple aliases that point back to <code>jdoe@gmail.com</code></p>
<p>Think of it as having an unlimited number forwarding addresses for your main email.</p>
<pre tabindex="0"><code>Website --Sends Email--&gt; Alias Email --Forwards--&gt; Main Email
</code></pre><h4 id="aliases-alternatives">Aliases Alternatives</h4>
<p>Some email services also offer a similar feature by allowing you to append a <code>+</code> to your email address. So <code>jdoe@gmail.com</code> can use something like <code>jdoe+facebook@gmail.com</code> as an email for Facebook. This would allow them to know that, in theory, only emails from Facebook should be going to that email, and if they get something from somewhere else they may be able to assume that the email was sold, exposed, or otherwise leaked.</p>
<p>Now, the issue with this from a privacy perspective is that the root email is clearly exposed. Instead, the goal is to make it difficult to guess your main email address and to ensure your provided email is as unlinkable to you as possible.</p>
<h2 id="when-to-use-hide-my-email-services">When to Use Hide My Email Services</h2>
<p>Now that we know, in general, that these services offer an ability to create unique, random emails that can be used to protect your main email, let&rsquo;s discuss when it might be appropriate to use these services, and the drawbacks in each case. I will order these in what I think are the best way to start as a path to more &ldquo;advanced&rdquo; usage.</p>
<h3 id="level-1-this-is-just-temporary">Level 1: This is just temporary</h3>
<p>If you run into a site or service that needs an email, but you don&rsquo;t ever plan to really manage the account (I will come back to this point though) then this is a perfect service for that.</p>
<p>Suppose you&rsquo;re at a restaurant and want to place an order through their website, which requires an email address. You can use these services to generate a temporary email, complete your order, and then delete that email to prevent any future spam.</p>
<p>And that&rsquo;s really it! Use the service as a temporary email, you can make just one for all use cases or generate a new one every time. I would suggest making a unique one for each, if possible, because that let&rsquo;s you get used to managing multiple ones at ones and move on to the next level.</p>
<h3 id="level-2-why-do-i-have-to-make-an-account">Level 2: Why do I <em>Have</em> to Make an Account?!</h3>
<p>Okay, so same as before, you&rsquo;re in a situation where you have to not only provide an email, but also make an account. Rather than using your main email, use a Hidden email instead! Additionally, make sure to use your password manager to generate a random password.</p>
<p>This site will now send spam only to your randomly generated email. And since the site now has associated login credentials, it could potentially be a source for email and password leaks. However, since they are both random, it is basically just junk. Sure you do need to make sure to secure that account the best you can, remove any other information, credit cards, etc.</p>
<p>But now this data cannot be used to comprise your accounts on other sites.</p>
<h3 id="level-3-change-my-email">Level 3: Change My Email</h3>
<p>At this point, I hope you see where we are going. Taking this a step further, we can start changing our non-critical accounts to use Hide My Email services. Randomly generate a new email, log in to your site still using your root email, and then change it. Oh, and update your password while you are there to make sure it is fully randomized while you are there; and set up MFA.</p>
<p>Remember, this is only protecting you when it comes to linking the email to you directly and cross referencing/attacking to other sites.</p>
<p>I will want to also add a note here that you should take care on which sites you do this with. For social media, video game accounts, shopping accounts, there shouldn&rsquo;t be too much of a risk using these emails. However, financial sites, government accounts, and other &ldquo;Identity based sites&rdquo; you may want to use your root email or other softer alias techniques like the <code>+</code> appending technique. Why? Well, it could be more frustrating to maintain or get support with a randomly generated email. Also, these sites tend to, but not always, have a stronger security posture. Remember, we are looking at minimizing impact here, not remove it entirely!</p>
<h2 id="is-it-worth-the-effort">Is it worth the effort?</h2>
<p>To summarize what we can do here is:</p>
<ol>
<li>Get a new service, and yet another subscription.</li>
<li>Give spammers meaningless, disposable emails.</li>
<li>Use throw-away emails for throw-away accounts.</li>
<li>Move existing accounts to these new, randomly generated emails.</li>
</ol>
<p>This helps isolate sites to a single email, lowering the value of your data provided and protecting you from being identified in a data leak. Additionally, in combination with randomly generated passwords, helps to isolate credential stuffing attacks to just that one site.</p>
<p>But, it isn&rsquo;t all perfect. There are some negatives to consider!</p>
<h3 id="negatives">Negatives</h3>
<h4 id="communication">Communication</h4>
<p>There are times when you may need to send an email from that randomly generated address, like when reaching out to support. This can be clunky or even impossible, depending on the service, and it&rsquo;s generally not as simple as using your regular email address.</p>
<p>Also, trying to call support, or provide the email can get you some odd looks. And it is cumbersome to generate one in person, but not a non-stopper.</p>
<h4 id="authenticity">Authenticity</h4>
<p>Another thing to be aware of, some sites have protections around temporary email addresses, particularly ones like 10minutemail. This can lead to issues where your generated email may not be accepted if the domain isn&rsquo;t well known. For example, Apple&rsquo;s uses icloud.com as the domain, which is well known and accepted in most cases. However if you use a service that uses less known domains, or you can use your own, that can lead to issues with the email not being accepted.</p>
<h4 id="service-provider-trust">Service Provider trust</h4>
<p>A significant concern with these services is that all emails going to those alias addresses are accessible to the service providers. For example, Apple could, in theory, see what is sent to <code>Jade.0a.Kiwi@icloud.com</code>.</p>
<h4 id="data-breaches">Data breaches</h4>
<p>When a breach happens you can go to places like <a href="https://haveibeenpwned.com">Have I been Pwned</a> and put in your email to see where you were affected. However, now you don&rsquo;t see all your potential accounts, as most will have a unique email. In these cases, usually the site does send you an email to alert you, so you will want to monitor for those a bit more actively. When you do get one, you can do your normal response like resetting the password, but also reset the email!</p>
<h2 id="all-in-all">All in all</h2>
<p>Is this worth it? For you, I don&rsquo;t know. But for me, it is worth applying some of these items.</p>
]]></content:encoded></item></channel></rss>