Cover Image from Wonder Woman Year One trade paperback from DC Comics
Let’s talk about Wonder Woman and Diana Prince for a minute. Pretty much every comics geek has asked the same question since the character’s inception: “How is it that no one realizes that she’s just wearing a pair of glasses to hide her identity?”
If you think about it, the answer is really about misdirection and privacy. Wonder Woman consistently misdirects people about her true identity, and she never (or rarely) shares information that could be used to link her to her alter ego.
In the real world, that level of misdirection and privacy is incredibly important to our daily lives, especially when we share information on the internet or through applications. The more you do online, the more information you leave behind. This information, your digital footprint, is a way that people who wish you harm can track you down to your real, in-person, identity.
While it may feel hopeless if your data has already been stolen in a data breach, reducing your digital footprint is the online version of those Diana Prince glasses. To be a data superhero, you don’t need a lot of fancy tools, you just need a little information and some time.
Just like Wonder Woman or Superman, you don’t want everyone on the planet to know who you really are or to track you down. First, that’s creepy. Second, it could be dangerous. However, what you consider dangerous may be different from someone else.
Your threat model is basically a list of the bad things that can happen to you in person or online. Everyone has a different threat model and a different risk tolerance, even if some of the potentially bad things would overlap.
Consider the following examples:
While these examples may seem too different from each other, they’re an excellent example of the different threat models that people face.
In the technology world, threat modeling is a system for identifying bad things and finding ways to fix them. It typically asks the following four questions:
Where everyone knows who Wonder Woman and Superman are, most of the people in the comics don’t know their alter egos, Diana Prince and Clark Kent. Online, your personal information is anything that can identify who you are in the physical world. Some examples of personal information are things you’ve probably already received a data breach notification about:
We all have personal information floating around on the internet. We know about some of it because we put it there, like social media accounts or healthcare provider portals. We don’t know about some of it because we didn’t put it there, like those people finder websites. Some threats come from sharing information with people while you were friends with them, only to have them use it against you, like sharing photos sent to a partner.
You can’t control the data that you don’t know about.
To figure out how much information is available on the internet, also called your digital footprint, you may can start by:
So, the first thing we need to do is identify all the different potential threats that come from having our data out in the wide world of the internet. For Superman and Wonder Woman, the threat is people finding out who they really are. Many of the side plots involve their covers almost being blown, adding to the tension.
In your world, you need to think about the different ways that your “digital alter ego” could be compromised in a way that can cause you harm, either personal or financial.
Some threats to consider might include:
You can find a more detailed list of threats and more threat modeling discussion here.
Once you list all the different threats, you can start organizing them based on how harmful they would be if they really happened. To use the original examples, a woman worried about a violent ex-partner might find having her physical address identified as much more harmful than a teenager posting a fit pic to the ‘Gram.
Just like the threats facing everyone are different, the harm that they have are different.
Our superheroes spend a lot of time hiding behind walls or quick-changing in telephone booths. In the digital world, you want to do something similar to prevent people you don’t know from figuring out your real identity.
Taking control over your information isn’t easy, and the process can feel really overwhelming. If you start by looking at the bad things that would cause the most harm, you can group the activities more easily.
If you’re worried that someone can use your information to hurt you in person, then some steps you can take include:
While you can’t ask to have public records deleted (like property records), you can ask to be removed from data sharing sites. If you want some more detailed resources, you can read this blog post.
The list of actions to help you protect against digital harm gets a lot longer. Since this can get overwhelming really fast, let’s break this up into a few different categories.
First up, we can look at the things you can do to get rid of your social media accounts. Some of these steps include:
If your threat model means you want or need to keep your social media accounts, you can still reduce the amount of information out there for everyone to see. Some actions you can take include:
The less information you have on the internet, the less likely you are to have your information stolen or someone finding you.
After limiting the information you already shared, you can take the following steps to keep protecting yourself:
The biggest problem a lot of people face is that protecting information takes energy. Everything that helps keep information private means doing extra work and knowing how to do the extra work.
Some of the things you can do to protect your accounts include:
Depending on what you’re talking about and what documents you’re storing online, you can also take a few more steps to keep the wrong people from finding them. The more important your information is to you, the more protection you want to put around it. If you have digital copies of birth certificates, social security cards, or driver’s licenses, you don’t want some rando on the internet being able to steal them – and that includes anyone who’s storing things for you. For example, Google the Company may be able to see or read information stored on the Drive, including emails. Plus, all the AI things they offer use the information that’s stored on your Drive or in emails to help you, which means it may not be as private as you need it to be.
To protect stored information, documents, and conversations, you can:
So, how do you know how well you did? Well, you may never have a real answer, but you can go back to “what are we doing” and run through that checklist again. Depending on how much anonymity you want, you can review whether your information is still available.
If you still don’t feel safe, you can reach out to professionals who can help you.
This post was last modified on March 5, 2025 9:13 am
The fight between winter and the onset of spring is something we know well in…
Out today is the newest Mouse Guard book, 'Mouse Guard: Dawn of the Black Axe'—and…
If you like some extra squares in your cubes, check out the new Rubik's x…
Like many others, I jumped directly into my Apple Music Replay this year filled with…
It's time to stuff the stockings that were hung with care with our must-have stocking…