Some website administration

I’ve just gone through the users registered to access the website and have de-activated a few members who haven’t accessed the website in the last 12 months. If you are one of those and wish to be re-activated just drop us a line. All members of Cardiff u3a are able to access the website. If you want to read, or indeed contribute, items please get in touch quoting your membership number.

I’ve also reviewed the status of members of Forums and Topics, I’ve changed a couple of members from Moderator to Participant, and added a couple of new Moderators. The difference in status is academic really. You can all add Topics and Reply to Topics.

Digital Identity

We’ve touched on this topic in number of ways “over the years”, but never specifically looked at Identity – our identity and how it is handled, and yes mistreated, in the digital world.

I don’t intend to go over old ground again, but will provide a basis to introduce what will be the main subject of today – Passkeys, which Iain will present. I will do that through referencing previous posts on this website.

We start with the first post I wrote way back in 2015, aptly entitled “Let’s start at the beginning …“. In this I go through the basic steps in creating a strong password and a few other things besides.

Then in 2020 we discussed using Password Managers in the post “Using a Password Manager and implementing Two Factor Authentication” which again reviews setting a password before moving into the area of using password managers – which have the advantage of your passwords being configurable to be available on any many machine, anywhere as they’re held in encrypted form, in the cloud. This post also introduces the idea of Two Factor Authentication (2FA) whereby having logged into a website you’re challenged to use an application (usually held on your smartphone), eg Google’s Authenticator or Authy (the one I use) to provide a second credential to the website to confirm you are who you said you are! [I’m afraid the images appear to be missing, but I’ll try and find them!!!]

Earlier this year (in January, I touched on Passkeys) in this post “Prevention and protection from Scams“, which also referenced my main post on the subject – “Keeping safe online” – which I’ve tried to keep up-to-date and will review again in the near future.

And then, in March 2025, I made you aware of the value of having an Apple ID and account – even if you’re not an Apple user, as a means of getting a set of user credentials (Identity) that you can use instead of supplying your regular email address, and creating a password, when requested, when visiting a website – often for purchases. Apple is well recognised for its privacy and security concerns, and unlike Microsoft, Google, Facebook or X, is more likely than any of the others to not use your Identity for any other purpose other than providing you with a digital identity.

That leads nicely into a bit of history from my working life at Cardiff University that I’ve never shared with you before which I’m very pleased to have been part of. Let me paint a picture, you need to go back 20 years; I’ll share a number of scenarios.

First. You’re a student, or a member of staff, you want an email address, you want to access file store, you want to access the growing number of resources available from the internet through the library, or even just manage your library subscription. You need a UserID and Password, or multiple UserIDs and Passwords to do what you want to do online. Nothing new here, it’s what you experience every time you access a new website! But quite a drudge when you’re in the same institution.

Solution. The IT department creates a unified Identity system that all departments can use. A single UserID and Password for each user.

However. If the staff member or student (on vacation at home say) wants to access their email, file store, whatever from another institution, they most normally couldn’t and the best they could hope for was applying for a “temporary”, or “guest user” account which would at best only provide limited privileges to the visited institution. Rather frustrating.

Solution. Cardiff University through the work of a young researcher – Rhys Smith (who’s tragically not with us anymore) – investigated and implemented (with external funding from JISC) the possibility of using a technology which went by the name of Shibboleth, but more accurately used Security Assertion Markup Language (SAML) architecture to provide Single Sign On to all resources within an organisation in the first instance …

In information technologyShibboleth is a community-wide password that enables members of that community to access an online resource without revealing their individual identities. The origin server can vouch for the identity of the individual user without giving the target server any further identifying information.[25] Hence the individual user does not know the password that is actually employed – it is generated internally by the origin server – and so cannot betray it to outsiders.

… but then by binding other organisations together into Federations, allowed all users of a federated organisation to access the resources they were entitled to use (from their host organisations’ permission policies) from any other institution in the same federation. In the UK this became the UK HE Federation. Nirvana! [Following on from this in due course, individual Federations applied to become members of more universal federated access and Microsoft and Google (for instance) implemented federated access using SAML v.2]

But how about WiFi, wasn’t that the solution anyway? Well yes, it was in one sense but if you wanted to move from one campus to another and use that institutions’ WiFi network you still had to apply for a separate UserID and Password. The work Cardiff did was to extend their work with SAML/Shibboleth to provide WiFi Roaming which meant that you could move between institutions and your host institution would provide the credentials that allowed you to login on different campuses.

End of history, but a fine exemplar of the implementation of Single Sign On. My role … I led a UK project to encourage and develop good practice in Identity Management within institutions, and then to encourage the institutions to take-up Shibboleth and Federated Access Management. For more information on this you can refer to Perplexity (of course!!!)

And so to Passkeys …

2025-07-22-U3A-DM-Passkeys-v01


Link to the Google video on YouTube about Passkeys.

Finally, a couple of links to hardware implementations of Identity Security …

Claude

Can you detail and describe physical devices used for identity purposes to allow access to systems, ie dongles or USB-stick based devices

Physical identity devices for system access come in several forms, each with different security mechanisms and use cases:

Hardware Security Keys

FIDO2/WebAuthn Keys (like YubiKey, Google Titan, SoloKeys)

  • Small USB, NFC, or Bluetooth devices that implement open authentication standards
  • Generate cryptographic signatures to prove identity without transmitting secrets
  • Often feature a physical button that must be pressed to authorize access
  • Resistant to phishing attacks since they’re bound to specific domains
  • Support multiple authentication protocols (FIDO2, U2F, PIV, OATH)

Smart Cards and Tokens

PIV/CAC Cards

  • Credit card-sized devices with embedded chips
  • Common in government and enterprise environments
  • Require PIN entry and card reader
  • Store certificates and cryptographic keys securely

USB Cryptographic Tokens

  • Larger than security keys, often with displays and keypads
  • Can store multiple certificates and keys
  • Some generate time-based one-time passwords (TOTP)
  • Examples include SafeNet eToken, Nitrokey Pro

Biometric Devices

USB Fingerprint Readers

  • Standalone devices that authenticate users via fingerprint
  • Often used with Windows Hello or similar systems
  • Can be integrated into keyboards or mice

Facial Recognition Dongles

  • Less common but emerging technology
  • Small cameras that perform facial authentication

Specialized Security Dongles

Software License Dongles

  • Protect expensive software from piracy
  • Contain encrypted keys that applications check
  • Examples include HASP dongles, Sentinel keys

Cryptocurrency Hardware Wallets

  • Secure devices for managing digital currency private keys
  • Examples include Ledger, Trezor devices
  • Often require physical confirmation for transactions

Technical Characteristics

These devices typically feature:

  • Tamper-resistant hardware that protects stored secrets
  • Secure elements or trusted platform modules (TPMs)
  • Various connectivity options (USB-A, USB-C, NFC, Bluetooth)
  • Battery-free operation (powered by host device)
  • Cross-platform compatibility

The main security advantage is that sensitive cryptographic material never leaves the device, making them highly resistant to remote attacks and credential theft compared to software-only solutions.

… and from ChatGPT.

Meeting 10th July 2025

Steering Group and next year

Phil on AI

Pteri-July-11-2025


Amazon Prime Day [DIH]

The Indy Best Buys

Best buys from Which?

What have I been up to

MacMini [DIH]

Smart Plugs -> Octopus (Solar) savings [DIH]

Banking switch [DIH]

Phone and Message blocking on iPhone [DIH]

How to get rid of annoying notifications

Hardware

Anker Battery recalls

Over a million recalls for Anker Battry Packs

The fastest USB port on your computer

AI

OpenAI to launch browser to rival Chrome [DIH]

Research reviews and AI [Iain]

Review of Claude

Grok and intelligence (or NOT)! [IAIN]

What LLM does Perplexity use [DIH]

Finding a thread in your Perplexity Library [DIH]

Teslas fail the AI test [Iain]

ISO Standard for AI [Iain]

https://www.archai.io [Iain]

Fraudulent music generated by AI [Iain]

Health

https://www.youtube.com/watch?v=CRGNPnVNNCE [Iain]

British entrepreneur championing health AI with Microsoft

Good news on AI test for Prostrate Cancer [Iain]

Apple

Live translation in next release of Apple’s OS

Why Mac users need VPNs

Ditching Siri for another AI offering [DIH]

Apple considers using ChaptGPT or Claude to provide Apple Intelligence [DIH]

Free Mac apps you should consider

Apple pays loads of tax in the UK

PCs and Windows

Different versions of Outlook [Iain]

Windows 11 and passkeys

More Win11 installations than Win10 finally

Why isn’t Windows free? [DIH]

Google

Google slows down YouTube to foil Ad Blockers [DIH]

Twenty years of Google Earth [DIH]

Gemini can now identify songs

New features for Google messages

Make your Android phone minimal

New Google Photos features coming to iOS before Android

Google Scanner to Drive [DIH]

Making Google Search better ???

Privacy, security etc.

VPN myths

Removing personal info from Google search

Malicious “Unsubscribe” links

Why Passkeys are more secure than Passwords [Iain]

Quishing scams warning: how to spot and avoid dodgy QR codes [Don]

Software

WhatsApp and ads – 1 [DIH]

WhatsApp and ads – 2

Moving to Libre Office for a Danish ministry

Discussion

Post Office Horizon Scandal report volume one – BCS response [Iain]

Digital Photography – an update

Previously on Thought grazing

Computational editing (AI) on the iPhone

Project Indigo (Adobe – on iOS only currently)

https://petapixel.com/2025/06/19/adobes-new-computational-iphone-camera-app-looks-incredible

https://research.adobe.com/articles/indigo/indigo.html

Apps that control your camera

Halide – iOS only – https://halide.cam/supportnew

Blackmagic ? 

Tutorials on mobile photography

https://photzy.com/category/mobile-photography

iPhone Photography School – https://iphonephotographyschool.com/blog/

iPhone Editing in 8 minutes – https://www.shutterbug.com/content/master-iphone-photo-editing-8-minutes-video

On your desktop

Apple Photos

https://uk.pcmag.com/photo-editing/158554/dear-apple-thanks-for-fixing-the-photos-app-sincerely-everyone

Google Photos

https://www.howtogeek.com/google-photos-editor-just-got-a-big-revamp

General Software for photo editing

Special effects

Adobe Photoshop Express – all platforms

Create effects from your images. Turn them into watercolours. Waterlogue – £3.99 (iOS

Picaso -> Google -> Google Photos

Snapseed (Nik) -> Google -> Snapseed – Apple App Store or Google Play

Snapseed Free, available for iOS (v.3 – June 2025), iPAD OS and Android (v.2.22); not available for Desktops in native form.

Finally scanning

Google Photoscan – Free (iOS and Android)

Research from Perplexity

https://www.perplexity.ai/search/is-there-an-equivalent-to-hali-ju8AAPOGS9q0wW4DmbB3Xg?login-new=false&login-source=sharedThreadLoginGate

Meeting 12th June 2025

“The Buzz” – Bluetooth – Phil (now that he can see)!

Bluetooth



USB adaptors

A no-fuss smartphone for “oldies”??? (PressReader)

VPN or Proxy – which is better for protecting your identity online

Best Android smartphones in 2024 (Anne)

Maximising iOS Battery Performance

Get your passwords off Authenticator if you’re using it as a Password Manager (Iain)

Support for Office apps on Windows 10 continues until 2028 and Outlook (Iain)

Alternatives to Google Search that protect your privacy better

Use an eSIM for travel??? (Sheila)

A not surprising suggestion to move folk from Windows to Linux and LibreOffice

A Marmite question – Edge and CoPilot – love it or hate it? (Anne)

Apple WWDC posts

Live blog of announcements

Commentary on WWDC from PC Mag (UK)

Whats new with MacOS26

What’s new with iOS26

You might have missed these – 1

You might have missed these – 2

Apple Photos app “fixed” and changes to Camera app on iOS26

Google announcements

Better editing with Google Photos

Google photos hosts a lot of photos!

Artificial Intelligence slot

Link between Energy usage and climate change (Iain)

Best AI search engines currently

Try clothes on using Google AI

What do you want to know about ChatGPT? (also an article in Computer Active – a review on AI Chatbots – PressReader)

A hope for standards for developers using AI (Iain)

From Iain re. Article in Wired: the key messages are that Perplexity is becoming more commercialised and that the CEO thinks that AI “agents” are the future:

Despite the furor, Perplexity today says that its service gets 650 million queries per month and is said to be chasing investment that would value the company at $18 billion. The company is pushing AI assistants for mobile devices and working on its own web browser. In April, Motorola announced that Perplexity would come bundled with its new Razr Ultra phones. Last month the company partnered with PayPal to make it easier for users to buy products using its assistant. Samsung is also said to be in talks to possibly include Perplexity on its devices, according to a report from Bloomberg. (Perplexity declined to comment on this after the interview).

How might Apple embrace AI search alternatives

Using Perplexity’s Voice Assistant on iOS

Ditch Siri for Perplexity’s Voice Assistant

Digital Archaeology

These were the slides and videos shown in the talk …

Map of the Bay of Naples 1879 Campania

Temple of Apollo, House of Venus in a shell, Bronze statue of Faun, Plaster cast of volcano victim – Crying Boy

Herculaneum

Padre Antonio Piaggio and the Papyri Unrolling Machine for the Vatican

Richard Wilson, Lake Avernus and the island of Capri, 1760 (Tate Gallery)

“Lake Avernus with a
Sarcophagus” 1765
Dionysius

Britain

… and near to Cardiff …

The talk was enjoyed by all who were there. Many thanks Stella.

Meeting 8th May 2025

“The Buzz” – USB – Phil

USB

News

u3a Online Learning Events

AbilityNet – TechShare Events

Royal Mail transforms postbox with parcel window and solar power – Stella

How do I get an eSIM on giffgaff?

Here’s What Actually Happens When You Use Incognito Mode

Google Photos will now let you edit shared pictures

RIP Passwords: Microsoft moves to Passkeys as the Default on New Accounts

7 Open Source Apps for Windows You Should Be Using

A Complete Guide for Removing Malware From Your PC

White House insists iPhones will be US-made – but Apple calls it a non-starter

Got an iPhone? Here are 11 features you’re probably not using–but should

Save your iPhone and Apple Account by setting up a recovery contact also ICE

Will iPhones cost more because of Trump’s tariffs on China?

Why an all-American iPhone is impossible

Papercut – Essential Apple User magazine (£2.99)

Martin Lewis: How to call your bank by dialling just three numbers

Don’t Fall for This New Gmail Phishing Scheme

Proton Mail Is Getting Some of Gmail’s Best Features

What Is Chromium, and Can You Use It as Your Browser?

WhatsApp Just Announced a Dozen New Features

Your issues

AI Spot

Problems with WhatsApp message store and Perplexity’s assistance – Nita

AI struggles to Debug Code but for how long

Google’s AI Mode Is Now Rolling Out Widely – not available in the UK just yet

Gemini could be integrated into Apple Intelligence this year

Google Gemini AI App Can Now Edit Your Photos

Why is it so hard to protect Seniors from scams

David W: This is great information. The explanation of cognitive changes in normal aging caught my attention. Both in terms of my profession and personal experience. I reserve morning when I’m fresh for financial matters, for example. Dividing attention refers to going back and forth between stimuli. I’m pretty certain the Trailmaking Test, created for enlistees in WW1, is open source. It’s a very good tool for assessing seniors cognitive health.

Iain: This is an interesting example of the genie being put back in the bottle. Drivers prefer physical controls to touchscreens in cars and studies have shown that they are safer. The safety regulators are now encouraging a return to physical controls for basic driving functions.

David W: I enjoyed the article. I’m interested in the interaction between normal aging and technology. Something to be aware of is that multitasking is a myth. The mind processes only one stimulus at a time. It divides and shifts attention back and forth and does so less quickly as we age. The interface that works fine at 22 may not be suitable at seventy. Because of this I never use the phone while driving.

Iain: This is an interesting study by Anthropic of how US students actually use Claude. The key finding:

Nearly half (~47%) of student-AI conversations were Direct—that is, seeking answers or content with minimal engagement. Whereas many of these serve legitimate learning purposes (like asking conceptual questions or generating study guides), we did find concerning Direct conversation examples including:

Provide answers to machine learning multiple-choice questions
Provide direct answers to English language test questions
Rewrite marketing and business texts to avoid plagiarism detection

I’ve been using Perplexity to the exclusion of any other search engine now for about a month and have had no need as yet to do deep research – but perhaps I’ll now give it a try. If anyone would like to do a comparative test of Gemini or ChatGPT, that would be interesting.

Not just Perplexity, but ChatGPT too … you can talk to Perplexity from WhatsApp
https://lifehacker.com/tech/you-can-now-talk-to-perplexity-ai-directly-from-whatsapp

Watching o3 guess a photo’s location is surreal, dystopian and wildly entertaining
Watching OpenAI’s new o3 model guess where a photo was taken is one of those moments where decades of science fiction suddenly come to life. This link should show Open AI acting like Sherlock Holmes and deducing the location shown in a photograph. Impressive and worrying in equal measure!

LG’s Integrated TV Ad Tech Analyzes Your Emotions

AI of dead Arizona road rage victim addresses killer in court
Clip of Chris Pelkey, who died in 2021, says: ‘I believe in forgiveness’ after his sister fed an AI model videos of him.

Meeting 10th April 2025

Thus your Apple account (or whatever) provides a single sign on (SSO) option which provides increased privacy. This article – https://www.macworld.com/article/234043/sign-in-with-apple-faq-what-you-need-to-know-about-apples-single-sign-on.html – provides more information on the approach and makes the case for using SSO with Apple over other possibilities. 

Having an Apple account (used to be called AppleID) is not restricted to having an Apple device either – https://macreports.com/what-you-can-do-with-an-apple-id-without-an-apple-device/ – so it might be worth considering if Privacy is important to you.

https://uk.pcmag.com/browsers/157366/want-more-privacy-online-change-these-browser-settings

The Jargon slot – Phil

Audiobooks

Left-over items

Features you find frustrating or difficult to use on your devices – Stella

Do we need a ‘Best Before’ date for smart devices? – Stella

Arc Browser – Stella

https://www.techradar.com/computing/browsers/the-arc-browser-just-launched-and-yes-it-really-is-that-good

A move towards banning fake reviews …

https://www.moneysavingexpert.com/news/2025/04/fake-reviews-drip-pricing-cma-rules

Tariffs & Trump

https://www.theverge.com/tech/643041/trump-tariff-consumer-electronics-gadgets-smartphones-laptops-wearables

https://lifehacker.com/tech/should-you-buy-new-tech-before-tariffs-raise-prices

https://www.theguardian.com/us-news/2025/apr/09/trump-apple-iphones-made-in-usa

https://www.macworld.com/article/2660512/president-trump-us-tariffs-impact-apple-products-price.html

Railcards – Ted and Don

April Fool – https://www.tiktok.com/@metoffice/video/7488009914921716994?lang=en – Margaret

Ability Net – Hearing Loss – Iain & Sheila 

Microsoft Virtual Training Events – [I can’t find the link to the PDF file that Ian shared on Signal – I think!!]

The Offline Club – https://edition.cnn.com/2025/04/07/health/video/offline-club-disconnecting-leader-interview-wellness-digvid – Jim

Hacks & Scams

Renee – Hack of Microsoft account

In the early hours of this morning a hacker from America tried to get into my Microsoft account. I am pleased to say he / she was unsuccessful. I have decided to close the account (I am a Mac user). It’s important to check “recent activity” on your account. You’ll be surprised to see a string of (hopefully) unsuccessful sign-ins, and from which countries.

Nita’s WhatsApp Hack

My what’s app has just been hacked and wondering if there is anyone here that can help me as I have no idea how I can get all my groups n messages back 

I have not backed up on iCloud so that is not an option 

I have not linked onto my laptop either so cannot access on laptop 

What else can anyone suggest to get my account and messages pls

I replied …

You have few options left I’m afraid. Your messages are stored on your phone, that is the primary message store, so if you haven’t backed up your message store, there is little you can do – as I understand it – to recover your account. 

This is what Claude told me, using the text you typed above …

I’m sorry to hear your WhatsApp account has been compromised. This can be stressful, but there are steps you can take to recover your account and possibly your messages.

Here’s what you can do:

1. First, try to regain control of your WhatsApp account by verifying your phone number again. Open WhatsApp and follow the verification process.

2. If you’re locked out completely, contact WhatsApp support through their official website or app.

3. Unfortunately, without a backup (either on iCloud or Google Drive), recovering past messages is very challenging. WhatsApp doesn’t store your messages on their servers once delivered.

4. For your groups: once you regain access to your account, you may still see your groups listed, though you might not have the message history.

5. Ask friends or family members who are in the same groups if they can add you back to any groups you’ve been removed from.

6. For future protection, I’d recommend enabling two-step verification in WhatsApp settings once you regain access.

7. You should also consider changing passwords for any accounts that might share similar passwords to your compromised account.

Would you like more specific information about any of these steps? Have you been able to verify your phone number again in the app?

… and Perplexity …

If your WhatsApp account has been hacked and you don’t have backups on iCloud or a linked laptop, follow these steps:

  1. Log Out All Linked Devices: Open WhatsApp, go to “Settings” > “Linked Devices,” and log out of all unknown devices.
  2. Re-register Your Account: Uninstall and reinstall WhatsApp. Enter your phone number to receive a verification code via SMS. This will log out the hacker as WhatsApp allows only one active device per account.
  3. Two-Step Verification: If a PIN is requested and you didn’t set it up, the hacker may have enabled two-step verification. You can reset the PIN via the “Forgot PIN” option if an email is linked to your account.
  4. Contact WhatsApp Support: Email support@whatsapp.com detailing the situation with “Lost/Stolen” in the subject line for further assistance.
  5. Recover Messages Locally: If using Android, check local storage under Internal Storage/WhatsApp/Databases for backups (e.g., msgstore.db.crypt14) and restore them during reinstallation.

Inform your contacts about the hack to prevent further misuse of your account.

Nita replied …

The email account is compromised as cannot change my password

I think I am back up having reinstalled the what’s app 

Just need to check other social media accounts if compromised

Passkeys – Iain

https://www.howtogeek.com/microsoft-google-and-apple-want-you-to-use-passkeys-should-you

https://www.bbc.co.uk/news/articles/cvgn1lz3v4no

The AI slot

ChatGPT and model figures …

https://petapixel.com/2025/04/09/chatgpt-can-turn-you-into-a-toy-action-figure

AI & cataracts – Phil

AI and cataracts. Hi, I’m finding all sorts of ways to use Chat GPT. Yesterday I asked it to find me some private clinics that offered cataract surgery near Cardiff and to give me some idea of the prices, and it did just that. In seconds. I could have found the same information trawling through websites but this is so much quicker.

AI learns to reason??? – Iain

https://www.science.org/doi/10.1126/science.adw5211

… and we begin to understand how it works – Iain

https://www.technologyreview.com/2025/03/27/1113916/anthropic-can-now-track-the-bizarre-inner-workings-of-a-large-language-model

Apple accounts – Sign in with Apple and Hide my email

[With grateful acknowledgment to Claude]

Do you need a paid subscription to open an Apple account and be able to Sign in with Apple?

No, you don’t need a paid subscription to open an Apple account or use Sign in with Apple. Creating an Apple ID (Apple account) is completely free and allows you to:
• Sign in with Apple on third-party websites and apps
• Access basic Apple services like the App Store
• Use iCloud’s free tier (with 5GB of storage)
• Make purchases in Apple’s digital stores
Paid subscriptions like Apple One or individual services (Apple Music, iCloud+ storage, etc.) are optional add-ons to your free Apple ID account.
To create an Apple ID, you just need an email address, a password, and some basic personal information. You can sign up directly on an Apple device or through the Apple website.​​​​​​​​​​​​​​​​

What about Hide my Email address?

You’re asking about a good feature! Hide My Email is part of Apple’s privacy features, but it has different availability:
Free version:
• You can use Hide My Email when signing up for services with “Sign in with Apple” – this gives you a randomly generated email address that forwards to your real one
• This basic functionality is available to anyone with a free Apple ID
Paid version (requires iCloud+ subscription):
• The full-featured Hide My Email service that lets you create and manage multiple private email addresses anytime (not just when signing up for services)
• Create unlimited email addresses
• Manage all your private email addresses in Settings
• Use custom domain names with iCloud Mail
iCloud+ subscriptions start at $0.99/month for the 50GB plan, which includes the expanded Hide My Email functionality. The subscription also includes other privacy features like Private Relay and expanded HomeKit Secure Video support.​​​​​​​​​​​​​​​​

How much privacy do I want/need?

What a question! Total of course might be the first answer, but is it actually the right one. It’s an entirely personal choice, and you have to weigh up how much you want to share of yourself online, how much personal information you need to share online, and how to secure that which you have to provide online to obtain services. Yes – it’s not an easy question to answer! But first some highlights …

UK Government forces Apple to remove Advanced Data Protection for its users in UK

New rules to protect your rights and activity online in the EU

… and the UK’s GDPR post-Brexit

What goes on in the US Defense establishment?

Even IT experts can be duped!

Challenges for genealogy site

UK High Court forces Meta to consider a subscription model

Do you really need to do this to enter the US now?

The US CISA is seriously worried about protecting itself and its workers

How to avoid US-Based Digital Services—and Why You Might Want To

… and of course I couldn’t resist sharing this …

So where should we start. Well … I thought I’d just ask Perplexity and Claude to help me …

Perplexity advise me thus …

The amount of privacy you need or want depends on your personal values, lifestyle, and circumstances. Here are some considerations:

Factors Influencing Privacy Needs

1. Personal Boundaries: Privacy allows you to maintain control over sensitive information about yourself, such as financial, medical, or personal details.

2. Life Stage: Adolescents often need privacy to explore their identity and independence, while adults may seek it to protect personal data or maintain emotional boundaries.

3. Cultural and Social Context: In some environments, privacy can be a matter of safety (e.g., journalists in authoritarian regimes), while in others, it may be less critical.

Balancing Privacy and Openness
• Online Privacy: Use tools like password managers, VPNs, and privacy-conscious apps to protect your data.
• Relationships: Healthy relationships respect privacy but avoid secrecy that harms trust.
• Public Interactions: Avoid oversharing in public spaces or online forums to maintain control over your personal information.

Practical Steps
• Define what information you’re comfortable sharing.
• Use privacy tools to secure digital data.
• Communicate clearly about boundaries with others.
Ultimately, the right level of privacy is subjective and should align with your comfort level and values.

… whilst Claude “goes the extra mile” and provides me with a Comprehensive Personal Privacy Guide …

# Digital Privacy Mastery: Protecting Your Online Presence

## Digital Privacy Landscape

### Understanding Digital Privacy
Digital privacy is about controlling your personal information in the online world, protecting yourself from:
- Data collection and tracking
- Unauthorized access to personal information
- Potential misuse of your digital footprint
- Cybersecurity threats
- Online surveillance and profiling

### Digital Privacy Threat Landscape

#### Primary Digital Privacy Risks
1. **Data Harvesting**
- Corporate data collection
- Targeted advertising
- Behavioral tracking
- Comprehensive digital profiling

2. **Cybersecurity Vulnerabilities**
- Personal data breaches
- Identity theft
- Financial fraud
- Unauthorized account access

3. **Online Tracking Mechanisms**
- Cookies and tracking technologies
- Social media data mining
- Search engine tracking
- Cross-platform data sharing

### Digital Privacy Assessment Levels

#### Basic Digital Privacy (Beginner Level)
- Limited awareness of online tracking
- Minimal privacy settings
- Using default browser and app configurations
- Sharing personal information freely online

#### Intermediate Digital Privacy (Aware Level)
- Understanding basic tracking mechanisms
- Selective social media sharing
- Using some privacy tools
- Aware of potential online risks
- Implementing basic security measures

#### Advanced Digital Privacy (Expert Level)
- Comprehensive online protection strategy
- Minimal digital footprint
- Advanced encryption and anonymity tools
- Proactive threat monitoring
- Strategic online information management

### Comprehensive Digital Privacy Toolkit

#### 1. Personal Information Management
- Audit existing online accounts
- Minimize personal data sharing
- Use alternative/temporary contact information
- Create dedicated email addresses for different purposes

#### 2. Authentication and Access Control
1. **Password Management**
- Use complex, unique passwords
- Implement password manager
- Enable two-factor authentication
- Regularly update passwords

2. **Account Security**
- Review app and service permissions
- Disconnect unused accounts
- Use privacy-focused authentication methods
- Implement login alerts

#### 3. Browsing Privacy Techniques
1. **Anonymous Browsing**
- Use privacy-focused browsers
- Implement VPN services
- Utilize browser privacy extensions
- Enable do-not-track settings

2. **Tracking Prevention**
- Block third-party cookies
- Use anti-tracking browser extensions
- Disable location tracking
- Limit browser fingerprinting

#### 4. Social Media and Online Presence
1. **Platform Privacy Settings**
- Minimize public profile information
- Restrict personal data visibility
- Control tagging and sharing permissions
- Regularly audit connected applications

2. **Content Strategy**
- Be selective about online sharing
- Use pseudonyms when appropriate
- Understand platform data policies
- Implement content self-censorship

#### 5. Advanced Privacy Technologies
- Encrypted messaging apps
- Anonymous communication channels
- Decentralized network technologies
- Privacy-focused cloud services
- Secure file storage solutions

### Privacy Tools Recommendation

#### Essential Privacy Tools
1. **Browsers**
- Brave
- Mozilla Firefox (with privacy extensions)
- Tor Browser

2. **VPN Services**
- ProtonVPN
- Mullvad
- NordVPN

3. **Password Managers**
- Bitwarden
- 1Password
- LastPass

4. **Tracking Blockers**
- uBlock Origin
- Privacy Badger
- NoScript

5. **Encrypted Messaging**
- Signal
- Telegram (secret chats)
- Wire

### Psychological and Practical Considerations

#### Digital Privacy Mindset
- Treat personal data as valuable asset
- Develop critical thinking about online sharing
- Stay informed about privacy technologies
- Cultivate a proactive privacy approach

#### Continuous Privacy Improvement
1. Regular privacy audits
2. Stay updated on emerging threats
3. Adapt privacy strategies
4. Learn from privacy best practices
5. Invest in privacy education

### Legal and Ethical Dimensions
- Understand data protection regulations
- Know your digital rights
- Recognize ethical data use
- Support privacy-focused initiatives

### Conclusion: Your Digital Privacy Journey
Digital privacy is an ongoing process of:
- Awareness
- Strategic management
- Continuous learning
- Technological adaptation

**Key Takeaway**: Your digital privacy is a personal responsibility and a fundamental right in the digital age.

### Action Plan
1. Conduct immediate privacy audit
2. Implement basic protection tools
3. Develop privacy-conscious habits
4. Continuously educate yourself
5. Regularly reassess your digital privacy strategy

… so with that, I might as well stop and let AI take over!!!! Here’s Claude’s presentation …

# Securing Your Digital Privacy

## Table of Contents
1. Understanding Digital Privacy
2. Risks in the Digital Landscape
3. Protective Strategies
4. Essential Tools and Techniques
5. Best Practices for Everyday Protection

---

## 1. Understanding Digital Privacy

### What is Digital Privacy?
Digital privacy is the protection of personal information in the online world, encompassing:
- Personal data protection
- Control over personal information sharing
- Prevention of unauthorized access to digital identities
- Maintaining anonymity and security in digital interactions

### Why Does Digital Privacy Matter?
- Prevent identity theft
- Protect personal and financial information
- Maintain personal autonomy
- Avoid targeted manipulation
- Safeguard professional and personal reputation

---

## 2. Risks in the Digital Landscape

### Common Digital Privacy Threats
- Data breaches
- Phishing attacks
- Social engineering
- Tracking and profiling
- Unauthorized data collection
- Malware and ransomware

### Potential Consequences
- Financial fraud
- Personal information exposure
- Reputation damage
- Stalking and harassment
- Professional and personal discrimination

---

## 3. Protective Strategies

### Personal Information Management
- Minimize personal data sharing
- Use privacy settings on social media
- Be cautious about online forms and surveys
- Regularly audit online accounts and permissions

### Digital Footprint Reduction
- Use pseudonyms when possible
- Limit personal information in public profiles
- Be mindful of location sharing
- Regularly delete unnecessary online accounts

---

## 4. Essential Tools and Techniques

### Privacy-Enhancing Technologies
1. **Virtual Private Networks (VPNs)**
- Encrypt internet connection
- Mask IP address
- Recommended Services:
* ProtonVPN
* Mullvad VPN
* NordVPN

2. **Secure Messaging Apps**
- End-to-end encryption
- Recommended Apps:
* Signal
* WhatsApp
* Telegram (secret chats)

3. **Password Managers**
- Generate and store complex passwords
- Recommended Tools:
* BitWarden
* LastPass
* 1Password

4. **Browser Privacy Tools**
- Privacy-focused browsers
- Browser extensions
- Recommended Options:
* Brave Browser
* Firefox with privacy extensions
* DuckDuckGo Privacy Browser

---

## 5. Best Practices for Everyday Protection

### Practical Privacy Tips
- Use two-factor authentication
- Regularly update software and devices
- Be skeptical of unsolicited communications
- Use unique passwords for each account
- Enable encryption on devices
- Avoid public Wi-Fi without VPN protection

### Online Behavior
- Think before posting
- Limit personal information sharing
- Be aware of app permissions
- Regularly review privacy settings
- Use privacy-focused search engines

---

## Additional Resources

### Recommended Websites
- [Electronic Frontier Foundation (EFF)](https://www.eff.org/)
- [Privacy Tools](https://privacytools.io/)
- [Have I Been Pwned](https://haveibeenpwned.com/)

### Learning More
- Take online privacy courses
- Follow cybersecurity blogs
- Stay informed about latest privacy technologies

---

## Conclusion

### Your Digital Privacy is Your Right
- Be proactive
- Stay informed
- Continuously educate yourself
- Protect your digital identity

*Remember: Digital privacy is an ongoing process, not a one-time solution!*

… that’s just too much to take-in isn’t it, so I think I still have a place, and I’ll simplify things down to just a few points – but please take note of both of these AI contributions as a checklist to visit and re-visit on a regular basis.

So my plan is to cover the following:

Safeguarding

  • Cookies – Deny usually works (but you may need to temporarily switch off adblockers if the site is of particular value/importance to you – but remember to switch it back on afterwards. Alternatively – look for a different site that doesn’t impose that requirement. It’s nearly always imposed to get marketing information from you – what you’re doing, what you’re looking at, where you are, what you’re buying etc etc.
  • Adblockers – these protect you from yourself to some extent, as you won’t see adverts that you might be tempted to click on; but they also remove invasive ads from appearing on your screen and interrupting your reading. They should also prevent pop-ups (in small windows) appearing – but be aware that some websites have this facility hard-wired into their code, so the best solution is to avoid such websites as you can’t switch-off the pop-ups. Claude gives advice on the best ad blockers available …
Choosing the best ad blocker depends on your specific needs, such as browser compatibility, customization options, and additional features like privacy protection. Here are some of the top ad blockers for different scenarios:

## Top Ad Blockers for 2025

### 1. **AdGuard**
- **Best For:** System-wide ad blocking and broad compatibility across multiple browsers and devices.
- **Features:** Offers robust app coverage, parental controls, browsing security, and a VPN. It has a user-friendly interface and provides detailed statistics on blocked ads.
- **Compatibility:** Browsers, Windows, macOS, Android, and iOS.
- **MV3 Compliance:** Yes, with a compliant beta extension for Chrome.
- **Cost:** Starts at $29.88, with plans covering up to nine devices[1][2].

### 2. **uBlock Origin**
- **Best For:** Customization and Firefox users.
- **Features:** Highly customizable with the ability to add custom filters and scripts. It is free and open-source.
- **Compatibility:** Primarily for browsers.
- **MV3 Compliance:** No.
- **Cost:** Free[1][3].

### 3. **Total Adblock**
- **Best For:** Ease of use and YouTube/Facebook ad blocking.
- **Features:** Blocks third-party trackers, improves page load times, and offers a premium plan with antivirus software.
- **Compatibility:** Browsers.
- **MV3 Compliance:** Currently unaffected but lacks a clear transition plan.
- **Cost:** Free version available, with premium starting at $1.59/mo[2].

### 4. **Surfshark CleanWeb**
- **Best For:** Unlimited devices and VPN integration.
- **Features:** Blocks ads across multiple devices, including smart TVs, and offers VPN benefits like data encryption and phishing protection.
- **Compatibility:** Unlimited devices, including smart TVs.
- **MV3 Compliance:** Unaffected.
- **Cost:** Bundled with Surfshark VPN[2].

### 5. **Ghostery**
- **Best For:** Privacy-focused users.
- **Features:** Offers anti-tracking features and detailed ad-blocking statistics.
- **Compatibility:** Chromium-based browsers, Android, and iOS.
- **MV3 Compliance:** Yes.
- **Cost:** Free, with premium options available[1][3].

### 6. **Adblock Plus**
- **Best For:** General ad blocking with acceptable ads feature.
- **Features:** Allows acceptable ads to support websites, with a user-friendly interface.
- **Compatibility:** Chrome and other browsers.
- **MV3 Compliance:** Not specified.
- **Cost:** Free[8].

### Comparison Table

| Ad Blocker | Best For | Compatibility | MV3 Compliance | Cost |
|------------|---------|---------------|----------------|------|
| AdGuard | System-wide blocking | Browsers, Windows, macOS, Android, iOS | Yes | $29.88+ |
| uBlock Origin | Customization, Firefox | Browsers | No | Free |
| Total Adblock | Ease of use, YouTube/Facebook | Browsers | Unaffected | $1.59/mo+ |
| Surfshark CleanWeb | Unlimited devices, VPN | Unlimited devices | Unaffected | Bundled with VPN |
| Ghostery | Privacy features | Chromium-based browsers, Android, iOS | Yes | Free+ |
| Adblock Plus | General ad blocking | Chrome and other browsers | Not specified | Free |

Each of these ad blockers offers unique benefits depending on your priorities, whether it's customization, privacy, or ease of use.

Sources
[1] Best Ad Blockers of 2025 - Cookies https://www.aboutcookies.org.uk/ad-blockers
[2] Best Ad Blockers That Still Work in Chrome March 2025 https://allaboutcookies.org/best-ad-blockers-for-chrome
[3] The Best Ad Blockers for 2025 - PCMag https://www.pcmag.com/picks/best-ad-blockers
[4] What is the best AdBlocker for Chrome? (browser opinions aside) https://www.reddit.com/r/Adblock/comments/1ex5hyq/what_is_the_best_adblocker_for_chrome_browser/
[5] Best ad blockers of 2025 - TechRadar https://www.techradar.com/pro/best-ad-blockers
[6] AdBlock — block ads across the web - Chrome Web Store https://chromewebstore.google.com/detail/adblock-%E2%80%94-block-ads-acros/gighmmpiobklfepjocnamgkkbiglidom
[7] Best Ad Blocker 2025 | My top choices that REALLY work! - YouTube https://www.youtube.com/watch?v=92ITOpOxRcQ
[8] Adblock Plus | The world's #1 free ad blocker https://adblockplus.org

… add to this Magic Lasoo if you use Apple kit with the added benefit that it blocks ads on YouTube if you view through Safari [otherwise you’ll need to consider purchasing YouTube Premium at £12.99pm, which might be worth it if you’re a big YouTube watcher].

  • Password managers

A subject we’ve looked at before; recommended password managers would be one from this article, 1Password has my son’s recommendation; but as you know I rely on the less feature-rich but very effective – within a 100% Apple environment – Password app (using iCloud Keychain)

  • Two factor authentication (2FA)

You might care to look at this page from the BBC on 2FA as well – I would recommend using Authy, if you go down the third-party authenticator route

[A Postscript from Signal – 28/03/2025]

I don’t think I mentioned it yesterday but with an increasing number of apps, the two above included, you don’t need to provide login credentials, you can “Login with Apple” or Google, and I think Microsoft for some. This means the app account is tied to your Apple account (or whatever) and an anonymous userId is created which provides privacy as well as not needing to create a password as well.

Thus your Apple account (or whatever) provides a single sign on (SSO) option which provides increased privacy. This article – https://www.macworld.com/article/234043/sign-in-with-apple-faq-what-you-need-to-know-about-apples-single-sign-on.html – provides more information on the approach and makes the case for using SSO with Apple over other possibilities.

Having an Apple account (used to be called AppleID) is not restricted to having an Apple device either – https://macreports.com/what-you-can-do-with-an-apple-id-without-an-apple-device/ – so it might be worth considering getting one, if Privacy is important to you.

  • Don’t proceed with Free option, or 7-day trial if ads appear immediately you take your first step (eg I followed after research a link to the best recommended software for a particular purpose, but after I downloaded it – no problems, I was immediately bombarded by ads when I started the app up with the plea to pay for an ad-free version), and don’t take the 10% off next purchase offer – this is a particularly insidious “trick” often linked to travel websites, where you are offered 15% off your next purchase, only to find that by clicking on the link you have to provide information, or permission, to send personal information to other businesses.
  • Be mindful of links on purchase sites – similar to the above, but just be aware that the re-direction takes you away from the original website where you might have felt relatively safe. On that not, always use a Credit Card for online purchases (or Apple or Google Pay, or Paypal) as you’re provided with some protection against fraud.
  • Beware of location tracking – switch-off all that don’t need your location to work. In your apps just be aware that not all apps need to know where you are – maps … yes; weather – maybe; asda – not really!
  • Privacy settings in apps – Facebook, Google

Facebook (from Perplexity) …

To enhance your privacy on Facebook, here are key settings to adjust:

1. Control Who Sees Your Posts
Go to Settings & Privacy > Settings > Privacy.
Adjust the audience for your posts: choose "Friends," "Only Me," or customize it further. Avoid "Public" for maximum privacy.

2. Manage Profile Visibility
Edit your "About" section to limit shared details like work, education, and contact info. Set visibility to "Friends" or "Only Me".
Turn off search engine linking to your profile under Settings & Privacy > How People Find and Contact You.

3. Secure Your Account
Enable two-factor authentication and use a strong password.
Regularly review apps connected to your account and remove unnecessary ones.

4. Limit Old Posts
Use the "Limit Past Posts" option in Privacy Checkup to restrict visibility of older posts.

5. Control Tags and Posts on Your Profile
Under Profile and Tagging, decide who can post on your profile and who can see tagged posts. Set to "Friends" or stricter options.

6. Ad Preferences
Turn off personalized ads by reviewing ad preferences in Settings & Privacy > Ad Preferences.

Review these settings periodically for better privacy control!

… and remember my advice to logout from Facebook and Instagram after use. A belts and braces protection of your privacy.

Then for Google, start at accounts.google.com

Screenshot

Perplexity on Google Privacy settings gives me …

Google offers several privacy settings to help users control their data and online experience. Here are key privacy settings you should consider adjusting:

Web & App Activity
Turn off this master privacy control to limit Google's collection of your search history, location data, and app usage. To do this:
Go to any Google website
Click on your profile picture
Select "Google Account"
Navigate to "Data & Privacy"
Find "Web & App Activity" and turn it off

Location History
Disable location tracking by turning off both Web & App Activity and Timeline (formerly Location History). This prevents Google from storing detailed information about your movements.

Auto-Delete Options
If you prefer to keep some features enabled, set up auto-delete for your data:
Go to "Privacy & Personalization"
Select "Web & App Activity" or "Timeline"
Choose "Auto-delete" and set your preferred time period

Ad Personalization
Limit targeted advertising by adjusting these settings:
Go to "Privacy & Personalization"
Find "Ad Personalization"
Turn off personalized ads

Chrome Privacy Settings
For Chrome users, consider these adjustments:
Disable automatic sign-in: Settings > Sync and Google Services > Turn off "Allow Chrome Sign-In"
Sign out of Chrome: Click your profile picture > Sign out
Manage sync settings: Settings > Sync and Google Services > Manage What You Sync

Additional Controls
Review and limit data sharing with third-party apps and services
Use Google's Privacy Checkup tool to review and adjust your settings
Explore the "Data & Privacy" section in your Google Account for more options

Remember, while these settings can enhance your privacy, they may also affect some Google services' functionality. Regularly review and update your privacy settings to maintain your desired level of data protection.

Options you might consider …

  • Subscription rather than free – a hobby horse of mine! If it’s worth using, it’s worth paying for – especially if it prevents your information being sold on to other sites, or marketing organisations.
  • Privacy focussed solutions as a choiceProton vs Google;
  • Open source as a consideration – always investigate whether there is a FreeWare or DonationWare option, and then consider offering a subscription is requested – Wikipedia, Signal, Libre, etc etc
  • Wise choices when downloading – be sure of the website before you download software
Here are some of the best sites for downloading safe freeware:

1. **FileHippo**
- **Features**: Offers a wide range of current apps, categorized for easy navigation. Provides older versions of software, which can be useful if newer versions cause issues.
- **Benefits**: Properly labels any additional software offers, making it easy to avoid unwanted downloads[2].

2. **Softpedia**
- **Features**: Over 1 million software titles, regularly updated and checked for malware. Offers mirrors for previous versions of programs.
- **Benefits**: Detailed descriptions, user reviews, and editor ratings help ensure safe downloads[1][2].

3. **MajorGeeks**
- **Features**: Long-standing reputation for reliability, with a curated list of top freeware picks.
- **Benefits**: Known for its trustworthiness, despite a somewhat outdated interface[2].

4. **SnapFiles**
- **Features**: Highlights a "Freeware Pick" and a "Random Pick" to discover new apps. Includes user reviews and warnings about bundled software.
- **Benefits**: Offers a section for portable programs, ideal for running apps without installation[2].

5. **Ninite**
- **Features**: Allows downloading multiple apps at once, automatically rejecting toolbars and unwanted software.
- **Benefits**: Ideal for setting up new PCs or reinstalling software securely, with background updates[2].

6. **Tucows**
- **Features**: Established reputation with a wide range of software available.
- **Benefits**: Known for reliability and safety, though less frequently updated[1].

7. **Portable Freeware**
- **Features**: Curated directory focusing on portable freeware with comprehensive descriptions and user comments.
- **Benefits**: Ensures software runs without installation and leaves no traces on the host machine[3].

8. **Chip.de/Chip.eu**
- **Features**: Offers a variety of software with hints about potential toolbars or adware within the software itself.
- **Benefits**: Known for avoiding adware wrappers in downloads[1].

9. **Nonags**
- **Features**: Specializes in non-adware freeware, ensuring safe downloads.
- **Benefits**: Ideal for those seeking software without bundled unwanted programs[1].

10. **GitHub**
- **Features**: A platform primarily for open-source software development, offering a wide range of free and safe software.
- **Benefits**: Software is often reviewed and audited by the community, ensuring safety and quality[3].

Sources
[1] what's your trusted site for freeware? (sourceforge ect.) : r/software https://www.reddit.com/r/software/comments/1xwokn/whats_your_trusted_site_for_freeware_sourceforge/
[2] Safest Websites to Download Windows Software - Bug Zero https://blog.bugzero.io/safest-websites-to-download-windows-software-ffff6b2e152b
[3] Best Website for downloading Freeware Software? - Bogleheads.org https://www.bogleheads.org/forum/viewtopic.php?t=404839
[4] The best free software that's completely safe (we've checked) https://www.which.co.uk/news/article/the-best-free-safe-software-ajW7U4V3dBVU
[5] CNET Download: Free Software Downloads and Reviews for ... https://download.cnet.com
[6] The 10 Safest Free Software Download Sites for Windows in 2023 https://www.youtube.com/watch?v=KCaTww_6YcY
[7] Top 10 Sites to Download Free PC Games Completely Safe and Legit https://www.movavi.com/learning-portal/sites-to-download-free-pc-games.html
  • A VPN offers a degree of protection (even with a cell connection)
Using a VPN while connected to a cellular internet connection is not strictly necessary but is highly recommended for several reasons:

### **Why Use a VPN on Cellular Data?**
1. **Enhanced Privacy**:
- Cellular providers can track and log your online activity. A VPN encrypts your data, preventing your Internet Service Provider (ISP) from monitoring or selling your browsing habits[2][3][4].

2. **Increased Security**:
- While cellular networks are generally more secure than public Wi-Fi, they are not immune to threats like phishing or malicious attacks. A VPN adds an extra layer of encryption to protect sensitive information[1][2][3].

3. **Bypass Geo-Restrictions and Throttling**:
- A VPN allows you to spoof your IP address, enabling access to region-specific content or bypassing ISP throttling during high-bandwidth activities like streaming or gaming[2][3].

4. **Protection Against ISP Tampering**:
- Some ISPs compress or modify website content for mobile browsing. A VPN ensures you access unaltered content[1].

### **When You Might Not Need a VPN**
- If your primary concern is casual browsing or using apps like WhatsApp or Facebook, and you trust your cellular provider, a VPN might not feel essential[5].
- Using a VPN increases data usage (by 5–15%) and can drain your battery faster, so it may not be ideal if you're on a limited data plan or low battery[1][2][4].

### **Conclusion**
While cellular networks are safer than public Wi-Fi, using a VPN enhances privacy and security. It is particularly valuable if you frequently handle sensitive data, want to avoid ISP tracking, or access geo-restricted content. However, consider the trade-offs in terms of data usage and battery life.

Sources
[1] Does a VPN work on mobile data? - Surfshark https://surfshark.com/blog/does-vpn-work-on-cellular-data
[2] Should you use a VPN when connected to cellular data? | Tom's Guide https://www.tomsguide.com/computing/vpns/should-you-use-a-vpn-when-connected-to-cellular-data
[3] Does VPN work on mobile data? - Cybernews https://cybernews.com/what-is-vpn/does-a-vpn-work-on-mobile-data/
[4] Does a VPN work without Wi-Fi? - NordVPN https://nordvpn.com/blog/does-vpn-work-without-wifi/
[5] Who here uses VPN when on mobile data? - Reddit https://www.reddit.com/r/VPN/comments/n8x2kv/who_here_uses_vpn_when_on_mobile_data/
[6] Do you need a VPN on your phone? Here's the truth. - Mashable https://mashable.com/article/do-you-need-a-vpn-on-your-phone
[7] Why You Need a VPN on Your Smartphone | McAfee Blog https://www.mcafee.com/blogs/mobile-security/privacy-please-why-a-vpn-on-your-smartphone-may-be-a-smart-move-for-you/
[8] Do I Really Need a VPN at Home? - PCMag https://www.pcmag.com/how-to/do-i-need-a-vpn-at-home

So it’s up-to-you – how much privacy do you actually want; how much privacy do you need!