You are more than a data point. The Opt Out helps you reclaim your online privacy.
The internet's vastness allows diverse interaction styles; some openly share their lives, others prefer privacy. This wouldn't be an issue in isolated online spaces, but our digital worlds are interconnected.
Sharing online reveals information about others—a lesson learned from Cambridge Analytica and TikTok's identity reveals. Online privacy is a collective, not just personal, concern.
The Opt Out proposes a code of conduct. While we can't dictate online behavior, we can highlight the offline consequences of online actions. Consider these rules, adapt them, and share them. Collective awareness fosters greater online privacy for everyone.
- Consent is Paramount
Respecting boundaries requires consent. Before sharing photos, videos, stories, or anything depicting others, obtain their permission. This includes background appearances; a seemingly innocuous shot could inadvertently reveal private information. Similarly, seek consent before sharing written content mentioning individuals, especially details like email addresses, phone numbers, locations, or workplaces—avoid inadvertently aiding stalkers. Content involving children is especially sensitive; always obtain parental/guardian consent and consider obscuring faces. Never post about someone intoxicated, asleep, unconscious, or unable to consent; refrain from taking such photos/videos altogether.
[Related on PopSci : Navigating website cookie acceptance]
- Filming Strangers: Proceed with Caution
While not condoning rudeness, filming strangers, even for seemingly justifiable reasons (e.g., "Karen" videos), is problematic. Online videos lose control; they can lead to doxing, disproportionate consequences, harassment, and even assault. Social media rarely distinguishes between malicious intent and simple mistakes.
Exceptions exist: Filming might be necessary in emergencies (assault, hit-and-run, etc.). However, carefully consider the best course of action (calling 911, attracting bystanders). Avoid posting such videos on social media unless absolutely necessary to help someone who's been arrested or hospitalized. Even in court, footage's impact can be unpredictable.
- Keep One-on-One Messages Private
Treat private messages (texts, photos, videos) like confidential information. They are intended for the recipient's eyes only; do not share them. This especially applies to intimate images.
- Share Contact Information Consensually or Publicly
Publicly available contact information (e.g., email addresses on websites) is permissible to share. Otherwise, always ask for permission before sharing someone's contact details, specifying what and with whom you'll share it.
- Minimize Information Sharing
Unintentionally revealing information is common. An unboxing video might reveal your address; a lunch photo could expose your workplace. Be mindful of details that could reveal more than intended, both about yourself and others. Blur or cover sensitive information on photos (packing labels, documents, license plates, boarding passes). Check backgrounds for revealing details. Remove metadata from images before sharing. Avoid words directly linking you to someone; "colleagues" reveals employment details.
- Password Sharing: A Personal Decision
You have the right to privacy; you don't owe your partner access to your accounts. Password sharing is a personal choice; it's acceptable if both partners are comfortable, but it's not a requirement for a healthy relationship.
[Related on PopSci : Improving password security]
- Establish and Enforce Your Boundaries
Communicate your online privacy preferences with others, especially those who frequently post online. It might require multiple conversations, but clear communication ensures your comfort and respect for your boundaries.
- Post Activities, Not Companions
If you haven't discussed online privacy, post about your activities but avoid identifying companions. Include only those who explicitly consent. Omit identifying details (tattoos, cars, etc.) that could reveal others' identities.
- No Consent, No Tag
Ask permission before tagging someone on social media or using their information in other contexts (contests, promotions, hashtags). Consider the potential for unwanted exposure.
- Consent is Fluid
People's privacy preferences change. Even if someone frequently posts, always ask before sharing content featuring them. Show them the post, provide veto power, and offer options. When in doubt, assume privacy until informed otherwise.
Read more PopSci stories.
The above is the detailed content of The Opt Out: 10 rules for better internet etiquette. For more information, please follow other related articles on the PHP Chinese website!

OneDrive is Microsofts cloud storage which allows users to have their files backed up, synchronized, and accessible across devices. It is integrated into Window

Windows 11 KB5055528 (released on April 8, 2025) Update detailed explanation and troubleshooting For Windows 11 23H2 users, Microsoft released the KB5055528 update on April 8, 2025. This article describes the improvements to this update and provides a solution to the installation failure. KB5055528 update content: This update brings many improvements and new features to Windows 11 23H2 users: File Explorer: Improved text scaling and improved accessibility to the file opening/save dialog and copy dialog. Settings page: Added "Top Card" function to quickly view processor, memory, storage and G

This guide clarifies the key differences between computer hardware and software problems. Learn to identify and troubleshoot these issues effectively to keep your computer running smoothly. Quick Navigation: What are Computer Hardware Problems? Wha

Microsoft's Windows 10 WinRE Update Glitch: Error 0x80070643 Explained Over a year later, Microsoft is still grappling with WinRE update issues. The recent Windows 10 KB5057589 update has brought the error 0x80070643 to light. This article explores

Data security is paramount in today's digital landscape. Encryption offers robust protection, but choosing between disk encryption and file encryption can be confusing. This MiniTool guide clarifies the differences and helps you select the best appr

Is the Windows Server 2025 domain controller unreachable after restarting? This article provides a solution. Problem Description: Microsoft has confirmed that Windows Server 2025 domain controllers (such as Active Directory) may not handle network traffic properly after restarting. This can cause the domain controller to be inaccessible in the domain network or to be accessed incorrectly through ports and protocols that should be blocked by the domain firewall. Root Cause: The domain firewall configuration file is not applied when the domain controller restarts, but the standard firewall configuration file is used. Potential consequences: The domain controller may not be accessible within the domain network. Applications or services running on domain controllers or remote devices may occur

This guide explains how to downgrade Windows Server Datacenter to Standard edition (Windows Server 2019 and 2022) without reformatting. While Microsoft doesn't officially support this, these methods work in practice. Always back up your system befo

A black screen on game launch on Windows is a serious hindrance for gamers. The issue is shared by a variety of games on numerous different launchers, and the m


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version
Recommended: Win version, supports code prompts!

WebStorm Mac version
Useful JavaScript development tools

SublimeText3 Linux new version
SublimeText3 Linux latest version