search
HomeComputer TutorialsTroubleshootingThe Opt Out: 10 rules for better internet etiquette

The Opt Out: 10 rules for better internet etiquette

You are more than a data point. The Opt Out helps you reclaim your online privacy.

The internet's vastness allows diverse interaction styles; some openly share their lives, others prefer privacy. This wouldn't be an issue in isolated online spaces, but our digital worlds are interconnected.

Sharing online reveals information about others—a lesson learned from Cambridge Analytica and TikTok's identity reveals. Online privacy is a collective, not just personal, concern.

The Opt Out proposes a code of conduct. While we can't dictate online behavior, we can highlight the offline consequences of online actions. Consider these rules, adapt them, and share them. Collective awareness fosters greater online privacy for everyone.

  1. Consent is Paramount

Respecting boundaries requires consent. Before sharing photos, videos, stories, or anything depicting others, obtain their permission. This includes background appearances; a seemingly innocuous shot could inadvertently reveal private information. Similarly, seek consent before sharing written content mentioning individuals, especially details like email addresses, phone numbers, locations, or workplaces—avoid inadvertently aiding stalkers. Content involving children is especially sensitive; always obtain parental/guardian consent and consider obscuring faces. Never post about someone intoxicated, asleep, unconscious, or unable to consent; refrain from taking such photos/videos altogether.

[Related on PopSci : Navigating website cookie acceptance]

  1. Filming Strangers: Proceed with Caution

While not condoning rudeness, filming strangers, even for seemingly justifiable reasons (e.g., "Karen" videos), is problematic. Online videos lose control; they can lead to doxing, disproportionate consequences, harassment, and even assault. Social media rarely distinguishes between malicious intent and simple mistakes.

Exceptions exist: Filming might be necessary in emergencies (assault, hit-and-run, etc.). However, carefully consider the best course of action (calling 911, attracting bystanders). Avoid posting such videos on social media unless absolutely necessary to help someone who's been arrested or hospitalized. Even in court, footage's impact can be unpredictable.

  1. Keep One-on-One Messages Private

Treat private messages (texts, photos, videos) like confidential information. They are intended for the recipient's eyes only; do not share them. This especially applies to intimate images.

  1. Share Contact Information Consensually or Publicly

Publicly available contact information (e.g., email addresses on websites) is permissible to share. Otherwise, always ask for permission before sharing someone's contact details, specifying what and with whom you'll share it.

  1. Minimize Information Sharing

Unintentionally revealing information is common. An unboxing video might reveal your address; a lunch photo could expose your workplace. Be mindful of details that could reveal more than intended, both about yourself and others. Blur or cover sensitive information on photos (packing labels, documents, license plates, boarding passes). Check backgrounds for revealing details. Remove metadata from images before sharing. Avoid words directly linking you to someone; "colleagues" reveals employment details.

  1. Password Sharing: A Personal Decision

You have the right to privacy; you don't owe your partner access to your accounts. Password sharing is a personal choice; it's acceptable if both partners are comfortable, but it's not a requirement for a healthy relationship.

[Related on PopSci : Improving password security]

  1. Establish and Enforce Your Boundaries

Communicate your online privacy preferences with others, especially those who frequently post online. It might require multiple conversations, but clear communication ensures your comfort and respect for your boundaries.

  1. Post Activities, Not Companions

If you haven't discussed online privacy, post about your activities but avoid identifying companions. Include only those who explicitly consent. Omit identifying details (tattoos, cars, etc.) that could reveal others' identities.

  1. No Consent, No Tag

Ask permission before tagging someone on social media or using their information in other contexts (contests, promotions, hashtags). Consider the potential for unwanted exposure.

  1. Consent is Fluid

People's privacy preferences change. Even if someone frequently posts, always ask before sharing content featuring them. Show them the post, provide veto power, and offer options. When in doubt, assume privacy until informed otherwise.

Read more PopSci stories.

The above is the detailed content of The Opt Out: 10 rules for better internet etiquette. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How to fix OneDrive error 0x8004de2f in Windows?How to fix OneDrive error 0x8004de2f in Windows?Apr 17, 2025 am 12:00 AM

OneDrive is Microsofts cloud storage which allows users to have their files backed up, synchronized, and accessible across devices. It is integrated into Window

Windows 11 KB5055528: What's New & What if It Fails to InstallWindows 11 KB5055528: What's New & What if It Fails to InstallApr 16, 2025 pm 08:09 PM

Windows 11 KB5055528 (released on April 8, 2025) Update detailed explanation and troubleshooting For Windows 11 23H2 users, Microsoft released the KB5055528 update on April 8, 2025. This article describes the improvements to this update and provides a solution to the installation failure. KB5055528 update content: This update brings many improvements and new features to Windows 11 23H2 users: File Explorer: Improved text scaling and improved accessibility to the file opening/save dialog and copy dialog. Settings page: Added "Top Card" function to quickly view processor, memory, storage and G

Informative Guide: Computer Hardware VS Software ProblemsInformative Guide: Computer Hardware VS Software ProblemsApr 16, 2025 pm 08:07 PM

This guide clarifies the key differences between computer hardware and software problems. Learn to identify and troubleshoot these issues effectively to keep your computer running smoothly. Quick Navigation: What are Computer Hardware Problems? Wha

Error 0x80070643 After Windows 10 KB5057589, Learn EssentialsError 0x80070643 After Windows 10 KB5057589, Learn EssentialsApr 16, 2025 pm 08:05 PM

Microsoft's Windows 10 WinRE Update Glitch: Error 0x80070643 Explained Over a year later, Microsoft is still grappling with WinRE update issues. The recent Windows 10 KB5057589 update has brought the error 0x80070643 to light. This article explores

Disk Encryption vs File Encryption: Which One Should You ChooseDisk Encryption vs File Encryption: Which One Should You ChooseApr 16, 2025 pm 08:03 PM

Data security is paramount in today's digital landscape. Encryption offers robust protection, but choosing between disk encryption and file encryption can be confusing. This MiniTool guide clarifies the differences and helps you select the best appr

Explained! Windows Server 2025 DCs Inaccessible After a RestartExplained! Windows Server 2025 DCs Inaccessible After a RestartApr 16, 2025 pm 08:02 PM

Is the Windows Server 2025 domain controller unreachable after restarting? This article provides a solution. Problem Description: Microsoft has confirmed that Windows Server 2025 domain controllers (such as Active Directory) may not handle network traffic properly after restarting. This can cause the domain controller to be inaccessible in the domain network or to be accessed incorrectly through ports and protocols that should be blocked by the domain firewall. Root Cause: The domain firewall configuration file is not applied when the domain controller restarts, but the standard firewall configuration file is used. Potential consequences: The domain controller may not be accessible within the domain network. Applications or services running on domain controllers or remote devices may occur

Downgrade Windows Server 2022/2019 Datacenter to StandardDowngrade Windows Server 2022/2019 Datacenter to StandardApr 16, 2025 pm 08:01 PM

This guide explains how to downgrade Windows Server Datacenter to Standard edition (Windows Server 2019 and 2022) without reformatting. While Microsoft doesn't officially support this, these methods work in practice. Always back up your system befo

How to fix black screen on game launch on Windows?How to fix black screen on game launch on Windows?Apr 16, 2025 pm 08:00 PM

A black screen on game launch on Windows is a serious hindrance for gamers. The issue is shared by a variety of games on numerous different launchers, and the m

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version