Most privacy advice tells you to buy expensive VPNs and premium software. The truth is that some of the best privacy tools cost nothing at all. I have been testing these for months and narrowed it down to the ones that actually work without making your phone or computer unusable.
Every tool here is free, works in India, and does not require technical knowledge to set up. No command lines, no configuration files, no complicated settings buried in obscure menus. If you can install an app from the Play Store or App Store, you can use everything on this list.
1. Web Browsers That Respect Privacy
Your browser is the front door to everything you do online. If that front door has a keylogger built into it, nothing else you do matters much. The browser you choose determines how much of your browsing activity gets tracked, profiled, and sold.
Firefox — Best Overall
Firefox is the browser I recommend to almost everyone. It is made by Mozilla, a non-profit organisation that does not make money by selling your data. That alone makes it fundamentally different from Chrome.
What makes Firefox stand out is Enhanced Tracking Protection, which is turned on by default. It blocks social media trackers, cross-site tracking cookies, fingerprinters, and cryptominers without you having to touch any settings. Go to Settings > Privacy & Security and set it to Strict for even better protection. Most websites work perfectly fine on Strict mode.
Firefox also supports containers, which let you separate your browsing into isolated tabs. You can put Facebook in one container and your banking in another, so Facebook cannot track what you do on other websites. The Multi-Account Containers extension makes this dead simple.
Brave — Good Alternative
Brave is built on the same engine as Chrome, so every website that works on Chrome works on Brave. The difference is that Brave strips out all of Google’s tracking and adds built-in ad blocking and tracker blocking. You do not need to install any extensions for basic privacy protection.
Brave also has a built-in Tor mode for times when you want extra anonymity, though for most people the standard private browsing mode is more than enough. The downside is that Brave has its own cryptocurrency token (BAT) that it pushes through opt-in ads, which some people find annoying. You can turn that off completely in settings.
Why You Should Stop Using Chrome for Everything
Chrome is made by Google. Google makes over 80% of its revenue from advertising. The browser is designed to collect as much information about your browsing habits as possible to make those ads more targeted. Chrome’s “Incognito mode” still lets Google track you — they literally had to settle a $5 billion lawsuit over this.
Using Chrome for privacy is like asking a fox to guard your henhouse. It works beautifully as a browser, but the cost is your data.
Settings to Change Immediately
Whichever browser you choose, change these settings right away:
- Default search engine: Switch from Google to DuckDuckGo or Startpage. Your search history is one of the most revealing things about you.
- Block third-party cookies: Every modern browser has this option. Third-party cookies are used almost exclusively for tracking.
- Disable autofill for payment information: Your browser should not be storing your credit card numbers.
- Enable HTTPS-only mode: Forces websites to use encrypted connections. Firefox, Brave, and Chrome all have this option.
- Turn off search suggestions: Every character you type in the address bar gets sent to the search engine in real time. Turn off “search suggestions” to stop this.
2. Password Managers
If you use the same password for multiple accounts — and I know most of you do — a password manager is the single most impactful change you can make for your security. It is not even close.
Bitwarden — The One I Recommend
Bitwarden is open-source, which means anyone can inspect the code to make sure it is doing what it claims. The free tier gives you unlimited passwords across unlimited devices. It works on Windows, macOS, Linux, Android, iOS, and every major browser. You genuinely do not need to pay for the premium version unless you want features like hardware key support or encrypted file attachments.
What Bitwarden does is simple: it generates strong, unique passwords for every website and stores them in an encrypted vault that only you can unlock. You remember one master password. Bitwarden remembers the other 200.
How to Actually Start Using One
The biggest barrier to using a password manager is the initial setup. Here is the practical way to do it without losing your mind:
- Install Bitwarden on your phone and as a browser extension on your computer.
- Export your saved passwords from Chrome — go to
chrome://password-manager/settingsand click “Export passwords”. Import this file into Bitwarden. - Do not try to change all your passwords at once. Just start using Bitwarden for new logins and change old passwords gradually as you visit each site.
- Set Bitwarden as your default autofill provider in your phone settings (Android: Settings > Passwords > Autofill service).
- Write down your master password and store it somewhere physically safe. If you forget it, Bitwarden cannot recover your account.
A Note About Writing Passwords in a Diary
Here is something most security guides will not tell you: writing your passwords in a physical diary is better than reusing the same password everywhere. A physical diary cannot be hacked remotely. It cannot be part of a data breach. Nobody in Russia or China is going to break into your house to steal your notebook.
That said, a password manager is better than both because it generates truly random passwords, fills them in automatically, and syncs across your devices. But if someone in your family refuses to use a password manager, a written list kept in a safe place is a perfectly reasonable middle ground.
3. Two-Factor Authentication Apps
A strong password protects you until the website storing it gets breached. Two-factor authentication (2FA) adds a second lock on the door. Even if someone steals your password, they cannot get in without the code from your phone.
Google Authenticator vs Authy vs Microsoft Authenticator
Google Authenticator is the simplest option. It generates time-based codes, does not require an internet connection, and works reliably. The downside is that if you lose your phone, your codes are gone unless you have set up cloud backup (which was only recently added).
Authy is my personal recommendation. It does everything Google Authenticator does but adds encrypted cloud backup and multi-device sync. If you switch phones, your codes come with you. The backup is encrypted with a password that Authy does not have access to.
Microsoft Authenticator works well, especially if you use Microsoft products at work. It also supports push notifications for Microsoft accounts, which is more convenient than typing codes.
Why SMS OTP Is Not Secure Enough
Most Indian banks and services use SMS OTP as their second factor. While it is better than nothing, SMS has a serious weakness: SIM swap attacks. A scammer can convince your telecom provider to transfer your number to a new SIM card. Once they have your number, they receive all your OTPs.
⚠️ SIM Swap Warning
SIM swap fraud is increasingly common in India. If your phone suddenly loses network signal for no reason, contact your telecom provider immediately. Someone may have transferred your number to another SIM.
For services that support it, always prefer app-based 2FA over SMS OTP. Unfortunately, most Indian banks still rely on SMS, so you cannot always avoid it. For everything else — Gmail, Instagram, Facebook, Amazon — use an authenticator app.
Enable 2FA Right Now — Step by Step
Here is how to enable 2FA on the services you probably use every day:
- Gmail: Go to myaccount.google.com > Security > 2-Step Verification > Get started. Choose “Authenticator app” and scan the QR code with Authy or Google Authenticator.
- Instagram: Settings > Security > Two-Factor Authentication > Authentication App. Instagram will show a QR code or a key to enter manually.
- Facebook: Settings & Privacy > Security and Login > Two-Factor Authentication. Choose “Authentication App” instead of “Text Message”.
- Bank apps: Most Indian banks do not support authenticator apps yet, but check your bank’s security settings. ICICI and HDFC have started adding biometric authentication as a second factor.
4. VPN Services (Free and Trustworthy)
Let me be honest: the VPN industry is one of the most overhyped corners of the privacy world. VPN companies spend millions on YouTube sponsorships making you think you will get hacked the moment you go online without one. That is not how it works.
ProtonVPN — Genuinely Free, Genuinely Private
ProtonVPN offers a free tier that is actually usable. No data limits, no bandwidth caps, and no ads injected into your browsing. The free tier gives you access to servers in the US, Netherlands, and Japan. Speed is limited compared to paid plans, but it is perfectly fine for regular browsing.
ProtonVPN is based in Switzerland, which has some of the strongest privacy laws in the world. The company is run by the same team that created ProtonMail, and they have a strong track record of protecting user privacy. Their apps are open-source and have been independently audited.
When You Actually Need a VPN
Despite what the ads tell you, you do not need a VPN all the time. Here is when a VPN genuinely helps:
- Public Wi-Fi: Coffee shops, airports, hotel Wi-Fi — these networks are often unencrypted. A VPN encrypts your traffic so nobody on the same network can snoop.
- Avoiding ISP tracking: Your internet provider (Jio, Airtel, BSNL) can see every website you visit. A VPN hides this from them.
- Accessing geo-restricted content: Some content is only available in certain countries. A VPN lets you appear to be browsing from another location.
- Avoiding censorship: If a website is blocked in India (it happens), a VPN can bypass the block.
When you do not need a VPN: for general browsing on your home Wi-Fi with HTTPS websites (look for the padlock icon). Modern HTTPS encryption already protects the contents of your communication. A VPN adds an extra layer, but it is not essential for everyday browsing at home.
⚠️ Free VPN Warning
Most free VPNs on the Google Play Store are worse than using no VPN at all. Research by CSIRO found that 38% of free Android VPN apps contained malware. Many others log your browsing data and sell it to advertisers. If you are not paying for the VPN, you are the product. ProtonVPN and Windscribe are the only free VPN services I trust.
5. Encrypted Messaging
Your messages contain some of the most personal information imaginable — conversations with family, financial details, medical discussions, private photos. The app you use to send these messages matters enormously.
Signal — The Gold Standard
Signal is the messaging app recommended by Edward Snowden, the Electronic Frontier Foundation, and virtually every security researcher on the planet. It uses end-to-end encryption, which means not even Signal’s servers can read your messages. The app is open-source, non-profit, and funded by donations rather than advertising.
Signal works just like WhatsApp — you can send texts, photos, videos, voice messages, and make voice and video calls. The interface is clean and familiar. The only downside is that fewer people use it, so you need to convince your contacts to install it. Start with your close friends and family.
WhatsApp — Encrypted But Not Private
WhatsApp uses the Signal Protocol for end-to-end encryption, which means the content of your messages is protected. However, WhatsApp is owned by Meta (Facebook), and Meta collects a significant amount of metadata — who you talk to, when, how often, your phone number, your contacts list, your location, your device information, and more.
Think of it this way: the content of your letter is sealed in an envelope that nobody can open, but the postal service is keeping a detailed log of every letter you send, to whom, from where, and at what time. That metadata alone reveals an enormous amount about your life.
Telegram — Not What Most People Think
Here is something most Telegram users do not know: regular Telegram chats are not end-to-end encrypted. Only “Secret Chats” use end-to-end encryption, and you have to manually start them. Regular chats, group chats, and channels are encrypted between your device and Telegram’s servers, but Telegram can read them.
To start a secret chat on Telegram, open a contact’s profile, tap the three-dot menu, and select “Start Secret Chat”. These messages will not sync across your devices and will only exist on the two phones in the conversation. If you use Telegram assuming everything is private by default, you are mistaken.
6. Email Privacy
Your email address is the skeleton key to your digital life. It is tied to your bank accounts, social media, shopping history, and government services. Protecting it is not optional — it is essential.
ProtonMail — Private Email That Works
ProtonMail (now called Proton Mail) provides end-to-end encrypted email. Emails between ProtonMail users are automatically encrypted. For emails to non-ProtonMail addresses, you can set a password that the recipient needs to enter. The free tier gives you 1 GB of storage and 150 messages per day, which is plenty for a personal account.
You do not need to switch your primary email to ProtonMail (though you can). At minimum, create a ProtonMail account for sensitive communications — financial matters, medical records, legal documents, or anything you would not want an advertising company to scan.
Email Aliases — Stop Giving Out Your Real Address
SimpleLogin and AnonAddy (now called addy.io) let you create email aliases that forward to your real email. When a shopping website asks for your email, give them an alias like [email protected] instead of your real address. If that alias starts receiving spam, you simply disable it. Your real email stays clean.
SimpleLogin’s free tier gives you 10 aliases, which is enough for most people. Create separate aliases for shopping, social media signups, newsletters, and anything else that is likely to result in spam.
Check If Your Email Has Been Breached
Go to haveibeenpwned.com and enter your email address. This free service checks whether your email has appeared in any known data breaches. If it has (and for most people, it has), change the password for that account immediately and enable two-factor authentication.
💡 Pro Tip
You can sign up for free notifications on Have I Been Pwned. They will email you automatically if your address appears in a future data breach, so you can act quickly instead of finding out months later.
7. Phone Privacy Settings
Your phone knows more about you than any other device you own. It knows where you go, who you call, what you search for, what apps you use, and how long you use them. Most of this data collection can be reduced significantly just by changing a few settings that are hidden in menus most people never open.
Android Privacy Settings
- Permissions Manager: Go to
Settings > Privacy > Permission Manager. Review which apps have access to your camera, microphone, location, contacts, and files. You will be surprised how many apps have permissions they do not need. A flashlight app does not need access to your contacts. - Disable Ad ID: Go to
Settings > Privacy > Adsand select “Delete advertising ID” or “Opt out of Ads Personalization”. This stops apps from building a tracking profile linked to your device. - App Review: Go through your installed apps and uninstall anything you have not used in the last three months. Every app on your phone is a potential data collector, even when you are not actively using it.
- Google Activity Controls: Go to
myactivity.google.comand turn off Web & App Activity, Location History, and YouTube History. Then delete the existing data. Google stores years of your activity by default. - Location settings: Change location access to “Only while using the app” for most apps. Very few apps genuinely need background location access.
iPhone Privacy Settings
- App Tracking Transparency: Go to
Settings > Privacy & Security > Tracking. Turn off “Allow Apps to Request to Track”. This prevents apps from tracking your activity across other companies’ apps and websites. - Mail Privacy Protection: Go to
Settings > Mail > Privacy Protectionand enable “Protect Mail Activity”. This stops senders from knowing when you open their emails, your IP address, and your location. - Safari Privacy: Go to
Settings > Safariand enable “Prevent Cross-Site Tracking”, “Hide IP Address”, and “Fraudulent Website Warning”. - Location Services: Go to
Settings > Privacy & Security > Location Services. Set most apps to “While Using” or “Never”. Check “System Services” at the bottom and disable “iPhone Analytics” and “Significant Locations”. - Lock Screen settings: Disable Siri, Notification Centre, and Control Centre access from the lock screen to prevent someone from accessing your phone’s features without unlocking it.
Settings Most People Never Touch
On both Android and iPhone, go through these often-overlooked settings:
- Clipboard access notifications: Both platforms can warn you when an app reads your clipboard. Enable this. You will be alarmed at how many apps silently read whatever you have copied.
- Microphone and camera indicators: Modern phones show a small dot when the microphone or camera is active. Pay attention to it. If you see the indicator light up when no app should be using it, investigate.
- Automatic app updates: Keep this enabled. Updates often contain security patches for vulnerabilities that are already being exploited.
8. Browser Extensions
The right browser extensions can dramatically improve your privacy with zero effort after installation. Here are the ones worth installing — and a warning about overdoing it.
uBlock Origin — The Best Ad and Tracker Blocker
uBlock Origin is not just an ad blocker. It blocks ads, trackers, malware domains, and other unwanted content while using significantly less memory than alternatives like Adblock Plus. It is open-source, free, and maintained by a dedicated developer who refuses to participate in “acceptable ads” programs (which is a polite way of saying he does not take bribes from advertisers).
Install it and leave the default settings alone. They work perfectly for 99% of users. If a website breaks, you can click the uBlock icon and disable it for that specific site.
Privacy Badger — Learns and Adapts
Privacy Badger is made by the Electronic Frontier Foundation (EFF). Unlike traditional blockers that rely on lists of known trackers, Privacy Badger learns by watching which domains track you across multiple websites. If a domain appears to be tracking you, Privacy Badger automatically blocks it. This means it catches trackers that are too new or too obscure to appear on block lists.
Privacy Badger and uBlock Origin complement each other well. uBlock Origin blocks known threats using lists, while Privacy Badger catches what slips through by analysing behaviour.
HTTPS Everywhere
HTTPS Everywhere is another EFF project that forces websites to use HTTPS (encrypted) connections whenever possible. Many websites support HTTPS but do not use it by default. This extension ensures you always get the secure version.
Note: If you are using Firefox or Brave, they now have built-in HTTPS-only mode, so this extension is less necessary. For Chrome users, it is still worth installing.
⚠️ Do Not Install Too Many Extensions
Every browser extension can see everything you do in your browser. The more extensions you install, the larger your attack surface. Stick to 3-4 trusted extensions maximum. Avoid random extensions from unknown developers, especially those that promise to “enhance” your browsing experience. Many are spyware in disguise. Check the number of users, reviews, and whether the extension is open-source before installing it.
Final Thoughts
You do not need to do everything at once. That is the fastest way to get overwhelmed and end up doing nothing at all. Here is what I suggest: start with a password manager and a better browser. Use them for a week until they feel natural. Then add two-factor authentication to your important accounts. Then look into the other tools on this list.
Privacy is not an all-or-nothing thing. Every small step makes you harder to target. A scammer looking for easy victims will move on to someone who has not taken any precautions. You do not need to be invisible — you just need to not be the easiest target.
The fact that you read this far means you care about your privacy more than most people. That already puts you ahead. Now pick one tool from this list, install it today, and build from there.
✅ Quick Start Checklist
- Install Bitwarden and import your existing passwords from Chrome. Set a strong master password and write it down in a safe place.
- Switch your browser to Firefox or Brave. Set the tracking protection to Strict and change your default search engine to DuckDuckGo.
- Install Authy and enable two-factor authentication on your Gmail, Instagram, and Facebook accounts.
- Install uBlock Origin and Privacy Badger as browser extensions. No configuration needed — they work out of the box.
- Review your phone permissions. Remove camera, microphone, and location access from apps that do not need them. Disable your advertising ID.
Comments (3)
Leave a Comment
Finally switched to Bitwarden after reading this. The import from Chrome was surprisingly easy. Should have done this years ago.
I did not know ProtonVPN had a free tier. I have been paying for a shady VPN from the Play Store. Switching immediately.
The browser extensions section was really useful. I only had an ad blocker but Privacy Badger caught 14 trackers on a news website that the ad blocker missed.